web2 & web3 writer | he/him | find me on twitter: https://twitter.com/kagami_nft
web2 & web3 writer | he/him | find me on twitter: https://twitter.com/kagami_nft
Share Dialog
Share Dialog

Subscribe to kagami

Subscribe to kagami
<100 subscribers
<100 subscribers
Wallet security is a foundational aspect of participating in the overall web3 ecosystem. Strong wallet hygiene and security practices improve the safety of your crypto assets and allow you to navigate web3 with more confidence. While there will always be risks, there are simple basic principles and practices that anyone can implement to build a strong wallet security foundation.
Here are some best practices for improving your wallet and crypto asset safety. These principles help you reduce the risk of catastrophic loss and preserve your ability to participate in web3.
Invest In Security: Wallet security is one of the best investments for anyone. Hardware and multi-signature wallets add a layer of security by requiring additional approvals for any transaction. This makes stealing assets more difficult for malicious actors.
Diversify Your Wallets: Prevent loss by spreading your crypto assets across multiple unique wallets for specific purposes. This reduces the risk of losing all your assets in one account breach.
Understand How Wallets Work: Scammers target people who do not understand how wallets work. This allows scammers to extract important information to gain control of your wallet and quickly transfer your assets out of it.
These principles help you develop your crypto wallet security strategy. Once you understand the basics of how wallets work, you can develop a strategy using the framework included at the end of this article.
Understanding how crypto wallets work will help you navigate through the space, identify potential scams, and develop strong wallet hygiene and security practices.
Wallets are broken down into three core components–a public key, a private key, and a mnemonic (seed) phrase. These pieces allow you to transact on the blockchain, sign transactions, verify ownership, and recover your wallet. Protecting your private key and mnemonic phrase is one of your top security priorities.
The public key is used to receive crypto assets in your wallet. You can think of this as an account number that allows anyone to send a transaction to it. Your public key is condensed and shorted into a wallet address to make it easier for you to share.
Anyone can find your public key and send (airdrop) crypto assets to your wallet. This makes it a common vector of attack. Scammers will airdrop tokens into your wallet in hopes that you will interact with them and sign a malicious transaction with your private key to gain access to the assets in your wallet.
The private key enables you to prove ownership of your crypto assets and send transactions from your wallet. Your private key is used to sign transactions that prove ownership of the assets you want to send. Your private key can also be associated with multiple public keys. You can think of your private key as the password used to access your bank account.
Many scammers will attempt to access one form of your private key (seed phrase) to gain full access to your wallet(s). You should never share your private key with anyone and remember that nobody will ask you for it. Scammers may pose as customer support to help you troubleshoot by asking for your seed phrase or to screen share and have you log into your wallet.
A mnemonic phrase (aka seed phrase) is a unique ordered list of 12 to 24 words that represent your private key. It acts as a recovery phrase that allows you to access your wallet when you need to restore it. You will receive a randomly generated mnemonic phrase when you first set up your wallet.
Storing your mnemonic phrase securely is one of the most important security tasks. The safest way to store it is by writing it down or using a steel capsule. While online storage is convenient, you may lose your crypto assets if your computer or accounts are compromised.
Now that you understand the basic structure of a wallet, it’s important to learn the difference between custodial and non-custodial wallets. The difference comes down to who holds your private key and your assets. This also affects the types of products and services you may interact with in web3.
A custodial wallet holds your assets and private key on your behalf. These are typically managed by a centralized exchange (CEX) like Coinbase, Binance, FTX, or Gemini and where many people first purchase cryptocurrencies. Reputable CEXs provide a balance of convenience and security for first-time crypto users.
Custodial wallets may provide additional security for your assets through insurance coverage, improved private key storage, and easier account recovery. The added convenience comes with the tradeoff that you do not have full control over your funds or the ability to sign transactions. While there are pros and cons, custodial wallets provide a balanced approach for people looking for exposure to cryptocurrencies.
A non-custodial wallet is where you hold your private key and all your assets. Some common non-custodial wallets are MetaMask, Rainbow, and Coinbase Wallet (many CEXs provide non-custodial wallets). This is sometimes referred to as “being your own bank” where you manage and protect your private key and assume the risk associated with interacting with decentralized exchanges (DEXs) and decentralized applications (DApps).
