为广大币圈朋友提供币圈基础入门专业知识!
当前位置首页 > 区块链知识> 正文

区块链中的冷热钱包是什么,区块链中的冷热钱包有哪些

发布时间:2023-12-06-07:54:00 来源:网络 区块链知识 区块   冷热   钱包

区块链中的冷热钱包是什么,区块链中的冷热钱包有哪些


请查看相关英文文档

A. What are blockchain digital asset cold wallets and hot money

Bitcoin wallets come in many forms, such as PC or mobile wallet clients, online web wallets, and even It is a small book (paper wallet) or brain (brain wallet) that records the Bitcoin private key. You can choose a wallet that suits you based on your needs.

Bitcoin wallets can be divided into cold wallets and hot wallets according to the storage method of private keys.

01. A cold wallet refers to a wallet where your private key cannot be accessed by the network.

Cold wallets often rely on "cold" devices to ensure the security of Bitcoin private keys, such as computers, mobile phones, and small notebooks with private key addresses written on them that are not connected to the Internet. Cold wallets avoid the risk of private keys being stolen by hackers, but may face physical security risks, such as computer loss and damage.

02. Hot wallet refers to a wallet that can access your private key via the Internet.

Hot wallets are often in the form of online wallets. When using hot wallets, it is best to set different passwords on different platforms and enable secondary authentication to ensure the security of your assets.

A wallet is actually a "management tool for private keys, addresses and blockchain data."

B. How to create a cold wallet

To easily generate a cold wallet, you need tools: mobile phone + memory card.
The steps are as follows:
Step 1: Find an unused mobile phone or a mobile phone specially used as a wallet, and restore the phone to factory settings;
Step 2: Disconnect the mobile phone network;
Step 3 :Install imtoken wallet;
Step 4: Create a wallet with imtoken wallet;
Step 5: Back up the private key to the memory card, copy the mnemonic phrase by hand for multiple backups, and export the wallet address.
Extended information:
1. Benefits of cold wallets
Cold wallets are never connected to the Internet and cannot be accessed by the network, thus avoiding the risk of hackers stealing private keys, and are safer than hot wallets.
Value investors, put the cold wallet in a safe, avoid placing it on the exchange, and operate it with "cheap hands" from time to time.
Of course, if you need to trade often or frequently, when the assets are large, hot and cold wallets should be used together. If you often need to trade, use the hot wallet to store it; if you don’t need process transactions, use the cold wallet to store it.
2. Cold wallet (Cold wallet), corresponding to the hot wallet, is also called an offline wallet or an offline wallet. It is one of the types of blockchain wallets, which means a wallet in which the user's private key cannot be accessed by the network.
Cold wallets usually rely on "cold devices (not connected to the Internet, computers, mobile phones, etc.) to ensure the security of Bitcoin private keys. They use QR code communication to keep the private keys away from the Internet and avoid the risk of hackers stealing the private keys. But you may also face physical security risks (such as computer loss, damage, etc.).
3. Basic Concept
A wallet is a tool for storing and using digital currencies. One currency corresponds to a wallet. It is used to store currencies, or " payEasy currency.
Bitcoin wallet allows users to check, store, and spend their Bitcoins. It has various forms, and its functions can be complex or simple. It can be a variety of tools that run in compliance with the Bitcoin protocol, such as computer clients. , mobile client, website service, special equipment, or just a medium that stores the Bitcoin private key, such as a piece of paper, a password, a U disk, a text document, because as long as you master the Bitcoin private key, you can The Bitcoins contained in its corresponding address can be disposed of. Bitcoin cannot be deposited into ordinary bank accounts. Transactions can only be performed on the Bitcoin network. Before use, you need to download the client or access the online network.
Cold wallet refers to the Bitcoin storage technology developed by an information technology company that provides secure storage solutions for blockchain digital assets. Kushen cold wallet integrates functions such as digital currency storage, multiple transaction password settings, publishing the latest market conditions and information, and providing hard fork solutions. It also uses QR code communication to prevent private keys from ever touching the Internet, which can effectively prevent hackers from stealing. .
Operating environment: Product model: Huawei mate 30 System version: EMUI 10

