{"id":150291,"date":"2022-04-05T13:41:15","date_gmt":"2022-04-05T20:41:15","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=150291"},"modified":"2024-03-28T22:50:35","modified_gmt":"2024-03-29T05:50:35","slug":"cold-wallets-hot-wallets-the-basics-of-storing-your-crypto-securely","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/cold-wallets-hot-wallets-the-basics-of-storing-your-crypto-securely\/","title":{"rendered":"Cold Wallets, Hot Wallets: The Basics of Storing Your Crypto Securely"},"content":{"rendered":"<p><span data-contrast=\"auto\">If you\u2019re thinking about crypto, one of the first things you\u2019ll want to do is get yourself a good wallet.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Topping the several important things a new cryptocurrency investor needs to think about is security. Rightfully so. Cryptocurrency is indeed subject to all kinds of fraud, theft, and phishing attacks, just like the credentials and accounts we keep online.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">But here\u2019s the catch. <\/span><a href=\"https:\/\/www.bbc.com\/news\/business-49177705\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">L<\/span><span data-contrast=\"none\">ost or stolen cryptocurrency is terrifically difficult to recover<\/span><\/a><span data-contrast=\"auto\">. By and large, it doesn\u2019t enjoy the same protections and regulations as traditional currency and financial transactions. For example, you can always call your bank or credit card company to report theft or contest a fraudulent charge. Not the case with crypto. With that, you\u2019ll absolutely need a safe place to secure it. Likewise, <\/span><a href=\"https:\/\/www.fdic.gov\/resources\/deposit-insurance\/faq\/#:~:text=Deposits%20are%20insured%20up%20to,through%20the%20date%20of%20default.\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">in the U.S. many banks are FDIC insured<\/span><\/a><span data-contrast=\"auto\">, which protects depositors if the bank fails. Again, not so with crypto.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">So, when it comes to cryptocurrency, security is everything.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">What makes crypto so attractive to hackers?<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"none\">Cryptocurrency theft offers hackers an immediate payoff. It\u2019s altogether different from, say, hacking the database of a Fortune 500 company. With a data breach, a hacker may round up armloads of personal data and information, yet it takes additional steps for them to translate those stolen records into money. With cryptocurrency theft, the dollars shift from the victim to the crook in milliseconds. It\u2019s like digital pickpocketing. As you can guess, that makes cryptocurrency a big target.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">And that\u2019s where your wallet will come in, a place where you store the digital credentials associated with the cryptocurrency you own. The issue is doing it securely. Let\u2019s take a look at the different wallets out there and then talk about how you can secure them.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">Hot wallets and cold wallets for crypto<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"none\">Broadly, there are two general categories of wallets. First, let\u2019s look at what these wallets store.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">A wallet contains public and private \u201ckeys\u201d that are used to conduct transactions. The public key often takes the form of an address, one that anyone can see and then use to send cryptocurrency. The private key is exactly that. Highly complex and taking many forms that range from multi-word phrases to strings of code, it\u2019s your unique key that proves your ownership of your cryptocurrency and that allows you to spend and send crypto. Needless to say, never share your private key. <\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">With that, there are two ways to store your keys\u2014in a hot wallet or a cold wallet.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<table data-tablestyle=\"MsoTableGrid\" data-tablelook=\"1184\" aria-rowcount=\"1\">\n<tbody>\n<tr aria-rowindex=\"1\">\n<td data-celllook=\"0\">\n<h3><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<h3><span data-contrast=\"none\">Hot Wallets:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p>&nbsp;<\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">These wallets store cryptocurrency on internet-connected devices\u2014often a smartphone, but also on computers and tablets\u2014all of which allow the holder to access and make transactions quickly.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"none\">Think of a hot wallet as a checking account, where you keep a smaller amount of money available for day-to-day spending, yet less securely than a cold wallet because it&#8217;s online.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"none\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\">\n<h3><span data-contrast=\"none\">Cold Wallets:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p>&nbsp;<\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">These wallets store cryptocurrency in places not connected to the internet, which can include a hard drive, USB stick, paper wallet (keys printed on paper), or physical coins.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"none\">Think of the cold wallet like a savings account, or cold storage if you like. This is where to store large amounts of cryptocurrency more securely because it\u2019s not connected to the internet.