What are the different types of crypto wallets?

Looking for a wallet to store your newly acquired crypto? This article will cover all the different types of cryptocurrency wallets available in the market today along with their pros and cons.

Cryptocurrencies are not actually stored in wallets. They are stored at addresses on the blockchain. Wallets let you see your private keys, which grant access to the addresses where the funds are stored.

If you're curious, you can read more about it here: Where are blockchain assets stored?

In this article:

Where is my crypto stored?

When you hold cryptocurrencies, they are not stored in your wallet. Instead, they are stored in addresses on their respective blockchains.

At its most basic level, Exodus provides a software interface for you to see the private keys that grant spending rights to the addresses where the funds are stored.

To illustrate this, if you hold Bitcoin in your Exodus wallet, and have Multiple addresses enabled, you can have Bitcoin in several addresses, all of which will be stored in the Bitcoin blockchain.

In this example, the Bitcoin is not stored in your Exodus wallet. However, you can spend your funds because you can access your private keys in Exodus.

Anyone who has access to your private keys would have full access to your funds. This is why it’s so important to keep your 12-word phrase and private keys secret and safe. If you want to learn more about how private keys work visit: What are private keys?

Hot vs. cold wallets

Before we go into the different types of wallets, it's good to know the difference between hot and cold wallets. Every type of crypto wallet falls into one of these two categories.

Hot wallets are connected to the internet while cold wallets are not.

Since hot wallets are connected to the internet, funds stored in hot wallets are more accessible for uses like day-to-day trading or payments. However, since they're connected to the internet, they're also susceptible to Internet risks like hacking.

Examples of hot wallets include exchange wallets, web wallets, and software wallets like Exodus. While Exodus puts you in control of your private keys, Exodus is installed on your device and requires internet access to operate, which poses some risks depending on your security practices.

Cold wallets are not connected to the internet, making funds stored in them harder to use. Yet, this can be a benefit since hackers and other bad actors can't get to your assets as easily. Blockchain assets stored in cold wallets usually aren't used frequently and are instead held for long periods of time. Examples of cold wallets include hardware wallets and paper wallets.

Web wallets

As the name suggests, these are website-based online wallets that require you to open a URL to access the wallet. Most of the time, these wallets have some kind of account system with a username and password to log in to the wallet.


  • Easy to access and don't require installing anything.
  • Can benefit from things like advanced buying and selling options (some centralized exchanges).


  • Don't give you control of your private keys or secret recovery phrase, meaning that you don't control your money and are entrusting it to someone else (the website owners) to hold onto and protect.
  • Not very secure since they're accessed with a web browser (vulnerable to hacks and other exploits) and hosted on a centralized server (honeypot for hackers).
  • Don't always have in-wallet exchange features like other types of wallets.
Examples of web wallets include Blockchain.com, MyEtherWallet, MyCryptoWallet, MetaMask.

Mobile wallets

Mobile wallets are mobile phone applications that manage your private keys. If you have Exodus on your phone, you are using a mobile wallet.


  • Can be used on the go: especially useful for making in-person payments, such as to merchants who accept crypto.
  • Most mobile wallets provide full access to private keys and secret recovery phrases, which means you have full control of your funds.


  • Can have Internet-based risks depending on the user's security practices.
  • Someone could get access to your phone e.g. if you don't have a password to unlock it and drain your mobile wallet of its funds.
Examples of mobile wallets include Exodus, Coinomi, Mycelium.

Desktop wallets

As you might have guessed already, desktop wallets are built to be installed and run on desktop computers and laptops. Desktop wallets are the most popular wallets out there due to the features they can offer on powerful desktop platforms like Windows, macOS, and Linux. If you have Exodus installed on your computer, you are using a desktop wallet.



  • Like other hot wallets, susceptible to Internet dangers - but usually considered more secure than web wallets depending on the user's security practices.

The security of a desktop wallet depends on the user since these wallets are online wallets. It's important to maintain the security of the system in the system these wallets are installed.

Apart from Exodus, some other desktop wallets are Jaxx, Electrum, and Atomic. The desktop wallet category also includes wallets like Bitcoin Core Wallet and Official Monero Wallet from the development teams of assets themselves.

Hardware wallets

Specially designed hardware devices, such as Trezor, are considered the best in crypto security for storing one's crypto wealth for the long term. These devices can connect to your computer and mobile via USB ports so you can perform send and receive functions. Since Trezor is integrated with Exodus, this is the easiest and most secure way to store and manage your crypto. Find out more here: 


  • Has top-level security features.
  • Private keys never leave the hardware wallet protecting them from malware and hackers.
  • Users approve all transactions on the device itself.


  • Can be costly for some users (usually upwards of 120 USD).
Examples of hardware wallets include Trezor Model T, Ledger Nano S, KeepKey, etc.

Paper wallets

Yes, you can store digital assets on good old, non-digital paper! Paper wallets are cold wallets (not connected to the Internet) and are usually used for long-term storage of cryptocurrencies. These wallets are also used as gifts—generally to introduce somebody to the blockchain asset world.


  • Cold wallet and not prone to internet dangers.


  • Not as readily accessible for use like desktop wallets and other hot wallets in things like everyday transactions.
  • While not connected to the Internet, someone could gain access to the paper wallet and steal your funds.
  • Can suffer from damage like paper deterioration over time and natural disasters like fires - though in general, damage can be avoided by using stronger materials.

One example of a service that allows you to generate a paper wallet is bitaddress.org.

If you would like to learn how to import a paper wallet into Exodus, this guide will help: How do I import a private key?

Regardless of which wallet you choose, if you ever reveal your secret recovery phrase or private keys, your funds will most likely be stolen. No wallet provider can help you get the stolen funds back since blockchain transactions are irreversible. Always ensure you store your secret recovery phrase and private keys offline—never store them on any device that is connected to the Internet. There are hundreds of ways hackers can gain access to your secret recovery phrase or private keys online.

Please be very careful with your 12-word secret recovery phrase and private keys, because they control access to your funds. Never share them with anyone, and only import them into platforms that you trust 100%. If you choose to import your 12-word phrase or private keys into a third-party platform, you do so at your own risk. To find out more, check out this article from our Knowledge Base: How do I keep my money safe?

Did this answer your question? Thanks for the feedback There was a problem submitting your feedback. Please try again later.