Signal & Noise — Issue #5

The $5 Wrench Attack: When the Threat Isn’t Digital

Bitcoin Security Mastery™ 7 min read

You’ve done everything right. Hardware wallet. Steel seed backup. Full node. Tor-routed connections. Camera covers on your devices. Your digital security is airtight.

None of it matters if someone shows up at your door with a weapon and says, “Send me your Bitcoin or I hurt you.”

This is the $5 wrench attack — named after the famous XKCD comic that points out how a $5 wrench applied to the right body part defeats every encryption algorithm ever invented. It sounds like a joke. It isn’t. It’s the single most important threat model that most Bitcoin holders completely ignore.

Threat Scenario
Attacker profile: Someone who knows (or suspects) you hold significant Bitcoin.

Attack vector: Physical coercion — threats of violence against you or your family.

Goal: Force you to unlock your wallet and transfer funds in real time.

Key advantage: No amount of cryptographic security protects against physical force. The attacker doesn’t need to break your encryption. They need to break your resolve.
Physical Threat — No Digital Defence

This Is Not Theoretical

Physical attacks against known cryptocurrency holders have been rising steadily. Home invasions targeting Bitcoin holders have been documented across multiple countries. In some cases, attackers researched their victims through social media posts, conference attendance lists, or public blockchain analysis that linked real identities to wallet addresses.

The pattern is disturbingly consistent: attackers identify someone who holds crypto, determine their home address, and show up with threats or weapons. The victim, with no practical way to delay or deny the transfer, sends their Bitcoin under duress. The transaction is irreversible. The attackers leave. There is no insurance. There is no chargeback. There is no recovery.

What makes this different from a traditional robbery is the combination of value density and irreversibility. A thief who steals your wallet gets a few hundred dollars in cash and credit cards you can cancel. A thief who forces a Bitcoin transfer can take your life savings in a single transaction that can never be undone.

The Root Cause: Information Leakage

Every $5 wrench attack starts the same way — the attacker learns that you hold Bitcoin and estimates it’s worth the risk. This means the single most effective defence isn’t a better lock or a bigger safe. It’s ensuring nobody knows you hold Bitcoin in the first place.

Information leaks in ways most people don’t think about:

Every one of these is a thread that, if pulled, leads an attacker to the conclusion: this person has Bitcoin worth stealing.

The Six Defences That Actually Work

1
Operational Silence
Never discuss your holdings publicly. Not the amount. Not even the fact that you hold Bitcoin at all. Treat this information the way you’d treat your bank account balance — as private. The best physical security is when there’s nothing to find.
2
Multisig with Geographic Distribution
A 2-of-3 multisig setup with keys in different physical locations means you literally cannot send your full balance under duress. If one key is in your home, one in a safe deposit box, and one with a trusted person in another state, an attacker at your door can only access one key. That’s not enough.
3
Decoy Wallet (Passphrase Wallet)
Most hardware wallets support a passphrase feature that creates a completely separate hidden wallet behind a second password. Keep a small amount of Bitcoin in the default wallet (no passphrase). If coerced, surrender the decoy. Your real holdings behind the passphrase remain invisible — the attacker doesn’t know they exist.
4
Timelocked Transactions
Bitcoin’s native scripting supports OP_CHECKLOCKTIMEVERIFY, which can enforce a time delay on spending. A properly constructed timelocked setup means that even if you wanted to send your Bitcoin immediately, the protocol won’t allow it until the timelock expires. This gives you a genuine, verifiable reason to tell an attacker: “I can’t access it right now.”
5
Plausible Deniability
If you’ve told people you “sold most of it during the last bull run,” there’s nothing for an attacker to target. You don’t need to prove you don’t have Bitcoin — the attacker needs to believe the risk isn’t worth it. Plausible deniability is a social defence, but it’s one of the most effective.
6
Physical Security Basics
Home security systems, reinforced doors, security cameras, and awareness of your surroundings. These don’t prevent a determined attack, but they raise the bar significantly and create evidence trails that deter most opportunistic threats.

Beyond Bitcoin: The OpSec Mindset for Everything

🔒 Security Principle — What Protects Your Bitcoin Protects Your Life
The operational security practices that protect your Bitcoin aren’t just for Bitcoin. They’re principles that protect every sensitive area of your life. Consider how the same threat model applies elsewhere:

Camera discipline: You cover your phone cameras near seed phrases — but do you also avoid passing your phone over bank statements, tax returns, or medical documents? A compromised device camera doesn’t care whether it’s photographing a seed phrase or a Social Security number. The same practice protects both.

