What are the different types of crypto wallets?
Looking for a wallet to store your newly acquired crypto assets? Ever wondered what are the different types of crypto wallets out there? This article will cover all the different types of cryptocurrency wallets available in the market today along with their pros and cons.
First, let's make one thing perfectly clear: Cryptocurrencies are not actually stored in wallets. They are stored at addresses on the blockchain itself. Wallets manage the private keys that grant access to the addresses where the funds are stored.
Suggested Reading: Where are blockchain assets stored?
In this article
Hot vs. Cold Wallets
Before we go into the different types of wallets, it’s good to know the difference between hot and cold wallets. Every type of crypto wallet falls into one of these two categories.
Hot wallets are connected to the Internet while cold wallets are not.
Since hot wallets are connected to the Internet, funds stored in hot wallets are more accessible for uses like day to day trading or payments. However, since they’re connected to the Internet, they’re also susceptible to Internet risks like hacking.
Examples of hot wallets include exchange wallets, web wallets, and software wallets like Exodus. While Exodus puts you in control of your private keys, Exodus is installed on your device and requires Internet access to operate, which poses some risks depending on your security practices.
Cold wallets are not connected to the Internet, making funds stored in them harder to use. Yet, this can be a benefit since hackers and other bad actors can’t get to your assets as easily. Blockchain assets stored in cold wallets usually aren’t used on a frequent basis and instead held for long periods of time. Examples of cold wallets include hardware wallets and paper wallets.
As the name suggests, these are website-based online wallets which require you to open a URL to access the wallet. Most of the time, these wallets have some kind of account system with username and password to login to the wallet.
- Easy to access and don’t require installing anything
- Can benefit from things like advanced buying and selling options (some centralized exchanges)
- Don’t give you control of your private keys or recovery phrase, meaning that you don’t control your money and are entrusting it to someone else (the website owners) to hold onto and protect
- Not very secure since they’re accessed with a web browser (vulnerable to hacks and other exploits) and hosted on a centralized server (honeypot for hackers)
- Don’t always have in-wallet exchange features like other types of wallets
Mobile wallets are mobile phone applications that manage your private keys. If you have Exodus on your phone, you are using a mobile wallet.
- Can be used on the go: especially useful for making in-person payments, such as to merchants who accept crypto
- Most mobile wallets provide full access to private keys and recovery phrases, which means you have full control of your funds
- Can have Internet-based risks depending on the user’s security practices
- Someone could get access to your phone e.g. if you don’t have a password to unlock it and drain your mobile wallet of its funds
As you might have guessed already, desktop wallets are built to be installed and run on desktop computers and laptops. Desktop wallets are the most popular wallets out there due to the features they can offer on powerful desktop platforms like Windows, MacOS, and Linux. If you have Exodus installed on your computer, you are using a desktop wallet.
- Many desktop wallets have a big list of supported assets
- Many also have additional features like built-in exchanges, portfolio charts, etc.
- Like other hot wallets, susceptible to Internet dangers - but usually considered more secure than web wallets depending on the user’s security practices
Security of a desktop wallet depends on the user since these wallets are online wallets. One must maintain the security of the system these desktop wallets are installed on.
Apart from Exodus, some other desktop wallets are Jaxx, Electrum, and Atomic. The desktop wallet category also includes wallets like Bitcoin Core Wallet and Official Monero Wallet from the development teams of assets themselves.
Specially designed hardware devices, such as Trezor, are considered the best in crypto security for storing one's crypto wealth for the long term. These devices can connect to your computer and mobile via USB ports so you can perform send and receive functions. Since Trezor is integrated with Exodus, this is the easiest and most secure way to store and manage your crypto.
- Has top-level security features
- Private keys never leave the hardware wallet protecting them from malware and hackers
- Users approve all transactions on the device itself
- Can be costly for some users (usually upwards of 120 USD)
Yes, you can store digital assets on good old, non-digital paper! Paper wallets are cold wallets (not connected to the Internet) and are usually used for long-term storage of cryptocurrencies. These wallets are also used as gifts—generally to introduce somebody to the blockchain asset world.
- Cold wallet and not prone to Internet dangers
- Not as readily accessible for use like desktop wallets and other hot wallets in things like everyday transactions
- While not connected to the Internet, someone could gain access to the paper wallet and steal your funds
- Can suffer from damage like paper deterioration over time and natural disasters like fires - though in general, damage can be avoided by using stronger materials
Examples of services that allow you to generate paper wallets include WalletGenerator.net and bitaddress.org.
If you would like to learn how to import a paper wallet into Exodus, this guide will help: https://support.exodus.io/article/87-can-i-import-a-private-key
Irrespective of which wallet you choose, if you ever expose your recovery phrase or private keys to a malicious actor, your funds can be easily taken away. No wallet provider can help you get the stolen funds back since blockchain transactions are irreversible. Always ensure you store your recovery phrase and private keys offline—never store them on any device that is connected to the Internet. There are 100s of ways hackers can gain access to your recovery phrase or private keys online.
Here is a detailed security guide on keeping your crypto assets safe: https://support.exodus.io/article/767-how-do-i-keep-my-money-safe
Always ensure you store your recovery phrase and private keys offline—never store them on any device that is connected to the internet. There are 100s of ways hackers can gain access to your recovery phrase or private keys online.