I write educational content about Bitcoin.
Advanced/Tools > Danger Zone > Seed Functions > View Seed Words.The BIP39 passphrase
-
Classic entry: You enter the passphrase manually each time you use your hardware wallet, just as you do with other hardware wallets. COLDCARD Q simplifies this task with its full keyboard.
-
You can choose to encrypt your passphrase and store it on a microSD card. In this case, you'll need to insert the microSD into the COLDCARD Q each time you use it. Note that this microSD will only work on your COLDCARD Q and is not a backup. It is therefore very important that you also keep a copy of your passphrase on a physical medium, such as paper or metal.
Unlocking options
Trick PINs
Settings > Login Settings > Trick PINs menu.- "Brick Self: This action destroys both COLDCARD Q chips if the Trick PIN is entered, rendering the device totally unusable. It will then be impossible to resell, reuse or even return it to Coinkite. The device will become irretrievably obsolete. This feature can be used in the event of a robbery to convince an assailant that he will never be able to access your bitcoins. Please note: without a physical backup of your mnemonic phrase and any passphrase, your bitcoins will be permanently lost.
- "Wipe Seed": This menu offers several actions for deleting the seed, i.e. resetting the COLDCARD without destroying it. Unlike the "Brick Self" option, it will be possible to reconfigure the device using a backup of your mnemonic phrase. However, without this backup, your bitcoins will be lost. Here are the available options:
- "Wipe & Reboot : Removes the seed and reboots the COLDCARD without displaying any information on the screen.
- "Silent Wipe": Silently wipes the seed, and unlocks the COLDCARD on a random fake wallet as if nothing had happened.
- "Wipe -> Wallet": Removes the seed discreetly and unlocks the COLDCARD on a pre-configured secondary wallet, designed as a bait. This wallet may contain a small portion of your bitcoin savings to satisfy an attacker.
- "Say Wiped, Stop": Deletes the seed and displays the message
Seed is wiped, Stopon the screen.
- "Duress Wallet": With this action, the Trick PIN code unlocks a wallet derived from the seed using the BIP85. This secondary wallet can be used as bait to satisfy an attacker. The COLDCARD acts as if it were the real wallet, but without the master PIN (different from the Trick PIN), the attacker will never be able to access the real wallet. This strategy is designed to make people believe that the wallet linked to the Trick PIN is the only one in existence.
- "Login Countdown": This menu groups actions with a countdown before they are executed. Warning, some of them may destroy your device or result in the loss of your bitcoins. Here are the available sub-actions:
- "Wipe & Countdown : Clears the seed from the COLDCARD's memory, then starts a one-hour countdown. Without saving your mnemonic or passphrase, your bitcoins will be lost. This option is designed to fool an attacker into thinking that the device will unlock at the end of the countdown, when in fact it will be reset to factory settings.
- "Countdown & Brick": Starts a one-hour countdown, at the end of which the COLDCARD destroys its two secure chips, rendering it permanently unusable. Without backup, your bitcoins will be lost. This action is designed to fool an attacker, who thinks he's waiting for an unlock, when in fact the device will self-destruct.
- "Just Countdown : Triggers a simple one-hour countdown, after which the COLDCARD restarts without any further action. The seed is not deleted and the device remains intact. Be careful not to confuse this action with the "Login Countdown" option, discussed in the following sections, which adds a countdown to the main PIN while giving access to the real wallet.
- "Look Blank": This action makes the COLDCARD appear empty, giving the impression that the seed has been deleted. In reality, nothing happens and the seed remains intact. This simulates an unused or reset COLDCARD.
- "Just Reboot : When the Trick PIN is used, the COLDCARD simply reboots. No other action is performed.
- "Delta Mode": This complex action, reserved for experienced users, is designed to counter highly sophisticated duress attacks, whether from a state or a relative with privileged information. When Delta Mode is activated, COLDCARD provides access to the real wallet, enabling an attacker to navigate and verify that it is the correct wallet. However, transaction signatures are blocked, thus preventing any bitcoin transfer. In addition, access to the mnemonic phrase is disabled and any attempt to retrieve it will result in its deletion. To enhance credibility, the Trick PIN used with Delta Mode must share the same prefix as the real PIN (to display the same anti-phishing words), but the suffix must be different.
Scramble Keys
Settings > Login Settings > Scramble Keys.Login Countdown
Settings > Login Settings > Login Countdown.Calculator Login
Settings > Login Settings > Calculator Login.00-00 (this code is weak and only an example, so choose a strong PIN code), type 00-. COLDCARD will then display your two anti-phishing words.00 00.Cleanly destroying your COLDCARD
Advanced/Tools > Danger Zone > Seed Functions > Destroy Seed menu.- To avoid the risk of electric shock, remove the batteries from the device and unplug it from the mains before handling.
- Wait a few minutes after switching off the unit before starting drilling.
- Wear insulated gloves and safety goggles to ensure your safety.
Author
This tutorial has been written by Loïc Morel
You can say thanks by tipping the professor.
Credits
This tutorial has not been proofread yet
The original content has been translated by AI, but human review is necessary to ensure its accuracy.
3 520 sats1 760 sats880 satsEvery content on the platform is the result of a collaborative effort: each lesson, translation, and revision is made possible by the work of contributors. For this reason, we are always looking for proofreaders who can review our content in many languages. If you want to participate in the proofreading process, please reach out in our Telegram group and read our tutorial. We remind you that this content is open-source - licensed under CC BY-SA - so it can be freely shared and used, as long as the original source is credited.



