How To Store Cryptocurrency Safely in 2022
Many can't get a good night's sleep because they know their cryptocurrency might get stolen. However, storing your cryptocurrency safely is easier than it might appear at first sight... This guide teaches you how to store your cryptocurrency safely.
Getting cryptocurrency is one thing while storing it safely requires entirely different skills and knowledge. This guide teaches you how to protect your funds, choose the right wallet, and avoid the most common hazards of crypto security.
What Is A Crypto Wallet
A cryptocurrency wallet is a software program designed to store your public and private keys, send and receive digital currencies, monitor their balance, and interact with various blockchains. You need to have a cryptocurrency wallet to manage your crypto assets and keep them secure.
There are many cryptocurrency wallets out there, but the essential distinction between them is whether they are hot or cold.
- A hot wallet is connected to the internet and can be accessed at any time.
- A cold wallet is not connected to the internet and allows to store your funds offline. You can still receive funds at any time, but no-one can transfer them out.
Hot wallets include all online cloud wallets, most mobile, and software wallets, and exchanges.
Cold wallets are hardware wallets, offline kept paper wallets, USB and offline similar data storage devices, and even physical bearer items such as physical Bitcoins.
Most cryptocurrency holders use both cold and hot wallets. Hot wallets are handy for frequent trading, while cold wallets are better for long-term holding of crypto assets.
But before we explore different wallets, here is a brief reminder of why keeping your digital assets in exchanges is generally not a good idea.
Types Of Cryptocurrency Wallets
There are four distinct categories of cryptocurrency wallets: paper, hardware, cloud, and online. Letâ€™s have a look at each of them.
Paper wallets are generally classified as cold storage. The term â€œpaper walletâ€ generally refers to a physical copy or paper print of your public and private keys. Other times it means software used to generate a pair of keys along with digital file for printing. Whichever the case, paper wallets can grant you a relatively high level of security. You can import your paper wallet into a software client or simply scan its QR code to move your funds.
If a paper wallet is available for cryptocurrency of your choice, youâ€™re likely to find a guide on how to make one on the projectâ€™s website or community page. MyEtherWallet is a universal way to make a paper wallet for Ethereum and all ERC-20 tokens. Use Bitcoin Paper Wallet Generator to generate a paper wallet for Bitcoin.
Although paper wallets are cold, they come with their share of risks, too. For instance, paper wallets can be easily damaged, burned, easy to copy and take pictures, and require mutual trust if you're not making one yourself. To make paper wallets less fragile, sometimes people laminate them, create multiple copies and store them in different locations, engrave them on pieces of metal or other sturdy materials, etc.
Note, that it is a bad idea to keep electronic copies of your paper wallet on your PC. The private key of paper wallet should always be kept offline. Keeping your paper wallet files online makes it as secure as a hot wallet.
Online wallets, by definition, are hot. Using a cloud wallet, your funds can be accessed from any computer, device, or location. They are super convenient, but they store your private keys online and can be controlled by third-parties. Therefore, they are more vulnerable to attacks and theft by design. Popular cloud wallets include:
A safer version of cloud wallets is non-custodial online wallets. They are accessible via web and apps but the service provider does not have access to your private keys. In most cases, not custodial wallets are a part of exchange platform, meaning that they let you trade your coins in a safe and secure manner. Examples of non-custodial cloud wallets include wallets by:
Software wallets are downloaded and installed on a personal computer or smartphone. They are hot wallets. Both desktop and mobile wallets offer a high level of security; however, they cannot protect you against hacks and viruses, so you should try your best to stay malware-free.
As a rule, mobile wallets are way smaller and simpler than desktop wallets, but you can easily manage your funds using both of them. Besides, some software wallets allow you to access funds via multiple devices simultaneously, including smartphones, laptops, and even hardware wallets.
- Electrum Wallet
- Infino Wallet
Unlike software wallets, hardware wallets store your private keys on an external device like USB. They are entirely cold and secure. Also, they are capable of making online payments, too. Some hardware wallets are compatible with web interfaces and support multiple currencies.