C. The difference between cold wallet and hot wallet

1. Cold wallet It does not touch the Internet, adopts a new technical model to ensure that cold-end hardware never touches the Internet, uses multiple encryption protection systems to protect core assets, and completely eliminates the risk of private key leakage in a completely cold environment.
2. Hot wallets are more convenient to use than cold wallets, but are far less secure than cold wallets.
Extended information:
1. Cold wallet: refers to the Bitcoin storage technology developed by an information technology company that provides secure storage solutions for blockchain digital assets. The cold wallet integrates functions such as digital currency storage, multiple transaction password settings, publishing the latest market conditions and information, and providing hard fork solutions. It also uses QR code communication to prevent private keys from being exposed to the Internet, which can effectively prevent hackers from stealing.
2. Hot wallet: It allows users to use Bitcoin on any browser and mobile device. It usually also provides some additional features to make it more convenient for users to use Bitcoin. However, you must be careful when choosing a hot wallet because its security is affected by the service provider.
3. Advantages of cold wallets
(1) Some cold wallets support a wide range of currencies.
(2) The private key does not touch the Internet, so there is no need to worry about being attacked by hackers and Trojans.
(3) The coins in the cold wallet adopt a decentralized storage method, and each address stores a certain number of coins.
(4) Once a private key is transferred online, it will be invalid and will never be used again.
4. Advantages of hot wallets
(1) They allow software developers to adopt their own applications.
(2) It can easily withdraw cryptocurrencies without requiring third-party users to access private keys like supporting "exchanges".
(3) It prevents hackers from attacking using its custom protection methods, such as different confirmation procedures to improve withdrawals and two-step login.
5. The main advantage of cold wallet is security, but the disadvantage is also obvious, that is, it is inconvenient to operate, especiallyIt is when transferring the Token. In comparison, hot wallets are slightly inferior in terms of security, but they are easy to operate. Security is always relative. From the perspective of hackers, Trojan viruses, etc., cold wallets are more secure than hot wallets. The operating threshold of cold wallets is also relatively high, and the convenience is not as good as hot wallets. Therefore, cold wallets are mainly used by institutions or individuals with large crypto assets. With the rapid development of the digital asset financial market, the number of market participants and traders of digital assets has increased sharply. At the same time, pain points such as theft of digital assets, random misappropriation of digital assets, and high risks of digital asset investment have also been completely eliminated. exposed. Therefore, as an indispensable part of the blockchain industry, wallets are accelerating with the development and expansion of the blockchain industry.

D. Can the police check the records of the cold wallet?

Yes. Cold wallet refers to the Bitcoin storage technology developed by information technology companies that provide secure storage solutions for blockchain digital assets. It is mainly carried out through the Internet. There will be traces of the source, and the police can find the records. Public security officers are a type of police in China. In my country, the public security police are also called "public security officers", "public security soldiers", and "public security guards".

E. How to make a cold wallet

A cold wallet, to put it simply, is a wallet that is never connected to the Internet.

A wallet that is never connected to the Internet is not connected to the Internet when it is generated? So will the network admit it?

Do not connect to the Internet when generating the wallet address. Don’t worry, the network will recognize it.

1. Principle of wallet generation

Blockchain wallet generates private key and public key based on asymmetric encryption algorithm, and derives the address through a series of calculations based on the public key.

Therefore, anyone can generate private keys, public keys, and addresses in large quantities. How to generate, you can use blockchain wallet tools to generate private keys, public keys, and addresses that comply with public chain specifications

The general process of generating Bitcoin's private keys, public keys, and addresses:

2. Generate a cold wallet

To easily generate a cold wallet, you need tools: mobile phone + memory card.
The steps are as follows:

A cold wallet is created successfully.

Transfer coins that do not require frequent transfers and transactions to this address. You can try transferring a small amount of coins first. The private key and mnemonic phrase for this address have never been connected to the Internet.

