Wallet Types Compared

[ GUIDE / WALLET TYPES ]

Wallet Types Comparison

13 min read · Guide 4 of 7

Hot wallets, cold storage, hardware devices, multi-sig — understand the trade-offs of each approach and pick the right tool for your needs and threat model.

What is the difference between a hot wallet and cold storage?

Hot Wallets vs. Cold Storage

The most fundamental distinction in wallet types is whether the private keys are ever exposed to an internet-connected device.

Hot Wallets

Hot wallets are connected to the internet — mobile apps, browser extensions, desktop software. They provide convenience for everyday transactions but introduce risk because the keys exist on a device that could be compromised by malware, phishing, or remote exploits.

  • Mobile wallets (e.g., BlueWallet, Muun) — portable, QR code scanning, ideal for in-person payments
  • Browser extensions (e.g., MetaMask, Rabby) — direct interaction with DeFi protocols and dApps
  • Desktop wallets (e.g., Sparrow, Electrum) — full-featured, larger display, suitable for advanced UTXO management

Cold Storage

Cold storage keeps your private keys completely offline — on hardware wallets, air-gapped computers, or physical media like metal seed plates. The keys never touch a network-connected device, making them immune to remote attacks.

A practical strategy is to maintain a small "spending" balance in a hot wallet for daily use, while keeping the majority of holdings in cold storage — like carrying pocket cash while the rest stays in a vault.

Rule of Thumb Only keep in a hot wallet what you can afford to lose. If you wouldn't carry that amount in cash on the street, it should be in cold storage.

How do hardware wallets protect your cryptocurrency?

Hardware Wallets

Hardware wallets are dedicated physical devices designed with a single purpose: securely storing private keys and signing transactions. They contain a secure element chip that isolates key material from the host computer.

How They Work

  1. A companion app on your computer or phone prepares the transaction (recipient, amount, fee)
  2. The unsigned transaction is sent to the hardware wallet via USB, Bluetooth, or QR code
  3. The device displays transaction details on its own trusted screen for verification
  4. You physically confirm on the device (button press or touchscreen)
  5. The device signs the transaction internally using the secure element
  6. Only the signed transaction is returned — the private key never leaves the device

Key Features to Evaluate

  • Secure element — does the device use a certified chip (CC EAL5+ or equivalent)?
  • Open-source firmware — can the community audit the code?
  • Air-gap capability — can the device sign via QR codes without any cable connection?
  • Multi-coin support — does it support the blockchains you use?
  • Trusted display — does the device have its own screen for verifying transaction details?
Supply Chain Safety Always purchase hardware wallets directly from the manufacturer. Third-party sellers, marketplace listings, and "used" devices introduce supply chain risk — the device may have been tampered with to extract your keys silently.

What is the difference between custodial and self-custodial wallets?

Custodial vs. Self-Custodial

The distinction between custodial and self-custodial is perhaps the most important decision in crypto. It determines who ultimately controls your funds.

Custodial Wallets

With a custodial wallet (exchange accounts like Coinbase, Binance, Kraken), a third party holds your private keys. This is convenient — no seed phrases to manage, easy password recovery — but introduces counterparty risk:

  • The exchange could be hacked (Mt. Gox lost 850,000 BTC in 2014)
  • The company could become insolvent (FTX collapsed in 2022, losing $8B+ in customer funds)
  • Your account could be frozen due to regulatory action, compliance issues, or internal policy
  • Withdrawal limits or delays may prevent you from accessing your own funds
  • You have no cryptographic proof of ownership — just a database entry

Self-Custodial Wallets

Self-custodial wallets give you full control. You hold your keys, you own your assets — no intermediary can block access, freeze funds, or deny withdrawals. The trade-off is full responsibility: if you lose your seed phrase, no one can help you recover.

"Not your keys, not your coins." This phrase captures the fundamental principle of self-custody: if you don't control the private keys, you don't truly own the cryptocurrency — a core principle of self-sovereignty — you hold an IOU from a third party.

How do you choose the right crypto wallet for your needs?

Choosing the Right Wallet

There is no single "best" wallet — the right choice depends on your holdings, usage patterns, and threat model.

For Beginners

Start with a reputable self-custodial mobile wallet. Learn the basics: receiving, sending, backing up your seed phrase. Practice with small amounts before moving larger sums.

For Regular Users

Combine a hardware wallet for savings with a hot wallet for daily spending. The hardware wallet holds the bulk of your funds in cold storage; the hot wallet holds what you need for the week.

For High-Value Holdings

Consider multi-signature setups (2-of-3 or 3-of-5), air-gapped signing, and geographically distributed backups. Use a BIP39 passphrase to create hidden wallets. Document your setup for inheritance planning.

