Aureo raises $1.1M USD pre-seed investment. Read full announcement
Aureo
Comparative Risk Analysis of Bitcoin Custody
Back to Learn Center
Bitcoin Basics

Comparative Risk Analysis of Bitcoin Custody

Aureo

By Aureo 21 January 20269 min read

How risky is it to lose my Bitcoin?

A custody risk taxonomy

Scope: This document focuses on custody risks (loss, theft, or loss of access to bitcoin). It does not cover price risk, taxes, or yield.

TL;DR

Bitcoin custody risks fall into two core categories: third-party risks (custody delegated to exchanges or custodians) and self-management risks (self-custody). Delegated custody exposes users to counterparty risks, including insolvency, hacks, and access restrictions due to compliance reviews or legal orders. Self-custody removes those counterparty risks, but introduces operational risks like losing backups, exposing keys, and user errors.

There is also a middle ground: collaborative custody (for example, assisted multisig or Multi Institution Custody), which aims to reduce third-party risk without forcing the user to handle all the complexity of advanced self-custody alone.

The best strategy depends on technical comfort, the amount being held, and individual risk tolerance.

Why it matters

  • Losing bitcoin due to poor custody is often permanent and irreversible, especially in self-custody or from sending errors.

  • Historically, exchange failures and operational breakdowns have led to major user losses, with recoveries that can take years and may be partial.

  • Understanding the risk landscape helps you choose the right custody setup and security level.

  • There is no universally best custody method. The right choice depends on your situation.

  • Practical Bitcoin security is proportional to the knowledge and diligence of the custodian, whether that is a third party or you.

Custody models

1) Delegated custody (exchanges and custodians)

In this model, the user deposits bitcoin with a platform that controls the private keys. The user sees an account balance, but does not control the assets directly on the blockchain.

Examples:

  • Centralized exchanges (Bitso, Binance, Coinbase)

  • Broker apps and fintechs that custody for the user

  • Institutional custodians

  • Yield or lending platforms

2) Self-custody

The user controls the private keys needed to move bitcoin. No third party can authorize transactions without the owner’s consent.

Implementations:

  • Software wallets (mobile, desktop)

  • Hardware wallets (Ledger, Trezor, BitBox)

  • Multisig setups

3) Collaborative custody (middle ground)

A model where the user retains part of the control, while authorization or operational resilience is distributed across independent parties, or an assisted setup.

Examples:

  • Assisted multisig (with a provider, without unilateral control)

  • Multi-Institution Custody (MIC) distributed across independent institutions

Delegated custody risks

1) Insolvency, bankruptcy, or mismanagement risk

Description: The exchange or custodian experiences financial or operational failure, resulting in frozen funds, withdrawal restrictions, or losses. This can happen due to fraud, poor controls, misuse of customer assets, leverage, or a mix of factors.

Historical cases (for reference):

  • Mt. Gox (2014): large reported BTC shortfall; legal processes can take years and recoveries are complex.

  • QuadrigaCX (2019): funds inaccessible or missing and significant customer losses.

  • FTX (2022): multi-billion customer deficits reported publicly, followed by a long restructuring process.

Likelihood: Varies by platform governance, controls, and transparency.
Impact: Potentially severe. Partial or zero recovery is possible, and timelines are often long.

Mitigation:

  • Prefer platforms with strong controls, reputation, and verifiable transparency

  • Avoid holding large balances long term in delegated custody

  • Diversify custodians if needed for operations

2) Hack or security compromise risk

Description: Attackers compromise the custodian’s systems and steal funds, or compromise user accounts through phishing, SIM swaps, malware, or social engineering.

Historical cases (for reference):

  • Bitfinex (2016): major BTC theft

  • Binance (2019): BTC theft incident

  • KuCoin (2020): large theft of assets

Likelihood: Medium. Attacks on platforms and users are common.
Impact: Varies. Some platforms reimburse or absorb losses, others do not.

Mitigation:

  • Enable strong security (robust 2FA, passkeys if available, withdrawal whitelists)

  • Avoid SMS as your only 2FA when possible

  • Keep only operational balances on platforms

  • Use unique credentials and a password manager

3) Regulatory and compliance risk

Description: Government actions or internal compliance policies can freeze, block, or limit access. This is not a Bitcoin protocol risk - it is an intermediary risk.

Common outcomes:

  • Court or administrative freezing orders

  • Restrictions tied to sanctions, risk lists, or KYC AML requirements

  • Regulatory changes or internal policies that limit deposits or withdrawals

Likelihood: Low in normal conditions; higher during disputes, compliance alerts, documentation issues, or high uncertainty periods.
Impact: Temporary or prolonged, depending on the case.

Mitigation:

  • Keep your KYC profile consistent and up to date

  • Avoid activity you cannot explain or document

  • Do not rely on a single custodian for significant holdings

4) Account lockout risk

Description: The exchange suspends access due to compliance reviews, unusual activity, documentation mismatches, or administrative errors.

Likelihood: Low for normal users, but not zero.
Impact: Usually temporary, but can require lengthy verification processes.

Mitigation:

  • Use platforms with strong support and clear processes

  • Keep records for source of funds when volume warrants it

  • Avoid making one account your single point of operational failure

Self-custody risks

1) Loss of backups (seed phrase)

Description: The user loses the 12 or 24 words required to restore access.

Likelihood: High without a real backup process.
Impact: Total and irreversible. Without the seed phrase, funds become permanently inaccessible.

