Cold Wallet
What is Cold Wallet?
Cold WalletA crypto wallet whose private keys are generated and stored on a device that is kept offline, so they are not exposed to remote network attackers.
A cold wallet keeps signing keys away from internet-connected systems. Common implementations are hardware wallets (Ledger, Trezor, GridPlus Lattice), air-gapped computers, paper wallets, or institutional cold storage backed by hardware security modules (HSMs). Transactions are constructed online, transferred to the cold device through USB, QR code, microSD or PSBT, signed offline, then broadcast. This drastically reduces exposure to malware, infostealers, malicious browser extensions, and remote attackers, though it does not protect against physical theft, supply-chain tampering, or social-engineering attacks that trick the owner into signing a malicious transaction. Cold storage is the recommended posture for long-term holdings and exchange reserves.
● Examples
- 01
A Ledger Nano S Plus storing the keys for a long-term BTC and ETH position.
- 02
An exchange keeping the majority of customer funds in HSM-backed multi-signature cold storage.
● Frequently asked questions
What is Cold Wallet?
A crypto wallet whose private keys are generated and stored on a device that is kept offline, so they are not exposed to remote network attackers. It belongs to the Web3 & Blockchain category of cybersecurity.
What does Cold Wallet mean?
A crypto wallet whose private keys are generated and stored on a device that is kept offline, so they are not exposed to remote network attackers.
How does Cold Wallet work?
A cold wallet keeps signing keys away from internet-connected systems. Common implementations are hardware wallets (Ledger, Trezor, GridPlus Lattice), air-gapped computers, paper wallets, or institutional cold storage backed by hardware security modules (HSMs). Transactions are constructed online, transferred to the cold device through USB, QR code, microSD or PSBT, signed offline, then broadcast. This drastically reduces exposure to malware, infostealers, malicious browser extensions, and remote attackers, though it does not protect against physical theft, supply-chain tampering, or social-engineering attacks that trick the owner into signing a malicious transaction. Cold storage is the recommended posture for long-term holdings and exchange reserves.
How do you defend against Cold Wallet?
Defences for Cold Wallet typically combine technical controls and operational practices, as detailed in the full definition above.
What are other names for Cold Wallet?
Common alternative names include: Cold storage, Offline wallet.
● Related terms
- web3№ 491
Hot Wallet
A crypto wallet whose private keys reside on an internet-connected device, trading lower security for low-friction signing of frequent transactions.
- web3№ 1003
Seed Phrase
A human-readable list of 12 or 24 words (typically a BIP-39 mnemonic) that encodes the master secret from which all keys of a crypto wallet are derived.
- web3№ 1221
Wallet Drainer
Malicious software or a phishing kit that tricks crypto-wallet users into signing transactions or approvals that hand over all valuable tokens and NFTs.
- web3№ 106
Blockchain Security
The discipline of protecting distributed ledgers, their consensus mechanisms, smart contracts, and surrounding infrastructure from compromise, fraud, and theft.
- identity-access№ 233
Credential Vault
A centralized, audited service that securely stores, rotates, and brokers access to secrets such as passwords, API keys, certificates, and SSH keys.
- cryptography№ 589
Key Rotation
The periodic replacement of cryptographic keys with new ones to limit the volume of data protected by any single key and contain the impact of compromise.