Key Principle Security should scale with holdings. A $500 portfolio doesn't need the same setup as a $500,000 portfolio. Over-engineering small amounts wastes time; under-securing large amounts risks catastrophic loss.

What should you check when buying and setting up a hardware wallet?

Hardware Wallet Purchase & Lifecycle Checklist

A hardware wallet is only as trustworthy as its supply chain and firmware. Buying the right device from the right source — and knowing when to upgrade — is a critical part of your security posture.

Why You Must Never Buy From Resellers or Intermediaries

Purchasing a hardware wallet from Amazon, eBay, AliExpress, or any third-party seller introduces a supply chain attack vector that can completely undermine the device's security:

  • Pre-seeded devices — the attacker opens the package, initializes the wallet, records the seed phrase, repackages the device with a "recovery card" pre-filled with the attacker's seed. The victim loads funds onto a wallet the attacker already controls.
  • Modified firmware — the attacker replaces or patches the firmware to exfiltrate seeds, leak private keys through covert channels, or generate weak entropy that the attacker can predict.
  • Hardware tampering — physical implants (additional chips, modified circuits) can intercept signing operations or transmit data wirelessly.
  • Counterfeit devices — entirely fake devices that look identical to the original but contain no secure element and no genuine security protections.

These are not theoretical attacks. Documented cases include Ledger devices sold on eBay with pre-filled seed cards, and Trezor clones on AliExpress that passed visual inspection but contained modified microcontrollers.

Only One Safe Source Always purchase directly from the manufacturer's official website. Not from their Amazon "official store," not from a "certified reseller" — from the manufacturer directly. The small savings from a third-party seller is not worth the risk of losing everything.

Why You Should Buy the Latest Hardware Wallet Models

Hardware wallet security is not static. Each new generation addresses vulnerabilities discovered in previous models and incorporates improved hardware protections:

  • Secure element upgrades — newer chips have stronger side-channel resistance, better fault-injection protection, and higher certification levels (EAL6+ vs. EAL5+)
  • Firmware architecture improvements — newer models often redesign the trust boundary between the secure element and the main processor, reducing the attack surface
  • Better randomness — improved hardware random number generators (TRNG) with multiple entropy sources and health checks
  • Physical tamper detection — newer devices include tamper-evident enclosures, voltage sensors, and mesh shields that older models lack

Real Vulnerabilities in Older Models

The "old but working" mentality is dangerous in hardware security. Older models have known, published vulnerabilities that attackers can exploit with physical access:

  • Trezor One / Trezor T — voltage glitching attacks demonstrated by security researchers (Kraken Security Labs, 2020) can extract the seed from the device's flash memory in approximately 15 minutes of physical access. This is possible because these models lack a certified secure element.
  • Ledger Nano S (original) — early firmware versions were vulnerable to supply chain attacks due to weaker attestation mechanisms. Fixed in later firmware, but hardware limitations remain.
  • KeepKey — similar architecture to Trezor One, vulnerable to the same class of fault-injection attacks due to the use of a general-purpose microcontroller without a secure element.

When and How to Migrate to a New Device

Consider upgrading your hardware wallet when:

  • The manufacturer announces a security advisory affecting your model that cannot be patched in firmware alone
  • Your device model has reached end of life and no longer receives firmware updates
  • A new generation offers fundamentally better hardware protection (e.g., adding a secure element where the old model had none)
  • Your holdings have grown to a level where the cost of a new device is negligible compared to the value it protects

Migration procedure:

  1. Purchase the new device directly from the manufacturer
  2. Initialize the new device and generate a new seed phrase (do not reuse the old seed)
  3. Create proper physical backups of the new seed on metal
  4. Transfer funds from the old wallet to the new wallet via on-chain transactions
  5. After confirming all funds have moved, factory-reset the old device
Why Generate a New Seed? If your old device had a hardware vulnerability, the seed could have been compromised without your knowledge. Generating a fresh seed on the new, more secure hardware ensures you are starting clean. The cost is a single on-chain transaction fee — a small price for certainty.

How do multi-signature wallets work?

Multi-Signature (Multi-Sig) Wallets

Multi-sig wallets require M-of-N signatures to authorize a transaction. The spending conditions are encoded directly into the Bitcoin script, meaning the blockchain itself enforces the policy — no single compromised key can move funds.

Common Configurations

  • 2-of-3 — ideal for personal use. Keys distributed across three locations (e.g., phone, hardware wallet, metal backup in a safe). Any two can sign, so losing one doesn't lock you out.
  • 3-of-5 — suited for organizations. Five key holders (board members, executives), any three must approve. Tolerates two simultaneous compromises or losses.
  • 2-of-2 — collaborative custody or family setups where both parties must agree to spend.

