Hardware Wallet Inheritance

Hardware Wallet Recovery for Heirs After Death

This memo is published by CustodyStress, an independent Bitcoin custody stress test that produces reference documents for individuals, families, and professionals.

What a Hardware Wallet Actually Stores

A hardware wallet is a small electronic device that stores Bitcoin private keys. Common brands include Ledger, Trezor, Coldcard, and BitBox. These devices keep keys secure by never exposing them to internet-connected computers.

When the owner of a hardware wallet dies, the device becomes part of the estate. The heir finds a small object—often mistaken for a USB drive or fitness tracker—that may contain significant value. Accessing that value presents challenges specific to hardware wallet design.


What a Hardware Wallet Actually Stores

A hardware wallet does not store Bitcoin. Bitcoin exists on the blockchain, a public record distributed across thousands of computers. The hardware wallet stores private keys—the cryptographic material that allows transactions to be signed.

The device acts as a secure container for these keys. When the owner wants to move Bitcoin, the hardware wallet signs the transaction internally without ever revealing the keys to the connected computer. This protects against malware that might steal keys from a regular computer.

The keys inside a hardware wallet are derived from a seed phrase—a list of 12 or 24 words generated when the device was first set up. This seed phrase is the master backup. If the hardware wallet breaks, the seed phrase can restore the keys on a new device or in compatible software.

Hardware wallet inheritance therefore involves two related objects: the device itself and the seed phrase backup. Each creates its own access path. Each can fail independently.


The PIN Barrier

Hardware wallets are protected by a PIN code. Without the PIN, the device cannot be used to sign transactions. The heir finds the device but cannot get past the lock screen.

Most hardware wallets limit PIN attempts. After several wrong guesses, delays increase between attempts. After too many failures, the device resets itself and erases the stored keys. This security feature that protects against theft also blocks legitimate heirs who do not know the PIN.

A Ledger Nano, for example, allows three incorrect PIN attempts before introducing delays, and wipes after additional failures. A Trezor Model T allows 16 attempts with exponentially increasing delays. The exact behavior varies by manufacturer and firmware version.

An heir who guesses wrong too many times erases the keys—unless a seed phrase backup exists. The device cannot be recovered under known methods. The security that protected the owner now locks out the heir.


The Desk Drawer Scenario

A man dies of a heart attack. His daughter is the executor. She searches his home office and finds a small black device in his desk drawer. It has a screen and two buttons. She has never seen anything like it.

She plugs it into her laptop. Nothing happens. She downloads Ledger Live, the software that works with Ledger devices. The software recognizes the device and asks for a PIN.

She does not know the PIN. She tries her father's birthday: 0412. Wrong. She tries 1234. Wrong. She tries 0000. Wrong. The device now shows a warning about remaining attempts.

She stops. She does not want to trigger a wipe. The device goes back in the drawer. She searches the rest of the office for a written PIN. She finds nothing. She searches his computer for notes. She searches his email. Nothing.

The hardware wallet sits in the drawer for two years. The daughter occasionally thinks about hiring someone to help but never follows through. Eventually she accepts the Bitcoin as inaccessible under the modeled conditions. The device still works. The keys are still inside. The PIN barrier proved insurmountable.


When the Seed Phrase Exists

If the owner created a seed phrase backup and the heir can find it, the hardware wallet's PIN becomes irrelevant. The seed phrase can restore the keys on any compatible device or software.

The heir does not need the original hardware wallet at all. A new Ledger, a new Trezor, or even a software wallet can import the seed phrase and regenerate the same keys. The Bitcoin becomes accessible through the backup rather than the original device.

This is why hardware wallet manufacturers emphasize seed phrase backups during setup. The device is replaceable. The seed phrase is not. Hardware wallet inheritance succeeds or fails based on whether the seed phrase can be located and used correctly.


The Metal Plate Scenario

A woman dies in a car accident. Her brother is the executor. He finds a Trezor in her safe along with a metal plate stamped with 24 words. He recognizes this as a seed phrase from articles he has read about Bitcoin.

He does not touch the Trezor. He does not know the PIN and does not want to risk wiping it. Instead, he focuses on the seed phrase.

Wallet software is obtained on an air-gapped computer. A new Trezor device is acquired. Device initialization occurs using the recover wallet option with the 24 words from the metal plate.

The recovery succeeds. The new device shows a balance of 1.8 Bitcoin. Funds are transferred after recovery. The original Trezor—still PIN-locked—is now irrelevant. The metal plate was the real inheritance.


The Passphrase Complication

Some hardware wallet users add a passphrase to their seed phrase. This creates a hidden wallet. The 24 words alone open one wallet (often kept empty as a decoy). The 24 words plus the passphrase open a different wallet containing the real holdings.

