Skip to main content

What is a Wallet?

Wallets

A wallet is a tool that gives you access to your IOTA tokens. One very important fact that you need to understand from the beginning is your IOTA tokens are never stored INSIDE a wallet.

This is a common misunderstanding. All your IOTA tokens only exist in the Tangle network and cannot leave this network. So you do not physically “store” them “inside” anything.

A wallet is a tool to access, transfer and manipulate your tokens on the IOTA network. It gives you a convenient solution to store your secret keys and use them in the network to control your tokens.

The wallet knows the private key and the public key of your seed. Armed with these two points of cryptographic information, a wallet can access the addresses of all your tokens on the network and has full control over all functions of the ledger. The wallet takes care of securely storing this important information for you. But if you lose access to the wallet, you lose access to this information, so it is essential that you always have proper backups of these secrets stored in a safe location.

Think of a wallet more like a browser that knows exactly the place where your tokens sit in the huge IOTA network and that makes it possible for you to control them. But again, never forget: the tokens are always and only on the Tangle and never in your wallet. In crypto, we divide wallets into two categories:

  • Software wallets
  • Hardware wallets

Software Wallets

A software wallet is a computer program that is executed in the operating system of your device (a computer or smartphone). It has no representation in a physical device and the program code is not written (or "hard-coded") in a computer chip. Software wallets are user-friendly and therefore a very popular way to handle your tokens. They usually need a short setup process where you enter your secret seed once – and then never need to type this complicated list of letters or characters again. You log in to the software wallet with a carefully chosen password and gain access to your tokens. Now you can easily send and receive tokens.

But as software wallets are part of your operating system, the security of a software wallet can always be only as good as the security of the entire operating system. So you need to make sure that your operating system is free of malicious software, otherwise it will be easy for an attacker to get access your secret keys and your tokens. If you use a software wallet to handle your IOTA tokens, always have an up-to-date system, run quality antivirus and anti-malware programs, and follow best practices for cybersecurity.

The IOTA Foundation has developed a software wallet that follows the highest standards to keep your secrets safe. Read about the Firefly wallet here: Firefly Wallet

And download the Firefly wallet at the Firefly official website

Hardware Wallets

Hardware wallets are physical devices that are solely constructed to handle the secret information (seeds and private keys) of your tokens. They use cryptographic techniques and software coded into the chips of the device to hide these secrets from the outside world. The big advantage of these devices is that they are not part of your normal computer operating system. Nor are they even part of the physical hardware of the devices that you use for your normal daily use, like browsing the internet or using different kinds of software. This makes them an encapsulated safe vault whose only purpose is to protect your crypto secrets.

Only when you want to do something with your tokens do you need to establish a connection between this hardware wallet and the IOTA network where your tokens are. Usually, this connection is established by a software wallet that runs on your computer. For this purpose, you need to connect the hardware wallet to your computer (via cable or USB). This connection is extremely well protected and never transfers secret information between the hardware and software wallets. The user of the hardware wallet establishes a connection to the software wallet, and the software wallet establishes the connection to the IOTA network.

Through sophisticated cryptographic concepts, the user can now interact with the IOTA network, without the possibility of malicious software stored on the user's computer accessing the secrets that are stored on the hardware wallet. This adds a second wall of security that keeps the secrets outside the reach of the user's potentially infected computer.

A hardware wallet is therefore the most secure way to keep your secrets safe, but it also adds an extra layer of complexity to the use of your crypto, on top of what a software wallet provides.

IOTA currently supports the use of the Ledger Nano hardware wallet. Read how to use it here.

Only purchase a Ledger directly from the official store on the official website: Ledger Hardware Wallets