Did you find this article helpful?
If it clarified even one security risk for you, consider sharing it with others who may benefit 😎
⬇️⬇️⬇️⬇️⬇️
Key Answer: Proper backup of your recovery phrase can prevent permanent loss of your cryptocurrency holdings. However, even with the best backup practices, a hardware wallet cannot protect you if you sign a malicious transaction, so safe storage and careful verification remain essential.

In the summer of 2009, a Welsh IT worker named James Howells began mining Bitcoin on his laptop. Back then, Bitcoin was worth virtually nothing. The whole operation seemed more like a hobby than an investment. Over several months, Howells accumulated approximately 7,500-8,000 BTC (different sources report varying amounts), storing the private keys on his laptop's hard drive.
Life moved on. In 2013, during a routine house cleaning, Howells made a decision that would haunt him for over a decade. His girlfriend complained about the clutter. Looking at the old laptop, which had stopped working after his daughter spilled lemonade on it, Howells did what seemed logical at the time. He salvaged the hard drive for potential data recovery later and threw away the damaged laptop.
Months passed. Then, one ordinary day, Howells was tidying up again. He spotted a hard drive sitting in a drawer. Without thinking twice, he tossed it into a black garbage bag along with other unwanted items.
It was the wrong hard drive.
The one containing his Bitcoin fortune went straight to the Docksway landfill in Newport, Wales. By the time Howells realized his mistake, it was already buried under thousands of tons of garbage.

When Bitcoin's price began its historic climb, the magnitude of the loss became clear. His lost Bitcoin, once worth a few hundred dollars, grew to be worth hundreds of millions.
Howells did not give up. He spent years developing an elaborate recovery plan involving AI-powered sorting robots, X-ray scanning equipment, and a team of experts. He offered Newport City Council a significant portion of the recovered Bitcoin's value. He proposed environmental restoration projects. He promised to donate to local causes.
The council said no. Environmental regulations prohibited excavating the landfill. The risk of disturbing decades of compressed waste, including potentially hazardous materials, was too great.
In December 2024, Howells filed a lawsuit against the council. In January 2025, a UK judge dismissed the case. The landfill is now scheduled to become a solar farm by 2026, effectively sealing the Bitcoin beneath renewable energy infrastructure forever.
Howells has vowed to take his fight to the European Court of Human Rights. He has also launched a tokenization project called Ceiniog Coin, attempting to create value from his lost fortune through alternative means. But the original Bitcoin remain inaccessible, likely forever.

James Howells' story is not just a cautionary tale about one man's misfortune. It reveals a fundamental truth about cryptocurrency that many beginners overlook.
Your crypto assets do not live inside any device.
When you own Bitcoin or any other cryptocurrency, what you actually possess is control over a set of cryptographic keys. These keys exist as information. The device you use, whether it is a laptop, phone, or hardware wallet, is simply a tool for accessing and using those keys.
This is why the recovery phrase (also called seed phrase or recovery words) is everything. This sequence of 12 or 24 words can regenerate your entire wallet and all its contents. Lose the recovery phrase, and you lose your assets. It does not matter if your wallet contained $100 or $800 million.
Important to understand: A hardware wallet significantly reduces the risk of your keys being stolen by hackers or malware. However, if you sign a malicious transaction or fall victim to approval-based phishing, losses can still occur. The hardware wallet protects your keys, but the final decision to authorize any transaction rests with you.

Step 1: Write Down Your Recovery Phrase Properly
When you create any cryptocurrency wallet, you will be given a recovery phrase. This is the moment that determines your long-term security.
Step 2: Choose a Safe Storage Location
Your recovery phrase needs physical protection from damage, theft, and loss.
Step 3: Plan for the Unexpected
Howells' mistake happened during ordinary life circumstances. Your backup plan should account for everyday scenarios.

