[]
BTC$83,2500.09%ETH$1,908.790.79%USDT$1.000.00%XRP$2.333.02%BNB$580.900.20%SOL$126.48-0.25%USDC$1.00-0.01%ADA$0.72-0.56%DOGE$0.17-0.42%TRX$0.22-1.32%STETH$1,903.770.51%PI$1.59-8.98%WBTC$83,1360.24%LEO$9.800.62%LINK$14.034.52%XLM$0.280.54%USDS$1.00-0.07%HBAR$0.19-2.48%WSTETH$2,274.030.40%AVAX$18.75-1.53%SHIB$0.000012703.28%SUI$2.24-2.68%TON$2.831.64%LTC$90.700.51%BCH$332.48-0.36%DOT$4.162.85%OM$6.28-2.86%USDE$1.00-0.04%WETH$1,907.530.77%BSC-USD$1.000.20%BGB$4.332.59%HYPE$13.638.90%WBT$28.29-0.97%WEETH$2,024.70.62%XMR$208.66-0.43%UNI$5.90-0.98%SUSDS$1.04-0.00%DAI$1.00-0.01%NEAR$2.660.75%APT$5.231.28%PEPE$0.00000712-2.94%ETC$18.262.61%OKB$45.497.71%ONDO$0.86-0.85%ICP$5.590.64%AAVE$168.23-2.85%CBBTC$83,1980.07%GT$20.470.57%MNT$0.73-3.17%TRUMP$11.708.72%CRO$0.08-0.61%TKX$26.960.79%VET$0.02-0.08%TAO$246.18-3.73%FDUSD$1.000.07%TIA$3.600.42%KAS$0.072.50%POL$0.22-1.32%ENA$0.35-4.68%FIL$2.841.88%ATOM$4.043.50%FTN$4.010.40%S$0.5312.76%ALGO$0.201.30%LBTC$83,2530.13%RENDER$3.040.42%ARB$0.350.35%IP$5.68-4.95%USDT$1.00-0.03%OP$0.87-0.28%JUP$0.520.66%KCS$11.030.17%FET$0.512.04%SOLVBTC$83,0180.09%WETH$1,908.210.76%QNT$76.38-0.01%MOVE$0.46-2.48%RSETH$1,973.410.34%NEXO$1.072.40%XDC$0.07-0.92%BUIDL$1.000.00%DEXE$17.36-0.02%USD0$1.000.01%STX$0.641.21%MKR$1,148.021.91%RETH$2,141.160.51%INJ$9.702.59%WLD$0.851.09%IMX$0.53-1.36%SEI$0.206.17%BNSOL$131.41-0.39%FLR$0.01-2.69%THETA$0.89-0.29%GRT$0.090.34%USDT$1.000.04%BONK$0.000010900.87%LDO$0.932.57%SOLVBTC.BBN$82,169-0.90%PYUSD$1.000.04%EOS$0.50-0.05%

Advertisement

How to Securely Store your Crypto

Everything you need to know about your custody options to safeguard your digital assets.
By: The Defiant Team • July 19, 2024
smiling padlock

So you've just used money from your bank account to buy some crypto, and now you own some digital assets; congratulations! Now, you have a list of questions about the safest way to store your assets.

Is it okay to just leave your crypto on the exchange where you made the purchase? If not, where should you store them? Are hot wallets like Metamask safe enough? If not, when should you put your assets into a cold wallet? It can all seem overwhelming at first, but don’t worry, because in a few minutes, you’ll know exactly what to do.

But before we dive into the specifics of securely storing your crypto, we must understand the difference between custodial and non-custodial wallets!

So, here's a breakdown of both types.

Custodial vs. Non-Custodial Wallets

1. Custodial Wallets

Custodial wallets are those where a third party, such as an exchange or a financial institution, holds and manages your private keys. Essentially, you are entrusting your funds to this third party.

Key Features:

  • Third-Party Control: The service provider has control over your private keys and, consequently, your funds.
  • User Convenience: Often easier for beginners as the service provider handles security and key management.
  • Recovery Support: If you forget your password or lose access, the provider can help you recover your account.
  • Examples: Popular exchanges like Coinbase, Binance, and Kraken offer custodial wallets.

