Skip to content

Glossary

Wallet

Tool to store and transfer crypto assets.

cryptobeginner2026-02-04

Wallet

A wallet in cryptocurrency is a digital tool that allows you to store, send, and receive digital assets. Despite its name, a crypto wallet does not actually store your cryptocurrencies. Instead, it securely stores the private keys that prove your ownership of assets recorded on the blockchain. Think of it as a secure keychain that holds the keys to your digital vault.

How crypto wallets work

Every cryptocurrency wallet contains two critical components:

Public key (address): Like an email address or bank account number, your public key is the address others use to send you cryptocurrency. You can share this freely without security concerns.

Private key: This is your secret password that proves ownership and authorizes transactions. Anyone with your private key controls your assets. It must never be shared.

When you "receive" cryptocurrency, the sender broadcasts a transaction to the blockchain network, assigning ownership to your public address. When you "send" cryptocurrency, your wallet uses your private key to sign a transaction, proving you authorize the transfer.

Simple analogy

Think of a crypto wallet like a home mailbox with a secure lock. Your public address is like your street address, anyone can use it to send you mail (cryptocurrency). Your private key is like your house key, only you have it, and it lets you access and control what is inside.

Types of wallets

Wallets come in various forms, each balancing security and convenience differently:

Hot wallets (connected to internet)

TypeDescriptionBest for
Mobile walletsApps on your smartphoneDaily transactions, small amounts
Desktop walletsSoftware installed on your computerRegular trading, moderate amounts
Web walletsBrowser-based, often exchange-hostedQuick access, convenience
Browser extensionsPlugins like MetaMaskDeFi interactions, dApp usage

Cold wallets (offline storage)

TypeDescriptionBest for
Hardware walletsPhysical devices (Ledger, Trezor)Long-term storage, large amounts
Paper walletsPrinted keys on physical paperLong-term cold storage, backup
Air-gapped devicesComputers never connected to internetMaximum security for institutions

Why wallet choice matters

Your wallet selection significantly impacts both security and functionality:

  • Security level: Cold wallets offer superior protection against hacking
  • Convenience: Hot wallets enable quick transactions and dApp interactions
  • Supported assets: Not all wallets support all cryptocurrencies
  • Backup options: Seed phrase recovery protects against device loss
  • Cost: Hardware wallets require upfront purchase; software wallets are free

Critical security reminder

Your private key and seed phrase are the only ways to recover your assets. If you lose them, your cryptocurrency is gone forever. If someone else obtains them, they can steal everything. Write them down on paper, store in multiple secure locations, and never share them digitally.

Custodial vs. non-custodial wallets

A fundamental distinction exists between wallet types based on who controls the private keys:

Custodial wallets: A third party (usually an exchange) holds your private keys. You access assets through account login. Convenient but requires trusting the custodian.

  • Pros: Easy account recovery, user-friendly interface
  • Cons: Not your keys, not your coins; vulnerable to exchange hacks or bankruptcy

Non-custodial wallets: You control your own private keys. Full ownership but full responsibility.

  • Pros: True ownership, privacy, no counterparty risk
  • Cons: Lost keys mean lost assets; requires more technical knowledge

Wallet security best practices

Protecting your wallet requires vigilant security habits:

  1. Use hardware wallets for significant holdings: The $100-200 investment is worthwhile protection
  2. Enable all security features: Two-factor authentication, biometrics, PIN codes
  3. Backup your seed phrase: Write it on paper, store in multiple secure physical locations
  4. Never share private keys or seed phrases: No legitimate service will ever ask for them
  5. Verify addresses carefully: Malware can substitute addresses during copy-paste
  6. Use separate wallets: Keep daily spending and long-term savings in different wallets
  7. Stay updated: Keep wallet software current to patch security vulnerabilities

Multi-signature wallets

For enhanced security, multi-signature (multisig) wallets require multiple private keys to authorize transactions. For example, a 2-of-3 multisig requires any two of three designated keys to sign.

This approach protects against:

  • Single point of failure if one key is lost
  • Theft requiring multiple key compromises
  • Unauthorized transactions by any single party

Multisig is popular for businesses, joint accounts, and high-value personal holdings.

Choosing the right wallet

Consider these factors when selecting a wallet:

  • How much are you storing?: Larger amounts warrant more secure (cold) storage
  • How often do you transact?: Frequent traders need accessible (hot) wallets
  • Which assets do you hold?: Ensure wallet supports your specific cryptocurrencies
  • What is your technical comfort?: Some wallets are more user-friendly than others
  • Do you use DeFi applications?: Browser extension wallets integrate with decentralized apps

Related terms

  • Private key: The secret code that controls access to your crypto assets
  • Seed phrase: A recovery phrase (usually 12-24 words) that can restore your wallet
  • Token: Digital assets that your wallet helps you manage
  • Blockchain: The network where your assets actually exist
  • Staking: Using wallet-held assets to support network operations and earn rewards