How to Find and Recover Lost Cryptocurrency After Someone Dies
如何在親人去世後尋找和追回加密貨幣
An estimated 3.8 million Bitcoin — worth over US$400 billion — are permanently lost, many belonging to owners who died without sharing their wallet credentials. This guide walks families through the practical steps of determining whether a deceased person held cryptocurrency, how to recover it from exchanges and wallets, and how to avoid the scammers who prey on grieving families.
估計有380萬枚比特幣 —— 價值超過4,000億美元 —— 已永久遺失,其中許多屬於在未分享錢包憑證的情況下去世的持有人。本指南引導家庭逐步確定已故人士是否持有加密貨幣、如何從交易所和錢包中追回,以及如何避免針對悲痛家庭的騙局。
Table of Contents
- The Scale of Lost Crypto: Billions Locked Away Forever
- Crypto Basics for Non-Crypto People
- Warning Signs That Crypto Exists
- Step-by-Step Search: Finding Hidden Crypto
- Exchange Recovery: Platform-by-Platform Guide
- Hardware Wallets: What to Do If You Find One
- Seed Phrases: Where People Hide Them
- Software Wallets and Browser Extensions
- Real Examples of Lost Crypto Fortunes
- Professional Recovery Services: Legitimate vs. Scams
- Legal Considerations for Crypto Inheritance
- Prevention: What Crypto Holders Should Do Now
1. The Scale of Lost Crypto: Billions Locked Away Forever
The numbers are staggering. Of the approximately 19.8 million Bitcoin that have been mined to date (out of a maximum supply of 21 million), analysts estimate that between 3.8 and 4 million BTC are permanently lost — roughly 18-20% of all Bitcoin ever created. A 2024 River Financial analysis put the figure at 3.8 million BTC, much of it tied to long-dormant addresses that have not moved coins in over a decade.
At current prices, these lost Bitcoin alone represent over US$400 billion in inaccessible wealth. And that figure only accounts for Bitcoin — the equivalent losses in Ethereum, other altcoins, and tokens on various blockchains push the total much higher.
Why Crypto Gets Lost
Cryptocurrency is fundamentally different from traditional financial assets. There is no bank to call, no customer service hotline, and no "forgot my password" button. The reasons crypto becomes permanently inaccessible include:
- Lost private keys or seed phrases: The most common cause. Without the private key or the 12/24-word seed phrase, the crypto is mathematically impossible to access.
- Death of the owner: If the owner dies without sharing their wallet credentials, the crypto may be lost forever — unless someone can locate the keys.
- Forgotten exchange accounts: Early adopters who bought Bitcoin on now-defunct exchanges, or who forgot they had small amounts on various platforms.
- Hardware failure: Hard drives crashing, USB drives corrupting, or phones being destroyed without backup.
- Deliberate long-term storage: Some early Bitcoin miners stored coins and never returned to them — the Satoshi Nakamoto wallet alone is believed to contain approximately 1 million BTC that has never moved.
2. Crypto Basics for Non-Crypto People
If you are not familiar with cryptocurrency, understanding a few key concepts will help you navigate the recovery process:
Key Terminology
| Term | What It Means | Why It Matters for Recovery |
|---|---|---|
| Wallet | Software or hardware that stores private keys and allows sending/receiving crypto | Finding the wallet is the first step to recovery |
| Private Key | A long string of characters (like a password) that proves ownership and allows transfers | Without this, the crypto is inaccessible |
| Seed Phrase | 12 or 24 random English words that can regenerate all private keys in a wallet | This is the master backup — finding it recovers everything |
| Exchange | A company (like Coinbase or Binance) where people buy/sell/store crypto | Exchanges have customer service and can transfer assets to heirs with proper documentation |
| Hardware Wallet | A physical USB-like device (Ledger, Trezor) that stores private keys offline | Requires a PIN to access — but the seed phrase can bypass it |
| Blockchain | The public ledger recording all transactions — viewable by anyone | If you have a wallet address, you can see the balance (but not move it without keys) |
Two Types of Crypto Storage
Understanding the difference is critical for recovery:
Custodial (Exchange)
Recoverable with legal documents. The exchange holds the private keys on the user's behalf. Like a bank, the exchange can transfer assets to an estate executor with proper probate documentation. This is the easier path to recovery.
Self-Custody (Wallet)
Requires the private key or seed phrase. The user controls the keys directly. No company can help recover access. If the key is lost, the crypto is gone. This is the harder path — and often impossible without the seed phrase.
