TRANSCRIPTEnglish

Cold Wallet vs. Hot Wallet: Where Is Crypto Stored?

6m 15s1,119 words156 segmentsEnglish

FULL TRANSCRIPT

0:00

where is crypto actually stored hot

0:02

wallets cold wallets exchanges what's

0:04

the difference in this video I'm going

0:06

to make it very easy for you to

0:08

understand so crypto is always stored on

0:11

the blockchain it's not stored on some

0:13

computer it's not stored in the cloud

0:15

it's not even stored on a hardware

0:17

wallet it's always on the blockchain

0:20

what is stored on those devices is the

0:23

keys that control the crypto and if you

0:26

have your crypto on an exchange they

0:28

have the key to control the crypto and

0:30

if you have your crypto on a

0:31

self-custody wallet well you have the

0:33

keys to control the crypto and I like to

0:35

compare it to a mailbox actually a

0:38

see-through mailbox that everyone can

0:41

see what's going on just like we can see

0:43

on a transparent public blockchain but

0:46

just because we could all see what's

0:48

inside of the mailbox doesn't mean we

0:49

actually have access to it if you have

0:51

your crypto on an exchange really you

0:53

have the keys on the exchange they have

0:56

access to it and if you have crypto or

0:58

really the keys on your own self-custody

1:01

wallet you have access to the crypto so

1:03

really we're just moving around keys for

1:06

example even if you have a hardware

1:07

wallet that you generated a seed phrase

1:09

with and then that Hardware while it

1:11

breaks and then you take that seed

1:13

phrase and restore it on a hot wallet

1:15

you'd think you transferred crypto from

1:17

a cold wallet to a hot wallet but really

1:20

nothing changed the crypto is in the

1:22

same spot on the blockchain what really

1:25

happened is you transferred the keys

1:27

from a more secure device to a less

1:30

secure device so why is there risk

1:32

keeping your crypto or really your keys

1:34

on an exchange well when we use and

1:36

exchange the mailbox is no longer

1:38

transparent we actually can see what's

1:41

inside we have to trust the exchange

1:44

when they tell us that the crypto is

1:46

actually there but let's say we could

1:49

see what's inside of the mailbox or we

1:51

could see that our funds were actually

1:53

there well if we went to access them we

1:56

can on our own we have to ask permission

1:58

from The Exchange because we remember

2:00

they are the ones that hold the key to

2:03

the mailbox they are the ones that hold

2:04

the key to the crypto so when we hold

2:07

our crypto on a self-custody wallet

2:10

whether it's a hot wallet or a cold

2:12

wallet we know the funds are there it is

2:14

a see-through mailbox again and if we

2:17

want to access those funds we can do so

2:19

at any time so what's the difference

2:21

between a hot wallet and a cold wallet

2:23

the main difference is the way we secure

2:26

those keys with a hot wallet you've

2:28

probably heard that it is less secure

2:31

the reason is because when we generate

2:33

keys for a hot wallet it is displayed on

2:36

a device connected to the internet so if

2:39

your computer is compromised the hacker

2:41

will already have access to your seed

2:43

phrase but for the most part that's not

2:45

the case usually when we create hot

2:48

wallets or devices whether it's a

2:50

computer or the phone it's usually fine

2:52

but then moving forward the seed phrase

2:55

for our hot wallets is actually stored

2:58

in the wallets browser so if in the

3:00

future your computer becomes compromised

3:03

or you download malware on your phone or

3:06

computer a remote hacker may have access

3:09

to your crypto and also if someone is

3:12

able to gain remote access to your

3:14

computer or your computer is compromised

3:16

transactions can be made on your phone

3:19

or your computer and the transaction

3:21

will be signed on the app basically with

3:24

a hot wallet your seed phrase is exposed

3:27

to the internet and hot wallets are good

3:30

I'm not hating on them I use them myself

3:31

and actually a lot of people in the

3:34

space use hot wallets they are seamless

3:36

they are very convenient but usually

3:38

when people use hot wallets it is

3:41

recommended to not keep all of their

3:44

funds on a hot wallet as you can see it

3:47

is exposed to the internet making your

3:49

crypto vulnerable or actually to be

3:51

correct making the keys to your crypto

3:54

more vulnerable now when it comes to a

3:56

cold wallet why is it more secure well

3:58

with a cold while we generate the seed

4:01

phrase offline on a device that is not

4:04

directly connected to the internet right

4:05

off the bat this makes our seed phrase

4:08

more secure and then moving forward the

4:10

seed phrase is not stored on the

4:12

wallet's browser the seed phrase is

4:15

offline so even if a hacker gains remote

4:18

access to our phone or our computer they

4:21

won't be able to access our seed phrase

4:23

and if our device is fully compromised

4:27

and a hacker gets right into our

4:28

computer and starts making transactions

4:31

well they won't be able to because the

4:33

final transaction must be signed on the

4:36

physical device so if you have a remote

4:39

hacker gain access to your hot wallet

4:42

they can potentially make transactions

4:44

just through the internet but if they

4:47

gain access to your computer but your

4:49

funds are in a hardware wallet they

4:51

would need the physical device itself to

4:54

sign a transaction this is why Hardware

4:56

wallets are more secure than hot wallets

4:59

and when using using Hardware wallets

5:01

you may notice you connect them to apps

5:03

such as metamask when doing so this does

5:06

not make your Hardware wallet become a

5:09

hot wallet the seed phrase is still

5:11

secure on the hardware wallet we are

5:13

only using an app such as metamask as an

5:16

interface so let's say we connect our

5:18

ledger to metamask and our computer

5:20

becomes compromised there is no seed

5:23

phrase for a ledger that is stored on

5:26

that metamask also if someone gains

5:28

Direct Control of our computer and

5:30

starts making transactions on the

5:32

interface for metamask well they'll have

5:34

to sign the final transaction on the

5:37

hardware wall itself which they don't

5:39

have so whenever you see a hardware

5:41

wallet being used with a hot wallet

5:44

really the hot wallet is just being used

5:46

as an interface crypto is always stored

5:49

on the blockchain the only difference is

5:51

where we store the keys and as we know

5:54

Hardware wallets are the most secure way

5:56

to do so and my favorite Hardware wallet

5:59

is ledger now I know there's a ledger

6:00

Nano S Plus and The Ledger Nano X and I

6:03

made a comparison video right here to

6:05

help you choose which one is right for

6:08

you

6:08

[Music]

UNLOCK MORE

Sign up free to access premium features

INTERACTIVE VIEWER

Watch the video with synced subtitles, adjustable overlay, and full playback control.

SIGN UP FREE TO UNLOCK

AI SUMMARY

Get an instant AI-generated summary of the video content, key points, and takeaways.

SIGN UP FREE TO UNLOCK

TRANSLATE

Translate the transcript to 100+ languages with one click. Download in any format.

SIGN UP FREE TO UNLOCK

MIND MAP

Visualize the transcript as an interactive mind map. Understand structure at a glance.

SIGN UP FREE TO UNLOCK

CHAT WITH TRANSCRIPT

Ask questions about the video content. Get answers powered by AI directly from the transcript.

SIGN UP FREE TO UNLOCK

GET MORE FROM YOUR TRANSCRIPTS

Sign up for free and unlock interactive viewer, AI summaries, translations, mind maps, and more. No credit card required.