Wallet support
Hot Wallet vs Cold Wallet
Troubleshoot online and offline custody tradeoffs. Review how recovery phrases work and what a lost wallet backup can affect before setup.
Troubleshooting Checks
- If a hot wallet is hacked, move any remaining funds to a newly created wallet from a clean device. Changing only the app password does not protect a leaked recovery phrase.
- If cold storage feels inaccessible, identify whether the issue is the device, wallet software, passphrase, address type, or missing backup before trying risky restore steps.
- If you need frequent transactions, keep only operational funds in a hot wallet and separate long-term holdings into a colder setup.
Safety And Scam Prevention
- Hot wallets are exposed to phishing, malicious approvals, fake extensions, clipboard malware, and compromised phones or browsers.
- Cold wallets reduce key exposure, but signing a malicious transaction can still drain assets. Review contract permissions, destination addresses, and prompts carefully.
- A wallet is not safer just because it is inconvenient. Safety comes from a backup plan, verified software, small tests, and knowing what you are signing.
Practical Setup Notes
- Hot wallets fit app access, small balances, and everyday transfers. Cold wallets fit longer-term storage, larger balances, and slower deliberate signing.
- Many users need both: a small hot wallet for activity and a separate cold wallet for storage, with no shared recovery phrase.
- The practical difference is not only internet connection. It is how often the secret is exposed, how transactions are approved, and how recovery is documented.