Burgled Ledger, Split Seed Across PS5 and Garden, Ex-Partner Extortion
IndeterminatePhysical coercion was applied — the full outcome is not documented.
In late 2024, a Bitcoin holder implemented what appeared to be a redundant custody strategy: half the seed phrase was concealed inside a PlayStation 5 console; the other half was buried in his garden. The scheme was designed to prevent single points of failure, but it collapsed entirely during a residential burglary.
Thieves stole the Ledger hardware wallet, the laptop, and the PS5. The garden-buried seed remained inaccessible. Within days, the holder's ex-partner—with whom he had recently separated—sent extortion messages threatening to destroy the PS5 unless he disclosed the wallet passphrase. The ex-partner believed the complete seed phrase was stored on the stolen laptop, a misunderstanding that complicated negotiation.
The holder's confirmed Bitcoin holdings totaled $25,000, with additional altcoin positions of undisclosed value. Three recovery paths were proposed: negotiate with the ex-partner by misrepresenting the balance and arranging a payment of $5,000; conduct forced entry to retrieve the PS5 from her residence to recover the seed half; or escalate to law enforcement.
Forensic commentary identified the operational security failure: storing half a seed in a frequently targeted consumer device (PS5) negated the redundancy benefit. The ex-partner's proximity and informational advantage—she knew the hiding locations but not the technical reality—made her a credible coercion vector. Legal authorities were identified as the most reliable path, given the documented extortion text messages and theft report, but no formal resolution was documented in available sources.
The case illustrates a collision between split-backup theory and physical security assumptions: geographic and device-based separation of secrets remains vulnerable to coordinated theft and social engineering by those with residential proximity to the holder.
| Stress condition | Coercion |
| Custody system | Hardware wallet (single key) |
| Outcome | Indeterminate |
| Documentation | Partial |
What custody structure can and cannot protect against coercion
The relevant structural question is not whether a custody setup can prevent coercion — it typically cannot — but whether it can limit what an attacker can obtain through coercion. A setup where the holder has sole knowledge of all credentials, with no geographic distribution and no multisig threshold, gives an attacker everything they need by controlling one person. A setup where credentials are geographically distributed, where multisig requires coordination with parties in other locations, or where a passphrase-protected decoy wallet exists, limits what any single physical attack can yield.
Observed cases in this archive range from violent home invasions and kidnappings to subtler forms of coercion: legal threats, family pressure, business disputes that escalated. The outcomes depend on whether structural protections existed and whether they held under pressure. Setups with no geographic distribution or threshold requirements produced the worst outcomes.
The legal dimension adds complexity: transactions executed under coercion are technically valid. The blockchain cannot distinguish voluntary from involuntary signatures. Recovery after a coerced transfer depends entirely on legal processes — identifying the attacker, prosecuting, and attempting asset recovery — which is slow, expensive, and uncertain.
The most effective structural protection against coercion is geographic key distribution combined with a signing threshold that cannot be met from one location. An attacker who controls one person in one place cannot force a transaction that requires coordination with key holders in other jurisdictions. This protection requires accepting coordination overhead during normal use.
Translate