{"id":37522,"date":"2022-05-09T14:26:00","date_gmt":"2022-05-09T11:26:00","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=37522"},"modified":"2025-08-29T18:01:13","modified_gmt":"2025-08-29T15:01:13","slug":"what-are-custodial-and-non-custodial-crypto-wallets","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/what-are-custodial-and-non-custodial-crypto-wallets\/","title":{"rendered":"What are custodial and non-custodial crypto wallets?"},"content":{"rendered":"<div class=\"wp-block-text-wrappers-cards single_card\">\n<h2 class=\"card_label\">What is a cryptocurrency wallet?<\/h2>\n<p>A cryptocurrency wallet is a tool for interacting with cryptocurrencies on a blockchain. It lets you create and manage addresses for storing and transferring digital assets. In essence, it is an app with an interface and various functions for managing an address and the cryptoassets held there.<\/p>\n<\/div>\n<div class=\"wp-block-text-wrappers-cards single_card\">\n<h2 class=\"card_label\">What are public and private keys in a crypto wallet?<\/h2>\n<p>When an address is created, the wallet generates keys\u2014cryptographic identifiers, a kind of \u201cidentity card\u201d that gives you access to the funds at your account (the address on the blockchain).<\/p>\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\">\n<div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"\u041a\u0440\u0438\u043f\u0442\u043e\u043a\u043e\u0448\u0435\u043b\u0451\u043a \u2014 \u0447\u0442\u043e \u044d\u0442\u043e \u0438 \u043a\u0430\u043a \u0435\u0433\u043e \u0432\u044b\u0431\u0440\u0430\u0442\u044c? \/ Fork The System \u0441 \u041f\u043e\u043d\u0438\u043c\u0430\u044e\u0449\u0438\u043c\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/vgRCiEr8Y2o?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div>\n<\/figure>\n<p>Each address usually has a pair of keys\u2014public and private. They are linked to each other and tied to a specific address.<\/p>\n<p>An address on the blockchain is a \u201ccompressed\u201d version of the public key, which any other user can see. The private key is used to create digital signatures and verify transactions. It is known only to the address owner, as it grants access to their funds.<\/p>\n<p>Keys are not needed to sign in to the crypto vault; that is handled by the login and password you set at registration.<\/p>\n<\/div>\n<div class=\"wp-block-text-wrappers-cards single_card\">\n<h2 class=\"card_label\">What is a seed phrase for?<\/h2>\n<p>Today most wallets support another level of user authentication\u2014a seed phrase. This is a unique sequence of 12 or 24 English words that serves as a password to restore access to an address or move it to another wallet.<\/p>\n<p>A seed phrase, like a private key, is for the address owner only and must not be shared. If the seed phrase is lost or stolen, you may lose access to your funds.<\/p>\n<\/div>\n<div class=\"wp-block-text-wrappers-cards single_card\">\n<h2 class=\"card_label\">Can you get by with a single crypto wallet?<\/h2>\n<p>A user can have any number of addresses and wallets.<strong> <\/strong>Typically, people use a personal wallet as well as built-in crypto wallets in various apps, such as on cryptocurrency exchanges.<\/p>\n<\/div>\n<div class=\"wp-block-text-wrappers-cards single_card\">\n<h2 class=\"card_label\">What is a custodial crypto wallet and when is it needed?<\/h2>\n<p>A custodial wallet is an application for storing and transferring cryptocurrencies whose operator (the custodian) manages users\u2019 addresses or has access to their private keys. In addition, clients of a custodian must pass identity verification (KYC).<\/p>\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/cakewallet-min-1024x819.png\" alt=\"What are custodial and non-custodial crypto wallets?\" class=\"wp-image-157535\" width=\"768\" height=\"614\" srcset=\"https:\/\/forklog.com\/wp-content\/uploads\/cakewallet-min-1024x819.png 1024w, https:\/\/forklog.com\/wp-content\/uploads\/cakewallet-min-300x240.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/cakewallet-min-768x614.png 768w, https:\/\/forklog.com\/wp-content\/uploads\/cakewallet-min.png 1200w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/><\/figure>\n<p>Centralised crypto exchanges have built-in custodial wallets. Although each client has a separate account and balance, all funds are held on a small number of addresses managed by the exchange. This simplifies work with trading tools and allows users to avoid paying for transfers within the platform.<\/p>\n<p>Individual clients rarely encounter custodial wallets outside specialised apps. Such solutions are often used by institutional investors\u2014companies that handle large sums. They hand cryptocurrencies to a professional company for safekeeping with enhanced security and other services, such as insurance. Well-known custodians include Xapo, BitGo, Gemini and Coinbase Custody.