Passphrase (25th word) — benefits, risks & configuration

Try Tangem secure wallet →

Table of contents

Passphrase (25th word) — benefits, risks & configuration

A passphrase (often called the "25th word") is an optional extra secret you can add to your seed phrase to create a separate, hidden wallet. Short version: it increases security if used correctly, and it increases the chance of permanent loss if used carelessly. I believe most people should understand both sides before deciding.

What is a ledger passphrase (25th word)?

A "ledger passphrase" refers to the BIP39 passphrase feature as implemented by Ledger-compatible hardware wallets. Technically, BIP39 combines a mnemonic seed phrase with an optional passphrase to derive the master seed. That additional secret acts like a 25th word appended to a 24-word seed (or a 13th to a 12-word seed), but it can be any text sequence, not necessarily a single dictionary word.

Think of your seed phrase like a master key. The passphrase creates a second master key derived from the same words, but only accessible when the passphrase is supplied. This is how "hidden wallet ledger" setups are achieved.

(Why would you do this? Read on.)

How the BIP39 passphrase works (technical overview)

BIP39 defines a process that takes two inputs: the mnemonic (seed phrase) and an optional passphrase. These are combined using a key stretching function (PBKDF2) to produce a 512-bit seed. That seed is then used with BIP32/44 derivation paths to create accounts and private keys on the blockchain. See the BIP39 specification for the exact math: https://github.com/bitcoin/bips/blob/master/bip-0039.mediawiki

Because the passphrase is a separate input, the same 24-word seed will map to different private keys depending on the passphrase used. That’s the core behavior exploited to make per-passphrase hidden wallets.

Benefits: why people add a passphrase

In my experience, the passphrase is valuable for high-value cold storage where an extra human-secret separation makes sense. But it’s not a universal fix.

Risks and failure modes of using a passphrase

But remember: a passphrase increases complexity. Complexity causes mistakes. That’s an empirical fact I’ve observed across many users.

How to enable and use a ledger passphrase — step by step

Note: device UIs differ. Consult your device-specific guide for exact button presses (nano-s-guide, nano-s-plus-guide, nano-x-guide). The steps below are a safe, general approach.

  1. Decide whether you really need a passphrase. Consider alternatives first (multisig, geographically separated seed copies, metal backups).
  2. Compose a high-entropy passphrase. Prefer a multi-word diceware-style phrase or a long random string — not a single, guessable word (example: "blue horse correct 7?" is weak; "rain-8123-coffee-bottle-tiger" is stronger).
  3. Enable the passphrase feature on your hardware wallet per the device manual. When prompted, choose to enter the passphrase on the device rather than on a host app whenever possible.
  4. Create a hidden wallet by entering the passphrase. Confirm that the derived accounts show expected addresses.
  5. Send a small test amount to the hidden wallet to confirm full access and correct backups.
  6. Back up the passphrase securely (see next section). Then, treat the passphrase like any other critical secret: never store it in a cloud note or plaintext file.

And test recovery with a spare device or in a safe environment. If you can’t restore from a separate device, you don’t have a reliable backup.

Entry modes: on-device vs host entry

Backup and recovery with a passphrase

The passphrase must be treated as part of your backup set. Recovery requires both the seed phrase and the exact passphrase string. If you use a passphrase with a 24-word seed, the combination is what restores your hidden wallet. See the general restore process at [/restore-recovery].

Secure backup options:

Do not store your passphrase as an unencrypted cloud note or on a photo in your phone. But do ensure trusted people know inheritance instructions (see [/inheritance]).

Who should use a passphrase?

Who should probably not use it:

Common mistakes to avoid

But the most common mistake I see is incomplete backup planning: people back up the seed phrase and forget the passphrase.

Quick comparison table: Pros vs Cons

Feature Pros Cons
Security against physical theft Adds extra secret required to unlock hidden wallet If lost, funds irrecoverable
Plausible deniability Allows a decoy wallet without the passphrase Deniability can fail under sophisticated coercion
Convenience Multiple wallets from one seed Higher operational complexity (typography, storage)

FAQ

Q: Can I recover my crypto if the device breaks? A: Yes—if you have the seed phrase and the exact passphrase you used to create the hidden wallet. Restore the seed on a compatible device or use a recovery procedure described at [/restore-recovery]. Without the passphrase, hidden-wallet funds are unrecoverable.

Q: What happens if the company behind my hardware wallet goes bankrupt? A: Your recovery relies on open standards (BIP39/BIP32); as long as the standards and compatible tools remain, you can restore using other compatible hardware or software that supports the same derivation scheme. See [/company-risk] for a fuller discussion.

Q: Is Bluetooth safe for inputting a passphrase? A: Bluetooth introduces extra attack surface compared with a wired, on-device entry. If you plan to use a passphrase, prefer direct on-device entry (or a physically air-gapped workflow). See [/connectivity-usb-bluetooth-nfc] for connectivity trade-offs.

References & next steps

If you decide to use a passphrase, test restore before moving significant funds. I’ve tested both on-device and host-entry methods; on-device entry reduced my operational worry the most. And remember: a passphrase is powerful, but only if you treat it like a permanent secret.

Ready for the next step? Follow the model-specific setup guides linked above, then verify firmware and perform a controlled restore from your backups: see [/verify-firmware] and [/restore-recovery] for step-by-step instructions.

Try Tangem secure wallet →