Cryptocurrency Wallets

From Edd's Almanac
Revision as of 22:21, 7 October 2024 by Edd (talk | contribs)
Jump to navigation Jump to search

Bitcoin Wallets

Ethereum Wallets

Cold Wallets[1]

Hot Wallets[2]

Browser Extensions

Mobile Wallets

Hardware Wallets[3]

Custodial Wallets[4]

Non-Custodial Wallets[5]

EVM Compatible Wallets[6]

Other Coins/Tokens

Aave

Arweave

Avalanche

Axie Infinity

Bitcoin Cash

BNB

Cardano

Chainlink

Dai

Dogecoin

dogwifhat

Filecoin

Flow

Helium

Immutable X

Internet Computer

LEO Token

Litecoin

Monero

NEAR Protocol

Optimism

Pepe

POL

Error 1054: Unknown column 'POL' in 'WHERE'

Function: CargoSQLQuery::run Query: SELECT `m_CryptoWallets`.`_pageID` AS `cargo_backlink_page_id_CryptoWallets`,`CryptoWalletName` AS `CryptoWalletName` FROM `m_CryptoWallets` WHERE POL="1" ORDER BY `m_CryptoWallets`.`_pageID`,`CryptoWalletName` LIMIT 100

Polkadot

Sei

Shiba Inu

Solana

Stellar

Sui

Tether

Tezos

Toncoin

TRON

Uniswap

USDC

Worldcoin

XRP

Notes

  1. Cryptocurrency wallets not connected to the internet. These may be hardware devices or any media that can record private keys or seed phrases, like simple pen and paper. Cold wallets are typically used for long-term storage since extra steps are required to broadcast transactions to the network. Physical devices acting as cold wallets are still susceptible to theft, damage, or other types of loss.
  2. Cryptocurrency wallets connected to the internet used to manage access to private keys and the digital assets they control. Hot wallets sacrifice some security for convenience since they are more vulnerable to hacks and malware than wallets kept offline.
  3. Physical devices intended to be kept offline in order to securely store the private keys used to access cryptocurrencies and other digital assets.
  4. Cryptocurrency wallets in which a third party, such as a cryptocurrency exchange, holds the private keys that authorize and sign transactions. Custodial wallets shift the burden of responsibility and security to the third party, lowering the barrier to entry for many new cryptocurrency users. A certain amount of trust is required, however, since users are reliant on the custodian to take proper security precautions and implement reasonable policies regarding their assets and funds.
  5. Cryptocurrency wallets in which the owner has exclusive and full control over the private keys used to authorize transactions of digital assets on a blockchain. Owners of non-custodial wallets are fully responsible for the safety and security of the digital assets they manage.
  6. Acronym - Ethereum Virtual Machine