Note: On December 12, the U.S. SEC officially published a document providing retail investors with basic knowledge on accepting cryptocurrency custody, helping Note: On December 12, the U.S. SEC officially published a document providing retail investors with basic knowledge on accepting cryptocurrency custody, helping

The US SEC teaches you step-by-step how to manage your crypto assets.

2025/12/16 09:00

Note: On December 12, the U.S. SEC officially published a document providing retail investors with basic knowledge on accepting cryptocurrency custody, helping them decide how best to hold their cryptocurrency assets.

Translated by Jinse Finance:

This investor bulletin issued by the U.S. Securities and Exchange Commission's Office of Investor Education and Assistance aims to help retail investors understand how to hold crypto assets. This bulletin outlines the types of crypto asset custody and provides tips and answers to frequently asked questions to help you decide how best to hold your crypto assets.

I. What is crypto asset custody?

Crypto asset "custody" refers to how and where you store and access your crypto assets. You typically access your crypto assets through a device or computer program called a crypto wallet. Crypto wallets themselves do not store crypto assets; instead, they store the "private key" or password for your crypto assets.

When creating an encrypted wallet, the following two keys or passwords are generated:

  1. Private key. A private key is a randomly generated alphanumeric password used to authorize transactions of crypto assets. It's like the password for your crypto wallet. Once created, a private key cannot be changed or replaced. If you lose your private key, you will permanently lose access to the crypto assets in your wallet.

  2. Public key. A public key is another type of code used to verify transactions and allow others to send crypto assets to your crypto wallet. The public key does not have access to the private key in the wallet and cannot be used to authorize transactions. The public key is like the email address of your crypto wallet.

These keys together prove your ownership of the crypto assets and give you the right to send, receive, or use them.

II. Hot Wallets and Cold Wallets

There are many types of cryptocurrency wallets, and retail investors hold them in various ways. Cryptocurrency wallets are mainly divided into two categories: "hot wallets" and "cold wallets." Hot wallets are cryptocurrency wallets connected to the internet, and can be desktop applications, mobile applications, or web applications. Hot wallets allow you to easily access and trade your crypto assets, but they also expose your crypto assets to cyber threats.

A cold wallet typically refers to a physical device that is not connected to the internet, such as a USB flash drive, external hard drive, or even a piece of paper. For cryptocurrency transactions, cold wallets are generally less convenient than hot wallets. However, because cold wallets are not connected to the internet, they are usually more resistant to cyber threats than hot wallets. Nevertheless, the physical device containing a cold wallet can still be lost, damaged, or stolen, resulting in the permanent loss of your cryptocurrency assets.

Protect your mnemonic phrase! Many crypto wallets generate a "mnemonic phrase," also known as a mnemonic recovery phrase, backup mnemonic phrase, or memory phrase. A mnemonic phrase is a string of random words that can help you recover your wallet if you lose it or your private key, or if your wallet's hardware or software is damaged. Please keep your mnemonic phrase in a safe place and never share it with anyone.

III. Self-management and Third-Party Management

You will also need to decide whether to self-custody your crypto assets (self-custody) or entrust them to a third party (third-party custody). Both self-custody and third-party custody offer hot wallet and cold wallet options.

Self-managed

By adopting a self-custodial approach, you gain complete control over your crypto assets and are responsible for managing the private keys of all your crypto wallets. This means you have full control over access to your crypto asset private keys, and you bear full responsibility for their security. If your crypto wallet is lost, stolen, damaged, or hacked, you may permanently lose access to your crypto assets.

Key Issues When Choosing a Self-Custodial Crypto Asset Solution

  • Are you capable of easily setting up and maintaining your crypto wallet? Setting up and maintaining a crypto wallet yourself may require some technical knowledge. Please ensure you are competent in all the technical aspects required to set up and maintain your crypto wallet.

  • Do you want complete control over your crypto assets? Self-custody gives you full control over your crypto assets. You are fully responsible for safeguarding the private keys and mnemonic phrases of your crypto assets. If these keys or mnemonic phrases are lost or stolen, you may lose access to your crypto assets.

  • Which type of crypto wallet do you want to use? As mentioned above, you can use either a hot wallet or a cold wallet to store your crypto assets. When choosing the type of crypto wallet that best suits you, carefully consider your convenience and security needs.

