Back to glossary

Cryptocurrency Wallet

Table of Contents

What is a cryptocurrency wallet?

A cryptocurrency wallet is a digital tool that allows users to securely store, manage, and interact with digital assets like Bitcoin, Ethereum, and other cryptocurrencies. Wallets enable users to send and receive digital currencies, monitor balances, and engage with blockchain-based services, including decentralized applications (dApps) and smart contracts

Wallets vary in their levels of security, accessibility, and control, depending on the type. 

How do cryptocurrency wallets work?

Cryptocurrency wallets don’t store cryptocurrency in a physical sense. Instead, they are interfaces for interacting with blockchains.

When a user creates a wallet, a private key is generated. It is the unique cryptographic code that grants full access to the wallet and proves ownership of its assets. Securing the private key is critical, as anyone with access to it can control its contents.

The wallet optionally also generates a seed phrase (sometimes called “secret phrase” or “mnemonic”), which is typically a series of between 12 to 24 words that act as a readable backup of the private key. The seed phrase is not just a backup of the single key though, it also has the ability to create several private keys, and several wallets. 

One seed phrase can be the backup for an unlimited number of private keys
, while one private key is only associated with one account or address. A seed phrase allows users to recreate the wallet using any compatible app and recover access if the wallet is lost. 

Like the private key, the seed phrase grants complete access to all private keys generated by the phrase, and therefore all the wallet’s contents and must be kept private and secure.

From the private key, a public key is derived, which is then hashed to create the wallet’s blockchain address. Both the public key and address can be shared publicly to receive funds, while the private key stays hidden.

When making a transaction, the wallet uses the private key to create a digital signature, confirming the user’s authority without exposing sensitive information.

Once a transaction is signed, the wallet broadcasts it to the blockchain network. There, it’s validated by nodes and added to the ledger.

Because the private key is the only way to access and control one’s cryptocurrency, its security is critical. If it’s lost and not backed up, access to the funds is lost forever. That’s why users must follow security best practices, such as creating backups, using cold storage (offline wallets), and enabling multi-factor authentication.

Types of cryptocurrency wallets

Cryptocurrency wallets come in many forms, but the most meaningful distinction is between custodial and non-custodial wallets, followed by whether they are hot or cold wallets. 

Each option offers trade-offs between convenience, accessibility, and security. Your choice depends on how much crypto you hold, how often you transact, and how comfortable you are managing your own security.

Custodial vs non-custodial wallets

Custodial wallets are managed by third-party services (such as centralized exchanges like Coinbase or Binance). In this setup, the provider holds the user’s private keys and manages security and backups on their behalf. While custodial wallets are convenient and beginner-friendly, they remove direct ownership and control of funds from the user.

Best for:

  • Beginners looking for ease of use
  • Users who prefer someone else to handle security and recovery
    Users trading primarily on centralized exchanges

Pros:

  • Easy onboarding and account recovery
  • No need to manage private keys directly
  • Often includes customer support

Cons:

  • "Not your keys, not your crypto" - reliance on third parties
  • Risk of account freezes, hacks, or custodial insolvency


Non-custodial wallets
give users full control over their private keys and funds. This approach aligns with the core philosophy of crypto: financial self-sovereignty. However, it also requires users to take complete responsibility for their security.

Best for:

  • Users prioritizing self-sovereignty and control
  • Decentralized finance (DeFi) users and active web3 participants
  • Institutional users seeking decentralized treasury management

Pros:

  • Full control of your crypto assets
  • No reliance on intermediaries
  • Necessary for interacting with DeFi and dApps

Cons:

  • Losing your keys or seed phrase means losing your funds
  • Requires diligent security practices and backups

Feature Custodial wallets Non-custodial wallets
Private key control Held by a third-party provider Held by the user
Ease of use Very high, beginner-friendly Moderate to advanced
Recovery options Provider-managed recovery User-managed (private key or seed phrase required)
Ideal for Beginners, centralized exchange users DeFi, web3 users, self-sovereignty advocates
Security risks Platform hacks, withdrawal freezes User error, lost keys, or seed phrases
Examples Coinbase, Kraken MetaMask, Trezor, Ledger

Hot wallets vs cold wallets

After deciding between custodial and non-custodial control, the next key decision is whether to use a hot wallet (internet-connected) or a cold wallet (offline storage).

Hot wallets are connected to the internet, making them fast and convenient for everyday use, especially for those interacting with web3 apps, DeFi platforms, or frequently trading assets.

Best for:

  • Beginners
  • Active traders
  • Users who prioritize speed and accessibility

How they work: Hot wallets store private keys on internet-connected devices like browsers or mobile apps. While convenient, this makes them vulnerable to hacking, phishing, and malware.

Common use cases:

  • Daily transactions
  • NFT purchases
  • Voting in decentralized autonomous organizations (DAOs)
  • Short-term storage of small to medium-sized holdings

Pros:

  • Fast setup and intuitive interfaces
  • Seamless interaction with DeFi apps and NFT platforms
  • Perfect for short-term asset storage

Cons:

  • Always online, hence more vulnerable to malware, phishing, and supply chain attacks
  • Users are responsible for private key security ("not your keys, not your crypto")
  • Not suitable for storing large amounts of funds

Popular hot wallets:

  • MetaMask: Browser extension and mobile wallet supporting Ethereum and EVM-compatible chains.

