The safest way to hold crypto depends on how much you have and how often you use it. For most people, a hardware wallet like Ledger or Trezor for long-term holdings combined with a software wallet like MetaMask or Phantom for daily DeFi use offers the best balance of security and convenience.
But "safest" is not one-size-fits-all. A beginner with $200 in crypto doesn't need the same setup as someone holding $50,000 across multiple DeFi protocols. The key is matching your custody method to your risk level, your technical comfort, and the actual dollar amount at stake. This guide walks through every option, with real numbers on what has gone wrong in each model and specific recommendations based on portfolio size.
The 4 custody models at a glance
There are four primary ways to hold cryptocurrency, each with a fundamentally different security model. Before diving into the details, here's the high-level comparison:
| Custody Model | Security | Convenience | Primary Risk | Best For |
|---|---|---|---|---|
| Exchange (Coinbase, Binance, Kraken) | Medium | High | Exchange hack, account freeze | Beginners, small amounts, active trading |
| Software wallet (MetaMask, Phantom, Rabby) | Medium | High | Phishing, device compromise | Active DeFi users, daily transactions |
| Hardware wallet (Ledger, Trezor) | High | Medium | Physical loss, seed phrase exposure | Long-term storage, large amounts |
| Multisig (Safe, Squads) | Very High | Low | Coordination complexity | Teams, very large amounts, inheritance |
The right choice depends on your situation. Most experienced crypto users end up using a combination — not just one. Let's break down each model in detail.
Exchange custody: the tradeoffs
When you buy crypto on an exchange like Coinbase, Binance, or Kraken, the exchange holds it for you. You don't manage private keys or seed phrases. You log in with a username and password, like a bank account.
Pros
- Easy to use. No technical knowledge required. Buy, sell, and transfer through a familiar interface.
- Account recovery. Forget your password? Reset it via email. Exchanges have customer support, unlike self-custody wallets.
- Partial insurance. Some exchanges (Coinbase, for example) insure a portion of custodied assets against platform breaches. This is not the same as FDIC insurance, but it's something.
- Fiat on-ramp. The easiest path from dollars or euros to crypto. Bank transfer, credit card, or wire — exchanges handle the conversion.
Cons
- Not your keys, not your crypto. The exchange controls the private keys. If they decide to freeze your account, restrict withdrawals, or go bankrupt, you may lose access to your funds.
- Exchange hacks. Centralized exchanges are massive targets. In 2025 alone, over $3.4 billion was lost to crypto hacks, with the Bybit hack accounting for $1.5 billion in a single incident. Mt. Gox (2014, $460M), FTX (2022, customer funds misappropriated), and Bybit (2025) are the most notorious examples.
- KYC and regulation risk. Exchanges require identity verification. Your account can be frozen by regulators, and in some jurisdictions, exchanges have been forced to restrict services with little notice.
- Counterparty risk. You're trusting a company — its management, its security practices, its solvency. FTX looked safe until it wasn't.
When exchange custody makes sense
If you're just getting started with crypto and hold less than $1,000, an exchange is fine. The risk of losing funds by mismanaging your own keys is arguably higher than the risk of a major regulated exchange failing. Use this time to learn, but plan to move to self-custody as your holdings grow. For a step-by-step introduction, see our guide on your first steps in crypto.
Software wallets: the daily driver
A software wallet is an application on your phone or browser that stores your private keys on your device. You — not an exchange — control access. This is self-custody: you hold the keys, you bear the responsibility.
How they work
When you create a software wallet, it generates a private key and derives a public address from it. The private key is stored encrypted on your device. When you want to send crypto or interact with a DeFi protocol, the wallet signs the transaction with your private key locally. Learn more in our guide on what is a crypto wallet.
The risks
- Phishing. The number one threat. A fake website that looks like Uniswap asks you to "connect wallet" and sign a transaction — except the transaction drains your tokens. Phishing attacks are responsible for hundreds of millions in losses annually.
- Malicious token approvals. Even legitimate-looking transactions can contain hidden unlimited approvals. Once you sign, the contract can drain the approved token at any time. Use CleanSky to check what approvals your wallet has active.
- Device compromise. If your computer has malware, it can intercept transactions, replace addresses, or extract your private key from the wallet's local storage.
