A cryptocurrency wallet stores the public and private keys which can be used to receive or spend the cryptocurrency. A wallet can contain numerous public and private key pairs.  [ better source needed ] Spil of January 2018 [update] , there are overheen thirteen hundred cryptocurrencies, the very first and best known is bitcoin. [Two] The cryptocurrency itself is not ter the wallet. Ter case of bitcoin and cryptocurrencies derived from it, the cryptocurrency is decentrally stored and maintained te a publicly available ledger. [Trio] : 93 Every lump of cryptocurrency has a private key. With the private key, it is possible to write ter the public ledger, effectively spending the associated cryptocurrency. [Four]
When choosing a wallet, the proprietor vereiste keep ter mind who is supposed to have access to (a copy of) the private keys and thus has potentially access to the cryptocurrency. Just like with a canap, the user needs to trust the provider to keep the cryptocurrency safe. Trust wasgoed misplaced te the case of the Mt. Gox exchange, who ‘lost’ most of their clients’ bitcoins. Downloading a cryptocurrency wallet from a wallet provider to a laptop or phone does not automatically mean that the holder is the only one who has a copy of the private keys. For example with Coinbase, it is possible to install a wallet on a phone and to also have access to the same wallet through their webstek. The software can also have known or unknown vulnerabilities. For receiving cryptocurrency, access to the receiving wallet is not needed. The sending party only needs to know the destination address. Anyone can send cryptocurrency to an address. Only the one who has the private key of the corresponding address can use it. [Five]
A backup of a wallet can come te different forms like:
- A (encrypted) opstopping like wallet.dat or wallet.bin which contains all the private keys.
- A mnemonic sentence from which the root key can be generated, from which all the private keys can be recreated. Preferably thesis words could be remembered or written down and stored on other physical locations.
- A private key like: KxSRZnttMtVhe17SX5FhPqWpKAEgMT9T3R6Eferj3sx5frM6obqA (see the picture).
When the private keys and the backup are lost then that cryptocurrency is lost forever. When using a webwallet, the private keys are managed by the provider. When wielding cryptocurrency, those trusted with managing the private keys should be cautiously selected. An (encrypted) copy of the wallet should be kept te a trusted place. Preferably off-line. [Five] Some people ‘write’ their mnemonic sentence or private key on metal, because it is sturdy. 
Some wallets support numerous cryptocurrencies.
Software wallet Edit
They come ter different forms like:
- An application installed locally on a laptop, telephone or tablet (see the picture).
- When using a web wallet the private keys are managed by a trusted third party. Some web-based wallet providers use two-factor (like Google Authenticator) for reserve security. Te that case a keylogger is not enough for a hacker to steal the credentials and get access to the wallet. 
- Cryptocurrency exchanges verbinding the user’s wallet to their centrally managed wallet(s). For example: When trading bitcoins inbetween users on the Openleggen exchange, the trades are written ter their private ledger (off-chain transaction). Only when a user wants to come in his cryptocurrency into the exchange or when he wants to take his cryptocurrency out of the exchange, the transaction is written onto the public bitcoin blockchain (on-chain transaction).
Ter order to initiate or verify a transaction, the cryptocurrency wallet connects to a client or knot on the network to process the request. There are several types of clients like: utter clients, headers-only clients, skinny clients and mining clients. Some of them can process transactions and some of them also have their own wallet functionality.  Utter clients verify transactions directly on a local copy of the blockchain.  Lightweight clients raadpleging total clients. 
Hardware wallet Edit
When the user of a hardware wallet requests a payment, the wallet’s API creates the transaction. Then the wallet’s hardware signs the transaction and provides a public key, which is sent to the network by the API. That way, the signing keys never leave the hardware wallet. [Ten]
If a hardware wallet uses a mnemonic sentence for backup, then the users should not electronically store the mnemonic sentence, but write it down and store ter a separate physical location. Storing the backup electronically lowers the security level to a software wallet level. Hardware wallets like LedgerWallet and Trezor have models that require the user to physically press or touch the wallet ter order to sign a transaction, the destination address and the amount of coins. The private keys remain safe inwards the hardware wallet. Without the private key a signed transaction cannot be altered successfully. Some hardware wallets have a display (see the picture) where the user can come in a speld to open the wallet and where the transaction can be verified before being signed. When reading a mnemonic sentence from the physical display of the hardware wallet a screencapture of an infected laptop will not expose the mnemonic sentence.  [ not te citation given ]   [ not ter citation given ]
Watch-only wallet Edit
With a see only wallet someone can keep track of all transactions. Only the address (public key) is needed. Thus the private key can be kept safe ter another location. 
Multisignature wallet Edit
With a multisignature (multisig) wallet numerous users have to sign (with their private key) for a transaction out of that wallet (public key address).   
Brain wallet Edit
With a brain wallet someone remembers the information to regenerate the private and public key pair(s), like a mnemonic sentence.  [Legitimate]
Hot vs. cold wallets Edit
Terms also used ter the setting of cryptocurrency wallets are hot and cold wallets. Hot wallets are connected to the internet while cold wallets are not. With a hot wallet cryptocurrency can be spent at any time. A cold wallet has to be ‘connected’ to the internet very first. Spil long spil something is connected to the internet, it is vulnerable to an attack. The brief version is that software wallets (where the device is turned on or the wallet software is running) are considered hot wallets. A (not connected) hardware wallet is considered a cold wallet. [Nineteen]
Deep Cold Storage Edit
Deep cold storage is the process of storing cryptocurrencies ter cold wallets that were never connected to the Internet or any kleuter of network. Additionally the private keys associated with this system are generated offline. The process gained main stream attention, when Regal RA DMCC  , (the very first cryptocurrency licensed company te the middle east) took it a duo of steps further by storing the cold wallets te the Almas Tower vault below sea level along with the company’s gold bullion and insured the cryptocurrencies for total value.
Key derivation Edit
Deterministic wallet Edit
With a deterministic wallet a single key can be used to generate an entire tree of key pairs. This single key serves spil the “root” of the tree. The generated mnemonic sentence or word seed is simply a more human-readable way of voicing the key used spil the root, spil it can be algorithmically converted into the root private key. Those words, te that order, will always generate the precies same root key. A word phrase could consist of 24 words like: start friend black earth beauty praise pride turn down horror believe ease gospel end ruin champ build better awesome. That single root key is not substituting all other private keys, but rather is being used to generate them. All the addresses still have different private keys, but they can all be restored by that single root key. The private keys to every address it has everzwijn given out can be recalculated given the root key. That root key, ter turn, can be recalculated by feeding te the word seed. The mnemonic sentence is the backup of the wallet. If a wallet supports the same (mnemonic sentence) mechanism, then the backup can also be restored on a third party software or hardware wallet.
A mnemonic sentence is considered secure. It creates a 512-bit seed from any given mnemonic. The set of possible wallets is Two 512 . Every passphrase leads to a valid wallet. If the wallet wasgoed not previously used it will be empty. [Trio] : 104
Non-deterministic wallet Edit
Ter a non-deterministic wallet, each key is randomly generated on its own accord, and they are not seeded from a common key. Therefore, any backups of the wallet voorwaarde store each and every single private key used spil an address, spil well spil a buffer of 100 or so future keys that may have already bot given out spil addresses but not received payments yet. [Three] : 94