AssetCadet is a service concept, not an actual operating service. All guides are free for public benefit. Interested in building this together? Contact Mr Ko via WhatsApp +852 9347 5637 AssetCadet 是一個服務概念,並非實際營運中的服務。所有指南均免費供公眾使用。有興趣一起打造?請透過 WhatsApp +852 9347 5637 聯絡高先生
Digital Asset Recovery數碼資產追回 2026-03-10 32 min read閱讀時間 32 分鐘

How to Find and Recover Lost Cryptocurrency After Someone Dies

如何在親人去世後尋找和追回加密貨幣

An estimated 3.8 million Bitcoin — worth over US$400 billion — are permanently lost, many belonging to owners who died without sharing their wallet credentials. This guide walks families through the practical steps of determining whether a deceased person held cryptocurrency, how to recover it from exchanges and wallets, and how to avoid the scammers who prey on grieving families.

估計有380萬枚比特幣 —— 價值超過4,000億美元 —— 已永久遺失,其中許多屬於在未分享錢包憑證的情況下去世的持有人。本指南引導家庭逐步確定已故人士是否持有加密貨幣、如何從交易所和錢包中追回,以及如何避免針對悲痛家庭的騙局。

1. The Scale of Lost Crypto: Billions Locked Away Forever

The numbers are staggering. Of the approximately 19.8 million Bitcoin that have been mined to date (out of a maximum supply of 21 million), analysts estimate that between 3.8 and 4 million BTC are permanently lost — roughly 18-20% of all Bitcoin ever created. A 2024 River Financial analysis put the figure at 3.8 million BTC, much of it tied to long-dormant addresses that have not moved coins in over a decade.

At current prices, these lost Bitcoin alone represent over US$400 billion in inaccessible wealth. And that figure only accounts for Bitcoin — the equivalent losses in Ethereum, other altcoins, and tokens on various blockchains push the total much higher.

Why Crypto Gets Lost

Cryptocurrency is fundamentally different from traditional financial assets. There is no bank to call, no customer service hotline, and no "forgot my password" button. The reasons crypto becomes permanently inaccessible include:

  • Lost private keys or seed phrases: The most common cause. Without the private key or the 12/24-word seed phrase, the crypto is mathematically impossible to access.
  • Death of the owner: If the owner dies without sharing their wallet credentials, the crypto may be lost forever — unless someone can locate the keys.
  • Forgotten exchange accounts: Early adopters who bought Bitcoin on now-defunct exchanges, or who forgot they had small amounts on various platforms.
  • Hardware failure: Hard drives crashing, USB drives corrupting, or phones being destroyed without backup.
  • Deliberate long-term storage: Some early Bitcoin miners stored coins and never returned to them — the Satoshi Nakamoto wallet alone is believed to contain approximately 1 million BTC that has never moved.
Time Matters: The sooner you begin searching after someone's death, the better your chances of recovery. Exchange accounts may be frozen or closed after periods of inactivity. Phone batteries die, and biometric data (Face ID, fingerprints) becomes unavailable. Device passwords may be needed before screens lock permanently.

2. Crypto Basics for Non-Crypto People

If you are not familiar with cryptocurrency, understanding a few key concepts will help you navigate the recovery process:

Key Terminology

Term What It Means Why It Matters for Recovery
Wallet Software or hardware that stores private keys and allows sending/receiving crypto Finding the wallet is the first step to recovery
Private Key A long string of characters (like a password) that proves ownership and allows transfers Without this, the crypto is inaccessible
Seed Phrase 12 or 24 random English words that can regenerate all private keys in a wallet This is the master backup — finding it recovers everything
Exchange A company (like Coinbase or Binance) where people buy/sell/store crypto Exchanges have customer service and can transfer assets to heirs with proper documentation
Hardware Wallet A physical USB-like device (Ledger, Trezor) that stores private keys offline Requires a PIN to access — but the seed phrase can bypass it
Blockchain The public ledger recording all transactions — viewable by anyone If you have a wallet address, you can see the balance (but not move it without keys)

Two Types of Crypto Storage

Understanding the difference is critical for recovery:

Custodial (Exchange)

Recoverable with legal documents. The exchange holds the private keys on the user's behalf. Like a bank, the exchange can transfer assets to an estate executor with proper probate documentation. This is the easier path to recovery.

Self-Custody (Wallet)

Requires the private key or seed phrase. The user controls the keys directly. No company can help recover access. If the key is lost, the crypto is gone. This is the harder path — and often impossible without the seed phrase.