Pros:

  • User-friendly, especially for those new to cryptocurrency.
  • Reduces the risk of losing access to funds due to lost private keys.
  • Providers often offer additional services like trading, staking, and customer support.

Cons:

  • Security risk if the third-party provider is hacked.
  • Users do not have full control over their funds.
  • Potential for account freezes or restrictions based on the provider’s policies.
  • Remember: Not your keys, not your crypto.

2. Non-Custodial Wallets

Non-custodial wallets give users full control over their private keys and, therefore, their assets. Users are solely responsible for the security and management of their cryptocurrency. Seed phrases are usually 12 or 24 words. Non-custodial wallets are sometimes called self-custodial wallets because the user is self-custodying the funds.

Key Features:

  • User Control: You retain complete control over your private keys and funds.
  • Security Responsibility: Users must ensure the security of their private keys and take measures to protect against loss or theft.
  • Privacy: Enhanced privacy as you do not rely on a third party to access your funds.
  • Examples: Wallets like MetaMask, Ledger, Trezor, and Trust Wallet are non-custodial.

Pros:

  • Full control and ownership of your funds.
  • Enhanced privacy and security if managed properly.
  • Less risk of censorship or account restrictions.

Cons:

  • Higher responsibility for security and key management.
  • If you lose your private keys or seed phrase, you lose access to your funds permanently.
  • Often less user-friendly for beginners.
  • Remember: Never lose or share your private keys or your seed phrase.

Below are examples of private keys, public keys, a wallet address, and a seed phrase.

wallet information

FAQ

  • What is the difference between a custodial and a non-custodial wallet? A custodial wallet is managed by a third-party service provider, such as an exchange, which holds your private keys and manages your funds. A non-custodial wallet, on the other hand, gives you full control over your private keys and your funds. With non-custodial wallets, you are solely responsible for securing your private keys and managing your assets
  • Is it safe to leave my cryptocurrency in the exchange where I purchased it? While leaving your cryptocurrency in an exchange might be convenient, it poses several risks. Exchanges can be hacked, leading to the loss of your assets. Exchanges also keep control of your private keys, meaning you don't have full ownership of your funds. For long-term storage and enhanced security, transferring your crypto to a personal wallet is recommended
  • Are hot (digital) wallets like MetaMask safe enough for storing my crypto? Hot wallets, such as MetaMask, are non-custodial (also called self-custodial). This means you are given control of your private keys. However, they are still connected to the internet for the convenience of regular transactions and trading. Therefore, they are more vulnerable to hacking compared to cold wallets. For storing large amounts of cryptocurrency or for long-term storage, using a cold wallet (hardware wallet) is a safer option.
  • When should I use a cold (physical) wallet? Cold wallets, such as Ledger or Trezor, are best used for storing large amounts of cryptocurrency or for long-term storage. They are not connected to the internet, making them less vulnerable to hacking and other online threats. If you do not need frequent access to your funds and prioritize security, a cold wallet is the ideal choice.
  • How can I ensure the security of my non-custodial wallet? To ensure the security of your non-custodial wallet, follow these best practices:
    • Store your private keys and seed phrases securely, preferably offline.
    • Use two-factor authentication (2FA) for an added layer of security.
    • Regularly update your wallet software to protect against vulnerabilities.
    • Consider using a hardware wallet for enhanced security.
    • Avoid sharing your private keys or seed phrases with anyone.

How To Set Up a Hot Wallet (Software wallet/Digital wallet)

Great! Now we understand the difference between custodial and non-custodial crypto wallets, we know that self custody is the safest option, but it also comes with added responsibility.

So let’s see how we can set up the two types of non-custodial crypto wallet, before transferring some crypto from our exchange wallet to our newly set up crypto wallet.