The passphrase is not stored on the hardware wallet. It is not stamped on the metal plate. It exists only in the owner's memory or in a separate, often hidden, location.

An heir who finds the seed phrase and successfully restores it may see an empty wallet. The heir assumes there is no Bitcoin. The real Bitcoin sits in the passphrase-protected wallet, invisible and inaccessible.

The heir cannot know a passphrase exists without being told. There is no indication on the device or in the seed phrase. The security feature that protects against theft under duress also conceals funds from legitimate heirs.


The Empty Wallet Scenario

A father dies. His son finds a Coldcard hardware wallet and a paper backup with 24 words. The son is technically sophisticated. He knows not to enter the PIN randomly. He knows to use the seed phrase instead.

The seed phrase is restored in Sparrow Wallet, a desktop application. The wallet opens. The balance shows zero. The transaction history shows It shows several deposits years ago, then a single withdrawal that emptied the wallet.

The son assumes his father sold the Bitcoin before dying. He closes the wallet and moves on with other estate matters.

Six months later, a family friend mentions that the father showed him his Bitcoin portfolio just weeks before death. The portfolio was substantial. The son realizes something is wrong.

Further research reveals the existence of passphrases. A second search of belongings occurs. In a different location—a safe deposit box—he finds a small card with a single word written on it. The seed phrase is restored again with that word added as a passphrase.

A different wallet opens. It contains 8.4 Bitcoin. The empty wallet was a decoy. The real holdings were hidden behind a passphrase the son almost never discovered.


Device Obsolescence

Hardware wallets are electronic devices. They age. Batteries die. Screens fail. Firmware becomes outdated. Manufacturers discontinue models and stop supporting old software.

An heir who finds a hardware wallet years after the owner's death may encounter a device that no longer functions. The companion software may not recognize the old model. The firmware update required to make it work may no longer be available.

This does not necessarily mean the Bitcoin is inaccessible. If a seed phrase backup exists, the keys can be restored on a current device. But if the heir was relying on the hardware wallet itself—if no seed phrase backup was created or can be found—device obsolescence becomes a barrier.

A Ledger Nano S from 2017 may still work in 2027. Or it may not. The heir cannot predict which outcome will occur. Planning that depends on a specific device functioning years into the future depends on hardware reliability that cannot be guaranteed.


The Broken Device Scenario

A man dies and leaves a Trezor One to his spouse. The spouse knows about the device and knows it contains Bitcoin. The spouse does not know the PIN, but knows a seed phrase backup exists somewhere.

Searching for months produces no seed phrase. The spouse finally decides to try the hardware wallet directly. Maybe the PIN can be guessed. The deceased often used their anniversary date.

The device is plugged in. The screen is blank. A different cable is tried. Nothing. A different computer is tried. Nothing. The device is dead. The internal battery has failed, or a component has corroded, or something else has gone wrong during years of sitting unused in a drawer.

Trezor support confirms the device appears non-functional. They cannot help recover the keys. The keys exist only inside the broken hardware. Without the seed phrase backup, recovery is not available under the modeled conditions.

The spouse eventually finds the seed phrase two years later, inside a book on a shelf. By then, the loss had already been accepted. The seed phrase works. The Bitcoin is recovered. But the recovery came from the paper, not the device. The broken Trezor was never needed.


Assessment

Hardware wallet inheritance depends on three factors: the device, the PIN, and the seed phrase backup. The device may be found or not. The PIN may be known or unknown. The seed phrase may exist or not, may be found or not, may be complete or may require a passphrase.

The device alone is insufficient without the PIN. The PIN is irrelevant if the seed phrase exists. The seed phrase is incomplete if a passphrase was used. Each layer of security that protected the owner becomes a barrier for the heir.

Hardware wallet inheritance is viable when the seed phrase is found, recognized, and used correctly—often without the original device. It becomes constrained when the seed phrase cannot be located, when a passphrase exists but is unknown, or when the heir cannot navigate the technical complexity under stress. The hardware wallet is a container. The seed phrase is the key to inheritance.


System Context

Bitcoin Custody Failure Modes

How Wallet UI Hides Bitcoin Dependencies

Device Feedback Ambiguity in Hardware Wallets

← Return to CustodyStress

For anyone who holds Bitcoin — on an exchange, in a wallet, through a service, or in self-custody — and wants to know what happens to it if something happens to them.

Start Bitcoin Custody Stress Test

$179 · 12-month access · Unlimited assessments

A structured, scenario-based diagnostic that produces reference documents for your spouse, executor, or attorney — no accounts connected, no keys shared.

Sample what the assessment produces
Original text
Rate this translation
Your feedback will be used to help improve Google Translate