CustodyStress
Archive › Device loss
Part of the CustodyStress archive of observed Bitcoin custody incidents
CS-00793

Device lost — hardware wallet 2020

Blocked
Case description
A Trezor user discovered in November 2020 that their device had been replaced by a fake in the retail packaging they had purchased. The counterfeit device had a backdoored firmware. When they initialised the device and generated a wallet, the seed was silently exfiltrated to the attacker. The original device had never been in the box.
Custody context
Stress conditionDevice loss
Custody systemHardware wallet (single key)
OutcomeBlocked
DocumentationUnknown
Year observed2020
CountryUnknown
Structural dependencies observed
Third-party platform dependencyHardware device required
What this illustrates
Access ran through a third-party platform. When that platform became unavailable, so did the Bitcoin. Access was not recoverable.
Outcome interpretation
Access was not possible under the reported conditions.
Source
Publicly Reported
Evidence type
News article
Related cases involving device loss
188 cases involve device loss 274 cases involve hardware wallet (single key) View archive statistics →
This archive documents observed custody survivability failures. It does not attempt to document all Bitcoin losses or security incidents. Submit a case
← All cases
Framework references
Terms guide
Survives
Access remained possible under the reported conditions.
Constrained
Access remained possible, but only with delay, dependence, or significant difficulty.
Blocked
Access was not possible under the reported conditions.
Indeterminate
There was not enough information to determine the outcome.
Single-person knowledge
Recovery depended on information or capability held by one individual who was unavailable.
Institutional dependence
Recovery depended on a third-party institution or service that was inaccessible or uncooperative.
Documentation gap
Recovery depended on instructions that were missing, incomplete, or unclear.
Authority mismatch
The person with legal authority to act did not have operational access, or vice versa.