As a reminder:

  • Software wallets, or digital wallets can also be non-custodial, whereby you are in control of your own keys.
  • Software wallet options like Metamask and Phantom are called hot wallets, because they are accessible directly via your browser.
  • Hardware wallets like Trezor, Ledger, and the Lattice 1 by GridPlus are called cold wallets, because they offer added security measures.

Below are step-by-step instructions on how to set up both a hot cold wallet and a cold wallet.

Hot Wallet Setup:

  • Install a software wallet app such as MetaMask.
  • Visit https://metamask.io/
  • Hit "Download" in the menu bar.
  • Click “Install MetaMask for Chrome (or your preferred browser). You will then be directed to the Chrome Web Store.
Chrome extenstions metamask
  • Click “Add to Chrome”.
  • On the pop up, click “Add extension” (see below).
Add to chrome

After adding MetaMask Extension, MetaMask will automatically open. You can also make sure it's easily accessible in your toolbar by pinning MetaMask so the icon is always visible when you open the browser.

  • Create a new wallet and back up your seed phrase.

Once installed, MetaMask will ask you to create a new wallet. Remember, you are the custodian of this wallet, so you will have to create both a password (to access the account) and a secret recovery phrase (to control and restore the entire wallet). Both must be kept secret and stored securely. Here are some tips.

Metamask secret recovery phrase: dos and don'ts
Metamask secret recovery phrase: dos and don'ts

Once you follow the steps to securely store your secret recovery phrase, your wallet will be created

Wallet created congratulations message

Remember: The Secret Recovery Phrase is the secret that controls the wallet. If someone has this secret, they have complete access to the wallet. MetaMask does not keep your Secret recovery phrase: you are the custodian of your wallet.

How To Set Up a Cold Wallet (Hardware wallet/Physical wallet)

For today’s example, let’s see how we can set up a new Ledger device. Popular Ledger models are below, but for a full comparison of all Ledger models, please visit the Ledger hardware wallets comparison page.

Ledger Wallets
Ledger Wallets

Step 1: Getting started with your New hardware wallet

Firstly, let’s choose how to set up our device. For first time setups, we will choose “Set up a new device” to generate new private keys and to create new accounts.

Now, visit the official Ledger website to download Ledger Live for your operating system.

Legder website

Step 2: Device Setup

When a user first receives their Ledger wallet, it must always be initialized by following this process:

  1. Powering on the device
  2. Generating a pin code
  3. Generating 24 words

After powering on your new hardware wallet, you'll choose a 4 to 8-digit PIN code that unlocks your new Ledger device.

Then you must save or restore your 24-word recovery phrase. Use one of the three provided recovery sheets to note down and securely store your 24-word recovery phrase.

Your recovery phrase backs up the private keys that manage your crypto assets. It can be used to restore access to your crypto assets in case you lose access to your device, so do not lose your private keys.

Ledger keys

Below is an example of a filled out recovery card, taken from Ledger. This is a dummy account.

Ledger Dummy example
NEVER SHARE YOUR RECOVERY PHRASE WITH ANYONE!

Next you will be asked to verify the recovery phrase in the device to ensure you have noted them down correctly.

the-defiant

Once you have verified the recovery phrase you will be prompted to hide it.

the-defiant

Once your Ledger hardware wallet is ready, click on Continue in Ledger Live. This will take you to the next step of setup which is the security checklist and will vary slightly depending on which Ledger model you are setting up.

the-defiant

Once the genuine check is completed, your device is ready to use. You can now transfer funds from your exchange account to your hardware wallet.

the-defiant

Transferring Crypto to Your Wallet

Now, we can transfer funds from our crypto from the exchange account to our newly created hardware wallet.

Step-by-Step Process:

  1. Go to the “Send” or “Withdraw” section on your exchange account.
  2. Enter your hardware wallet address as recipient.
  3. Confirm the amount and initiate the transfer.

Note: It is recommended that you first conduct a test transaction with a tiny amount of funds before sending all your funds across to a new address.

Advertisement

Get an edge in Crypto with our free daily newsletter

Know what matters in Crypto and Web3 with The Defiant Daily newsletter, Mon to Fri

90k+ Defiers informed every day. Unsubscribe anytime.