기본 콘텐츠로 건너뛰기

Cold Wallet Vs. Hot Wallet: What’s The Difference?

You may have heard about cold and hot digital wallets but do you know how they are different from each other?

The simplest way to describe the difference between a cold wallet and a hot one is this: hot wallets are connected to the internet while cold wallets are not. Most people who hold digital assets have both cold and hot wallets because they are designed for different purposes.

Hot wallets are like checking accounts while cold wallets are similar to savings accounts.

People who have digital assets keep a small amount of money in their hot wallets for purchasing stuff. They keep the vast majority of their digital coins in their cold wallet.
If you like Medium articles in video form, you’re in luck:



SECURITY

Q: Why do people keep most of their digital coins in a cold wallet?
A: Hackers cannot steal digital assets that are not connected to the internet.
Q: So then, how safe are hot wallets?
A: The security of hot wallets is dependent upon the security habits of individuals and third parties. They are vulnerable to theft because they are constantly connected to the internet. As long as something is connected to the internet, it is vulnerable to attack. But keeping very small amounts of digital currency in hot wallets is fine because a hacker probably won’t waste resources trying to gain access to small amounts of money.

HOT WALLETS


ACCOUNTS

Accounts within digital asset exchanges like Poloniex and Bittrex are considered hot wallets because these companies hold your funds in their infrastructure and servers. If a hacker drains Poloniex and you have an account with them, then there’s a good chance you will lose your money because Poloniex in actuality holds your funds.
If you have a Coinbase account, then this is also considered a hot wallet. If Coinbase gets hacked, you could lose your funds. Keeping small amounts in Coinbase is a best practice. Buying and selling Bitcoin using Coinbase is safe as long as you move your money after the trades. I think Coinbase is a very security-intensive business and in the six months of using it, I haven’t had any issues. But keeping large amounts of money in Coinbase is probably not a good idea. For US customers, Coinbase is really useful, even though its fees are a bit high. Coinbase is ideal for beginners because their site and app are designed so well and are so easy to use.

SOFTWARE

Another kind of hot wallet like Exodus.io is a software application that is downloaded to your computer. There are many kinds of wallets like this including the Dash QT wallet. In this type of wallet, Exodus doesn’t store your private keys on its servers and therefore, your money is under your control, not theirs. But your money is still vulnerable because a hacker could get your funds by gaining access to your computer. The Exodus wallet is designed to interact directly with the different blockchains. Exodus supports many different digital assets as well.
There are many different software wallets to choose from and many things to consider when choosing one. The reason I like to use Exodus is because it’s easy to use and is integrated with Shapeshift. Because of this Shapeshift integration, I don’t have to go to an external exchange like Bittrex or Poloniex in order to make trades. I can do that all within Exodus. It is a fairly new wallet and by no means perfect, but the fact that the people who created this wallet are accessible and eager to help resolve customer issues, makes this wallet even more appealing. I needed some support when I upgraded my Exodus software recently and I got the help I needed in real-time in the Exodus slack from the founder named JT. This was pretty impressive.

COLD WALLETS



HARDWARE WALLETS

There are different kinds of cold wallets but I’m only going to focus on the hardware variety.
A hardware wallet is a physical device that is kept offline but has the ability to be plugged into a computer when needed. Hardware wallets are safe because when you make a transaction, they ask you to confirm each one by pressing a button on the device. They are pretty much hacker-proof. At least I’ve never heard of any being hacked before. They do feel magic because I don’t know how they are programmed.

There are three main hardware wallet brands: Trezor.ioLedger Nano S and KeepKey.

