Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
LABS
Glossary

Wallet

A wallet is a software application or hardware device that enables a holder to securely store, manage, and present their decentralized identifiers and verifiable credentials.
Chainscore © 2026
definition
BLOCKCHAIN GLOSSARY

What is a Wallet?

A cryptographic tool for managing digital assets and identities on a blockchain.

A wallet is a software application or hardware device that generates and stores cryptographic key pairs—a private key and a public key—used to control assets on a blockchain. The public key, derived from the private key, generates a public address for receiving funds, similar to an account number. The private key is a secret number that authorizes transactions, acting as a digital signature; whoever controls the private key has absolute control over the associated assets. Crucially, wallets do not 'store' coins; they secure the keys that prove ownership of assets recorded on the distributed ledger.

Wallets are categorized by how they manage these keys. Custodial wallets, offered by exchanges, hold a user's private keys on their behalf, simplifying use but introducing counterparty risk. Non-custodial wallets, including software wallets (e.g., MetaMask, Phantom) and hardware wallets (e.g., Ledger, Trezor), give the user sole control. Hot wallets are connected to the internet, offering convenience for frequent transactions. Cold wallets are air-gapped devices or paper wallets, providing superior security for long-term storage by keeping keys offline.

Beyond simple asset transfers, modern wallets are foundational to blockchain interaction. They enable users to sign transactions for DeFi protocols, authenticate identity for decentralized applications (dApps), and manage non-fungible tokens (NFTs). The wallet's public address serves as a persistent, pseudonymous identifier across the ecosystem. Advanced features include support for multiple blockchains, integration with decentralized autonomous organizations (DAOs), and the management of token allowances granted to smart contracts.

Security practices are paramount. Losing a private key or seed phrase results in permanent, irrecoverable loss of funds. A seed phrase (or recovery phrase) is a human-readable backup of the private key, typically 12 or 24 words generated by the wallet. This mnemonic must be stored securely offline. Users must also guard against phishing attacks and ensure their wallet software is genuine, as malicious code can steal keys. The principle of 'not your keys, not your crypto' underscores the critical difference between custodial and non-custodial models.

etymology
WORD ORIGIN

Etymology

The term 'wallet' in blockchain is a metaphorical extension of its physical counterpart, but its technical lineage is rooted in cryptography and computer science.

A cryptocurrency wallet is a software application or hardware device that generates and manages the private keys and public addresses used to interact with a blockchain. The term is an analogy: just as a physical wallet holds cash and cards, a crypto wallet secures the cryptographic keys that prove ownership of digital assets. However, unlike a physical wallet that stores currency, a blockchain wallet does not 'hold' coins; it holds the credentials necessary to authorize transactions on the distributed ledger where the assets actually reside.

The concept evolved from earlier cryptographic systems for secure messaging and digital cash. The foundational technology is public-key cryptography (PKC), also known as asymmetric cryptography, which uses a paired key system: a public key (shared openly to receive funds) and a private key (kept secret to sign transactions). This system was integral to proposals like David Chaum's eCash in the 1980s and was fully realized for decentralized digital currency with the 2008 Bitcoin whitepaper, which described a chain of digital signatures.

Early implementations were simple programs, often called Bitcoin clients, that managed keys within a file (wallet.dat). The term 'wallet' was adopted naturally by the community to describe this user-facing interface for key management. As the ecosystem grew, wallet types diversified into hot wallets (software-based and connected to the internet) and cold wallets (hardware or paper-based, kept offline), each representing a different trade-off between convenience and security for safeguarding private keys.

key-features
WALLET

Key Features of an Identity Wallet

An identity wallet is a software application that allows users to generate, store, and manage their decentralized identifiers (DIDs) and verifiable credentials (VCs). It serves as the user's primary interface for proving and controlling their digital identity across Web3 applications.

01

Decentralized Identifier (DID) Management

The core of an identity wallet is the ability to create and manage Decentralized Identifiers (DIDs). Unlike traditional usernames, a DID is a self-owned, globally unique identifier anchored on a blockchain or other decentralized network. The wallet stores the private keys that prove control over these DIDs, enabling cryptographic authentication without relying on a central authority.

02

Verifiable Credential Storage & Presentation

The wallet securely stores Verifiable Credentials (VCs)—digitally signed attestations (like a driver's license or university degree) issued by trusted entities. It allows the user to selectively disclose these credentials by creating a Verifiable Presentation. This process uses zero-knowledge proofs (ZKPs) to prove a claim (e.g., 'I am over 18') without revealing the underlying data.