3. Warning Signs That Crypto Exists

Many families have no idea their loved one owned cryptocurrency. Here are the telltale signs to look for:

On Their Phone or Computer

  • Exchange apps: Look for Coinbase, Binance, Crypto.com, Kraken, OKX, Bybit, HashKey (popular in HK), OSL, Gemini, or any app with "crypto," "coin," or "wallet" in the name
  • Wallet apps: MetaMask, Trust Wallet, Coinbase Wallet, Exodus, Electrum, BlueWallet, Phantom, or Ledger Live
  • Two-factor authentication (2FA) apps: Google Authenticator or Authy — check for entries linked to exchanges
  • Browser bookmarks: Bookmarks for exchange websites, blockchain explorers (etherscan.io, blockchain.com), or DeFi platforms
  • Browser extensions: MetaMask (fox icon), Phantom (ghost icon), or other wallet extensions in Chrome/Firefox

In Their Email

  • Account registration confirmations from any exchange
  • Transaction confirmation emails (deposits, withdrawals, trades)
  • KYC (Know Your Customer) verification emails
  • Tax reporting documents from exchanges
  • Marketing emails from crypto platforms

In Their Financial Records

  • Bank transfers to crypto exchanges (look for transfers to "Coinbase," "Binance," "Crypto.com," or similar)
  • Credit card charges from crypto exchanges
  • Debit card transactions from crypto cards (Crypto.com Visa, Coinbase Card)
  • Entries on tax returns related to cryptocurrency gains or losses

Physical Items

  • Hardware wallets: Small USB-like devices branded Ledger (looks like a small USB stick or credit card), Trezor (small device with a screen), or similar
  • Metal seed phrase plates: Metal cards or plates with 12 or 24 words stamped into them (fire/water resistant backup)
  • Paper notes: Handwritten 12 or 24 English words — these are almost certainly a seed phrase
  • QR codes: Printed QR codes could be wallet addresses or private keys
  • USB drives: May contain wallet files or key backups
Search Everywhere: Crypto-savvy people often hide seed phrases in creative locations: inside book covers, in safe deposit boxes, taped behind picture frames, in fireproof safes, written on the inside of cabinet doors, or stored in password managers like 1Password, LastPass, or Bitwarden. Check all of these.

5. Exchange Recovery: Platform-by-Platform Guide

If the deceased held crypto on an exchange (custodial account), you can recover it through the exchange's estate or inheritance process. Every major exchange has one, though the processes vary significantly.

General Requirements

Almost all exchanges require the following documents from the estate executor or administrator:

Death certificate (original or certified copy)
Grant of Probate or Letters of Administration
Government-issued photo ID of the executor/administrator
Proof of the deceased's identity (passport, national ID)
A signed letter from the executor directing the exchange to transfer assets
Destination wallet address or exchange account for the transfer

Exchange-Specific Processes

Coinbase (Global)

Coinbase has one of the more transparent processes. Submit a request through their "Claim a Decedent's Account" support page. You will need Letters Testamentary, Letters of Administration, or a Small Estate Affidavit (depending on your jurisdiction), plus government-issued ID. Coinbase does not charge fees for estate transfers. The process typically takes 4-8 weeks.

Binance (Global)

Binance handles deceased account requests on a case-by-case basis. They explicitly require certified copies of court documents authorising access or distribution of assets. Contact Binance support and request the "deceased user account" process. Be prepared for a lengthy process — Binance's support can be slower than Coinbase's, and they may require additional documentation including an affidavit from the estate executor.

Crypto.com (Global, HQ in Singapore)

Contact Crypto.com support and reference "deceased account holder." They will guide you through their process, which typically requires probate documents, death certificate, and executor identification. The Crypto.com Visa card account will also need to be closed separately.

HashKey Exchange (Hong Kong)

HashKey is one of only two licensed virtual asset trading platforms in Hong Kong (licensed by the SFC). For deceased account recovery, contact their customer service team at support@hashkey.com. As an SFC-regulated entity, they follow structured processes similar to traditional financial institutions. You will need a Grant of Probate or Letters of Administration issued by the Hong Kong High Court.

OSL (Hong Kong)

OSL is the other SFC-licensed exchange in Hong Kong. Their estate process follows standard Hong Kong probate procedures. Contact them directly for their specific documentation requirements.

Kraken (Global)

Kraken has a dedicated "deceased client" support process. Email support@kraken.com with the subject line "Deceased Client" and they will provide specific instructions. They require standard probate documentation and typically process within 30-60 days.

Important: Exchanges will freeze the account upon notification of the account holder's death. Do not attempt to log in using the deceased's credentials, as this could be flagged as unauthorized access and complicate the recovery process. Always go through the official estate/inheritance channel.

6. Hardware Wallets: What to Do If You Find One

Finding a hardware wallet (Ledger, Trezor, or similar device) among the deceased's belongings is a promising sign — it means they likely had significant crypto holdings worth protecting with a dedicated security device.

Ledger (Nano S, Nano X, Stax)

Ledger devices require a 4-8 digit PIN to unlock. If you enter the wrong PIN three times, the device resets and wipes all data. Do not guess the PIN unless you are very confident. Instead:

  • Search for the seed phrase (24 words). With the seed phrase, you can restore the wallet on a new Ledger device or any compatible wallet.
  • The seed phrase may have been written on the "Recovery Sheet" card that comes in the Ledger box — a folded card with blank lines for 24 words.
  • If you find the seed phrase, download Ledger Live (ledger.com/start), get a new Ledger device, and restore using the seed phrase.
  • If you know the PIN, connect the device to a computer with Ledger Live installed, enter the PIN, and you can view all accounts and balances.

