FAQ
This FAQ addresses common questions about crypto wallets and security.
It is designed to clarify how control, responsibility, and risk actually work in crypto systems.
The answers are intentionally concise.
When relevant CryptKi Academy articles exist, you’ll find them linked at the end of the answer.
Choosing a wallet
Questions that come up when selecting a wallet: trade-offs, assumptions, and what “best” actually means.
There is no single “best” hardware wallet for everyone.
Wallets differ in how they structure responsibility, not in how “secure” they sound.
The right choice depends on your needs, the cryptocurrencies you use, your level of experience, and how you plan to secure and manage your assets.
What matters most is that the wallet is genuine, properly set up, and used correctly.
The best wallet depends on how you use crypto.
Choosing a wallet is less about features than about how often and in what context you interact with the system.
Software wallets are convenient for small amounts and daily use, while hardware wallets provide a higher level of security for long-term storage and larger amounts.
Understanding the risks and trade-offs is more important than choosing a specific brand.
Read more: Which crypto wallet should you choose?
A hardware wallet is a physical device designed to store private keys offline.
Its purpose is not to prevent mistakes, but to reduce exposure at the moment keys are used.
It allows you to sign transactions securely without exposing your keys to the internet, reducing the risk of theft from malware or phishing attacks.
Read more: Hardware wallets: how they work
Different hardware wallets offer different features, security models, and user experiences.
There is no universal winner.
Comparisons often focus on brands, while the real differences lie in security models and assumptions.
The most important factors are transparency, security design, proper usage, and whether the wallet fits your specific needs.
The decision depends on your risk tolerance and how you use crypto.
Even small amounts can justify better security if they matter to you.
Risk is contextual, not proportional to price alone.
Read more: Which crypto wallet should you choose?
Keys & recovery
Questions about what actually controls access: keys, seed phrases, backups, and recovery paths.
A public address is used to receive funds and can be shared safely.
A private key is a secret that allows you to spend those funds.
Anyone with access to the private key has full control over the associated assets.
The blockchain cannot distinguish legitimate use from misuse.
Read more: Keys, addresses, and seed phrases (basics)
A recovery phrase is a list of words that represents the root of your wallet’s private keys.
It allows you to restore access to your funds if your wallet is lost, damaged, or replaced.
It is not a backup of funds, but a way to recreate authority.
Read more: Keys, addresses, and seed phrases (basics)
A recovery phrase represents full control over your assets.
It should be stored offline, never shared, and never entered into websites or applications.
It should be protected from loss, theft, fire, and water, and ideally stored in a way that prevents a single point of failure.
Read more: Storing your recovery phrase securely: methods, redundancy, and threat model
A passphrase is an optional additional secret that creates a separate wallet from the same recovery phrase.
It can add an extra layer of protection, but losing it permanently means losing access to the funds.
The system does not provide recovery for forgotten secrets.
Read more: Backup and recovery: restore safely (scenarios and traps)
If you still have your recovery phrase, you can restore your wallet on another compatible device.
The physical device itself does not store your funds.
Access depends entirely on your ability to recreate keys.
Read more: Backup and recovery: restore safely (scenarios and traps)
A broken device is not a problem if you have your recovery phrase.
You can restore your wallet on a new device and regain access to your funds.
The blockchain does not know which device you use.
Read more: Backup and recovery: restore safely (scenarios and traps)
Using the same recovery phrase on multiple devices increases the attack surface.
For maximum security, it is recommended to limit the number of devices that have access to your keys.
Each additional copy increases exposure, not convenience.
Read more: Using multiple devices or wallets: risks and considerations
Threats & scams
Common ways people lose funds: phishing, malware, compromised devices, and avoidable assumptions.
Securing crypto assets starts with controlling your private keys.
Security is not a setting; it is an ongoing set of practices and decisions.
This includes using non-custodial wallets, protecting your recovery phrase, keeping your software up to date, and staying vigilant against phishing and scams.
Read more: Why securing cryptocurrencies is essential
Never share your recovery phrase, verify websites and applications carefully, and be cautious of unsolicited messages or urgent requests.
Most crypto thefts target users, not the technology itself.
