What is the meaning of releasability in digital currency wallet
anmao wallet
anmao wallet is a light wallet developed by Hangzhou anmao blockchain Technology Co., Ltd., which saves storage space compared with the full node wallet. And it is a multi currency Cross Chain Wallet, which supports BTC, BCH, LTC, ETH, etc, dash and erc-20 series of tokens. At present, it is the most complete currency digital currency wallet in the true sense
anmao wallet is the only digital currency wallet that supports Chinese mnemonics. It is composed of 12 Chinese characters, which is convenient for memory and in line with Chinese reading habits
the biggest feature of anmao wallet is that it well applies the scalability of light wallet. While managing a variety of digital assets, it has embedded DAPP list and anmao fishpond mining game. The tokens are directly stored in the wallet, which is convenient, labor-saving and interesting. It can be said that it is a wallet that will make money
with embedded Android block browser, each transaction can be queried in real time by using transaction address, block height and transaction ID, which is accurate
there are also market and information DAPP, a multi-functional digital currency wallet
deficiency: no trading function
imtoken
imtoken is a digital currency wallet that supports eth, erc-20 token, bitcoin HD wallet, isolation witness, EOS and other tokens in EOS main network. A set of mnemonics can create wallet accounts in multiple currencies, thus saying goodbye to the complicated backup management. It is a Multi Chain Wallet
imtoken supports the sending and receiving of digital currency and the currency transaction of Ethernet series. With the help of blockchain intelligent contract, it does not need to trust a third party to complete the currency exchange directly at the mobile terminal. Token management function is easy to operate, automatically discover tokens, and no need to add them manually; It supports one click search and can easily view and manage multiple tokens
the private key of imtoken is self-contained, which further guarantees the security
deficiency: imtoken only supports digital currency based on eth main chain, and tokens of its own public chain such as BTC and CTC cannot be stored. It only supports eth as a service charge when transferring, which has some limitations
bitpai
bitpai wallet is a new generation of blockchain asset comprehensive service platform developed by bitpai team, which is based on HD wallet technology, multi signature and on chain transaction. It can easily and safely use digital currency and easily send and receive bitcoin on bitpai. At present, the main supported currencies are BTC, BTC, ETH, some erc2.0 tokens, qtum, HSR, dash, safe, LTC, LCH, Zec, etc and Doge
bitpai supports multi address coin issuing, built-in OTC and exchange (third-party service), and can trade with users from all over the world, which is more suitable for professional users of coin circle who trade frequently and have OTC demand
in terms of security, the user controls the private key, and after the transaction, the coin is directly kept by the user. If it does not operate for a long time, bitpie will automatically lock, further improving the security of the wallet
deficiency: for initial users, too many and complex functions are a kind of burden. They only need to send and receive digital currency simply. Too many complex functions increase the learning time cost of users and affect the experience of wallet users
wheat wallet
wheat wallet is a digital wallet that supports eth, Neo and EOS token at the same time. It has built-in face, voiceprint, living body and other biometric technologies to ensure asset security, which is unique in the current wallet
wheat wallet supports the interfaces of mainstream exchanges such as coin an, fire coin, gateio and okex to automatically obtain position data
the UI design of wheat wallet has a good experience for users in human-computer interaction, interface logic and beautiful interface. The first operation can know the functional process, in an intuitive way to let users understand how to interact with the software, the interface design has a wheat uniform style
deficiency: there are few supported currencies. In the application mole, each application or active section is the width of a mobile phone screen, with a maximum of 2.5 applications displayed on the same screen. Although it looks very generous and beautiful, it will be cumbersome to find an application, and it needs to slide down continuously
atoken
atoken is a mobile wallet supporting multi currency cross chain exchange, which is safe and convenient. At present, it supports BTC, LTC, ETH, etc, Doge, EOS and other main chain currencies; BCD, BTG, BCH, SBTC, etc; Support all tokens of Ethereum erc20
users hold their own private key, which is stored in app with multiple encryption. They do not access the server in any form, and no one else can touch your digital assets; The wallet adopts 5-layer HD, horizontal isolation and vertical defense architecture; Pbkdf2, sha-512 and other encryption algorithms are used. At the same time, atoken implements the transaction acceleration function of wallet and supports the transaction acceleration of bitcoin and Ethereum
deficiency: there is no market information in the wallet, so it is inconvenient for users to use
