On March 19, 2026, Bloomberg reported that Hong Kong investor Ping Fai Yuen — known in local media as a "teenage stock market prodigy" who built his fortune under the name Huo Liaosen — is suing his ex-wife Fun Yung Li in London's High Court. The allegation: she secretly filmed the mnemonic seed phrase of his cold wallet and used it to steal 2,323 Bitcoin, worth approximately £180 million (~$238 million at the time of the transfer).

The Bitcoin is gone. It moved on-chain. No bank reversed the transaction. No fraud department intervened. No court injunction arrived in time to stop it. By the time the legal system engaged, the cryptographic transfer was already final — settled in roughly ten minutes, immutable forever.

This is not a story about a bad marriage. It is a story about a custody architecture that was designed to fail.

Whoever knows the seed phrase controls the Bitcoin. Full stop. There is no second layer of protection, no fraud department, no chargeback. The seed phrase is the Bitcoin.

For families holding significant Bitcoin positions, this case is a masterclass in what happens when self-custody meets the one threat model most holders never consider: the person who sleeps next to you.

What Happened: The Mechanics of a $238 Million Seed Phrase Theft

The details that have emerged from court filings and reporting by Bloomberg and PANews paint a straightforward picture — and that's precisely what makes it terrifying.

Yuen stored his 2,323 Bitcoin on a hardware wallet — a cold storage device designed to keep private keys offline and away from internet-connected threats. The device itself was likely secured in his home, possibly in a safe. The seed phrase — the 12 or 24-word mnemonic backup that can reconstruct the entire wallet — was apparently stored in a location his wife could physically access.

According to the filings, Fun Yung Li filmed the seed phrase. That's it. No sophisticated hacking. No zero-day exploit. No supply chain attack on the hardware wallet manufacturer. She pointed a phone camera at a piece of paper (or metal plate, or whatever medium the seed phrase was recorded on), captured the words in order, and later used them to restore the wallet on a different device.

Once she had the seed phrase, she had the Bitcoin. She transferred 2,323 BTC to wallet addresses she controlled. The transaction confirmed on the Bitcoin network. And at that point, from a technical standpoint, the theft was complete and irreversible.

Why the Seed Phrase Is the Single Point of Failure

A Bitcoin seed phrase (technically a BIP-39 mnemonic) is a human-readable encoding of the master private key that controls all Bitcoin addresses derived from that wallet. Anyone who possesses these words — in the correct order — can reconstruct the wallet on any compatible device and move every satoshi it contains.

The hardware wallet itself is not the security. The PIN on the hardware wallet is not the security. The safe the hardware wallet sits in is not the security. The seed phrase is the security — and the vulnerability. Everything else is a speed bump.

In this case, the speed bumps were irrelevant. The wife had physical access to the home. She had time. She had a camera. That was sufficient to defeat a custody architecture protecting a quarter of a billion dollars.

Why Bitcoin Is Different: No Recovery, No Reversal, No Recourse

If Fun Yung Li had stolen $238 million from a bank account, the outcome would be radically different. Banks have fraud departments. Wire transfers can be reversed within certain windows. Courts can freeze accounts. Regulatory bodies can compel financial institutions to hold funds pending investigation.

Bitcoin has none of these mechanisms. By design.

Key Distinction

Traditional financial assets are controlled by intermediaries who can be compelled by courts. Bitcoin is controlled by mathematics. A court can order someone to return stolen Bitcoin, but it cannot reverse the transaction itself. If the thief refuses — or has already moved the Bitcoin through multiple wallets, mixers, or cross-chain bridges — enforcement becomes practically impossible.

This is the fundamental tension of self-custody: the same property that makes Bitcoin censorship-resistant and immune to government seizure also makes it immune to recovery when stolen by someone with physical access to your seed phrase.

Consider the asymmetry:

Yuen is suing in London's High Court. He may win a judgment. The court may order his ex-wife to return the Bitcoin. But a court order is only as good as the ability to enforce it. If the Bitcoin has been moved to addresses she controls through privacy-preserving methods, the judgment may be practically unenforceable. She could face contempt charges, fines, even imprisonment — but the Bitcoin itself may never return.

This is why prevention — through proper custody architecture — is the only reliable protection. Recovery after the fact is a legal fantasy in most self-custody theft scenarios.

The Multi-Signature Solution: Eliminating Single Points of Failure

The custody architecture that would have prevented this theft already exists and has been well-understood in Bitcoin security circles for over a decade. It's called multi-signature (multisig) custody.

In a standard single-signature wallet — the type Yuen apparently used — one seed phrase controls everything. One key to sign transactions. One point of failure. One seed phrase photograph away from catastrophe.