Non-custodial wallets are required to interact with web3 applications like DeFi, NFTs, and DApps. Since you have full ownership of your private key and assets, you must take all the precautions to ensure their safety. This is a lot of responsibility, but there are simple methods to improve your security.
There are three main classifications for non-custodial wallets–hot, cold, and multi-signature. These classifications relate to how often they connect to the internet and the level of security associated with each. People typically combine these classifications as a part of their wallet security strategy.
These wallets are typically web-based, mobile-based, or desktop-based that are always connected to the internet. You can consider these “daily drivers” that you consistently use to interact with web3 like DeFi protocols and NFT marketplaces. Hot wallets provide you with the most convenience and ease to transact on the blockchain.
Hot wallets typically present with the highest risk because you use them consistently and they connect to many different sites. In some cases, you may unknowingly sign a malicious transaction or interact with a malicious contract that places your assets at risk. This is why you may want to use many different hot wallets and only hold a minimal amount of assets in each of them.
These wallets are typically hardware wallets that are small physical devices that only connect to the internet for signing transactions in-device. Hardware wallets require you to plug in or connect via Bluetooth to your computer to sign transactions from the device. Ledger and Trezor are two of the most popular hardware wallets.
Cold wallets provide an additional layer of security for your assets by requiring a signature for any transaction from a separate device. This protects your assets even if you accidentally sign a malicious transaction. This is why hardware wallets are one of the best security investments to protect your valuable crypto assets.
These are smart contract wallets that require multiple private key signatures to approve any transaction. Multi-signature (multi-sig) wallets allow you to select other wallets to act as “signers” and determine a “threshold” (e.g. 3 out of 5 signatures) to approve a transaction. Gnosis Safe and Argent are two of the most popular multi-sig wallets.
Multi-sig wallets address the “key person risk” and “single point of failure” risk associated with hot and cold wallets. Signatures are distributed across multiple private keys preventing any one person or the accidental sharing of a mnemonic phrase from compromising the wallet. People may select hardware wallets as signers to create the most secure setup for their multi-sig wallet.
Non-custodial wallets require you to develop a wallet security strategy to keep your crypto assets safe. Your strategy may depend on your goals, how often you plan to participate, and the amount of assets you hold. While there is no singular blueprint, here is a framework to help you develop your personal strategy.
Hot wallets are your “daily drivers” that provide the most convenience for interacting with the crypto ecosystem. These wallets hold a minimal assets and you do not mind if they get compromised. You may want to use multiple hot wallets that each have a specific purpose (e.g. one for NFTs, one for DeFi, and one for DAOs) depending on the frequency of your participation in crypto.
While multiple public keys can be housed under one private key, you may want to spread your hot wallets across multiple private keys. You can create wallets across different browsers (e.g. Chrome, Firefox, and Brave) and non-custodial wallets (e.g. MetaMask, Rainbow, and Coinbase Wallet). This setup improves your wallet security while preserving convenience and ease of daily use.
Cold wallets can store your valuable crypto assets and connect to trusted sites. While you should rarely connect your cold wallet to the internet, you may want to use them to manage larger positions on DeFi protocols. Similar to hot wallets, you may want to use multiple cold wallets to spread out your assets and prevent a catastrophic loss.
While hardware wallets cost between $50 to $200, they provide an additional layer of security for anyone active in crypto. You should purchase a hardware wallet directly from the company’s website to reduce the risk of it being tampered with. Once you receive your hardware wallet, take the time to test recovering the wallet via the seed phrase and sending small amounts of crypto before transferring your valuable assets.
A multi-sig can store your most valuable crypto assets and rarely connects to the internet or trusted sites. You can think of a multi-sig like a vault that protects your assets and requires multiple steps to initiate a withdrawal. Since multi-sigs require multiple private key signatures, interacting with DeFi protocols may be more difficult.
The most secure multi-sig wallet setup leverages the combination of private keys secured by hardware wallets. Signers are typically multiple individuals who use hardware wallets to sign transactions. While gathering signatures may be a time-consuming process, it ensures a high degree of safety for assets held within the wallet.