03

Selective Disclosure & Privacy

A key privacy feature is selective disclosure. Users can prove specific attributes from a credential without exposing the entire document. For example, proving citizenship without revealing a passport number. Advanced wallets use cryptographic primitives like BBS+ signatures or ZK-SNARKs to enable this, minimizing data leakage and adhering to privacy-by-design principles.

04

Interoperability & Standards Compliance

To function across different ecosystems, identity wallets adhere to open standards. The most critical are the W3C Verifiable Credentials Data Model and Decentralized Identifiers (DID) specifications. Support for standards like DIDComm for secure messaging and the OpenID for Verifiable Credentials (OIDC4VC) protocol ensures wallets can interact with issuers and verifiers universally.

05

Key Management & Recovery

Secure key management is non-negotiable. Wallets generate and protect the private keys associated with DIDs. They implement robust recovery mechanisms to prevent permanent loss, such as:

  • Social Recovery: Using a group of trusted contacts.
  • Multi-Party Computation (MPC): Distributing key shards.
  • Hardware Security Module (HSM) Integration: For enterprise-grade security.
06

User-Centric Consent & Audit Trail

The wallet puts the user in control through explicit consent mechanisms. Every request for credential presentation requires user approval. It also maintains an immutable audit trail of all interactions—which credentials were presented, to whom, and when. This creates transparency and allows users to revoke consent or track data sharing.

how-it-works
WALLET

How It Works

A blockchain wallet is the fundamental tool for interacting with decentralized networks, functioning as a secure interface for managing digital assets and identity.

A blockchain wallet is a software application or hardware device that generates, stores, and manages the cryptographic keys required to control digital assets on a blockchain. It does not store coins or tokens themselves, which exist on the distributed ledger, but rather the private keys that prove ownership and authorize transactions. The core components are the private key, a secret number that acts as a password, and the public key, derived from it, which generates a public-facing wallet address for receiving funds. Losing the private key means irrevocably losing access to the associated assets.

Wallets operate by creating and signing transactions. When a user initiates a send, the wallet uses the private key to generate a digital signature, a cryptographic proof that the transaction is authorized by the key holder. This signed transaction is then broadcast to the network for validation and inclusion in a block. Wallets also track the unspent transaction outputs (UTXOs) or account balances associated with their addresses by querying the blockchain, providing the user with their current portfolio view without needing to trust a central authority.

There are several wallet types, categorized by custody and connection. Custodial wallets, like those on exchanges, manage keys on the user's behalf, offering convenience but introducing counterparty risk. Non-custodial wallets, including software (e.g., MetaMask) and hardware (e.g., Ledger) variants, give the user sole control. Hot wallets are connected to the internet for ease of use, while cold wallets remain offline for maximum security. Modern wallets often use a hierarchical deterministic (HD) framework, generating a tree of keys from a single seed phrase for easy backup and management.

Advanced wallet functionality extends beyond simple transfers. They serve as login credentials for decentralized applications (dApps) via standards like EIP-1193, enabling interactions with DeFi protocols, NFT marketplaces, and blockchain games. Smart contract wallets or account abstraction wallets can implement features like social recovery, spending limits, and batch transactions, moving beyond the limitations of simple externally owned accounts (EOAs). The wallet's address, typically a hashed version of the public key, is the primary identifier for a user's on-chain identity and reputation.

types-of-wallets
CATEGORIZATION

Types of Wallets

Blockchain wallets are categorized by their method of storing and managing private keys, which directly impacts security, convenience, and use case.

05

Deterministic Wallets

A deterministic wallet is a system where all keys are derived from a single starting point—a master seed (usually a 12 or 24-word mnemonic). This allows for easy backup and restoration of an entire wallet hierarchy.

  • Key Derivation: Uses hierarchical deterministic (HD) structures defined by standards like BIP-32 and BIP-44.
  • Benefit: A single backup (the seed phrase) restores all generated addresses and their transaction history.
  • Universal Standard: This is the foundational technology for virtually all modern user-friendly wallets, both hot and cold.
06

Smart Contract Wallets

A smart contract wallet (or account abstraction wallet) is a wallet whose logic is governed by a smart contract on-chain, rather than a simple externally owned account (EOA). This enables advanced features.