They are designed to make transactions easy and convenient, so all you need to do is plug it in any online device, unlock your wallet, send currency, and confirm a transaction. Hardware wallets are considered the safest means of storing crypto assets. The only drawback is that they arenâ€™t free to use.
Popular hardware wallets include devices by:
Getting a hardware wallet directly from a manufacturer is the most secure way. It is unsafe to buy it from other people, especially the ones you don't know. Mind that even if you get a hardware wallet from a producer, you should always initialize and reset it yourself.
Typically, your wallet choice depends on your portfolio. Every serious project should have its native wallet which should be found at its website, but sometimes it may be more convenient to have a multicurrency wallet.
Keep in mind that not all multicurrency wallets support all coins. Even hardware wallets have a limited amount of coins they support. On the other hand, thereâ€™s no shortage of wallets for popular cryptocurrencies like Bitcoin or Ethereum.
Hardware wallets. Source: Jaro Larnos / Flickr.
Once you get a (hardware) cryptocurrency wallet you will also need to protect your private recovery seed phrase. One of the most reliable seed word protection tools is CryptoTag which allows you to store them on virtually indestructible titanium plates.
Crypto Tag device. Source: Cryptotag.io
Best Security Practices to Prevent Stolen Private Keys
So you decided to take control of your crypto assets and hold everything in a private wallet. Well done! However, with great power comes great responsibility, and now it all rests on your ability to remain secure and keep your private keys private.
The most common security steps to take are:
- Donâ€™t keep cryptocurrency in exchange for a prolonged period or longer than necessary.
- Always enable two-factor authentication (2FA) function.
- If you go for a hardware wallet, choose a pin code which is hard to guess, and never put your 24-word recovery sheet online.
- Donâ€™t boast of your crypto holdings publicly under your real name or identifiable address. Some burglars manage to steal crypto funds even if you keep them in a cold (offline) storage.
- Trust only what you see on your hardware wallet screen and verify all the information on the device.
- Always assume that your devices can get compromised anytime, so always treat your computer or smartphone screen with caution.
In addition, follow these tips to minimize the chances of losing your crypto.
Be Aware Of Phishing Sites. Whether youâ€™re connecting to exchange or online wallet, confirm that youâ€™re logging in to the right address. Many bogus websites imitate exchanges for the sole purpose of stealing your login data. Always check whether the website address is correct.
HTTPS. Login only to secure websites with a valid HTTPS certificate. Most legit sites have one. For extra safety, try browser plugins like â€œHTTPS Everywhere.â€
Use a Secure Wi-Fi Connection. Never connect to your online wallet, exchange account or another critical security point via public WiFi. Even when youâ€™re at a presumably safe place, make sure your WiFi access point uses strong encryption like WPA-2 protocol.
Separate Your Funds. Donâ€™t keep all your crypto assets in one place. The best way to handle it is by using one or several cold storages for long-term holdings, and at least one hot wallet for trading and transactions.
Two-factor Authentication. Always secure your accounts with 2FA. Whenever possible, use software or hardware 2FA instruments rather than SMS.
Whitelist IP and Withdrawal Addresses. If you have a static IP address, use it for your safety. Make sure that only you can access your accounts and funds.
Double-check Crypto Addresses. Some malicious programs can edit and paste a wrong transaction address whenever you send a transaction. Typically, the new address belongs to an attacker. Itâ€™s better to be safe than sorry.
Use Security Measures You Can Handle. Some people never feel secure and go to the furthest lengths to secure their cryptocurrency. However, they forget that they can also lose crypto to their security tools.
Losing access to your accounts, funds, or wallets is as common as hacks. Donâ€™t overcomplicate your security if thatâ€™s not what youâ€™re into anyway. Strive for an appropriate balance between complexity and security.
The art of keeping your cryptocurrency safe and secure is a critical skill to master on a journey to becoming your own bank. The sooner you learn it, the better.
You may also be interested in - Guide: How to pick the best cryptocurrency exchange?