Mitigation:

  • Multiple physical backups stored in separate locations

  • Durable materials (metal instead of paper for fire and water resistance)

  • Periodic checks that backups are legible and accessible

  • Avoid a single point of failure (one location only)

2) Seed phrase compromise (theft or exposure)

Description: A third party obtains the seed phrase through physical theft, phishing, malware, or social engineering.

Common attack paths:

  • Photos or digital notes containing the seed

  • Fake sites asking you to “verify” your seed

  • Fake “support” in social media or messaging apps

  • Physical theft of written backups

Likelihood: Depends on user habits.
Impact: Total. A compromised seed typically means full loss.

Mitigation:

  • Never share your seed phrase with anyone

  • Never type it into websites, chats, or forms

  • Restore only in trusted wallets and controlled environments

  • Store physical backups securely

3) Operational errors when sending or receiving

Description: The user makes a mistake during a transaction.

Common Bitcoin-specific mistakes:

  • Copy-paste the wrong address (including clipboard malware)

  • Send to the wrong address without verifying

  • Skip a test send when it is the first time to a new recipient

Likelihood: Low with careful verification, higher for beginners.
Impact: Often irreversible for the amount sent.

Mitigation:

  • Double or triple check the address and the network

  • Send a small test amount first

  • Use whitelists or saved contacts when available

  • Verify the first and last part of the address, not only the QR

4) Hardware failure without a backup

Description: A hardware wallet breaks, and the user does not have a seed phrase backup, or it is unreadable.

Likelihood: Very low with proper backups.
Impact: None if the seed is backed up. Total if it is not.

Comparative risk matrix

Note: High, medium, low is a practical guide. It depends on the custodian, the user, and the process.

Risk categoryDelegated custodySelf custody
Third-party insolvency or fraudHighNot applicable
Custodian platform hackMediumNot applicable
Account compromise (login or 2FA)MediumLow
Key compromise (seed or keys)LowHigh
Freezing due to compliance or legal ordersMediumLow
Loss of access due to user errorLowHigh
Sending or operational errorLowMedium
Operational complexityLowHigh
Withdrawal censorshipPossibleLow

A tiered custody strategy

A prudent approach segments your bitcoin by purpose and amount. The goal is to start simple and level up as the amount and your experience increase.

Level 1: Operational liquidity (delegated custody)

  • Suggested amount: only what you need short-term

  • Purpose: fiat conversion, immediate payments, day-to-day operations

  • Accepted risk: counterparty risk in exchange for convenience

Level 2: Active reserve (self-custody mobile wallet)

  • Suggested amount: about 1 to 3 months of spending

  • Purpose: frequent transfers and payments

  • Security: seed backed up offline and verified

Level 2.5: Middle ground (optional collaborative custody)

  • Suggested amount: when the balance justifies more resilience, but the user is not ready to operate advanced self-custody alone

  • Purpose: reduce counterparty risk without taking on full complexity

  • Security: distributed control, authorization policies, structured backups

Level 3: Long-term savings (hardware wallet or multisig)

  • Suggested amount: the majority of holdings

  • Purpose: long-term value preservation

  • Security: multiple backups, restore practice, and multisig when appropriate

Decision considerations

Factors that favor delegated custody:

  • Low technical comfort

  • Small balances

  • Frequent need for immediate liquidity

  • Low tolerance for operational complexity

Factors that favor self-custody:

  • Significant balances

  • Long investment horizon

  • Willingness to learn and follow processes

  • Concern about counterparty risk

  • Preference for financial sovereignty

Factors that favor collaborative custody:

  • Meaningful balances, but the user does not want full self-custody responsibility

  • Continuity needs (families, businesses, inheritance)

  • Desire for stronger controls without a single point of failure

Frequently asked questions

How much bitcoin justifies spending more on security?

A practical rule: if losing the amount would materially harm your financial situation, it deserves proportional protection. For many users, that starts around $5,000 to $10,000 USD, but it depends on your context.

Does self custody remove all risks?

No. It removes counterparty risks but introduces operational risks. Responsibility shifts fully to the user.

Are regulated exchanges safe?

They reduce certain risks, but do not eliminate counterparty risk. Even large platforms can fail due to fraud, weak controls, or mismanagement. A prudent approach is not to treat an exchange as a long term vault.

Can I combine both approaches?

Yes, and it is often the most reasonable approach. Hold different portions across custody levels based on purpose and horizon.

What happens if I lose my phone with a mobile wallet?

If you have a seed phrase backup, you can restore your funds on another device. Without a backup, the loss can be permanent. Avoid holding large amounts in mobile wallets.

What is a seed phrase, and why is it so important?

It is a 12 to 24-word sequence that acts like a master key to restore access to your funds. Whoever has it controls the bitcoin.

Conclusion

Bitcoin custody security is not about choosing a single “correct” method. It is about understanding the risks of each option and making informed decisions. Delegated custody offers convenience in exchange for third-party trust. Self-custody offers sovereignty in exchange for operational responsibility. Collaborative custody aims to balance both.

For most users, the strongest strategy combines models, assigning portions based on purpose, amount, and comfort. Ongoing education and gradual adoption of best practices are essential for a durable custody plan.

Disclaimer: This document is for informational and educational purposes only. It is not financial or security advice. Evaluate your situation before choosing a custody strategy.

Short glossary

  • Seed phrase: 12 to 24 words used to restore access to a wallet.

  • Multisig: A setup that requires multiple signatures to authorize transactions.

  • 2FA: Two-factor authentication.

  • Whitelist: A list of approved withdrawal addresses.