Keom Protocol
  • Keom Protocol
  • About Keom
    • ⚙️Products
    • 🛡️Security
      • ✅Audits
      • 🦸‍♂️Security Approach
        • Continuous stress-testing
        • Asset due diligence
        • AMM slippage modelling
        • Toxic liquidation spirals
        • Security Partners
    • 🏛️Organisation
      • 🎮Legal Entity
      • 👾Community
  • How it works
    • Lending Pools
      • Pool Types
      • Supply
        • Supply Assets
        • kTokens
        • Interest
        • Rewards
      • Borrow
        • Borrow
        • Health Factor
        • Liquidation Probability
        • Liquidation
      • Withdraw & Repay
      • Interest rate model
  • 🔴INTERFACE TERMS OF USE
    • Terms of Use
    • Definitions
    • Restricted Jurisidictions
    • ⛔Prohibited Uses
    • You acknowledge and accept
      • About the Interface
      • About the Protocol
      • About Listed Assets
      • About Yield and Rewards
      • About the Association
    • You represent and warrant
      • About yourself
      • About your understanding
    • Regulations
    • Access Restrictions
    • Fees
    • Downtime
    • Shutdown
    • Indemnification Clause
    • Absence of warranties
    • Liability
    • Applicable Law and Jurisdiction
    • Risk Disclosure
      • ‼️Important Reminders
      • Technology Risk
        • Blockchains
          • General Blockchain Risk
          • L1 vs L2
            • Ethereum
            • Polygon PoS
            • Polygon zkEVM Beta
            • Polygon CDK
          • Testnet vs Mainnet
        • Bridges
        • Crypto Assets
        • Oracles
        • Wallets
      • Financial Risk
      • Regulatory Risk
      • Systemic Risk
  • Developers
    • Contract Addresses
      • Polygon PoS
      • Polygon zkEVM
      • Manta Pacific
      • Astar
      • X1-Testnet
    • Key Events
    • Exchange Rate
    • Dynamic Liquidation Parameters
    • Oracles
  • Support
    • FAQ
    • Video Tutorials
  • References
    • Social Media Links
    • Brand Materials
Powered by GitBook
On this page
  1. INTERFACE TERMS OF USE
  2. Risk Disclosure
  3. Technology Risk

Wallets

Wallets are essential tools for users interacting with decentralized finance (DeFi) protocols, serving as the interface for managing cryptocurrencies, executing transactions, and engaging with blockchain-based applications.

They can be categorized based on control over private keys—custodial vs. non-custodial—and their connectivity—hot vs. cold wallets.

  • Custodial Wallets: Managed by third parties, these wallets offer convenience at the cost of security risks, as users must trust the custodian with their assets. They're prone to hacking due to centralized control.

  • Non-Custodial Wallets: Give users full control over their private keys and assets, enhancing security and privacy. However, they require more technical knowledge, and losing private keys means losing access to assets.

  • Hot Wallets: Online and convenient for frequent transactions, hot wallets face higher security risks from internet exposure.

  • Cold Wallets: Offline storage solutions like hardware or paper wallets, offer increased security against online attacks but less accessibility.

Choosing a wallet involves balancing these considerations to match individual needs for security, convenience, and control.

Each wallet type is susceptible to different security risks. Custodial wallets may suffer from security breaches or malicious activities by the custodian, while non-custodial wallets are vulnerable to user errors, such as the loss of private keys or falling prey to phishing scams. Additionally, interacting with DeFi protocols through wallets involves smart contract risks. Malfunctions or exploits in the DeFi protocol or the wallet software could lead to the loss of assets.

Custodial wallet providers, being centralized entities, might be subject to regulatory actions that could impact users' access to their funds or personal information.

PreviousOraclesNextFinancial Risk

Last updated 1 year ago

🔴