Best Bitcoin & Cryptocurrency Wallets

Carding

Professional
Messages
2,831
Reputation
17
Reaction score
2,016
Points
113
This guide will help you to find the best Bitcoin wallet or cryptocurrency wallet for YOU!

Hint:

There's no "one size fits all" wallet. Wallets come on different platforms with different features.

If you want the best possible wallet, keep reading...

Chapters

CHAPTER 1 What is a Wallet?
CHAPTER 2 Wallet Types
CHAPTER 3 Hardware Wallets
CHAPTER 4 Hot Wallets
CHAPTER 5 Banks vs. Wallets
CHAPTER 6 Theft and Scams

Our Top Picks
Best Wallet For

Best for Security Ledger Nano X
Secure storage for any cryptocurrency
The Ledger Nano X is the newest crypto hardware wallet, and is very easy to use. It connects to iOS, Android & desktop computers.

Best for Mobile ZenGo
Easy to use iOS & Android wallet
ZenGo is an easy-to-use iOS and Android Bitcoin & crypto wallet. Start within 20 seconds.

Best for Desktop Electrum
Simple yet powerful desktop wallet
Electrum is a Bitcoin-only wallet that has been around since 2011. It's easy to use, but has advanced features.

Chapter 1

What is a Bitcoin & Cryptocurrency Wallet?

A Bitcoin/cryptocurrency wallet is the first step to using Bitcoin or crypto.

Why?

A “wallet” is basically the equivalent of a bank account. It allows you to receive bitcoins and other coins, store them, and then send them to others.


You can think of a wallet as your personal interface to the Bitcoin network, similar to how your online bank account is an interface to the regular monetary system.

Wallets contain private keys; secret codes that allow you to spend your coins.

In reality, it’s not coins that need to be stored and secured, but the private keys that give you access to them.

In short:

A crypto or Bitcoin wallet is simply an app, website, or device that manages private keys for you.

ledger-live.jpg

Ledger Live makes it easy to send and receive Bitcoins to your Ledger Nano X

This guide will show you how to create a wallet and pick the best one.

Types of Bitcoin Wallets
There are a few different types of Bitcoin wallets used today, and each of them come with their own tradeoffs between security and convenience:

We'll cover this in full detail in chapter two (up next), but put simply there are wallets for holding your everyday spending money (hot wallets) and there are wallets for your long term savings (cold wallets). There are even several types of both hot and cold wallets.

An Exchange is Not a Wallet
Again, we will cover this is more detail in Chapter five below, but its worth stating here as well that your Bitcoin "bank" or exchange accounts that do hold Bitcoin are NOT wallets.

not-wallet.png

Coinbase app does not let you hold you own keys, therefore it is not a wallet.

If that is confusing, don't worry - it will all make sense by the time we are done here.

This is not to say that bitcoin banks are inherently bad.

It is simply important to remember that whoever controls the private keys controls the bitcoin attached to those keys. A misunderstanding of this point has led to hundreds of millions of US dollars being lost in the past, so it’s important to understand this key difference in how Bitcoin private keys can be stored.

For now, just know that private keys are what you need to protect if you want to keep your bitcoin safe from hackers, user error, and other possible issues.

Chapter 2

Types of Bitcoin & Crypto Wallets

Now let's discuss the types of wallets and why you might want to use one kind over another.

By the end of this chapter, you should have a good idea of which wallet is right for you.

Hardware Wallets

The Ledger Nano S is one example of a hardware wallet.
A hardware wallet is a physical electronic device, built for the sole purpose of securing crypto coins.

The core innovation is that the hardware wallet must be connected to your computer, phone, or tablet before coins may be spent.

The two most popular and best Bitcoin and cryptocurrency hardware wallets are:

- Ledger Nano X
- TREZOR T

Hardware wallets are a good choice if you’re serious about security and convenient, reliable Bitcoin & crypto storage.

Hardware wallets keep private keys separate from vulnerable, internet-connected devices.

Your all-important private keys are maintained in a secure offline environment on the hardware wallet, fully protected even should the device be plugged into a malware-infected computer.

malware.png

Malware should be no match for your hardware wallet.

As bitcoins and cryptocurrencies are digital, cyber-criminals could, potentially, target your computer’s “software wallet” and steal them by accessing your private key.

Generating and storing private keys offline using a hardware wallet ensures that hackers have no way to reach your coins.

Hackers would have to steal the hardware wallet itself, but even then, it can be protected with a PIN code.

Don’t worry about your hardware wallet getting stolen, lost or damaged either; so long as you create a secret backup code, you can always retrieve your coins.

Think of a hardware wallet like your own underground steel vault. If you own a significant amount of bitcoin or crypto, you should strongly consider getting one!

Why are hardware wallets good?
Easiest way to securely store bitcoins and other coins
Easy to backup and secure
Less margin for error; setup is easy even for less technical users
Multiple hardware wallets can be used together for extra security

Why are hardware wallets bad?
They're not free!
They can be challenging for new users to understand

Hot Wallets
Hot wallets are wallets that run on internet connected devices like a computer, mobile phone, or tablet.

Private keys are secret codes. Because hot wallets generate your private keys on an internet connected device, these private keys can’t be considered 100% secure.

Think of a hot wallet like your wallet today: you use it to store some cash, but not your life savings. Hot wallets are great if you make frequent payments, but not a good choice for the secure storage of bitcoins.

Why are hot wallets good?
Easiest way to store small amounts of bitcoin and crypto
Convenient; spending and receiving payments is easy and fast
Some hot wallets allow access to funds across multiple devices

Why are hot wallets bad?
Not safe for the secure storage of large amounts of bitcoins and crypto
You might forget about the application being installed on your phone

Which Wallet is Best for You?
Why are you using Bitcoin & Crypto?

Investing or saving? Then a hardware wallet will keep your coins safe.

Otherwise, a software wallet will send and receive bitcoins & crypto just fine. Best of all, software wallets are free.

bsga.png

Blockstream Green is one of the most secure mobile wallets out there.

Each wallet has pros and cons, and different wallets are built to solve different problems.

Some wallets may be geared towards security, while some wallets may be more focused on ease-of-use.

Your specific needs should determine the wallet you use, as there is no “best bitcoin wallet”.

How to Add Funds to a Bitcoin Wallet
Most wallets don't give you the ability to buy and sell bitcoin. So, if you want funds in your wallet you'll need to purchase on an exchange and send the coins to your wallet.

We've listed some popular exchanges below:

Popular Exchanges

Coinmama
Works in almost all countries
Highest limits for buying bitcoins with a credit card
Reliable and trusted broker

eToro
Supports Bitcoin, Ethereum & 15 other coins
Start trading fast; high limits
Your capital is at risk.

This ad promotes virtual cryptocurrency investing within the EU (by eToro Europe Ltd. and eToro UK Ltd.) & USA (by eToro USA LLC); which is highly volatile, unregulated in most EU countries, no EU protections & not supervised by the EU regulatory framework. Investments are subject to market risk, including the loss of principal.

Below, we've listed wallets you can buy or download. We suggest using the wallets listed or doing research before buying or downloading any wallet.

Each day, new Bitcoin scam wallets are added to the Google Play Store and Apple app store that are designed to steal peoples' bitcoins.

We only list wallets that have published and open-sourced their code.

Chapter 3

Hardware Wallets: Keep Your Coins Safe

Hardware wallets aren't free.

But the price can be worth it if you own a significant amount of coins.

A hardware wallet will protect a few hundred in bitcoin/crypto just as effectively as a few million.

The three most popular hardware wallets: KeepKey, Ledger Nano S, and Trezor.

How Hardware Wallets Work
Hardware wallets are secure, offline devices. They store your private keys offline so they can't be hacked.

This means you can even use one on a malware infected computer.

Why A Hardware Wallet with a Screen is Important
In the table below, you'll notice we show which hardware wallets have screens.