Laptop cameras: A small piece of tape or a sliding cover over your laptop webcam prevents remote visual surveillance. It takes five seconds. It costs nothing. And it eliminates an entire category of risk — from stalking to corporate espionage to identity theft.

Document handling: When you open sensitive mail — financial statements, legal documents, insurance papers — treat them like seed phrases. Process them in a clean area. Don’t photograph them unnecessarily. Shred them before disposal. The attacker who targets your Bitcoin might also target your identity.

Information compartmentalisation: Just as you don’t tell people how much Bitcoin you hold, consider who knows your net worth, your investment accounts, or your home security setup. Information is the precursor to every targeted attack — digital or physical.

The Social Layer Is the Weakest Link

Here’s the uncomfortable truth about the $5 wrench attack: the victim almost always created the vulnerability themselves. Not through a technical error, but through a social one. They told someone. They posted something. They let information leak.

This doesn’t mean the attack is the victim’s fault — the criminal is always responsible for the crime. But it does mean the defence is entirely within your control. You choose what to share. You choose who knows. You choose how visible you are.

In security, there’s a concept called the “grey man” principle: blend in, don’t stand out, don’t attract attention. The person who drives a modest car, lives in a normal neighbourhood, and never discusses their finances is vastly harder to target than someone who tweets about their portfolio, wears Bitcoin merchandise, and attends every conference.

This applies far beyond Bitcoin. Anyone with significant assets of any kind — cash, investments, property, valuable collections — benefits from the same discretion. The security mindset isn’t a Bitcoin thing. It’s a life thing.

The best vault in the world is useless if everyone knows what’s inside it. The strongest defence against physical attack isn’t a stronger lock — it’s ensuring nobody has a reason to bring a wrench to your door.


1
Physical attacks on crypto holders up 150% in 2024–2025 — Jameson Lopp’s maintained list of known physical Bitcoin attacks now documents over 200 incidents. The trend is accelerating as Bitcoin’s price rises and more people self-identify as holders. Most victims were targeted because they were publicly associated with cryptocurrency.
2
Trezor adds “duress PIN” feature request — Community pressure is building for hardware wallets to support a “duress mode” that shows a decoy wallet when a specific PIN is entered under coercion. Some wallets already support this through passphrase wallets. Check if your device supports hidden wallets — and set one up if it does.
3
P.O. Box for hardware wallet deliveries — A simple but effective practice: have hardware wallets and crypto-related purchases shipped to a P.O. Box, not your home address. Shipping records are a known attack vector for building target profiles. A $15/month P.O. Box eliminates this entire category of information leakage.
Physical Attack Home Invasion Targeting Crypto Holder — 2024
What happened
An individual known in their local community as a Bitcoin investor was targeted in a planned home invasion. Attackers gained entry, restrained the victim, and forced them to unlock their phone and transfer cryptocurrency under threat of violence. The victim lost a significant portion of their holdings in a single irreversible transaction.
What went wrong
The victim had discussed their Bitcoin holdings openly in social settings and had posted about cryptocurrency on social media. Attackers were able to identify them as a target, determine their home address, and plan the attack with confidence that the payoff would justify the risk. All Bitcoin was held in a single hot wallet on a mobile device with no multisig, no timelock, and no decoy.
The lesson
Every physical attack starts with information. The victim’s technical security was irrelevant because the attack bypassed all of it through physical coercion. A multisig setup with geographically distributed keys would have made the forced transfer impossible. A passphrase wallet would have provided a decoy. And most importantly, keeping holdings private would have prevented the attack from being planned in the first place.
Audit your information footprint.
Search your own name on Google along with the word “Bitcoin” or “crypto.” Check your social media profiles for any posts that signal you hold cryptocurrency. Look at what an outsider could learn about your financial life from your public digital presence. Then start removing the threads. Delete old posts. Adjust privacy settings. If you’ve been open about your holdings in the past, start being quieter now. You can’t un-tell someone, but you can stop adding new information to the picture. The same audit applies to all your sensitive information — not just Bitcoin.

Next issue: Hardware Wallet Showdown — a head-to-head comparison of the leading hardware wallets on security architecture, open-source status, supply chain integrity, and track record. We’re naming names and picking sides.

Previous issues: #1: Exchange Accounts  ·  #2: Phishing Attacks  ·  #3: Seed Phrase Storage  ·  #4: Running a Node

Get Signal & Noise in your inbox

Bitcoin security intelligence delivered to your inbox. No spam. No fluff. Just the signal.

Free forever. Unsubscribe any time.

You’re subscribed! Check your inbox.

You’ll receive the next issue of Signal & Noise when it drops.