When you own cryptocurrency, you need somewhere to store it. That somewhere is a wallet, and the most widely used category of wallet for everyday crypto users is the software wallet: an application that stores your private keys and allows you to send, receive, and manage cryptocurrency directly from your phone or computer.
Software wallets, also known as ‘Warm wallets’ are the entry point for most people into self-custody, the practice of holding your own private keys rather than leaving your cryptocurrency in the custody of an exchange. They are free, accessible, and powerful enough for most everyday crypto activity. They are also the category of wallet most commonly compromised, because the private keys they store live on internet-connected devices.
Understanding exactly what a software wallet is, how it works, which types exist, and how to use one safely is foundational knowledge for any active cryptocurrency user.
The term “wallet” is somewhat misleading. A cryptocurrency wallet doesn’t store cryptocurrency in the way a physical wallet stores cash. Your Bitcoin or Ethereum doesn’t live inside the wallet application. It exists on the blockchain itself, recorded on the public ledger as belonging to your address.
What a software wallet actually stores and manages are your private keys: the cryptographic credentials that prove ownership of a blockchain address and authorise transactions from it. The wallet uses your private key to sign transactions, broadcasts those signed transactions to the blockchain network, and displays your balances by reading publicly available on-chain data from your address.
As covered in our private keys resource, the private key is the master credential of cryptocurrency ownership. Whoever controls the private key controls the funds at the corresponding address. A software wallet that stores your private key on an internet-connected device is therefore only as secure as that device and the software running on it.
The seed phrase, the 12 or 24 word backup generated during wallet setup, is the master key from which all private keys in the wallet are derived. Backing up and securing the seed phrase is the most critical security responsibility of software wallet ownership. As covered in our seed phrase storage advanced techniques and crypto wallet backup guide resources, losing the seed phrase means losing access to the wallet permanently if the device is lost, damaged, or reset.
Software wallets come in three primary forms, each suited to different use cases and carrying different security profiles.
Mobile wallets are applications installed on a smartphone. They are the most convenient form of software wallet for everyday use: always with you, easy to use for payments, transfers, and DeFi interactions, and increasingly comprehensive in the range of assets and networks they support.
Trust Wallet is one of the most widely used multi-chain mobile wallets, supporting Bitcoin, Ethereum, Solana, and hundreds of other networks and tokens. Exodus is another popular multi-chain option with a polished interface and integrated exchange functionality. Coinbase Wallet (distinct from the Coinbase exchange app) is a self-custody mobile wallet with strong DeFi integration. Whilst we also consider Meta Mask to be another software wallet choice, it’s important to highlight that Meta Mask does share one attribute that also leans it towards a hot wallet environment.. It’s 100% connected to the internet.
The security of a mobile wallet depends directly on the security of the phone. A phone without a strong PIN or biometric lock, a phone that has been jailbroken or rooted removing its security protections, or a phone infected with malware can all compromise the private keys stored in the wallet application.
Desktop wallets are applications installed on a computer. They typically offer more advanced features and a larger display compared to mobile wallets, making them suitable for investors who prefer managing their cryptocurrency from a computer rather than a phone.
Exodus is available as both a mobile and desktop wallet, with synchronisation between devices. Electrum is a dedicated Bitcoin-only desktop wallet with a long track record and advanced features including multi-signature support and hardware wallet integration. Atomic Wallet is a multi-chain desktop option.
Desktop wallets are exposed to the broader threat surface of a computer environment, including browser-based malware, download infections, and remote access tools. As covered in our advanced crypto security resource, computers used for cryptocurrency management should be kept free of unnecessary software and used carefully to minimise malware exposure.
Browser extension wallets are installed as extensions in web browsers and serve as the primary interface for interacting with DeFi protocols, NFT marketplaces, and Web3 applications. They bridge the browser environment and the blockchain, allowing websites to request transaction signatures from your wallet.
MetaMask is the dominant browser extension wallet for Ethereum and EVM-compatible networks including Arbitrum, Optimism, Polygon, and others. Phantom is the leading browser extension wallet for Solana. Rabby is a newer Ethereum browser extension wallet with a focus on transaction simulation and improved security features.