Trezor (Model One, Model T, Safe 3, Safe 5)

Trezor devices have a wipe function after 16 incorrect PIN attempts. Similar to Ledger:

  • Search for the seed phrase (12 or 24 words depending on the model). With it, you can restore to a new Trezor or compatible wallet.
  • If you know the PIN, connect to a computer and use the Trezor Suite software (trezor.io/trezor-suite) to access the wallet.
  • Trezor also supports a "passphrase" feature — an optional extra word added to the seed phrase. If the deceased used a passphrase, you need both the seed phrase AND the passphrase.
Critical Warning: Do not attempt multiple wrong PIN entries on a hardware wallet. After a limited number of incorrect attempts (3 on Ledger, 16 on Trezor), the device will wipe itself and all data will be erased. If you do not know the PIN and cannot find the seed phrase, consult a professional before doing anything.

7. Seed Phrases: Where People Hide Them

The seed phrase (also called recovery phrase or mnemonic phrase) is the single most important piece of information for crypto recovery. It is a list of 12 or 24 ordinary English words that, when entered in the correct order, can regenerate all the private keys in a wallet.

What a Seed Phrase Looks Like

A typical seed phrase might look like this:

abandon ability able about above absent absorb abstract absurd abuse access accident

It is always 12 or 24 common English words, drawn from a standardised list of 2,048 words (the BIP-39 word list). If you find a note with 12 or 24 random English words, it is almost certainly a seed phrase.

Common Hiding Places

Based on our experience and reports from recovery professionals, here are the most common places people store seed phrases:

  • Physical safe or fireproof box: The most obvious and most common location
  • Safe deposit box at a bank: Offers fire/flood protection but requires estate access
  • Written in a notebook or journal: Sometimes disguised as random notes or mixed in with other writing
  • Inside a book: Written on the inside cover, on a slip of paper tucked between pages, or in the margins
  • Taped behind furniture or picture frames: A "hide in plain sight" approach
  • Metal seed phrase backup: Stamped or engraved on metal plates (brands include Cryptosteel, Billfodl, Hodlr) — fireproof and waterproof
  • Password manager: Stored as a secure note in 1Password, LastPass, Bitwarden, or KeePass
  • Encrypted file on computer/cloud: A text file inside an encrypted container (VeraCrypt, encrypted ZIP)
  • Split across locations: Some security-conscious holders split their seed phrase across 2-3 locations (e.g., words 1-8 in one place, words 9-16 in another, words 17-24 in a third)
  • With a lawyer or trusted friend: Given to a third party for safekeeping, sometimes in a sealed envelope
If You Find a Seed Phrase: Handle it with extreme care. Anyone who sees these words can steal all the crypto in the wallet. Do not photograph it with a phone connected to the internet. Do not type it into any website. Do not share it with anyone except a verified, trusted professional. Restore it on a hardware wallet or air-gapped computer only.

8. Software Wallets and Browser Extensions

Many crypto users store their assets in software wallets on their phone or computer, or in browser extensions. These are accessible if you can unlock the device.

Common Software Wallets

  • MetaMask: The most popular Ethereum wallet. Available as a browser extension (Chrome, Firefox, Brave) and mobile app. Requires a password to unlock. The seed phrase can be found in Settings > Security & Privacy > Reveal Secret Recovery Phrase (requires the wallet password).
  • Trust Wallet: Popular mobile wallet supporting multiple blockchains. Requires a passcode to open.
  • Exodus: Desktop and mobile wallet with a user-friendly interface. Backup seed phrase accessible in settings.
  • Electrum: Popular Bitcoin-only desktop wallet. The seed phrase is shown during initial setup and can be accessed from the wallet file.
  • Phantom: Popular Solana wallet, also a browser extension. Similar structure to MetaMask.

If You Can Access the Device

  1. Open the wallet app or browser extension
  2. If it requires a password, check the deceased's password manager or common password patterns
  3. Once open, navigate to settings and look for "backup," "recovery phrase," or "seed phrase" options
  4. Write down the seed phrase on paper — do not store it digitally
  5. Check all accounts and balances within the wallet
  6. Transfer assets to a wallet you control (preferably a hardware wallet)

If You Cannot Access the Device

If the phone or computer is locked and you do not know the password:

  • For iPhones: Apple can provide access to iCloud data with a valid court order, but they cannot unlock the physical device. A forensic data recovery service may be able to help.
  • For Android: Samsung and other manufacturers typically cannot unlock devices. Forensic services are your best option.
  • For computers: A professional data recovery service may be able to access the hard drive and extract wallet files, which can then be used with the wallet password.

9. Real Examples of Lost Crypto Fortunes

These real-world cases illustrate both the scale of the problem and the range of outcomes:

James Howells: The Landfill Bitcoin (8,000 BTC)

In 2013, Welsh IT engineer James Howells accidentally threw away a laptop hard drive containing the private key to 8,000 Bitcoin. The drive ended up in the Docksway landfill in Newport, Wales. By February 2025, those Bitcoin were worth approximately US$751 million.