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2><b><span data-contrast=\"none\">Hot wallets for cryptocurrency<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"none\">As you can see, the benefit of a hot wallet is that you can load it up with cryptocurrency, ready for spending. However, it\u2019s the riskiest place to store cryptocurrency because it\u2019s connected to the internet, making it a target for hacks and attacks.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">In addition to that, a hot wallet is connected to a cryptocurrency exchange, which makes the transfer of cryptocurrencies possible. The issue with that is all cryptocurrency exchanges are not created equal, particularly when it comes to security. Some of the <\/span><a href=\"https:\/\/www.cnbc.com\/2022\/01\/06\/crypto-scammers-took-a-record-14-billion-in-2021-chainalysis.html#:~:text=Losses%20from%20crypto%2Drelated%20crime,were%20taken%20from%20DeFi%20protocols.\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">lesser-established exchanges may not utilize strong protocols<\/span><\/a><span data-contrast=\"none\">, likely making a target for attack. <\/span><a href=\"https:\/\/www.nbcnews.com\/tech\/security\/bitcoin-crypto-exchange-hacks-little-anyone-can-do-rcna7870\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">Even the more established and trusted exchanges have fallen victim to attacks\u2014where crooks have walked away with millions or even hundreds of millions of dollars<\/span><\/a><span data-contrast=\"none\">.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"none\">Cold wallets for cryptocurrency<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"none\">While the funds in cold wallets are far less liquid, they\u2019re far more secure because they\u2019re not connected to the internet. In this way, cold wallets are more vault-like and suitable for long-term storage of larger sums of funds. But cold wallets place a great deal of responsibility on the holder. They must be stored in a physically secure place, and be backed up, because if you lose that one device or printout that contains your cryptocurrency info, you lose the cryptocurrency altogether. Within the cold wallet category, there are a few different types:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"none\">1. Purpose-built cryptocurrency storage devices<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"none\">Several manufacturers make storage devices specifically designed to store cryptocurrency, complete with specific features for security, durability, and compatibility with many (yet not always all) of the different cryptocurrencies on the market. An online search will turn up several options, so doing your homework here will be very important\u2014such as which devices have the best track record for security, which devices are the most reliable overall, and which ones are compatible with the crypto you wish to keep.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"none\">2. Hard drives on a computer or laptop<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"none\">Storing cryptocurrency information on a computer or laptop that\u2019s disconnected from the internet (also known as \u201cair-gapped\u201d) is a storage method that\u2019s been in place for some time. However, because computers and laptops are complex devices, they may be less secure than a simpler, purpose-built cryptocurrency device. In short, there are more ways to compromise a computer or laptop with <\/span><a href=\"https:\/\/arxiv.org\/pdf\/1804.08714.pdf\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">malware that a determined hacker can use to steal information in some rather surprising ways<\/span><\/a><span data-contrast=\"none\">. (Like noise from a compromised computer fan passing information in a sort of Morse Code or generating electromagnetic signals on a compromised computer that nearby devices can use to skim information.)<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"none\">3. Paper wallets<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"none\">Ah, good old paper. Write down a code and keep it secure. Simple, right? In truth, creating a paper wallet can be one of the most involved methods of all the cold storage options out there. <\/span><a href=\"https:\/\/www.bitcoin.com\/get-started\/setting-up-your-own-cold-storage-bitcoin-wallet\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">Bitcoin offers a step-by-step walkthrough of the process that you can see for yourself<\/span><\/a><span data-contrast=\"none\">. Once done, though, you\u2019ll have a piece of paper with a public address for loading cryptocurrency into your paper cold wallet, along with a private key. One note: Bitcoin and others recommend never reusing a paper cold wallet once it\u2019s connected to a hot wallet. You should go through the process of creating a new cold paper wallet each time.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"none\">4. Physical coins for cryptocurrency<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"none\">Physical coins are a special case and are relatively new on the scene. They\u2019re a physical coin minted with a tamper-resistant sticker that indicates the actual value of the coin. Like other methods of cold wallet storage, this calls for keeping it in a safe place, because it\u2019s pretty much like a wad of cash. And like cash, if it\u2019s stolen, it\u2019s gone for good. Also note that a cryptocurrency holder must work with a third party to mint and deliver the coin, which has its own costs and risks involved.