Each one has different features, so do your due diligence and research all of them. I decided to go with Trezor for many reasons and I’m happy with it so far. The Trezor customer service has been very good, the communication is outstanding and it supports many different currencies: Bitcoin, Dash, Ethereum, Ethereum Classic, ZCash, Litecoin, Namecoin, Dogecoin, and Testnet.
I recently learned from my friend Heidi, who runs the Crypto Tips YouTube channel that KeepKey partnered with Shapeshift. This makes it possible to trade different coins within the KeepKey hardware wallet. That’s pretty cool!
The only thing I’ve heard about Ledger Nano S is that the writing on it is very small and hard to read. Ledger Nano has a good blog so it might be worth familiarizing yourself with it to learn more details.
For me, I’m sticking with Trezor for now since I’m quite satisfied with it.
ps- I’m still learning a lot every day about hot and cold wallets. If you have additional information about anything I’ve discussed, add your comments below. I’ve been involved in digital currencies since June 2016, so in many ways, I’m fairly new to this new and exciting world.
About the author:
Leah Stephens is the editor of Dash For Newbies, writer and full stack artist. She has written one book, Un-Crap Your Life which is now available on Amazon. She wrote for Interesting Engineering before discovering the blockchain. She runs a zany YouTube channel and she’s now working within the Dash decentralized autonomous organization. Most days she can be found lurking on Twitter and in the Women of Dash Slack channel. She’s also a top writer in Steemit. Her favorite quote is by Rimbaud:
“I have researched the magic shapes of the happiness no one escapes.”

https://medium.com/dash-for-newbies/cold-wallet-vs-hot-wallet-whats-the-difference-a00d872aa6b1 

댓글

이 블로그의 인기 게시물

Six Tools Used by Hackers to Steal Cryptocurrency: How to Protect Wallets

In the early July, it was  reported  that Bleeping Computer detected suspicious activity targeted at defrauding 2.3 million Bitcoin wallets, which they found to be under threat of being hacked. The attackers used malware — known as “clipboard hijackers” — which operates in the clipboard and can potentially replace the copied wallet address with one of the attackers. The threat of hacking attacks of this type has been  predicted  by Kaspersky Lab as early as November of last year, and they did not take long to become reality. For the time being, this is one of the most widespread types of attacks that is aimed at stealing users’ information or money, with the overall estimated share of attacks to individual accounts and wallets being about 20 percent of the total number of malware attacks. And there’s more. On July 12, Cointelegraph  published  Kaspersky Lab’s report, which stated that criminals were able to steal more than $9 million in  Ethere...

BLACK LABEL, Joined CeBIT 2018 hosted in Hanover, Germany

South Korean IT Companies Target the European Digital Market -  KOTRA operates the unified Korean pavilion for Hanover Information Communication Exhibition 2018 ... 56 companies in total. Black Label participated with IoT module and IoT product developed directly at CeBIT 2018 in Hanover, Germany. Click on the blog link below for a list of government press releases and participating companies. 한국 IT 기업들 , 유럽 디지털 시장 공략 -KOTRA, 2018 독일 하노버 정보통신전시회 (CeBIT 2018) 통합 한국관 운영 ... 총 56 개사 참가 블랙라벨이 독일 하노버에서 열린 CeBIT 2018에 직접 개발한  IoT 모듈과 IoT 제품을 가지고 참가했습니다. 아래의 블로그 링크를 클릭하시면 정부보도자료와 참가업체 리스트를 확인하실 수 있습니다. http://blog.daum.net/htiger31/18387695 블랙라벨 관련 문의사항 HP: 010-9818-3511 / 이메일:  uklim72@gmail.com 블랙라벨 홈페이지  https://blacklabel.io/index.do

Keeping Smart Homes Safe And Secure

Bad actors are increasingly targeting connected devices, and network providers are fighting back. But when it comes to protecting the IoT, a one-size-fits-all approach simply doesn’t fit. The security measures that protect IoT devices in business settings don’t readily translate to devices in consumers’ homes, says Marcio Avillez, SVP of networks at CUJO AI. In the latest Intelligence of Things Tracker, Avillez makes a case for taking a device-specific approach in thwarting threats to smart homes. Consumers often find the promise of greater convenience to be a convincing reason to buy connected devices. Unfortunately, reports of breached connected devices are all too frequent, and consumers may find they are introducing not just connectivity, but also bad actors, into their homes. IoT-related breaches are innumerable. In 2017, the FBI  warned  consumers against purchasing IoT-connected toys, stating that such devices could be hacked and used to record and spy on c...