Howells spent 12 years trying to get permission to excavate the landfill. He assembled a team of specialists and secured private funding for the dig. Newport City Council repeatedly refused, citing environmental hazards including dangerous gases, methane, asbestos, and toxic leachate. In December 2024, Howells sued the council for damages. The High Court dismissed his claim in January 2025, ruling it had no prospect of success. In February 2025, Howells offered to buy the entire landfill site.

Lesson: Physical hardware containing private keys must be treated as irreplaceable. A seed phrase backup would have prevented this entire situation.

Stefan Thomas: The Locked IronKey (7,002 BTC)

German-born programmer Stefan Thomas stored 7,002 Bitcoin on an IronKey encrypted USB drive and lost the password. The IronKey allows only 10 password attempts before permanently destroying its contents. Thomas has used 8 of his 10 attempts, leaving just 2 tries remaining. At current prices, the wallet contains over US$700 million.

Cybersecurity firm Unciphered reportedly discovered a method to unlock IronKey devices using a process involving 200 trillion simulated password attempts without triggering the self-destruct mechanism. They approached Thomas, but he declined, citing a prior agreement with two other recovery teams. As of late 2025, the IronKey remains locked in a Swiss vault.

Lesson: Never store large amounts of crypto behind a single point of failure. Use a seed phrase backup stored separately from the device.

QuadrigaCX: The Exchange That Died With Its Founder

In December 2018, Gerald Cotten, the 30-year-old CEO of Canadian crypto exchange QuadrigaCX, died while traveling in India. Cotten was reportedly the only person who held the passwords to the exchange's cold storage wallets containing approximately C$250 million (US$190 million) in customer funds. The exchange filed for bankruptcy in January 2019, and a court-appointed monitor found that most of the crypto had actually been misappropriated by Cotten during his lifetime.

Lesson: Storing crypto on an exchange is not risk-free, but exchanges with proper governance have estate recovery processes. Single-person-controlled wallets are the highest risk.

Hong Kong Context: Hong Kong has seen rapid crypto adoption, ranking among the top 10 globally for crypto ownership rates. With two SFC-licensed exchanges (HashKey and OSL) and widespread use of overseas platforms, the likelihood of a Hong Kong decedent having crypto assets is significant — especially among the younger demographic that emigrated post-2019.

10. Professional Recovery Services: Legitimate vs. Scams

The crypto recovery industry is rife with fraud. Between February 2023 and February 2024, cryptocurrency scam victims exploited by fictitious "recovery" firms reported losses totalling over US$9.9 million — they were scammed a second time while trying to recover from the first scam. In 2024, overall crypto scams led to US$9.3 billion in losses, a 66% increase from the previous year.

Red Flags: Signs of a Scam Recovery Service

Demands Upfront Payment

Legitimate services work on a contingency basis (they get paid only if they recover something) or charge modest diagnostic fees. Any service demanding thousands of dollars upfront before doing anything is almost certainly a scam.

Guarantees 100% Recovery

No honest professional will guarantee full recovery. Blockchain technology makes it mathematically impossible to guarantee recovery without the private key. Anyone who promises guaranteed results is lying.

Claims "Special Access" to Blockchain

Nobody has special access to the blockchain. It is decentralised by design. Claims of "ethical hacking" into the blockchain, or having "contacts at Binance who can reverse transactions," are fraudulent.

Contacts You First

Scammers actively search social media and forums for people posting about lost crypto. If someone contacts you unsolicited offering recovery services — especially via Telegram, WhatsApp, or social media DMs — it is a scam. Always.

Signs of a Legitimate Recovery Service

Verifiable Business Identity

They have a registered company, physical address, professional website, and verifiable team members with real LinkedIn profiles and professional histories.

Honest About Limitations

They will tell you upfront if your case is likely unrecoverable. They will explain what they can and cannot do, and the probability of success.

Works Through Legal Channels

They work with law enforcement, courts, and exchanges through proper legal channels. They may require you to provide probate documentation.

Transparent Fee Structure

They clearly state their fees — typically a percentage of recovered assets (10-30%) or a fixed diagnostic fee plus success fee.

What Legitimate Recovery Can Actually Do

  • Brute-force password cracking: If you have a wallet file but forgot the password, specialised hardware can attempt billions of password combinations. Success depends on password complexity.
  • Partial seed phrase recovery: If you have most of a seed phrase but are missing 1-3 words, software can calculate the missing words from the known ones.
  • Hardware wallet data extraction: In some cases, specialists can extract data from damaged hardware wallets without triggering the wipe mechanism.
  • Exchange liaison: Professional estate administrators can navigate the exchange inheritance process on your behalf.
  • Blockchain analysis: Tracing the flow of funds to identify which exchanges or wallets hold the assets.

