Imagine you have a locker at a gym. Your valuables do not live inside the key you carry around — they live inside the locker. The key simply proves you have the right to open it. Lose the key, and you lose access to everything inside, even though the valuables themselves are still there. A crypto wallet works the same way, and once you internalize that analogy, almost every other decision about wallet choice, backup, and security starts to make sense.
In Plain English: Wallets Hold Keys, Not Coins
All cryptocurrency balances are recorded on the blockchain — a shared, public ledger that no single app, company, or device controls. When someone sends you Bitcoin or any other cryptocurrency, the ledger is updated to show your address as the new owner. Nothing is transferred into your wallet software. The coins never move off the blockchain.
Your wallet is better understood as a keychain. It holds the cryptographic credentials that prove you own a particular address, and it uses those credentials to authorize changes to the ledger when you want to send funds.
Deleting a wallet app does not destroy your crypto. Losing your private key does.
What a Wallet Actually Stores: Keys and Addresses
At the core of every wallet is a private key — a very large random number that acts as an unforgeable signature. If you want to understand the relationship between keys and addresses in depth, the article on public keys and private keys covers the mechanics. The short version: from your private key the wallet derives a public key, and from that it generates a public address you can share freely with anyone who wants to send you funds.
Spending crypto means signing a transaction with your private key. The network verifies the signature without ever seeing the key itself — only the result of the signing operation. This is how the blockchain can confirm you authorized a payment without you having to hand over the credential that protects your funds.
Modern wallets go further. Most use BIP-32, which defines Hierarchical Deterministic (HD) wallets. BIP-32 uses a single master seed and a mathematical process to derive an entire tree of key pairs from it. This matters because it means one backup covers every account and address you ever create. Alongside BIP-32, BIP-44 standardizes the derivation path — written as m / purpose / coin_type / account / change / address_index — so that the same seed phrase can restore your keys in any compatible wallet app, not just the one you originally used.
That master seed is what you know as a seed phrase: the 12 or 24 words written on paper when you first set up a wallet. We cover seed phrases in detail in the dedicated article seed phrases explained, but the key point here is that every wallet built on BIP-32 and BIP-44 derives all its keys from that one phrase. Back up the phrase; back up everything.
Hot Wallets: Convenient but Connected
A hot wallet is any wallet whose private keys are stored on an internet-connected device — a phone app, a browser extension, or a desktop application. Examples include mobile wallets, browser extensions like MetaMask, and exchange accounts.
The convenience is real: one tap to sign a transaction. The risk is also real: malware, phishing, or a compromised device can expose your private key. That risk is higher with custodial hot wallets, meaning exchange accounts where the exchange holds the private key on your behalf. You have an account balance, not direct blockchain ownership. The phrase "not your keys, not your coins" exists because exchange insolvencies and hacks have wiped out user funds multiple times.
Non-custodial hot wallets, like Zelcore, generate and store keys on your own device. You control your seed phrase. There is no password-reset option because no third party holds your credentials, which is both the strength and the responsibility of self-custody.
Cold Wallets: Keys That Never Touch the Internet
A cold wallet generates and stores private keys on a device that is never — or only briefly — connected to the internet. Hardware wallets are the most common form: a dedicated USB-like device that signs transactions internally so the private key never leaves the chip.
Because a hardware wallet signs the transaction internally, a remote attacker who compromises your computer still cannot extract the key. Physical theft or destruction of the device becomes the primary risk instead of remote hacking, which is a much harder attack to execute from across the internet.
Paper wallets are an older cold-storage method — a printed QR code of the private key, kept physically secure — though hardware wallets have largely replaced them for practical use.
Custodial vs. Non-Custodial: Who Holds the Key
This distinction matters more than hot vs. cold:
- Custodial: A third party holds the private key on your behalf. You have an account login and a balance display, but you do not have direct blockchain ownership. Password recovery exists, which is convenient for beginners. Counterparty risk — the possibility that the third party fails, gets hacked, or freezes withdrawals — also exists.
- Non-custodial: You hold the private key, either in a hot wallet app or on a hardware wallet. No one can freeze your funds or require your identity to access them. The trade-off is that losing your seed phrase with no backup means permanent loss of access; there is no support ticket that can recover it.
Zelcore is non-custodial: keys are generated on your device and you control your seed phrase from the moment you create a wallet.
Choosing the Right Wallet for You
There is no single right answer, but here is how we think about it:
- For small everyday amounts: a reputable non-custodial mobile or desktop hot wallet is practical and convenient.
- For significant savings: a hardware wallet keeps keys offline and is the recommended security upgrade.
- Multi-coin wallets manage keys for dozens of chains from a single seed, which simplifies backups considerably — one phrase instead of one per chain.
- You can use both: a hot wallet for daily transactions and a hardware wallet for long-term holdings.
One rule applies regardless of which wallet type you choose: never store your seed phrase digitally. No screenshots, no cloud notes, no email drafts. Write it on paper and keep it somewhere physically secure.
Key Takeaways
- Your coins live on the blockchain, not in your wallet. The wallet stores the private keys that prove ownership.
- Losing a private key (or seed phrase) means losing access permanently. Deleting the app does not.
- HD wallets (BIP-32 + BIP-44) derive all your key pairs from one seed phrase, so one backup covers everything.
- Hot wallets are convenient; cold wallets are more secure for large holdings. Using both is a common best practice.
- Custodial wallets hand control to a third party; non-custodial wallets keep it with you.