<\/p>\n<\/div>\n<div class=\"wp-block-text-wrappers-cards single_card\">\n<h2 class=\"card_label\">What are the drawbacks of custodial crypto wallets?<\/h2>\n<p>The main drawback of custodial crypto wallets is the custodian\u2019s potential access to clients\u2019 cryptoassets.<\/p>\n<p>Exchange administrators hold the private and public keys to the addresses that store clients\u2019 cryptocurrencies. Centralised storage of large amounts makes trading platforms frequent targets for hackers. As a result of breaches, some users may lose their cryptocurrencies.<\/p>\n<p>Moreover, a crypto exchange is a legal entity that must comply with legislation and law-enforcement requests. On request it can both provide client data and freeze funds in a wallet\u2014for example, in the case of sanctions or court-ordered asset seizures.<\/p>\n<p>A further inconvenience can be temporary loss of access to your assets during maintenance, since a custodian can disable user access if necessary.<\/p>\n<\/div>\n<div class=\"wp-block-text-wrappers-cards single_card\">\n<h2 class=\"card_label\">What is a non-custodial crypto wallet?<\/h2>\n<p>A non-custodial crypto wallet leaves full control with the address creator, since no one else is given the private keys. Such an app cannot freeze or manage users\u2019 funds, but it also does not bear responsibility for their safekeeping. <\/p>\n<p>Usually it is an application you can install on a PC, mobile device or in a browser. To create a blockchain address through a non-custodial app, you do not need to pass KYC.<\/p>\n<p>Popular non-custodial wallets gain extra credibility from publishing their source code. This lets independent experts verify that the app is indeed secure. Such projects are also often supported by a community of developers.<\/p>\n<\/div>\n<div class=\"wp-block-text-wrappers-cards single_card\">\n<h2 class=\"card_label\">Which is better to use\u2014custodial or non-custodial?<\/h2>\n<p>Funds used for trading or investment (including staking) can be kept in a custodial wallet of a third-party app (for example, on an exchange). However, you should harden account security, notably by enabling two-factor authentication.<\/p>\n<p>Idle digital assets are best held in your own non-custodial wallet, to which only you have private-key-level access.<\/p>\n<\/div>\n<div class=\"wp-block-text-wrappers-cards single_card\">\n<h2 class=\"card_label\">What are \u201chot\u201d and \u201ccold\u201d wallets?<\/h2>\n<p>All wallets fall into two types: \u201chot\u201d, which exist only as software, and \u201ccold\u201d, which rely on a physical device.<\/p>\n<p>A beginner will do fine with a hot, or software, wallet. They can be used on almost any platform and device.<\/p>\n<p>One of the most popular hot wallets for Ethereum and EVM-compatible networks is MetaMask. ETH and ERC-20 tokens can also be stored in MyEtherWallet. For Bitcoin, a time-tested vault often used is Electrum.<\/p>\n<p>There are also multi-currency wallets that support many blockchains at once, such as Exodus, Blockchain.com or Trust Wallet.<\/p>\n<p>\u201cCold\u201d, or hardware, wallets are devices about the size of a flash-memory card in which cryptoassets are stored offline. This offers maximum protection against hacks. To make transfers, a cold wallet needs to be synced with the blockchain via a computer connected to the internet.<\/p>\n<\/div>\n<div class=\"wp-block-text-wrappers-cards single_card\">\n<h2 class=\"card_label\">How have non-custodial wallets affected the crypto industry?<\/h2>\n<p>This category of wallets gives users quick access to protocols of <a href=\"https:\/\/forklog.com\/en\/news\/what-is-decentralised-finance-defi\">decentralised finance<\/a> (DeFi), Web 3.0, as well as markets for <a href=\"https:\/\/forklog.com\/en\/news\/what-are-nfts\">non-fungible tokens<\/a> (NFT). For example, the <a href=\"https:\/\/forklog.com\/en\/news\/what-is-uniswap-uni\">Uniswap<\/a> trading protocol does not require registration or KYC and AML. Instead, a user connects to it through a browser wallet that supports the Ethereum network.<\/p>\n<\/div>\n<div class=\"wp-block-text-wrappers-cards single_card\">\n<h2 class=\"card_label\">Are non-custodial crypto wallets safe?<\/h2>\n<p>Popular non-custodial crypto wallets are reliable, but they still have drawbacks.<\/p>\n<p>If the private key and its recovery phrase are lost, the funds will also be irretrievably lost. Be especially careful with a \u201cbrainwallet\u201d, that is, storing data in your memory or on paper.