Which is the best virtual currency wallet
in terms of cloth storage and mining, I recommend Heshu hardware wallet and jiajiabao intelligent home miner. The core advantage of the proct is safety
take sum hardware wallet as an example. The advantages of sum hardware wallet are as follows:
1. The private key seed is encrypted layer by layer, physically isolated and never touched the Internet.
firstly, when creating the wallet, the seed password is generated and stored in the local encryption chip, and the 10 bit payment password is required
then, the transaction is made in the wallet. At this time, the user needs to enter the payment password to obtain the private key to digitally sign the transaction, and the transaction is completed. In addition, the private key seed is permanently stored in the chip, which is physically isolated and never touches the Internet. There is no need to worry about my password being stolen by hackers
Second, the bank system verifies the financial level motherboard and encryption chipuses the bank system to verify the financial level motherboard, and the private key seed is stored in the chip. If the proct is stolen or lost, and destroyed by malicious violence, the chip will trigger a self destruct circuit, and immediately permanently and irrecoverably delete all the information in the area
Third, it supports the withdrawal of global bitcoin ATM, which is convenient and fastthe reason why digital assets attract the attention of many fields in the world is that it is creating a global fast circulation, and the larger the circulation field is, the wider the scope is, and the higher its use value is. The core of digital assets is the medium it acts on among currencies. The Heshu wallet has built-in many mainstream exchanges in the world. It can trade digital assets anytime and anywhere. With one machine in hand, it can walk around the world without worry, and no longer have to worry about exchanging foreign currency
Different from conventional digital wallets, multi signature wallets need the authorization of multiple key holders to transfer digital currency, so the security of multi signature wallets is higher. Ordinary Wallet: a wants to transfer a bitcoin to X. A only needs his signature (using the private key) to complete the transaction. Sum Wallet: if a wants to transfer a bitcoin to x, a multi signature verification is set (at least two signatures of Abc3 indivials are required to transfer the money), then a needs B or C to complete the signature (using the private key) when a wants to transfer the money to X. I hope I can help you. Thank youledger wallet is a hardware wallet with general ease of use and high security
ledger, a manufacturer of bitcoin hardware wallet, is one of the leading companies in the field of digital currency security, which can provide reliable hardware for consumers and enterprises. Ledger is a bitcoin hardware wallet based on smart card, which provides the highest level of protection with advanced technology, as well as usability and controllability. Ledger hardware wallet is a multi-functional wallet. It is a hardware device that can store private key safely. When viewing wallet and sending transaction, hardware wallet needs to cooperate with software wallet to use. At the same time, it supports secure storage of bitcoin, Ethereum and platform token, zcash, etc. Its project is already open source on GitHub. Based on its hardware devices, you can use either the software wallet developed by ledger or the software wallet developed by other teams, that is, you can use ledger with Ethereum web wallet myetherwallet or parity wallet
2. Trezor
trezor is easy to use and safe, so it belongs to hardware wallet
trezor is a high-tech data encryption memory. The proct is proced in Czech Republic. This brand is recognized in the instry as the earliest, most cautious and most secure encrypted memory, and has been verified by global digital currency players as a reliable brand with excellent company record and rich software support. Trezor's security model is based on the principle of zero trust. The principle of zero trust is a security system that assumes that any part of it may be attacked successfully
3. Opendime
opendime is a hardware wallet with general usability and high security
opendime, a manufacturer of bitcoin hardware wallets, is one of the "leading technology" companies in the field of digital currency security. It is affiliated to coinkite, a bitcoin enterprise in Canada, which provides services for bitcoin and lightcoin wallets, as well as payment terminals. Legal currencies supported include US dollar, RMB, euro, Canadian dollar, British pound, Polish zloty, Russian ruble, Australian dollar, Japanese yen, Brazilian currency, Swedish krona, etc. Opendime is a hardware wallet, its private key is generated inside the device, and will not be known by anyone, not even you! Opendime multilingual user interface: Chinese, Japanese, English, Portuguese, French, German, French bring convenience to you
4. Kushen wallet
Kushen wallet is easy to use and safe, and belongs to mobile phone and hardware wallet
the English name of Kushen wallet is coldlar. Kushen wallet belongs to Beijing Kushen Information Technology Co., Ltd. It is a technology company focusing on providing secure storage solutions for encrypted assets. Kushen company is deeply engaged in blockchain security technology, providing various forms of personal wallet procts such as hardware wallet, mobile app wallet, cloud wallet and multi signature wallet, as well as professional enterprise wallet procts. The hardware wallet adopts the "hot and cold separation" architecture, and uses various data encryption transmission methods such as QR code, Bluetooth, NFC, etc. to make the private key never touch the network, completely eliminate the risk of private key being stolen by network hackers, and realize the safe storage of a variety of encrypted assets
5. Bitgo
bitgo is a computer wallet with average ease of use and medium security
bitgo is a high security multi signature wallet, which protects your bitcoin from being stolen and lost. You keep your wallet on your own; Bitgo cannot spend or freeze money. Multiple bitgo wallets are also easy to use and provide advanced security features such as consumption restrictions and multi-user access
6. Keepkey
keepkey is a hardware wallet with high ease of use and medium security
keepkey is a hardware wallet to protect your digital assets such as bitcoin and Ethereum from hackers and thieves. Keepkey wallet supports multi currency hardware wallet, which is currently acquired by shapeshift. Keepkey adopts a unique recovery mechanism, which makes it more secure to use. This mechanism allows users to recover in 12 words. Additional security means that users do not need to store private keys on the device. They can recover their private keys and transactions and then erase the records on the device. This is currently the safest way to store bitcoin
7. Wookong
wookong is a hardware wallet with high ease of use and high security
