Study smarter with Fiveable
Get study guides, practice questions, and cheatsheets for all your subjects. Join 500,000+ students with a 96% pass rate.
Cryptocurrency wallets sit at the intersection of cryptographic security and user accessibility—two concepts you'll see tested repeatedly in blockchain coursework. Every wallet type represents a different answer to the fundamental question: how do we balance convenience against security when managing private keys? Understanding this tradeoff is essential because wallets don't actually "store" cryptocurrency; they store the private keys that prove ownership of assets recorded on the blockchain.
You're being tested on more than just definitions here. Exam questions will ask you to evaluate which wallet type fits a specific use case, explain the security implications of different key storage methods, and analyze how wallet architecture affects transaction signing, key management, and attack surface exposure. Don't just memorize what each wallet does—know why it exists and what security principle it demonstrates.
The most fundamental distinction in wallet design is whether the device storing private keys connects to the internet. This single factor determines the primary attack vectors a wallet faces.
Compare: Hot wallets vs. Cold wallets—both store private keys, but hot wallets prioritize accessibility while cold wallets prioritize security through isolation. If an FRQ asks about securing large holdings, cold storage is almost always the answer.
Some wallets exist as tangible objects, removing private keys from the digital environment entirely. The security model here relies on physical possession rather than software defenses.
Compare: Hardware wallets vs. Paper wallets—both achieve cold storage, but hardware wallets allow repeated transaction signing without exposing keys, while paper wallets are essentially one-time-use. Hardware wallets cost money; paper wallets are free but fragile.
Software wallets run as applications on general-purpose computing devices. Their security depends heavily on the underlying device's security posture and the wallet's implementation.
Compare: Desktop vs. Mobile vs. Web wallets—all are software-based hot wallets, but they differ in custody model and attack surface. Desktop and mobile wallets are typically non-custodial (you hold keys), while web wallets are often custodial (provider holds keys). This distinction is critical for exam questions about trust and control.
Beyond basic storage, some wallet designs implement sophisticated cryptographic techniques to enhance security, privacy, or usability. These architectures solve specific problems that simpler wallets cannot address.
Compare: Multi-sig vs. HD wallets—both are "advanced" but solve different problems. Multi-sig distributes trust across multiple parties (security through authorization). HD wallets simplify key management and enhance privacy (security through organization). An FRQ might ask you to recommend one for a business (multi-sig) versus an individual (HD).
| Concept | Best Examples |
|---|---|
| Cold storage (offline keys) | Hardware wallets, Paper wallets |
| Hot storage (online keys) | Mobile wallets, Desktop wallets, Web wallets |
| Custodial (third-party holds keys) | Web wallets, Exchange wallets |
| Non-custodial (user holds keys) | Hardware wallets, Desktop wallets, Mobile wallets |
| Distributed authorization | Multi-signature wallets |
| Deterministic key generation | HD wallets |
| Physical security model | Hardware wallets, Paper wallets |
| Convenience-optimized | Mobile wallets, Web wallets |
A user wants to store a large amount of cryptocurrency for several years without touching it. Which two wallet types would you recommend, and what vulnerability do they share despite being "cold" storage?
Explain why web wallets violate the "not your keys, not your coins" principle, and identify which other wallet types avoid this problem.
Compare multi-signature wallets and HD wallets: what specific security problem does each solve, and in what scenario would you recommend one over the other?
A mobile wallet and a hardware wallet both sign a transaction. Describe the key difference in where the private key exists during the signing process and why this matters for security.
If an FRQ asks you to design a wallet solution for a three-person startup managing shared funds, which wallet architecture addresses their needs and what configuration (expressed as -of-) might be appropriate?