Safely storing your crypto holdings should be one of your new year resolutions — learn how with CoinMarketCap Academy.
Introduction
Cold cold heart, hard done by you…This well-known chorus could very well sum up 2022 for most crypto investors, as 2021’s new highs mutated into some pretty bad lows during another controversial Crypto Winter.
And we’re not just talking about the downward price action. This year has seen some of our biggest industry “champions” fall from grace as their empires collapse like a house of cards, costing investors tens of billions in lost or stolen funds.
Where and how do I store my crypto safely?
The answer remains: Self-custody, where only you safekeep and control your crypto assets.
First, let’s review the crypto’s recent custodial carnage that brought us to this point.
Join us in showcasing the cryptocurrency revolution, one newsletter at a time. Subscribe now to get daily news and market updates right to your inbox, along with our millions of other subscribers (that’s right, millions love us!) — what are you waiting for?
Crypto Custodians Fall Like Dominoes
Proof-of-Keys vs Proof-of-Reserves
While the idea is laudable, it's supposed to be more rhetorical than practical, highlighting the most important truth in all of crypto:
Not Your Keys, Not Your Crypto.
Not Your Keys, Not Your Crypto.
The truth is that crypto like Bitcoin was created to remove the need for financial intermediaries, thanks to its trustless, immutable and decentralized nature. However, as the crypto industry grew, centralized exchanges and custodians came to market to service users' needs, providing ease of access to cryptocurrency. Unfortunately, the outsized influence of these centralized entities allowed it to get away with many things — from misusing users funds to outright fraud.
Evidently, proof-of-keys is as important as ever.
Self-Custody Basics
OK, back to self-custody.
Firstly, in order to move your funds off exchanges and self-custody your crypto, you’re going to need a non-custodial wallet which only you control.
There are two broad categories to understand:
What Is a Cold Wallet?
Cold wallets are offline crypto wallets that are never connected to the Internet and therefore cannot be remotely accessed by third parties online. These physical wallets keep your crypto in what is called cold storage and are considered the most secure wallets out there.
There are three main types: a paper wallet, steel wallet and hardware wallet.
- A paper wallet is simply a paper printout or written recording of your private key or recovery seed phrase on a piece of paper.
- A steel wallet is a virtually indestructible metal wallet that is resistant against environmental damage like fire or water.
- A hardware wallet is a dedicated device that keeps your private key safe and signs transactions on your behalf with it.
For that, you’re going to need a hardware wallet (or a hot wallet).
One more thing: paper and steel wallets usually require the private key or recovery seed to be generated on an electronic device first. This could potentially leave a digital copy behind that can be found and exploited by hackers or other device users. The best hardware wallets allow users to create their wallets on the device itself, without connecting to a phone or computer.
What Should I Know About Hardware Wallets?
Hardware wallets, interchangeably called cold wallets, are sophisticated electronic devices that keep your private key off the internet at all times. However, they can differ wildly in quality and price.
To pick one that is right for you, it’s best which of the following features you value most:
1. Security
2. Form factor
3. Convenience
4. Coin support
5. Functionality
Security
You’ll usually see an SE boast a security rating that ranges from EAL5+ to EAL7+. EAL (or CC EAL) stands for Common Criteria Evaluation Assurance Levels and helps to validate that a certain system or device (like a flagship smartphone, hardware wallet or e-passport) meets a defined and standardized set of security requirements.
A higher EAL usually brings a higher price tag, but doesn’t necessarily mean a device is always more secure, just that it was more stringently evaluated, and may have provided its security features more reliably. The process can be very subjective. Therefore, anything from 5+ should be more than adequate.
Meanwhile, market leader Ledger’s Nano X and S models respectively have EAL6+ and EAL5+ secure elements, which is the same as mobile hardware wallet CoolWallet’s Pro and S models.
SafePal S1 sports a 5+ SE, while cold storage pioneer Trezor surprisingly doesn’t have secure elements in its wallets, preferring to use a single open-source chip base instead that it has perfected over time.
Form, Factor and Convenience
Most cold wallets (such as Ledger and Trezor) use a tethered USB interface to connect with a personal computer, making them quite bulky in the process. Hardware wallets that are standalone (e.g. SafePal) or solely connect over encrypted Bluetooth to a mobile phone are usually slimmer and easier to carry around without drawing attention.