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"none\">Securing your cryptocurrency wallet<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"none\">With that look at wallets, let\u2019s see what it takes to secure them. It may seem like there\u2019s plenty to do here. That\u2019s because there is, which goes to show just how much responsibility falls on the shoulders of the cryptocurrency holder. Of course, this is your money we\u2019re talking about, so let\u2019s dive into the details.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"none\">1. Back up your wallet<\/span><\/b><\/h3>\n<p><span data-contrast=\"none\">Whatever form your storage takes, back it up. And back it up again. Cryptocurrency holders should make multiple copies just in case one is lost, destroyed, or otherwise inaccessible. For example, one story that\u2019s made the rounds is of <\/span><a href=\"https:\/\/www.deseret.com\/2021\/12\/10\/22827963\/james-howells-threw-away-hard-drives-with-bitcoin-password\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">a IT engineer in the UK who accidentally threw away an old hard drive with his cryptocurrency key on it,<\/span><\/a><span data-contrast=\"none\"> one that held 7,500 bitcoins, worth millions of dollars. Redundancy is key. Back up the entire wallet right away and then often after that.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"none\">2. Store your wallet(s) securely <\/span><\/b><\/h3>\n<p><span data-contrast=\"none\">With redundant backups in place, store them in places that are physically secure. It\u2019s not uncommon for crypto holders to use fireproof safes and safe deposit boxes at banks for this purpose, which only highlights the earlier point that a wallet is as good as cash in many ways.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"none\">3. Use online protection software <\/span><\/b><\/h3>\n<p><span data-contrast=\"none\">This will help prevent malware from stealing crypto, whether or not your device is connected to the internet. <\/span><a href=\"https:\/\/www.mcafee.com\/en-us\/antivirus\/mcafee-total-protection.html\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">Comprehensive online protection software will give you plenty of other benefits as well<\/span><\/a><span data-contrast=\"none\">, including identity theft monitoring and strong password management, two things that can help you protect your investments, and yourself, even further.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"none\">4. Update your operating system, apps, and devices <\/span><\/b><\/h3>\n<p><span data-contrast=\"none\">Updates often address security issues, ones that hackers will of course try to exploit. Keep everything current and set automatic updates wherever they are available so that you have the latest and greatest.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"none\">5. Make use of multi-factor authentication (MFA) where possible <\/span><\/b><\/h3>\n<p><span data-contrast=\"none\">Just as your bank and other financial accounts offer MFA, do the same here with your crypto. Some extra security-conscious crypto investors will purchase a device for this specific purpose for yet greater protection, such as a separate phone with texting capability. This keeps their crypto transactions separate from the multitude of other things they do on their everyday smartphone, effectively putting up a wall between these two different digital worlds.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"none\">6. Keep your investments to yourself<\/span><\/b><\/h3>\n<p><span data-contrast=\"none\">\u00a0Two things fall under this category. One, the less you say about the crypto investments you make, the less word gets around, which can help keep hackers out of the loop. Particularly on social media! Two, consider setting up a unique email account that you only use for crypto. The less you associate your crypto accounts with other financial accounts like your banking and online payment apps, the more difficult it is to compromise several accounts in one fell swoop.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"none\">7. Watch out for phishing scams<\/span><\/b><\/h3>\n<p><span data-contrast=\"none\">Just like hackers send phishing emails with an eye on accessing your bank accounts, credit cards, and so on, they\u2019ll do much the same to get at your crypto accounts. The target may be different, that being your crypto, but the attack is very much the same. An email will direct you to a hacker\u2019s website, using some sort of phony pretense, get-rich-quick-scheme, or scare tactic. Once there, they\u2019ll ask for private key information and then simply steal the funds. And it\u2019s not just email. <\/span><a href=\"https:\/\/money.com\/crypto-phishing-google-scam\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">Hackers have used online ads to phish for victims as well<\/span><\/a><span data-contrast=\"none\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"none\">Crypto: security is on you<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"none\">As you can see, these security measures rely almost exclusively on you. If something happens to you, that could make recovering your funds a real problem. Consider reaching out to someone you trust and let them know where you\u2019re storing your wallets and information. That way, you\u2019ll have some assistance ready in the event of an emergency or issue.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">The very things that define cryptocurrency\u2014the anonymity of ownership, the lack of banking institutions, the light or non-existent regulation\u2014all have major security implications. Add in the fact that you\u2019re your own safety net here and it\u2019s easy to see that crypto is something that requires plenty of planning and careful through before diving into. Getting knowledgeable about security, how you\u2019ll protect your crypto, should absolutely top your list before investing.