Blockchain enthusiasts understand that the categorization of blockchain wallets stems from differences in private key management methods.
Types of Wallets
- Centralized Wallets: Private keys are managed by centralized servers, e.g., exchange wallets like Binance, OKX, and Bybit.
- Decentralized Wallets (HD Wallets): Private keys are managed on user devices, e.g., Trust Wallet, MetaMask.
- Hardware Wallets: Private keys are stored offline on dedicated devices, e.g., Ledger, OneKey.
- Exchange Web3 Wallets: Hybrid solutions integrating centralized, decentralized, and hardware wallet features.
- Custodial Wallets: Utilize MPC (Multi-Party Computation) algorithms, where no single node holds the complete private key.
- Multi-Signature Wallets: Require multiple signatures for transactions, e.g., Gnosis Safe on EVM chains.
- Social Recovery Wallets: Leverage guardian networks or secret sharing for key recovery.
- EVM AA Wallets: Follow ERC-4337 for account abstraction, enabling gasless transactions.
Centralized Wallets
Architecture Overview
Centralized wallets, commonly used by exchanges, store private keys on servers. Security measures vary:
- Basic Encryption: DES-encrypted keys stored in databases/files.
- KMS/TEE: Enhanced security but still vulnerable to insider threats.
- CloudHSM/Signing Devices: Most secure; keys never leave the device.
Key Workflows:
- Batch address generation
- Deposits/withdrawals
- Fund consolidation
- Hot-to-cold transfers
- Risk control systems
Operational Details
- Address Pooling: Pre-generates addresses for user allocation.
- Deposits: Scanned transactions trigger fund crediting after risk checks.
- Withdrawals: User requests undergo risk validation before blockchain submission.
- Risk Control: Critical for preventing internal/external fraud.
Decentralized Wallets (HD Wallets)
Architecture Overview
Private keys reside on user devices, encrypted locally. Core features:
- Receive/transfer funds
- Transaction history
- Token swaps (via aggregators like 1inch)
- DApp browser (WebView/WebSocket integration)
Key Processes
- Address Derivation: BIP-39/44 standards generate hierarchical keys.
- Transaction Signing: User decrypts keys to sign via interfaces like MetaMask.
Hardware Wallets
Architecture Overview
Offline devices manage keys securely. Core workflows:
- Address Generation: BIP-compliant key derivation.
- Offline Signing: Signs hashes internally; transmits only signed payloads.
Security Highlights
- Air-gapped key storage.
- Bluetooth/NFC for secure communication.
MPC Custodial Wallets
Architecture Overview
Distributes key shares across nodes (N-of-M signing). No single point of failure.
Workflow
- Keygen: Nodes collaboratively generate public keys.
- Signing: Nodes sign transactions without full key exposure.
Multi-Signature & Social Recovery Wallets
- Gnosis Safe: M-of-N signing via smart contracts.
- Social Recovery: Guardians or secret shares restore access.
EVM AA Wallets (ERC-4337)
Smart contract wallets enabling:
- Gas sponsorship
- Enhanced security (e.g., session keys).
Conclusion
Master centralized, HD, hardware, and MPC wallets for practical use. Advanced topics like AA wallets are niche but insightful for developers.
FAQ
Q: Which wallet type is most secure for large holdings?
A: Hardware wallets offer optimal security for offline key storage.
Q: How do MPC wallets prevent single-point breaches?
A: Keys are split into shares; no node ever holds the complete key.
Q: Can social recovery wallets replace backups?
A: Partially, but guardian reliability is crucial for recovery.
๐ Discover advanced wallet security solutions
๐ Explore Web3 wallet development tools