Skip to main content

Hot Wallet | Bitcoin Glossary | Mapping Bitcoin

Hot Wallet

Seguridad

Also known as: online wallet

A Bitcoin wallet connected to the internet, offering convenience for frequent transactions but with greater exposure to potential hacks and malware. Hot wallets are suitable for smaller amounts used in day-to-day spending.

Overview

A hot wallet is any Bitcoin wallet that is connected to the internet and can sign and broadcast transactions immediately. This includes mobile wallets, desktop wallets, browser extensions, and web-based wallets. Hot wallets prioritize convenience and speed for everyday use, but their internet connectivity exposes private keys to potential threats from malware, phishing attacks, and remote exploits.

Hot Wallet vs. Cold Storage

┌─────────────────────────────────────────────────────────┐
│                  SECURITY SPECTRUM                       │
│                                                         │
│  HOT                                              COLD  │
│  ◄──────────────────────────────────────────────────►   │
│                                                         │
│  Web wallet    Mobile    Desktop    Hardware   Air-gapped│
│  (custodial)   wallet    wallet     wallet     device   │
│                                                         │
│  Most                                           Most    │
│  convenient                                     secure  │
│  Least                                          Least   │
│  secure                                         convenient│
└─────────────────────────────────────────────────────────┘

Types of Hot Wallets

Mobile wallets: Smartphone apps like Blue Wallet, Muun, or Phoenix. Convenient for in-person payments and small transactions. Protected by phone security (PIN, biometrics).

Desktop wallets: Software running on a laptop or PC, such as Electrum, Sparrow, or Wasabi. Often more feature-rich than mobile wallets, with advanced options like coin control and CoinJoin.

Web wallets: Browser-based interfaces where keys may be stored on a server or generated client-side. The least secure hot wallet option when keys are server-managed.

Exchange wallets: Accounts held at exchanges like Coinbase or Kraken. These are custodial wallets where the exchange controls the private keys.

Security Risks

  • Malware: Keyloggers, clipboard hijackers (replacing copied addresses), and trojans targeting wallet files
  • Phishing: Fake websites or apps that trick users into entering seed phrases or passwords
  • Device compromise: If the device running the hot wallet is compromised, private keys can be extracted
  • Software vulnerabilities: Bugs in wallet software could expose keys or allow unauthorized transactions
  • Physical theft: A stolen phone with an unlocked wallet app grants immediate access to funds

Best Practices

  • Keep only small amounts in hot wallets -- treat them like a physical wallet in your pocket
  • Enable all available security features (PIN, biometrics, 2FA)
  • Use a hardware wallet or cold storage for larger holdings
  • Regularly update wallet software to patch security vulnerabilities
  • Verify receiving addresses on a trusted display before sending
  • Back up the seed phrase and store it offline in a secure location

The "Checking Account" Analogy

A common mental model is to treat hot wallets like a checking account and cold storage like a savings account:

Hot wallet  → Checking account  → Day-to-day spending money
Cold storage → Savings account   → Long-term holdings, bulk of wealth

Only keep in a hot wallet what you can afford to lose in a worst-case scenario.

Common Misconceptions

  • Hot wallets are not inherently insecure. They are less secure than cold storage but still employ encryption, secure key storage, and other protections.
  • Not all hot wallets are custodial. Many hot wallets (like Blue Wallet or Electrum) are non-custodial, meaning the user controls the private keys.
  • Using a hot wallet does not mean your bitcoin is at constant risk. Modern mobile and desktop wallets implement robust security measures. The key is proportionality -- only keep amounts appropriate for the security level.