- Seed phrase exposure. If anyone gets your 12 or 24 word recovery phrase, they have full access to your wallet. No password, no 2FA, no recourse.
How to use software wallets safely
- Use a dedicated browser (or browser profile) exclusively for DeFi. Don't browse random sites in the same browser where your wallet is active.
- Verify every URL manually. Bookmark the official sites for protocols you use. Never click links in Discord, Telegram, or emails to reach a DeFi app.
- Revoke old approvals. Periodically check and revoke token approvals you no longer need. Scan your wallet with CleanSky to see all active approvals.
- Don't store large amounts. Keep only what you need for active DeFi use. Move larger holdings to a hardware wallet.
Recommended software wallets
- MetaMask — the most widely supported wallet for Ethereum and EVM-compatible chains (Arbitrum, Polygon, Base, Optimism). Works as a browser extension and mobile app.
- Phantom — the leading wallet for Solana, with growing support for Ethereum and Polygon. Clean interface, mobile-friendly.
- Rabby — a multi-chain wallet with built-in transaction simulation and approval management. Shows you what a transaction will do before you sign it. Excellent security features for advanced users.
For a deeper guide on wallet security practices, read staying safe in crypto.
Hardware wallets: the gold standard for self-custody
A hardware wallet is a small physical device — about the size of a USB drive — that stores your private keys in a secure chip that never connects directly to the internet. This is what security professionals mean when they say cold storage.
How they work
When you want to sign a transaction, you connect the hardware wallet to your computer (via USB or Bluetooth) and approve the transaction on the device itself. The private key never leaves the secure chip. Your computer sends the unsigned transaction to the device, the device signs it internally, and sends back only the signed result. Even if your computer is fully compromised with malware, the attacker cannot extract your private key — it physically cannot leave the device.
For a complete overview, see our dedicated guide on what is a hardware wallet.
Why hardware wallets are safer
- Immune to remote attacks. Since keys never touch the internet, hackers cannot steal them remotely. Phishing, malware, and keyloggers are all neutralized for the key extraction attack vector.
- Physical confirmation. Every transaction must be confirmed on the device screen. You can verify the recipient address and amount on a trusted display, not just your potentially compromised computer screen.
- Secure element chip. Devices like Ledger use the same type of security chip found in credit cards and passports. The chip is designed to resist physical tampering.
The risks (yes, there are some)
- Physical loss or damage. If you lose the device and don't have your seed phrase backed up, your funds are gone permanently. (But if you have your seed phrase, you can restore on a new device.)
- Seed phrase exposure. The hardware wallet protects your keys from digital attacks, but if someone finds your written seed phrase, they can recreate your wallet on any device. The seed phrase is the master key.
- Supply chain attacks. If you buy a hardware wallet from an unofficial reseller (Amazon third-party seller, eBay, etc.), it could be pre-loaded with compromised firmware or come with a pre-filled seed phrase card. Always buy directly from the manufacturer.
- Blind signing. Some DeFi transactions show as raw data on the device screen rather than human-readable information. You might approve something malicious without realizing it. This risk is shrinking as "clear signing" support improves, but it still exists.
Cost and recommendation
Hardware wallets cost between $60 and $150. Compared to the amount of crypto they protect, this is trivial. For beginners entering self-custody, the Ledger Nano S Plus (~$79) or Trezor Model One (~$69) are excellent starting points. Both support thousands of tokens across major networks and have well-documented setup processes.
The math is simple: If you have $5,000 in crypto, a $79 hardware wallet is 1.6% of your holdings — a small price for dramatically better security. If you have $50,000, it's 0.16%. There is no rational argument against it at these amounts.
Multisig: for serious amounts
A multisig (multi-signature) wallet requires multiple private keys to authorize a transaction. Instead of one person with one key, you configure rules like "2 out of 3 keys must sign" or "3 out of 5 keys must sign."
How it works
In a typical 2-of-3 multisig setup, you create three keys and distribute them — for example, one on your hardware wallet, one on a backup hardware wallet in a safe deposit box, and one held by a trusted family member. To move funds, any two of the three keys must sign the transaction. This means:
- If one key is lost or stolen, funds are still safe (the attacker needs two keys).
- If one key is destroyed (fire, flood), you can still access funds with the other two.
- No single point of failure exists.