Multi-signature wallets require multiple independent keys to authorize a transaction. The most common configurations:

Had Yuen's 2,323 Bitcoin been stored in a 2-of-3 multisig wallet, filming one seed phrase would have been useless. His wife would have captured one of three keys — necessary but not sufficient to move funds. She would have needed physical access to a second key, stored in a different location, to complete the theft.

Multi-signature custody doesn't rely on trust. It relies on mathematics and geography. No single person, in a single location, at a single moment, can move the Bitcoin.

Multisig Configuration for Married Couples

For a married couple with significant Bitcoin holdings, the recommended minimum is a 2-of-3 multisig with the following key distribution:

  1. Key 1 — Husband: Hardware wallet + seed phrase backup, stored in a location only the husband accesses (e.g., a personal safe deposit box at a bank in a different city from the home).
  2. Key 2 — Wife: Hardware wallet + seed phrase backup, stored in a location only the wife accesses (e.g., her own safe deposit box at a different institution).
  3. Key 3 — Neutral third party: Hardware wallet + seed phrase backup held by a trusted professional — an attorney, a professional custodian, or an institutional key-holding service.

Under this architecture:

For larger holdings — 1,000+ BTC, the range Yuen's position fell in — a 3-of-5 configuration adds further redundancy and security. Five keys distributed across five independent locations and holders means an attacker needs to compromise three separate points of failure. This is the architecture recommended for family offices and ultra-high-net-worth individuals in our complete custody architecture guide.

Geographic Key Distribution: Why Location Matters as Much as Cryptography

Multi-signature custody is only as strong as the physical separation between keys. If all three keys in a 2-of-3 setup are stored in the same house — one in the bedroom safe, one in the home office, one in the garage — a single person with household access can compromise all three.

Geographic distribution means storing keys in physically separate, independently secured locations:

The principle is simple: physical access to one location should never be sufficient to move funds. The attacker's problem should require coordinating access across multiple jurisdictions, institutions, and security perimeters simultaneously.

In the Yuen case, geographic distribution would have been decisive. Even if his wife had filmed one seed phrase at home, the second key required to move funds would have been in a bank vault or attorney's office she couldn't access without detection and cooperation.

International Distribution for Large Holdings

For holdings above $50 million — a threshold Yuen's position exceeded by a factor of four — keys should be distributed across national borders. A 3-of-5 multisig with keys in Hong Kong, Singapore, Switzerland, the United States, and the UK means that compromising the wallet requires coordinating theft across five countries' legal systems, banking regulations, and physical security infrastructures simultaneously. This is functionally impossible for any domestic attacker.

Hardware Wallet Best Practices: The Details That Matter

Even within a multisig architecture, each individual key requires proper handling. The Yuen case highlights several specific failures:

Never Store Seed Phrases Digitally

The seed phrase should never exist in digital form — no photographs, no text files, no password managers, no cloud storage, no encrypted USB drives. Digital storage creates copies. Copies proliferate. A photograph on a phone syncs to iCloud. A text file on a laptop gets backed up to Google Drive. An encrypted file can be decrypted if the password is compromised.

The seed phrase should exist only on physical media: stamped or engraved metal plates (resistant to fire, water, and corrosion) stored in a physically secured location. Paper is acceptable only as a temporary medium during initial wallet setup, to be immediately replaced by metal and destroyed.

The Passphrase (25th Word) as a Second Factor

BIP-39 supports an optional passphrase — sometimes called the "25th word" — that acts as an additional authentication factor on top of the seed phrase. When enabled, the same 24-word seed phrase with a different passphrase generates an entirely different set of wallet addresses and keys.

This is a critical defense against seed phrase theft: even if an attacker obtains all 24 words, they still need the passphrase to access the actual wallet. Without it, the seed phrase generates a decoy wallet (which can even contain a small "honeypot" balance to make the attacker believe they've found the funds).

Implementation Detail

The passphrase should be memorized and never stored alongside the seed phrase. If you must write it down, store it in a completely separate location from the seed phrase. The entire point is that possessing the seed phrase alone is insufficient — the passphrase creates a second, independent authentication requirement.

PIN Protection and Duress PINs

Hardware wallets should always have PIN protection enabled. Some devices (notably Coldcard) support a "duress PIN" — a secondary PIN that, when entered, opens a decoy wallet with a small balance rather than the primary wallet. In a coercion scenario, the duress PIN provides plausible deniability.

PIN protection alone would not have stopped the Yuen theft — his wife bypassed the hardware wallet entirely by copying the seed phrase. But in a scenario where a spouse coerces physical access to the device (under threat of divorce proceedings, for example), the duress PIN provides an additional layer of protection.

