Software wallets Software wallets is a broad category of software applications that allow users to manage and transfer digital assets, and sign messages. These can be hot or cold wallets. They can be run as desktop apps, mobile apps, web extensions, or web wallets. There are several modes in which software wallets can operate. They have an inverse relationship with regard to trustlessness and computational requirements. •
Full clients verify transactions directly by downloading a full copy of the blockchain (over 670 GB ). They do not require trust in any external parties. Full clients check the validity of mined blocks, preventing them from transacting on a chain that breaks or alters network rules. Because of its size and complexity, downloading and verifying the entire blockchain is not suitable for all computing devices. •
Lightweight clients consult full nodes to send and receive transactions without requiring a local copy of the entire blockchain (see
simplified payment verification –
SPV). This makes lightweight clients much faster to set up and allows them to be used on low-power, low-bandwidth devices such as smartphones. When using a lightweight wallet, however, the user must trust full nodes, as it can report faulty values back to the user. Lightweight clients follow the longest blockchain and do not ensure it is valid, requiring trust in full nodes. Third-party internet services called
online wallets or
webwallets offer similar functionality but may be easier to use. In this case, credentials to access funds are stored with the online wallet provider rather than on the user's hardware. As a result, the user must have complete trust in the online wallet provider. A malicious provider or a breach in server security may cause entrusted crypto to be stolen. An example of such a security breach occurred with
Mt. Gox in 2011.
Cold storage "Cold storage" simply means keeping the private keys out of reach of hackers by storing or generating them on a device that is
not connected to the internet. The credentials necessary to spend crypto can be stored offline in a number of different ways, from simple paper printouts of private keys, to specialized hardware wallets.
Paper wallets A paper wallet is created with a keypair generated on a
computer with no internet connection; the private key is written or printed onto the paper and then erased from the computer. with a private key accessible under a
security hologram in a recess struck on the
reverse side. The security hologram
self-destructs when removed from the token, showing that the private key has been accessed. Originally, these tokens were struck in brass and other
base metals, but later used
precious metals as bitcoin grew in value and popularity. Coins with stored face value as high as ₿1,000 have been struck in gold. The
British Museum's
coin collection includes four specimens from the earliest series of funded bitcoin tokens; one is currently on display in the museum's money gallery. In 2013, a
Utah manufacturer of these tokens was ordered by the
Financial Crimes Enforcement Network (FinCEN) to register as a
money services business before producing any more funded bitcoin tokens. Because hardware wallets never expose their private keys, even computers that may be compromised by malware do not have a vector to access or steal them.The user sets a passcode when setting up a hardware signer. Multisignature wallets are designed to increase security by requiring a predefined threshold of signatures from independent private keys to authorize any transaction. In deterministic multisig wallets, a hierarchy of keys (often following a dedicated path such as `m/48'`) allows multiple participants to derive compatible public keys from a single master seed while maintaining independent private key control. There are various use cases for multisignature wallets, including enhanced security,
treasury management, partnership management,
escrow services,
inheritance planning,
regulatory compliance and backup recovery. == Technology ==