Prevention — 42 measures
Measures are grouped by area of action. Tick off the ones you've already put in place — your progress is stored locally in your browser.
Discretion is your first line of defense. The less visible you are, the less of a target you become.
An attacker cannot steal what they cannot access, and cannot force you to unlock what is technically unavailable at that moment.
A physical attack starts with reconnaissance. Make that reconnaissance as hard as possible, and prepare your home to resist an intrusion.
The mechanisms that will let you call for help during an attack must be configured BEFORE the incident. Under duress you won't think clearly — you will only execute what is already armed and rehearsed. Test each mechanism at least once per quarter.
For highly exposed profiles — high-profile founders, large holdings, periods of intense visibility — individual measures reach their limits. Security then has to be designed as a full system: a threat audit (beyond just the digital footprint), modular physical protection, training on how to behave under duress, and a documented and rehearsed crisis protocol.
This kind of setup is not something you build alone. If your profile justifies this level of protection and you have the means, reach out to domain experts who will assess your real exposure and calibrate the right setup:
If you're attacked
A 5-step emergency protocol. Under duress you won't have time to think — execute what is already armed and rehearsed.
Immediate reflexes
Cooperate calmly. Obey without resisting if a weapon is present. Funds can be replaced — your life cannot.
Buy time by any means — confirmation delays, plausible technical complications (delayed withdrawal, platform maintenance, 2FA on a device you don't have on you, active timelock). The more time passes, the higher the chance of intervention.
Commit every detail to memory: tattoos, accents, vehicles (plate, model, color), words spoken, clothing, jewelry, timing. These details are critical evidence for the investigation.
Procedure — 5 steps
By any means available: dial 17 or 112 (EU emergency), panic button, remote monitoring service, or a trusted contact via your code phrase.
- Exact location (address, landmark, floor)
- Direction the attackers fled
- Number and physical description of the attackers
- Vehicles (model, color, plate if possible)
- Visible weapons
- Injured people, bystanders, possible hostages
- Words spoken, accents, distinctive details
If set up in advance (see item 31). Hand over access immediately — that alone is often enough to make attackers leave.
- The balance must be credible against their estimate of your wealth
- Stay natural — don't overplay your cooperation
- Useless if your wealth is already visible on-chain or through your public habits
After law enforcement, contact SEAL 911 — a free service run by the Security Alliance. Their specialist team traces stolen funds and coordinates with exchanges to freeze them. Send every involved address as soon as possible.
Instant notification when funds move on your addresses. If configured before the incident, you get alerted the moment attackers move the funds.
Keep the official receipt of your police report. If you suspect foreign interference or organized crime, also notify the DGSI (French counter-intelligence service) at securiteeconomique@interieur.gouv.fr.
Contacts & hotlines
The emergency numbers to remember and the recommended services for each aspect of the guide.
Emergency numbers
Recommended services
Frequently asked questions
Sources & references
This guide aggregates the work of industry professionals and official recommendations. Primary sources:
- Sébastien Martin— CEO, RAID Square
- Nicolas Bacca— Former CTO & co-founder, Ledger
- Cédric Fontaine— CEO, Lima Protection
- Self-assessment guide — ADAN × COMCYBER-MI (French Ministry of the Interior)
- AMF — Crypto-asset security (French financial regulator)
- a16z crypto — Personal physical security
- a16z crypto — Personal physical security guide
- ANSSI — SecNumAcadémie (French national cyber agency)