  • How much do crypto wallets cost? The physical device for a cold wallet usually needs to be purchased, while a hot wallet may initially be free. However, using a wallet for transactions typically incurs fees. Be sure to understand these fees before choosing a crypto wallet or conducting transactions.

escrow

By using third-party custody, you can choose a professional custodian or service provider to hold your crypto assets. Third-party custody institutions include cryptocurrency exchanges and specialized crypto asset custody service providers. The third-party custodian is responsible for managing and controlling access to your crypto asset private keys. The account used by the third-party custodian to hold your crypto asset private keys may be a cold wallet, a hot wallet, or a combination of both. If the third-party custodian is hacked, goes bankrupt, or becomes insolvent, you may lose access to your crypto assets.

Key Issues When Choosing a Third-Party Custodian

  • Have you investigated the background of the custodian? Be sure to take the time to thoroughly research any third-party custodian. Search online for any complaints about the custodian. Find out how the custodian is regulated. Although the regulatory framework for the crypto asset industry is still in its early stages, a certain level of regulation already exists.

  • What types of crypto assets can I hold with my custodian? The types of crypto assets allowed vary from custodian to custodian. Please ensure that your custodian allows you to hold the types of crypto assets you wish in your account.

  • What happens if the custodian goes bankrupt? Find out if the custodian offers insurance against the loss or theft of your crypto assets, and make sure you understand its terms and conditions.

  • How does the custodian store and protect your crypto assets? Ask the custodian how they protect your crypto assets and private keys, and who has access to them. Does the custodian store your crypto assets in their own facilities, or outsource their storage to a third party? Does the custodian use hot wallets, cold wallets, or other methods? What type of crypto wallets do they primarily use, and how do they determine the location for storing your crypto assets? Additionally, ask the custodian what types of physical and cybersecurity protocols and procedures they use to protect your crypto assets.

  • How do third-party custodians use your crypto assets? Some custodians will use your deposited crypto assets as collateral for their own purposes (e.g., lending). This is sometimes referred to as "recollateralization." To reduce costs, some custodians may also mulch crypto assets together rather than holding them separately for their clients. Please find out if your custodian uses any of these practices and, if so, whether your consent is required.

  • What privacy protections do custodians offer? Look for custodians that can protect your sensitive personal information (such as your name, address, Social Security number, and the types of crypto assets you own or have bought or sold). Ask the custodian if they will sell any customer data to third parties, and if so, whether they need your consent.

  • What account fees does the custodian charge? Please ask the custodian about the annual asset management fee (annual fee based on the value of your crypto assets), trading fees (the cost of using or trading crypto assets), asset transfer fees (the cost of transferring your crypto assets outside the custodian), and account opening and closing fees.

IV. General Recommendations for Protecting Crypto Assets

  1. Carefully research and select any third-party escrow service provider.

  2. Never reveal your private key or mnemonic phrase.

  3. Protect the privacy of your crypto assets. Do not share the quantity or type of crypto assets you own with anyone.

  4. Beware of crypto asset phishing scams.

  5. Use strong passwords and multi-factor authentication for all online encrypted asset accounts.

Piyasa Fırsatı
Talus Logosu
Talus Fiyatı(US)
$0.01262
$0.01262$0.01262
-25.32%
USD
Talus (US) Canlı Fiyat Grafiği
Sorumluluk Reddi: Bu sitede yeniden yayınlanan makaleler, halka açık platformlardan alınmıştır ve yalnızca bilgilendirme amaçlıdır. MEXC'nin görüşlerini yansıtmayabilir. Tüm hakları telif sahiplerine aittir. Herhangi bir içeriğin üçüncü taraf haklarını ihlal ettiğini düşünüyorsanız, kaldırılması için lütfen [email protected] ile iletişime geçin. MEXC, içeriğin doğruluğu, eksiksizliği veya güncelliği konusunda hiçbir garanti vermez ve sağlanan bilgilere dayalı olarak alınan herhangi bir eylemden sorumlu değildir. İçerik, finansal, yasal veya diğer profesyonel tavsiye niteliğinde değildir ve MEXC tarafından bir tavsiye veya onay olarak değerlendirilmemelidir.