Screens provide extra security by verifying and displaying important wallet details. Since the hardware wallet is nearly impossible to hack, its screen is more trustworthy than data displayed on your computer.

Bitcoin & Crypto Hardware Wallet Comparison
Check the table below for a quick comparison. Note:

We also did a detailed comparison of the three main ones: Ledger Nano S, Trezor, and KeepKey.

COMPARISON

Ledger Nano X
RELEASED: 2019
PRICE: $119

Ledger Nano S
RELEASED: 2016
PRICE: $59

TREZOR T
RELEASED: 2018
PRICE: $159

TREZOR One
RELEASED: 2013
PRICE: $59

Best Bitcoin Hardware Wallet Overviews

Ledger Nano X
The Ledger Nano X is Ledger's newest hardware wallet. The main benefit is that it has bluetooth, making it the first hardware wallet that connects with iOS devices. It's more secure than using just an app on your phone, because all transactions are signed with the Nano X.

Ledger Nano S
The Ledger Nano S is the cheapest of the three hardware wallets with a screen; it costs about $59. Ledger, one of the most well-known Bitcoin security companies, released the device in August 2016.

TREZOR T
The TREZOR Model-T is a second generation Bitcoin/crypto hardware wallet manufactured by SatoshiLabs. The TREZOR line debuted in 2014 with the TREZOR One and has remained one of the most popular cryptocurrency cold storage solutions to date.

TREZOR One
TREZOR launched in August 2014 as the first Bitcoin hardware wallet, offering secure bitcoin storage plus the ability to spend with the convenience of a hot wallet. TREZOR is a small, thumb-sized device.

Chapter 4

Hot Wallets

Best hot wallet

Just a quick refresher:

Hot wallets are Bitcoin wallets that run on internet connected devices like a computer, mobile phone, or tablet.

As hot wallets generate private keys on an internet connected device, these private keys can’t be considered 100% secure.

Think of a hot wallet like your wallet today: you use it to store some cash, but not your life savings. Hot wallets are great if you make frequent payments, but not a good choice for the secure storage of bitcoins.

Desktop wallets are downloaded and installed on your computer. If privacy is your main concern, the Bitcoin core wallet is a good option since it does not rely on third parties for data.

Electrum
Electrum is a light weight Bitcoin wallet for Mac, Linux, and Windows. Electrum was created in November 2011. The main features of Electrum are: support for hardware wallets (such as TREZOR, Ledger Nano and KeepKey), and secure Bitcoin storage using an offline computer. Electrum is a good option for both beginners and advanced users.

Blockstream Green
Blockstream Green is a powerful Bitcoin wallet for iOS, Android, and Desktop. It's very easy to use and can be setup in a few minutes.

iOS and iPhone Bitcoin Wallets
Apple banned Bitcoin wallets from the App Store in February 2014, but reversed its decision a few months later. Luckily, there are now plenty of options for iOS users.

BRD
We consider BRD, along with Copay (below), as the best bitcoin wallet for iPhone. It’s open source and gives the user full control over their private keys. It also has a clean interface which makes the sending and receiving of bitcoins a pleasurable and super-simple process.

Edge
Edge is an easy to use Bitcoin wallet for iPhone and Android. Its familiar login feature makes using the app a breeze for people new to bitcoin. The wallet also creates automatic backups, so you don't have to worry about the technicalities of performing manual wallet backups.

Blockstream Green
Blockstream Green is a powerful Bitcoin wallet for iOS, Android, and Desktop. It's very easy to use and can be setup in a few minutes.

Aqua
Aqua is a new non-custodial, singlesig wallet made by Blockstream as a way to offer a more newb friendly wallet than Blockstream Green. It's incredibly simple to use and supports liquid assets as well.

Android Bitcoin Wallets
There is a large selection of Android wallets. Since Bitcoin wallets were originally banned by Apple, developers spent much of their time developing for Android.

BRD
BRD, the great iPhone Bitcoin wallet, recently released an Android wallet. It offers the user control of private keys, an easy to use interface, and passcode support.

Edge
Edge is an easy to use Bitcoin wallet for iPhone and Android. Its familiar login feature makes using the app a breeze for people new to bitcoin. The wallet also creates automatic backups, so you don't have to worry about the technicalities of performing manual wallet backups.

Blockstream Green
Blockstream Green is a powerful Bitcoin wallet for iOS, Android, and Desktop. It's very easy to use and can be setup in a few minutes.

Bitcoin Wallet
Bitcoin Wallet, or “Schildbach Wallet”, was the first mobile Bitcoin wallet. Bitcoin Wallet is more secure than most mobile Bitcoin wallets, because it connects directly to the Bitcoin network. Bitcoin Wallet has a simple interface and just the right amount of features, making it a great wallet and a great educational tool for Bitcoin beginners.

Chapter 5

Bitcoin Banks: $10 Billion Lost in Hacks

Bitcoin Banks

One last thing to keep in mind when it comes to bitcoin wallets is that there is a difference between a wallet and a bank.

Some Bitcoin users view Coinbase as a Bitcoin wallet, but companies like this operate much more like banks.

Remember:

The private keys are what users need to protect to safely use the Bitcoin network without getting robbed. When you hand someone else control over your private keys, you are essentially making a deposit at that financial institution – much like a deposit at any bank.

Don't store coins on exchanges! Bitcoin users have lost over $10 billion worth of bitcoins in exchange hacks and scams. Control your own private keys.

This is not to say that bitcoin banks are inherently bad. Companies like Coinbase have done wonders for bringing more users into the ecosystem. It is simply important to remember that whoever controls the private keys controls the bitcoin attached to those keys.

gox.jpg

The Mt. Gox exchange was subject to the largest exchange hack in history, losing 850,000 Bitcoins.

A misunderstanding of this point has led to billions of US dollars being lost in the past, so it’s important to understand this critical difference in how Bitcoin private keys can be stored.

Understanding how bitcoin wallets work is an important aspect of safely using this new technology. Bitcoin is still in its early years of development and wallets will become much more user-friendly in time.

In the near future, certain devices may eventually come with pre-installed wallets that interact with the blockchain without the user’s knowledge.

For now, it’s vital to keep in mind that the private keys are what you need to protect if you want to keep your bitcoin safe from hackers, user error, and other possible issues.

Chapter 6

Theft and Scams

Bitcoin theft

No matter which wallet you choose, remember:

Our bitcoins are only safe if the private key was generated securely, remains a secret, and--most importantly--is controlled only by YOU!

Let's learn about what happens when this isn't the case.

Here are two examples where users got ripped off by leaving bitcoins in the care of a third party:

The Bitfinex hack, in which users lost $70 million
The failure of Mt Gox, in which users lost $450 million or more
To avoid theft, scams, and any other loss of funds, follow these three basic principles:

Generate your private keys in a secure, offline environment. (Except if using trivial amounts, in which cases keys may be created in a hot wallet).
Create backups of your private keys. This helps to protect against the loss of your bitcoins due to hard drive failure or some other problem or accident. Ideally you should have a duplicate set of backups kept off-site to protect against the possibility of fire, robbery, etc.
Encrypt wallets to provide additional security. This helps prevent the physical theft of your funds in the event that your device or hardware wallet is stolen.
Securing your bitcoins properly is the most important step for any Bitcoin user.

With Bitcoin you have the privilege - but also the responsibility - to safeguard your own money. There have been countless scams related to Bitcoin that could have been prevented had people not entrusted others with their bitcoins.

It’s a good rule of thumb to never trust anyone else with your money.

Ledger Nano X
Ledger Nano S
TREZOR T
TREZOR One

Bonus Chapter 1

Cryptocurrency Security Advice

Whether your on an exchange or using a wallet, this section will give you some tips on how to secure your cryptocurrency in ways you may not have seen before.

From changing your mobile network to encrypting your internet connection - these tips are actionable and easy to implement quickly.