When to use multisig
- Holdings over $100,000. At this level, the additional complexity of multisig is justified by the amount at risk.
- Team treasuries. DAOs, companies, and investment groups use multisig so no single person can unilaterally move funds.
- Inheritance planning. Multisig allows you to set up access so that family members can recover funds if something happens to you, without giving any single person full control.
Options
- Safe (formerly Gnosis Safe) — the industry standard for Ethereum and EVM chains. Battle-tested, open source, used by major DAOs and protocols to secure billions.
- Squads — the leading multisig solution for Solana. Similar concept, native to the Solana ecosystem.
The downside is coordination overhead. Every transaction requires multiple signers, which takes time and planning. For an individual with moderate holdings, this is unnecessary friction. For a team managing a treasury, it's essential governance.
The seed phrase problem
Every self-custody method — software wallet, hardware wallet, or multisig — relies on a seed phrase: 12 or 24 words generated when you create the wallet. This phrase is the master key to everything. Whoever has these words has your crypto.
The rules are absolute
- Never store it digitally. Not in a note-taking app, not in a text file, not in cloud storage, not in a password manager, not in an email draft. Digital storage means it can be hacked, synced, or leaked.
- Never take a photo of it. Photos sync to iCloud or Google Photos automatically. Your seed phrase is now in a data center.
- Never type it into a website. No legitimate service will ever ask you to enter your full seed phrase. Any site that does is a phishing scam — 100% of the time, no exceptions.
- Never share it with anyone claiming to be "support." Wallet companies, exchanges, and blockchain projects will never ask for your seed phrase. Anyone who does is trying to rob you.
How to back it up properly
Write the words on paper and store them securely — ideally in a fireproof safe or safe deposit box. For added durability, use a metal seed phrase backup (steel or titanium plates where you stamp or engrave the words). These survive fire, flooding, and physical degradation that would destroy paper. Products like Cryptosteel, Billfodl, or BlockPlate cost $30-80 and provide peace of mind against physical disasters.
What happens when you lose it
If you lose your seed phrase and also lose access to your wallet (device breaks, app deleted, hardware wallet lost), your funds are gone permanently. There is no password reset. There is no customer support. There is no recovery mechanism. The blockchain doesn't know who you are — it only knows the private key. Without it, those funds will sit in that address forever, inaccessible to anyone.
This is both the greatest strength and the greatest responsibility of self-custody. No one can take your crypto, but no one can give it back either. For a complete guide on protecting yourself, read staying safe in crypto and our guide on self-custody 101.
Practical setup recommendation by portfolio size
Based on industry best practices and real-world attack data, here's what makes sense at each level:
| Portfolio Size | Recommended Setup | Rationale |
|---|---|---|
| Under $500 | Exchange (Coinbase, Kraken) | Keep it simple. The risk of losing keys through inexperience outweighs exchange risk at this level. Focus on learning how crypto works before taking on self-custody responsibility. |
| $500 – $5,000 | Software wallet (MetaMask, Phantom) | Start learning self-custody. Move funds off the exchange into your own wallet. Practice sending transactions, backing up your seed phrase, and interacting with DeFi protocols safely. Learn to read your CleanSky scan to understand what you own and what risks you carry. |
| $5,000 – $50,000 | Hardware wallet for storage + software wallet for daily DeFi | This is the sweet spot for most users. Keep the bulk of your holdings on a Ledger or Trezor. Transfer smaller amounts to your software wallet when you need to interact with DeFi protocols. Think of it like a savings account (hardware) and a checking account (software). |
| Over $50,000 | Hardware wallet + multisig, professional OpSec | At this level, you need redundancy. A 2-of-3 multisig removes single points of failure. Consider geographic distribution of keys, formal inheritance plans, and regular security audits of your wallet's approvals and exposure. Use CleanSky to monitor risk across all dimensions. |
These tiers are guidelines, not rigid rules. If you're technically confident, there's no reason not to use a hardware wallet for $500. If you're not comfortable with self-custody, there's no shame in keeping funds on a reputable exchange while you learn. The important thing is to be intentional about your choice and understand the tradeoffs you're accepting.
Common mistakes to avoid
- Keeping everything on one exchange. Even the best exchanges can fail. If you must use exchanges, spread across two or three rather than concentrating everything in one.
