Most seed phrase loss is not caused by sophisticated attackers brute-forcing mnemonic combinations. The 2048^12 (โ2^128) search space of a 12-word BIP-39 phrase is computationally irreducible with any foreseeable technology. The 2048^24 space of a 24-word phrase is absurd overkill against brute force.
The actual distribution of seed phrase compromise skews overwhelmingly toward three categories: poor entropy at generation, poor storage leading to physical exposure, and social engineering leading to voluntary disclosure. A smaller but real category is supply-chain attacks โ compromised hardware wallets or software that constrain the entropy pool or exfiltrate the mnemonic.
Designing your security around brute-force resistance is defending the strongest wall while the door is open. Every decision below is ordered by real-world failure frequency, not theoretical attack sophistication.