Browser extension wallets are the most exposed category of software wallet because they interact continuously with websites and smart contracts. Malicious websites can request permissions, compromised extensions can expose private keys, and phishing sites can trick users into signing harmful transactions. Our how to secure your MetaMask wallet resource covers the specific security practices for browser extension wallets in detail.
Not all software wallets are the same in terms of who controls the private keys.
A non-custodial software wallet generates and stores your private keys on your own device. You and only you have access to the private keys and the corresponding seed phrase. The wallet provider has no ability to access your funds, freeze your assets, or recover your wallet if you lose your seed phrase. Trust Wallet, MetaMask, Exodus, and Electrum are all non-custodial: your keys, your coins.
A custodial software wallet is managed by a third party who holds the private keys on your behalf. The wallet apps of centralised exchanges like CoinSpot, Swyftx, and Binance are custodial wallets. The exchange controls the private keys and you access your balance through their interface. The exchange can recover your access if you forget your password, but they can also freeze your funds, restrict withdrawals, or lose your assets if the exchange is hacked or becomes insolvent.
As covered in our risks of keeping crypto on an exchange resource, custodial wallets carry counterparty risk that non-custodial wallets don’t. The principle “not your keys, not your coins” captures this distinction directly: custodial wallets mean someone else’s keys, someone else’s control.
For investors serious about self-custody, a non-custodial software wallet is the minimum standard. For significant long-term holdings, moving to a hardware wallet provides the next level of security.
The primary comparison for any investor considering self-custody is between software wallets and hardware wallets. Understanding the specific security difference clarifies when each is appropriate.
A software wallet stores private keys in software on an internet-connected device. The private key is encrypted and protected by a password, but it exists in a form that software on the device can access. If malware on the device can access the wallet’s storage location, it can potentially extract the private key.
A hardware wallet like a Ledger, Trezor, or Coldcard stores private keys inside a physically isolated chip that is specifically designed to never expose the private key to any external device. When a transaction needs to be signed, the transaction data is sent to the hardware device, signed inside the isolated chip, and only the signature (not the private key) is returned to the connected computer. Even if the computer is fully compromised by malware, the private key remains protected inside the hardware device.
This is the fundamental security advantage of hardware wallets: the private key never touches an internet-connected device. For long-term holdings and significant amounts, this additional security layer is the appropriate standard.
The practical tradeoff is convenience. A software wallet is always available on your phone or computer with no additional hardware required. A hardware wallet requires physical access to the device to sign transactions. For long-term holdings that don’t need to be moved frequently, this is an acceptable tradeoff. For active trading and DeFi interactions requiring frequent transactions, a software wallet provides the necessary accessibility.
As covered in our which cryptocurrency wallet is right for you and hot wallet explained resources, the right approach for most investors is a layered strategy: a hardware wallet for long-term holdings and a software wallet for active trading and DeFi allocations sized appropriately for the risk.
One of the most practical features of modern software wallets is multi-chain support: the ability to manage assets across multiple blockchain networks from a single application using a single seed phrase.
Trust Wallet, Exodus, and Coinbase Wallet all support dozens of networks from a single wallet interface. MetaMask supports Ethereum and any EVM-compatible network including Layer 2 networks like Arbitrum and Optimism. Phantom supports Solana and Ethereum.
Multi-chain wallets are important because the crypto ecosystem is multi-chain in practice. As covered in our cross-chain bridges explained and layer 2 solutions explained resources, active DeFi participants regularly interact with multiple networks. A wallet that requires separate applications and separate seed phrases for each network is both more complex to manage and creates more points of failure in seed phrase security.
A single seed phrase that generates addresses across multiple networks simplifies the backup: one seed phrase securely stored recovers all addresses on all supported networks.
The setup process for a software wallet contains several critical steps that, if done incorrectly, create permanent security vulnerabilities.
Download only from the official source. The official website of the wallet provider should be your starting point, not a search engine result, a social media link, or a recommendation in a forum. As covered in our fake wallet apps and extensions resource, fake wallet applications designed to steal seed phrases during setup are a persistent problem. Verify the URL is correct before downloading anything.