3. Warning Signs That Crypto Exists
Many families have no idea their loved one owned cryptocurrency. Here are the telltale signs to look for:
On Their Phone or Computer
- Exchange apps: Look for Coinbase, Binance, Crypto.com, Kraken, OKX, Bybit, HashKey (popular in HK), OSL, Gemini, or any app with "crypto," "coin," or "wallet" in the name
- Wallet apps: MetaMask, Trust Wallet, Coinbase Wallet, Exodus, Electrum, BlueWallet, Phantom, or Ledger Live
- Two-factor authentication (2FA) apps: Google Authenticator or Authy — check for entries linked to exchanges
- Browser bookmarks: Bookmarks for exchange websites, blockchain explorers (etherscan.io, blockchain.com), or DeFi platforms
- Browser extensions: MetaMask (fox icon), Phantom (ghost icon), or other wallet extensions in Chrome/Firefox
In Their Email
- Account registration confirmations from any exchange
- Transaction confirmation emails (deposits, withdrawals, trades)
- KYC (Know Your Customer) verification emails
- Tax reporting documents from exchanges
- Marketing emails from crypto platforms
In Their Financial Records
- Bank transfers to crypto exchanges (look for transfers to "Coinbase," "Binance," "Crypto.com," or similar)
- Credit card charges from crypto exchanges
- Debit card transactions from crypto cards (Crypto.com Visa, Coinbase Card)
- Entries on tax returns related to cryptocurrency gains or losses
Physical Items
- Hardware wallets: Small USB-like devices branded Ledger (looks like a small USB stick or credit card), Trezor (small device with a screen), or similar
- Metal seed phrase plates: Metal cards or plates with 12 or 24 words stamped into them (fire/water resistant backup)
- Paper notes: Handwritten 12 or 24 English words — these are almost certainly a seed phrase
- QR codes: Printed QR codes could be wallet addresses or private keys
- USB drives: May contain wallet files or key backups
4. Step-by-Step Search: Finding Hidden Crypto
Follow this systematic approach to maximize your chances of finding cryptocurrency:
Secure All Devices Immediately
Before anything else, secure the deceased person's phone, computer, tablets, and any USB devices. Do not reset or wipe any device. Keep phones charged. If you know the phone's passcode, unlock it and disable auto-lock. If the phone uses Face ID or Touch ID, be aware that biometric unlock typically stops working after 48 hours without use or after the device is restarted.
Search Email Accounts
Search for keywords: "Bitcoin," "crypto," "Coinbase," "Binance," "wallet," "blockchain," "Ethereum," "deposit address," "withdrawal confirmation," "your account," and the names of any major exchanges. Go back at least 10 years in the search — early Bitcoin purchases from 2013-2017 could be worth enormous sums today.
Check Phone Apps
Open the phone's app library and look for any crypto-related apps. Also check the app store's download history (Settings > Apple ID > Purchase History on iPhone, or Google Play > My Apps on Android) for previously installed apps that may have been deleted.
Search Browser History and Bookmarks
Check Chrome, Safari, Firefox, and Brave browsers for bookmarks, history, and saved passwords related to crypto exchanges or wallets. Check the browser's password manager for saved login credentials.
Check Cloud Storage
Search iCloud, Google Drive, Dropbox, and OneDrive for files containing seed phrases, private keys, or wallet backups. Look for encrypted files, password-protected ZIP/RAR archives, or files with names like "wallet," "seed," "backup," or "keys."
Check Password Managers
If the deceased used a password manager (1Password, LastPass, Bitwarden, KeePass, Apple Keychain), access it and search for exchange logins, wallet passwords, seed phrases, or private keys stored as secure notes.
Search Physical Locations
Check safe deposit boxes, home safes, filing cabinets, desk drawers, and any secure storage. Look for hardware wallets, paper notes with 12/24 words, metal backup plates, USB drives, or printed QR codes.
Review Bank Statements
Go through 2-3 years of bank statements looking for transfers to known crypto exchanges. Even small transfers (HK$1,000-5,000) could indicate an exchange account that may now hold significantly more value.
5. Exchange Recovery: Platform-by-Platform Guide
If the deceased held crypto on an exchange (custodial account), you can recover it through the exchange's estate or inheritance process. Every major exchange has one, though the processes vary significantly.
General Requirements
Almost all exchanges require the following documents from the estate executor or administrator:
Exchange-Specific Processes
Coinbase (Global)
Coinbase has one of the more transparent processes. Submit a request through their "Claim a Decedent's Account" support page. You will need Letters Testamentary, Letters of Administration, or a Small Estate Affidavit (depending on your jurisdiction), plus government-issued ID. Coinbase does not charge fees for estate transfers. The process typically takes 4-8 weeks.
Binance (Global)
Binance handles deceased account requests on a case-by-case basis. They explicitly require certified copies of court documents authorising access or distribution of assets. Contact Binance support and request the "deceased user account" process. Be prepared for a lengthy process — Binance's support can be slower than Coinbase's, and they may require additional documentation including an affidavit from the estate executor.
Crypto.com (Global, HQ in Singapore)
Contact Crypto.com support and reference "deceased account holder." They will guide you through their process, which typically requires probate documents, death certificate, and executor identification. The Crypto.com Visa card account will also need to be closed separately.
HashKey Exchange (Hong Kong)
HashKey is one of only two licensed virtual asset trading platforms in Hong Kong (licensed by the SFC). For deceased account recovery, contact their customer service team at support@hashkey.com. As an SFC-regulated entity, they follow structured processes similar to traditional financial institutions. You will need a Grant of Probate or Letters of Administration issued by the Hong Kong High Court.
OSL (Hong Kong)
OSL is the other SFC-licensed exchange in Hong Kong. Their estate process follows standard Hong Kong probate procedures. Contact them directly for their specific documentation requirements.
