Cold Key Storage Setup
Cold storage is storing private keys on a device that is never connected to the internet. Properly configured cold storage is the only way to ensure security for significant amounts. Even if your online systems are compromised, keys in cold storage remain safe.
Threat Levels
Before choosing an architecture, you need to understand what you're protecting against:
- Remote compromise — hacker gains access to online systems
- Physical access — attacker gains the device
- Insider threat — team member abuses access
- Natural disasters — fire or flood destroys physical media
- Loss/forgetting — accidental loss of access to own keys
Solutions for each threat differ. Strengthening protection against one threat often weakens protection against another (complex multi-sig protects against theft but increases loss of access risk).
Cold Storage Options
Hardware Wallet (Ledger/Trezor)
Optimal balance of convenience and security for most cases. Private key is generated and stored in the device's secure element, never leaves it.
Setup:
- Buy only from official distributors (not secondhand)
- Check packaging integrity and firmware on first use
- Generate seed phrase on the device — never on computer
- Write seed phrase by hand on paper — do not photograph or print
- Verify seed phrase through recovery test (erase device, restore)
- Set strong PIN (6+ characters)
- Enable passphrase (25th word) for additional security layer
Passphrase — additional secret beyond 24 words. Same seed + different passphrases → different wallets. If device is stolen — without passphrase, attacker sees empty or decoy wallets.
Air-gapped Machine
Computer that has never been connected to network and never will be. Used for operations with keys.
Requirements:
- Physically isolated PC (WiFi/Bluetooth adapters removed or soldered)
- Boot only from verified USB
- Operating system: Tails OS (amnesic — leaves no traces) or specialized Linux
- Data transfer only via QR-codes or single-use USB
Transaction signing flow:
- Online machine: creates unsigned transaction → QR-code
- Air-gapped machine: scans QR, signs → QR-code with signature
- Online machine: scans signature QR → broadcast
Tools: Electrum (Bitcoin), Specter Desktop, Sparrow Wallet for Bitcoin. For Ethereum — Gnosis Safe with air-gapped signer or Frame wallet.
HSM (Hardware Security Module)
For corporate use. AWS CloudHSM, Thales Luna, Utimaco. Keys are generated and stored in tamper-evident hardware. Physical intrusion destroys keys. Supports M-of-N for activation (multiple smart cards simultaneously).
Seed Phrase Physical Storage
Paper is vulnerable to water and fire. Options for long-term seed phrase storage:
Metal Plates. Cryptosteel Capsule, Bilodeau, Blockplate — stamp words letter by letter on stainless steel. Withstands 1400°C (most fires), waterproof.
Shamir Secret Sharing. Seed phrase is split into N parts, K of them sufficient for recovery (e.g., 3-of-5). Each part stored with different trusted person or in different locations. Trezor supports SLIP-39 (Shamir Backup) natively.
Geographic Distribution
All copies of keys in one place = single point of failure. Recommended:
- Primary copy: home safe or bank deposit box
- Backup: trusted relative in another city
- Backup 2 (for large amounts): notary or specialized crypto custodian
Important: trusted persons should know what they're storing but not know PIN/passphrase. PIN/passphrase stored separately from seed (different location, different person).
Multi-sig as Cold Storage
Gnosis Safe with multiple hardware wallets in different locations. 2-of-3: one Ledger at home, one with trusted partner, one in bank deposit box. Loss of one — not a disaster. Theft of one — insufficient to steal funds.
Setup for Teams
For companies — mandatory procedure documentation:
- Who has access to which keys
- Transaction procedure (who initiates, who signs, who verifies)
- Key rotation procedure when employee leaves
- Recovery procedure if key is lost
- Regular tests (quarterly: verify all keys are present and working)
Cold storage setup for individual — 1-2 days of consultation + implementation. For organization with multi-sig, HSM and documented procedures — 2-4 weeks.







