Category:CryptoWallets: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
(One intermediate revision by the same user not shown) | |||
Line 1: | Line 1: | ||
<categorytree mode="pages">Cold Wallets</categorytree> | ===[[:Category:Bitcoin Wallets|Bitcoin Wallets]]=== | ||
<categorytree mode="pages">Hot Wallets</categorytree> | <categorytree hideroot="on" mode="pages">Bitcoin Wallets</categorytree> | ||
<categorytree mode="pages">Browser Extensions</categorytree> | ===[[:Category:Ethereum Wallets|Ethereum Wallets]]=== | ||
<categorytree mode="pages">Mobile Wallets</categorytree> | <categorytree hideroot="on" mode="pages">Ethereum Wallets</categorytree> | ||
<categorytree mode="pages">Hardware Wallets</categorytree> | ===[[:Category:Cold Wallets|Cold Wallets]]<ref>Cryptocurrency wallets not connected to the internet. These may be hardware devices or any media that can record private keys or seed phrases, like simple pen and paper. Cold wallets are typically used for long-term storage since extra steps are required to broadcast transactions to the network. Physical devices acting as cold wallets are still susceptible to theft, damage, or other types of loss.</ref>=== | ||
<categorytree mode="pages">Custodial Wallets</categorytree> | <categorytree hideroot="on" mode="pages">Cold Wallets</categorytree> | ||
<categorytree mode="pages">Non-Custodial Wallets</categorytree> | ===[[:Category:Hot Wallets|Hot Wallets]]<ref>Cryptocurrency wallets connected to the internet used to manage access to private keys and the digital assets they control. Hot wallets sacrifice some security for convenience since they are more vulnerable to hacks and malware than wallets kept offline.</ref>=== | ||
<categorytree hideroot="on" mode="pages">Hot Wallets</categorytree> | |||
===[[:Category:Browser Extensions|Browser Extensions]]=== | |||
<categorytree hideroot="on" mode="pages">Browser Extensions</categorytree> | |||
===[[:Category:Mobile Wallets|Mobile Wallets]]=== | |||
<categorytree hideroot="on" mode="pages">Mobile Wallets</categorytree> | |||
===[[:Category:Hardware Wallets|Hardware Wallets]]<ref>Physical devices intended to be kept offline in order to securely store the private keys used to access cryptocurrencies and other digital assets.</ref>=== | |||
<categorytree hideroot="on" mode="pages">Hardware Wallets</categorytree> | |||
===[[:Category:Custodial Wallets|Custodial Wallets]]<ref>Cryptocurrency wallets in which a third party, such as a cryptocurrency exchange, holds the private keys that authorize and sign transactions. Custodial wallets shift the burden of responsibility and security to the third party, lowering the barrier to entry for many new cryptocurrency users. A certain amount of trust is required, however, since users are reliant on the custodian to take proper security precautions and implement reasonable policies regarding their assets and funds.</ref>=== | |||
<categorytree hideroot="on" mode="pages">Custodial Wallets</categorytree> | |||
===[[:Category:Non-Custodial Wallets|Non-Custodial Wallets]]<ref>Cryptocurrency wallets in which the owner has exclusive and full control over the private keys used to authorize transactions of digital assets on a blockchain. Owners of non-custodial wallets are fully responsible for the safety and security of the digital assets they manage.</ref>=== | |||
<categorytree hideroot="on" mode="pages">Non-Custodial Wallets</categorytree> | |||
==Notes== | |||
<references /> |
Latest revision as of 22:20, 7 October 2024
Bitcoin Wallets
Ethereum Wallets
Cold Wallets[1]
Hot Wallets[2]
Browser Extensions
Mobile Wallets
Hardware Wallets[3]
Custodial Wallets[4]
Non-Custodial Wallets[5]
Notes
- ↑ Cryptocurrency wallets not connected to the internet. These may be hardware devices or any media that can record private keys or seed phrases, like simple pen and paper. Cold wallets are typically used for long-term storage since extra steps are required to broadcast transactions to the network. Physical devices acting as cold wallets are still susceptible to theft, damage, or other types of loss.
- ↑ Cryptocurrency wallets connected to the internet used to manage access to private keys and the digital assets they control. Hot wallets sacrifice some security for convenience since they are more vulnerable to hacks and malware than wallets kept offline.
- ↑ Physical devices intended to be kept offline in order to securely store the private keys used to access cryptocurrencies and other digital assets.
- ↑ Cryptocurrency wallets in which a third party, such as a cryptocurrency exchange, holds the private keys that authorize and sign transactions. Custodial wallets shift the burden of responsibility and security to the third party, lowering the barrier to entry for many new cryptocurrency users. A certain amount of trust is required, however, since users are reliant on the custodian to take proper security precautions and implement reasonable policies regarding their assets and funds.
- ↑ Cryptocurrency wallets in which the owner has exclusive and full control over the private keys used to authorize transactions of digital assets on a blockchain. Owners of non-custodial wallets are fully responsible for the safety and security of the digital assets they manage.
This category currently contains no pages or media.