The Estate Planning Intersection: Access If You Die, Protection While You Live

Here is the central paradox of Bitcoin custody within marriage: you need your spouse to be able to access the Bitcoin if you die, but you need to prevent them from accessing it unilaterally while you're alive.

Traditional estate planning solved this decades ago for conventional assets. Joint accounts with survivorship rights. Revocable trusts with successor trustees. Beneficiary designations. The entire legal and financial infrastructure is designed around the assumption that an intermediary (a bank, brokerage, or insurance company) will enforce the succession rules.

Bitcoin has no intermediary. The succession rules must be encoded into the custody architecture itself.

The Directed Trust Model

A directed trust separates the roles traditionally combined in a single trustee:

By separating these roles, no single person — including the surviving spouse — has both the authority to approve a distribution and the custody access to execute it. The investment trustee holds the key, but can't distribute. The distribution trustee can approve a distribution, but can't sign the transaction. Both must cooperate.

Wyoming Private Family Trust Companies (PFTCs)

Wyoming's trust-friendly legislation allows families to establish a Private Family Trust Company (PFTC) — essentially a family-owned trust company that serves as trustee for family trusts. For Bitcoin-wealthy families, a Wyoming PFTC can:

A PFTC holding one key in a 2-of-3 multisig provides the institutional stability and governance structure that a simple "give one key to your attorney" arrangement lacks. The attorney might retire, die, or be conflicted out. The PFTC persists.

Co-Trustee Structures

For families not ready to establish a PFTC, co-trustee structures achieve a similar result. Appoint two co-trustees for the trust that holds Bitcoin — one family member and one independent professional (typically a trust company or an attorney acting in a fiduciary capacity). Both co-trustees must agree to any distribution or custody action. Neither can act alone.

This maps directly to multisig: each co-trustee holds a key. The trust document specifies the conditions under which each co-trustee should sign. The legal governance layer and the cryptographic custody layer reinforce each other.

Prenuptial and Postnuptial Provisions for Bitcoin Custody

If you hold significant Bitcoin and are married (or about to be), your prenuptial or postnuptial agreement should address custody architecture — not just the division of assets in a divorce, but the specific rules governing access to keys during the marriage.

What the Agreement Should Cover

What a Court Can and Cannot Do

A court can:

A court cannot:

This enforcement gap is precisely why the custody architecture itself — multisig, geographic distribution, third-party key holders — must prevent the theft before it happens. Once Bitcoin moves, the legal system can punish but rarely recover.

The Trusted Third-Party Key Holder Model

The third key in a 2-of-3 multisig arrangement is the linchpin of the entire architecture. Choosing the right third-party key holder is one of the most important decisions in Bitcoin custody design.

Option 1: Attorney as Key Holder

A Bitcoin-literate estate planning attorney holds the third key under a written key-holding agreement. The agreement specifies:

Option 2: Professional Custodian

Institutional Bitcoin custody providers (Unchained Capital, Casa, Onramp) offer collaborative custody models where they hold one key in a client-controlled multisig. The client retains majority key control (2 of 3 keys), while the custodian holds one key and will co-sign only after verifying the client's identity and the transaction's legitimacy.

For married couples, this model can be adapted: the custodian's verification process can be configured to require confirmation from both spouses for transactions above a certain threshold, or to require additional documentation during periods of legal separation.

Option 3: Family Governance Entity

As discussed above, a Wyoming PFTC or similar family governance entity can serve as the institutional key holder. This is the most robust option for families with holdings above $10 million, as it provides governance continuity independent of any individual relationship.

Red Flags: 8 Signs Your Bitcoin Custody Is Vulnerable to Domestic Theft

If any of the following apply to your current Bitcoin custody setup, your holdings are exposed to the same risk that cost Yuen $238 million:

  1. Single-signature wallet: All your Bitcoin is controlled by one seed phrase. One key. One point of failure. This is the most critical red flag — everything else is secondary if this one is true.
  2. Seed phrase stored at home: Your seed phrase backup (paper, metal plate, or any other medium) is in your house, where your spouse has physical access 24/7.
  3. Seed phrase stored digitally anywhere: Photograph on your phone. Note in your password manager. Text file on your computer. If it's digital, it's copyable without physical access.
  4. No passphrase (25th word): Your hardware wallet uses only the 24-word seed phrase with no additional passphrase, meaning the seed phrase alone is sufficient to steal the funds.
  5. Spouse knows the seed phrase: You've shared your seed phrase with your spouse "in case something happens to me." This is the $5 wrench attack with no wrench required.
  6. All keys in one jurisdiction: Even in a multisig setup, if all keys are in the same city or country, a determined attacker with local access can potentially compromise multiple keys.
  7. No written custody agreement: There is no prenuptial, postnuptial, or other written agreement defining key access rights, unauthorized access penalties, or separation protocols for your Bitcoin custody.
  8. No independent third-party key holder: Your multisig arrangement (if you have one) involves only family members — no neutral, professional, institutionally-accountable party holds a key.