- Ignoring token approvals. Every DeFi interaction leaves behind permissions. Over time, these accumulate into a real attack surface. Scan your wallet with CleanSky to see what approvals are active and revoke the ones you don't need.
- Buying hardware wallets from unofficial sellers. Only buy from ledger.com, trezor.io, or authorized retailers. Tampered devices have been documented multiple times.
- Using the same wallet for everything. Create separate wallets for different purposes: one for long-term holdings (hardware wallet), one for DeFi (software wallet), and one for risky experiments or airdrops (a "burner" wallet with minimal funds). If the burner wallet gets compromised, your main holdings are unaffected.
- Not testing recovery. After setting up your hardware wallet, test the recovery process with a small amount. Send $5 to the wallet, reset the device, restore from your seed phrase, and confirm the $5 is still there. This proves your backup works before you trust it with larger amounts.
Frequently asked questions
Is it safe to keep crypto on Coinbase?
Coinbase is one of the safer exchanges — it's publicly traded (NASDAQ: COIN), regulated in the US, and holds a portion of assets in insured cold storage. However, exchange custody always means you don't control the private keys. Your account can be frozen due to regulatory action, flagged for suspicious activity, or affected by a platform-level breach. For small amounts and active trading, Coinbase is reasonable. For long-term holdings exceeding a few thousand dollars, self-custody with a hardware wallet provides stronger guarantees because no third party has the ability to freeze or lose your funds.
Do I need a hardware wallet?
"Need" depends on context. If you hold more than roughly $5,000 in crypto and plan to keep it long-term, a hardware wallet is strongly recommended. Below that amount, a reputable software wallet is adequate for most people. The real question is: if your crypto disappeared tomorrow, would it cause real financial pain? If the answer is yes, invest $70-80 in a hardware wallet. It's the single most impactful security upgrade you can make. See our guide on what is a hardware wallet for a complete breakdown.
What happens if I lose my hardware wallet?
Your crypto is not stored on the device — it's on the blockchain. The hardware wallet only holds your private keys. If you lose the physical device but still have your seed phrase (the 12 or 24 words you wrote down during setup), you can buy a new hardware wallet and restore full access in minutes. If you lose both the device and the seed phrase, your funds are permanently inaccessible. This is why secure seed phrase backup is non-negotiable.
Can someone hack a Ledger?
Ledger's secure element chip has never been remotely compromised. The private keys physically cannot be extracted by software. However, "hack" has many meanings. Attacks that have worked include: phishing emails impersonating Ledger (after their customer database was leaked in 2020), fake Ledger apps that ask for your seed phrase, and social engineering targeting users directly. The device itself is secure — the human using it is the attack surface. Always buy from the official store, never enter your seed phrase into a computer, and verify every transaction on the device screen before confirming.
What's the difference between a hot wallet and a cold wallet?
A hot wallet is connected to the internet — browser extensions like MetaMask, mobile apps like Phantom, and exchange accounts are all hot wallets. They're convenient for daily use but constantly exposed to online threats. A cold wallet is offline — hardware wallets like Ledger and Trezor keep private keys on a device that never directly connects to the internet. Transactions are signed on the device and only the signed result is transmitted. Cold wallets are dramatically harder to compromise remotely. Most experienced users combine both: a hot wallet funded with small amounts for daily DeFi activity, and a cold wallet holding the majority of their portfolio in long-term storage.
How to monitor your wallet security
Choosing the right custody method is step one. Keeping it secure is an ongoing process. Here's what to check regularly:
- Scan your wallet. Use CleanSky to check your total exposure, active token approvals, concentration risk, and position types across all networks. No wallet connection required — just paste your public address.
- Review token approvals monthly. DeFi interactions leave behind permissions that accumulate over time. CleanSky shows every active approval so you can revoke the ones you no longer need. Learn how to interpret your scan results in our how to read your scan guide.
- Check concentration risk. If 90% of your crypto is in one token, on one network, in one protocol, you have a single point of failure. CleanSky's risk analysis highlights exactly where your portfolio is concentrated.
- Test your backup annually. Verify that your seed phrase backup is intact, legible, and stored securely. Don't wait until you need it to find out it's damaged or missing.
Check your wallet's security now. Paste any public address to see your full portfolio, active approvals, and risk analysis in seconds. No wallet connection needed.