In 2014, the number of crypto-jokes was approximately 2 million, now this figure tends to 23 million, that is, the average growth is about 2.5 times a year.
To date, only MyEtherWallet (one of the most popular crypto currency storage products) has already registered more than 15 million accounts, which hold approximately $ 62 billion. These figures indicate that the active growth in the number of users will continue.
Wallets are divided according to the level of protection: the average level of security or the so-called hot wallets.
Purses for PC
In fact, this is an application that is installed on the computer or as an extension to the browser, in the case of MyEtherWallet. Access to such purses is possible only through the device on which they are installed. Each of the purses has additional unique functions.
For example, DarkWallet is focused on anonymity. The application uses various methods to protect the identities of user accounts. When making a payment, the program combines the data of several synchronous transactions, which does not allow tracking the actions with the account.
Wallets for a computer have a good degree of protection, but there is a danger of hacking or infecting a PC with a virus. Because of what you can lose all the money.
Mobile Wallets
Convenient, because the user does not depend on the computer and in some cases gets the opportunity to pay for the purchase of crypto in real stores. Examples of such wallets are enough: Mycelium, Xapo and Blockchain.
All of them store keys in encrypted form directly in the phone. Some wallets allow you to use the NFC protocol. In this case, for payment you do not enter any information, just attach the phone to the reader.
The peculiarity of all mobile purses is that they are incomplete cryptoclients:
--------------The client for the PC downloads and stores the entire volume of the blockbuster.
--------------Mobile applications download only a small set of information from the blockbuster and rely on other trusted nodes (nodes) in the Bitcoin network.Minus the mobile wallet in that he, like a PC, can be hacked, stolen or infected.
Online Wallets
There are many similar services, some of them can be attached to desktop or mobile wallets. Of course, they are convenient to use, because access to the account can be obtained from any point where there is Internet. One example of this type of wallet is the Strongcoin solution.
There is also the risk of hacking this third party - the site or exchange, where the data is stored. And this is no longer to be protected, as in the case of the Bitfinex exchange.
Hot storage facilities are quite convenient to use and are in demand:For example, those who trade on the exchange, are forced to use hot wallets, because they need quick access to the market through a smartphone. It is the ability to quickly access and is a common big drawback of hot wallets: all data is transmitted over the network, which can no longer be completely safe.
High level of security or so-called cold wallets:Cold stores are named so because they do not have access to the network, which allows almost completely to exclude interference of outside parties.
Paper wallet
One of the most reliable ways to store keys. Of course, you can write down the password on the notebook and store it in the safe. But there are sites that offer different ways of multistep data encryption.
For example, Paper Wallet. The output is two QR-codes: one contains an encrypted public key, the other is a private key.
Create a paper wallet is easy enough. But it requires responsible storage: it is necessary to create reliable backup copies, in case of loss or damage to the wallet.
In no event can you photograph, forward or leave QR-code in public.
Hardware Wallets
Small electronic devices like flash drives, which store secret keys so that they are almost impossible to extract. They do not have access to the Internet, but they can be used in devices connected to the network without the risk of infection or loss of data.
The market for such devices is represented by several brands. For example, Trezor hardware purse costs € 89, supports different currencies: bitcoin, Ethereum, ZCash and others. The device itself is protected by a pin code and a secret phrase.
To conduct a transaction, you need to confirm it by clicking the button on the purse case. Other brands - Keepkey at $ 129, Ledger for € 58 - are inherently similar to Trezor.
Such devices do not support NFC protocol, they can not be paid without connecting a PC or smartphone client.
It's not exactly wallets, it's just a repository with the ability to sign a transaction. But their reliability is high enough.
New generation hardware wallets
XZEN WALLET supports the storage of not only crypto currency, but also fiat money. It is an application for working on a computer or a smartphone and a protected hardware device in the form of a key ring or a bracelet. They provide cold storage of a private key.
Users can not only safely store money, but also contactlessly pay for goods and services in many countries with a single device.
In addition to secure storage and use of funds, the wallet has a wide range of functions. For example, a mechanism that reduces the risk of embezzlement when investing in an ICO.
We have the opportunity to purchase ICO tokens from a mobile application and implemented our own "naming" system. It allows you to verify the correctness of the entered address of the smart contract, to which money is transferred.