Home / Crypto / Learn / How To Use an Old Phone as a Hardware Wallet
Learn 9 min read

How To Use an Old Phone as a Hardware Wallet

hand holding a phone where the screen is a safe door, crypto floats around in the background

Key Takeaways

  • Storing private keys offline is the most secure method to protect crypto assets from internet-based threats like phishing, malware, and hackers.
  • An old smartphone can serve as a cold wallet by wiping it clean, permanently disabling internet access, and installing a trusted wallet app offline.
  • Users generate their wallet and seed phrase entirely offline, while a second online device prepares and broadcasts transactions via QR codes or USB.
  • To maintain high security, the offline phone should be PIN-protected, stored securely, and paired with a carefully backed-up seed phrase.

Crypto private keys are like the login credentials for your digital bank, anyone who has them can take control of your assets. While software wallets and exchanges offer convenience, they come with a critical vulnerability: they are connected to the internet. That connection is a constant target for hackers who exploit WiFi networks, phishing attacks, and malware to steal your keys. Over $2.2 billion was stolen in 2024, most of it due to security breaches. This makes one thing clear: the safest way to store private keys is offline.

Hardware wallets like Ledger and Trezor are popular for this reason. However, they can be expensive or hard to obtain depending on your region. Fortunately, there’s a cost-effective alternative that includes converting an old smartphone into a hardware wallet. 

In this guide, we’ll show you how to repurpose an old smartphone into a cold storage device that rivals dedicated hardware wallets in security.

How to Use an Old Phone as a Hardware Wallet

Converting an old phone into a cryptocurrency hardware wallet involves several crucial steps. By following them, you can ensure that the phone becomes a secure, offline vault for your private keys, protected from online threats. While the setup process is somewhat technical, it’s straightforward, and it doesn’t require any sort of technical background.

Here is a quick overview of the process:

  1. Prepare your old phone by removing all data and blocking all future internet access.
  2. Install a trusted, open-source crypto wallet application.
  3. Generate a wallet and seed phrase completely offline.
  4. Use another device to broadcast transactions signed by your cold wallet.
  5. Secure your device with PINs, backups, and safe storage.

Let’s break each of these steps down.

Prepare Your Old Phone

The first and most crucial step is isolating your device from the internet forever. If you don’t do this step properly, the phone might turn into a potential vector of attack. By completely removing its capacity of ever connecting to the internet again, you can rest assured that no malware or remote attackers can gain access to your keys. To remove internet connectivity from your device, you can start with a factory reset. 

Factory Reset

A factory reset wipes all old data, apps, and settings, returning the phone to its original clean state. This will eliminate any malicious pieces of software that may have been previously installed.

On Android:

  • Go to Settings → Backup and reset/Reset → Factory data reset or Erase all data (factory reset).

On iOS:

  • Go to Settings → General → Transfer or Reset iPhone → Erase All Content and Settings.

Secure the Device from the Internet

Once you’ve done the factory reset, you can prevent the phone from ever reconnecting to the internet. This includes disabling WiFi, mobile data, Bluetooth, NFC, and automatic updates. If your phone allows it, consider removing or disabling the network drivers entirely via developer settings.

For an extra layer of assurance, keep the phone in airplane mode permanently. You can also remove the SIM card and avoid inserting one ever again. If you want to go even further, physically damaging the WiFi chip is an option, though not necessary for most users.

Install Wallet Software

Now that your phone is effectively air-gapped, it’s time to install the necessary wallet software. The wallet application will generate and store your crypto keys offline. Start by choosing the right wallet.

Select the Wallet

Choose an open-source wallet that supports air-gapped signing and has good community feedback. Some popular options include:

  • BlueWallet
  • Sparrow Wallet
  • Samourai Wallet
  • Keystone companion apps

Regardless of the type of wallet you choose, ensure that it supports your desired cryptocurrency and allows for offline usage.

Download and Verify

Since you no longer have any internet connectivity on your device, you’ll have to download the installation file (APK for Android or IPA for iOS) on a separate computer. Always download from the official website or GitHub page to minimize the risks of malicious software. Use the provided hash or digital signature to verify the file hasn’t been tampered with.

Once verified, transfer the installation file to your old phone using a USB dongle, cable or SD card. Avoid using email, cloud storage, or any other method that would connect the phone to a network.

Create Your Wallet Offline

With internet connectivity gone and the wallet app installed, it’s time to generate your crypto wallet and seed phrase. Doing so while being completely disconnected from the internet protects you against online threats such as malware, keyloggers, and remote exploits that could steal your private information during wallet creation. Furthermore, you also eliminate the risk of hackers intercepting or spying on your keys as you generate them.