Kraken (Global)
Kraken has a dedicated "deceased client" support process. Email support@kraken.com with the subject line "Deceased Client" and they will provide specific instructions. They require standard probate documentation and typically process within 30-60 days.
6. Hardware Wallets: What to Do If You Find One
Finding a hardware wallet (Ledger, Trezor, or similar device) among the deceased's belongings is a promising sign — it means they likely had significant crypto holdings worth protecting with a dedicated security device.
Ledger (Nano S, Nano X, Stax)
Ledger devices require a 4-8 digit PIN to unlock. If you enter the wrong PIN three times, the device resets and wipes all data. Do not guess the PIN unless you are very confident. Instead:
- Search for the seed phrase (24 words). With the seed phrase, you can restore the wallet on a new Ledger device or any compatible wallet.
- The seed phrase may have been written on the "Recovery Sheet" card that comes in the Ledger box — a folded card with blank lines for 24 words.
- If you find the seed phrase, download Ledger Live (ledger.com/start), get a new Ledger device, and restore using the seed phrase.
- If you know the PIN, connect the device to a computer with Ledger Live installed, enter the PIN, and you can view all accounts and balances.
Trezor (Model One, Model T, Safe 3, Safe 5)
Trezor devices have a wipe function after 16 incorrect PIN attempts. Similar to Ledger:
- Search for the seed phrase (12 or 24 words depending on the model). With it, you can restore to a new Trezor or compatible wallet.
- If you know the PIN, connect to a computer and use the Trezor Suite software (trezor.io/trezor-suite) to access the wallet.
- Trezor also supports a "passphrase" feature — an optional extra word added to the seed phrase. If the deceased used a passphrase, you need both the seed phrase AND the passphrase.
7. Seed Phrases: Where People Hide Them
The seed phrase (also called recovery phrase or mnemonic phrase) is the single most important piece of information for crypto recovery. It is a list of 12 or 24 ordinary English words that, when entered in the correct order, can regenerate all the private keys in a wallet.
What a Seed Phrase Looks Like
A typical seed phrase might look like this:
abandon ability able about above absent absorb abstract absurd abuse access accident
It is always 12 or 24 common English words, drawn from a standardised list of 2,048 words (the BIP-39 word list). If you find a note with 12 or 24 random English words, it is almost certainly a seed phrase.
Common Hiding Places
Based on our experience and reports from recovery professionals, here are the most common places people store seed phrases:
- Physical safe or fireproof box: The most obvious and most common location
- Safe deposit box at a bank: Offers fire/flood protection but requires estate access
- Written in a notebook or journal: Sometimes disguised as random notes or mixed in with other writing
- Inside a book: Written on the inside cover, on a slip of paper tucked between pages, or in the margins
- Taped behind furniture or picture frames: A "hide in plain sight" approach
- Metal seed phrase backup: Stamped or engraved on metal plates (brands include Cryptosteel, Billfodl, Hodlr) — fireproof and waterproof
- Password manager: Stored as a secure note in 1Password, LastPass, Bitwarden, or KeePass
- Encrypted file on computer/cloud: A text file inside an encrypted container (VeraCrypt, encrypted ZIP)
- Split across locations: Some security-conscious holders split their seed phrase across 2-3 locations (e.g., words 1-8 in one place, words 9-16 in another, words 17-24 in a third)
- With a lawyer or trusted friend: Given to a third party for safekeeping, sometimes in a sealed envelope
8. Software Wallets and Browser Extensions
Many crypto users store their assets in software wallets on their phone or computer, or in browser extensions. These are accessible if you can unlock the device.
Common Software Wallets
- MetaMask: The most popular Ethereum wallet. Available as a browser extension (Chrome, Firefox, Brave) and mobile app. Requires a password to unlock. The seed phrase can be found in Settings > Security & Privacy > Reveal Secret Recovery Phrase (requires the wallet password).
- Trust Wallet: Popular mobile wallet supporting multiple blockchains. Requires a passcode to open.
- Exodus: Desktop and mobile wallet with a user-friendly interface. Backup seed phrase accessible in settings.
- Electrum: Popular Bitcoin-only desktop wallet. The seed phrase is shown during initial setup and can be accessed from the wallet file.
- Phantom: Popular Solana wallet, also a browser extension. Similar structure to MetaMask.
If You Can Access the Device
- Open the wallet app or browser extension
- If it requires a password, check the deceased's password manager or common password patterns
- Once open, navigate to settings and look for "backup," "recovery phrase," or "seed phrase" options
- Write down the seed phrase on paper — do not store it digitally
- Check all accounts and balances within the wallet
- Transfer assets to a wallet you control (preferably a hardware wallet)
If You Cannot Access the Device
If the phone or computer is locked and you do not know the password:
- For iPhones: Apple can provide access to iCloud data with a valid court order, but they cannot unlock the physical device. A forensic data recovery service may be able to help.
- For Android: Samsung and other manufacturers typically cannot unlock devices. Forensic services are your best option.
- For computers: A professional data recovery service may be able to access the hard drive and extract wallet files, which can then be used with the wallet password.