The digital currency wallet is the hardware wallet, which means that the private key of digital assets is stored in a single chip, isolated from the Internet, plug and play. Hardware wallet can't guarantee 100% security. For example, if a geek gets your hardware wallet and doesn't know your private key, it may be cracked by violence. It's just one of the safest storage methods compared to other storage methods
many block chain entrepreneurs at home and abroad are optimistic about the development of this field, so they begin to build more hardware wallets. In the case of the exchange being stolen a lot of money and the software wallet being stolen from time to time, many investors regard the hardware wallet as the last moat
extended information:
whether the hardware wallet is safe
the hardware wallet can not guarantee 100% security. For example, if a geek obtains your hardware wallet, it may be cracked violently even if it doesn't know your hardware wallet immediately. It's just one of the safest storage methods compared to other storage methods
of course, there are exceptions, such as you have unlimited brain power and never forget. It's better to save it anywhere than in your own mind
at the same time, Kushen users can set seed password and payment password to strengthen the multiple protection of Kushen wallet
the layered certainty of Kushen digital currency wallet allows users to manage multiple bitcoin addresses with a single seed password
Kushen digital currency wallet is easy to use. Kushen users can set service charges and multiple target bitcoin address book on the wallet to facilitate the management of multi account digital assets
Kushen digital currency wallet has only one screen as a single output device and only one camera as a single input device. He communicates with Kushen Internet app through two-dimensional code communication.
1. Security risk of running environment
the core file of encrypted digital currency Wallet - private key / mnemonics is stored on the terminal device, whether it is PC or mobile terminal, if the terminal device appears unsafe phenomenon, it has a very high security risk for private key / mnemonics
at the beginning of design, a secure digital wallet can avoid the possibility of private key / mnemonics being stolen e to the running environment. The security problems of the running environment on the terminal mainly include virus software, operating system vulnerabilities and hardware vulnerabilities
2. The security risk of network transmission
the security of network transmission is more reflected in the ability to resist man in the middle attack. Man in the middle attack means that the attacker creates independent contact with both ends of the communication and exchanges the data they receive, so that both ends of the communication think that they are talking directly with each other through a private connection, but in fact the whole conversation is completely controlled by the attacker
although most digital wallet applications use the HTTPS protocol to communicate with the server, the man in the middle attack method is to get the content of the HTTPS protocol by installing a digital certificate in the user terminal
a secure digital wallet needs to be able to scan the legality of all the digital certificates in the terminal, check the proxy settings in the network transmission process, and ensure the security of the basic network communication environment
in the development of digital wallet, whether to use two-way verification for communication verification at the network transmission level is also an important criterion to measure the security of a digital wallet application
3. The security risk of file storage mode
for the private key / mnemonics of digital wallet, the storage mode of terminal device also needs to be paid attention to in the security design. The access right of private key / mnemonic file directory, the form of private key / mnemonic file storage and the design of encryption algorithm all need to be strictly designed
when we analyze the security of several mainstream digital wallets, we find that even the well-known digital wallets are random in the storage of private key / mnemonic words. There are both plaintext storage and encrypted storage, but the decryption key is fixed in the code, which can not play any role in security defense
4. The security risk of the application itself
the security risk of the application itself mainly focuses on the security defense of the application installation package itself
whether the application installation package has the ability of anti tampering is a very core technical ability. In addition, memory security, anti debugging ability, life cycle management of private key / mnemonics, security of debugging log and security of development process also need to be enhanced
5. Security risk of data backup
if the mobile application can be backed up, it can use the machine with more powerful computing performance to brutally crack the private key / mnemonics. For example, if android:allowBackup Property is set to allow backup, then the backup mechanism of the system can be used to back up the application data files, and the private key / mnemonics of the encrypted digital currency will be backed up to the external media, which breaks the security boundary design of the operating system from another direction
for the majority of users, the security of digital wallet also means the security of wealth, so we must be careful when choosing digital wallet.