12. Prevention: What Crypto Holders Should Do Now

If you hold cryptocurrency, take these steps now to prevent your family from facing the challenges described in this guide:

Write down your seed phrase on paper (not digitally) and store it in a fireproof safe or safety deposit box.
Consider a metal seed phrase backup (Cryptosteel, Billfodl, etc.) for fire/flood protection.
Create an inventory of all exchanges, wallets, and approximate holdings. Store this with your will or in a sealed envelope with your solicitor.
Include crypto in your will. Explicitly mention digital assets and specify who should receive them and where to find the access credentials.
Tell at least one trusted person that you own crypto and where to find the seed phrase/credentials — not the details themselves, but the location.
Use a password manager and ensure someone you trust has the master password or can access it through your estate.
Consider multi-signature wallets that require 2-of-3 keys to transact, distributing keys among family members or trusted parties.
Review and update regularly. Crypto holdings change. Review your inventory and access instructions at least annually.
The Bottom Line: The vast majority of "lost" cryptocurrency is not actually lost due to technical problems — it is lost because the owner did not communicate access information to anyone else. A few minutes of planning today could prevent the permanent loss of potentially life-changing wealth for your family.

1. 遺失加密貨幣的規模:數十億永久鎖定

數字令人震驚。在迄今已開採的約1,980萬枚比特幣中(最大供應量為2,100萬枚),分析師估計有380萬至400萬枚BTC已永久遺失 —— 約佔所有已創建比特幣的18-20%。2024年River Financial的分析將數字定為380萬枚BTC,其中大部分與超過十年未移動過代幣的長期休眠地址相關。

按目前價格計算,僅這些遺失的比特幣就代表超過4,000億美元的無法訪問財富。而這個數字只計算了比特幣 —— 以太坊、其他山寨幣和各種區塊鏈上代幣的等值損失使總額更高。

加密貨幣為何遺失

加密貨幣與傳統金融資產有根本性的不同。沒有銀行可以打電話,沒有客戶服務熱線,也沒有「忘記密碼」按鈕。加密貨幣永久無法訪問的原因包括:

  • 遺失私鑰或助記詞:最常見的原因。沒有私鑰或12/24個單詞的助記詞,加密貨幣在數學上不可能被訪問。
  • 持有人死亡:如果持有人在未分享錢包憑證的情況下去世,加密貨幣可能永遠遺失 —— 除非有人能找到密鑰。
  • 忘記的交易所帳戶:早期採用者在現已關閉的交易所購買比特幣,或忘記在各平台上有小額存款。
  • 硬件故障:硬碟損壞、USB驅動器損壞或手機被銷毀且無備份。
  • 故意長期存儲:一些早期比特幣礦工存儲代幣後再未回來 —— 僅中本聰的錢包就被認為包含約100萬枚從未移動過的BTC。
時間很重要:在某人去世後越早開始搜索,追回的機會就越大。交易所帳戶可能在閒置一段時間後被凍結或關閉。手機電池會耗盡,生物識別數據(Face ID、指紋)將變得不可用。在螢幕永久鎖定之前可能需要設備密碼。

2. 非加密貨幣用戶的基礎知識

如果您不熟悉加密貨幣,了解幾個關鍵概念將有助於您進行追回程序:

關鍵術語

術語 含義 對追回的重要性
錢包 存儲私鑰並允許發送/接收加密貨幣的軟件或硬件 找到錢包是追回的第一步
私鑰 一長串字符(如密碼),證明所有權並允許轉帳 沒有它,加密貨幣無法訪問
助記詞 12或24個隨機英文單詞,可重新生成錢包中的所有私鑰 這是主備份 —— 找到它就能恢復一切
交易所 人們買賣/存儲加密貨幣的公司(如Coinbase或Binance) 交易所有客服,可以在提供適當文件後將資產轉移給繼承人
硬件錢包 類似USB的實體設備(Ledger、Trezor),離線存儲私鑰 需要PIN碼才能訪問 —— 但助記詞可以繞過它
區塊鏈 記錄所有交易的公共帳本 —— 任何人都可以查看 如果您有錢包地址,可以查看餘額(但沒有密鑰無法移動)

兩種加密貨幣存儲方式

理解其區別對追回至關重要:

託管式(交易所)

可通過法律文件追回。交易所代表用戶持有私鑰。如同銀行一樣,交易所可以在提供適當遺囑認證文件後將資產轉移給遺產執行人。這是較容易的追回途徑。

自行保管(錢包)

需要私鑰或助記詞。用戶直接控制密鑰。沒有公司能幫助恢復訪問。如果密鑰遺失,加密貨幣就消失了。這是較困難的途徑 —— 沒有助記詞通常是不可能的。

3. 加密貨幣存在的警示信號

許多家庭不知道他們的親人擁有加密貨幣。以下是需要留意的跡象:

在手機或電腦上

  • 交易所應用:查找 Coinbase、Binance、Crypto.com、Kraken、OKX、Bybit、HashKey(在港流行)、OSL、Gemini,或任何名稱中含「crypto」、「coin」或「wallet」的應用
  • 錢包應用:MetaMask、Trust Wallet、Coinbase Wallet、Exodus、Electrum、BlueWallet、Phantom 或 Ledger Live
  • 雙重驗證 (2FA) 應用:Google Authenticator 或 Authy —— 檢查是否有與交易所關聯的條目
  • 瀏覽器書籤:交易所網站、區塊鏈瀏覽器(etherscan.io、blockchain.com)或 DeFi 平台的書籤
  • 瀏覽器擴展:Chrome/Firefox 中的 MetaMask(狐狸圖標)、Phantom(幽靈圖標)或其他錢包擴展