9. Real Examples of Lost Crypto Fortunes
These real-world cases illustrate both the scale of the problem and the range of outcomes:
James Howells: The Landfill Bitcoin (8,000 BTC)
In 2013, Welsh IT engineer James Howells accidentally threw away a laptop hard drive containing the private key to 8,000 Bitcoin. The drive ended up in the Docksway landfill in Newport, Wales. By February 2025, those Bitcoin were worth approximately US$751 million.
Howells spent 12 years trying to get permission to excavate the landfill. He assembled a team of specialists and secured private funding for the dig. Newport City Council repeatedly refused, citing environmental hazards including dangerous gases, methane, asbestos, and toxic leachate. In December 2024, Howells sued the council for damages. The High Court dismissed his claim in January 2025, ruling it had no prospect of success. In February 2025, Howells offered to buy the entire landfill site.
Lesson: Physical hardware containing private keys must be treated as irreplaceable. A seed phrase backup would have prevented this entire situation.
Stefan Thomas: The Locked IronKey (7,002 BTC)
German-born programmer Stefan Thomas stored 7,002 Bitcoin on an IronKey encrypted USB drive and lost the password. The IronKey allows only 10 password attempts before permanently destroying its contents. Thomas has used 8 of his 10 attempts, leaving just 2 tries remaining. At current prices, the wallet contains over US$700 million.
Cybersecurity firm Unciphered reportedly discovered a method to unlock IronKey devices using a process involving 200 trillion simulated password attempts without triggering the self-destruct mechanism. They approached Thomas, but he declined, citing a prior agreement with two other recovery teams. As of late 2025, the IronKey remains locked in a Swiss vault.
Lesson: Never store large amounts of crypto behind a single point of failure. Use a seed phrase backup stored separately from the device.
QuadrigaCX: The Exchange That Died With Its Founder
In December 2018, Gerald Cotten, the 30-year-old CEO of Canadian crypto exchange QuadrigaCX, died while traveling in India. Cotten was reportedly the only person who held the passwords to the exchange's cold storage wallets containing approximately C$250 million (US$190 million) in customer funds. The exchange filed for bankruptcy in January 2019, and a court-appointed monitor found that most of the crypto had actually been misappropriated by Cotten during his lifetime.
Lesson: Storing crypto on an exchange is not risk-free, but exchanges with proper governance have estate recovery processes. Single-person-controlled wallets are the highest risk.
10. Professional Recovery Services: Legitimate vs. Scams
The crypto recovery industry is rife with fraud. Between February 2023 and February 2024, cryptocurrency scam victims exploited by fictitious "recovery" firms reported losses totalling over US$9.9 million — they were scammed a second time while trying to recover from the first scam. In 2024, overall crypto scams led to US$9.3 billion in losses, a 66% increase from the previous year.
Red Flags: Signs of a Scam Recovery Service
Demands Upfront Payment
Legitimate services work on a contingency basis (they get paid only if they recover something) or charge modest diagnostic fees. Any service demanding thousands of dollars upfront before doing anything is almost certainly a scam.
Guarantees 100% Recovery
No honest professional will guarantee full recovery. Blockchain technology makes it mathematically impossible to guarantee recovery without the private key. Anyone who promises guaranteed results is lying.
Claims "Special Access" to Blockchain
Nobody has special access to the blockchain. It is decentralised by design. Claims of "ethical hacking" into the blockchain, or having "contacts at Binance who can reverse transactions," are fraudulent.
Contacts You First
Scammers actively search social media and forums for people posting about lost crypto. If someone contacts you unsolicited offering recovery services — especially via Telegram, WhatsApp, or social media DMs — it is a scam. Always.
Signs of a Legitimate Recovery Service
Verifiable Business Identity
They have a registered company, physical address, professional website, and verifiable team members with real LinkedIn profiles and professional histories.
Honest About Limitations
They will tell you upfront if your case is likely unrecoverable. They will explain what they can and cannot do, and the probability of success.
Works Through Legal Channels
They work with law enforcement, courts, and exchanges through proper legal channels. They may require you to provide probate documentation.
Transparent Fee Structure
They clearly state their fees — typically a percentage of recovered assets (10-30%) or a fixed diagnostic fee plus success fee.
What Legitimate Recovery Can Actually Do
- Brute-force password cracking: If you have a wallet file but forgot the password, specialised hardware can attempt billions of password combinations. Success depends on password complexity.
- Partial seed phrase recovery: If you have most of a seed phrase but are missing 1-3 words, software can calculate the missing words from the known ones.
- Hardware wallet data extraction: In some cases, specialists can extract data from damaged hardware wallets without triggering the wipe mechanism.
- Exchange liaison: Professional estate administrators can navigate the exchange inheritance process on your behalf.
- Blockchain analysis: Tracing the flow of funds to identify which exchanges or wallets hold the assets.
11. Legal Considerations for Crypto Inheritance
Hong Kong Law
In Hong Kong, cryptocurrency is treated as property under common law principles. It forms part of the deceased's estate and is subject to the same succession rules as any other asset. The executor or administrator named in the Grant of Probate or Letters of Administration has the authority to deal with the deceased's crypto assets.
However, Hong Kong law is still developing in this area. There is no specific legislation governing crypto inheritance, so general principles of property law and trust law apply.
