Wallets

Cryptocurrency wallets do not store crypto tokens directly. Instead, the tokens are maintained on the blockchain network. These wallets are designed to keep private and public keys, along with the necessary passwords for accessing these digital assets. Crypto wallets can manifest in various forms, such as a device, a program, a piece of software, or an application.

Articles (132)

Latest
Particle Network V2: The first intent-centered Web3 modular access layer, a breakthrough in privacy and efficiency optimisation
Intermediate

Particle Network V2: The first intent-centered Web3 modular access layer, a breakthrough in privacy and efficiency optimisation

Particle Network V2 is the first user intent-centered Web3 modular access layer, providing a breakthrough in privacy protection and efficiency optimisation. The system introduces two new explorations: private login and private transaction, allowing users to hide addresses and transactions without compromising the login experience. In addition, through the Intent Fusion Protocol, Particle Network V2 can automatically understand, dissect and execute user intentions, thus abstracting the interaction process so that users can focus on their goals rather than tedious technical details. The innovative design of this system is expected to promote the transformation of Web3 from an engineer-friendly financial industry to a user-friendly consumer industry, bringing unprecedented possibilities to the development of Web3.
30.51
Why is it said that full-chain account abstraction is the final piece of the puzzle for EIP-4337?
Beginner

Why is it said that full-chain account abstraction is the final piece of the puzzle for EIP-4337?

This article discusses the importance of full-chain account abstraction in EIP-4337 and proposes some optimization directions. Firstly, Biconomy provides a more detailed standard for EIP-4337 and allows third-party developers to implement modules with similar features but different details. Secondly, it references the concept of EIP-6900 to optimize smart accounts in more detail, addressing the fragmentation issue within the ecosystem. Additionally, the article mentions Particle Network's modular Smart Wallet-as-a-Service (Modular Smart Wallet-as-as-Service) product, which will provide developers with a more flexible and convenient way to build multi-chain applications and promote the widespread adoption of account abstraction.
16.19
Best Crypto Wallets 2024
Intermediate

Best Crypto Wallets 2024

This article takes a close look at the best crypto wallets in 2024, what makes a good wallet, the pros and cons of different wallet types, how to find the right wallet for your crypto investments, and how to keep track of your portfolio when using multiple wallets.
44.21
How to Launch Cross-Chain DApps: A Guide to Interoperability
Advanced

How to Launch Cross-Chain DApps: A Guide to Interoperability

This guide explores the selection of blockchain development tools that will help push the development of cross-chain applications closer to widespread adoption. Blockchain interoperability opens up new possibilities for cross-chain transactions, decentralized applications, and efficient value exchange, similar to how a unified browser enables easy navigation across different domains of the internet. As web3 continues to evolve and converge, we look forward to witnessing a seamless connection and interaction between blockchains and their associated technologies.
20.20
Which Cryptocurrency Wallet to Use in 2024?
Beginner

Which Cryptocurrency Wallet to Use in 2024?

In 2024, with the expansion of Web3 application scenarios, there is a growing demand in the market for diversified transactions. Emerging wallets like Rabby, Backpack, Privy, Particle, and JoyID are worth noting as they provide more user-friendly transaction methods and security engine screening functions. Privy and Particle Network are wallet-as-a-service platforms, offering multiple authentication methods and a range of features and tools to help developers build complex applications. JoyIDWallet enhances wallet security through built-in security chips, bypassing Apple/Google restrictions. ChainFeeds is a reader-supported selection tool.
55.03
 AScoin Wallet: Revolutionizing the Crypto Space with Unique Features and Enhanced Security
Beginner

AScoin Wallet: Revolutionizing the Crypto Space with Unique Features and Enhanced Security

This article introduces how the Web3 aggregation transaction multi-chain wallet AScoin Wallet breaks through the barriers for on-chain wallets to enter exchanges.
11.26
In-Depth Analysis of the Telegram Bot Track (Part 1): How Do On-Chain Brokers Drive Mass Adoption of Web3?
Intermediate

In-Depth Analysis of the Telegram Bot Track (Part 1): How Do On-Chain Brokers Drive Mass Adoption of Web3?

This article aims to sort out the current macro situation of Telegram trading bots and highlight some noteworthy projects.
52.49
Winning the wallet war: 3 essential frameworks for builders and investors
Intermediate

Winning the wallet war: 3 essential frameworks for builders and investors

This article presents three frameworks to understand the business and strategic positioning of Web3 wallets, providing builders and investors with a clearer understanding of the wallet ecosystem.
51.21
What is IDEX? All You Need to Know About IDEX
Intermediate

What is IDEX? All You Need to Know About IDEX

IDEX is a decentralized exchange built on Ethereum that combines the best features of centralized exchanges with that of DEXs through order books and AMMs.
06.48
Wallet Infrastructure: Empowering the Next Generation of Dapps
Intermediate

Wallet Infrastructure: Empowering the Next Generation of Dapps

This article introduces account abstraction and its benefits, wallet infrastructure, and an overview of the AA stack. It also covers emerging dapp developments, wallet development patterns and their impacts, ongoing challen
48.37
Integration of Biometric Authentication in Crypto Wallets
Intermediate

Integration of Biometric Authentication in Crypto Wallets

This article digs into the usage of biometric authentication in cryptocurrency wallets, examining how this technology improves security and reshapes the user experience in the digital asset ecosystem. In the following parts, we will look at the fundamentals of biometric authentication, its benefits, and future cryptocurrency security consequences.
19.19
Ani
Intermediate

Ani

This article analyzes and compares various hardware wallets.
24.34
What are Multi-Party Computation (MPC) Wallets?
Intermediate

What are Multi-Party Computation (MPC) Wallets?

Explore the role of MPC wallets in cryptocurrency security, offering advanced protection with decentralized key management and privacy in digital asset transactions.
57.52
BlockSec: Exploring the Security Risks of the Hook Mechanism in Uniswap V4
Advanced

BlockSec: Exploring the Security Risks of the Hook Mechanism in Uniswap V4

This article comprehensively discusses the security issues related to the Hook mechanism in Uniswap V4.
36.33
Kernel Ventures: Decrypting the Changes Brought By ERC4337 in Ethereum, What Opportunities Can We See?
Intermediate

Kernel Ventures: Decrypting the Changes Brought By ERC4337 in Ethereum, What Opportunities Can We See?

This article describes the principles of ERC4337 wallets and their applications in areas such as intent, DeFi, and blockchain games. It also compares ERC4337 wallets with EOA, MPC, AA wallets, and points out the shortcomings of ERC4337 wallets.
29.22

Your Gateway to Crypto Knowledge, Get Article Alerts Straight to Your Inbox.

Your Gateway to Crypto Knowledge, Get Article Alerts Straight to Your Inbox.

Learn Cryptocurrency & Blockchain