3. Benefits of cold wallets

Cold wallets are never connected to the Internet and cannot be accessed by the network, thus avoiding the risk of hackers stealing private keys and making them safer than hot wallets.

Value investors, put the cold wallet in a safe and avoid putting it on the exchange. From time to time, you can operate it with "cheap hands".

Of course, if you need to trade often or frequently, when the assets are large, hot and cold wallets can be used together. If you often need to trade, use hot wallets.Wallet storage; if no process transaction is required, use cold wallet storage.

F. How to keep your wallet as safe as possible and help you hoard coins through the bear market

Reposted from Daniel

Step-by-step tutorial on how to keep your wallet as safe as possible

p>

Very suitable for coin hoarders on how to protect their coins

Little theoretical knowledge: what are mnemonics, private keys, and wallets

Nowadays, common wallets are basically A mnemonic word is used to generate a private key. The private key can be used to calculate the public key and then convert it into a wallet address. The mnemonic words of common public chain wallets are basically based on BTC's BIP-32 protocol, consisting of 12-24 words, and then generate HD wallets. The difference between HD wallet and single private key wallet is that multiple wallets can be generated based on mnemonic words + derivation_path. This is also the logic why wallet software can directly generate multiple wallets based on one identity wallet.

Based on these theories, almost all public chains can use the same mnemonic phrase to generate multiple wallets. That is to say, there is one mnemonic phrase that is common to all public chains. Just keep one mnemonic phrase. Play through all chains. In this case, if you want to use multiple accounts to play airdrops, open more test accounts, etc., you don’t need to remember additional mnemonics. You can create a special mnemonic phrase that can be used in all scenarios.

Little theoretical knowledge: What is a hardware wallet?

Hardware wallets generally store private keys in secure hardware devices and isolate them from network computers and other environments. During use, they are hardware wallets. The private key is used to sign the message sent, and the private key is not leaked. The signed message is directly sent to the computer and then uploaded to the chain. Hardware wallets generally have dedicated chip-level encryption private keys, which are absolutely safe in private key storage. However, blockchain security issues are not limited to private key management, so absolute security cannot be guaranteed.

Hardware wallet recommendation

Ledger x: If you want to play with many chains and there are many interactions on the chain, Ledger x is recommended. A single hardware wallet can install many applications and can support them at the same time. There are many chains. Basically, if you have a Ledger x, you don’t have to worry about the wallet problem of playing with the chain. There are also mobile and desktop clients, and various browser wallets are supported.

Ledger s: supports 2-3 secure applications at the same time, is cheap, has fewer chains suitable for playing, and is more convenient to interact with on the chain.

oneKey: Convenient for domestic purchase, supports evm, has its own application and wallet, is friendly to on-chain interactions, and has less support for non-evm public chains. If you don’t play a lot with chains, you can consider this one.

imkey: imtoken hardwareThe wallet is also convenient for domestic purchases and is suitable as a cold wallet.

Summary: There are many types of hardware wallets, and the one that suits you is the best. However, you must pay attention to the risks when buying a hardware wallet. You can only buy it on the official website. It is strictly forbidden to buy it on Taobao or other first-hand platforms. For products like Ledger that do not have official domestic channels, you need to use overseas shopping to transport them yourself. After receiving the hardware wallet, you need to ensure that it has not been tampered with. It usually has tamper-proof packaging, and it must be original when you get it.

Theoretical knowledge: What are cold wallets and hot wallets

Generally speaking, hot wallets store private keys in devices such as mobile phones and computers, and they can be easily interacted with. A cold wallet stores private keys offline, whether you write them on paper or use a hardware wallet. But I personally feel that this division may not be effective. If you want to ensure absolute security, the most effective difference between hot and cold wallets should be as follows

Cold wallet: Private keys and mnemonic words are not connected to the Internet, there is no authorization on the public chain, and no contract interaction is performed. etc., only used as storage of current public chain coins and transfers when necessary.

How to ensure the security of coins as much as possible:

Wallet classification: Classify the wallets you have. Each level can only do things of this level, and strictly implement them. For example, I generally divide them into these categories: cold wallet, main hot wallet, small wallet, and test wallet.

