How Crypto Wallets Work

A crypto wallet doesn't hold your crypto — it holds the cryptographic keys that prove your right to move it. This post explains key pairs, transaction signing, HD derivation, and how different wallet types (software vs hardware) differ in where signing happens.
Lewis Jackson
CEO and Founder

The name "wallet" is a misleading starting point. A physical wallet holds money. A crypto wallet holds something fundamentally different — cryptographic keys. The cryptocurrency itself lives on the blockchain, not inside any software or device you own. Understanding this distinction is the foundation of understanding how wallets actually work.

Most of the confusion people have about wallets, security, and self-custody traces back to this misunderstanding. If your crypto were stored "inside" your wallet, losing access to the wallet would be like losing cash under a mattress. But because blockchain state is maintained by a global network, your crypto doesn't disappear when a wallet is lost — it just sits there, inaccessible to anyone who doesn't have the corresponding private key.

The Key Pair Mechanism

Every wallet starts with a private key: a large random number, typically 256 bits for Bitcoin and Ethereum. From this private key, the protocol derives a corresponding public key using elliptic curve cryptography (Bitcoin and Ethereum both use secp256k1). From the public key, a public address is derived — the string starting with "0x" or "1" that you share with others to receive funds.

The relationship is one-directional. Given a private key, you can compute the public key and address. Given only a public address, you cannot work backward to the private key. The math makes reversal computationally infeasible — not merely difficult, but effectively impossible with any hardware that exists or is likely to exist for decades.

What the wallet actually does is store this private key and use it to construct cryptographic signatures. When you want to move funds on a blockchain, you're not sending coins out of a wallet — you're broadcasting a signed transaction message to the network that says: "I authorize this specific transfer," and including a signature that proves you hold the private key corresponding to the address those funds are locked to.

The network verifies the signature against the public key. If valid, the transaction is accepted and the blockchain state updates. No one touched "your coins" — the network simply accepted your proof of authority to change the record.

How Signing Actually Works

When you click "send" in a wallet, several things happen under the hood. The wallet constructs a transaction object specifying recipient, amount, and fee. It signs that transaction object with your private key using ECDSA (Elliptic Curve Digital Signature Algorithm) or Schnorr signatures (Bitcoin Taproot). The resulting signature can only have been produced by someone holding that private key — it's verifiable by anyone, but not forgeable.

This signature doesn't expose your private key. It's a one-way process. The signed transaction is broadcast to the peer-to-peer network, picked up by nodes and miners or validators, verified, and eventually included in a block.

What the wallet never does is broadcast your private key. If it did, someone else could use it to sign their own transactions spending your funds. The security model depends entirely on the private key staying private.

HD Wallets and Seed Phrases

Modern wallets don't manage a single key pair. They use hierarchical deterministic (HD) derivation, defined by BIP-32 and BIP-39, to generate an entire tree of key pairs from a single root.

That root is your seed phrase — typically 12 or 24 words generated from a standardized word list (BIP-39 defines 2,048 possible words). The wallet converts this mnemonic into a 512-bit root seed, then deterministically derives child keys at specific paths. Ethereum wallets typically derive from m/44'/60'/0'/0/0; Bitcoin wallets use m/44'/0'/0'/0/0. The paths are standardized across wallet software, which is why you can import a seed phrase into a different wallet app and recover all your addresses.

This is consequential: the seed phrase is the private key(s), in recoverable form. Anyone who has your seed phrase can derive all your private keys and move all your funds from any device, anywhere in the world. This isn't a flaw — it's the designed recovery mechanism. But it means seed phrase security is the actual security boundary, not the wallet app or device.

Software Wallets vs Hardware Wallets

The distinction between wallet types comes down to where the private key is stored and where signing happens.

Software wallets (MetaMask, Phantom, Trust Wallet) store the encrypted private key on the device running the app. The key is present in memory when you sign a transaction. A compromised device — malware, phishing, keylogger — can expose this key. The convenience of always-connected access comes with that exposure surface.

Hardware wallets (Ledger, Trezor) store the private key in a dedicated secure element that never exposes the key to the connected device. When you sign a transaction, the transaction is sent to the hardware wallet, signed internally, and the signed result is returned — without the key ever leaving the device. Even if your computer is fully compromised, an attacker can't extract the key. They could, however, manipulate what you're signing (the "address spoofing" attack on transaction display), which is why hardware wallet screen verification matters.

The difference is the signing environment, not the signing algorithm. Both devices use the same cryptography.

Where the Constraints Live

Three constraints define the system's security boundaries.

Key custodianship is the primary one: whoever holds the private key controls the funds. There's no password reset, no customer support escalation, no legal recourse against the protocol. "Not your keys, not your coins" is a description of the mechanism, not an ideology.

Key loss is permanent. Unlike a password, a lost private key cannot be recovered through any computational process. Estimates suggest 15–20% of all Bitcoin is permanently inaccessible due to lost keys. The network doesn't distinguish between "I lost my key" and "these funds are intentionally unspendable."

