Skip to main content

Analysis of Blockchain Wallet Types and Differences

· 4 min read
UtcPay Dev
UtcPay Dev
UtcPay Development Team

Blockchain wallets are the "keychains" of the blockchain world, determining how you access and manage assets while impacting security and functionality. Wallet differences can be categorized by usage patterns or underlying protocol models. This article provides a comprehensive understanding of both classification methods, including security recommendations and a comparison table of common wallets.


I. Usage-Based Classification

From user experience and key management perspectives, wallets can be divided into:

1. By Connectivity: Hot Wallet vs Cold Wallet

TypeDefinitionAdvantagesDisadvantagesUse Cases
Hot WalletPrivate key on online deviceEasy operation, instant transactionsVulnerable to hackingFrequent trading, small funds
Cold WalletPrivate key on offline deviceHigh securityInconvenient to useLong-term holding of large amounts

2. By Custody: Custodial vs Non-Custodial

TypeDefinitionAdvantagesDisadvantagesTarget Users
CustodialThird-party key custodyUser-friendly, no key loss riskPlatform riskBeginners, small amounts
Non-CustodialUser self-custodyFull asset controlIrrecoverable if keys lostExperienced users, large amounts

3. By Physical Form

  • Software Wallets: Mobile apps, desktop clients, browser extensions (e.g., MetaMask, Trust Wallet)
  • Hardware Wallets: Offline devices (e.g., Ledger, Trezor, OneKey)
  • Paper Wallets: Printed/handwritten private keys and addresses
  • Multi-Sig Wallets: Require multiple signatures for transactions (e.g., Gnosis Safe)

II. Protocol/Account Model Classification

Different blockchain account designs at the protocol layer:

ModelControl MethodCharacteristicsRepresentative Wallets/Chains
EOA (Externally Owned Account)Single private keySimple, compatible, key-dependent securityMetaMask, Trust Wallet (Ethereum)
CA (Contract Account)Smart contract logicProgrammable, multi-sig, limitsGnosis Safe, UtcPay (Merchant)
AA (Account Abstraction)Key + contract combinationGas sponsorship, social recovery, batch txERC-4337 Smart Wallets
UTXO ModelUnspent transaction outputsBetter privacy, flexible tx structureBitcoin Core, Electrum
MPC (Multi-Party Computation)Distributed key shardsNo single point of failure, institutional useFireblocks, ZenGo

UtcPay: Web3 Payment Infrastructure

UtcPay is a non-custodial, smart contract-driven decentralized payment and wallet infrastructure designed for B2C enterprises (e.g., retailers, fintech companies). It enables merchants to maintain full on-chain control while avoiding traditional centralized key management risks.

  • Protocol Model: Contract Account (CA) type, managing funds through pure contract logic without server-side key storage.
  • Technical Advantages:
    • Funds remain recoverable even if merchant servers are compromised
    • Lower costs vs MPC solutions with no server maintenance
    • Flexible multi-sig and administrative policy configurations
  • Use Cases: Merchants/financial institutions integrating crypto payments while maintaining on-chain asset control. Classified as CA-type wallet with smart contract management features.

III. Security Risks and Prevention

Common Risks

  1. Private Key/Seed Phrase Leak → Asset theft
  2. Phishing Sites/Fake Apps → Unauthorized approvals
  3. Malicious Contract Approvals → Asset draining
  4. Counterfeit Hardware Wallets → Pre-installed backdoors
  5. Device Infections → Remote control of hot wallets

Prevention Recommendations

  • 🔒 Separate cold/hot wallets: Small amounts in hot, large amounts in cold
  • 🛒 Buy hardware wallets from official channels
  • 🔄 Regularly revoke unused contract approvals (e.g., Revoke.cash)
  • 🌐 Never enter seed phrases on public networks
  • 🔑 Enhance security with multi-sig or MPC

IV. Wallet Comparison Table

Wallet NameUsage TypeProtocol ModelSupported ChainsKey Features
MetaMaskHot / Non-CustodialEOAEVM ChainsExtension+App, DeFi standard
Trust WalletHot / Non-CustodialEOAMulti-chainMobile-optimized
LedgerCold / Non-Custodial / HardwareEOAMulti-chainHigh hardware security
Gnosis SafeHot/Cold / Non-Custodial / Multi-sigCAEVM ChainsTeam treasury management
FireblocksCustodial / MPCMPCMulti-chainInstitutional custody solution
Bitcoin CoreHot/Cold / Non-Custodial / SoftwareUTXOBitcoinNative Bitcoin wallet
UtcPay (Merchant)Hot / Non-Custodial / SoftwareCAEVM-compatibleMerchant integration, on-chain asset control

Conclusion

  • Usage-based classification determines wallet security and convenience
  • Protocol model classification defines functional capabilities and security policies
  • Businesses/institutions should consider CA-type wallets (e.g., UtcPay) for on-chain asset control with flexible contract configurations for multi-sig, payments, and permissions