wookong is a professional encryption digital asset escrow solution (Patent No.: zl201710884108.5) which combines high-strength cryptography algorithm and high-level financial security hardware solution. It has higher security than multi signature wallet and cold wallet. Main customers: financial institutions, exchanges and teams with higher security requirements than ordinary hardware cold wallets and multi signature wallets
8. Coinbase
coinbase is easy to use, medium security, and belongs to mobile phone and computer wallet
coinbase wallets, coinbase wallets come from Toshi wallets, and coinbase wallets are redefining the encrypted wallets that users expect. It's not just a tool for accessing cryptocurrency, you can see it as a foothold for exploring distributed networks. With coinbase wallet, you can: manage Eth and all your ecr-20 currencies (BTC, BCH and LTC will soon be supported); Receive airdrop and ICO currency; Purchase and store cryptocurrency (non replaceable currency, but can be used in the game or traded in the market); Can carry on the currency transaction without the service charge with any person in any place; Buying and selling currency through mass exchange or agent; It can access any third-party dapps to realize the functions of borrowing or lending to earn cryptocurrency by others in the blockchain through verification, service execution or task completion
9. Imtoken
imtoken is easy to use, medium security and belongs to mobile wallet
as a professional digital asset wallet, imtoken wallet is safe and easy to use; Support multi chain and multi currency management and exchange, so that blockchain technology can be better integrated into your life. Imtoken's vision is to make economic incentives consistent, privacy inviolable and value flow freely
imtoken has recently obtained a round a investment of IDG capital of US $10 million. He bin, founder and CEO of imtoken, said that this round of financing will support the development of imtoken's overseas market and the reserve of more technical talents
10. Atoken
atoken is easy to use, medium security and belongs to mobile wallet
atoken mobile digital currency wallet is light and safe, and supports 19 Currencies & Cross Chain swap. It aims to provide more convenient, more secure and more currency multi-dimensional services for the majority of digital currency users, and to build a leader in digital asset storage app.
1. Security risk of running environment
the core file of encrypted digital currency Wallet - private key / mnemonics is stored on the terminal device, whether it is PC or mobile terminal, if the terminal device appears unsafe phenomenon, There is a very high security risk for the private key / mnemonic
at the beginning of design, a secure digital wallet can avoid the possibility of private key / mnemonics being stolen e to the running environment. The security problems of the running environment on the terminal mainly include virus software, operating system vulnerabilities and hardware vulnerabilities
2. The security risk of network transmission
the security of network transmission is more reflected in the ability to resist man in the middle attack. Man in the middle attack means that the attacker creates independent contact with both ends of the communication and exchanges the data they receive, so that both ends of the communication think that they are talking directly with each other through a private connection, but in fact the whole conversation is completely controlled by the attacker
although most digital wallet applications use the HTTPS protocol to communicate with the server, the man in the middle attack method is to get the content of the HTTPS protocol by installing a digital certificate in the user terminal
a secure digital wallet needs to be able to scan the legality of all the digital certificates in the terminal, check the proxy settings in the network transmission process, and ensure the security of the basic network communication environment
in the development of digital wallet, whether to use two-way verification for communication verification at the network transmission level is also an important criterion to measure the security of a digital wallet application
3. The security risk of file storage mode
for the private key / mnemonics of digital wallet, the storage mode of terminal device also needs to be paid attention to in the security design. The access right of private key / mnemonic file directory, the form of private key / mnemonic file storage and the design of encryption algorithm all need to be strictly designed
when we analyze the security of several mainstream digital wallets, we find that even the well-known digital wallets are random in the storage of private key / mnemonic words. There are both plaintext storage and encrypted storage, but the decryption key is fixed in the code, which can not play any role in security defense
4. The security risk of the application itself
the security risk of the application itself mainly focuses on the security defense of the application installation package itself
whether the application installation package has the ability of anti tampering is a very core technical ability. In addition, memory security, anti debugging ability, life cycle management of private key / mnemonics, security of debugging log and security of development process also need to be enhanced
5. Security risk of data backup
if the mobile application can be backed up, it can use the machine with more powerful computing performance to brutally crack the private key / mnemonics. For example, if android:allowBackup Property is set to allow backup, then the backup mechanism of the system can be used to back up the application data files, and the private key / mnemonics of the encrypted digital currency will be backed up to the external media, which breaks the security boundary design of the operating system from another direction
for the majority of users, the security of digital wallet also means the security of wealth, so we must be careful when choosing digital wallet
I have used several wallets such as coin letter socoin and coinplus
in terms of personal experience, socoin and coinplus are very simple and easy to use. They are not only decentralized multi-functional cross chain digital currency wallets with social functions, but also integrate Multi Chain multi currency wallets, payment and settlement platform, currency trading platform, social groups, information market and other functions, which can meet almost all your needs for digital currency in one stop.
Generally speaking, the user experience of light wallet is relatively good. Generally, it supports multiple chains and is easy to operate. Light wallet has been used geek wallet , which is not bad. It supports BTC, EOS, ETH, usdt and other mainstream currencies
if the amount involved is relatively large and it is stored for a long time, it uses hardware wallet, which is relatively safer than light wallet and needs to buy hardware, The operation is relatively complicated
I use my wallet, of course
this is the wallet interface