EXPLAINED: How to store your crypto safely and avoid hacks – Business Today

In light of the various hacks and liquidations of crypto exchanges and Decentralise Finance (DeFi) platforms, experts advise crypto investors to not keep their crypto funds in any such places. But what other options do investors have?

Well, investors have not just one, but several other options, based on their requirements. But let us first understand why it is not safe to store your crypto in the aforementioned places.

Why should you not store your crypto on an exchange or on any DeFi platform?

It is advisable to not store one's crypto holdings on any centralised platform like exchanges or DeFi platforms. It is because the custody of the funds is with the platform itself and not the investor. Moreover, these platforms are prone to hacks.

In the recent past, DeFi platforms, like the Celsius Network, 3 Arrows Capital, Voyager Digital, Vauld, and other faced financial strains because of which investors' funds became inaccessible.And hence investors are advised to store their cryptos in different types of crypto wallets.

But what are crypto wallets?

Crypto wallets are pieces of hardware or software used to store your crypto assets. Every crypto wallet has an identity, which comprises a pair of private keys and public keys.

What are public and private keys and what do they do?

Public and private keys provide an alphanumeric identifier for your crypto wallet, which is called, your wallet address.

What does a crypto wallet address do?

The crypto wallet address specifies where the crypto tokens can be sent on the blockchain network. The private keys of a crypto wallet are never supposed to be disclosed. The public key is disclosed to sender of cryptos to identify the address.

Crypto wallets can be divided into groups

a) Based on how frequently they are connected to the internet and

b) Based on their technology.

Based on internet connectivity, they are divided into two categories

1. Hot Wallets

Hot wallets are regularly connected to the internet. They are more user-friendly but less secure since they are frequently connected to the Internet. Hot wallets are usually utilised for daily transactions. They offer immediate access to the funds and are easy to set up.

2. Cold Wallets

Cold wallets are not connected to the internet frequently. As a result, they are highly secure. HODLers benefit most from cold wallets.

Cryptowallets are split into two broad categories based on the underlying technology with which they are built

1. HardwareWallets

2.Wallets for software

Hardwarewallets are further subdivided into:

i. USB flash drives

These devices use USB ports to connect to your computer or laptop. Coldwallets are frequently used for long-term storage.

ii. Bluetooth

These gadgets use Bluetooth to communicate with your PC, laptop, or mobile phone. Coldwallets are also commonly utilised for long-term storage.

iii. PaperWallets

The QR codes of the receiver are printed on paper in paperwallets. These are no longer relevant. Their main disadvantage is that they do not permit partial fund transfers.

Softwarewallets are further classified as follows:

(a)DesktopWallets

These are software packages that may be installed on numerous operating systems and are becoming more popular over time. Anti-virus protection is required since any computer linked to the internet poses significant security hazards. Desktopcryptowallets are preferable over holdingcryptocurrency on an exchange because of incessant hacks on exchanges.

b) Mobile Applications

Mobile apps are similar to desktopwallets. Thesewallets are designed to be utilised on mobile phones. They are particularly convenient because they conduct transactions using QR codes. They are appropriate for frequent everyday use. However, they are vulnerable to malware attacks. Encryption is required for mobilewallets. They are portable and convenient, yet they are vulnerable to viruses. Two popular mobilewallets are Coinomi and Mycelium.

(c) Browser basedwallets

Thesewallets can be added as browser extensions on your browser. It is worth noting that private keys in the case of browser extensionwallets are susceptible to DDOS attacks. They can be hosted by themselves or by a third party. Being self-hosted is preferred since money is always in the investors control. Two examples of browser extensionwallets are MetaMask and Coinbase.

Also Read:MATIC crypto zooms 20%, Polygon Joins Disneys 2022 Accelerator Program - BusinessToday

Also Read:Bitcoin reclaims $21,000, Polygon rallies 6% as crypto markets recover after rout - BusinessToday

Excerpt from:
EXPLAINED: How to store your crypto safely and avoid hacks - Business Today

Related Posts

Comments are closed.