This site is for educational purposes only. Nothing here constitutes financial advice.

Topic 3 of 16

Crypto Wallets

Everything about storing cryptocurrency safely — hot vs. cold wallets, custodial vs. non-custodial, seed phrases, hardware wallets, and best practices for protecting your assets.

What Is a Crypto Wallet?

A crypto wallet does not actually "store" your cryptocurrency — your crypto always lives on the blockchain. What a wallet stores is your private key, the secret password that proves you own your crypto and lets you send it. Think of it like a key to a safe deposit box: the valuables are in the vault (the blockchain), but you need the key (your private key) to access them.

Hot Wallets vs. Cold Wallets

  • Hot wallets are connected to the internet — phone apps (Trust Wallet, Phantom), browser extensions (MetaMask), or exchange accounts (Coinbase). Convenient for daily use but more vulnerable to hacking.
  • Cold wallets are kept offline — hardware devices (Ledger, Trezor) or paper wallets. Much more secure for long-term storage but less convenient for frequent transactions.

Custodial vs. Non-Custodial

When you keep crypto on an exchange like Coinbase or Binance, the exchange holds your private keys for you — that is a custodial wallet. It is convenient (the exchange handles security and recovery), but you are trusting them with your funds. A non-custodial wallet (MetaMask, Phantom, Ledger) gives you full control of your keys — no one can freeze or access your funds, but if you lose your seed phrase, nobody can help you recover them.

Not Your Keys, Not Your Coins

This famous crypto saying captures a real risk. When FTX collapsed in 2022, users who kept funds on the exchange lost access to billions. Users who held their own keys in non-custodial wallets were completely unaffected. For any significant amount of crypto, self-custody is strongly recommended.

Key Takeaways

  • A wallet stores your private keys, not your actual crypto
  • Hot wallets (internet-connected) are convenient; cold wallets (offline) are more secure
  • Custodial wallets (exchanges) hold your keys; non-custodial wallets give you full control
  • Self-custody protects you from exchange failures but requires responsible key management

More Topics

Blockchain 101

Understand the foundational technology behind cryptocurrency — what a blockchain is, how blocks and transactions work, the role of nodes, and why distributed ledgers are revolutionary.

Consensus Mechanisms

Learn how blockchain networks agree on a single source of truth — from Proof of Work mining to Proof of Stake validation, Delegated PoS, and Proof of Authority.

DeFi Basics

Explore decentralized finance — how DEXs, lending protocols, yield farming, and liquidity pools work, and what TVL really means.

Mining & Staking

How mining works in Proof of Work, staking mechanics in Proof of Stake, validator requirements, rewards, and the economics behind securing blockchain networks.

Smart Contracts

What smart contracts are, how they work, writing in Solidity, the importance of audits, and how self-executing code powers DeFi, NFTs, and DAOs.

Trading Basics

Learn the fundamentals of crypto trading — exchanges, trading pairs, order types, market and limit orders, fees, and how to avoid common beginner mistakes.

Security 101

Protect your crypto — learn about 2FA, hardware wallets, seed phrase storage, common scams, and operational security practices that keep your assets safe.

Regulation & Taxes

Navigate the complex and evolving landscape of crypto regulation — KYC/AML requirements, SEC enforcement, MiCA in Europe, tax treatment of crypto transactions, and DeFi-specific tax challenges.

DAOs & Governance

How decentralized autonomous organizations work — governance tokens, voting mechanisms, Snapshot, treasury management, delegation, and the risks of governance attacks.

Bridges & Cross-Chain

Understand how assets move between blockchains — bridge types, wrapped tokens, cross-chain messaging, major bridge exploits, and the emerging world of ZK bridges.

Blockchain Security & Attacks

Deep dive into blockchain-level security — 51% attacks, MEV exploitation, flash loan attacks, oracle manipulation, reentrancy, and how protocols defend against these threats.

Tokenomics

Understand the economics of crypto tokens — supply dynamics, token distribution, vesting schedules, burn mechanisms, inflation vs. deflation, and how to spot Ponzi-nomics red flags.

How Exchanges Work

Understand how centralized and decentralized exchanges operate, including order books, AMMs, fees, and the tradeoffs between convenience and self-custody.

Reading Charts & Market Data

Learn to read candlestick charts, understand timeframes and volume, identify support and resistance levels, interpret moving averages, and explore on-chain metrics — while understanding that technical analysis is pattern recognition, not prediction.

Portfolio Management

Learn the principles of building and managing a crypto portfolio — diversification, risk tolerance, dollar-cost averaging, rebalancing, position sizing, and tax considerations. This is educational content, not financial advice.