Glossary

Cold Storage

Storing cryptocurrency private keys on devices that are never connected to the internet, maximizing security against remote attacks.

Key Takeaways

  • Cold storage keeps private keys on devices that never connect to the internet, eliminating the entire category of remote attack vectors: malware, phishing, server breaches, and network exploits cannot reach keys that have no network path.
  • Common cold storage methods include hardware wallets, air-gapped computers, and paper wallets. Each involves tradeoffs between security, usability, and resilience to physical damage. The choice depends on the value being secured and how frequently you need to transact.
  • Spending from cold storage requires a multi-step signing workflow: construct the transaction on an online device, transfer it to the offline signer via PSBT, sign offline, then broadcast the signed transaction. This deliberate friction is the security model.

What Is Cold Storage?

Cold storage refers to any method of holding cryptocurrency private keys on a device or medium that is never connected to the internet. The core principle is simple: a key that has never been online cannot be stolen through a network-based attack. No amount of malware, phishing links, compromised servers, or zero-day exploits can reach a private key that exists only on an air-gapped device sitting in a safe.

The term borrows from physical asset storage. Just as gold in a vault is "cold" compared to cash in a register, cryptocurrency keys stored offline are "cold" compared to keys in a hot wallet that stays connected for instant transactions. Cold storage sacrifices convenience for security: you cannot sign a transaction instantly because the signing device must be retrieved, powered on, and physically interacted with.

For individuals and institutions holding significant Bitcoin balances, cold storage is considered a baseline security practice. Exchanges, custodians, and treasury operations typically keep the vast majority of funds in cold storage, moving only what is needed for daily operations into hot wallets.

How It Works

Cold storage security rests on one assumption: the device holding the private key has never been and will never be connected to any network. This means the key material exists in complete isolation. To spend funds, you need a workflow that bridges the gap between the online world (where transactions are constructed and broadcast) and the offline world (where keys live and signatures happen).

Transaction Signing Workflow

Spending from cold storage involves transferring unsigned transaction data to the offline device, signing it there, and transferring the signed result back. The standard approach uses Partially Signed Bitcoin Transactions (PSBTs):

  1. On an online (watch-only) wallet, construct the transaction: select UTXOs to spend, set the destination address and amount, calculate the fee
  2. Export the unsigned transaction as a PSBT file
  3. Transfer the PSBT to the cold storage device via a secure channel: SD card, QR code, or USB drive (never over a network)
  4. On the cold device, review the transaction details: verify addresses, amounts, and fees
  5. Sign the transaction with the private key on the cold device
  6. Transfer the signed PSBT back to the online device via the same air-gapped channel
  7. The online wallet finalizes and broadcasts the signed transaction to the Bitcoin network

This workflow ensures the private key never touches an internet-connected device. The PSBT format was designed specifically for this use case: it carries all the information a signer needs (input details, derivation paths, scripts) without requiring the signer to be online.

PSBT in Practice

A PSBT-based cold storage workflow using Bitcoin Core and an air-gapped signing device looks like this:

# On the online watch-only wallet:
# Create an unsigned PSBT spending from the cold wallet
bitcoin-cli walletcreatefundedpsbt \
  '[]' \
  '[{"bc1q...destination": 0.5}]' \
  0 \
  '{"changeAddress": "bc1q...change"}'

# Result: a base64-encoded PSBT string
# Transfer this string to the offline device via SD card or QR code

# On the air-gapped signing device:
# Decode and review the PSBT
bitcoin-cli decodepsbt "cHNidP8BA..."

# Sign with the cold wallet's keys
bitcoin-cli walletprocesspsbt "cHNidP8BA..."

# Transfer the signed PSBT back to the online device

# On the online device:
# Finalize and broadcast
bitcoin-cli finalizepsbt "cHNidP8BA...signed..."
bitcoin-cli sendrawtransaction "0200000001..."

Hardware wallets simplify this flow significantly. Instead of managing command-line tools on two separate computers, you plug in (or scan a QR code with) the hardware wallet, confirm the transaction on its screen, and the signed PSBT is returned to your software wallet for broadcast.

Types of Cold Storage

Hardware Wallets

Hardware wallets are purpose-built devices that store private keys in a secure element chip and never expose them to the host computer. When you connect a hardware wallet to your laptop, the laptop sends unsigned transactions to the device, and the device returns signatures. The private key never leaves the chip.

Popular hardware wallets include Ledger, Trezor, Coldcard, and BitKey. They range from simple USB devices with small screens to fully air-gapped devices that communicate only via QR codes or microSD cards. The secure element resists physical tampering: even if someone steals the device, extracting the key requires expensive, specialized equipment and is not guaranteed to succeed.

Hardware wallets typically generate keys from a seed phrase following the HD wallet standard. This means you can recover your funds on a new device if the original is lost or damaged, as long as you have the seed phrase backup.

Air-Gapped Computers

An air-gapped computer is a standard computer that has never been connected to any network. Some users go further: removing Wi-Fi cards, disabling Bluetooth, and even filling USB ports with epoxy after initial setup. The machine runs wallet software (such as Electrum or Bitcoin Core) and stores keys locally.

