wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

BITCOIN WALLET

profile
Onkar Gaikwad
Apr 29, 2023
1 Like
0 Discussions
231 Reads

What is Bitcoin Wallet?

Similar to a traditional wallet you may carry in your pocket, a bitcoin wallet is used to store money. The difference is that instead of storing a collection of bills and cards, a bitcoin wallet stores a collection of bitcoin private keys.
On a practical level, a Bitcoin wallet is a device or program that is used to send and receive bitcoins. The term wallet can be a little confusing for people new to Bitcoin and crypto. A physical wallet is used to store physical currency, however a Bitcoin wallet does not store bitcoins within it. How can this work?

Well, most people already have something similar to this in their physical wallets right now: a debit card. The debit card in your wallet is not money, but it does grant you access to your money. This is similar to how a Bitcoin wallet works, with a key difference being that while a debit card is controlled by a centralized entity (a bank), no person or organization controls Bitcoin. This difference means that Bitcoin wallets must function somewhat differently than bank accounts.
 
 

How Bitcoin wallets work 

Continuing with the debit card analogy from above, a Bitcoin wallet holds at least one “account,” or sub-wallet. We can view this sub-wallet as being roughly equivalent to a debit card. For instance, debit cards have information associated with them, including an account number and a password. Each Bitcoin “account” within a Bitcoin wallet also has information associated with it. For our purposes, the two key pieces of information are the public bitcoin address and the private key. The public address is comparable to the debit card’s account number. The private key, meanwhile, is kind of like a debit card’s password in that it grants access to the bitcoin associated with that public bitcoin address. A private key is a 256-bit secret number. Here is an example:

108165236279178312660610114131826512483935470542850824183737259708197206310322

As you can see, this secret number is a bit unwieldy. One of the key functions of a Bitcoin wallet is to manage the private key. In fact, private keys are almost never handled directly by users. Bitcoin wallets provide a way to write down this private key in a much more human readable format, referred to as a recovery phrase, secret passphrase, or seed phrase. A recovery phrase is a list of words, usually between 12 and 24, that allow you to reconstruct your Bitcoin wallet and gain access to your funds even if your Bitcoin wallet is destroyed. Here is an example of a recovery phrase consisting of 12 words. Because the recovery phrase is equivalent to a private key, you should never share the words with anyone, or store the plain text on your computer or online.

While the recovery phrase is an improvement upon the private key, it still leaves a lot to be desired. Since you shouldn't store your recovery phrase in plain text (unencrypted form) on your computer, for most people the best solution is to write it down on paper. This presents problems because safely storing a piece of paper can be hard. Further, if you're using a multi-coin wallet (like the Bitcoin.com Wallet), you'll have a separate recovery phrase for every different blockchain your wallet supports. Storing all those recovery phrases on paper quickly becomes onerous. For this reason, the Bitcoin.com Wallet integrates a “Cloud Backup” system. Here you can create a single custom password and use it to unlock all of your private keys, which are stored in encrypted form in your Google or iCloud account.

 

Types of wallets

There are two main types of wallets: hardware wallets and software wallets.

  1. Hardware wallets are the most secure type of Bitcoin wallet because their private keys are stored on a physical device and theoretically cannot be accessed by a computer or from the internet. When a person wishes to make a transaction, they plug in the hardware wallet (usually via USB). The hardware wallet will sign transactions without compromising the private key. The downside to hardware wallets is the cost and availability of the devices. Ledger and Trezor are well known hardware wallets.
  2. Software wallets exist on computing devices, like a desktop computer, a smartphone, or in a web browser. Since computing devices run many programs or applications, they are susceptible to viruses, malware, and phishing schemes, making all software wallets vulnerable to some degree. That being said, hacking incidents are extremely rare and software wallets are generally considered safe for everyday use.

There are many software wallet choices, which can make choosing overwhelming. We welcome you to try the Bitcoin.com Wallet, which is an easy-to-use but powerful crypto wallet trusted by millions.

 

 

 
 

Comments ()


Sign in

Read Next

Why Data Privacy Is Changing Online Advertising

Blog banner

Sage

Blog banner

URL vs Domain

Blog banner

SmartData Collective: Data Science aur Analytics ki Duniya

Blog banner

Blog on Smartsheet.

Blog banner

VIRTUAL MACHINE

Blog banner

VIDEO INTERVIEWS : A NEW ECOSYSTEM TO GET DREAM JOBS

Blog banner

Operating system and overviews

Blog banner

Open Source Project By Google

Blog banner

Direct memory access (DMA)

Blog banner

New Ransomware Encrypts Your Android And Then Changes PIN Lock

Blog banner

What is a Dumpster Diving Attack?

Blog banner

indian premier league

Blog banner

Modern Operating System

Blog banner

Operating system evolution

Blog banner

"Mahakali cave"

Blog banner

note taker app

Blog banner

Modern Operating System - Khush Bagaria

Blog banner

Yahoo! mail

Blog banner

How to tie a Tie

Blog banner

What's Better : Supervised or Unsupervised Learning

Blog banner

Throttle engine ’Sneak peek into the future’

Blog banner

Fault Tolerance in an Operating System

Blog banner

Cyber Forensics

Blog banner

How Cyber Forensics use in AI

Blog banner

Blockchain in IoT Applications

Blog banner

Binary Search Tree (BST) in Data Structure

Blog banner

The “High” of ‘likes’, ‘follows’, and ‘views’ – and how I decided to respond to them myself.

Blog banner

How to manage in BEST bus in mumbai specially PEAK Time!

Blog banner

What is OS and its overview

Blog banner

Why Friendship at Work is Important

Blog banner

Computer Security

Blog banner

Measuring IT Risk

Blog banner

ITIL Version 3 and 4 differenciation?

Blog banner

Modern Operating system

Blog banner

CYBERPEACEKEEPING: NEW WAYS TO PREVENT AND MANAGE CYBERATTACKS

Blog banner

File Allocation Methods

Blog banner

15 Websites that will make your life easier ...!!!

Blog banner

How College Events Build Real-world Skills You Can’t Learn From Textbooks

Blog banner

Big Data

Blog banner

OS Assignment 3

Blog banner

File system

Blog banner