Category:CryptoWallets: Difference between revisions

From Edd's Almanac
Jump to navigation Jump to search
No edit summary
No edit summary
 
Line 1: Line 1:
===[[:Category:Cold Wallets|Cold Wallets]]===
===[[:Category:Bitcoin Wallets|Bitcoin Wallets]]===
<categorytree hideroot="on" mode="pages">Bitcoin Wallets</categorytree>
===[[:Category:Ethereum Wallets|Ethereum Wallets]]===
<categorytree hideroot="on" mode="pages">Ethereum Wallets</categorytree>
===[[:Category:Cold Wallets|Cold Wallets]]<ref>Cryptocurrency wallets not connected to the internet. These may be hardware devices or any media that can record private keys or seed phrases, like simple pen and paper. Cold wallets are typically used for long-term storage since extra steps are required to broadcast transactions to the network. Physical devices acting as cold wallets are still susceptible to theft, damage, or other types of loss.</ref>===
<categorytree hideroot="on" mode="pages">Cold Wallets</categorytree>
<categorytree hideroot="on" mode="pages">Cold Wallets</categorytree>
===[[:Category:Hot Wallets|Hot Wallets]]===
===[[:Category:Hot Wallets|Hot Wallets]]<ref>Cryptocurrency wallets connected to the internet used to manage access to private keys and the digital assets they control. Hot wallets sacrifice some security for convenience since they are more vulnerable to hacks and malware than wallets kept offline.</ref>===
<categorytree hideroot="on" mode="pages">Hot Wallets</categorytree>
<categorytree hideroot="on" mode="pages">Hot Wallets</categorytree>
===[[:Category:Browser Extensions|Browser Extensions]]===
===[[:Category:Browser Extensions|Browser Extensions]]===
Line 7: Line 11:
===[[:Category:Mobile Wallets|Mobile Wallets]]===
===[[:Category:Mobile Wallets|Mobile Wallets]]===
<categorytree hideroot="on" mode="pages">Mobile Wallets</categorytree>
<categorytree hideroot="on" mode="pages">Mobile Wallets</categorytree>
===[[:Category:Hardware Wallets|Hardware Wallets]]===
===[[:Category:Hardware Wallets|Hardware Wallets]]<ref>Physical devices intended to be kept offline in order to securely store the private keys used to access cryptocurrencies and other digital assets.</ref>===
<categorytree hideroot="on" mode="pages">Hardware Wallets</categorytree>
<categorytree hideroot="on" mode="pages">Hardware Wallets</categorytree>
===[[:Category:Custodial Wallets|Custodial Wallets]]===
===[[:Category:Custodial Wallets|Custodial Wallets]]<ref>Cryptocurrency wallets in which a third party, such as a cryptocurrency exchange, holds the private keys that authorize and sign transactions. Custodial wallets shift the burden of responsibility and security to the third party, lowering the barrier to entry for many new cryptocurrency users. A certain amount of trust is required, however, since users are reliant on the custodian to take proper security precautions and implement reasonable policies regarding their assets and funds.</ref>===
<categorytree hideroot="on" mode="pages">Custodial Wallets</categorytree>
<categorytree hideroot="on" mode="pages">Custodial Wallets</categorytree>
===[[:Category:Non-Custodial Wallets|Non-Custodial Wallets]]===
===[[:Category:Non-Custodial Wallets|Non-Custodial Wallets]]<ref>Cryptocurrency wallets in which the owner has exclusive and full control over the private keys used to authorize transactions of digital assets on a blockchain. Owners of non-custodial wallets are fully responsible for the safety and security of the digital assets they manage.</ref>===
<categorytree hideroot="on" mode="pages">Non-Custodial Wallets</categorytree>
<categorytree hideroot="on" mode="pages">Non-Custodial Wallets</categorytree>
==Notes==
<references />

Latest revision as of 22:20, 7 October 2024

Bitcoin Wallets

Ethereum Wallets

Cold Wallets[1]

Hot Wallets[2]

Browser Extensions

Mobile Wallets

Hardware Wallets[3]

Custodial Wallets[4]

Non-Custodial Wallets[5]

Notes

  1. Cryptocurrency wallets not connected to the internet. These may be hardware devices or any media that can record private keys or seed phrases, like simple pen and paper. Cold wallets are typically used for long-term storage since extra steps are required to broadcast transactions to the network. Physical devices acting as cold wallets are still susceptible to theft, damage, or other types of loss.
  2. Cryptocurrency wallets connected to the internet used to manage access to private keys and the digital assets they control. Hot wallets sacrifice some security for convenience since they are more vulnerable to hacks and malware than wallets kept offline.
  3. Physical devices intended to be kept offline in order to securely store the private keys used to access cryptocurrencies and other digital assets.
  4. Cryptocurrency wallets in which a third party, such as a cryptocurrency exchange, holds the private keys that authorize and sign transactions. Custodial wallets shift the burden of responsibility and security to the third party, lowering the barrier to entry for many new cryptocurrency users. A certain amount of trust is required, however, since users are reliant on the custodian to take proper security precautions and implement reasonable policies regarding their assets and funds.
  5. Cryptocurrency wallets in which the owner has exclusive and full control over the private keys used to authorize transactions of digital assets on a blockchain. Owners of non-custodial wallets are fully responsible for the safety and security of the digital assets they manage.

This category currently contains no pages or media.