πŸ”’ Bank-grade AES-256-GCM encryption

Secure your seed phrase
with military-grade encryption

Open-source, client-side encryption tool for cryptocurrency seed phrases. Zero data leaves your browser.

πŸ“±

QR Code Export

Generate encrypted QR codes that can be scanned and decrypted only with your password.

πŸ–ΌοΈ

Steganography

Hide your encrypted seed inside an innocent-looking image using LSB steganography.

βœ‚οΈ

Shamir Splitting

Split your seed into 3 separate parts. Each part alone reveals nothing.

πŸ“„

JSON Export

Export encrypted backups as timestamped JSON files for easy digital storage.

πŸ“±

QR Code

Encrypted QR code

πŸ–ΌοΈ

Steganography

Hide in image

βœ‚οΈ

Split Seed

3-way division

πŸ“„

JSON File

Encrypted export

Enter Seed Phrase

How It Works

1. Enter Your Seed

Input your 12 or 24-word seed phrase. Each word is validated for BIP39 compatibility.

You can choose between individual word fields or paste your entire seed phrase.

2. Choose Encryption Method

Select from 4 backup methods:

  • QR Code with AES-256 encryption
  • Steganographic image hiding
  • Shamir secret sharing (3 parts)
  • Encrypted JSON file export

3. Download & Store

Download your encrypted backup and store it securely. Multiple redundant backups in different locations are recommended.

Your password is never stored - memorize it or use a password manager.

Storage Best Practices

πŸ–ΌοΈ Steganographic Images

Store the encrypted image on multiple USB drives in different physical locations.

  • Use high-quality USB 3.0+ drives
  • Keep in fireproof/waterproof containers
  • Cloud backup (encrypted image looks innocent)
  • Multiple copies recommended (3-5 locations)

πŸ“± QR Code Backups

QR codes offer physical and digital storage flexibility.

  • Print on paper - Laminate and store in safe
  • Engrave on metal - Fireproof & waterproof (steel/titanium plates)
  • Store in bank safe deposit box
  • Multiple printed copies in different locations

πŸ“„ JSON & Split Seeds

Digital and distributed storage options.

  • JSON files - USB drives, encrypted cloud storage
  • Split seeds - Each part in different location (family, friends, safe deposit boxes)
  • No single point of failure
  • Redundancy is key - always have backups of backups

Security Model

Client-Side Only

All cryptographic operations happen in your browser. No data is ever transmitted to any server.

You can verify this by checking the network tab - zero outbound requests during encryption.

AES-256-GCM Encryption

Industry-standard encryption using Web Crypto API. Your password is derived using SHA-256 to create the encryption key.

Each encryption uses a unique random initialization vector (IV) for maximum security.

Open Source & Auditable

The entire source code is viewable in this HTML file. No obfuscation, no hidden code.

Recommended: Run this file locally or on an air-gapped computer for maximum security.

⚠️ Important Security Guidelines