Chainalysis – a commonly used blockchain data company – recently invested in an unspecified amount of Bitcoin. The investment comes as Bitcoin's price creeps ever closer to all-time highs and surpasses its market cap record from May. Chainalysis Plans to HODL The data provider announced its latest investment in a blog post today and simultaneously confirmed a new partnership with NYDIG. NYDIG is a Fintech service provider for banks, corporations, and institutions. The financial company has allowed Chainalysis to add…
Asymmetric Cryptography or Public/Private Key Cryptography is the backbone of the modern information society. They comprise two uniquely related cryptographic keys (basically long random numbers) where the key pair are mathematically related. Whatever is encrypted with a Public Key may only be decrypted by its corresponding Private Key and vice versa. Public Key Cryptography can, therefore, achieve Confidentiality.
For asymmetric encryption to deliver confidentiality, integrity, and authenticity, users and systems need to be certain that a public key is authentic, that it belongs to the person or entity claimed, and that it has not been tampered with nor replaced by a malicious third party.
Cryptographic wallets are built on the principle of Asymmetric Cryptography. With Public keys and Private keys, one can store assets, have them linked to a wallet, and spend later. The entire area of Distributed technologies starting with Bitcoin used this principle to engage in the digital transfer effectively.
To learn more about wallets, let us look at the several types of wallets in the market.
To transact with other people or entities using bitcoin, one usually accesses the internet to propagate assets’ transfer. A hot wallet refers to any cryptocurrency wallet that is connected to the internet. Generally, hot wallets are easier to set up, access, and accept more tokens. But hot wallets are also more susceptible to hackers, possible regulation, and other technical vulnerabilities.
Operating a “hot wallet” is also a risk to its owner because most computer systems have hidden vulnerabilities of some sort that can eventually be used by hackers or malware to break into the system and steal the bitcoins. It is generally considered that keeping large amounts of bitcoins in a hot wallet is a fundamentally poor security practice. Most, if not all, of the Bitcoin losses incurred in all the known hackings in Bitcoin history, can be attributed to funds kept in hot wallets. Hot wallets are known to be immensely secure, and for that reason, people use mechanisms like Cold Wallets and Hardware Wallet.
Cold storage refers to any cryptocurrency wallet that IS NOT connected to the internet. Generally, cold storage is more secure, but they don’t accept as many cryptocurrencies as many of the hot wallets because they are linked to one public-private key pair. Cold Storage offers little to no flexibility but high security.
Users looking for cold storage options can also opt for offline software wallets, which are quite similar to hardware wallets but are a more complex process for less technical users. An offline software wallet splits a wallet into two accessible platforms – an offline wallet containing the private keys and an online wallet with the public keys stored. The online wallet generates new unsigned transactions and sends the user’s address to the receiver or sender on the other end of the transaction.
Cold Wallets can then be divided into two, Paper Wallet and Hardware Wallets.
The most basic form of cold storage is a paper wallet. A paper wallet is simply a document that has the public and private keys written on it. The document is printed from the bitcoin paper wallet tool online with an offline printer. The paper wallet or document usually has a QR code embedded on it to be scanned and signed to make a transaction easily. The drawback to this medium is that if the paper is lost, rendered illegible, or destroyed, the user will never access his address where his funds are.
Paper wallets are easy to use and provide a very high level of security. Using a paper wallet is relatively straightforward. Transferring Bitcoin or any other currency to your paper wallet is accomplished by transferring funds from your software wallet to the public address shown on your paper wallet. Alternatively, if you want to withdraw or spend currency, all you need to do is transfer funds from your paper wallet to your software wallet. This process, often referred to as ‘sweeping,’ can either be done manually by entering your private keys or scanning the paper wallet’s QR code.
N.B.: Paper wallets were very popular between 2011 and 2016, as there were very few options to store Bitcoin and other cryptocurrencies. Paper wallets are now considered obsolete and even dangerous to store your cryptocurrency on. It’s best to avoid them if you don’t know for sure what you are doing.
A Hardware wallet is a physical, electronic device designed to protect an individual’s cryptocurrency funds by securing their private keys. The idea behind hardware wallets is to separate the private keys from online storage methods, such as computers or smartphones, which are more susceptible to being compromised by hackers. Storing your private keys offline prevents this, as hackers would have to physically steal your hardware wallet to access a user’s private keys.
There is a huge market for hardware wallets service providers. Each wallet with specific features of their own such as a wide range of supported coins, increased factor authentication, additional flexibility, and so on.
Custodial Wallets are services and exchanges that don’t provide you access to private keys and store them on servers. The main advantage of custodial wallets is that you can restore your account access if you’ve lost your password. The bad news is they can freeze your funds in case of maintenance or due to KYC requirements. There is always a risk that your money may be stolen in case of hacking attacks.
Some investors choose to keep their cryptocurrencies in accounts linked to popular exchanges like Bitstamp or Poloniex. These companies, which hold your funds within their infrastructure, can be considered hot wallet service providers. This means that if an attacker gains access to the Poloniex servers and infiltrates their customer accounts, you might suffer a loss. Because many of the top digital currency exchanges allow users to transfer between various fiat currencies and cryptocurrencies, it’s common for most users to hold a small amount of any of several currencies in their accounts.
A custodial wallet is considered as the weakest link in the cryptocurrency space. Time has shown that it is incredibly easy to manipulate loopholes and steal funds from a custodial wallet.
While we still have a very long way to go before purchasing and storing cryptocurrency becomes accessible for the mainstream and non-technical audiences, an old saying goes, states, “there is a long way to go for innovation” as well. Innovation in the wallet space is immensely important, as most applications are too dense and technical for a wide and general audience. To achieve greater global adoption, creative innovators need to minimize technicalities and maximize ease-of-use.
There is no rigid answer when talking about which wallet one must choose to maintain their cryptocurrency balances. It all depends on the individual’s preferences. If the individual prefers to have crypto bought and sold regularly and assumes the centralization risk, a custodial wallet is more than enough. But if an individual wishes greater flexibility and security and does not want to take the risk of giving it to someone else, a hot wallet is the best choice. Users need to have a thorough research before getting into any long-term commitment.
Crypto Adventure has prepared you a list of the most trusted cryptocurrency wallets of all types. Pick your favorite!