在電郵中

  • 任何交易所的帳戶註冊確認
  • 交易確認電郵(存款、提款、交易)
  • KYC(了解你的客戶)驗證電郵
  • 交易所的稅務報告文件
  • 加密貨幣平台的營銷電郵

在財務記錄中

  • 銀行轉帳至加密貨幣交易所(查找轉至「Coinbase」、「Binance」、「Crypto.com」或類似機構的轉帳)
  • 來自加密貨幣交易所的信用卡收費
  • 加密貨幣卡的借記卡交易(Crypto.com Visa、Coinbase Card)
  • 報稅表上與加密貨幣收益或虧損相關的條目

實物物品

  • 硬件錢包:小型類似USB的設備,品牌為 Ledger(看起來像小型USB手指或信用卡)、Trezor(帶螢幕的小型設備)或類似產品
  • 金屬助記詞板:上面刻有12或24個單詞的金屬卡或金屬板(防火/防水備份)
  • 紙條:手寫的12或24個英文單詞 —— 這幾乎可以肯定是助記詞
  • QR碼:打印的QR碼可能是錢包地址或私鑰
  • USB驅動器:可能包含錢包文件或密鑰備份
到處搜索:精通加密貨幣的人通常將助記詞藏在創意位置:書封內、保管箱中、相框後面用膠帶貼著、防火保險箱中、櫥櫃門內側,或存儲在密碼管理器中如 1Password、LastPass 或 Bitwarden。請檢查所有這些地方。

5. 交易所追回:逐個平台指南

如果已故者在交易所持有加密貨幣(託管帳戶),您可以通過交易所的遺產或繼承程序追回。每家主要交易所都有這樣的程序,儘管流程差異很大。

一般要求

幾乎所有交易所都要求遺產執行人或管理人提供以下文件:

死亡證明書(原件或經認證副本)
遺產承辦書或遺產管理書
執行人/管理人的政府簽發帶照片身份證明文件
已故者的身份證明(護照、國民身份證)
執行人簽署的信函,指示交易所轉移資產
用於接收轉帳的目標錢包地址或交易所帳戶

各交易所具體流程

Coinbase(全球)

Coinbase 的流程相對透明。通過其「領取已故者帳戶」支援頁面提交申請。您需要遺囑認證書、遺產管理書或小額遺產宣誓書(取決於您的司法管轄區),加上政府簽發的身份證。Coinbase 不收取遺產轉移費用。流程通常需要4-8週。

Binance(全球)

Binance 按個案處理已故帳戶請求。他們明確要求經認證的法庭文件副本,授權訪問或分配資產。聯繫 Binance 客服並要求「已故用戶帳戶」流程。準備好漫長的過程 —— Binance 的客服可能比 Coinbase 慢,且可能要求額外文件。

HashKey Exchange(香港)

HashKey 是香港僅有的兩家持牌虛擬資產交易平台之一(由證監會發牌)。如需追回已故者帳戶,請聯繫其客服團隊 support@hashkey.com。作為證監會監管實體,他們遵循類似傳統金融機構的結構化流程。您將需要香港高等法院簽發的遺產承辦書或遺產管理書。

OSL(香港)

OSL 是香港另一家證監會持牌交易所。其遺產流程遵循標準的香港遺囑認證程序。直接聯繫他們了解具體文件要求。

重要:交易所在收到帳戶持有人死亡通知後會凍結帳戶。不要嘗試使用已故者的憑證登入,因為這可能被標記為未經授權的訪問,使追回過程複雜化。始終通過官方遺產/繼承渠道進行。

6. 硬件錢包:發現後該怎麼做

在已故者的遺物中發現硬件錢包(Ledger、Trezor 或類似設備)是一個好跡象 —— 這意味著他們可能擁有足夠重要的加密貨幣持倉,值得用專用安全設備來保護。

Ledger(Nano S、Nano X、Stax)

Ledger 設備需要4-8位數的PIN碼才能解鎖。如果輸入錯誤PIN碼三次,設備會重置並擦除所有數據。除非非常有信心,否則不要猜測PIN碼。取而代之:

  • 搜索助記詞(24個單詞)。有了助記詞,您可以在新的 Ledger 設備或任何兼容錢包上恢復。
  • 助記詞可能寫在 Ledger 盒子裡附帶的「Recovery Sheet」卡上 —— 一張帶有24行空白的折疊卡。
  • 如果找到助記詞,下載 Ledger Live(ledger.com/start),獲取新的 Ledger 設備,使用助記詞恢復。
  • 如果知道PIN碼,將設備連接到安裝了 Ledger Live 的電腦,輸入PIN碼,即可查看所有帳戶和餘額。

Trezor(Model One、Model T、Safe 3、Safe 5)

Trezor 設備在16次錯誤PIN碼嘗試後會執行擦除功能。與 Ledger 類似:

  • 搜索助記詞(根據型號為12或24個單詞)。有了它,您可以恢復到新的 Trezor 或兼容錢包。
  • 如果知道PIN碼,連接到電腦並使用 Trezor Suite 軟件(trezor.io/trezor-suite)訪問錢包。
  • Trezor 還支持「密碼短語」功能 —— 助記詞之外的可選額外詞語。如果已故者使用了密碼短語,您同時需要助記詞和密碼短語。
嚴重警告:不要在硬件錢包上嘗試多次錯誤的PIN碼輸入。在有限次數的錯誤嘗試後(Ledger為3次,Trezor為16次),設備會自行擦除,所有數據將被清除。如果您不知道PIN碼且找不到助記詞,在做任何事之前請諮詢專業人士。

7. 助記詞:人們常藏在哪裡

助記詞(也稱為恢復短語或記憶短語)是加密貨幣追回中最重要的單一信息。它是一組12或24個普通英文單詞,按正確順序輸入可以重新生成錢包中的所有私鑰。

助記詞的外觀

典型的助記詞可能看起來像這樣:

abandon ability able about above absent absorb abstract absurd abuse access accident

它總是12或24個常見英文單詞,來自2,048個單詞的標準化列表(BIP-39單詞列表)。如果您發現一張寫有12或24個隨機英文單詞的紙條,它幾乎可以肯定是助記詞。

常見藏匿地點

  • 實體保險箱或防火箱:最明顯也最常見的位置
  • 銀行保管箱:提供防火/防洪保護,但需要遺產訪問權
  • 寫在筆記本或日記中:有時偽裝為隨機筆記或混在其他文字中
  • 書本內:寫在封面內頁、夾在書頁之間的紙條上或頁邊空白處
  • 用膠帶貼在家具或相框後面:一種「隱藏在顯眼處」的方法
  • 金屬助記詞備份:刻在金屬板上(品牌包括 Cryptosteel、Billfodl、Hodlr)—— 防火防水
  • 密碼管理器:作為安全筆記存儲在 1Password、LastPass、Bitwarden 或 KeePass 中
  • 電腦/雲端的加密文件:加密容器中的文本文件(VeraCrypt、加密ZIP)
  • 分散在多個位置:一些注重安全的持有者將助記詞分散到2-3個位置
  • 交給律師或受信任的朋友:交給第三方保管,有時放在密封信封中
如果找到助記詞:請極度小心處理。任何看到這些單詞的人都可以竊取錢包中的所有加密貨幣。不要用連接互聯網的手機拍照。不要將其輸入任何網站。不要與任何人分享,除了經過驗證的受信任專業人士。僅在硬件錢包或離線電腦上恢復。

8. 軟件錢包和瀏覽器擴展

許多加密貨幣用戶將資產存儲在手機或電腦上的軟件錢包中,或瀏覽器擴展中。如果您能解鎖設備,就可以訪問這些。

常見軟件錢包

  • MetaMask:最流行的以太坊錢包。以瀏覽器擴展(Chrome、Firefox、Brave)和手機應用形式提供。需要密碼解鎖。
  • Trust Wallet:支持多個區塊鏈的流行手機錢包。需要密碼才能打開。
  • Exodus:桌面和手機錢包,界面友好。備份助記詞可在設定中訪問。
  • Electrum:流行的僅比特幣桌面錢包。助記詞在初始設定時顯示。
  • Phantom:流行的 Solana 錢包,也是瀏覽器擴展。結構類似 MetaMask。

如果您能訪問設備

  1. 打開錢包應用或瀏覽器擴展
  2. 如果需要密碼,檢查已故者的密碼管理器或常見密碼模式
  3. 打開後,導航到設定並查找「備份」、「恢復短語」或「助記詞」選項
  4. 在紙上記下助記詞 —— 不要以數碼方式存儲
  5. 檢查錢包中的所有帳戶和餘額
  6. 將資產轉移到您控制的錢包(最好是硬件錢包)

如果無法訪問設備

如果手機或電腦被鎖定且您不知道密碼:

  • 對於 iPhone:Apple 可以通過有效的法庭命令提供 iCloud 數據訪問,但他們無法解鎖實體設備。法證數據恢復服務可能能夠幫助。
  • 對於 Android:三星和其他製造商通常無法解鎖設備。法證服務是您的最佳選擇。
  • 對於電腦:專業數據恢復服務可能能夠訪問硬碟並提取錢包文件。

9. 遺失加密貨幣的真實案例

這些真實案例說明了問題的規模和不同的結果:

James Howells:垃圾填埋場的比特幣(8,000 BTC)

2013年,威爾斯IT工程師 James Howells 意外丟棄了包含8,000枚比特幣私鑰的筆記本電腦硬碟。硬碟最終落入威爾斯紐波特的 Docksway 垃圾填埋場。到2025年2月,這些比特幣價值約7.51億美元

Howells 花了12年試圖獲得挖掘填埋場的許可。他組建了專家團隊並獲得了私人資金。紐波特市議會多次拒絕,理由是環境危害。2024年12月,Howells 起訴議會索賠。高等法院在2025年1月駁回其訴訟。2025年2月,Howells 提出購買整個填埋場。