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you\u2019re thinking about crypto, one of the first things you\u2019ll want to do is get yourself a good wallet.\u00a0\u00a0&#8230;<\/p>\n","protected":false},"author":1408,"featured_media":150299,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661],"tags":[15007,15003,15005,15011,15009,15013],"coauthors":[15741],"class_list":["post-150291","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","tag-best-way-to-store-crypto","tag-crypto-cold-wallet","tag-crypto-storage","tag-hot-crypto-wallet","tag-saving-crypto","tag-storing-crypto"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cold Wallets, Hot Wallets: The Basics of Storing Your Crypto Securely | McAfee Blog<\/title>\n<meta name=\"description\" content=\"If you\u2019re thinking about crypto, one of the first things you\u2019ll want to do is get yourself a good wallet.\u00a0\u00a0 Topping the several important things a new\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cold Wallets, Hot Wallets: The Basics of Storing Your Crypto Securely | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"If you\u2019re thinking about crypto, one of the first things you\u2019ll want to do is get yourself a good wallet.\u00a0\u00a0 Topping the several important things a new\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/cold-wallets-hot-wallets-the-basics-of-storing-your-crypto-securely\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-05T20:41:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-29T05:50:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/04\/300x200_Blog_MFE_Blogs_040722_Blog.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Amy Bunn\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Amy Bunn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/cold-wallets-hot-wallets-the-basics-of-storing-your-crypto-securely\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/cold-wallets-hot-wallets-the-basics-of-storing-your-crypto-securely\/\"},\"author\":{\"name\":\"Amy Bunn\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/15fadfbc1716a6a3d88e22ed09e95fe3\"},\"headline\":\"Cold Wallets, Hot Wallets: The Basics of Storing Your Crypto Securely\",\"datePublished\":\"2022-04-05T20:41:15+00:00\",\"dateModified\":\"2024-03-29T05:50:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/cold-wallets-hot-wallets-the-basics-of-storing-your-crypto-securely\/\"},\"wordCount\":1916,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/cold-wallets-hot-wallets-the-basics-of-storing-your-crypto-securely\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/04\/300x200_Blog_MFE_Blogs_040722_Blog.jpg\",\"keywords\":[\"Best way to store crypto\",\"Crypto cold wallet\",\"Crypto storage\",\"Hot crypto wallet\",\"Saving crypto\",\"Storing crypto\"],\"articleSection\":[\"Internet Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/cold-wallets-hot-wallets-the-basics-of-storing-your-crypto-securely\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/cold-wallets-hot-wallets-the-basics-of-storing-your-crypto-securely\/\",\"name\":\"Cold Wallets, Hot Wallets: The Basics of Storing Your Crypto Securely | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/cold-wallets-hot-wallets-the-basics-of-storing-your-crypto-securely\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/cold-wallets-hot-wallets-the-basics-of-storing-your-crypto-securely\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/04\/300x200_Blog_MFE_Blogs_040722_Blog.jpg\",\"datePublished\":\"2022-04-05T20:41:15+00:00\",\"dateModified\":\"2024-03-29T05:50:35+00:00\",\"description\":\"If you\u2019re thinking about crypto, one of the first things you\u2019ll want to do is get yourself a good wallet.\u00a0\u00a0 Topping the several important things a new\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/cold-wallets-hot-wallets-the-basics-of-storing-your-crypto-securely\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/cold-wallets-hot-wallets-the-basics-of-storing-your-crypto-securely\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/cold-wallets-hot-wallets-the-basics-of-storing-your-crypto-securely\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/04\/300x200_Blog_MFE_Blogs_040722_Blog.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/04\/300x200_Blog_MFE_Blogs_040722_Blog.jpg\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/cold-wallets-hot-wallets-the-basics-of-storing-your-crypto-securely\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cold Wallets, Hot Wallets: The Basics of Storing Your Crypto Securely\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/15fadfbc1716a6a3d88e22ed09e95fe3\",\"name\":\"Amy Bunn\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/b58be83668cf2b1de7fb5b8a222bb835\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/Amy-Bunn-96x96.jpeg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/Amy-Bunn-96x96.jpeg\",\"caption\":\"Amy Bunn\"},\"description\":\"Amy Bunn is head of communications at McAfee and has worked in technology and cybersecurity for over 15 years. During this time, Amy has witnessed the changing technology landscape and the critical role that online protection plays today. Amy believes that families and individuals around the world should be free to enjoy all the benefits and advantages that the internet and technology afford and is passionate about making this a reality by discussing the very latest in cybersecurity tips and advice, which, when combined with robust online protection, can help empower people to live their life online with total confidence.