The migration of value into the digital realm brings with it new challenges in terms of best security practices. As with any unit of value, there is always someone, somewhere that seeks to extract this value for their own ends, whether it be through coercion, social manipulation or brute force.

This guide is intended to provide a broad overview of the best practices for securing your crypto assets. While most of these steps are not mandatory, following them will greatly increase your financial security and peace of mind in the crypto world.

Passwords — Complexity & Re-Use
Starting from the ground up, password complexity and re-use are two major pain points that many average users do not consider adequately. As you can see by this list, average password complexity still leaves a lot to be desired. The less complex your password is, the more susceptible to hack your account is. If you use the same passwords, or even slight variations of the same passwords across multiple accounts, your chances of compromise are greatly increased.

So what can you do? Fortunately the fix for this is relatively easy. Use randomly generated 14 character+ passwords and never re-use the same password. If this seems daunting to you, consider leveraging a password manager such as LastPass or Dashlane that will assist in password generation and storage.

accounts.png

Lastpass is a our favorite password generator and manager.

You can find out if any accounts associated with you have ever been compromised here as well as using this tool https://howsecureismypassword.net to test just how strong variations of your passwords may be (*do not use your real password on here, only similarly structured variations).

Dedicated Email Accounts
Almost every online service/exchange requires some type of email account association during the activation process. If you are like most people, you will probably use your default email that you’ve had for years, and perhaps add a bit more complex password for the account itself for good measure.

In most cases however, all a hacker needs is access to your emails in order to reset account passwords that may be tied to it. It’s as simple as navigating to the website/exchange and clicking the ‘forgot password’ link to begin the process. So, if you are like most people and have an email address that has been active for years, with a weak login password, your chances of being hacked are much higher.

For the above reasons, do yourself a favor and create a new/dedicated email address for use with your crypto accounts. Services like ProtonMail and Tutanota are free and offer end to end encryption without sacrificing usability (mobile app availability etc.). If you decide to PayPal with Gmail, consider activating the Advanced Protection Program that Google offers.

proton.jpg

Proton Mail offers email with end-to-end encryption.

Usa a VPN
A virtual private network (or VPN) is simply a must for everyone today, but especially cryptocurrency users.

Why?

As we surf the internet, there are unfrotuantely a lot of eyes on us at all times. One very big set of eyes watching us is our internet service provider (or 'ISP'). They see and hear everything we do on the internet. And they often share that information with third parties. But our ISP and its friends are not the only people watching. Anyone using the same wifi network that we are using can also see what we are up to online.

A VPN solves this problem. When we use a VPN, our computer's IP address is not connecting to any website directly. Instead we are communicating to another IP address over an encrypted connection. Then that IP address makes website requests on our behalf and send us back that data. This helps keep onlookers onto our connection locked out so that only one party knows what we are doing (the VPN).

vpn.jpg

It's therefore important that you choose a vpn service with a great track record.

The reason VPNs are important for cryptocurrency users especially is that we use Bitcoin to keep as much data hidden as possible. However, when we expose our IP address, we might give away that our IP address is connected to someone who owns and uses cryptocurrency, merely because of the websites we visit.

Long story short: everyone should be using a VPN regardless of whethor or not they use Bitcoin. It's for your own safety.

VPN

NordVPN
Special support for Malaysia, Nigeria, Singapore, South Africa
SEPA & credit card supported
Trusted exchange

Surfshark
Users claim fast speed from wide range of servers all around the world
Compatible with nearly any OS

ExpressVPN
Allows for Netflix
Users claim fast speed
Has apps for nearly any platform

Two-Factor Authentication
We typically recommend setting up two-factor authentication (2FA) for any and every account that offers it, even if the service is not crypto related. All 2FA does is require a second means of confirmation that you are who you say you are when logging into accounts. Most typically this is in the form of something you know (password) and something you own (SMS code sent to phone).

While SMS is still the most common form of 2FA offered by online services, it is unfortunately the least secure. The following general use 2FA methods are ranked from most secure to least:

FIDO U2F  — This is a physical device that plugs into a USB port and requires a physical button touch to generate a unique 2FA access code. It is preferable because a hacker would need to have the device in their physical possession in order to access your account. Most hacks occur remotely which makes this our top 2FA choice (albeit not a panacea).

yubikey.jpg

Yubikey is the most popular hardware second factor

Google Authenticator — An app that resides on your mobile device and cycles through one-time use access tokens. If you go this route, be sure to save your backup code that is provided at initial setup. If you don’t have this and your phone is lost or broken then you have no way to get these code settings back. While not as good as a yubikey, it's still better than SMS two factor.
Authy — Similar to Google Authenticator but potentially less secure as you can re-access the codes from an alternate mobile device if your main one is lost or broken (this feature can be disabled but is active by default). While this may seem more ideal, what is more convenient for you is also more convenient for those who may be trying to hack you.
SMS — Codes send to your cell phone through text message. Better than no 2FA at all, but susceptible to social engineering SIM attacks. Interestingly, SMS 2FA security holes did not come to light until the popularity of Bitcoin began to grow.

Google Fi
Speaking of SIM attacks, there is one way to avoid them.

Services like Google Fi offer an alternative to traditional mobile phone contracts that are not only more flexible but also more secure.

With Google Fi, you can prevent any changes from occuring on your account without providing a second authentication factor. And because there are no SIM cards in a Google Fi plan, there are also no SIM attacks. This makes it impossible for attackers to hijack your text-messages and take over your accounts.

Currently, Google Fi is the only mobile phone service in the US that offers 2FA. So if you intend on taking your security serously in this area, Google Fi is the only way to do it if you live in the United States.

fi.jpg

Google Fi features

Another nice perk of Google Fi is that its easy to change your phone number whenever you want. This feature alone also increases your security since many of our phone numbers have been leaked before and can be used to access other accounts online. If your leaked phone number is no longer active, you are a little more protected.

Mobile Crypto Wallets
Mobile app wallets such as Mycelium, BRD, Samourai, Cryptonator, etc. should be treated similarly to how you may treat your physical wallet/purse.

samourai.jpg

Samourai's homepage

You only carry small amounts of discretionary spending funds in these wallets as they are more susceptible to loss or theft. Again, what is more convenient for you is more convenient for a malicious actor as well. Your phone is also susceptible to malware and should not be considered sufficiently safe for storing large amounts of funds.

Phishing Attacks
If you have crypto then you are an ideal target for phishing scams. Facebook and Twitter are just two of many avenues that hackers scour for potential victims. It has become common to see fake crypto exchange emails or ICO fundraising confirmations circulating such as the example below.

1*iwiTTWKeCdxKIsKdFiDiiw.png


Phishing email impersonating Blockchain.info. Note send address & logo irregularity.

It is best to NEVER open suspicious attachments or provide credentials through email and to always closely inspect the logo, wording and send address of any emails received that pertain to financial accounts or that request sensitive information.

When in doubt, navigate to the legitimate exchange or web service that the email supposedly originated from and contact their support team to inquire on the validity of what you received before taking further action.

Clean Hardware
This brings us to the general best practices portion of this guide. Malware is everywhere on the internet and regardless of your attention to detail, sooner or later you are likely to fall victim to some type of malicious software. As such, it is best to have active antivirus subscriptions on your devices and to run periodic scans. I personally like to run Malwarebytes and Roguekiller on my PC once each week and have background scans on my phone that run each automatically.

bytes.jpg

Malwarebytes' homepage

Generally speaking Windows is the least secure OS, primarily due to the fact that it is the oldest and most pervasive OS in use today. Many security conscious techies tend to prefer Linux or iOS for this reason.

Secure Crypto Storage
If you don’t hold the private keys, you don’t own your money!

This category is how most people have been compromised and lost money in crypto. How? Primarily, by treating an exchange (Coinbase, Binance, Bittrex, Poloniex etc.) as a wallet to store their crypto assets in.

