Primitives / Wallets
User Interface Blockchain Primitive

Wallets

Software or hardware that manages private keys and enables blockchain interaction

What are Crypto Wallets?

A cryptocurrency wallet is software or hardware that stores private keys and enables users to interact with blockchain networks. Despite the name, wallets don’t actually store cryptocurrency—they store the cryptographic keys that prove ownership of assets recorded on the blockchain. The wallet’s core function is signing transactions to authorize asset transfers and smart contract interactions.

How Wallets Work

Key Pairs

Cryptographic foundation:

  • Private Key: Secret, authorizes transactions
  • Public Key: Derived from private, shareable
  • Address: Derived from public key, receives funds
  • Never share private key!

Transaction Signing

Authorization process:

  1. User initiates transaction
  2. Wallet creates transaction data
  3. Private key signs transaction
  4. Signature proves ownership
  5. Broadcast to network

Key Derivation

Modern wallets use hierarchical deterministic (HD) keys:

  • Single seed generates many addresses
  • 12 or 24-word seed phrase
  • Backup seed = backup all keys
  • BIP-39/44 standards

Wallet Types

Hot Wallets (Software)

Connected to internet:

  • Browser Extension: MetaMask, Phantom
  • Mobile Apps: Trust Wallet, Rainbow
  • Desktop: Electrum, Exodus
  • Convenient but higher risk

Cold Wallets (Hardware)

Offline key storage:

  • Hardware Wallets: Ledger, Trezor
  • Air-gapped Computers: Dedicated signing devices
  • Paper Wallets: Printed keys (deprecated)
  • More secure, less convenient

Smart Contract Wallets

Programmable accounts:

  • Multi-sig: Multiple signatures required
  • Social Recovery: Guardians can recover
  • Account Abstraction: Custom logic
  • Examples: Safe, Argent

Custodial vs. Non-Custodial

Who controls keys:

  • Custodial: Exchange holds keys (Coinbase, Binance)
  • Non-Custodial: You hold keys (MetaMask, Ledger)
  • “Not your keys, not your crypto”
  • Trade-off: convenience vs. control

Wallet Features

Basic Functions

Essential capabilities:

  • Send transactions
  • Receive assets
  • View balances
  • Transaction history

Advanced Features

Modern wallet additions:

  • Token swaps
  • dApp browser
  • NFT display
  • Multi-chain support
  • Staking integration

Security Features

Protection mechanisms:

  • Password/PIN protection
  • Biometric unlock
  • Transaction simulation
  • Scam detection
  • Hardware signing

Security Best Practices

Seed Phrase Protection

Critical security:

  • Write on paper (not digital)
  • Store in multiple secure locations
  • Never share with anyone
  • Never enter online
  • Consider metal backup

Hot Wallet Hygiene

Using safely:

  • Separate wallet for dApp interaction
  • Keep small amounts in hot wallets
  • Regular permission reviews
  • Revoke unused approvals

Hardware Wallet Usage

Maximum security:

  • Buy directly from manufacturer
  • Verify device authenticity
  • Use for large holdings
  • Keep firmware updated

Common Attacks

Phishing

Social engineering:

  • Fake websites
  • Malicious browser extensions
  • Social media scams
  • Always verify URLs

Approval Exploits

Smart contract risks:

  • Unlimited token approvals
  • Malicious contracts
  • Use approval management tools
  • Revoke old approvals

Seed Phrase Theft

Targeting recovery:

  • Fake support requesting seed
  • Phishing for recovery words
  • Malware keyloggers
  • Never enter seed unless recovering

Wallet Standards

BIP Standards

Bitcoin improvement proposals:

  • BIP-32: HD wallets
  • BIP-39: Mnemonic seed phrases
  • BIP-44: Multi-account structure
  • Used across most chains

EIP Standards

Ethereum proposals:

  • EIP-712: Typed data signing
  • EIP-1193: Provider API
  • EIP-4337: Account abstraction
  • Evolving capabilities

Multi-Chain Wallets

Challenges

Cross-chain complexity:

  • Different address formats
  • Varying transaction types
  • Multiple networks to track
  • Bridge integrations

Solutions

Modern approaches:

  • Unified interfaces
  • Chain abstraction
  • Automatic network switching
  • Portfolio aggregation

The Future of Wallets

Account Abstraction

Programmable accounts:

  • Gas paid in any token
  • Social recovery
  • Batched transactions
  • Custom security rules

Passkey Integration

Web standard authentication:

  • No seed phrase needed
  • Biometric authentication
  • Device-bound security
  • Better UX

Social Recovery

Guardian systems:

  • Trusted contacts can recover
  • No single point of failure
  • Configurable thresholds
  • Progressive security

Chain Abstraction

Simplified multi-chain:

  • Users don’t see chains
  • Automatic routing
  • Unified balances
  • Seamless experience

Choosing a Wallet

Considerations

Selection criteria:

  • Security needs: How much are you storing?
  • Use case: Trading, holding, dApps?
  • Chains needed: Which networks?
  • Experience level: Simple or advanced?

Recommendations

General guidance:

  • Large holdings: Hardware wallet
  • Active dApp use: Hot wallet + hardware
  • Beginners: Reputable mobile wallet
  • Power users: Multiple specialized wallets

Conclusion

Wallets are the essential interface between users and blockchain networks, managing the cryptographic keys that prove ownership of digital assets. Understanding wallet types, security practices, and emerging technologies like account abstraction is crucial for anyone interacting with blockchain systems. The ongoing evolution toward better UX through smart contract wallets and chain abstraction promises to make crypto more accessible while maintaining the self-custody that makes it valuable.