A Complete Guide to Crypto Wallets

Learn about the different types of crypto wallets, how they work, and which wallet is right for you. Covers hot wallets, cold wallets, custodial vs. self-custodial, and how Borrow by Sats Terminal uses embedded Privy wallets for a seamless lending experience.

12 min read

What Is a Crypto Wallet?

A crypto wallet is a tool that lets you store, send, and receive digital assets like Bitcoin, Ethereum, and stablecoins. Despite the name, a digital wallet does not actually hold your cryptocurrency. Instead, it manages the cryptographic keys that prove your ownership of assets recorded on a blockchain.

Every crypto wallet revolves around two components:

  • Public key — Think of this as your account number. You share it with others so they can send you funds.
  • Private key — This is the secret password that authorizes transactions. Whoever controls the private key controls the funds.

Understanding how these keys work — and who holds them — is the single most important concept in crypto security.

Why You Need a Crypto Wallet

If you plan to buy, sell, hold, or borrow against cryptocurrency, you need a wallet. Exchanges like Coinbase or Kraken provide built-in wallets, but those are custodial — the exchange holds your private keys on your behalf. That convenience comes with trade-offs around control and counterparty risk.

A wallet is also essential for interacting with decentralized finance (DeFi) protocols. To borrow against your Bitcoin, provide liquidity, or swap tokens on-chain, you need a wallet that can sign transactions directly.

Types of Crypto Wallets

Crypto wallets fall along two main axes: hot vs. cold and custodial vs. self-custodial. Let us break each down.

Hot Wallets

A hot wallet is any wallet connected to the internet. This category includes:

  • Browser extension wallets — MetaMask, Rabby, and Phantom are popular choices. They install directly in your browser and let you interact with decentralized apps (dApps) with a few clicks.
  • Mobile wallets — Apps like Trust Wallet and BlueWallet run on your phone, offering portability and quick access to your funds.
  • Desktop wallets — Software installed on your computer, such as Electrum for Bitcoin, providing a middle ground between convenience and security.
  • Embedded wallets — Wallets built directly into a platform's interface, removing the need to install anything. Borrow by Sats Terminal uses Privy-powered embedded wallets in this category.

Hot wallets are convenient for everyday transactions and DeFi activity, but because they remain connected to the internet, they carry a higher risk of being compromised if your device is infected with malware.

Cold Wallets

A cold wallet stores your private keys offline, making it far more resistant to hacking:

  • Hardware wallets — Physical devices like Ledger and Trezor that sign transactions in an isolated environment. You plug them in (or connect via Bluetooth) only when you need to authorize a transfer.
  • Paper wallets — A printed copy of your public and private keys. While simple, paper wallets are fragile and easy to lose or damage.
  • Steel/metal backups — Engravings of your seed phrase on a metal plate, designed to survive fire and flooding.

Cold wallets are the gold standard for long-term storage of large holdings. The trade-off is that they are slower and less convenient for frequent transactions.

Custodial Wallets

A custodial wallet is managed by a third party — usually an exchange. The company holds your private keys, handles security, and provides account recovery if you forget your password. Examples include wallets on Coinbase, Binance, and Kraken.

Pros: Easy to set up, familiar login flow, built-in recovery.

Cons: You do not truly own your keys ("not your keys, not your coins"). The custodian can freeze your account, get hacked, or go bankrupt (as FTX demonstrated).

Self-Custodial Wallets

A self-custodial wallet puts you in full control of your private keys. No third party can freeze your funds or block your transactions. MetaMask, Ledger, and the embedded Privy wallets used by Borrow all fall into this category.

Pros: Full ownership, censorship resistance, no counterparty risk.

Cons: You are solely responsible for securing your keys. Lose your seed phrase and your funds are gone permanently.

For a deeper dive into why self-custody matters, see our guide on understanding self-custodial wallets.