Mt. Gox, Bitfinex, BitGrail and Coincheck are just four out of a handful of crypto exchanges that have been hacked in the past 5 years, with the cumulative amount stolen exceeding $1 billion USD. While some users of these exchanges have been ameliorated to an extent, many are still suffering from the partial or even total loss of crypto funds that they held on these exchanges at the time of the hacks.

Our advice is to hold crypto on hardware and back it up using a steel wallet.

seedbill.png

The Billfodl is a steel wallet that backs up your recovery phrase, protecting it from fire and flood.

If you wish to trade on exchanges, only do so with funds that you are potentially willing to forfeit entirely should either the exchange or your individual account become compromised.

A few of our recommended hardware wallet manufacturers are Ledger and trezor. You can find our more detailed wallet reviews here . As with all hardware/software, please ensure that your device firmware is kept up to date, as patches are pushed out continuously to address security concerns.

The Subject of Secure storage is something we cover in much greater depth in the next Bonus Chapter

Summary
Security on the web is akin to game of whack-a-mole and your level of security will likely scale accordingly with the amount of sensitive data (or crypto assets) that you are protecting.

While there is no such thing as an ‘unhackable’ system, there are valuable steps that you can take to drastically reduce your likelihood of compromise.

Always remember to:

Use complex and unique passwords
Create a separate/dedicated email account for crypto services
Use two-factor authentication
Store most (if not all) of your funds on hardware wallets
Be wary of phishing emails
Good luck and stay safe!

Bonus Chapter 2

Bitcoin Cold Storage

Cold storage

Unlike paper money, there more than a few options available for keeping your bitcoin secure.

Whether you're trading cryptocurrencies on a daily basis or you're a long-term bitcoin investor, cold storage can be a useful tool for keeping your crypto safe.

Understanding the Basics of the Bitcoin Wallet

In order to get a handle on what cold storage actually is, it's important to review the fundamentals of the "bitcoin wallet." In the same way that you can use a traditional wallet to store your paper currency, you can use a bitcoin wallet to store your bitcoin in digital form.

In other words, you can think of your bitcoin wallet as your personal bitcoin mailing address.

This might sound like having a bank account, but it's actually quite different.

Instead of needing to trust a third party to keep your cryptocurrency secure, you can use a bitcoin wallet as your sole gateway to the decentralized network. There's no need to ask a branch manager for permissions when you want to transfer bitcoin, there aren't any annoying forms to fill out, and transfers happen within minutes.

Bitcoin wallets can be used to:
Pay for items with bitcoin by transferring your payment to merchants who accept cryptocurrency.
Receive bitcoin deposits from customers, friends, or relatives.
Maintain your financial privacy by making anonymous purchases.

What is Bitcoin cold storage?
As you can see, bitcoin wallets are incredibly useful. All of this begs the question, however, of how many different types of bitcoin wallets there actually are.

Generally speaking, Bitcoin wallets come in two main types:

Hot wallets
The phrase "hot wallet" refers to any bitcoin wallet that requires the internet to function properly. Hot wallets derive their name from the fact that they need electricity to work. If the power goes out, then so does your hot wallet.

For example the popular mobile wallet BRD is an example of a hot wallet.

bread.jpeg

BRD is a widely used mobile "hot" wallet

Cold wallets
Not only do cold wallets work without an active internet connection, but many cold wallets don't even need a computer. Cold wallets have several similarities to traditional physical wallets, but they also have a few differences.

For example, the Ledger Nano X and Nano S are the most popular cold wallets on the market.

nanos.jpg

titans of the hardware wallet field

Is "Cold Storage" Different Than Using A Cold Wallet?
In general, "cold storage" refers to any bitcoin storage device that does not require electricity. A cold storage device can be a physical box, a piece of paper, or a list of numbers and letters that you keep in your head.

"Hot storage," as you may have guessed, is simply the analogous generalization for storage devices that require an internet connection.
Thus, hot wallets are an example of hot storage devices, and cold wallets are an example of cold storage devices.

The Major Differences Between Cold Storage And Hot Storage
hot vs cold storage

In contrast to hot storage, cold storage provides:
Increased security protections
A reliable way to keep your bitcoin offline
An easy way to transport your bitcoin between your various wallets
What are the different types of bitcoin cold storage wallets?
When it comes to choosing a cold storage wallet that can help keep your bitcoin secure, the most popular choices tend to be:

Hardware wallets
Hardware wallets include USB PayPals and other digital storage devices that you can use offline. Typically the private key to coins is never exposed to the internet because the device itself is air gapped.

COMPARISON

Ledger Nano X
RELEASED: 2019
PRICE: $119

Ledger Nano S
RELEASED: 2016
PRICE: $59

TREZOR T
RELEASED: 2018
PRICE: $159

TREZOR One
SCREEN:
RELEASED: 2013
PRICE: $59

Steel Backups
The steel wallet is literally a piece of indestructible stainless steel that you can use to carry your bitcoin private keys or backups in. This makes it an excellent choice if you're concerned about losing paper or live in an area with lots of flooding, fires or earthquakes.

You can checkout how they work in the video below: https://www.youtube.com/watch?v=BuynQ7aIW0c

Steel wallets are interesting because they can act as both a "paper wallet" or as a backup for any kind of Bitcoin wallet in case yours is lost, stolen, or destroyed. Almost any cryto holder can benefit from one of these steel wallets regardless of how they choose to Store their coins.

STEEL WALLETS

Billfodl
Highest grade steel wallet
125% money back guarantee
Lots of accessories to up your security
Free shipping if you spend $75 or more

Cryptosteel
First steel wallet
Multiple types of steel wallets available
Free shipping on orders of $150 or more

Cryptotag
Made from titanium
Must manually stamp in letters

Paper wallets
If you're concerned about malicious computer hackers getting access to your wallet, then a paper wallet is one of your best options.

paper-wallet.jpg

A very common Bitcoin paper wallet

WARNING
Setting up a paper wallet is for HIGHLY advanced users only. There are many ways to get a paper wallet wrong - all of which can result in a total loss of funds. Proceed at your own risk.

OpenDime
As the world's first bitcoin credit PayPal, the OpenDime device lets you spend your bitcoin balance in the same way that you would use a traditional credit card.

open-dime.png

An OpenDime - front and back

The open dime is very much like a Bitcoin piggy bank. You can add as much bitcoin to it as you want and as many times as you want, however you can only spend from it once. At that point, the private key is exposed and the funds are no longer safe on the hardware. Because of this, its best to send all the coins to a new address once you are ready to use them.

For a great review and walkthrough on how the open dimes are used, watch this video: https://www.youtube.com/watch?v=1eJp99yAf_M

Comparing The Most Popular Cold Storage Wallets

So now you know of all the different options when it comes to choosing between cold storage wallets. Let's compare them all to each other to see which one would be best for you.

Paper Wallets Vs. Hardware Wallets
Technically speaking, hardare wallets fall somewhere in between a traditional hot wallet and a pure cold storage device.

With hardware wallets, the private key is stored digitally on a microchip, like a hot wallet. But that chip is never exposed to an internet connection.

nano-x.png

Nano X Construction and Anatomy
Hardware wallets can be a bit easier to carry around and make transacitons with, but they are also subject to data degradation risks. This is why many users pair them with a steel wallet as a backup.

Paper Wallets Vs. Steel Wallets

billfodl-blast.jpg

Billfodl protects your coins from fires, floods, and even atomic blasts

When it comes to state-of-the-art bitcoin cold storage, steel backups are definitely ahead of the curve. Steel wallets provide the convenience of the paper wallet with the portability of the hardware wallet, but they also come with some added security features that make them worth looking into.

Steel wallets have two primary uses:

They can be used to backup any kind of hardware or software wallet. Typically these wallets spit out a 12 to 24 word phrase you can use to get your coins back if your main wallet is lost, stolen, or destroyed.