They exploit assumptions and habits rather than technical flaws.
Read more: Phishing: how to recognize and avoid it
You should assume the phrase is compromised.
Immediately create a new wallet with a new recovery phrase and transfer your funds as soon as possible.
Once exposed, authority cannot be partially revoked.
Read more: Emergency: what to do if you entered your seed phrase online
Wallets themselves are rarely hacked directly.
Most compromises happen through phishing, malware, or user mistakes that expose private keys or recovery phrases.
The system treats all valid signatures the same, regardless of how they were produced.
Read more: Malware, keyloggers and clipboard hijacking
Common mistakes include storing recovery phrases digitally, falling for phishing, reusing compromised wallets, and trusting unverified software or links.
Most losses result from reasonable assumptions applied in the wrong context.
Read more: Common mistakes when choosing wallets
Using crypto safely
Practical questions about custody, transactions, daily usage, and how to structure access over time.
Using a hardware wallet involves setting it up securely, backing up the recovery phrase, and signing transactions through the device.
The device never exposes your private keys.
The device enforces isolation, but it does not judge what you approve.
This phrase means that if you do not control the private keys, you do not truly control the crypto assets.
When funds are held by an exchange or third party, access can be restricted or lost.
The system only recognises cryptographic control, not promises or account access.
Read more: What is a crypto wallet? (custodial vs non-custodial)
A custodial wallet is managed by a third party that controls the private keys on your behalf.
A non-custodial wallet gives you full control over your keys and your funds, along with full responsibility for security.
Non-custodial wallets remove intermediaries, but they also remove fallback mechanisms.
Read more: What is a crypto wallet? (custodial vs non-custodial)
Leaving crypto on an exchange exposes you to risks such as hacks, account freezes, and platform failures.
Exchanges are useful for trading, but long-term storage is generally safer in a wallet you control.
Convenience often comes from delegating control, not removing risk.
Read more: Centralized exchange risks (custody and exposure)
Most cryptocurrencies are not anonymous but pseudonymous.
Transactions are publicly visible and can often be linked to real-world identities through various methods.
Some specialised digital currencies use advanced features to obscure transaction details and user identities.
These trade-offs often come with different assumptions and constraints.
Read more: Risks in the crypto ecosystem (overview)
A crypto wallet can be used to send and receive funds, interact with decentralised applications, store digital assets, and sign transactions securely.
In all cases, the wallet authorises actions; it does not execute them.
Read more: What can you do with a wallet? (payments, DeFi, NFTs, staking)
No.
Once confirmed on the blockchain, transactions are irreversible.
The system does not evaluate intent or correct mistakes.
Read more: Crypto transactions: how they work, confirmations, and irreversibility
Hardware wallets should always be purchased new and handled securely.
Using a device that may have been tampered with significantly increases the risk of compromise.
Trust assumptions start before the first transaction.
Read more: Common mistakes when choosing wallets
As long as you control your recovery phrase, your funds remain accessible.
Wallets are tools to access the blockchain, not custodians of your assets.
Protocols outlive services, but only if access is preserved.
Read more: If a service disappears: what happens to your assets?
Yes, but it requires careful planning.
Improper handling of recovery phrases or keys can result in permanent loss.
Continuity requires structure, not secrecy.
Read more: Inheritance and estate planning: passing access safely
Sharing a wallet means sharing full control over the funds.
This increases the risk of mistakes and loss and is generally not recommended.
Shared control without structure removes accountability.
Read more: Sharing access: family, teams, and safer alternatives
The main risks when travelling are physical loss or theft. The security of your funds still depends on how well your recovery phrase is protected.
In most countries, hardware wallets are legal and treated like ordinary electronic devices.
However, some jurisdictions apply stricter rules to encrypted devices, especially during border controls. In these cases, the issue is usually legal or regulatory, not technical.
Before traveling, it is important to check local laws and border regulations to understand what is allowed and what is not.
Crypto security evolves constantly.
Staying informed, questioning assumptions, and regularly reviewing best practices are essential to protecting your assets.
Understanding evolves faster than rules.
Read more: How to keep learning and adapting in crypto?