It’s important to invest the time, energy, and money to develop these security foundations. These wallet basics and security frameworks help you identify risks and scammers, protect against catastrophic losses, and secure your crypto assets. While you should always be vigilant, developing your wallet security strategy can help you navigate the crypto ecosystem with confidence.
Wallet security is a foundational aspect of participating in the overall web3 ecosystem. Strong wallet hygiene and security practices improve the safety of your crypto assets and allow you to navigate web3 with more confidence. While there will always be risks, there are simple basic principles and practices that anyone can implement to build a strong wallet security foundation.
Here are some best practices for improving your wallet and crypto asset safety. These principles help you reduce the risk of catastrophic loss and preserve your ability to participate in web3.
Invest In Security: Wallet security is one of the best investments for anyone. Hardware and multi-signature wallets add a layer of security by requiring additional approvals for any transaction. This makes stealing assets more difficult for malicious actors.
Diversify Your Wallets: Prevent loss by spreading your crypto assets across multiple unique wallets for specific purposes. This reduces the risk of losing all your assets in one account breach.
Understand How Wallets Work: Scammers target people who do not understand how wallets work. This allows scammers to extract important information to gain control of your wallet and quickly transfer your assets out of it.
These principles help you develop your crypto wallet security strategy. Once you understand the basics of how wallets work, you can develop a strategy using the framework included at the end of this article.
Understanding how crypto wallets work will help you navigate through the space, identify potential scams, and develop strong wallet hygiene and security practices.
Wallets are broken down into three core components–a public key, a private key, and a mnemonic (seed) phrase. These pieces allow you to transact on the blockchain, sign transactions, verify ownership, and recover your wallet. Protecting your private key and mnemonic phrase is one of your top security priorities.
The public key is used to receive crypto assets in your wallet. You can think of this as an account number that allows anyone to send a transaction to it. Your public key is condensed and shorted into a wallet address to make it easier for you to share.
Anyone can find your public key and send (airdrop) crypto assets to your wallet. This makes it a common vector of attack. Scammers will airdrop tokens into your wallet in hopes that you will interact with them and sign a malicious transaction with your private key to gain access to the assets in your wallet.
The private key enables you to prove ownership of your crypto assets and send transactions from your wallet. Your private key is used to sign transactions that prove ownership of the assets you want to send. Your private key can also be associated with multiple public keys. You can think of your private key as the password used to access your bank account.
Many scammers will attempt to access one form of your private key (seed phrase) to gain full access to your wallet(s). You should never share your private key with anyone and remember that nobody will ask you for it. Scammers may pose as customer support to help you troubleshoot by asking for your seed phrase or to screen share and have you log into your wallet.
A mnemonic phrase (aka seed phrase) is a unique ordered list of 12 to 24 words that represent your private key. It acts as a recovery phrase that allows you to access your wallet when you need to restore it. You will receive a randomly generated mnemonic phrase when you first set up your wallet.
Storing your mnemonic phrase securely is one of the most important security tasks. The safest way to store it is by writing it down or using a steel capsule. While online storage is convenient, you may lose your crypto assets if your computer or accounts are compromised.
Now that you understand the basic structure of a wallet, it’s important to learn the difference between custodial and non-custodial wallets. The difference comes down to who holds your private key and your assets. This also affects the types of products and services you may interact with in web3.
A custodial wallet holds your assets and private key on your behalf. These are typically managed by a centralized exchange (CEX) like Coinbase, Binance, FTX, or Gemini and where many people first purchase cryptocurrencies. Reputable CEXs provide a balance of convenience and security for first-time crypto users.
Custodial wallets may provide additional security for your assets through insurance coverage, improved private key storage, and easier account recovery. The added convenience comes with the tradeoff that you do not have full control over your funds or the ability to sign transactions. While there are pros and cons, custodial wallets provide a balanced approach for people looking for exposure to cryptocurrencies.
A non-custodial wallet is where you hold your private key and all your assets. Some common non-custodial wallets are MetaMask, Rainbow, and Coinbase Wallet (many CEXs provide non-custodial wallets). This is sometimes referred to as “being your own bank” where you manage and protect your private key and assume the risk associated with interacting with decentralized exchanges (DEXs) and decentralized applications (DApps).
Non-custodial wallets are required to interact with web3 applications like DeFi, NFTs, and DApps. Since you have full ownership of your private key and assets, you must take all the precautions to ensure their safety. This is a lot of responsibility, but there are simple methods to improve your security.