They can be used as a more sturdy version of a paper wallet. After you have generated your paper wallet, you can recreate the private key in the steel wallet using the provided tiles. Afterward you can keep the paper Wallet with the steel wallet and if there is ever a fire or a flood, you have a copy of the paper wallet that will survive.

In the video below, you can see Billfodl (the most popular steel wallet) get put through several tests. It even survivied an explosion using 600 gallons of jet fuel https://www.youtube.com/watch?v=bm-pm_ERYIA

Paper wallets and steel wallets are both protected from hardware data degredation, however the ink on the paper can disintegrate or run if it gets wet or too hot. Steel wallets are also protected from this risk.

Paper Wallets Vs. OpenDime
The OpenDime is basically a cross between a hardware wallet and a steel wallet. If you're partial to the idea of carrying a paper bitcoin wallet, then OpenDime can be another viable option. Like hardware wallets, open dimes are subject to data degredation over time.

od-info.jpg


On the other hand, paper wallets use regular paper to reduce the chance of your coins being hacked. Paper wallets keep your public and private keys on a plain sheet of paper, but they can also be modified to include a QR code to transfer data back and forth between your other cold storage devices.

Closing Thoughts
In summary, bitcoin cold storage is an effective way to keep your cryptocurrency from falling into their wrong hands. Even though it can be easy to end up feeling overwhelmed when you consider all of the cold storage options available, there's no reason to limit yourself to just one wallet type.

One of bitcoin's best features is that it's easily divisible, so you can allocate a portion of your holdings to several different cold storage devices at once.

Most cryptocurrency users keep some bitcoin in cold storage and some in a hot wallet to have some funds that are ready to use.

Whichever way you choose to allocate your bitcoin, make sure to keep security at the forefront of your plan.

Bonus Chapter 3

How to Make a Paper Wallet

Cold storage

Ever been curious about how to make a paper wallet?

Or does the thought of making one intimidate you?

Is it even safe to make one?

Let's find out in this detailed guide on how to create a Bitcoin paper wallet.

Creating a Paper Wallet - The Quick Way

1. Navigate to BitAddress.org. BitAddress is an open source program for creating Bitcoin paper wallets.

2. Move your mouse around the screen or enter random letters and numbers into the textbox to add randomness to the wallet creation.

This randomness is called entropy and will help ensure your keys are secure and resistant to brute force cracking.

3. Once you reach 100%, BitAddress will present you with a public key, a private key, and a QR code for each. To get a printable version, select Paper Wallet. You can create any number of wallets you like.

single-wallet.jpg


4. To add an extra layer of security by encrypting the private key, check the BIP38 box and enter a password. To conduct a transaction you will need the private key AND the password to the wallet from which you are sending funds. You can recognize a private key that has been encrypted by its first two characters, which will usually be 6P.

bip38-create.jpg


Print your wallet(s).

bip38.jpg

A BIP38 wallet encrypted with the password *buybitcoinsworldwide*.

That’s the quick and easy way to create paper wallets online using BitAddress. However, there are a number of security concerns to take into consideration:

Your computer could be infected with malware, which would allow an attacker to see your freshly generated private keys, giving them full access to any funds you then load onto the wallet.

The website itself could also be compromised. You are trusting BitAddress not to view and record the private keys that you generate.

Lastly, printers have their own memory where the file containing your private keys could be stored. For this reason, do not use a shared printer to print your paper wallet.

Creating a Paper Wallet - The Secure Way
To securely create a paper wallet we will follow the steps outlined above, but take a couple of additional measures to address the security flaws.

This video outlines goes through the process, and each step is listed below for you to follow along.

https://www.youtube.com/watch?v=VTsHeiBhPIM

1. Download the offline version of BitAddress from its GitHub repository https://github.com/pointbiz/bitaddress.org/archive/master.zip. Here you will find the paper wallet generator’s open source code. Save this to a USB drive.

zip.jpg


2. Next, you’ll need a secure computer. Ideally this would be an airgapped computer that has never seen the internet and never will. Alternatively, booting off a live installer will avoid most security issues.

This guide https://ubuntu.com/tutorials/tutorial-create-a-usb-PayPal-on-windows#1-overview explains how to create a bootable USB drive off of which you can run Ubuntu, a popular Linux distribution. A Windows or Mac virtual machine will work in a pinch.

airgapped.jpg


3. Extract the zip file on the USB and open the bitaddress.org HTML file. You’ll be taken to an offline version of the website.

unzip-folder.jpg


4. Follow the same steps as detailed above, using your mouse and/or keyboard to create entropy, choosing the number of wallets you wish to create, and adding BIP38 encryption if desired.

paper-wallet-options.jpg


5. Connect to a printer with a wired connection, not Wi-Fi, and print your wallet(s). You could also avoid any potential issues with printer security by writing out your public and private keys.

paperwallet2.png


That’s it, you have now generated one or many paper wallets that you can use for cold storage of Bitcoin. If you used a live OS to generate your keys, be sure to exit out of it and reboot so all traces are erased from the computer’s memory. If you used an airgapped computer, it’s best that it never be connected to the internet.

You can safely share your public key, also known as the wallet address, and use a blockchain explorer such as blockstream.info to check the wallet’s balance.

Spending Coins on a Paper Wallet

exodus-wallet.jpg


To send funds from your paper wallet, you will need to import or sweep your private key into a wallet client. Importing a private key simply adds it to the list of keys in your software wallet, preserving its unique address. This means that if someone got their hands on your paper wallet, they could still take control of the Bitcoin on it. Sweeping a private key transfers the funds associated with it to a new or existing address. This leaves the paper wallet empty.

You can import or sweep your private key into the software wallet by scanning the QR code with your webcam or typing out the private key.

WARNING
As mentioned above, both of these options run the risk of exposing your private key to any keylogger or malware, which is why you should never reuse paper wallets.

Once the Bitcoin is in your software wallet, you can send it as you would any other transaction.

QUICK TIP
If importing a private key, note that if *any* amount of Bitcoin is spent using the software wallet, the paper wallet will be *completely* emptied. The Bitcoin network spends the entire balance of a private key and sends any leftover amount – the change – to a newly-generated private key in the software wallet.

Bonus Chapter 4

Bitcoin Wallet Frequently Asked Questions

Many of you may still have lots of questions about wallets and how to keep your bitcoin secure.

We update the chapter below any time we get a new question from our readers, so odds are we have answered almost any question you could think of below.

What are Bitcoin Wallets?
Bitcoin Wallets let us send, receive and store Bitcoin.

Wallets secure funds by guarding our private keys. These private keys act as the proof of ownership for our Bitcoins. As such, a Bitcoin wallet is like a safety deposit box for Bitcoins.

What is a private key?
If a Bitcoin wallet is like a safety deposit box for our Bitcoins, then our private key is like the key to the safety deposit box. The only difference is that, in the real world, you could break open a safety deposit box without the key. However, in Bitcoin, there is no way to break open the wallet without the key. It is impossible.

Therefore, keeping your private key secret is the most important thing you must do to keep your Bitcoins secure.

What is a Bitcoin address?
A Bitcoin address is like an account number, just better. The address denotes which wallet the coins should be sent to. Like a bank account number, where the difference lies in the wallets having multiple addresses. These can be customized by including payment request information such as an amount and a date of expiration.

What are Steel Bitcoin wallets?
Steel wallets are made to store your backup seed. If you store your seed on paper, it could get burned in a fire or destroyed in a flood. Steel wallets protect against all of these threats by creating an indestructible backup for your seed.

How do I add coins to a Bitcoin Wallet?
First, acquire some Bitcoins. Go through an exchange in your country, ask an acquaintance to share, or use Buybitcoinworldwide.com if you want as seamless of an experience as possible. The purchased coins can then be sent to your wallet by specifying one of its addresses.

Some wallets, particularly online ones, also let you buy coins. Keep in mind that these come with larger exchange margins which are best left alone.