Storing Recovery Phrases Digitally
Taking a photo of your recovery phrase might seem convenient. Saving it in a notes app or cloud storage feels modern and accessible. Both approaches expose your assets to significant risk. Photos sync to cloud services. Cloud accounts get hacked. Phones get stolen or inspected. Any digital copy of your recovery phrase creates a potential attack vector that did not exist before.
Relying on Memory Alone
Human memory is unreliable over long periods. Words get forgotten. Order gets confused. Even if you successfully memorize your phrase today, a head injury, illness, or simple passage of time could erase it.
Treating Hardware as the Backup
James Howells stored his keys on a hard drive and treated that device as his backup solution. When the device was discarded, the assets were gone. A hardware wallet or any storage device is not a backup. Only the recovery phrase serves that function.
Telling Too Many People
While having a trusted person know about your backup is prudent, sharing your recovery phrase with multiple people dramatically increases the risk of theft. Every person who knows your phrase could potentially access your funds.
Using Pre-Generated or Shared Phrases
Never use a recovery phrase that someone else provided to you. Never use a wallet that came with the recovery phrase already revealed. Scammers sell pre-configured wallets or share recovery phrases, waiting for victims to deposit funds before stealing them.
Use this checklist to verify your backup security:
Recovery phrase is written on paper or metal, not stored digitally
Backup is stored in a secure, private location
Backup is protected from fire, water, and physical damage
At least one trusted person knows where to find the backup in an emergency
You have verified the backup by testing recovery (with a small amount first if unsure)
No photos or digital copies of the recovery phrase exist
The recovery phrase has never been entered into any website or online form
You review backup condition and accessibility every 6-12 months
You have a plan for what happens to your crypto if something happens to you
Token approvals and connected DApps are reviewed and unnecessary ones removed
Firmware on any hardware wallet is kept updated
Q1: What exactly happened to James Howells' Bitcoin?
A: James Howells mined approximately 7,500-8,000 Bitcoin starting in 2009 and stored the private keys on a laptop hard drive. In 2013, he accidentally threw away the hard drive during house cleaning. It ended up in the Docksway landfill in Newport, Wales, where it remains buried. Without the private keys, the Bitcoin cannot be accessed, regardless of its value.
Q2: Can James Howells ever recover his Bitcoin?
A: Recovery appears extremely unlikely. Newport City Council has repeatedly denied excavation requests due to environmental regulations. A court case was dismissed in January 2025, and the landfill is scheduled to become a solar farm by 2026. While Howells continues legal efforts, the technical and legal barriers make recovery improbable.
Q3: Why is the recovery phrase more important than the hardware wallet itself?
A: A hardware wallet is a secure tool for storing and using your private keys, but it is ultimately just a device. The recovery phrase can regenerate your entire wallet on any compatible device. If you lose your hardware wallet but have your recovery phrase, your assets are safe. If you lose your recovery phrase, no device can help you recover your assets.
Q4: Is taking a photo of my recovery phrase really that dangerous?
A: Yes. Photos automatically sync to cloud services like iCloud or Google Photos. Cloud accounts can be compromised through data breaches, phishing, or weak passwords. Even if your phone is lost or stolen, anyone with access to your photo library could find your recovery phrase. The convenience is not worth the significant increase in risk.
Q5: Can a hardware wallet be hacked?
A: A hardware wallet significantly reduces the risk of key theft from online attacks and malware. However, no device provides complete protection. If you are tricked into signing a malicious transaction or granting harmful approvals to a DApp, losses can still occur. The hardware protects your keys, but you must still verify every transaction carefully.
Q6: How many backup copies of my recovery phrase should I have?
A: Most security experts recommend having two to three backup copies stored in different secure locations. This protects against localized disasters like fire or flooding. However, each additional copy increases the risk of theft or discovery. Balance redundancy against security based on the value of your holdings and your personal circumstances.
Q7: What should I do if I think someone has seen my recovery phrase?
A: If you suspect your recovery phrase has been compromised, transfer your assets to a new wallet immediately. Create a new wallet, generate a fresh recovery phrase, and move all your cryptocurrency to the new addresses. Do not delay. Attackers with your recovery phrase can drain your wallet at any time.
Q8: Is it safe to buy a second-hand hardware wallet?
A: Purchasing a used hardware wallet carries significant risk. The previous owner may have recorded the recovery phrase, allowing them to steal any funds you add later. If you must use a second-hand device, always perform a complete factory reset and generate a new recovery phrase from scratch. Purchasing new from an official source is strongly recommended.
Did you find this article helpful?
If it clarified even one security risk for you, consider sharing it with others who may benefit 😎
⬇️⬇️⬇️⬇️⬇️