The slimmer the device, the less opportunities there are for supply-chain tampering before it gets to you. Also consider if you want to safekeep the device at home or take it with you wherever you go.
In this case, you may want to look at other factors like environmental durability and warranty. The bank card-sized and waterproof CoolWallet Pro and other similar mobile-only wallets like KeyCard are marketed as an on-the-go hardware wallet to keep close and use without drawing attention.
Functionality and Coin Support
Hardware wallets have historically supported much fewer coins than software wallets, since they require more integration and security tests to maintain their overall integrity. However, this is not the case anymore, and many now offer full support for most leading layer-1 and layer-2 chains and their ecosystem tokens.
Hot Wallets: What to Know
However this online access exposes your crypto to increased risks of hacking and scamming, as your wallet security relies heavily on the security of the device (e.g. phone or computer) it is hosted on.
Your funds can also be compromised and redirected if you’re not careful, for example if you click on a phishing link or sign the wrong smart contract, as we saw with the OpenSea blind signing scandal earlier this year. This is something that hardware wallets protect against as the bad actor requires physical access to the device to execute a transaction.
Hot wallets can be divided into:
Hot wallets are the most popular form of self-custody wallets, as they are free to download and easy to use once set up. With the advent of Web3, many have now pivoted in order to be positioned as Web3 wallets.
What Is a Web3 Wallet?
These wallets do not keep a user’s private keys or recovery seeds, so you’ll need to store it yourself. Also, your Web3 hot wallet security is only as good as the security of the device you host it on, although you can also set up passwords and biometric logins for the wallet itself in most cases to add additional safety layers.
Some of the most popular wallets currently are:
- MetaMask (for Ethereum and EVM-compatible chain assets)
- TrustWallet (Binance-backed multi-chain wallet),
- Phantom (Solana),
- Exodus (multi-chain support)
What Are Multi-Sig And MPC Wallets?
In short, multisig wallets require a number of people to sign a transaction in order to approve it. This ensures that hackers or a bad actor or two within a firm cannot steal funds.
For the purposes of this article though, we’re going to assume you are riding solo with your crypto self-custody.
Here are 11 tips to stay safe.
11 Self-Custody Tips
1. Only download a wallet application from the official app store or website in order to avoid fake or modified phishing versions.
2. Ensure your wallet devices are always updated to the latest official firmware or software available.
4. Never generate or store a digital copy of your recovery seed or private key. Even your printer could keep a digital copy. Write it down instead.
5. Use 2 factor-authentication (2FA) and biometric verification (fingerprints, patterns etc) on your phone or laptop if you have a software wallet or use a hardware wallet application.
7. Research the safety of any browser extensions before you install them.
8. Spread your portfolio out over a few different hardware and software wallets to ensure your crypto eggs aren’t all in one basket.
9. Get two or more hardware wallets if you can. Keep one at home to safeguard your long term holdings, and use a mobile hardware wallet to use DeFi and Web3 applications on a frequent basis.
10. Use different wallets and email addresses when you take part in airdrops, and keep only the minimum funds there.
11. Use a VPN where possible to protect your anonymity against hackers and scammers.
Do We Need Centralized Exchanges At All?
CEXs will continue to be a major primary onramp to attract new users, the lifeblood of crypto, to the space, offering great sign-up incentives, convenient log-ins that require no private key or seed phrase, and easy tools to convert your fiat into crypto and vice versa.
After the lessons learned (the hard way) in 2022, many have touted that instead of shunning centralized exchanges, it can be used as an on-ramp from fiat, quickly trading from crypto to crypto, and then transferring and holding the bulk of your crypto assets on cold storage for the long term.
The Proof-of-Reserves initiative, where exchanges voluntarily and transparently disclose their holdings to third parties for auditing and verification, is an important step in the right direction for exchanges.
Final Thoughts
This article shows a wide variety of options at your disposal to self-custody your crypto. However, self-custody comes with its own risks, such as losing or exposing your keys, getting hacked, scammed or worse case, physically attacked.
For example, what happens if you lose access to your private key or recovery seed? It’s pretty much bye bye crypto, as these poor souls who lost millions have found out. To try and guess a private key or recovery seed is practically impossible. Even if a brute force attack of a billion computers tried a billion keys a second for a billion years, they’d still have less than a 1-in-a-billion chance to crack your private key.
Self-custody requires commitment, dedication and full responsibility for your crypto assets. Good luck on your new journey!