The term cryptocurrency wallet refers to a tool used to store and transact with top cryptocurrencies like bitcoin (BTC) and ether (ETH).
Non-fungible tokens (NFTs) can also be stored in cryptocurrency wallets, like art, digital collectibles, and virtual land.
As a result, a crypto wallet is where your cryptos and NFTs are stored. This application or device can be set up so that only you or people close to you can access your digital assets.
Crypto Wallet – How Does It Work?
In a certain sense, a crypto wallet doesn’t literally “store” cryptocurrency or NFTs.
Instead, a wallet provides a holder with a public key and private key pair that offers access to an account on a blockchain like Ethereum. So while crypto is stored and tracked “on chain,” wallets are necessary for interfacing with and securing the underlying funds.
- A public key is commonly shortened into an “address,” an alphanumeric phrase or username where crypto users can receive and manage digital assets.
- A private key is like the password to your public key because it is needed to “unlock” your public key and approve transactions. For this reason, it’s important never to share your private key with others. If you do, they can unlock and spend your crypto.
Additionally, if you lose access to your private key, you will lose access to your funds unless you’ve relied on a special kind of wallet known as a social recovery wallet. More on these types of wallets a little later.
Hot Wallets vs. Cold Wallets
There are two genres of cryptocurrency wallets: ones that are software-based, like browser, mobile, and smart contract wallets, and ones that are device-based, like hardware wallets.
Online (Hot) Wallets
Since software wallets are used within internet-connected devices, they’re considered “hot” wallets. These wallets are accessible and easy to use, but they’re also prone to hackers via the internet.
It’s entirely possible to set up software wallets securely, but whether doing so is easy for novices is a different question. As such, the simplest way to reasonably secure your cryptocurrency is through a hardware wallet.
Related: What are stablecoins? A guide to stable crypto money
Hardware (Cold) Wallets
A hardware wallet is a physical device that remains disconnected from the internet at all times, hence the “cold” nickname. They often look like a USB drive or a small point-of-sale system that users can plug into their computer.
Crypto holders thus use these specialized, fire walled devices to sign transactions offline, thereby eliminating the internet-based attack vectors that can plague software wallets.
Fortunately, crypto users can link their hot and cold wallets together to get the best of both worlds, i.e. accessibility and security.
The Ledger Nano is an example of a hardware wallet.
Social Recovery Wallet?
Losing access to all your cryptocurrency because you’ve lost access to your private key is harsh.
In response, the Ethereum community has pioneered social recovery wallets that allow Ethereum accounts to be recovered in perpetuity.
Powered by smart contracts, these wallets make use of a “signing key” and “guardians.” A signing key is what people use to approve transactions, while guardians are family or friends you handpick.
A majority of guardians can then coordinate to update your signing key if you ever lose access to your original one, thus ensuring recoverability.
Crypto Wallets Risks
Moving your assets from a centralized cryptocurrency exchange like Binance, Coinbase or Gemini to your own wallet entails certain risks.
That’s because while your crypto is on these exchanges, it is ultimately in these services’ custody and can be easily secured by passwords, two-factor authentication, and even user-friendly vault systems.
Related: What are stablecoins? A guide to stable crypto money
If you transfer your crypto to a wallet you own, this is self-custodying your assets. Many users do this to directly interact with established and upstart DeFi and NFT platforms. However, this also means these users are their own last line of defense when it comes to securing their assets.
For example, if you have funds on a browser wallet like MetaMask and a hacker exploits your computer and scrapes your password, that crypto will be stolen. Accordingly, it’s important to take security seriously and layer in mitigations like hardware wallets to all your crypto routines.
The Best Crypto Wallet Types to Consider
There are a range of reputable cryptocurrency wallets you can choose from. Below are some of the most popular ones by category.