Fiveable

💱Blockchain and Cryptocurrency Unit 7 Review

QR code for Blockchain and Cryptocurrency practice questions

7.3 Cryptocurrency Wallets and Storage Solutions

7.3 Cryptocurrency Wallets and Storage Solutions

Written by the Fiveable Content Team • Last updated August 2025
Written by the Fiveable Content Team • Last updated August 2025
💱Blockchain and Cryptocurrency
Unit & Topic Study Guides

Cryptocurrency wallets are essential tools for storing and managing digital assets. They come in various types, from software-based hot wallets for frequent transactions to hardware and paper wallets for enhanced security. Understanding these options helps users balance convenience and safety.

Key management is crucial in cryptocurrency. Public-private key cryptography secures transactions, while seed phrases enable wallet recovery. Custody models offer choices between user-controlled non-custodial wallets and third-party managed custodial options, each with its own trade-offs.

Wallet Types

Software-Based Wallets

  • Hot wallet stores private keys online or on a device connected to the internet
    • More convenient for frequent transactions but potentially less secure due to internet connectivity
    • Examples include mobile wallets (Trust Wallet) and desktop wallets (Exodus)
  • Cold wallet stores private keys offline, typically on a dedicated device not connected to the internet
    • Offers enhanced security by minimizing exposure to online threats
    • Requires manual transfer of transaction data between offline and online devices
    • Examples include hardware wallets and paper wallets

Physical Storage Methods

  • Hardware wallet is a physical device designed specifically for securely storing private keys
    • Provides a balance between security and convenience
    • Protects private keys from online threats while allowing transactions through a connected device
    • Popular options include Ledger and Trezor
  • Paper wallet involves printing private keys and addresses on paper for offline storage
    • Offers high security if properly created and stored, but less convenient for frequent use
    • Vulnerable to physical damage, loss, or theft if not stored securely
    • Can be generated using tools like WalletGenerator.net or BitAddress.org
Software-Based Wallets, Trezor - Bitcoin Wiki

Advanced Wallet Configurations

  • Multi-signature wallet requires multiple private keys to authorize transactions
    • Enhances security by distributing control and mitigating single points of failure
    • Useful for organizations, escrow services, or shared funds management
    • Platforms like Electrum and Armory support multi-signature functionality

Key Management

Software-Based Wallets, Ledger Nano S vs. TREZOR One - The Comparison 2021 - Hardware-Wallets.NET

Public-Private Key Cryptography

  • Private key is a secret alphanumeric string used to sign transactions and prove ownership of funds
    • Must be kept secure and never shared with anyone
    • Losing access to the private key can result in permanent loss of associated funds
  • Public key is derived from the private key and serves as the address for receiving funds
    • Can be safely shared with others to facilitate transactions
    • Mathematically related to the private key, but cannot be used to derive it

Backup and Recovery

  • Seed phrase, also known as a recovery phrase or mnemonic phrase, is a human-readable representation of the private key
    • Typically consists of 12-24 words in a specific order
    • Allows for easier backup and recovery of the wallet and associated funds
    • Must be kept secure and private, as anyone with access to the seed phrase can control the wallet
    • Examples of seed phrase words include "apple," "boat," "cat," "dog," "elephant," "frog"

Custody Models

Custodial vs. Non-Custodial Wallets

  • Custodial wallets involve entrusting private keys to a third party, such as a cryptocurrency exchange
    • User relies on the custodian to secure funds and facilitate transactions
    • Offers convenience and potential recourse in case of issues, but requires trust in the custodian
    • Examples of custodial wallets include Coinbase and Binance
  • Non-custodial wallets give users full control over their private keys and funds
    • User is solely responsible for securing and managing the wallet
    • Provides greater autonomy and reduces reliance on third parties, but requires more user responsibility
    • Examples of non-custodial wallets include MetaMask, MyEtherWallet, and hardware wallets like Ledger and Trezor
Pep mascot
Upgrade your Fiveable account to print any study guide

Download study guides as beautiful PDFs See example

Print or share PDFs with your students

Always prints our latest, updated content

Mark up and annotate as you study

Click below to go to billing portal → update your plan → choose Yearly → and select "Fiveable Share Plan". Only pay the difference

Plan is open to all students, teachers, parents, etc
Pep mascot
Upgrade your Fiveable account to export vocabulary

Download study guides as beautiful PDFs See example

Print or share PDFs with your students

Always prints our latest, updated content

Mark up and annotate as you study

Plan is open to all students, teachers, parents, etc
report an error
description

screenshots help us find and fix the issue faster (optional)

add screenshot

2,589 studying →