Cross-Border Complications
Crypto creates unique cross-border challenges:
- The exchange may be based in a different jurisdiction from the deceased's country of residence or domicile
- Different countries may have conflicting claims to tax the same crypto assets
- Some exchanges require local (same-country) probate documents and may not accept foreign grants
- Self-custodied crypto is "borderless" — it exists on the blockchain and is not located in any specific country, which creates legal ambiguity
Tax Implications
In Hong Kong, there is currently no capital gains tax on cryptocurrency. However, if the beneficiary resides in another jurisdiction (UK, US, Australia, Canada), the receipt of inherited crypto may trigger tax obligations in that country. Always consult a tax professional in the beneficiary's country of residence.
12. Prevention: What Crypto Holders Should Do Now
If you hold cryptocurrency, take these steps now to prevent your family from facing the challenges described in this guide:
目錄
1. 遺失加密貨幣的規模:數十億永久鎖定
數字令人震驚。在迄今已開採的約1,980萬枚比特幣中(最大供應量為2,100萬枚),分析師估計有380萬至400萬枚BTC已永久遺失 —— 約佔所有已創建比特幣的18-20%。2024年River Financial的分析將數字定為380萬枚BTC,其中大部分與超過十年未移動過代幣的長期休眠地址相關。
按目前價格計算,僅這些遺失的比特幣就代表超過4,000億美元的無法訪問財富。而這個數字只計算了比特幣 —— 以太坊、其他山寨幣和各種區塊鏈上代幣的等值損失使總額更高。
加密貨幣為何遺失
加密貨幣與傳統金融資產有根本性的不同。沒有銀行可以打電話,沒有客戶服務熱線,也沒有「忘記密碼」按鈕。加密貨幣永久無法訪問的原因包括:
- 遺失私鑰或助記詞:最常見的原因。沒有私鑰或12/24個單詞的助記詞,加密貨幣在數學上不可能被訪問。
- 持有人死亡:如果持有人在未分享錢包憑證的情況下去世,加密貨幣可能永遠遺失 —— 除非有人能找到密鑰。
- 忘記的交易所帳戶:早期採用者在現已關閉的交易所購買比特幣,或忘記在各平台上有小額存款。
- 硬件故障:硬碟損壞、USB驅動器損壞或手機被銷毀且無備份。
- 故意長期存儲:一些早期比特幣礦工存儲代幣後再未回來 —— 僅中本聰的錢包就被認為包含約100萬枚從未移動過的BTC。
2. 非加密貨幣用戶的基礎知識
如果您不熟悉加密貨幣,了解幾個關鍵概念將有助於您進行追回程序:
關鍵術語
| 術語 | 含義 | 對追回的重要性 |
|---|---|---|
| 錢包 | 存儲私鑰並允許發送/接收加密貨幣的軟件或硬件 | 找到錢包是追回的第一步 |
| 私鑰 | 一長串字符(如密碼),證明所有權並允許轉帳 | 沒有它,加密貨幣無法訪問 |
| 助記詞 | 12或24個隨機英文單詞,可重新生成錢包中的所有私鑰 | 這是主備份 —— 找到它就能恢復一切 |
| 交易所 | 人們買賣/存儲加密貨幣的公司(如Coinbase或Binance) | 交易所有客服,可以在提供適當文件後將資產轉移給繼承人 |
| 硬件錢包 | 類似USB的實體設備(Ledger、Trezor),離線存儲私鑰 | 需要PIN碼才能訪問 —— 但助記詞可以繞過它 |
| 區塊鏈 | 記錄所有交易的公共帳本 —— 任何人都可以查看 | 如果您有錢包地址,可以查看餘額(但沒有密鑰無法移動) |
兩種加密貨幣存儲方式
理解其區別對追回至關重要:
託管式(交易所)
可通過法律文件追回。交易所代表用戶持有私鑰。如同銀行一樣,交易所可以在提供適當遺囑認證文件後將資產轉移給遺產執行人。這是較容易的追回途徑。
自行保管(錢包)
需要私鑰或助記詞。用戶直接控制密鑰。沒有公司能幫助恢復訪問。如果密鑰遺失,加密貨幣就消失了。這是較困難的途徑 —— 沒有助記詞通常是不可能的。