Write down your seed phrase correctly during setup. The wallet will display your seed phrase once during initial setup. Write every word in the correct order on paper. Verify that what you have written matches what the wallet displays. Do not photograph it, type it into any other application, or save it in a cloud service. The paper record of your seed phrase is the most important document you will create during wallet setup.
Store the seed phrase securely offline. As covered in our seed phrase and seed phrase storage advanced techniques resources, the seed phrase should be stored in a physically secure location, away from the device, protected from damage, and known only to you and any trusted person you specifically intend to have recovery access.
Set a strong wallet password. Most software wallets encrypt the stored private keys with a password. This password protects the wallet on the device: if someone gains physical access to your device, they cannot access the wallet without the password. Use a strong, unique password not used for any other service.
Test the backup before adding funds. After setup, verifying that your seed phrase is correct by restoring the wallet on a second device or through the wallet’s verification process before depositing funds confirms that your backup works and will allow recovery if needed.
Several security mistakes appear repeatedly among software wallet users and are worth knowing in advance.
Storing the seed phrase digitally. Saving the seed phrase in a notes app, email, cloud drive, password manager, or as a screenshot is one of the most common and most costly mistakes in cryptocurrency security. Any digital storage of a seed phrase is a potential compromise vector. Paper, stored physically and securely, is the correct storage medium.
Using the same wallet for everything. Using a single software wallet for long-term savings, active trading, and DeFi interactions means a single compromise or malicious approval affects everything. Maintaining separate wallets for different purposes with separate seed phrases limits the blast radius of any single security failure.
Signing transactions without reading them. Browser extension wallets display transaction details before asking for confirmation. Reading what is being signed, what permissions are being granted, and what amounts are involved before clicking confirm prevents many of the losses that occur through malicious smart contract interactions.
Keeping too much value in a software wallet. As covered in our hot wallet explained resource, the amount held in a software wallet should never exceed what can be afforded to lose entirely. Long-term significant holdings belong in cold storage on a hardware wallet.
Not updating the wallet application. Software wallets release updates that patch security vulnerabilities and add features. Keeping the wallet application updated to the current version ensures known vulnerabilities are addressed promptly.
For Australian investors using software wallets, maintaining adequate records for ATO crypto reporting obligations requires specific attention.
Every transaction from a software wallet is a potential tax event. Sending cryptocurrency in exchange for goods or services, swapping one cryptocurrency for another on a DEX, yield farming activity, and staking reward receipt all create tax obligations that require records of the AUD value at the time of each event.
Because software wallets are self-custodied and not connected to any exchange’s reporting system, the responsibility for record-keeping falls entirely on the wallet user. Using crypto tax software that can import transaction history directly from your wallet addresses via blockchain explorer API connections is the practical solution for managing this obligation without manually recording every transaction.
Keeping a record of all wallet addresses associated with your seed phrase ensures you can always retrieve full transaction history for ATO compliance purposes, even if the wallet application is no longer available. Our cryptocurrency tax Australia and how the ATO tracks your crypto transactions resources provide the full framework for understanding these obligations.
A software wallet is an application that stores private keys on an internet-connected device, allowing self-custodied management of cryptocurrency across mobile, desktop, and browser extension platforms. Non-custodial software wallets give you full control of your private keys, unlike custodial exchange wallets where the exchange holds the keys. The seed phrase is the master backup credential that must be written on paper, stored securely offline, and never shared or stored digitally. Software wallets are appropriate for active trading, DeFi interactions, and everyday amounts, sized so that holdings never exceed what can be afforded to lose. Significant long-term holdings belong in cold storage on a hardware wallet.
The layered approach, software wallet for active use, hardware wallet for long-term storage, represents the security standard that protects everyday functionality without compromising the safety of significant holdings.
For everyday investors building their cryptocurrency knowledge and wanting to take confident control of their own assets through proper self-custody practices, our Runite Tier Membership provides the education, frameworks, and community to do it safely. For serious investors who want personalised guidance on wallet security architecture, self-custody strategy, and protecting significant holdings across hot and cold storage, our Black Emerald and Obsidian Tier Members receive direct specialist support.
Find out more at shepleycapital.com/membership.
WRITTEN & REVIEWED BY Chris Shepley
UPDATED: MARCH 2026