Data transfer happens via microSD cards, USB drives, or QR codes displayed on screen and scanned by a camera. This approach offers maximum control and transparency: you can audit every piece of software running on the machine. The tradeoff is complexity. Maintaining an air-gapped computer requires discipline: firmware updates must be transferred manually, software must be verified offline, and the machine must be stored securely.

Paper Wallets

A paper wallet is a printed copy of a private key (or seed phrase) on physical paper. The simplest form of cold storage, it predates hardware wallets and involves generating a key pair on an offline computer, printing it, and destroying the digital copy.

Paper wallets are largely considered outdated for practical use. They are fragile (vulnerable to fire, water, and fading), difficult to spend from without importing the key into a hot wallet (which defeats the purpose), and prone to user error during generation. Metal seed phrase backups (stamped or engraved on steel plates) address the durability issue but share the usability limitations.

Comparison

MethodSecurityUsabilityCostBest For
Hardware walletHigh (secure element)Moderate$50-$250Most users
Air-gapped computerVery high (full audit)Low$200-$500+High-value holdings, technical users
Paper/metal backupHigh (no electronics)Very low$10-$50Seed phrase backup only

Use Cases

Long-Term Holdings

Bitcoin held as a long-term savings vehicle does not need to be spent frequently. Cold storage is ideal for these holdings because the inconvenience of the signing workflow is irrelevant when you transact once a year or less. The security benefit far outweighs the friction.

Exchange and Custodian Reserves

Cryptocurrency exchanges keep the majority of customer deposits in cold storage, moving only enough to hot wallets to cover expected withdrawal volume. This limits the blast radius of a security breach: even if an attacker compromises the exchange's servers, they can only access the hot wallet fraction. Custodial operations often combine cold storage with multisig schemes so that no single person or device can authorize a withdrawal from the cold vault.

Treasury Management

Companies holding Bitcoin on their balance sheet use cold storage with corporate governance controls. A typical setup might require three of five hardware wallets (held by different executives in different locations) to sign any transaction, combining cold storage isolation with threshold signature schemes for operational security.

Inheritance Planning

Cold storage backups (seed phrases on metal plates stored in safety deposit boxes or with attorneys) provide a mechanism for passing cryptocurrency to heirs. The offline nature means the backup can sit untouched for decades without degradation risk from software updates, server shutdowns, or service provider failures.

Risks and Considerations

Physical Theft

Cold storage shifts the attack surface from digital to physical. An attacker who gains physical access to your hardware wallet or seed phrase backup can potentially steal your funds. Mitigations include:

  • Using a strong PIN or passphrase on hardware wallets so the device is useless without the code
  • Storing seed phrase backups in secure locations: bank vaults, safes, or distributed across multiple geographic locations
  • Using multisig setups where stealing a single device is insufficient to move funds
  • Adding a BIP39 passphrase (sometimes called the "25th word") so the seed phrase alone cannot access the primary wallet

Coercion Attacks

Sometimes called the "$5 wrench attack": an adversary physically threatens you to hand over keys or sign a transaction. Unlike remote attacks, cold storage cannot defend against someone standing in front of you with force. This is a real concern for publicly known holders of significant cryptocurrency.

Defenses include plausible deniability wallets (decoy wallets with small balances), time-locked transactions that cannot be rushed, multisig requiring cooperation from parties in different locations, and simply not publicly disclosing holdings. Some hardware wallets support a duress PIN that opens a decoy wallet with limited funds.

Loss and Damage

Hardware fails. Paper burns. Metal corrodes (eventually). If your cold storage device is destroyed and you have no backup of the seed phrase, the funds are permanently inaccessible. This is the fundamental tension of self-custody: you eliminate counterparty risk but assume full responsibility for preservation.

Best practice is maintaining redundant backups of the seed phrase in different physical locations. A common pattern: one metal backup in a home safe, one in a bank safety deposit box, and the hardware wallet itself as the third copy. Some users split the seed phrase using Shamir's Secret Sharing so that no single backup location contains the full seed.

Operational Complexity

Every interaction with cold storage introduces opportunities for user error. Sending a PSBT to the wrong device, accidentally exposing a seed phrase during backup verification, mistyping an address during transaction construction: these operational risks are real and have caused losses. The more complex the setup (multisig across multiple hardware wallets, air-gapped signing ceremonies), the more potential failure points exist.

For institutions, formal signing procedures, dual-control requirements, and regular backup verification drills reduce operational risk. For individuals, keeping the setup as simple as your security requirements allow is often the best approach.

Security vs. Convenience

Cold storage is not appropriate for funds you need to spend quickly or frequently. The signing workflow takes minutes at minimum, and retrieving a device from a secure location could take hours or days. Most users benefit from a layered approach: keep daily spending funds in a hot wallet and long-term savings in cold storage.

Layer 2 solutions like Spark offer an alternative model for balancing security and usability: funds can be held with strong cryptographic guarantees while remaining instantly spendable, reducing the need to choose between cold storage security and hot wallet convenience.

This glossary entry is for informational purposes only and does not constitute financial or investment advice. Always do your own research before using any protocol or technology.