3. 加密貨幣存在的警示信號
許多家庭不知道他們的親人擁有加密貨幣。以下是需要留意的跡象:
在手機或電腦上
- 交易所應用:查找 Coinbase、Binance、Crypto.com、Kraken、OKX、Bybit、HashKey(在港流行)、OSL、Gemini,或任何名稱中含「crypto」、「coin」或「wallet」的應用
- 錢包應用:MetaMask、Trust Wallet、Coinbase Wallet、Exodus、Electrum、BlueWallet、Phantom 或 Ledger Live
- 雙重驗證 (2FA) 應用:Google Authenticator 或 Authy —— 檢查是否有與交易所關聯的條目
- 瀏覽器書籤:交易所網站、區塊鏈瀏覽器(etherscan.io、blockchain.com)或 DeFi 平台的書籤
- 瀏覽器擴展:Chrome/Firefox 中的 MetaMask(狐狸圖標)、Phantom(幽靈圖標)或其他錢包擴展
在電郵中
- 任何交易所的帳戶註冊確認
- 交易確認電郵(存款、提款、交易)
- KYC(了解你的客戶)驗證電郵
- 交易所的稅務報告文件
- 加密貨幣平台的營銷電郵
在財務記錄中
- 銀行轉帳至加密貨幣交易所(查找轉至「Coinbase」、「Binance」、「Crypto.com」或類似機構的轉帳)
- 來自加密貨幣交易所的信用卡收費
- 加密貨幣卡的借記卡交易(Crypto.com Visa、Coinbase Card)
- 報稅表上與加密貨幣收益或虧損相關的條目
實物物品
- 硬件錢包:小型類似USB的設備,品牌為 Ledger(看起來像小型USB手指或信用卡)、Trezor(帶螢幕的小型設備)或類似產品
- 金屬助記詞板:上面刻有12或24個單詞的金屬卡或金屬板(防火/防水備份)
- 紙條:手寫的12或24個英文單詞 —— 這幾乎可以肯定是助記詞
- QR碼:打印的QR碼可能是錢包地址或私鑰
- USB驅動器:可能包含錢包文件或密鑰備份
4. 逐步搜索:尋找隱藏的加密貨幣
按照以下系統方法最大化找到加密貨幣的機會:
立即保護所有設備
在做任何事之前,保護已故者的手機、電腦、平板電腦和任何USB設備。不要重置或清除任何設備。保持手機充電。如果您知道手機密碼,請解鎖並禁用自動鎖定。如果手機使用 Face ID 或 Touch ID,請注意生物識別解鎖通常在48小時未使用或設備重啟後停止工作。
搜索電郵帳戶
搜索關鍵詞:「Bitcoin」、「crypto」、「Coinbase」、「Binance」、「wallet」、「blockchain」、「Ethereum」、「deposit address」、「withdrawal confirmation」、「your account」,以及任何主要交易所的名稱。搜索至少回溯10年 —— 2013-2017年的早期比特幣購買今天可能價值巨大。
檢查手機應用
打開手機的應用程式庫,查找任何與加密貨幣相關的應用。同時檢查應用商店的下載歷史記錄(iPhone:設定 > Apple ID > 購買記錄,Android:Google Play > 我的應用),查找可能已被刪除的先前安裝的應用。
搜索瀏覽器歷史和書籤
檢查 Chrome、Safari、Firefox 和 Brave 瀏覽器中與加密貨幣交易所或錢包相關的書籤、歷史記錄和已保存密碼。檢查瀏覽器的密碼管理器中是否有已保存的登入憑證。
檢查雲端存儲
搜索 iCloud、Google Drive、Dropbox 和 OneDrive 中包含助記詞、私鑰或錢包備份的文件。查找加密文件、密碼保護的 ZIP/RAR 檔案,或名稱包含「wallet」、「seed」、「backup」或「keys」的文件。
檢查密碼管理器
如果已故者使用密碼管理器(1Password、LastPass、Bitwarden、KeePass、Apple 鑰匙圈),訪問它並搜索交易所登入、錢包密碼、助記詞或作為安全筆記存儲的私鑰。
搜索實體位置
檢查保管箱、家用保險箱、文件櫃、書桌抽屜和任何安全存儲。查找硬件錢包、寫有12/24個單詞的紙條、金屬備份板、USB驅動器或打印的QR碼。
審查銀行對帳單
查看2-3年的銀行對帳單,尋找轉至已知加密貨幣交易所的轉帳。即使是小額轉帳(HK$1,000-5,000)也可能表明存在一個現在可能持有更高價值的交易所帳戶。
5. 交易所追回:逐個平台指南
如果已故者在交易所持有加密貨幣(託管帳戶),您可以通過交易所的遺產或繼承程序追回。每家主要交易所都有這樣的程序,儘管流程差異很大。
一般要求
幾乎所有交易所都要求遺產執行人或管理人提供以下文件:
各交易所具體流程
Coinbase(全球)
Coinbase 的流程相對透明。通過其「領取已故者帳戶」支援頁面提交申請。您需要遺囑認證書、遺產管理書或小額遺產宣誓書(取決於您的司法管轄區),加上政府簽發的身份證。Coinbase 不收取遺產轉移費用。流程通常需要4-8週。
Binance(全球)
Binance 按個案處理已故帳戶請求。他們明確要求經認證的法庭文件副本,授權訪問或分配資產。聯繫 Binance 客服並要求「已故用戶帳戶」流程。準備好漫長的過程 —— Binance 的客服可能比 Coinbase 慢,且可能要求額外文件。
