27 July 2022 • 9 min read
The crypto industry is a lucrative space. However, users have to battle two main threats to protect their investments: volatility and security. A user can safely navigate the former (volatility) with financial acumen and sound risk management strategies. However, the latter (security) can be more difficult, especially since crypto scams are growing in number and sophistication.
Typically, hacks are due to a strategic vulnerability or backdoor attack. Since 2011, the crypto world has suffered major hacks, resulting in the loss of millions of dollars worth of crypto assets. In extreme cases such as the Mt. Gox hack, the exchange had to suspend trading; it remains the biggest Bitcoin heist in history.
In the case of crypto, a major liability is and remains how (or where) a trader stores his or her crypto. As the saying goes, not your keys, not your crypto. If you store your crypto on an exchange, then you don’t actually have control over your coins, which is why using a “cold” or “hard” wallet (the two are synonymous) is so important, whether you’re a new trader or a more seasoned veteran (in which case you should already know the importance of cold wallets).
In simple terms, a crypto wallet is a digital vault for storing any of the hundreds of popular cryptocurrencies available on the market. Technically, however, its first function isn’t to store cryptocurrencies; rather, it holds the private keys that give access to the cryptocurrencies.
Usually, wallets contain two types of keys: the private keys and the public key (also called the wallet address). The private keys allow the user to access and control their crypto assets. Losing one’s private keys means losing one’s wallet and the assets therein. The public key, on the other hand, is a string of alphanumeric characters used to send or receive funds into the wallet.
Wallets can be classified in two ways: either based on where the private keys are stored or whether they are connected to the internet.
Depending on who holds the private keys, a wallet can be custodial or non-custodial, and there are benefits and drawbacks to consider when deciding on the right one based on your individual needs.
A custodial wallet is a service often offered by centralized exchanges. The exchange (third party) holds and manages the wallet’s private keys. This means that the user has no control over the keys. By registering with and storing their funds on a custodial wallet, the user trusts the exchange to keep their assets safe.
While the user is relieved of the burden of finding a secure way to protect their private keys, they risk losing their funds to hacks, censorship, or seizure. Furthermore, the user has to rely on the exchange service to complete their crypto transactions. The exchange can, however, decide not to complete the transaction. Anti-crypto governments have exploited this loophole to seize crypto assets of individuals or groups, which is why crypto users prefer non-custodial wallets—a wallet that gives them control.
With a non-custodial wallet, a user holds the private keys and thus has full control over their assets. They have the sole duty of storing, managing, and protecting their funds. In the event that they (un)willingly give another party their private keys, they cede control to this party. Also, if the individual loses their private keys, they’ve lost their funds. Forever.
While non-custodial wallets offer users control over their assets, they share a common feature with custodial wallets: they need internet connectivity to function, which leads us to the next criteria for the classification of wallets.
Although most crypto wallets are connected to the internet, there are others that are not. Wallets connected to the internet are called “hot wallets,” while those that are not connected are “cold wallets.”
Crypto hot wallets can be web-based or mobile applications and are easy to use. A user simplz needs an internet connection, which enables them to log into the wallet at any time. However, being constantly connected to the internet exposes the wallet, even if it is non-custodial, to online attacks. Because they are internet-based, non-custodial wallets are only “hack-resistant,” but not “hack-proof.” Hackers can still devise a means to access the user’s wallet.
A cold wallet’s private keys are stored within the device. Cold wallets are not connected to the internet, although the user would require an internet connection to make transactions. Typically, crypto cold wallets are hardware devices that resemble a USB stick. To make a transaction, the user would have to plug the device into a computer to transfer the funds to a hot wallet. Less popular forms of cold wallets include paper wallets, offline computers, and physical bitcoins.
Cold wallets are impervious to online attacks. A hacker would need to steal the hardware and the associated PIN or password to access the assets, but this raises a number of important questions. Does this totally erase a user’s security concerns? Isn’t the cold wallet vulnerable to a hack since it still requires internet connectivity to carry out transactions? Isn’t an online attack possible during the process of transferring the funds?
These are all valid concerns, which is why cold wallet manufacturers have created an in-built security measure. For a recipient to claim crypto sent from a hardware wallet, the owner of the wallet must sign the transaction. And this signature is appended in the device. Even in a case where a transaction initiated in the hardware wallet is intercepted and falsely signed by malware, the transaction wouldn’t go through because the signature is wrong.
Despite its advantages, using a cold wallet is usually a trade-off between security and convenience. Cold wallets are tremendously secure, but they can be quite inconvenient to use. The user is saddled with the responsibility of powering, connecting, and correctly using the device. In addition to being less convenient than hot wallets, cold wallets are expensive (most hard wallets are free). A Ledger Nano S Plus Wallet costs €79, while a TREZOR Model T Wallet will set you back around €300.
This is an open-source wallet launched by SatoshiLabs in 2013 and can hold over 1,600 currencies.
There are two types of Trezor wallet: Trezor Model One (released in 2014) and Trezor Model T (released in 2018).
Trezor Model One is compatible with most computer operating systems, such as Windows 10+, MacOS 10.11+, and Linux. For mobile operating systems, it is only compatible with Android, while it is incompatible with iOS and Windows.
Besides storing private keys and crypto assets, the Model T also stores individual passwords within its Password Manager (a user would have to confirm an action before the passwords are released). It is important to note that passwords are not released collectively, but individually; each password requires confirmation before release.
Model T shares the same OS compatibility features as Model One.
Some of the downsides of Trezor include:
On Trezor’s online shop, the Model One costs around €83, while the Model T costs just under €300.
Both Trezor Model One and Trezor Model T are easy to use. Model One is a two-button device with a user-friendly interface. Model T’s color touchscreen makes it even easier to use.
Trezor’s official site lists the following features for its devices:
Ledger is a multicurrency hardware wallet created by a company of the same name in 2014. The wallet runs on a homemade operating system known as “Blockchain Open Ledger Operating System” (BOLOS) and supports more than 1,800 currencies.
As with Trezor, Ledger also offers two options: the Ledger Nano S Plus (originally launched as the Nano S in 2016) and the Ledger Nano X (launched in 2019).
According to its website, the Ledger Nano S Plus costs €79. Ledger Nano X is priced at about €149.
Ledger wallets are relatively easy to use, especially the Nano X, which allows users to connect to a smartphone or laptop via Bluetooth instead of a USB.
Ledger’s official site lists the following features:
Well, it’s actually a tough call. The downsides of one are compensated by the strengths of the other. On the one hand, Trezor offers more transparency and security since it is open-source and has the Shamir Backup feature. On the other hand, Ledger is more inexpensive and can easily connect to a smartphone through Bluetooth. And then there are aesthetics: if you’re interested in a stylish piece of kit, then Ledger edges out Trezor’s dated design.
Ultimately, the final call as to which is “better” will be a subjective one. For the more budget-conscious among us, the Ledger options are certainly more attractive. However, if an extra layer of security is your top priority, then you’ll likely go with one of Trezor’s offerings. Whichever you choose, both Trezor and Ledger offer excellent options.