
Connecting Injective: Hyperlane Opens the inEVM Bridge
Modular expansion is coming to the Injective ecosystem. Hyperlane is bringing permissionless interoperability and the first bridge between Injective and their inEVM rollup. Hyperlane now enables the Injective ecosystem to permissionlessly scale to more chains and more VMs than ever before. The inEVM bridge is now live on mainnet. Start exploring the inEVM now.What is Injective and inEVM?Injective is a Cosmos blockchain supporting CosmWasm smart contracts and out-of-the-box modules such as a c...

What Is DeBank?
DeBank is a DeFi dashboard that tracks over 800 protocols on more than 15 different chains. It provides users with a simple overview of their holdings, positions, outstanding debt on loans and pending rewards. The project has gained interest from some well-known funds raising over $25 Million for further development. These names include Coinbase Ventures, Crypto.com, Circle Ventures and others.How To Use DeBank?After connecting your wallet to the website, you may need to verify your address t...

What Is Cyberpunk?
Cyberpunk is a sub-genre of science fiction that features advanced science and technology in an urban, dystopian future. On one side you have powerful mega-corporations and private security forces, and on the other you have the dark and gritty underworld of illegal trade, gangs, drugs, and vice. In between all of this is politics, corruption, and social upheaval.“High tech. Low life.”Cyberpunk is also a culture with attitude and a distinct style. Anti-authoritarian, brand-averse, tech-literat...
The world of cryptocurrencies, innovations and the future

Subscribe to Inspired by life

Connecting Injective: Hyperlane Opens the inEVM Bridge
Modular expansion is coming to the Injective ecosystem. Hyperlane is bringing permissionless interoperability and the first bridge between Injective and their inEVM rollup. Hyperlane now enables the Injective ecosystem to permissionlessly scale to more chains and more VMs than ever before. The inEVM bridge is now live on mainnet. Start exploring the inEVM now.What is Injective and inEVM?Injective is a Cosmos blockchain supporting CosmWasm smart contracts and out-of-the-box modules such as a c...

What Is DeBank?
DeBank is a DeFi dashboard that tracks over 800 protocols on more than 15 different chains. It provides users with a simple overview of their holdings, positions, outstanding debt on loans and pending rewards. The project has gained interest from some well-known funds raising over $25 Million for further development. These names include Coinbase Ventures, Crypto.com, Circle Ventures and others.How To Use DeBank?After connecting your wallet to the website, you may need to verify your address t...

What Is Cyberpunk?
Cyberpunk is a sub-genre of science fiction that features advanced science and technology in an urban, dystopian future. On one side you have powerful mega-corporations and private security forces, and on the other you have the dark and gritty underworld of illegal trade, gangs, drugs, and vice. In between all of this is politics, corruption, and social upheaval.“High tech. Low life.”Cyberpunk is also a culture with attitude and a distinct style. Anti-authoritarian, brand-averse, tech-literat...
Share Dialog
Share Dialog
<100 subscribers
<100 subscribers