How to Choose the Right Wallet

Picking a wallet depends on your goals:

GoalRecommended Wallet Type
Long-term Bitcoin storageHardware wallet (cold)
Daily DeFi activityBrowser extension or embedded wallet (hot)
Borrowing against BTCEmbedded self-custodial wallet (hot)
Exchange tradingExchange custodial wallet
Maximum security for large sumsHardware wallet + metal seed backup

Many experienced users combine multiple wallet types. For example, you might keep the majority of your Bitcoin on a Ledger for safekeeping and use an embedded wallet on Borrow to access borrowing opportunities with a smaller allocation.

What to Look For

When evaluating any wallet, consider:

  1. Security track record — Has the wallet been audited? Has it suffered breaches?
  2. Key management — Do you control the private key, or does a third party?
  3. Chain support — Does it support the blockchains and tokens you use?
  4. Backup and recovery — How does seed phrase backup work?
  5. User experience — Is the interface intuitive enough for your skill level?

How Borrow by Sats Terminal Handles Wallets

Borrow by Sats Terminal takes a unique approach by embedding a Privy-powered self-custodial wallet directly into the platform. Here is what that means for you:

  • No extension required — You do not need to install MetaMask or any other software. Your wallet is created automatically when you sign up.
  • Self-custodial by design — Even though the wallet is embedded, your private keys are never accessible to Sats Terminal. You retain full self-custody of your assets.
  • Seamless UX — Signing transactions, depositing collateral, and borrowing stablecoins all happen within a single interface. No switching between apps or copying addresses.
  • No KYC — Because the wallet is self-custodial and Borrow aggregates decentralized protocols like Aave v3 and Morpho Blue, there is no identity verification process.

This design eliminates one of the biggest friction points in DeFi: wallet setup. If you can sign in to a website, you can start borrowing against Bitcoin on Borrow.

To learn more about the wallets Borrow supports, visit our FAQ on supported wallets.

Wallet Security Best Practices

Regardless of which wallet you use, follow these guidelines to keep your assets safe:

Protecting Your Seed Phrase

Your seed phrase (typically 12 or 24 words) is the master key to your wallet. If someone obtains it, they can drain your funds instantly.

  • Write it down on paper or metal — Never store it digitally (no screenshots, no cloud storage, no notes apps).
  • Store it in a secure location — A safe, safety deposit box, or other tamper-evident environment.
  • Never share it — No legitimate service will ever ask for your seed phrase. Period.

Device Security

  • Keep your operating system and wallet software updated.
  • Use a dedicated device for high-value transactions if possible.
  • Enable two-factor authentication (2FA) on any accounts associated with your wallet.
  • Be cautious of phishing sites that mimic legitimate wallet interfaces.

Transaction Hygiene

  • Always double-check the recipient address before sending funds.
  • Start with a small test transaction when sending to a new address.
  • Verify the URL of any DeFi platform before connecting your wallet.

The Future of Crypto Wallets

Wallet technology is evolving rapidly. Account abstraction, social recovery, and passkey-based authentication are all making wallets more user-friendly without sacrificing self-custody. Embedded wallets like the Privy-powered solution used by Borrow represent the leading edge of this trend — they hide the complexity of key management while preserving the security properties of self-custody.

As more platforms adopt embedded wallet technology, the gap between Web2 convenience and Web3 ownership will continue to narrow.

Key Takeaways

  • A crypto wallet manages the keys that prove ownership of your on-chain assets.
  • Hot wallets prioritize convenience; cold wallets prioritize security.
  • Self-custodial wallets give you full control, but you must secure your own keys.
  • Borrow by Sats Terminal uses an embedded Privy wallet that is self-custodial, requires no installation, and works with no KYC.
  • Always protect your seed phrase and follow basic device security practices.

Whether you are just getting started or looking to optimize your setup, understanding wallets is the foundation for everything else in crypto — from borrowing against Bitcoin to participating in DeFi protocols.

Related Guides

Common Questions

Hardware wallets (cold wallets) like Ledger and Trezor are generally considered the safest because they store your private keys offline, making them immune to online hacking attempts. For maximum security, pair a hardware wallet with a metal seed phrase backup stored in a secure location.