If you checked three or more of these, your custody architecture needs immediate attention. If you checked five or more, you are one domestic dispute away from a catastrophic, irrecoverable loss.

The 5-Step Action Plan: Securing Your Bitcoin Against All Single Points of Failure

Whether you hold 1 BTC or 2,323 BTC, the principles are the same. The implementation scales with the value at risk.

Step 1: Move to Multi-Signature Custody

If you are currently using a single-signature wallet — one hardware wallet, one seed phrase — this is the single most important change you can make. Move your Bitcoin into a 2-of-3 multisig wallet. Tools like Sparrow Wallet, Electrum, or institutional platforms like Unchained and Casa make this accessible even without deep technical expertise.

The migration itself requires careful execution: generate the three new keys on three separate hardware wallets, create the multisig wallet, verify the receiving addresses on each hardware device, send a small test transaction, verify receipt, then transfer the full balance. Do not rush this process. Verify every step.

Step 2: Distribute Keys Geographically

Once you have a multisig wallet, distribute the three keys to three physically separate locations. At minimum:

Each key's seed phrase backup should be on a metal plate (Cryptosteel, Billfodl, or similar) — not paper, which is vulnerable to fire, water, and degradation.

Step 3: Add a Passphrase to Every Key

Enable the BIP-39 passphrase on each hardware wallet. Use a strong, unique passphrase for each key. Memorize each passphrase and store a written backup in a separate location from the corresponding seed phrase. This ensures that even if a seed phrase is compromised (photographed, stolen, or discovered), the attacker still cannot reconstruct the key without the passphrase.

Step 4: Formalize the Legal Framework

Work with an attorney experienced in both family law and digital asset custody to draft or update your prenuptial/postnuptial agreement with Bitcoin custody provisions. At minimum, the agreement should define:

Simultaneously, ensure your estate plan (revocable trust, will, power of attorney) is updated to reflect the multisig structure and provides your executor or successor trustee with enough information to participate in key recovery — without giving them unilateral access.

Step 5: Test the Architecture Annually

A custody architecture that isn't tested is a custody architecture that doesn't work. At least once per year:

Document each annual review. The documentation itself becomes evidence of prudent custody management if a dispute ever reaches court.


The Lesson From $238 Million

Ping Fai Yuen built a Bitcoin position that most people can only dream of — 2,323 BTC, accumulated through what was reportedly years of prescient investing. He secured it against hackers, exchange failures, government seizure, and every external threat that the Bitcoin community traditionally worries about.

He did not secure it against his wife.

This is not a failure of Bitcoin. Bitcoin worked exactly as designed — it transferred value to the person who held the keys, instantly and irreversibly. It is a failure of custody architecture: a single-signature wallet, a seed phrase stored within reach of a person with motive and opportunity, and no structural safeguard requiring multiple independent parties to authorize a transaction.

The fix is not complicated. Multi-signature custody, geographic key distribution, a professional third-party key holder, and a legal framework that defines access rights — these tools have existed for years. They are well-understood, widely available, and increasingly accessible even to non-technical holders.

What they require is the willingness to acknowledge an uncomfortable truth: the person closest to you is, by definition, the person with the most physical access to your custody infrastructure. And in Bitcoin, physical access to a seed phrase is total access to the funds.

Design your custody architecture accordingly. Not because you don't trust your spouse — but because sound custody architecture should never depend on trust in the first place.


Evaluating a Bitcoin Custody Partner? Start With These 36 Questions

Whether you're selecting a collaborative custody provider, a professional key holder, or a mining host for your family office infrastructure, due diligence matters. Most custody relationships are entered without adequate scrutiny of security practices, insurance, operational transparency, and exit terms. Abundant Mines publishes a 36-question due diligence framework that applies to any Bitcoin infrastructure partner.

Download the 36-Question Due Diligence Guide →

Bitcoin Mining: The Most Powerful Tax Strategy Available

For high-net-worth Bitcoin holders, mining is the only strategy that simultaneously generates yield, accumulates BTC, and creates significant tax offsets — through equipment depreciation, operating expense deductions, and bonus depreciation on capital investments. Most family offices overlook mining entirely. Abundant Mines has compiled every major Bitcoin mining tax strategy in one place.

Explore Bitcoin Mining Tax Strategies →