Unlike traditional securities that are typically bought, sold and held through a brokerage house, cryptocurrencies allow investors to manage and transfer their assets entirely peer-to-peer. For some, a major attraction of the digital-asset ecosystem is the ability to take custody of assets without the need for intermediaries like banks and brokers. Unfortunately, that means if you lose the seed phrase or private key to the wallet that holds your tokens– equivalent to passwords for online investment accounts–you lose your crypto. There is no email recovery or customer support in the world of self-custodied cryptocurrency wallets.
Luckily, there is a wide range of wallet options that lie on a spectrum from completely self-controlled to completely outsourced. Digital-asset holders should consider what is best for their personal situations. With options like cold storage (explained below), your personal security practices can matter greatly.
For the extremely risk-averse, there are ways to gain exposure to cryptocurrencies via traditional financial markets that provide third-party custody, usually through a broker. These include futures contracts and exchange-traded funds that invest in them, over-the-counter trust and publicly traded companies with crypto holdings or a dedicated business strategy in the industry including MicroStrategyMSTR -0.9%, a business-software company that keeps buying bitcoin; money-transfer specialist Square; and miners Riot Blockchain and Marathon Digital.
For those who elect to hold their digital assets outside of the traditional financial arena, deciding what kind of wallet to use is a must. The main options are: custodial versus non-custodial and hot versus cold. Users then have to select a specific wallet from those possibilities. Each option provides trade-offs between ownership, ease of use, and security.
Custodial wallets are those that are held by someone on your behalf. If you keep assets on centralized exchanges like Coinbase, Kraken or Gemini, you have to use a custodial wallet. Custodial wallets are by far the most convenient because accessing your crypto is the same as a login experience for an online broker.
Custodial wallets can be appropriate for the average crypto investor whose digital assets make up a small percentage of an overall portfolio. It also makes sense if you do not trust in your ability to store crypto. Having a custodial wallet involves opening an account with a third party. You use a username, password and typically a two-tier verification system like a personal-identification number or randomized authentication code. Users can also easily linklink -0.2% a bank account to make instant purchases and verify one’s identity to increase spending limits or send and receive crypto. Instead of share price, these wallets show the number of digital assets held and the portfolio value.
The biggest risk to custodial wallets are exchange hacks and the custodian becoming insolvent. Sophisticated exchanges will typically hold most of their coins in cold storage, have multifaceted authenticity measures and use complex firewalls. However, this does not mean that they are immune to attack. In 2019, hackers stole $40 million of bitcoin in an orchestrated attack that used phishing scams and viruses against the popular Binance exchange. Furthermore, as seen with centralized finance lending platforms and exchanges like CelsiusCEL 0.0%, Voyager, and FTX, these institutions can freeze accounts and withdrawals if they face liquidity issues. Relying on third parties is easy, but it brings its own set of risks.
This category comes in two temperatures: hot and cold. Hot wallets are those that require an internet connection to access. They can be in desktop, web or mobile form. Cold wallets do not rely on the internet. Cold wallets are physical devices that are nearly impossible to compromise because they are not connected to the internet.
Hot wallets are sometimes referred to as software wallets.
Desktop wallets keep a user’s private keys stored on the computer’s hard drive. Desktop wallets are relatively easy to use. Examples include Exodus Wallet and Atomic Wallet for multiple digital assets or Electrum and Bitcoinbitcoin +0.5%BTC 0.0% Core specifically for the Bitcoin network.
Unfortunately, desktop wallets can be susceptible to malware. A trend with non-custodial wallets is that your assets are as secure as your individual security practices– and people fall victim to phishing scams quite regularly. Between 2019 and 2020, hackers stole over $22 million of bitcoin from Electrum wallets by sending users fake messages telling them to update their software. When this was done, malware was installed that stole their funds the next time they logged into their desktop wallets. Such events can be avoided by retaining the official version of the software or only downloading updates from the official website.
Another kind of hot wallet is web-based. Web wallets include MetaMask, Phantom and Trust Wallet. Coinbase also offers a version for users that prefer self-custody. These wallets do not store private keys or personal information. They also allow users to sign transactions and interact with blockchain protocols. In addition, many popular decentralized applications have built integrations with these wallets to make it easy for users to access their crypto holdings when using them. For these reasons, they are the most popular type of non-custodial wallet. Like desktop wallets, they can also be subject to phishing scams and malware.
Storing your digital assets offline begins with choosing a hardware wallet. The most popular manufacturers are Ledger and Trezor. Though nefarious actors have been known to try to steal crypto by tampering hardware wallet devices, sometimes by compromising their supply chains, offline storage is by far the most secure because there is no internet connection involved.
With cold wallets, your crypto is as safe as your personal security practices. Theft, loss and physical destruction of the device does not have to mean a permanent loss of assets, as the seed phrase coupled with a new device can be used to recover the funds on a new device. However, theft or loss of both seed phrase and device usually means the assets are not recoverable. If maintaining physical custody sounds stressful, perhaps a custodial wallet or desktop wallet are options to consider.
One common security approach is to rely on custodial or software wallets for digital assets that will be used in the nearnear -2% future and cold storage for long-term savings in a manner similar to checkings and savings accounts with a bank.
Crypto wallet options are a lot like storing physical gold. Some people don’t trust in their own ability to keep the metal secure in a safe at home. They can forget the combination or a thief who found it written down could access the gold. To avoid such anxiety, this kind of person would outsource crypto storage to a third party and have a custodial wallet, though that brings the risk of government confiscation.
“Not your keys, not your coins” is a common refrain among digital-asset aficionados who dislike third-party custody; but let’s be honest, the horror stories of people losing millions of dollars worth of bitcoin by misplacing their private keys are enough for anyone to second guess their ability to self-custody their tokens.
Crypto owners should know their priorities and limitations. For those that only have or want a small amount of exposure, some exchanges are heavily regulated and prioritize security. Dealing with private keys and cold wallets is not for everyone. At the same time, having all your eggs in one basket may not be the safest bet, especially if it involves a large part of your net worth.
