You’ve done everything right. Hardware wallet. Steel seed backup. Full node. Tor-routed connections. Camera covers on your devices. Your digital security is airtight.
None of it matters if someone shows up at your door with a weapon and says, “Send me your Bitcoin or I hurt you.”
This is the $5 wrench attack — named after the famous XKCD comic that points out how a $5 wrench applied to the right body part defeats every encryption algorithm ever invented. It sounds like a joke. It isn’t. It’s the single most important threat model that most Bitcoin holders completely ignore.
Attack vector: Physical coercion — threats of violence against you or your family.
Goal: Force you to unlock your wallet and transfer funds in real time.
Key advantage: No amount of cryptographic security protects against physical force. The attacker doesn’t need to break your encryption. They need to break your resolve.
This Is Not Theoretical
Physical attacks against known cryptocurrency holders have been rising steadily. Home invasions targeting Bitcoin holders have been documented across multiple countries. In some cases, attackers researched their victims through social media posts, conference attendance lists, or public blockchain analysis that linked real identities to wallet addresses.
The pattern is disturbingly consistent: attackers identify someone who holds crypto, determine their home address, and show up with threats or weapons. The victim, with no practical way to delay or deny the transfer, sends their Bitcoin under duress. The transaction is irreversible. The attackers leave. There is no insurance. There is no chargeback. There is no recovery.
What makes this different from a traditional robbery is the combination of value density and irreversibility. A thief who steals your wallet gets a few hundred dollars in cash and credit cards you can cancel. A thief who forces a Bitcoin transfer can take your life savings in a single transaction that can never be undone.
The Root Cause: Information Leakage
Every $5 wrench attack starts the same way — the attacker learns that you hold Bitcoin and estimates it’s worth the risk. This means the single most effective defence isn’t a better lock or a bigger safe. It’s ensuring nobody knows you hold Bitcoin in the first place.
Information leaks in ways most people don’t think about:
- Social media: Posting about Bitcoin, sharing portfolio screenshots, celebrating price milestones, or simply following Bitcoin-related accounts creates a public signal.
- Conversations: Telling friends, family, or colleagues about your holdings. Information spreads. People talk.
- Conference attendance: Bitcoin conferences, meetups, and workshops are social environments. Attendee lists sometimes become public. Photos get shared.
- On-chain analysis: If your real identity has ever been linked to a Bitcoin address (through a KYC exchange, for example), blockchain analytics can estimate your holdings.
- Purchase patterns: Buying hardware wallets, Bitcoin books, or related products with your real name and home address creates records.
Every one of these is a thread that, if pulled, leads an attacker to the conclusion: this person has Bitcoin worth stealing.
The Six Defences That Actually Work
Beyond Bitcoin: The OpSec Mindset for Everything
Camera discipline: You cover your phone cameras near seed phrases — but do you also avoid passing your phone over bank statements, tax returns, or medical documents? A compromised device camera doesn’t care whether it’s photographing a seed phrase or a Social Security number. The same practice protects both.
Laptop cameras: A small piece of tape or a sliding cover over your laptop webcam prevents remote visual surveillance. It takes five seconds. It costs nothing. And it eliminates an entire category of risk — from stalking to corporate espionage to identity theft.
Document handling: When you open sensitive mail — financial statements, legal documents, insurance papers — treat them like seed phrases. Process them in a clean area. Don’t photograph them unnecessarily. Shred them before disposal. The attacker who targets your Bitcoin might also target your identity.
Information compartmentalisation: Just as you don’t tell people how much Bitcoin you hold, consider who knows your net worth, your investment accounts, or your home security setup. Information is the precursor to every targeted attack — digital or physical.
The Social Layer Is the Weakest Link
Here’s the uncomfortable truth about the $5 wrench attack: the victim almost always created the vulnerability themselves. Not through a technical error, but through a social one. They told someone. They posted something. They let information leak.
This doesn’t mean the attack is the victim’s fault — the criminal is always responsible for the crime. But it does mean the defence is entirely within your control. You choose what to share. You choose who knows. You choose how visible you are.
In security, there’s a concept called the “grey man” principle: blend in, don’t stand out, don’t attract attention. The person who drives a modest car, lives in a normal neighbourhood, and never discusses their finances is vastly harder to target than someone who tweets about their portfolio, wears Bitcoin merchandise, and attends every conference.
This applies far beyond Bitcoin. Anyone with significant assets of any kind — cash, investments, property, valuable collections — benefits from the same discretion. The security mindset isn’t a Bitcoin thing. It’s a life thing.
The best vault in the world is useless if everyone knows what’s inside it. The strongest defence against physical attack isn’t a stronger lock — it’s ensuring nobody has a reason to bring a wrench to your door.
Next issue: Hardware Wallet Showdown — a head-to-head comparison of the leading hardware wallets on security architecture, open-source status, supply chain integrity, and track record. We’re naming names and picking sides.
Previous issues: #1: Exchange Accounts · #2: Phishing Attacks · #3: Seed Phrase Storage · #4: Running a Node