Script Implementations

Bitcoin supports native multi-sig through several script types:

  • P2SH — the multi-sig script is hashed and the hash goes on-chain. The full script and all signatures are provided at spending time.
  • P2WSH — SegWit version, moves witness data to save block space and reduce fees.
  • P2TR (Taproot) — with MuSig2 key aggregation, an M-of-N setup can appear as a single-signature output on-chain when all parties cooperate, improving privacy and reducing fees. The multi-sig fallback is encoded in a Tapscript leaf.
Recovery Complexity Multi-sig wallets require not just the seed phrases but also the wallet configuration file (often called the "wallet descriptor" or "multisig coordination file") containing the xpubs of all cosigners, the quorum policy (M-of-N), and derivation paths. Back up this file alongside your seeds.

How does air-gapped signing with PSBTs work?

Air-Gapped Signing and PSBTs

Air-gapped wallets provide the strongest isolation by ensuring the signing device never connects to any network — not via USB, Bluetooth, Wi-Fi, or NFC. Transactions are transferred via QR codes or microSD cards using the PSBT format (BIP174 / BIP370).

PSBT Workflow

  1. The watch-only wallet (online) creates an unsigned PSBT containing transaction inputs, outputs, and metadata
  2. The PSBT is transferred to the air-gapped signer via animated QR codes or SD card
  3. The signer validates the transaction on its trusted display, adds its signature, and outputs a partially or fully signed PSBT
  4. The signed PSBT is transferred back to the watch-only wallet
  5. The wallet finalizes and broadcasts the fully signed transaction to the network

PSBT Structure

A PSBT (Partially Signed Bitcoin Transaction) is a serialization format that carries all information needed for a signer to validate and sign:

  • Global fields — unsigned transaction, xpub metadata
  • Per-input fields — UTXO details, derivation paths, partial signatures, redeem/witness scripts
  • Per-output fields — derivation paths for change outputs (so the signer can verify change goes back to the same wallet)

The PSBT format is what makes multi-sig and air-gapped setups practical. Multiple signers can each add their signature independently, without ever needing to be online at the same time or share private keys.

What are MPC wallets and threshold signatures?

MPC Wallets and Threshold Signatures

Multi-Party Computation (MPC) wallets split the key generation and signing process across multiple parties using cryptographic protocols. Unlike multi-sig, the complete private key never exists in one place — not even during key generation.

How MPC Signing Works

  1. Distributed Key Generation (DKG) — each party generates a key share. The shares are created through an interactive protocol where no single party sees the full key.
  2. Threshold Signing — to sign a transaction, a threshold of parties (e.g., 2 of 3) run an interactive signing protocol. Each contributes a partial signature from their share.
  3. Signature Combination — the partial signatures are combined into a standard ECDSA or Schnorr signature that is indistinguishable from a single-signer signature on-chain.

MPC vs. Multi-Sig

Key Differences Multi-sig encodes the M-of-N policy in the blockchain script — it is visible on-chain and requires blockchain-specific support. MPC produces standard single-signature transactions, meaning it works across any blockchain (including those without native multi-sig), reduces fees, and reveals nothing about the signing setup. The trade-off is more complex key management and the need for interactive signing sessions.

Use Cases

  • Institutional custody — distribute signing authority across geographic regions and organizational roles
  • Cross-chain security — enforce threshold policies on chains that don't support multi-sig natively
  • Key rotation — MPC supports proactive share refresh, allowing key shares to be rotated without changing the on-chain address

How do secure elements and firmware verification protect hardware wallets?

Secure Elements and Firmware Verification

The security of a hardware wallet ultimately depends on its hardware architecture and the integrity of its firmware. Two critical components:

Secure Element (SE)

A secure element is a tamper-resistant chip designed to store and process sensitive data. Key properties:

  • Side-channel resistance — shielded against power analysis, electromagnetic emissions, and timing attacks
  • Fault injection protection — detects voltage glitching, laser fault injection, and clock manipulation
  • Certified evaluation — chips like the ST31/ST33 series undergo Common Criteria certification (EAL5+/EAL6+)
  • Monotonic counter — prevents rollback attacks on firmware versions

Firmware Verification

Before trusting a hardware wallet, verify the firmware is authentic and unmodified:

  • Deterministic builds — open-source wallets allow anyone to compile the firmware and compare the hash against the released binary
  • Signed firmware updates — the device should only accept updates cryptographically signed by the manufacturer
  • Attestation — some devices support remote attestation, proving the secure element is running expected code
Evaluation Tip The most secure hardware wallet is one that combines an open-source firmware (auditable by the community) with a certified secure element (resistant to physical attacks). Avoid devices where either the firmware or the chip is proprietary and unauditable.

[ FREQUENTLY ASKED QUESTIONS ]

FAQ

Test Your Knowledge

Take a quick quiz to check your understanding of this guide.

Take the Quiz