Unlike traditional securities that are typically bought, sold and held through a brokerage house, cryptocurrencies allow investors to manage and transfer their assets entirely peer-to-peer. For some, a major attraction of the digital-asset ecosystem is the ability to take custody of assets without the need for intermediaries like banks and brokers. Unfortunately, that means if you lose the seed phrase or private key to the wallet that holds your tokens– equivalent to passwords for online investment accounts–you lose your crypto. There is no email recovery or customer support in the world of self-custodied cryptocurrency wallets.
Luckily, there is a wide range of wallet options that lie on a spectrum from completely self-controlled to completely outsourced. Digital-asset holders should consider what is best for their personal situations. With options like cold storage (explained below), your personal security practices can matter greatly.
For the extremely risk-averse, there are ways to gain exposure to cryptocurrencies via traditional financial markets that provide third-party custody, usually through a broker. These include futures contracts and exchange-traded funds that invest in them, over-the-counter trust and publicly traded companies with crypto holdings or a dedicated business strategy in the industry including MicroStrategyMSTR -0.9%, a business-software company that keeps buying bitcoin; money-transfer specialist Square; and miners Riot Blockchain and Marathon Digital.
For those who elect to hold their digital assets outside of the traditional financial arena, deciding what kind of wallet to use is a must. The main options are: custodial versus non-custodial and hot versus cold. Users then have to select a specific wallet from those possibilities. Each option provides trade-offs between ownership, ease of use, and security.
Custodial wallets are those that are held by someone on your behalf. If you keep assets on centralized exchanges like Coinbase, Kraken or Gemini, you have to use a custodial wallet. Custodial wallets are by far the most convenient because accessing your crypto is the same as a login experience for an online broker.
Custodial wallets can be appropriate for the average crypto investor whose digital assets make up a small percentage of an overall portfolio. It also makes sense if you do not trust in your ability to store crypto. Having a custodial wallet involves opening an account with a third party. You use a username, password and typically a two-tier verification system like a personal-identification number or randomized authentication code. Users can also easily linklink -0.2% a bank account to make instant purchases and verify one’s identity to increase spending limits or send and receive crypto. Instead of share price, these wallets show the number of digital assets held and the portfolio value.
The biggest risk to custodial wallets are exchange hacks and the custodian becoming insolvent. Sophisticated exchanges will typically hold most of their coins in cold storage, have multifaceted authenticity measures and use complex firewalls. However, this does not mean that they are immune to attack. In 2019, hackers stole $40 million of bitcoin in an orchestrated attack that used phishing scams and viruses against the popular Binance exchange. Furthermore, as seen with centralized finance lending platforms and exchanges like CelsiusCEL 0.0%, Voyager, and FTX, these institutions can freeze accounts and withdrawals if they face liquidity issues. Relying on third parties is easy, but it brings its own set of risks.
This category comes in two temperatures: hot and cold. Hot wallets are those that require an internet connection to access. They can be in desktop, web or mobile form. Cold wallets do not rely on the internet. Cold wallets are physical devices that are nearly impossible to compromise because they are not connected to the internet.
Hot wallets are sometimes referred to as software wallets.
Desktop wallets keep a user’s private keys stored on the computer’s hard drive. Desktop wallets are relatively easy to use. Examples include Exodus Wallet and Atomic Wallet for multiple digital assets or Electrum and Bitcoinbitcoin +0.5%BTC 0.0% Core specifically for the Bitcoin network.
Unfortunately, desktop wallets can be susceptible to malware. A trend with non-custodial wallets is that your assets are as secure as your individual security practices– and people fall victim to phishing scams quite regularly. Between 2019 and 2020, hackers stole over $22 million of bitcoin from Electrum wallets by sending users fake messages telling them to update their software. When this was done, malware was installed that stole their funds the next time they logged into their desktop wallets. Such events can be avoided by retaining the official version of the software or only downloading updates from the official website.
Another kind of hot wallet is web-based. Web wallets include MetaMask, Phantom and Trust Wallet. Coinbase also offers a version for users that prefer self-custody. These wallets do not store private keys or personal information. They also allow users to sign transactions and interact with blockchain protocols. In addition, many popular decentralized applications have built integrations with these wallets to make it easy for users to access their crypto holdings when using them. For these reasons, they are the most popular type of non-custodial wallet. Like desktop wallets, they can also be subject to phishing scams and malware.
Storing your digital assets offline begins with choosing a hardware wallet. The most popular manufacturers are Ledger and Trezor. Though nefarious actors have been known to try to steal crypto by tampering hardware wallet devices, sometimes by compromising their supply chains, offline storage is by far the most secure because there is no internet connection involved.
With cold wallets, your crypto is as safe as your personal security practices. Theft, loss and physical destruction of the device does not have to mean a permanent loss of assets, as the seed phrase coupled with a new device can be used to recover the funds on a new device. However, theft or loss of both seed phrase and device usually means the assets are not recoverable. If maintaining physical custody sounds stressful, perhaps a custodial wallet or desktop wallet are options to consider.
One common security approach is to rely on custodial or software wallets for digital assets that will be used in the nearnear -2% future and cold storage for long-term savings in a manner similar to checkings and savings accounts with a bank.
Crypto wallet options are a lot like storing physical gold. Some people don’t trust in their own ability to keep the metal secure in a safe at home. They can forget the combination or a thief who found it written down could access the gold. To avoid such anxiety, this kind of person would outsource crypto storage to a third party and have a custodial wallet, though that brings the risk of government confiscation.
“Not your keys, not your coins” is a common refrain among digital-asset aficionados who dislike third-party custody; but let’s be honest, the horror stories of people losing millions of dollars worth of bitcoin by misplacing their private keys are enough for anyone to second guess their ability to self-custody their tokens.
Crypto owners should know their priorities and limitations. For those that only have or want a small amount of exposure, some exchanges are heavily regulated and prioritize security. Dealing with private keys and cold wallets is not for everyone. At the same time, having all your eggs in one basket may not be the safest bet, especially if it involves a large part of your net worth.
No activity yet