The problem with traditional security questions
"What is your mother's maiden name?"
"What city were you born in?"
"What was your first pet's name?"
These are the security questions banks have used for decades. They're also completely broken for crypto.
Why they fail:
- Publicly discoverable — most answers are on social media, public records, or data breaches
- Never change — your mother's maiden name is the same forever, so once it's leaked, it's permanently compromised
- Limited entropy — there are only so many common pet names and cities
- Guessable by acquaintances — coworkers, distant relatives, or ex-partners might know the answers
For protecting a bank account with fraud monitoring and reversal mechanisms, these questions are barely adequate. For protecting a crypto wallet with no customer support and no undo button, they're catastrophically insufficient.
What makes a security question "unbreakable"?
An unbreakable security question has four properties:
1. High personal specificity
The answer should be something only you and your intended recipient know. Not something that could be found online, guessed from context, or discovered through research.
2. Sufficient entropy
The answer space should be large enough that brute-forcing is impractical. "What year were you born?" has only ~100 possible answers. "What did we talk about on the bench in Kyoto during the rainstorm in 2019?" has effectively infinite answers.
3. Memorable but not obvious
Your recipient should be able to answer it without hesitation, but an attacker — even one who knows you well — should have no way to guess.
4. Resistant to social engineering
Even if an attacker researches your life extensively, the answer shouldn't be derivable. It should exist only in the shared memory between you and the recipient.
The framework: memory-based questions
The strongest security questions are based on shared episodic memories — specific moments that you and your recipient experienced together.
Here's the framework:
[Specific time] + [Specific place] + [Specific detail]
Examples:
❌ Bad: "Where did we meet?"
✅ Good: "What song was playing when we first met at the coffee shop on Elm Street?"
❌ Bad: "What's my favorite food?"
✅ Good: "What dish did I order at the restaurant in Rome when I spilled wine on the waiter?"
❌ Bad: "What's my dog's name?"
✅ Good: "What did our dog destroy on the morning of your birthday in 2018?"
The pattern: time + place + sensory detail.
Category 1: Shared experiences
These are the gold standard. Questions about moments you experienced together.
Travel memories:
- "What street were we on in Barcelona when we got lost and asked for directions?"
- "What color was the taxi that took us to the airport in Bangkok?"
- "What did the hotel clerk say when we checked in late in Prague?"
Significant events:
- "What was the first thing I said when I proposed?"
- "What song played during our first dance at the wedding?"
- "What did you wear to my college graduation?"
Mundane but specific moments:
- "What did we argue about in the car on the way to your parents' house in 2020?"
- "What movie were we watching when the power went out?"
- "What did I cook the first time you came to my apartment?"
Why these work: They're impossible to research, impossible to guess, and impossible to brute-force. Only someone who was there can answer.
Category 2: Private conversations
Questions about things you've discussed that were never written down or shared publicly.
Confessions and secrets:
- "What did I tell you I was most afraid of during our conversation on the beach?"
- "What secret did I share with you that I've never told anyone else?"
- "What did I say was my biggest regret when we talked late at night in 2019?"
Future plans:
- "What did I say I wanted to do after I retired?"
- "What country did I say I wanted to move to someday?"
- "What business idea did I tell you I wanted to start?"
Opinions and preferences:
- "What did I say was the worst movie I'd ever seen?"
- "Who did I say was my least favorite coworker, and why?"
- "What did I tell you I would never do, no matter what?"
Why these work: Conversations leave no digital trace. Unless someone recorded it, the answer exists only in memory.
Category 3: Sensory and contextual details
Questions about small, seemingly insignificant details that are nearly impossible to guess but easy to remember if you were there.
Visual details:
- "What color shirt was I wearing when we first met?"
- "What was hanging on the wall behind me during our first video call?"
- "What kind of car was parked next to us at the beach?"
Auditory details:
- "What song was I humming when you walked into the room?"
- "What did the street musician play when we walked past him in Paris?"
- "What was the first thing I said when I answered your call?"