\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/amy-bunn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cold Wallets, Hot Wallets: The Basics of Storing Your Crypto Securely | McAfee Blog","description":"If you\u2019re thinking about crypto, one of the first things you\u2019ll want to do is get yourself a good wallet.\u00a0\u00a0 Topping the several important things a new","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Cold Wallets, Hot Wallets: The Basics of Storing Your Crypto Securely | McAfee Blog","og_description":"If you\u2019re thinking about crypto, one of the first things you\u2019ll want to do is get yourself a good wallet.\u00a0\u00a0 Topping the several important things a new","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/cold-wallets-hot-wallets-the-basics-of-storing-your-crypto-securely\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2022-04-05T20:41:15+00:00","article_modified_time":"2024-03-29T05:50:35+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/04\/300x200_Blog_MFE_Blogs_040722_Blog.jpg","type":"image\/jpeg"}],"author":"Amy Bunn","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"Amy Bunn","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/cold-wallets-hot-wallets-the-basics-of-storing-your-crypto-securely\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/cold-wallets-hot-wallets-the-basics-of-storing-your-crypto-securely\/"},"author":{"name":"Amy Bunn","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/15fadfbc1716a6a3d88e22ed09e95fe3"},"headline":"Cold Wallets, Hot Wallets: The Basics of Storing Your Crypto Securely","datePublished":"2022-04-05T20:41:15+00:00","dateModified":"2024-03-29T05:50:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/cold-wallets-hot-wallets-the-basics-of-storing-your-crypto-securely\/"},"wordCount":1916,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/cold-wallets-hot-wallets-the-basics-of-storing-your-crypto-securely\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/04\/300x200_Blog_MFE_Blogs_040722_Blog.jpg","keywords":["Best way to store crypto","Crypto cold wallet","Crypto storage","Hot crypto wallet","Saving crypto","Storing crypto"],"articleSection":["Internet Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/cold-wallets-hot-wallets-the-basics-of-storing-your-crypto-securely\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/cold-wallets-hot-wallets-the-basics-of-storing-your-crypto-securely\/","name":"Cold Wallets, Hot Wallets: The Basics of Storing Your Crypto Securely | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/cold-wallets-hot-wallets-the-basics-of-storing-your-crypto-securely\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/cold-wallets-hot-wallets-the-basics-of-storing-your-crypto-securely\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/04\/300x200_Blog_MFE_Blogs_040722_Blog.jpg","datePublished":"2022-04-05T20:41:15+00:00","dateModified":"2024-03-29T05:50:35+00:00","description":"If you\u2019re thinking about crypto, one of the first things you\u2019ll want to do is get yourself a good wallet.\u00a0\u00a0 Topping the several important things a new","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/cold-wallets-hot-wallets-the-basics-of-storing-your-crypto-securely\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/cold-wallets-hot-wallets-the-basics-of-storing-your-crypto-securely\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/cold-wallets-hot-wallets-the-basics-of-storing-your-crypto-securely\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/04\/300x200_Blog_MFE_Blogs_040722_Blog.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/04\/300x200_Blog_MFE_Blogs_040722_Blog.jpg","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/cold-wallets-hot-wallets-the-basics-of-storing-your-crypto-securely\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"Cold Wallets, Hot Wallets: The Basics of Storing Your Crypto Securely"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/15fadfbc1716a6a3d88e22ed09e95fe3","name":"Amy Bunn","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/b58be83668cf2b1de7fb5b8a222bb835","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/Amy-Bunn-96x96.jpeg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/Amy-Bunn-96x96.jpeg","caption":"Amy Bunn"},"description":"Amy Bunn is head of communications at McAfee and has worked in technology and cybersecurity for over 15 years. During this time, Amy has witnessed the changing technology landscape and the critical role that online protection plays today. Amy believes that families and individuals around the world should be free to enjoy all the benefits and advantages that the internet and technology afford and is passionate about making this a reality by discussing the very latest in cybersecurity tips and advice, which, when combined with robust online protection, can help empower people to live their life online with total confidence.","url":"https:\/\/www.mcafee.com\/blogs\/author\/amy-bunn\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/150291","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/1408"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=150291"}],"version-history":[{"count":1,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/150291\/revisions"}],"predecessor-version":[{"id":180482,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/150291\/revisions\/180482"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/150299"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=150291"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=150291"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=150291"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=150291"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}