  • Rabby: Security-focused alternative to MetaMask with transaction previews.

  • Rainbow: Mobile wallet known for NFT support and beginner-friendly design.

Security tip: Spread your holdings across multiple wallets with separate seed phrases to reduce risk.

Cold wallets store private keys mostly offline, typically with their own hardware, offering superior protection from online threats. They are best suited for long-term investors and users holding large amounts of cryptocurrency.

Best for:

  • Long-term investors (HODLers)
  • Users storing large amounts of cryptocurrency
  • Anyone prioritizing maximum security

How they work: Cold wallets generate and sign transactions offline. Signed transactions are later transferred to an online device for broadcasting, while private keys remain offline.

Common use cases:

  • Long-term storage of crypto holdings
  • Safeguarding digital assets from online threats
  • Institutional or DAO treasury management
  • Inheritance and contingency planning
  • Secure backup of private keys or seed phrases

Pros:

  • More protection against online threats and malicious dApps
  • Ideal for storing larger amounts or longer-term savings
  • Hardware wallets offer physical protection with added authentication layers

Cons:

  • Less convenient for frequent transactions
  • Higher learning curve for setup and use
  • Risk of physical loss or theft; backups are essential

Popular cold wallets:

  • Trezor: A pioneer in hardware wallets with open-source firmware and features like PIN (or Personal Identification Number - a combination of numbers) and passphrase protection.
  • Ledger: Known for its secure element chip and compatibility with multiple blockchain assets.

Security tip: Always buy hardware wallets directly from the manufacturer to avoid tampered devices.

Feature Hot wallets Cold wallets
Internet connection Always online Offline by default
Custodial option Available Non-existent
Ease of use High Moderate to low
Ideal for Daily use, dApps, trading Long-term storage, security
Security risk Higher Lower
Examples MetaMask, Safe, Rabby Trezor, Ledger

Choosing between hot and cold wallets depends on your risk profile and usage patterns. Many security-conscious users use both: a hot wallet for interacting with web3 dApps, and a cold wallet to safeguard their savings. 

For larger holdings, consider combining cold wallets with multi-signature schemes or social recovery for even more robust protection.

Multi-signature wallets

Multi-signature (multi-sig) wallets require multiple parties to approve a transaction before it is executed. These can be deployed using smart contracts and are particularly useful for organizations, DAOs, and users managing significant funds.

How they work
: A multi-sig wallet might require 2-of-3 or 3-of-5 signers to approve a transaction. This eliminates single points of failure and enhances security in collaborative environments. Multi-sig wallets can incorporate both hot and cold wallets as signers.

Pros:

  • Enhanced security through shared approvals
  • Excellent for collaborative fund management
  • Reduces the risks of theft or unilateral mistakes
  • Ideal for the most security-conscious, and the largest amount of funds

Cons:

  • More complex to set up and manage than other wallet types
  • Limited dApp support compared to simpler wallets

Popular multi-sig wallet:

  • Safe: The most widely used multi-sig wallet in the Ethereum ecosystem. It supports hardware wallet integrations and is frequently used by DAOs and web3 protocols.

Use case tip: Multi-sig wallets are recommended for securing treasuries or as an added layer for cold storage, combining flexibility with strong security.

Use cases of cryptocurrency wallets

In addition to storing digital assets, cryptocurrency wallets play a central role in personal finance, business operations, and blockchain ecosystems (including DAOs, supply chain tracking, identity verification, and even voting systems).

Below are some key use cases that highlight their growing relevance in the digital economy:

  1. Secure storage: Non-custodial wallets provide a safe environment for storing digital assets by encrypting and protecting private keys. Unlike traditional banks, they give users full control over their funds with no intermediaries required. Hardware wallets and cold storage solutions take this a step further, keeping assets offline to reduce exposure to hacks and cyber threats.

  2. Asset management: Modern wallets allow users to track, organize, and manage diverse crypto portfolios. Advanced options include built-in analytics, real-time price tracking, and integration with decentralized exchanges (DEXs) for seamless asset swaps from within a single interface.

  3. E-commerce and online payments: Many wallets support purchases at both online and brick-and-mortar stores that accept crypto. Some also integrate with payment gateways like BitPay and CoinGate, allowing users to pay for goods and services in Bitcoin, Ethereum, and other tokens.

  4. Access to dApps: dApps require a wallet for login and transactions. Wallets like MetaMask and Trust Wallet let users interact with DeFi platforms, NFT marketplaces, blockchain games, and more without depending on centralized platforms.

  5. Identity verification and digital signatures: Some wallets enable users to authenticate their identity without passwords (e.g., when logging into dApps or decentralized services), sign documents, or execute smart contracts using cryptographic keys. This is key for emerging decentralized ID systems prioritizing privacy and self-sovereign identity.

  6. Peer-to-peer (P2P) trading: Some wallets include P2P trading tools that allow users to buy and sell crypto directly with others without an exchange. Smart contracts and built-in escrow features help secure the process and reduce fraud.

  7. Cross-border transactions and financial inclusion: Non-custodial crypto wallets enable unbanked and underbanked populations to access financial services. With just a smartphone and internet access, users can store assets, make transactions, and access digital finance without a traditional bank account.


These diverse use cases make cryptocurrency wallets essential for individuals and businesses in the digital economy.


For an in-depth exploration of the best web3 wallets, check out
Cyfrin’s guide to the best web3 wallets.

Related Terms

No items found.