There are three main classifications for non-custodial wallets–hot, cold, and multi-signature. These classifications relate to how often they connect to the internet and the level of security associated with each. People typically combine these classifications as a part of their wallet security strategy.
These wallets are typically web-based, mobile-based, or desktop-based that are always connected to the internet. You can consider these “daily drivers” that you consistently use to interact with web3 like DeFi protocols and NFT marketplaces. Hot wallets provide you with the most convenience and ease to transact on the blockchain.
Hot wallets typically present with the highest risk because you use them consistently and they connect to many different sites. In some cases, you may unknowingly sign a malicious transaction or interact with a malicious contract that places your assets at risk. This is why you may want to use many different hot wallets and only hold a minimal amount of assets in each of them.
These wallets are typically hardware wallets that are small physical devices that only connect to the internet for signing transactions in-device. Hardware wallets require you to plug in or connect via Bluetooth to your computer to sign transactions from the device. Ledger and Trezor are two of the most popular hardware wallets.
Cold wallets provide an additional layer of security for your assets by requiring a signature for any transaction from a separate device. This protects your assets even if you accidentally sign a malicious transaction. This is why hardware wallets are one of the best security investments to protect your valuable crypto assets.
These are smart contract wallets that require multiple private key signatures to approve any transaction. Multi-signature (multi-sig) wallets allow you to select other wallets to act as “signers” and determine a “threshold” (e.g. 3 out of 5 signatures) to approve a transaction. Gnosis Safe and Argent are two of the most popular multi-sig wallets.
Multi-sig wallets address the “key person risk” and “single point of failure” risk associated with hot and cold wallets. Signatures are distributed across multiple private keys preventing any one person or the accidental sharing of a mnemonic phrase from compromising the wallet. People may select hardware wallets as signers to create the most secure setup for their multi-sig wallet.
Non-custodial wallets require you to develop a wallet security strategy to keep your crypto assets safe. Your strategy may depend on your goals, how often you plan to participate, and the amount of assets you hold. While there is no singular blueprint, here is a framework to help you develop your personal strategy.
Hot wallets are your “daily drivers” that provide the most convenience for interacting with the crypto ecosystem. These wallets hold a minimal assets and you do not mind if they get compromised. You may want to use multiple hot wallets that each have a specific purpose (e.g. one for NFTs, one for DeFi, and one for DAOs) depending on the frequency of your participation in crypto.
While multiple public keys can be housed under one private key, you may want to spread your hot wallets across multiple private keys. You can create wallets across different browsers (e.g. Chrome, Firefox, and Brave) and non-custodial wallets (e.g. MetaMask, Rainbow, and Coinbase Wallet). This setup improves your wallet security while preserving convenience and ease of daily use.
Cold wallets can store your valuable crypto assets and connect to trusted sites. While you should rarely connect your cold wallet to the internet, you may want to use them to manage larger positions on DeFi protocols. Similar to hot wallets, you may want to use multiple cold wallets to spread out your assets and prevent a catastrophic loss.
While hardware wallets cost between $50 to $200, they provide an additional layer of security for anyone active in crypto. You should purchase a hardware wallet directly from the company’s website to reduce the risk of it being tampered with. Once you receive your hardware wallet, take the time to test recovering the wallet via the seed phrase and sending small amounts of crypto before transferring your valuable assets.
A multi-sig can store your most valuable crypto assets and rarely connects to the internet or trusted sites. You can think of a multi-sig like a vault that protects your assets and requires multiple steps to initiate a withdrawal. Since multi-sigs require multiple private key signatures, interacting with DeFi protocols may be more difficult.
The most secure multi-sig wallet setup leverages the combination of private keys secured by hardware wallets. Signers are typically multiple individuals who use hardware wallets to sign transactions. While gathering signatures may be a time-consuming process, it ensures a high degree of safety for assets held within the wallet.
It’s important to invest the time, energy, and money to develop these security foundations. These wallet basics and security frameworks help you identify risks and scammers, protect against catastrophic losses, and secure your crypto assets. While you should always be vigilant, developing your wallet security strategy can help you navigate the crypto ecosystem with confidence.
No activity yet