How do I open a Bitcoin account?
To some readers this might seem like a weird question. Truth is, people coming from a financial or business background are likely to expect Bitcoin to be a direct alternative to our current financial system. This is not the case.

You don’t need a Bitcoin account. There is no such thing really. You just need a wallet. The only accounts you might encounter are online wallets that are separated into various accounts via a user system.

Any common mistakes to be careful of?
First of all, don’t rest your money in an exchange wallet. Keep your coins in an environment where you have complete control.

Secondly, don’t keep all of your coins in one place. You’ll be crushed if you lose access to a wallet with all of your funds.

Thirdly, double check the target address. Bitcoin transactions cannot be reversed, so don’t lose your coins forever to a stranger!

How many backups of my seed should I create?
We recommend keeping at least two backups of your seed in multiple locations.

You can also laminate your seed to protect against water damage or any other damage.

Keeping your seeds in fire proof safes can help protect in the event that the storage location is burned down.

Another option is to put your seed into metal manually using stamps, or using Billfodl.

What happens if someone finds my 24 word seed?
Unless you’re using a 25th word, someone who finds your 24 word seed can sweep your entire wallet.

Should I take a picture of the seed with my phone as a backup?
NO, NO, and NO!

The seeds generated by hardware wallets are meant to be written down only. By taking a picture of your seed with an internet connected phone, you put your entire wallet on a device that is connected to the internet and easier for hackers to get into. Please do not do this!

Is it ok to buy hardware wallets on ebay or amazon?
We always recommend to order directly from a hardware manufacturer or authorized reseller. This is because someone can buy a hardware wallet, tamper with it, and sell it used. They could program it to steal any bitcoins or add a back door.

Most hardware wallets add some special kind of tape on the packaging to try to make any tampering more noticeable. This is another reason we recommend only ordering from the hardware wallet company or reseller, and not from a website like eBay.

What happens if the hardware wallet company goes out of business?
If Sony went out of business tomorrow, you would still be able to play your playstation with mostly no issues. Hardware wallets are the same. You do not need a company to remain in business in order to continue using your hardware wallet. You would, however, need to run your own node in order to send and receive transaction.

Let’s say you use TREZOR with TREZOR’s myTREZOR wallet. TREZOR goes out of business and no longer supports myTREZOR wallet and it gets shut down.

You could, in just a few minutes, download Electrum on your computer. Once installed, you’d setup your TREZOR and all of your transaction history and balance would get imported and be exactly the same. This is because Electrum will use the same 24-word seed you generated with TREZOR on setup.

Do these hardware wallets work for Ethereum?
Yes, all of these wallets work with Ethereum, Litecoin and many other coins.

Do these hardware wallets work with Coinbase?
One of the most frequent questions we get asked is how Coinbase works with hardware wallets.

It’s a trick question!

Coinbase does not work directly with hardware wallets. You should, however, send bitcoins from Coinbase directly to your hardware wallet once you buy. Never store bitcoins on Coinbase or any other exchange for long periods of time.

(c) https://www.buybitcoinworldwide.com/wallets/
 

Carding

Professional
Messages
2,831
Reputation
17
Reaction score
2,016
Points
113

Advanced guide for storing cryptocurrencies​


Introduction
A world without intermediaries. A world without having to trust a third party. A world where everyone is their own Autonomous Bank. The first cryptocurrency and then many other blockchain projects were created with the idea of such a world. In such a world, “your password = your money” to put it simply. To be more precise: "your private key = your money/assets/rights/documents/identity”.

If this is clear to you, then you're doing great. Most people continue to think that Bitcoin is something like WebMoney with good cryptography, and Blockchain is the name of the company that owns the site blockchain.info. But not only such people constantly lose their hard-earned crypt, or if they don't lose it, they live with high chances of losing it one day. Why? There are many reasons-from low computer literacy and lack of education to common laziness. If you think you can survive in the new digital world without computer literacy, then I have some bad news for you.

“The world of cryptocurrencies is a new field for intruders. It's perfect for fulfilling their dark ambitions."

Judge for yourself:
  • It all comes down to getting a private key - which means a huge variety of places where these private keys can be stored, from personal Windows PCs and Android smartphones to servers of online wallets and crypto exchanges. In fact, all attack vectors are possible here, which in principle can exist on the Internet.
  • No bank checks or blockages
  • No limits on transfers
  • No one can roll back the transaction
  • Relatively easy to achieve anonymity at all stages
  • Stolen funds can be laundered in two clicks through exchanges with anonymous registration, converting them to private currencies like Monero or Zcash
  • All processes can be automated
For those who understand that cryptocurrencies have come to us seriously and for a long time, the prospect of growing interest of attackers of various kinds (including from government agencies) in this topic is beyond doubt. The security of storing and using crypts is an important area in which many issues and problems have not yet been resolved.

How to properly store your crypt?​

The answer is simple:
“Don't share your private key with anyone”

This means that you should NOT store the crypt (most of it) on:
  • Tipo online wallets blockchain.info, xapo, and the like. In General, on all online services that take care of storing private keys
  • Centralized exchanges, because the exchange is like a Bank that all the bad uncles want to Rob. And sometimes the Bank owners themselves succumb to the temptation and arrange their own robbery, exposing themselves as victims.
  • Mobile wallet apps. Until now, in Android and iOS, your data can be accessed by other applications downloaded from stores, and even more so by Apple and Google themselves. We are working in this direction surprisingly, there are no truly secure wallets yet.
  • Any systems that connect to the Internet. Especially on work PCs and laptops
  • On closed source wallets
  • Don't enter private keys in systems or software that you don't trust

The correct method of storing cryptocurrencies it's called "Cold storage". This means storing private keys on media that is never connected to the network.:
Wording “they never connect to the network" it may cause confusion. You'll ask - “Then how do I send the transaction?”

Yes, of course, to send a transaction (broadcast transaction) you need access to the network. But the trick is that you can create a transaction and sign it offline. And then the already signed transaction can be safely transferred to a machine with the Internet and sent to the network using any window with a connection to the blockchain node, even the same blockchain Explorer.

Signed transaction contains instructions on what to do on the network, which are cryptographically signed by you. You can't get your private key from there (for example, by reverse engineering). Can a hacker somehow use a signed transaction against you?

No, all it can do is just send the transaction to the network again. The network will reject the second transaction, because a transaction with the same hash can only be executed once on the network.

In General, the idea is that we can separate the processes of creating, signing and sending a transaction. And in this division lies a great power and flexibility that is worth using.

What are we going to do in this guide?
Our task is to organize the system so that it is safe and convenient to do the following:
  1. Trade on centralized exchanges
  2. Cash out crypt to Fiat via Localbitcoins.com
  3. Use dapps. Mostly for trading on decentralized exchanges-EtherDelta, IDEX, Bitshares but also others, such as CryptoKitties
  4. Send small amounts from hot wallets
  5. Store the bulk of crypto assets in cold wallets
  6. Send crypt from cold wallets
To use dapps, we can't do without wallets. This means that security requirements are increasing. An encrypted Ubuntu virtual machine with Metamask will be the best solution for frequent use of dapps, trading on decentralized exchanges and sending small amounts.

For storing fixed capital - we will do multi-currency cold storage. We need to have a portable operating system isolated from the Internet. Inside such an OS, we will install wallets for all cryptocurrencies of interest to us in order to create and sign transactions offline and then transfer the signed transactions to the hot machine using a second flash drive.

"Constantly booting into different operating systems and copying transactions to a flash drive? It doesn't sound very convenient” "you say." If you are afraid of such a fuss - I advise you to take a closer look at buying a hardware wallet.

Hardware wallets work according to the same scheme, but with some advantages:
  • The private key is stored in a secure area of the microcontroller
  • No fuss with flash drives and different operating systems. Signature works safely and conveniently right in the hot car
  • Integration with multiple applications
Some wallets (for example Ledger Nano S they support more than 25 cryptocurrencies, have open source software and hardware, and cost only $ 80.

