Blockchain & Cryptocurrency Glossary

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

  • search-icon Clear Definitions
  • search-icon Practical
  • search-icon Technical
  • search-icon Related Terms

Wallet

Pronunciation
[wawl-it]
Analogy
A blockchain wallet is like a specialized key ring rather than a physical wallet. It doesn't actually contain your money—the funds remain recorded on the blockchain—but it holds the cryptographic keys that prove your ownership and allow you to 'unlock' your funds when making transactions.
Definition
Software or hardware that stores private keys and allows users to interact with a blockchain by managing digital assets, signing transactions, and interacting with decentralized applications. Rather than storing actual coins or tokens, wallets control the cryptographic keys that prove ownership of assets recorded on the blockchain.
Key Points Intro
Wallets provide the essential interface between users and blockchain networks.
Key Points

Stores private keys that prove ownership of blockchain assets.

Generates signatures authorizing transactions from associated addresses.

Allows monitoring of balances and transaction history.

Available in various forms including hardware, software, mobile, desktop, and paper.

Example
MetaMask is a popular browser-based wallet for Ethereum and compatible blockchains, allowing users to store private keys, view balances, send transactions, and interact with decentralized applications directly through their web browser.
Technical Deep Dive
Modern wallets implement Hierarchical Deterministic (HD) architecture following Bitcoin Improvement Proposal 32 (BIP32), which generates an entire tree of key pairs from a single seed phrase. This enables creating multiple addresses from one backup while maintaining privacy through address rotation. Most wallets handle multiple cryptographic tasks including key generation and storage, address derivation, transaction construction, message signing, and network communication. Security models vary significantly: hardware wallets like Ledger or Trezor maintain keys in secure elements that never expose private keys to connected devices; hot wallets store encrypted keys on internet-connected devices; and multi-signature wallets require multiple keys to authorize transactions, distributing security across separate devices or individuals. Advanced wallets implement features like custom fee settings, hardware security module integration, transaction batching, contract interaction, and cross-chain compatibility.
Security Warning
Your wallet's security directly determines your asset security. Use hardware wallets for significant holdings, enable all available security features (PIN codes, passphrases), backup seed phrases securely offline in multiple locations, and never share private keys or seed phrases with anyone under any circumstances.
Caveat
The term 'wallet' can be misleading since blockchain assets are never actually stored in the wallet itself—they always exist on the blockchain. The wallet simply controls the keys that prove ownership and authorize transfers of those assets.

Wallet - Related Articles

14 min read

On-Chain Identity — KYC, AML & Zero-Knowledge Proofs

Institutional RWAs demand strict KYC/AML compliance. Blockchain's ethos values pseudonymity and data minimization. This fundamental conflict has long been seen as irreconcilable—until now....

Read