The cold wallet has been explained above. It is basically used to store coins, and only native coins are stored. Generally, I will choose a hardware wallet as a cold wallet, and then directly lock the coins in the safe. Normally I don’t know how to use the case, so I can just put it in and take it out easily for a few years.

Popular wallets may involve more large-scale interactions with the chain, or deposit some commonly used high-value coins. At this time, I usually use hardware wallets, and only do safe and reliable interactions. , generally speaking, it is some large dapp projects, and after using it, all contract authorizations will be cancelled.

Small wallets generally hold coins of low value, and use private key wallets directly to facilitate interactions. You can try out some new projects, conduct temporary small-amount transactions, and do various test interactions. Category.

To test wallets, I usually use mnemonic words to generate a bunch of wallets and use hundreds or thousands of them casually. When I see a good test network with airdrops and the like, I will also operate them in batches. Wave, just keep the mnemonic phrase.

Wallet software: Try to choose a wallet that is well-known and has many users. Wallets with large amounts of funds should not try new wallet software easily.

Mnemonic phrase storage:

Try to write down the mnemonic phrase of the hardware wallet on paper (or have a special mnemonic phrase storage plate). It is recommended to keep two copies of the same mnemonic phrase and keep them in two different places. . The most important wallet can record 1-2 less words, and then use your brain to remember the rest, or shuffle 1-2 words, and your brain will remember the correct order, or use your own algorithm to convert them. Anyway, as long as your brain can remember If you live in a part of it, it will be safer. (It is recommended not to do this if you forget things easily)

Because of the wallet classification, you can manage mnemonics in different ways according to your own wallet. The higher the security level of the wallet, the more mnemonics are needed. Safekeeping. Like the test wallet mnemonic, generally it can be saved on the computer.

Note:

1. Do not enter your mnemonic phrase anywhere except when you first create a wallet or import it. Any website that requires you to enter a mnemonic phrase is a scam.

2. When importing the wallet and entering the mnemonic phrase, you cannot use copy and paste, etc., and must type it by hand. Nowadays, various apps can read the clipboard, and it is basically leaked during the copying process. The same goes for private keys.

3. Don’t forget to put the paper mnemonic phrase somewhere. The place where you put it must also be safe.

On-chain security:

There is no absolute security on the chain, as long as the operation is carried out, there may be risks. But we can reduce the risk as much as possible. After grading your wallet, if it is stolen, the loss can be minimized.

Exchange security:

Do not put a large amount of funds in the exchange and do some capital allocation. Generally, there are fewer operations in bear markets, so there is no need to put so much money in the exchange. Try to identify big exchanges and put as little funds as possible in second-tier exchanges. Be sure to configure Google two-step verification, if possible, two mobile phones, one mobile phone exchange, and one mobile phone responsible for the Google verification code. My general idea is, if this exchange runs away, will there be a huge loss? How much loss can you accept? In this way, you can evaluate how much money you put on the exchange.

Summary: There is no absolute security in the world, but you can reduce the risk as much as possible. Only by keeping your principal and not being hacked or stolen will you have more possibilities. Where there is life, there is hope.

G. What is the difference between cold wallets and light wallets

Cold wallets are also called offline wallets, which are wallets used in an environment without an Internet connection. For example, private keys or mnemonics are written on paper, professional hardware wallets, and some people use devices that are not connected to the Internet to create cold wallets. The advantage of using cold wallets is security, but the disadvantage is that transactions and wallet creation are troublesome. Light wallet (SPV) SPV refers to "payment verification" rather than "transaction verification". light moneyThe package is a wallet implemented in thin client mode. It does not
store the complete blockchain, but only saves data related to itself. Therefore, it is small in size and can be run on mobile phones, computers, web pages, etc. The advantages of light wallets are: 1. It does not occupy memory, 2. It supports a variety of digital assets, 3. The user experience is good and newbies can get started quickly. The disadvantage is that transaction verification will be slow.