!

Topic: Crypto · Type: Evergreen · Reading time: ~8 min


Most people who buy cryptocurrency for the first time leave it on the exchange where they bought it and assume it's safe. Coinbase shows a balance. Binance shows a balance. Job done. But here is the thing: that balance is a number in a company's database, not crypto you control. The exchange holds the key. And if you don't hold the key, you don't own the crypto — you own a promise.

Understanding crypto wallets is really just understanding one question: who controls the key? Everything else — hot, cold, custodial, non-custodial — is context around that question.

What a crypto wallet actually does

A crypto wallet does not store coins. There are no coins inside it. Your Bitcoin, Ethereum, or anything else lives on a blockchain — a global ledger that no single company controls. What the wallet holds is a private key: a cryptographic string that proves you have the right to move funds from a given address.

Think of the blockchain as a public safe-deposit vault. Anyone can see the balances. But only the person with the right key can authorise a transfer. That key is what a wallet manages.

Every wallet also has a public key (or address) — the equivalent of a bank account number. You can share it freely; people use it to send you crypto. The private key is the other half of the pair, and it must stay secret. There is no issuing authority, no fraud hotline, no "forgot my key" flow. If the private key is lost or stolen, the funds attached to it are gone permanently.

Worth knowing: An estimated $140 billion worth of Bitcoin alone is considered permanently inaccessible due to lost or misplaced private keys and seed phrases, according to Chainalysis research. That figure represents years of accumulated user error — not hacks.

This is why the wallet decision matters more than it does for almost any other financial product.

Hot vs cold: the internet connection that changes everything

The first distinction is about connectivity.

Hot wallets are permanently connected to the internet. This covers mobile apps like MetaMask, Trust Wallet, and Phantom; browser extensions; and the accounts you maintain directly on exchanges. They are fast, convenient, and excellent for active use — sending, trading, interacting with DeFi apps. They are also continuously exposed to the attack surface of the internet: phishing sites, malware, credential breaches, and compromised third-party software.

Cold wallets keep your private key entirely offline. The dominant form is the hardware wallet — a physical device (Ledger, Trezor, and others costing €50–€150) that generates and stores keys in a secure chip that never touches the internet directly. To authorise a transaction, you plug the device in, review the transaction details on the device's own screen, and physically confirm it. The key never leaves the hardware in readable form.

Paper wallets — printed keys — technically qualify as cold storage but are fragile, easy to destroy or photograph, and now largely obsolete. Hardware wallets are what people mean when they say "cold storage" in practice.

The security gap between the two is real but often misunderstood. It isn't that hot wallets are unsafe and cold wallets are invincible. It's that they have different attack surfaces. Hot wallets are vulnerable to remote attacks. Cold wallets are vulnerable to physical compromise, supply-chain attacks on the wallet software, and — critically — the human processes involved in using them.

The Bybit hack of February 2025 made this painfully clear. North Korean state-sponsored hackers stole approximately $1.5 billion in Ethereum from the exchange — the largest cryptocurrency theft ever recorded. The funds were held in a cold wallet. The attack didn't break the cold wallet's cryptography; it compromised the third-party software used to manage the transaction-signing interface, injecting malicious code that caused authorised signers to unknowingly approve a transfer to attacker-controlled addresses. Different mechanism, same outcome.

Cold storage dramatically reduces risk. It does not eliminate it entirely, particularly when the humans and software involved in managing it can themselves be targeted.

Custodial vs non-custodial: the question that actually matters most

The second distinction cuts deeper: who generates and holds the private key?

Custodial wallets mean a third party — typically an exchange like Coinbase, Kraken, or Binance — holds your private key on your behalf. Your account balance is maintained in their internal ledger. This arrangement is convenient: you log in with a password, you can recover your account through standard email flows, and customer support exists if something goes wrong. It operates more or less like online banking.

The downside is counterparty risk. If the exchange is hacked, freezes withdrawals, goes bankrupt, or misuses your funds, your access to your crypto is gone — at least until the situation resolves, if it does. In 2022, FTX — then the third-largest cryptocurrency exchange in the world, with over a million users — collapsed after it emerged that billions in customer deposits had been misappropriated. Withdrawals were frozen for months. The bankruptcy estate eventually recovered enough to repay most creditors around 118% of their November 2022 account values — but Bitcoin had risen roughly 290% in the same period. Getting your dollar value back while missing the entire bull run is not the same as being made whole.