Disadvantages of hardware wallets:
  • Maximum of four simultaneously active cryptocurrencies
  • The set of available currencies is limited and does not depend on you
  • They give out their purpose
  • They cost money
Therefore, the choice is yours - to go the simple way or in a more difficult, but more interesting way. This guide covers the topic of using software, exchanges, and dapps quite broadly. Therefore, it will be useful for everyone, including owners of hardware wallets.

Next is a tutorial on how to organize self-storage and use for the most popular cryptocurrencies.

No specific skills are required of you. But you can't do without minimal computer literacy + the ability to use a mental or software English-Russian translator is desirable. You'll need more:
  • Computer or laptop
  • Two flash drives from 8Gb (Yes, two and it is not less than 8 gigs)
  • Paper / book/Notepad and a good pen

As a result of completing the tutorial, you will have:
  1. Secure browser in the main operating system for working on exchanges and other critical services.
  2. Virtual machine for operations with small amounts and using Web3 dapps
  3. Secure multi-currency wallet on bootable USB. At least for: Bitcoin, Ethereum / Ethereum Classic + ERC20 tokens, Monero, Bitshares, Litecoin, Stellar, NEO, Ripple, IOTA, DASH, NEM. The list can be expanded
  4. Proven scheme for organizing backups, accounts, addresses, passwords, and 2FA codes
  5. Cold wallet monitoring system
  6. Theft response system
Let's go!

1. Safe trading on exchanges
Trading on exchanges and Localbitcoins is more convenient and quite safe to conduct from the main operating system.

The main attack vectors are here:
  1. Phishing
  2. DNS spoofing
  3. Man in the Middle attacks
To protect yourself from these attacks, you must first be careful and use a secure browser. Firefox - it is considered one of the most secure browsers with the correct configuration and the necessary extensions.

Configuring Firefox:
1. Enabling protection against phishing sites
1*oawpV_kBzsVDy3TquKNOQQ.png

2. Install HTTPS Everywhere - force https to be enabled wherever possible. This will protect you from MitM attacks.

3. Always check the site's name and certificate. Checking the certificate will make sure that the DNS is not spoofed. You can use CipherFox to make it easier to check the site's certificate.

Setting up access to exchanges:
  1. Configuring two-factor authentication (2FA) via Google Authenticator everywhere, without exception, including on the mail that we use for exchanges.
  2. When creating a 2FA, we write out all the service codes in the file 2fa.txt. Service codes will help you restore access if you lose your device running Google Authenticator.
  3. We set a service password for withdrawing funds, if the exchange has such functionality. This will help you protect yourself from the most sophisticated and automated attacks.
File 2fa.txt we will then save it together with your private keys.

About password managers
This is very convenient. But I wouldn't recommend using third-party apps for this, because they often turn out to be a desirable target for hackers. The standard password Manager in Firefox is quite enough. I would also not recommend setting up password synchronization, the benefit in convenience here is questionable as for me, and there are a lot of risks immediately. Let everything be stored locally.

2. Virtual machine for dapps
We will use Ubuntu as a virtual machine. Why Ubuntu? Because it is safer than Windows and it is the simplest and most intuitive Linux distribution for beginners.

Download VirtualBox (a program for virtualization) https://www.ubuntu.com/download/desktop

Download it .iso image from Ubuntu from the official website: https://www.ubuntu.com/download/desktop

Install VirtualBox and then install Ubuntu in it. Excellent instructions with screenshots were found here:

Installing Metamask

Metamask is an open source extension for the Chrome, Firefox, and Brave browsers, which is an Ethereum wallet. Private keys are not sent anywhere.

Through Metamask, you can interact with decentralized applications (dapps) that use web3.the js library. For example, you can connect to the decentralized exchange EtherDelta or IDEX, play CryptoKitties, buy domain names in Ethereum ENS.

A large list of dapps can be found here.

Install Metamask in Firefox and create a wallet (video to help), write down 12 words on a piece of paper/Notepad/notebook and copy it to a file privkeys.txt. We'll also create another file pubkeys.txt where we will copy the ETH address. We'll leave these files on the VM for now.

After that, you just need to send some ETH to the address of our Metamask wallet and you can use it.

Encrypting the virtual machine

After configuring our VM and installing all the necessary SOFTWARE, enable encryption for the VDI disk (this is the disk where the VM files are stored).
  1. To do this, turn off (Power Off) Ubuntu.
  2. Go to Settings > Encryption >> Enter your password > OK

3. Bootable USB for cold wallets
We will use Tails as a portable operating system. Why choose Tails? Because this is a Live USB system, it was specially sharpened for privacy and security. It is built on Debian the most reliable Linux distribution, with the minimum necessary software. Tails also supports storing your data in an encrypted area.

  • Go to the official website https://tails.boum.org/install/os/index.en.html
  • Choose the OS of your computer / laptop from which the installation will take place
  • Then you will see detailed installation instructions in English
  • Follow the instructions: first install the live version on one flash drive, then boot from live and do a full installation on another flash drive
Configuring an encrypted Persistent storage area in Tails

Encrypted Persistent is the encrypted partition on your USB that we are going to store data on:
  • SOFTWARE for wallets and other programs that you can install
  • Configuration files for these programs
  • Private keys to wallets
  • txt file with addresses and public keys
If the flash drive is lost, even if the finder is sufficiently interested and savvy to try to decrypt it, the chances of success of a brute-force attack will be zero if you have a strong enough password.

A strong password is a random set of more than 20 characters with numbers, symbols, and letters in different cases. Don't be lazy to make a strong password! Write it down on paper first, but then learn it better by heart.

Creating Encrypted Persistent on Tails:
  1. Boot into the already installed Tails on USB> log in
  2. Applications > System Tools > Configure persistent volume
  3. In the window, enter a strong password, click Create and wait
  4. A window will appear to select the applications whose data we want to save. Select Personal Data and Electrum (Bitcoin Client) > Click Save
  5. Rebooting. Now when you log in to the window “Use Persistence?"select YES and enter the password
  6. We are all in a system with Encrypted Persistent. Now go to the installation of wallets in the personal Data folder.
If it didn't work out, here is the video instruction

Download cold wallets for Tails
Let's get to the most interesting part - installing and creating various wallets. But first we need to download all this stuff, upload it to a flash drive and transfer it to Tails.

Here you may have a question: “How will the wallets fit on a flash drive”". After all, the Bitcoin blockchain weighs more than 165 GB at the time of writing.

Of course, we can't use wallets that download the entire blockchain on an 8Gb flash drive. We only need "light clients" that use SPV mechanisms to verify transactions.

SPV or Simplified Payment Verification is a mechanism for verifying a specific transaction in a block, without downloading the entire block. In other words, this mechanism allows you to check only your own transactions, without worrying about checking other people's transactions. That is, you do not need to download the entire blockchain and becomes a “full node”.

SPV is not some new thing. This mechanism was mentioned in Satoshi Nakamoto's original paper Bitcoin: a Peer-to-Peer Electronic Cash System . SPV has been working in the Electrum wallet since its introduction. Ethereum has a similar CONCEPT., as in many other systems. And the whole thing works quite reliably, as long as most nodes are bona fide. Using the Electrum example, an attacker can hijack most of the Electrum Servers, and then you can start receiving transactions that are actually invalid and are not present in the main blockchain. You'll think you've been paid, but you haven't. It is very easy to make sure here - additionally check transaction confirmations through blockchain explorers.

Only "light clients" that meet the following requirements will be suitable for us:
  • Open source!
  • Private keys are not sent anywhere
  • Download only from official repositories and sites
  • The build is stable and has passed community review
The most important thing here is NOT to download malicious software. Therefore, we always check the url and certificate on the site.

Below are the wallets that I use myself. We will download builds for Debian (the distribution on which Tails is built). Let's go!