HashKey Exchange(香港)
HashKey 是香港僅有的兩家持牌虛擬資產交易平台之一(由證監會發牌)。如需追回已故者帳戶,請聯繫其客服團隊 support@hashkey.com。作為證監會監管實體,他們遵循類似傳統金融機構的結構化流程。您將需要香港高等法院簽發的遺產承辦書或遺產管理書。
OSL(香港)
OSL 是香港另一家證監會持牌交易所。其遺產流程遵循標準的香港遺囑認證程序。直接聯繫他們了解具體文件要求。
6. 硬件錢包:發現後該怎麼做
在已故者的遺物中發現硬件錢包(Ledger、Trezor 或類似設備)是一個好跡象 —— 這意味著他們可能擁有足夠重要的加密貨幣持倉,值得用專用安全設備來保護。
Ledger(Nano S、Nano X、Stax)
Ledger 設備需要4-8位數的PIN碼才能解鎖。如果輸入錯誤PIN碼三次,設備會重置並擦除所有數據。除非非常有信心,否則不要猜測PIN碼。取而代之:
- 搜索助記詞(24個單詞)。有了助記詞,您可以在新的 Ledger 設備或任何兼容錢包上恢復。
- 助記詞可能寫在 Ledger 盒子裡附帶的「Recovery Sheet」卡上 —— 一張帶有24行空白的折疊卡。
- 如果找到助記詞,下載 Ledger Live(ledger.com/start),獲取新的 Ledger 設備,使用助記詞恢復。
- 如果知道PIN碼,將設備連接到安裝了 Ledger Live 的電腦,輸入PIN碼,即可查看所有帳戶和餘額。
Trezor(Model One、Model T、Safe 3、Safe 5)
Trezor 設備在16次錯誤PIN碼嘗試後會執行擦除功能。與 Ledger 類似:
- 搜索助記詞(根據型號為12或24個單詞)。有了它,您可以恢復到新的 Trezor 或兼容錢包。
- 如果知道PIN碼,連接到電腦並使用 Trezor Suite 軟件(trezor.io/trezor-suite)訪問錢包。
- Trezor 還支持「密碼短語」功能 —— 助記詞之外的可選額外詞語。如果已故者使用了密碼短語,您同時需要助記詞和密碼短語。
7. 助記詞:人們常藏在哪裡
助記詞(也稱為恢復短語或記憶短語)是加密貨幣追回中最重要的單一信息。它是一組12或24個普通英文單詞,按正確順序輸入可以重新生成錢包中的所有私鑰。
助記詞的外觀
典型的助記詞可能看起來像這樣:
abandon ability able about above absent absorb abstract absurd abuse access accident
它總是12或24個常見英文單詞,來自2,048個單詞的標準化列表(BIP-39單詞列表)。如果您發現一張寫有12或24個隨機英文單詞的紙條,它幾乎可以肯定是助記詞。
常見藏匿地點
- 實體保險箱或防火箱:最明顯也最常見的位置
- 銀行保管箱:提供防火/防洪保護,但需要遺產訪問權
- 寫在筆記本或日記中:有時偽裝為隨機筆記或混在其他文字中
- 書本內:寫在封面內頁、夾在書頁之間的紙條上或頁邊空白處
- 用膠帶貼在家具或相框後面:一種「隱藏在顯眼處」的方法
- 金屬助記詞備份:刻在金屬板上(品牌包括 Cryptosteel、Billfodl、Hodlr)—— 防火防水
- 密碼管理器:作為安全筆記存儲在 1Password、LastPass、Bitwarden 或 KeePass 中
- 電腦/雲端的加密文件:加密容器中的文本文件(VeraCrypt、加密ZIP)
- 分散在多個位置:一些注重安全的持有者將助記詞分散到2-3個位置
- 交給律師或受信任的朋友:交給第三方保管,有時放在密封信封中
8. 軟件錢包和瀏覽器擴展
許多加密貨幣用戶將資產存儲在手機或電腦上的軟件錢包中,或瀏覽器擴展中。如果您能解鎖設備,就可以訪問這些。
常見軟件錢包
- MetaMask:最流行的以太坊錢包。以瀏覽器擴展(Chrome、Firefox、Brave)和手機應用形式提供。需要密碼解鎖。
- Trust Wallet:支持多個區塊鏈的流行手機錢包。需要密碼才能打開。
- Exodus:桌面和手機錢包,界面友好。備份助記詞可在設定中訪問。
- Electrum:流行的僅比特幣桌面錢包。助記詞在初始設定時顯示。
- Phantom:流行的 Solana 錢包,也是瀏覽器擴展。結構類似 MetaMask。
如果您能訪問設備
- 打開錢包應用或瀏覽器擴展
- 如果需要密碼,檢查已故者的密碼管理器或常見密碼模式
- 打開後,導航到設定並查找「備份」、「恢復短語」或「助記詞」選項
- 在紙上記下助記詞 —— 不要以數碼方式存儲
- 檢查錢包中的所有帳戶和餘額
- 將資產轉移到您控制的錢包(最好是硬件錢包)
如果無法訪問設備
如果手機或電腦被鎖定且您不知道密碼:
- 對於 iPhone:Apple 可以通過有效的法庭命令提供 iCloud 數據訪問,但他們無法解鎖實體設備。法證數據恢復服務可能能夠幫助。
- 對於 Android:三星和其他製造商通常無法解鎖設備。法證服務是您的最佳選擇。