Ayrıca Şunları da Beğenebilirsiniz

The Channel Factories We’ve Been Waiting For

The Channel Factories We’ve Been Waiting For

The post The Channel Factories We’ve Been Waiting For appeared on BitcoinEthereumNews.com. Visions of future technology are often prescient about the broad strokes while flubbing the details. The tablets in “2001: A Space Odyssey” do indeed look like iPads, but you never see the astronauts paying for subscriptions or wasting hours on Candy Crush.  Channel factories are one vision that arose early in the history of the Lightning Network to address some challenges that Lightning has faced from the beginning. Despite having grown to become Bitcoin’s most successful layer-2 scaling solution, with instant and low-fee payments, Lightning’s scale is limited by its reliance on payment channels. Although Lightning shifts most transactions off-chain, each payment channel still requires an on-chain transaction to open and (usually) another to close. As adoption grows, pressure on the blockchain grows with it. The need for a more scalable approach to managing channels is clear. Channel factories were supposed to meet this need, but where are they? In 2025, subnetworks are emerging that revive the impetus of channel factories with some new details that vastly increase their potential. They are natively interoperable with Lightning and achieve greater scale by allowing a group of participants to open a shared multisig UTXO and create multiple bilateral channels, which reduces the number of on-chain transactions and improves capital efficiency. Achieving greater scale by reducing complexity, Ark and Spark perform the same function as traditional channel factories with new designs and additional capabilities based on shared UTXOs.  Channel Factories 101 Channel factories have been around since the inception of Lightning. A factory is a multiparty contract where multiple users (not just two, as in a Dryja-Poon channel) cooperatively lock funds in a single multisig UTXO. They can open, close and update channels off-chain without updating the blockchain for each operation. Only when participants leave or the factory dissolves is an on-chain transaction…
Paylaş
BitcoinEthereumNews2025/09/18 00:09
SOLANA NETWORK Withstands 6 Tbps DDoS Without Downtime

SOLANA NETWORK Withstands 6 Tbps DDoS Without Downtime

The post SOLANA NETWORK Withstands 6 Tbps DDoS Without Downtime appeared on BitcoinEthereumNews.com. In a pivotal week for crypto infrastructure, the Solana network
Paylaş
BitcoinEthereumNews2025/12/16 20:44
Why The Green Bay Packers Must Take The Cleveland Browns Seriously — As Hard As That Might Be

Why The Green Bay Packers Must Take The Cleveland Browns Seriously — As Hard As That Might Be

The post Why The Green Bay Packers Must Take The Cleveland Browns Seriously — As Hard As That Might Be appeared on BitcoinEthereumNews.com. Jordan Love and the Green Bay Packers are off to a 2-0 start. Getty Images The Green Bay Packers are, once again, one of the NFL’s better teams. The Cleveland Browns are, once again, one of the league’s doormats. It’s why unbeaten Green Bay (2-0) is a 8-point favorite at winless Cleveland (0-2) Sunday according to betmgm.com. The money line is also Green Bay -500. Most expect this to be a Packers’ rout, and it very well could be. But Green Bay knows taking anyone in this league for granted can prove costly. “I think if you look at their roster, the paper, who they have on that team, what they can do, they got a lot of talent and things can turn around quickly for them,” Packers safety Xavier McKinney said. “We just got to kind of keep that in mind and know we not just walking into something and they just going to lay down. That’s not what they going to do.” The Browns certainly haven’t laid down on defense. Far from. Cleveland is allowing an NFL-best 191.5 yards per game. The Browns gave up 141 yards to Cincinnati in Week 1, including just seven in the second half, but still lost, 17-16. Cleveland has given up an NFL-best 45.5 rushing yards per game and just 2.1 rushing yards per attempt. “The biggest thing is our defensive line is much, much improved over last year and I think we’ve got back to our personality,” defensive coordinator Jim Schwartz said recently. “When we play our best, our D-line leads us there as our engine.” The Browns rank third in the league in passing defense, allowing just 146.0 yards per game. Cleveland has also gone 30 straight games without allowing a 300-yard passer, the longest active streak in the NFL.…
Paylaş
BitcoinEthereumNews2025/09/18 00:41