What is a wallet?
In crypto-land, a wallet doesn't store coins — blockchains do. Instead wallets store and protect your cryptographic keys. These keys let you prove ownership and sign transactions. Wallets come in two broad types:
- Software wallets — apps on phones or computers (e.g. mobile wallets, browser extensions). They are convenient but often exposed to the internet.
- Hardware wallets — physical devices (e.g. Ledger) that keep private keys offline. They sign transactions on-device, reducing exposure to malware and phishing.
How hardware wallets protect you
Hardware wallets isolate private keys inside a secure chip. Even if your PC is compromised, the attacker cannot extract the key; they can only attempt to trick you into approving a transaction. Key protections include:
- Secure element / chip — tamper-resistant storage for keys.
- PIN protection — local PIN to unlock the device; anti-brute-force protections usually apply.
- Recovery phrase — 12/24-word seed that restores keys if the device is lost; it must be kept offline.
- Display confirmation — device shows transaction details (address, amount) so you can confirm on the hardware before approving.
Ledger in particular — short notes
Ledger devices (Nano S / Nano X and successors) are popular hardware wallets. They pair a secure element with firmware and companion apps. Key points:
- Use official Ledger Live and firmware updates only from Ledger's official site.
- Never share your recovery phrase — Ledger staff will never ask for it.
- Enable a device passphrase (advanced) to create hidden accounts for extra safety.
Practical setup steps (secure by default)
- Buy from official sources. Order directly from the vendor or authorised resellers to avoid tampered devices.
- Check packaging & serials. If tampered, return immediately.
- Initialize offline. Set up the device using the on-device interface — generate your seed on the device, not on a computer.
- Write the recovery phrase by hand. Use a pen and the supplied recovery card or metal backup. Never store it digitally (no photos, no cloud).
- Set a PIN. Choose a PIN you can remember but not easily guessed.
- Install official firmware. Update firmware only via the official app and follow vendor instructions.
Everyday safety: sending and receiving crypto
When you send funds:
- Always verify the receiving address on the device screen, not just on your computer.
- Check amounts & fees on-device before approving.
- Beware browser wallet popups and suspicious dapps requesting signatures.
When receiving:
- Generate a fresh address from your hardware wallet or verified software companion.
- For large transfers, make a small test transaction first.
Advanced protections
- Passphrase (25th word) — an optional secret added to your seed that creates additional hidden wallets. If you use it, store the passphrase securely and separately.
- Multi-signature — distribute control across multiple devices/parties. Great for shared treasuries or higher security for big holdings.
- Air-gapped signing — sign transactions on a device with no USB/Bluetooth connection for maximum safety.
Common threats & how to mitigate
Threats include phishing, malware, supply chain attacks, and human error. Mitigations:
- Use official apps and verify URLs before downloading updates.
- Keep your recovery phrase offline and split copies (only if you understand the trade-offs).
- Use hardware wallets for large, long-term holdings; use small software wallets for everyday small amounts.
- Consider hardware wallet insurance or custody solutions for institutional-sized holdings.
Quick glossary
Seed / recovery phrase: The human-readable words that recreate your private keys. Keep them secret.
Private key: The cryptographic secret that signs transactions.
Public key / address: What you give people to receive funds.