Non-custodial wallets give you the private key. MetaMask, Trust Wallet, and Phantom are non-custodial software wallets. Ledger and Trezor hardware wallets are non-custodial too. There is no company between you and your funds. No one can freeze your balance or deny a withdrawal. This is the structure that aligns with the original premise of cryptocurrency: direct ownership, no intermediary.

The trade-off is total responsibility. When you set up a non-custodial wallet, you receive a seed phrase — typically 12 or 24 ordinary words that serve as a master recovery key for your private keys. Lose it and the wallet is gone. Give it to anyone and your funds are gone. There is no recovery path beyond possessing those words.

Reddit's crypto communities are a consistent record of how this plays out. Improper seed phrase storage — screenshots taken and later synced to cloud storage, phrases stored in password managers that were subsequently breached — is the single most common path to permanent loss. The 2022 LastPass breach, in which hackers eventually cracked encrypted vaults, resulted in an estimated $250 million in crypto losses from users who had stored seed phrases inside it.

If you want to understand how blockchain technology actually makes all of this possible, that piece covers the underlying mechanics in plain terms.

The four combinations — and which one you probably need

Hot/cold and custodial/non-custodial are independent axes. Combined, they produce four options:

Custodial hot wallet — your exchange account. Someone else holds your key in an internet-connected system. Maximum convenience, maximum counterparty risk. Right for active trading; wrong for long-term storage.

Non-custodial hot wallet — MetaMask, Trust Wallet, Phantom. You hold the key, but it lives on an internet-connected device. Better for DeFi participation and regular transactions. Requires discipline around phishing and device security.

Non-custodial cold wallet — a hardware wallet. You hold the key offline. Best security for long-term holdings. Less convenient; requires an extra step for every transaction.

Custodial cold wallet — an institutional setup where a professional custodian stores your keys in air-gapped hardware on your behalf. Relevant for high-net-worth individuals or entities; not the typical retail case.

In practice, most people who've thought about this end up with a hybrid: a hot wallet (custodial or non-custodial) for crypto they're actively using, and a hardware wallet for anything held long-term. The rough heuristic is simple — if the amount would be uncomfortable sitting in an uninsured payment app, it belongs in cold storage.

As of 2025, about 59% of crypto wallet users globally prefer non-custodial wallets, up from lower levels before the FTX collapse. Hardware wallet sales rose 31% year-over-year in 2025. The direction of travel is toward self-custody, even if the majority of day-to-day transactions still flow through custodial hot wallets.

For a broader question of how much of your total portfolio should be in crypto at all, that's worth working out separately before deciding how much infrastructure to set up around storage.

The seed phrase is the actual thing

Whatever setup you choose, one principle overrides everything else: your seed phrase is your wallet. Whoever has those words controls the funds, regardless of device, app, or exchange.

Write it down by hand. Two copies, stored in separate physical locations. Do not photograph it. Do not store it in a cloud notes app, a Google Doc, a password manager, or anywhere that connects to the internet. Do not type it into any website, ever.

No legitimate wallet manufacturer, exchange, or support team will ever ask you for your seed phrase. If anything ever requests it — a website, a pop-up, a support agent — it is a scam. That is the only rule you cannot afford to get wrong.

The most common phishing attacks in crypto don't involve technical sophistication. They involve a website that looks identical to a real wallet interface, which presents an input field asking you to "connect your wallet" by entering your seed phrase. The field sends every word directly to an attacker. This is not a rare edge case; address poisoning attacks alone have reached an estimated 17 million victims globally.

For the full playbook on safe storage — backup strategies, how to test your recovery process, and what to do if you're moving to a hardware wallet for the first time — the guide to the dark side of crypto covers the practical security steps in detail.

The setup that fits your situation

There's no single correct answer, but there is a useful decision tree.

If you're buying a small amount to learn how crypto works, a reputable custodial exchange (Coinbase, Kraken, Bitstamp) is a reasonable starting point. Keep the amount small enough that exchange counterparty risk doesn't concern you.

If you're holding crypto as a long-term position — anything you'd be uncomfortable not accessing for six months if an exchange froze withdrawals — a non-custodial hardware wallet is worth the €60–€100 one-time cost. Set it up, test the recovery process with a small amount before moving larger sums, and store the seed phrase physically.

If you use DeFi protocols or interact with blockchain apps regularly, a non-custodial software wallet like MetaMask gives you the access you need — with the understanding that your seed phrase security is now entirely your responsibility.

Most people who get this right end up with two wallets: one custodial account for trading, one hardware wallet for savings. The logic maps to checking vs savings — convenience for what you're actively using, security for what you're holding.