Bitcoin

Our choice of Electrum is one of the old and reliable open source lightweight clients. Electrum is initially pre-installed in Tails. You don't need to download anything :)

Ethereum/Ethereum Classic and ERC20 tokens

We will use the local version of the MyEtherWallet site, downloaded from the official repository. MEW is a completely client-side wallet. This means that all the code for creating, signing, and sending a transaction is located locally on your computer in your browser in the html and js code of this web application.

Using the local version, you don't connect anywhere. This means that you are protected from traffic interception, phishing, and DNS spoofing attacks. You can create transactions offline.

Download it from the official repository

Unpack the archive and run Falik index.html - this is all you need to start MEW locally
MEW can be used to store ETH and ETC. And of course for all ERC20 tokens, such as ZRX, REP, ANT, DNT, etc.

MoneroMyMonero is a community-approved lightweight client. Download the Linux version from the official repository: https://github.com/mymonero/mymonero-app-js/releases

Bitshares
Official client. Download it for Linux

Litecoin
Electrum-ltc is a proven fork Of electrum for Litecoin. The code is open. Download it for Linux

Stellar
Foxlet wallet is a stellar-approved lightweight wallet. The code is open. Download it for Linux

NEO
Official light wallet from the community. The code is open. Download it for Linux

Ripple
Toast Wallet-an unofficial light client - is our choice. The code is open. Download it for Linux

IOTA
The official wallet can work in the "light client" mode. Download it for Linux

DASH
Electrum-dash is an officially approved wallet. Download it for Linux

NEM
Nano Wallet is the official lightweight client. Download it for Linux

Installing and configuring cold wallets in Tails
At this point, we have downloaded all the builds of the necessary wallets and uploaded them to a USB flash drive. Now insert the USB with Tails and boot into it. Don't connect to the Internet!

Let's create a folder inside the home directory, let's call it, for example, Wallets. We insert the second flash drive with the assemblies and transfer all the files to the Wallets folder.

Next, we take turns installing and creating our wallets.
  1. Unpack the archive/run the dpkg installer
  2. Go to the folder/follow all the steps
  3. Launching your wallet
  4. Creating a new private-public key pair
  5. Copy each private key to a file (for example privkeys.txt) with a note indicating which blockchain system it is from. We will then securely encrypt and store this txt file
  6. We write down the private key on paper/Notepad/notebook
  7. Creating a strong password to encrypt the private key file inside the wallet
  8. Copy addresses and public keys to another file (for example pubkeys.txt). We need a public key and an address/a (often not the same thing). We will then transfer this txt file to the hot machine
The process is the same everywhere and intuitive. In Tails, you can only install third-party apps in your Personal Data folder. You may have problems with dependencies, so you need to install them separately. Here you need to Google in each individual case.

Sending crypt from cold wallets

To make it as safe as possible, you can't connect to the Internet. Therefore, the scheme is as follows:
  1. We upload the addresses to be sent and the amounts (if this is important) to the flash drive in the txt file)
  2. Uploading to Tails with Persistence Storage enabled
  3. Launch the desired wallet and create a transaction
  4. We need to get a Signed Transaction
  5. Copy this set of characters to a flash drive in the file tipo transactions.txt
  6. We boot into the hot OS and make broadcast transactions via the Explorer blockchain, for example, for cue Ball here, for Ether here

4. Watch-only wallets
On a hot machine, we are going to make” watch-only " wallets. Watch - only is a wallet through which we can monitor our balances, accept payments, and generate new addresses (using the public key), but we can't send anything because the private key isn't there.

We will need our addresses and public keys for previously created wallets. Transfer the file using a flash drive pubkeys.txt on a hot car.

You can use a blockchain Explorer or wallet software with an imported public key as a watch-only wallet. The difference is that using public key software, we can observe balances at all our addresses and generate new addresses. And through the blockchain Explorer, we can only observe specific addresses.

Creating a watch-only for Bitcoin in Electrum:

1. Download Electrum on a hot machine

2. Launch, select create wallet

3. Select "standart wallet”

4. Next, select " use a master key”

0*Kkk4-ElIOGG5Bd7e.

5. Insert the PUBLIC key of the bitcoin wallet, which we saved in pubkeys.txt. Public - this one that starts with xpub

0*cLsYFq5nEag5j3jg.

Click Next and our watch-only wallet is created. In it, you can view balances, generate addresses, and accept payments, but you can't send anything.

We do the same for other cryptocurrencies that we are interested in. The principle is the same everywhere, but for some, a blockchain Explorer is enough:

Ethereum/Ethereum Classic:
https://etherscan.io/address/0x0000000000000000000000000000

Where instead of 0x00... insert your address. I personally made bookmarks for all my addresses in a separate folder.

Bitshares:
https://cryptofresh.com/u/yourname

Stellar:
https://stellarchain.io/address/youraddress

NEO:
https://neotracker.io/address/youradress

Ripple:
https://bithomp.com/explorer/

IOTA:
https://iotasear.ch/address/youraddress

NEM:
http://explorer.nemchina.com/#/s_account?account=youraddress

For DASH, LTC, we do everything by analogy in Electrum.

For Monero instructions here https://getmonero.org/resources/user-guides/view_only.html

5. monitoring of cold wallets
When we can keep an eye on our balances through watch-only wallets - it would be great to automate this task and instantly receive notifications about all incoming and outgoing transactions on cold wallets.

For these purposes, you can write your own monitoring in the Google sign, for example. Or use some special services/bots.

For example, MyETH_bot for tracking the balances of ETH and all ERC20 tokens. The bot checks your wallet every 30 seconds and responds very quickly. However, there is a limit of one ETH address per user.

I didn't find any services for Bitcoin and other currencies, so I made monitoring in the Google spreadsheet using the Google Apps Script.

6. what should I do in case of theft?
To clean out your entire ETH wallet with all the ERC20 tokens, you need to make a new transaction for each token. Firstly, it takes time, and secondly, in Ethereum, it is possible to interrupt (Replace By Fee) your own transactions. And this gives us a chance to get ahead of the villain and save some of the funds. And if necessary, withdraw all other cryptocurrencies to reserve wallets (or to the exchange if there are none).)

It is very important to be prepared for this. It all comes down to convenience and speed of reaction. In the case of Tails, it will certainly not be so fast compared to a hardware wallet, but when there is a lot of crypt and it is different, 10-30 minutes should be enough to get ahead of the hacker.

Ideally, this process should be fully automated. For example, using your own secure VPS server, which runs all wallets and a script that starts an automated withdrawal of funds to backup wallets on our alarm signal.

By the way, you can use MyETH_bot to send custom callback requests in case of an alarm. In fact, you can already use it to configure such a response system. But this is a topic for a separate guide.

7. Organize backups
Once all the wallets are created, you need to securely store all our private keys, passwords, and service codes from Google Authenticator. This action can only be performed once, but it is critical.

Your backups can look like this:
  1. Written out keys and passwords in paper / Notepad/notebook
  2. Encrypted private key files inside Tails USB
  3. File privkeys.txt and 2fa.txt in an encrypted zip archive on a flash drive. We store it separately from the flash drive with Tails (for example, at your parents ' place or in a safe Deposit box)
  4. File privkeys.txt and 2fa.txt in an encrypted archive in a secure cloud (for example, Google Drive). As an additional option.

Creating an encrypted archive
  1. We will put all the files that we want to protect with a password and save them in a separate folder. For example folderx
  2. Right-click on the folderx folder and select Compress…
  3. Open the “Other options " menu and enter a strong password in Ubuntu
1*LGv2xkHBBTkJPydVdpwFrA.png

3.1 In Tails, we do this with the command in the terminal:
Code:
zip --encrypt folderx.zip -r folderx

Where folderx is the folder with all the files.

4. Click Create and our archive will be created. After that, all you have to do is transfer it to a flash drive and to the cloud

I think that this scheme is more than reliable. But I will advise you to improve, Supplement and disguise each item using your own ideas.

medium.com
 
Top