  • Examples: Safe (formerly Gnosis Safe), Argent, and ERC-4337 "account abstraction" wallets.
  • Advanced Features: Can enable multi-signature security, social recovery, transaction batching, spending limits, and gas fee payments in ERC-20 tokens.
  • Use Case: DAO treasuries, institutional funds, and users seeking enhanced security and user experience beyond EOA limitations.
ecosystem-usage
WALLET

Ecosystem Usage & Standards

A wallet is a software or hardware tool that manages cryptographic keys, enabling users to interact with blockchain networks by signing transactions and managing assets. This section details the core standards and practical applications that define wallet functionality.

01

Seed Phrase (Recovery Phrase)

A seed phrase (or mnemonic phrase) is a human-readable sequence of 12-24 words generated from a BIP-39 standard. It is the master secret from which all a wallet's private keys and addresses are deterministically derived. This allows for:

  • Portable Recovery: Regenerate an entire wallet on any compatible software.
  • Hierarchical Deterministic (HD) Structure: Based on BIP-32/44, enabling the generation of unlimited key pairs from a single seed.
  • Secure Backup: The single point of failure; anyone with the phrase controls all derived assets.
02

Private & Public Key Pair

The fundamental cryptographic unit of a wallet. A private key is a secret 256-bit number used to cryptographically sign transactions, proving ownership. The corresponding public key is derived from it and can be shared publicly. From the public key, a wallet address (a hashed version) is generated. The relationship is one-way: a public key can be derived from a private key, but the reverse is computationally impossible, securing the funds.

04

ERC-4337: Account Abstraction

An Ethereum standard that redefines wallets as smart contract accounts (Smart Accounts), separating the logic of transaction validation from the key-based ownership. This enables advanced features not possible with traditional Externally Owned Accounts (EOAs), such as:

  • Social Recovery: Regain access via trusted parties.
  • Gas Sponsorship: Let a third party pay transaction fees.
  • Batch Transactions: Execute multiple operations in one signed action.
  • Custom Security Rules: Set spending limits or multi-signature policies.
05

Multi-Party Computation (MPC) Wallets

A cryptographic approach that splits a single private key into multiple key shares distributed among different parties or devices. Transactions require a threshold of shares to collaboratively sign, eliminating a single point of failure. This enables institutional-grade custody with features like:

  • Distributed Signing: No single entity holds the complete key.
  • Policy Enforcement: Require M-of-N approvals for transactions.
  • Key Rotation: Compromised shares can be replaced without changing the wallet address.
06

EIP-6963: Multi-Injection Provider

An Ethereum Improvement Proposal designed to solve the wallet provider conflict in browser environments. When multiple browser extension wallets (like MetaMask, Coinbase Wallet) are installed, they traditionally overwrite the global window.ethereum object. EIP-6963 introduces a standardized event system that allows all wallets to announce their providers simultaneously, enabling dApps to detect and present all available wallet options to the user, promoting a better user experience and fairer ecosystem.

security-considerations
WALLET

Security Considerations

A blockchain wallet's security is paramount, as it directly controls access to digital assets. These cards detail critical attack vectors, mitigation strategies, and best practices for safeguarding private keys and transaction integrity.

01

Private Key Management

The private key is the cryptographic secret that proves ownership of assets. Its compromise means total loss of control. Core security models include:

  • Hot Wallets: Connected to the internet (e.g., browser extensions, mobile apps). Convenient but vulnerable to malware and phishing.
  • Cold Wallets: Offline storage (e.g., hardware wallets, paper wallets). Highly secure against remote attacks but less convenient for frequent use.
  • Key Custody: The choice between self-custody (user holds keys) and custodial wallets (third-party, like an exchange, holds keys) defines the trust model and attack surface.
02

Seed Phrase & Social Engineering

A seed phrase (or recovery phrase) is a human-readable backup of the private key, typically 12 or 24 words. It is the single point of failure for non-custodial wallets. Major risks include:

  • Phishing: Fake websites or support agents trick users into entering their seed phrase.
  • Physical Theft: Photographs, written notes, or digital screenshots of the phrase can be stolen.
  • Shoulder Surfing: Observing the phrase during setup or recovery. Best practice is to write it on durable material, store it physically in a secure location, and never digitize it or share it with anyone.
03

Transaction Signing & Blind Signing

Signing a transaction authorizes a blockchain operation. Blind signing occurs when a wallet signs a transaction whose full details (e.g., smart contract function, token approvals) are not displayed in a human-readable format. This is a major risk with dApps and can lead to:

  • Unlimited Token Approvals: Granting a smart contract the right to spend an unlimited amount of a specific token.
  • Malicious Contract Calls: Unknowingly executing a function that drains the wallet. Hardware wallets and modern software wallets now implement transaction simulation and decoded data display to mitigate this risk.
04

Wallet Drainers & Malicious Contracts

Wallet drainers are malicious smart contracts designed to steal assets when a user signs a seemingly legitimate transaction. Common attack vectors include:

  • Fake Airdrops: Luring users to interact with a malicious site to claim tokens.
  • Spoofed dApp Interfaces: Imitating legitimate decentralized applications.
  • Malicious NFT Offers: Hiding harmful code in an NFT transfer approval. The payload often involves a cleverly disguised approve or permit function that grants the attacker sweeping permissions. Users must verify contract addresses and use wallets that screen for known malicious code.
05

Network & Endpoint Security

Security extends beyond the wallet software to the network and device it runs on.

  • RPC Endpoints: Wallets connect to a node via an RPC endpoint. Using a malicious or compromised endpoint can lead to tampered transaction data or frontrunning.
  • Man-in-the-Middle (MITM) Attacks: On public Wi-Fi, traffic between the wallet and blockchain can be intercepted.
  • Device Security: Keyloggers, screen recorders, or compromised operating systems on the host device can capture sensitive data. Using personal or trusted RPC providers, VPNs, and maintaining rigorous device security are essential complementary measures.
06

Multi-Signature & Social Recovery

Advanced wallet designs mitigate single points of failure.

  • Multi-Signature (Multisig) Wallets: Require multiple private keys (e.g., 2-of-3) to authorize a transaction. This distributes trust and protects against a single key being compromised. Commonly used by DAOs and project treasuries.
  • Social Recovery Wallets: Utilize a network of trusted "guardians" (people or devices) who can collectively help recover access if a user loses their signer device or seed phrase. This model, used by wallets like Argent, improves usability without reverting to full custodianship.
WALLET ARCHITECTURE

Comparison: Crypto Asset Wallet vs. Identity Wallet

A structural comparison of wallets designed for managing digital assets versus those designed for managing decentralized identity credentials.

Primary FunctionCrypto Asset WalletIdentity Wallet

Core Purpose

Securely store and transact with cryptocurrencies and tokens.

Securely store, present, and manage Verifiable Credentials (VCs) and Decentralized Identifiers (DIDs).

Key Material

Private keys for signing blockchain transactions.

Private keys for signing and decrypting identity-related data.

Standard Data Format

Transaction objects, token balances.

W3C Verifiable Credentials, Decentralized Identifiers (DIDs).

Primary Interaction

Blockchain networks (e.g., Ethereum, Solana).

Identity verifiers, issuers, and other wallets via protocols like OIDC4VC or DIDComm.

Storage Location

On-chain (transaction history), off-chain (private key).

Off-chain/local device (credentials), on-chain registries (DID Documents).

User Consent Model

Implicit via transaction signing.

Explicit, selective disclosure of credential attributes.

Typical Use Case

Sending ETH, swapping tokens, DeFi interactions.

Proving age without revealing DOB, logging into dApps, KYC verification.

Governance Standard

Chain-specific protocols (e.g., EIP-1559, BIPs).

W3C standards (VC-DATA-MODEL, DID-CORE), IETF protocols.

WALLET

Common Misconceptions

Clarifying widespread misunderstandings about blockchain wallets, from security myths to technical realities.

No, your cryptocurrency is not stored in your wallet; it exists as entries on the blockchain. A wallet is a tool that manages your private keys, which are cryptographic proofs of ownership that allow you to authorize transactions. Think of it like a keychain: your keys (private keys) control access to your assets (on the blockchain), but the assets themselves are not physically inside the keychain. Losing your wallet file or hardware device is only a problem if you lose the unique keys it contains, not because the coins are 'in' it.

WALLET

Frequently Asked Questions

Essential questions and answers about blockchain wallets, covering their core functions, security, and different types.

A crypto wallet is a software application or hardware device that generates, stores, and manages the private keys and public keys necessary to interact with a blockchain. It does not store coins; it secures the cryptographic keys that prove ownership of assets on the ledger. The wallet uses the private key to sign transactions, authorizing the movement of funds, while the public key (often represented as a wallet address) is used to receive assets. Wallets also interact with blockchain nodes to broadcast transactions and query balances.

ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team