This post was flagged by the community and is temporarily hidden.
From Wikipedia, the free encyclopedia
An example paper printable bitcoin wallet consisting of one bitcoin address for receiving and the corresponding private key for spending.
A cryptocurrency wallet is a device, physical medium, program or a service which stores the public and/or private keys and can be used to track ownership, receive or spend cryptocurrencies. The cryptocurrency itself is not in the wallet. In the case of Bitcoin and cryptocurrencies derived from it, the cryptocurrency is decentrally stored and maintained in a publicly available ledger called the blockchain .
- 2Wallet types
- 3See also
A cryptocurrency wallet, comparable to a bank account, contains a pair of public and private cryptographic keys. A public key allows for other wallets to make payments to the wallet’s address, whereas a private key enables the spending of cryptocurrency from that address.
Wallets can either be digital apps or be hardware based. They either store the private key with the user, or the private key is stored remotely and transactions are authorized by a third party.
An actual bitcoin transaction from a web based cryptocurrency exchange to a hardware wallet (a Ledger Nano S).
Main article: Multisignature
With a deterministic wallet a single key can be used to generate an entire tree of key pairs. This single key serves as the root of the tree. The generated mnemonic sentence or word seed is simply a more human-readable way of expressing the key used as the root, as it can be algorithmically converted into the root private key. Those words, in that order, will always generate exactly the same root key. A word phrase could consist of 24 words like: begin friend black earth beauty praise pride refuse horror believe relief gospel end destroy champion build better awesome. That single root key is not replacing all other private keys, but rather is being used to generate them. All the addresses still have different private keys, but they can all be restored by that single root key. The private keys to every address it has and will ever give out can be recalculated given the root key. That root key, in turn, can be recalculated by feeding in the word seed. The mnemonic sentence is the backup of the wallet. If a wallet supports the same (mnemonic sentence) technique, then the backup can also be restored on another software or hardware wallet.
A mnemonic sentence is considered secure. The BIP-39 standard creates a 512-bit seed from any given mnemonic. The set of possible wallets is 2512. Every passphrase leads to a valid wallet. If the wallet was not previously used it will be empty.:104
In a non-deterministic wallet, each key is randomly generated on its own accord, and they are not seeded from a common key. Therefore, any backups of the wallet must store each and every single private key used as an address, as well as a buffer of 100 or so future keys that may have already been given out as addresses but not received payments yet.:94
- ^ Roberts, Daniel (15 December 2017). “How to send bitcoin to a hardware wallet (url=https://finance.yahoo.com/news/send-bitcoin-hardware-wallet-140141385.html”. Yahoo! Finance .
- ^ Divine, John (1 February 2019). “What’s the Best Bitcoin Wallet?”. U.S. News & World Report . Retrieved 12 March 2019.
- ^ Jump up to: a b c d Antonopoulos, Andreas (12 July 2017). Mastering Bitcoin: Programming the Open Blockchain . O’Reilly Media, Inc. ISBN 9781491954386. Retrieved 14 September 2017.
- ^ “Bitcoin Wallets: What You Need to Know About the Hardware”. The Daily Dot . 2018-11-20. Retrieved 2019-03-10.
- ^ Newman, Lily Hay (2017-11-05). “How to Keep Your Bitcoin Safe and Secure”. Wired . ISSN 1059-1028. Retrieved 2019-03-10.
- ^ “Bitcoin Startup Predicts Cryptocurrency Market Will Grow By $100 Billion in 2018”. Fortune . Retrieved 2019-02-15.
- ^ Graham, Luke (2017-07-20). “$32 million worth of digital currency ether stolen by hackers”. www.cnbc.com . Retrieved 2019-02-15.
- ^ Gutoski, Gus; Stebila, Douglas. “Hierarchical deterministic Bitcoin wallets that tolerate key leakage” (PDF). iacr.org . International Association for Cryptologic Research. Retrieved 2 November 2018.