Sure, they could have destroyed them, losing the money but maybe not getting arrested?
This way the police or anybody else cannot get your private key.
...why not? Police coordinate raids all the time.
A USB is tiny, and you can shrink it's footprint with USB-C. You can also buy USB keys with tamper-proof housings that will blow a fuse if opened to be physically compromised. Coupled with strong post-quantum crypto, that key is relatively secure, even if physically discovered.
That's just the technical bit. You can also split the key in half and transfer the other half somewhere, which creates legal protection. You could also create a housing for the key so it's not easily discoverable.
If all that sounds a bit extra, circle back to that the perpetrator has 4.5 Billion worth of something.
Isn't that impractical? Also how were the police supposed to know that he used this system?
Encrypting it with a good password that you remember and then printing the encrypted keys comes to mind.
So is it possible for 1 seed to generate all of them? Doesn't that break information theory (Shannon's compression limit)?
From that seed you can generate for all practical purposes an infinite number of private keys for any and all purposes in existence. Using cryptographic one way functions such as a hash or PRNG.
Example: truncate_as_needed ( sha512 (seed | 2022 | wallet_title | priv #123) ) = private key #123
Edit: I checked and unless I mixed some zeroes somewhere it looks like the current bitcoin hash rate of 200 million TH/s can crack 92 bits within a year. log (200,000,000,000,000,000,000*3600*24*365) / log 2 = 92.35
https://www.europol.europa.eu/media-press/newsroom/news/800-...
It does sound like a lot of work. I think I'd go with the $5 wrench option.