Tactile and environmental details:
- "What was the weather like when we had that conversation in the park?"
- "What did the restaurant smell like when we walked in?"
- "What did I spill on myself at dinner that night?"
Why these work: Human memory is surprisingly good at encoding sensory details from emotionally significant moments. An attacker has no way to research these.
Category 4: Constructed secrets
If you don't have enough shared memories, you can create them intentionally.
The ritual approach: Create a recurring private ritual and base questions on it.
Example: Every year on your birthday, you and your spouse write down a single word that represents the year. Only you two know the words. Your security question: "What was our word for 2023?"
The code phrase approach: Agree on a nonsense phrase that has meaning only to you.
Example: You and your sibling decide that "purple elephant Tuesday" is your family's secret phrase. Your security question: "What's our family code phrase?"
The document approach: Write a short letter or note together, seal it, and store it. The question references something in the letter.
Example: "What was the third word in the letter we wrote together in 2022?"
Why these work: You're creating a shared secret with high entropy that exists nowhere else.
How to test your questions
Before committing to a security question, test it:
The Google test: Can the answer be found by Googling your name + keywords from the question? If yes, it's too weak.
The social media test: Could someone piece together the answer from your Facebook, Instagram, Twitter, or LinkedIn? If yes, it's too weak.
The acquaintance test: Could a coworker, neighbor, or distant relative guess the answer? If yes, it's too weak.
The memory test: Ask your recipient the question without warning. Can they answer immediately and confidently? If no, the question is too obscure.
The time test: Will your recipient still remember the answer in 5 years? 10 years? If uncertain, choose a more memorable moment.
Common mistakes to avoid
Mistake 1: Using facts instead of memories
❌ "What year did we get married?" (fact, easily researched)
✅ "What did I whisper to you right before we walked down the aisle?" (memory, impossible to research)
Mistake 2: Choosing moments that weren't significant
❌ "What did we have for lunch on March 3, 2021?" (too mundane, not memorable)
✅ "What did we eat at the restaurant where I told you I was quitting my job?" (emotionally significant, memorable)
Mistake 3: Making questions too vague
❌ "What did we do on vacation?" (too broad, multiple possible answers)
✅ "What did we do on the second day of our vacation in Greece when it rained?" (specific, single answer)
Mistake 4: Forgetting about normalization
Your recipient might answer "blue" while you recorded "Blue" or "BLUE". Use a system that normalizes capitalization, spacing, and punctuation. PingVaults does this automatically.
How many questions do you need?
For crypto inheritance, the standard is 3-5 questions.
Why not just one? A single question has a small chance of being guessed or researched. Multiple questions compound the difficulty exponentially.
Why not more? Too many questions increase the chance your recipient forgets one. If they need to answer 10 questions and forget even one, they're locked out.
The sweet spot: 3-5 questions, each from a different category, each with high personal specificity.
Putting it into practice
Here's a real example of a strong question set for a spouse:
- Shared experience: "What did I say to you on the balcony in Santorini when we watched the sunset in 2019?"
- Private conversation: "What did I tell you was my biggest fear about starting a business?"
- Sensory detail: "What song was playing in the car when I told you I loved you for the first time?"
- Constructed secret: "What's the code phrase we agreed on for emergencies?"
An attacker would need to:
- Have been on the balcony in Santorini (impossible)
- Have been part of a private conversation (impossible)
- Know what song was playing in a car years ago (impossible)
- Know a phrase that was never written down or shared (impossible)
Your spouse, on the other hand, would answer all four instantly.
The bottom line
Security questions don't have to be weak. When designed correctly — using shared memories, private conversations, and sensory details — they become one of the strongest forms of authentication available.
For crypto inheritance, where there's no customer support and no password reset, getting this right is critical. Your family's ability to access your assets depends entirely on the quality of the questions you choose.
Take the time to design them well. Your future self — and your family — will thank you.
PingVaults uses knowledge-based key derivation with automatic input normalization, ensuring your family can answer your questions even with minor variations in spelling or capitalization. Create your secure vault →