{"id":8603,"date":"2022-07-25T18:37:25","date_gmt":"2022-07-25T13:07:25","guid":{"rendered":"https:\/\/aayushbhaskar.com\/?p=8603"},"modified":"2023-02-02T23:25:39","modified_gmt":"2023-02-02T17:55:39","slug":"introduction-to-cryptocurrency-wallets","status":"publish","type":"post","link":"https:\/\/aayushbhaskar.com\/introduction-to-cryptocurrency-wallets\/","title":{"rendered":"Introduction To Cryptocurrency Wallets","gt_translate_keys":[{"key":"rendered","format":"text"}]},"content":{"rendered":"

Decentralized Finance or DeFi is fast becoming a household name. Chances are that if you have heard of Crypto, you would have heard the term DeFi.<\/p>\n

However, to many, the concept of DeFi and the infrastructure it entails is quite alien.<\/p>\n

In fact, most Crypto retail is limited to the Centralized Finance or “CeFi” experience of trading in cryptocurrencies through centralized exchanges (“CEXs”).<\/p>\n

This post, having previously dealt with certain advanced DeFi topics like Yield Farming<\/a> & Staking<\/a>, takes a step back to explain the Decentralized Web from the perspective of Wallets.<\/p>\n

This is the first part of a series of posts to introduce you to trading through DEXs & is inspired by those of you who continue to have concerns in dealing with CEXs due to their KYC requirements<\/a> and the fact that many establishments are going bust in this market downturn<\/a>.<\/p>\n

We will then explore DAOs & Web 3.0 to further our understanding of new age opportunities.<\/p>\n

Put on your learning hats, folks, for here we go!<\/p>\n

1. What is a Cryptocurrency Wallet?\u00a0<\/b><\/h2>\n

A cryptocurrency or DeFi wallet functions like a checking account at a Bank. Just like your bank account<\/a>, you can use it to receive, send and store Crypto.<\/p>\n

The basic distinction when choosing a wallet is whether they are cold or hot. Regardless of the type, all wallets seek to preserve identity & privacy.<\/p>\n

We will look at these issues in detail below.<\/p>\n

1.1. Hardware Wallets<\/b><\/h3>\n

\"Wallets\"<\/p>\n

Cold wallets or hardware wallets store Crypto on the device instead of on-chain.<\/p>\n

Since they are not connected to the chain at all times, it is maintained that they are almost impossible to hack. However, to receive or send Crypto, these hardware wallets need to be connected to the chain.<\/p>\n

To understand cold wallets further, refer to this Ledger Nano S Plus review.\u00a0<\/a><\/p>\n

1.2 Software Wallets<\/b><\/h3>\n

Hot wallets, or software wallets, store Crypto on-chain but otherwise function just like cold wallets.<\/p>\n

While this makes them vulnerable to a hacking attack, it is important to understand that the blockchain has various safeguards to prevent such an occurrence.<\/p>\n

I would concede that the data does not support this point of view, with two of the largest hacks in the history of Crypto<\/a> taking place in the past 2 years.<\/p>\n

However, the rate of occurrence of these hacks is not too high, whereas the overall market cap of the industry has been on a consistent rise.<\/p>\n

Hence when a hacker does get through, he scores big. Also, important to understand that in most cases, the funds get returned as the industry acts together to block the hacker from moving the stolen Crypto.<\/p>\n

\"Wallets\"<\/p>\n

MetaMask<\/a>, Trust Wallet<\/a> & Phantom<\/a> are some examples of third-party Hot wallets that help you interact with a blockchain (or several blockchains) infrastructure.<\/p>\n

Learn MetaMask basics here.<\/a><\/p>\n

2. Setting Up A Wallet<\/b><\/h2>\n

Regardless of the choice of wallet that you choose to go with, the underlying idea is that you don’t need to furnish any personal information to get started. For both types, you will be prompted to write down & store your seed phrase safely.<\/p>\n

This is a list of 12 to 24 words chosen randomly by an algorithm that needs to be inputted the first time you set up a wallet and to retrieve a wallet later on when changing your mobile device or hardware wallet.<\/p>\n

Without the seed phrase, which acts as the digital key, you will not be able to recover a lost wallet.<\/p>\n

No private information is asked for at set up or any time in the future. There is no need for an email, password, identity document, or the like. You may call a DeFi wallet a no KYC wallet or anonymous friendly.<\/p>\n

3. The Concept of Gas Instead of Fee<\/b><\/h2>\n

When you transact on a CEX or make a withdrawal, you pay the trading fee and withdrawal fee, respectively. This is essentially gas for the transaction to be completed on-chain.<\/p>\n

The same concept applies to your DeFi wallets, and it is necessary that you have certain coinage of the transacting network for the transaction to go through. For example, for sending $USDT you need some $TRX & for $NAKA you would need $MATIC or $ETH.<\/p>\n

The basic difference here from your TradFi experience in dealing with your local bank or your CEX is the concept of deduction through the source. CEXs deduct a portion of the transacted amount as a fee using the same trading pair.<\/p>\n

For a DeFi wallet, you need funds separately in the denomination of the network being used.<\/p>\n

4. The Desktop V Mobile Experience\u00a0<\/b><\/h2>\n

4.1. Browser Extension Wallets<\/b><\/h3>\n

The earliest software wallets were browser extensions that you could download and install. This is an extremely flexible method of connecting with websites of decentralized applications.<\/p>\n

It was here that the concept of Web 3.0 was born. You could simply go to the website of a DEX<\/a>, for example, connect your wallet through the extension downloaded into your browser, and viola, your funds would show up.<\/p>\n

These browser extensions are available today and remain the dominant form of software wallets, especially in the industrialized West, where ownership of personal computers is high.<\/p>\n

4.2. Mobile App Wallets<\/b><\/h3>\n

In many parts of the world, ownership of personal computers lags behind ownership of smartphones. The Crypto industry has been quick to catch on to this disparity by launching mobile applications for their different product suites.<\/p>\n

\"Wallets\"<\/p>\n

Wallets are no different, and we now see that the protocols offering a web-only experience have also shifted to mobile applications. To round off the true Web experience, these mobile wallets come built-in with:<\/p>\n