Generate Wallet and Seed Phrase

Open the wallet app on your offline device and follow the prompts to create a new wallet. The software will generate a seed phrase, typically 12 or 24 words, which you must write down and store in a secure location. Always keep in mind that this phrase is the master key to your crypto. Anyone who has it can access your funds, so never store it digitally or take screenshots of it.

If this is your first time using a hardware wallet, know that it cannot display your crypto balance or interact with the blockchain directly; it’s air-gapped. For this reason, you’ll need a separate device, like your regular phone or computer, to view balances or prepare transactions. Using this strategy will help you keep the private key offline at all times.

Offline Transaction Setup

With your wallet set up, you can now send or receive crypto securely using a second device. Since you can’t initiate transactions on your old phone, you’ll have to create unsigned transactions on the online device and sign them with the offline phone.

Use a Second Device for Broadcast

Let’s say you want to send Bitcoin to a specific address. You’ll have to:

  1. Use a wallet on your online device (like Electrum or BlueWallet) to create an unsigned transaction.
  2. Export that transaction as a QR code or file.
  3. Use your offline phone to scan or import the file and sign the transaction using your private key.
  4. Export the signed transaction (again using QR or USB).
  5. Import it back into the online device and broadcast it to the network.

While this process might seem daunting at first, it prevents your private keys from ever touching an internet-connected machine. The end result is reducing the risk of compromise to nearly zero.

How to Secure your Hardware device

Now that your phone holds your private keys, it becomes your single point of failure. This means you must treat it like a vault and take strong security measures to protect it. Here are a couple of tips that you can utilize.

Storage Options and Considerations

Keeping your cold wallet secure starts with physical protection. Never leave your offline phone in easily accessible or visible locations, such as on a desk or in a drawer without a lock. Instead, opt for a storage method that aligns with how frequently you plan to use the wallet and the amount you plan to keep in it.

For long-term storage, a fireproof and waterproof safe provides strong protection against environmental damage. For ultra-secure custody, consider placing the device in a bank deposit box, especially if you won’t need regular access to it. If you prefer keeping the phone at home, hide it in a locked drawer or concealed compartment that isn’t obvious to visitors.

Lastly, make sure that you physically separate the phone from the seed phrase. Storing them together increases the risk that if one is compromised, the other will be too. Ideally, the seed phrase should be hidden in a different location.

Implement a PIN or Password

Enable full disk encryption (found in security settings on most Android and iOS devices) and use a strong, unique PIN or alphanumeric password. Avoid simple codes like “1234” or your birth year. A longer passphrase using a combination of letters, numbers, and special characters will significantly increase resistance to brute-force attacks.

Additionally, check whether your wallet application itself supports internal password encryption for the private keys. If it does, set a different and equally strong password within the app. This way, even if someone accesses the phone, they’ll face two barriers before accessing your keys.

2FA for Wallet Software

Some advanced wallet apps support two-factor authentication (2FA) or additional passphrase layers on top of the seed phrase. If these features are available, always activate them.

For example, some wallets allow users to create a “hidden” wallet via a passphrase extension, effectively creating a second, secret wallet that is only accessible if the attacker knows both the seed phrase and the passphrase. This feature is especially useful for decoy wallets or for spreading risk.

Although traditional 2FA usually requires an internet connection, in offline wallets, this concept can still be applied using dual-password protection or manual PIN verification before signing any transaction.

Seed Phrase Backup

Your seed phrase is the single most important backup for your wallet. If your cold phone wallet is lost, damaged, or destroyed, the only way to regain access to your crypto is by importing this seed phrase into a new wallet.

To ensure that you never lose your seed phrase, write it on paper or engrave it into a steel or titanium plate. Metal backups are resistant to fire, water, and corrosion. Avoid storing it on a digital device, cloud service, or taking a picture of it.

Closing Thoughts

A traditional hardware wallet might cost upwards of $100, but you can achieve similar levels of security with an old phone and a bit of creativity. By turning your unused smartphone into a cold storage device, you gain full control of your crypto without relying on third-party manufacturers or expensive products.

That said, the security of this setup depends on how rigorously you follow each step. To ensure maximum security, keep the phone always offline and protect your seed phrase at all costs. If done correctly, your DIY hardware wallet offers a great blend of affordability, privacy, and control, true to the spirit of crypto.

Was this Article helpful? Yes No
Thank you for your feedback. 100% 0%