In Lesson 2, you learned that cryptographic keys secure your assets. In practice, you interact with these keys through a **Wallet**. Understanding how your wallet holds these keys is the most critical security step.
This is a list of 12 or 24 words (e.g., `apple fence tiger rocket...`). It is **NOT** your password.
This is a single, long alphanumeric string (e.g., `E987DAF3...`).
You have three keys. The goal is to keep the **Seed Phrase** in Cold Storage (safe/offline).
**Drag only the MASTER KEY here.**
Wallet security is categorized by how often the keys touch the internet.
**HIGH RISK**
Always connected to the internet (e.g., MetaMask browser extension, mobile app, exchange account).
**LOW RISK**
Keys are stored offline (e.g., Hardware Wallets like Ledger/Trezor, paper wallet).
The strength of a hardware wallet is the **physical barrier**. The private key never leaves the device.
**Scenario:** You need to send 1 ETH. This is how the process works with a secure device:
Operational Security (OpSec) is about protecting information and assets through careful practices. **You** are the first and last line of defense.
For large funds, never rely on one key. A **Multi-Signature (Multi-Sig)** wallet requires multiple private keys (like 2 out of 3 people) to sign a transaction.
**Analogy:** A bank vault that requires the Manager's key AND the Assistant Manager's key to open.
Never keep all your crypto in one place. Treat your wallets like checking and savings accounts:
When you use a decentralized app (DApp), you often give the DApp's smart contract **permission** to spend your tokens (an 'Allowance'). If that contract is hacked later, an attacker can drain your funds using that old permission.
You approved two contracts a year ago. One is known to be hacked. Find the risky contract and revoke its allowance!
Allowance: 1,000 DAPP Tokens
Status: Unknown Risk
Allowance: **Unlimited** DAPP Tokens
Status: **🚨 HIGH RISK / COMPROMISED**
Question 1: What is the primary advantage of a **Cold Wallet** over a Hot Wallet?
Question 2: What crucial security function does the **Hardware Wallet** perform during a transaction?
Question 3: If an attacker steals a smart contract's allowance (permission) to spend your tokens, which OpSec principle did you likely forget?
Question 4: What is the only key/phrase that can regenerate ALL your accounts?