<\/p>\n<p>From a security standpoint, hardware crypto wallets (Ledger, Trezor or KeepKey) are the best option, although they are not as easy to use and may have vulnerabilities in the code or be lost. They can also be stolen. \u201cCold\u201d wallets are recommended for storing large amounts of cryptocurrency.<\/p>\n<\/div>\n<div class=\"wp-block-text-wrappers-cards single_card\">\n<h2 class=\"card_label\">How to set up a non-custodial wallet?<\/h2>\n<p>Registering and<strong> <\/strong>configuring a crypto wallet takes a couple of minutes. Download the app to your mobile device or add it as a browser extension (for example, for <a href=\"https:\/\/chrome.google.com\/webstore\/category\/extensions\" target=\"_blank\" rel=\"noreferrer noopener\">Google Chrome<\/a>). Then set a password and a name. The app will generate a seed phrase, which you should store in a safe place. After that, with rare exceptions, you can start using the wallet.<\/p>\n<\/div>\n<div class=\"wp-block-text-wrappers-cards single_card\">\n<h2 class=\"card_label\">How to secure your crypto wallet?<\/h2>\n<ul class=\"wp-block-list\">\n<li>Make sure the secret recovery phrase (seed phrase) for your wallet is kept somewhere safe. Do not share it with anyone; write it down on paper or engrave it on a metal plate.<\/li>\n<li>Do not make a digital copy of confidential data such as the seed phrase or wallet password. It is unsafe to take a screenshot, email a copy of the secret phrase, or store it in an app on an internet-connected mobile device. Malware can steal such information.<\/li>\n<li>Beware of phishing. This is a type of fraud where <a href=\"https:\/\/forklog.com\/en\/news\/what-is-a-scam\">scammers <\/a>obtain a login and password by imitating the website of a popular crypto service. Phishing links look very similar to the real app\u2019s URL but differ by one or two characters. Carefully double-check site addresses (better yet, bookmark them) whenever you enter credentials to access your funds.<\/li>\n<li>Be vigilant with emails. If you are asked for confidential wallet information, urged to visit unknown websites or send assets, do not click the link.<\/li>\n<li>Do not keep all your cryptocurrency in a single wallet. Decide in advance what you need assets for and separate your holdings. Those needed for quick operations can stay in a custodial wallet; those you plan to store are better kept in a non-custodial one.<\/li>\n<\/ul>\n<p>If you decide to leave assets in an exchange\u2019s custodial wallet, set up account security: enable two-factor authentication and complete verification via your phone number or email.<\/p>\n<\/div>\n<div class=\"wp-block-text-wrappers-cards single_card\">\n<h2 class=\"card_label\">What else to read?<\/h2>\n<p>What formats do Bitcoin addresses use?<\/p>\n<p>What are second-layer scaling solutions?<\/p>\n<p>What are ERC-20 tokens?<\/p>\n<p><a href=\"https:\/\/forklog.com\/en\/news\/what-is-binance\">What is Binance?<\/a><\/p>\n<p><a href=\"https:\/\/forklog.com\/en\/news\/what-is-a-smart-contract\">What is a smart contract?<\/a><\/p>\n<p><a href=\"https:\/\/forklog.com\/en\/news\/what-is-metamask\">What is MetaMask?<\/a><\/p>\n<p><a href=\"https:\/\/forklog.com\/en\/news\/what-are-cross-chain-bridges\">What are cross-chain bridges?<\/a><\/p>\n<p>What are sidechains?<\/p>\n<p><a href=\"https:\/\/forklog.com\/en\/news\/what-are-nfts\">What is an NFT?<\/a><\/p>\n<p>What is the Lightning Network?<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Crypto wallets fall into custodial and non-custodial varieties. We explain how they differ, what the private key does, and when custodial vaults are typically used.<\/p>\n","protected":false},"author":1,"featured_media":37523,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"1","_short_excerpt_text":"","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[2113],"tags":[2115,1111,57],"class_list":["post-37522","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cryptorium","tag-101-technical-foundations","tag-cybersecurity","tag-wallets"],"aioseo_notices":[],"amp_enabled":true,"views":"111","promo_type":"1","layout_type":"1","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/37522","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=37522"}],"version-history":[{"count":1,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/37522\/revisions"}],"predecessor-version":[{"id":37524,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/37522\/revisions\/37524"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/37523"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=37522"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=37522"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=37522"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}