- 對於電腦:專業數據恢復服務可能能夠訪問硬碟並提取錢包文件。
9. 遺失加密貨幣的真實案例
這些真實案例說明了問題的規模和不同的結果:
James Howells:垃圾填埋場的比特幣(8,000 BTC)
2013年,威爾斯IT工程師 James Howells 意外丟棄了包含8,000枚比特幣私鑰的筆記本電腦硬碟。硬碟最終落入威爾斯紐波特的 Docksway 垃圾填埋場。到2025年2月,這些比特幣價值約7.51億美元。
Howells 花了12年試圖獲得挖掘填埋場的許可。他組建了專家團隊並獲得了私人資金。紐波特市議會多次拒絕,理由是環境危害。2024年12月,Howells 起訴議會索賠。高等法院在2025年1月駁回其訴訟。2025年2月,Howells 提出購買整個填埋場。
教訓:包含私鑰的物理硬件必須視為不可替代。助記詞備份本可以防止整個情況發生。
Stefan Thomas:被鎖的 IronKey(7,002 BTC)
德國出生的程序員 Stefan Thomas 將7,002枚比特幣存儲在 IronKey 加密USB驅動器上,然後遺失了密碼。IronKey 只允許10次密碼嘗試,之後永久銷毀內容。Thomas 已使用了8次嘗試,僅剩2次機會。按目前價格,錢包包含超過7億美元。
網絡安全公司 Unciphered 據報發現了一種方法,可以在不觸發自毀機制的情況下解鎖 IronKey 設備。他們聯繫了 Thomas,但他拒絕了,理由是與其他兩個團隊有先前協議。截至2025年底,IronKey 仍被鎖在瑞士金庫中。
教訓:永遠不要將大量加密貨幣存儲在單一故障點之後。使用與設備分開存儲的助記詞備份。
10. 專業追回服務:正規 vs. 詐騙
加密貨幣追回行業充斥著欺詐。2023年2月至2024年2月期間,被虛假「追回」公司利用的加密貨幣騙局受害者報告的損失超過990萬美元 —— 他們在試圖從第一次騙局中恢復時再次被騙。2024年,整體加密貨幣騙局造成93億美元的損失,比前一年增長66%。
危險信號:詐騙追回服務的跡象
要求預付款項
正規服務按成功收費(只有在追回東西時才收費)或收取適度的診斷費用。任何在做任何事之前就要求數千美元預付款的服務幾乎可以肯定是詐騙。
保證100%追回
沒有誠實的專業人士會保證完全追回。區塊鏈技術使得在沒有私鑰的情況下不可能保證追回。任何承諾保證結果的人都在說謊。
聲稱對區塊鏈有「特殊訪問權」
沒有人對區塊鏈有特殊訪問權。它在設計上是去中心化的。聲稱能「道德黑客入侵」區塊鏈或在 Binance 有「聯繫人可以逆轉交易」都是欺詐。
主動聯繫您
騙子會主動搜索社交媒體和論壇,尋找發布加密貨幣遺失信息的人。如果有人主動聯繫您提供追回服務 —— 特別是通過 Telegram、WhatsApp 或社交媒體私訊 —— 這就是詐騙。總是如此。
正規追回服務的跡象
可驗證的商業身份
他們有註冊公司、實際地址、專業網站,以及可驗證的團隊成員(有真實的 LinkedIn 個人資料和專業歷史)。
對局限性坦誠
他們會預先告訴您案件是否可能無法追回。他們會解釋能做和不能做的事情,以及成功的概率。
通過法律渠道工作
他們與執法機構、法院和交易所通過適當的法律渠道合作。他們可能要求您提供遺囑認證文件。
透明的收費結構
他們清楚說明費用 —— 通常是追回資產的百分比(10-30%)或固定的診斷費加成功費。
11. 加密貨幣繼承的法律考慮
香港法律
在香港,加密貨幣根據普通法原則被視為財產。它構成已故者遺產的一部分,受與任何其他資產相同的繼承規則約束。遺產承辦書或遺產管理書中指定的執行人或管理人有權處理已故者的加密貨幣資產。
然而,香港法律在這方面仍在發展中。沒有專門管理加密貨幣繼承的法例,因此適用一般的財產法和信託法原則。
跨境複雜性
- 交易所可能位於與已故者居住國或本籍國不同的司法管轄區
- 不同國家可能對同一加密貨幣資產有衝突的稅收主張
- 一些交易所要求當地(同國家)的遺囑認證文件,可能不接受外國承辦書
- 自行保管的加密貨幣是「無國界」的 —— 存在於區塊鏈上,不位於任何特定國家,這造成了法律模糊性
稅務影響
在香港,目前對加密貨幣沒有資本增值稅。但如果受益人居住在其他司法管轄區(英國、美國、澳洲、加拿大),接收繼承的加密貨幣可能會在該國觸發稅務義務。請務必諮詢受益人居住國的稅務專業人士。
12. 預防:加密貨幣持有者現在應該做什麼
如果您持有加密貨幣,現在就採取以下步驟,防止您的家人面臨本指南中描述的挑戰:
CONCEPT ONLY僅為概念
AssetCadet Is a Service ConceptAssetCadet 是一個服務概念
AssetCadet is not an operating service. This guide is published for free as a public resource. If you are interested in building this service together, contact Mr Ko.AssetCadet 並非營運中的服務。本指南作為公共資源免費發佈。如果您有興趣一起打造此服務,請聯絡高先生。
Contact Mr Ko on WhatsAppWhatsApp 聯絡高先生