The purses, wallets, or wallets of Bitcoin, other cryptocurrencies and crypto assets use to store the private keys that happens to be desirable to access and spend the balances recorded in an address or public key of the conforming blockchain. Presently there use to be several kinds of cryptocurrency portfolios that can be branded making use of two variables: security and ease of use.
At the top of the pyramid shown in the image use to be the safest and most problematic to make use of wallets, while at the bottom happens to be the calmest to use, but also the least safe. The pyramid also signifies the acceptance in use of each kind of portfolio: those at the bottom are widely used, while those at the top are not as widely used; a contradictory condition of the crypto asset portfolio ecosystem, given the fact that it’s money we’re dealing with. Security is a determining factor of a good crypto asset portfolio.
Essential features of a cryptocurrency wallet
Money control: cryptocurrency electronic wallet able to allow separate management (only the user owns the private keys), joint management (the owner and the company have private keys), or by third parties of the money stored in them.
Validation: Cryptocurrency wallets can use to validate transactions made, full validation (full node, fully unload blockchain), basic validation (simple bulge, just download block hashes), or central validation (complte node from a third party).
Transparency: Cryptocurrency wallets can be fully transparent, see-through (the code might be checked, but cannot be confirmed by the user), or not at all transparent (the code of the application is closed and the application is run remotely).
Environment: Cryptocurrency wallets can be installed in vulnerable environments (prone to viruses) with or with no two-step verification, safe environments (like cell phones in which applications use to be isolated), and highly secure environments (such as physical cryptocurrency wallets). , gadgets).
Privacy: cryptocurrency wallets may or may not disclose information about their users to network nodes (such as the IP address), reuse or not the addresses of the wallets with each payment, and use to allow or not the make use of the Tor browser for preventing other people or companies from connecting transactions with the IP address of the user.