Smart contract wallet exceptions are worth noting: some wallets use smart contracts with social recovery mechanisms that allow a trusted set of contacts to authorize key replacement. These systems exist (Argent, Safe) but require the recovery mechanism to be set up in advance, and they introduce their own trust and security model.

What's Changing

Account abstraction (ERC-4337, Ethereum) is the most significant structural shift. It allows smart contract accounts — not just externally owned accounts controlled by private keys — to initiate transactions. This enables programmable wallets with recovery options that don't depend on preserving a single seed phrase, transaction batching, session keys with limited permissions, and fee payment in non-ETH tokens.

Passkey integration is beginning to appear in wallet implementations — using device biometrics and secure enclaves (the same technology that protects Apple Pay) as the signing layer rather than raw seed phrases. This reduces the "one seed phrase compromises everything" surface.

MPC (multi-party computation) wallets distribute key fragments across multiple parties so no single party holds the complete key — useful for institutional custody without hardware wallet constraints.

None of these eliminate the core mechanism. They modify how keys are generated, stored, and recovered, while the signature-based authorization model remains the same.

What Would Confirm the Account Abstraction Direction

Observable signals: account abstraction wallet deployments growing as a share of active Ethereum addresses; session key and guardian recovery patterns appearing in real usage; seed-phrase-free onboarding reducing early user loss. EIP progress through Ethereum's development process is public and trackable.

What Would Break It

If ERC-4337 smart contract logic contains exploitable vulnerabilities, account abstraction wallets could have worse security properties than EOAs despite better UX. Passkey integration creates dependence on device manufacturers' secure enclaves — a new trust layer. Widespread adoption of smart contract wallets also means widespread exposure to smart contract risk, which doesn't exist in traditional key-based wallets.

Timing Perspective

Now: The dominant model is still seed-phrase EOAs (externally owned accounts). Hardware wallets are the highest-assurance self-custody option available to individuals. Most users interacting with DeFi are using software wallets with seed phrases stored somewhere insecure.

Next (2026–2027): Account abstraction and passkey-based wallets moving from experimental to mainstream adoption as UX improvements make them accessible. This is likely to be the most significant structural shift in how non-technical users hold crypto.

Later: Whether smart contract wallets meaningfully replace seed-phrase models depends on AA wallet security track record and whether device-based authentication becomes acceptable to the segment of users who prefer cryptographic self-sufficiency.

What This Doesn't Cover

This explains the mechanism by which wallets work: key pairs, signing, derivation, and storage environments. It doesn't cover specific wallet software comparisons, how to set up a hardware wallet, or the tax implications of wallet activity.

The core mechanism — prove key ownership, broadcast a signature, network accepts the transaction — hasn't changed since Bitcoin launched in 2009. The wallet software around it has become significantly more sophisticated.

Related Posts

See All
Crypto Research
New XRP-Focused Research Defining the “Velocity Threshold” for Global Settlement and Liquidity
A lot of people looking at my recent research have asked the same question: “Surely Ripple already understands all of this. So what does that mean for XRP?” That question is completely valid — and it turns out it’s the right question to ask. This research breaks down why XRP is unlikely to be the internal settlement asset of CBDC shared ledgers or unified bank platforms, and why that doesn’t mean XRP is irrelevant. Instead, it explains where XRP realistically fits in the system banks are actually building: at the seams, where different rulebooks, platforms, and networks still need to connect. Using liquidity math, system design, and real-world settlement mechanics, this piece explains: why most value settles inside venues, not through bridges why XRP’s role is narrower but more precise than most narratives suggest how velocity (refresh interval) determines whether XRP creates scarcity or just throughput and why Ripple’s strategy makes more sense once you stop assuming XRP must be “the core of everything” This isn’t a bullish or bearish take — it’s a structural one. If you want to understand XRP beyond hype and price targets, this is the question you need to grapple with.
Read Now
Crypto Research
The Jackson Liquidity Framework - Announcement
Lewis Jackson Ventures announces the release of the Jackson Liquidity Framework — the first quantitative, regulator-aligned model for liquidity sizing in AMM-based settlement systems, CBDC corridors, and tokenised financial infrastructures. Developed using advanced stochastic simulations and grounded in Basel III and PFMI principles, the framework provides a missing methodology for determining how much liquidity prefunded AMM pools actually require under real-world flow conditions.
Read Now
Crypto Research
Banks, Stablecoins, and Tokenized Assets
In Episode 011 of The Macro, crypto analyst Lewis Jackson unpacks a pivotal week in global finance — one marked by record growth in tokenized assets, expanding stablecoin adoption across emerging markets, and major institutions deepening their blockchain commitments. This research brief summarises Jackson’s key findings, from tokenized deposits to institutional RWA chains and AI-driven compliance, and explains how these developments signal a maturing, multi-rail settlement architecture spanning Ethereum, XRPL, stablecoin networks, and new interoperability layers.Taken together, this episode marks a structural shift toward programmable finance, instant settlement, and tokenized real-world assets at global scale.
Read Now

Related Posts

See All
No items found.
Lewsletter

Weekly notes on what I’m seeing

A personal letter I send straight to your inbox —reflections on crypto, wealth, time and life.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.