教訓:包含私鑰的物理硬件必須視為不可替代。助記詞備份本可以防止整個情況發生。

Stefan Thomas:被鎖的 IronKey(7,002 BTC)

德國出生的程序員 Stefan Thomas 將7,002枚比特幣存儲在 IronKey 加密USB驅動器上,然後遺失了密碼。IronKey 只允許10次密碼嘗試,之後永久銷毀內容。Thomas 已使用了8次嘗試,僅剩2次機會。按目前價格,錢包包含超過7億美元

網絡安全公司 Unciphered 據報發現了一種方法,可以在不觸發自毀機制的情況下解鎖 IronKey 設備。他們聯繫了 Thomas,但他拒絕了,理由是與其他兩個團隊有先前協議。截至2025年底,IronKey 仍被鎖在瑞士金庫中。

教訓:永遠不要將大量加密貨幣存儲在單一故障點之後。使用與設備分開存儲的助記詞備份。

香港背景:香港加密貨幣採用率迅速增長,在全球加密貨幣擁有率中排名前十。擁有兩家證監會持牌交易所(HashKey 和 OSL)以及廣泛使用海外平台,香港已故者擁有加密貨幣資產的可能性很大 —— 特別是在2019年後移民的年輕人群中。

10. 專業追回服務:正規 vs. 詐騙

加密貨幣追回行業充斥著欺詐。2023年2月至2024年2月期間,被虛假「追回」公司利用的加密貨幣騙局受害者報告的損失超過990萬美元 —— 他們在試圖從第一次騙局中恢復時再次被騙。2024年,整體加密貨幣騙局造成93億美元的損失,比前一年增長66%。

危險信號:詐騙追回服務的跡象

要求預付款項

正規服務按成功收費(只有在追回東西時才收費)或收取適度的診斷費用。任何在做任何事之前就要求數千美元預付款的服務幾乎可以肯定是詐騙。

保證100%追回

沒有誠實的專業人士會保證完全追回。區塊鏈技術使得在沒有私鑰的情況下不可能保證追回。任何承諾保證結果的人都在說謊。

聲稱對區塊鏈有「特殊訪問權」

沒有人對區塊鏈有特殊訪問權。它在設計上是去中心化的。聲稱能「道德黑客入侵」區塊鏈或在 Binance 有「聯繫人可以逆轉交易」都是欺詐。

主動聯繫您

騙子會主動搜索社交媒體和論壇,尋找發布加密貨幣遺失信息的人。如果有人主動聯繫您提供追回服務 —— 特別是通過 Telegram、WhatsApp 或社交媒體私訊 —— 這就是詐騙。總是如此。

正規追回服務的跡象

可驗證的商業身份

他們有註冊公司、實際地址、專業網站,以及可驗證的團隊成員(有真實的 LinkedIn 個人資料和專業歷史)。

對局限性坦誠

他們會預先告訴您案件是否可能無法追回。他們會解釋能做和不能做的事情,以及成功的概率。

通過法律渠道工作

他們與執法機構、法院和交易所通過適當的法律渠道合作。他們可能要求您提供遺囑認證文件。

透明的收費結構

他們清楚說明費用 —— 通常是追回資產的百分比(10-30%)或固定的診斷費加成功費。

12. 預防:加密貨幣持有者現在應該做什麼

如果您持有加密貨幣,現在就採取以下步驟,防止您的家人面臨本指南中描述的挑戰:

在紙上寫下您的助記詞(不是以數碼方式),存放在防火保險箱或銀行保管箱中。
考慮金屬助記詞備份(Cryptosteel、Billfodl等)以防火防洪。
創建清單列出所有交易所、錢包和大致持倉。將其與遺囑一起存放或在密封信封中交給律師。
在遺囑中包含加密貨幣。明確提及數碼資產,指定誰應該接收它們以及在哪裡找到訪問憑證。
告訴至少一位受信任的人您擁有加密貨幣以及在哪裡找到助記詞/憑證 —— 不是具體內容,而是位置。
使用密碼管理器並確保您信任的人擁有主密碼或可以通過您的遺產訪問它。
考慮多重簽名錢包,需要3把密鑰中的2把才能交易,將密鑰分散在家庭成員或受信任的各方之間。
定期審查和更新。加密貨幣持倉會變化。至少每年審查您的清單和訪問說明。
總結:絕大多數「遺失」的加密貨幣並非因為技術問題而遺失 —— 而是因為持有人未將訪問信息傳達給任何人。今天花幾分鐘規劃,就可以防止您家人永久失去可能改變人生的財富。

CONCEPT ONLY僅為概念

AssetCadet Is a Service ConceptAssetCadet 是一個服務概念

AssetCadet is not an operating service. This guide is published for free as a public resource. If you are interested in building this service together, contact Mr Ko.AssetCadet 並非營運中的服務。本指南作為公共資源免費發佈。如果您有興趣一起打造此服務,請聯絡高先生。

Contact Mr Ko on WhatsAppWhatsApp 聯絡高先生