Before we dive into the details of security, we'll review the various blockchains available as platforms for development, and how they differ.
Managing Your Keys
Attack Vectors and Prevention
For each of the limits of a system, there are a number of ways that a malicious party might exploit them for personal gain. In this module, we'll review the various attacks and provide some suggestions as to how they can be mitigated.
Cryptocurrency wallets is an essential concept to master for anyone interested in blockchains. Although the software we use to manage cryptocurrencies is called a “wallet”, to aid in understanding how to use the software, no actual value is held in the wallet itself. Instead, it is a management interface for interacting with your private keys. Because balances are tracked by the blockchain itself, cryptocurrency wallets mainly automate the process of signing cryptographic messages and broadcasting them to peer nodes in the network.
Hot wallets are wallets where the funds are instantly accessible and low value. Quick access means low security, so these wallets are meant for the amount of cash you might carry in your pocket. The idea is that once funds reach a certain level, you might want to keep them separate, like a savings account.
It is important to distinguish between self-hosted wallets and custodial wallets. They are called custodial because the wallets are held in custody by another entity. Consider, as an example, the difference between keeping gold bars in your home safe, or purchasing gold as a commodity on the stock market. In this way, storing tokens in a custodial wallet is not seen as secure, since the institution is vulnerable as a central point of failure.
For funds which should not be often accessed or used, a higher security storage option might be more appropriate. These can also be offline backups of a hot wallet or may serve as a single piece of multi-signature access.
A key phrase is just a string of letters and numbers, so these can take the form of some words written down on a piece of paper. We will learn more about this in our next lesson, HD Wallets & Seed Phrases. Other options for cold storage include steel wallets, using a secure thermal printer, or keeping a dedicated computer completely airgapped.
Hardware wallets offer some of the best balance of ease-of-use and security at the cost of… well, price! Buying a dedicated device will always be more costly than using paper and pen, but the added convenience and security is worth it. A variety of devices are available from several vendors at multiple price points. The Ledger Nano S is one of the most popular devices in large part due to its wide token support.