Chapter 3:

Self Custody: Part 1

An introduction to Non-Custodial Wallets.

Chapter 2

Consensus Methods

Chapter 4

Self Custody: Part 2

26 May 2022
May 2022

Today’s Agenda

In the last chapter, we spent some time going over how blockchains operate behind the scenes using consensus methods. Today, we’re going to zoom in on the individual users of blockchains and dig into some of what’s possible. 

To start, let’s focus on non-custodial wallets.

What is a Non-Custodial Wallet?

Non-custodial wallets are digital wallets that give you and only you access to what’s in them. They are like private bank accounts built on a blockchain and they consist of 3 primary mechanisms – public keys, private keys, and mnemonics. You can connect to crypto applications like Solrise and Magic Eden with your wallet and no intermediary is ever between you and your assets. You’re in full control.

Benefits of Non-Custodial Wallets

The short answer:

Traditional custodial methods for asset management always require at least one counterparty, like a bank. Using a non-custodial wallet enables you to custody your own assets without any counterparty. 

The long answer:

Decentralized networks only make sense if the assets on them are decentralized as well. If blockchains operated in a decentralized fashion while wallets operated using centralized counter-parties, all the benefits of the blockchain would vanish and the same problems that exist in centralized finance would exist in decentralized finance.

Real World Use Case

Non-custodial wallets are ground-breaking and enable digital economies to exist in ways unlike ever before. Their significance can be difficult to convey so let’s start with a tangible real-world example.

When migrant workers acquire a visa to work in foreign countries and send back money to their families back home, they do so by sending what’s called a remittance. This is usually done through Western Union or some large bank that has branches all over the world.

Low-income country remittances amounted to $466 billion in 2017. Globally, fees averaged 7.45%, or $34.7 billion. $7.45% equates to over 27 days of an average worker’s annual income meaning low-income migrant workers spent 27 days worth of their 2017 salary to send money back home. To put the absolute dollar value of these fees into perspective, the US’s non-military foreign aid budget in 2017 was $34 billion.

Non-custodial wallets present an alternative solution by enabling permissionless, global transfers of capital. If blockchains or blockchain wallets were custodial, the counterparty could just stop transactions from happening and require all remittances to be paid through Western Union. Foreign workers are already taking advantage of the low-cost and open nature of cryptocurrencies and it’s one of the most compelling and socially impactful use cases for the technology we’ve seen to date.

It’s complicated

Non-custodial wallets are made possible by the existence of public and private key cryptography, which is particularly complex. Similar to using the internet today, you won’t need to understand what’s happening under the hood in order to securely custody your own assets.

You’ll just need to understand the basics – namely public keys, private keys, and mnemonics

Let’s start with public keys.

Public Keys

Public keys are wallet addresses. Think of them like your email address. You can send emails to any email address at any time. In the same way, you can send digital assets to any wallet’s address at any time – as long as the blockchain you’re on is not compromised.

A public key on Ethereum: 0x47bb4cCA98FC49B971d86c5t26562c86E6284CeD

Public keys are intimidating to look at if you’re new to them but you’re able to just copy and paste them when you need to. This is actually the one-time copy and pasting is recommended in crypto as copying and pasting a private key or mnemonic can result in a hacker obtaining it. There are a number of operational security practices you’ll have to undertake to properly self custody your assets.

Each character of the wallet address / public key is connected to your private key and if you send digital assets to the wrong wallet address, you will likely be unable to recover them. This issue is continually being addressed by wallet designers and if these long alphanumerics are overly intimidating, there’s always the option to utilize a custodial wallet at a centralized crypto exchange (like FTX or Coinbase) rather than a non-custodial one (like Solflare or Metamask). 

Many wallets have built-in address books so you won’t need to copy and paste a public key every time. Most mainstream crypto exchanges also support this feature. 

The risk of utilizing a non-custodial wallet is either losing your private key or mnemonic/recovery phrase or having it stolen. It is very important to keep a copy of each of those written down and stored in a safe place. Some people etch it into fireproof, “bullet-proof” steel.

Don’t be taking a video for social media and accidentally leave your phrase visible in the background and don’t click on any suspicious-looking links – they could be phishing attempts that could drain your wallet. This is what happened to Seth Green, the actor who played Dr. Evil in the movie trilogy Austin Powers.

Also, don’t take screenshots of either your recovery phrase or your private key. Your photos are likely automatically being uploaded to iCloud or Google Photos and are subject to risk and seizure by your cloud computing service or federal authorities.

Private Keys

Private keys are a bit harder to describe than public ones. A private key is an alphanumeric string of characters that gives you access to your wallet. 

Think of a private key as a randomly generated password for a specific account that you access with a master password technology like NordPass or Last Pass. The master password in this case would be your mnemonic phrase. 

A private key on Ethereum looks like: E9883D79C6D87DC0FB6A5778633389F4253213303DA61F20BD47FC233AA332623

You won’t need to remember your private key and you will likely never need to use it. It is, however, a vitally important string of characters. Without access to your private key (via your recovery phrase), you would never be able to access your funds. 

Mnemonics / Recovery Phrases / Seed Phrases

A private key allows you to sign transactions for a single wallet account. Recovery phrases, however, give you access to an infinite number of private keys. New wallets can be added to one mnemonic’s purview by being imported or generated within the intended wallet’s user interface.

Mnemonics serve two primary purposes:

  1. They offer a more human-readable format than a private key, making it easier for you to import a wallet account into a wallet application. 
  2. You can derive multiple private keys from a single mnemonic phrase, effectively allowing you to create multiple wallet accounts for different use cases. 

To learn about the different types of wallets crypto users utilize, check out this article.

In short, your mnemonic gives you access to your private key which gives you access to your funds. From the user’s perspective, Mnemonics / Recovery Phrases / Seed Phrases are the most important aspect of a wallet. They are the human-readable sequences of words that give you access to your private keys and thus your capital. The words are generally in English although there are many languages wallet providers can choose to implement.

A public key can easily be calculated from a private key, however, calculating the private key from a public key is impossible. Most people are blissfully unaware of their private key(s) and that is fine … as long as they are painfully aware of their mnemonic.

A mnemonic phrase looks like this:

dog house safe board room chair table desk computer space flower rain

To be clear, a mnemonic is not a private key, although if someone were to obtain either your mnemonic or your private key, your digital assets would be compromised. 

As mentioned above, think of your mnemonic as being the master password to a password management system. All the passwords you are storing in the system would be your private keys in this analogy. 


Some wallets also utilize an actual password.

Passwords are not that big of a deal. They are primarily there for convenience’s sake so you don’t have to input your mnemonic phrase every time you want to access your funds. If you forget your password you can just reset it with your mnemonic phrase. 

No email, phone, or 2-factor authentication methods are required!

Again, phew

Well, that’s enough for today. As you can see, these topics are conceptually not too difficult and all you need to know is the tip of the iceberg. The full iceberg is what they call the rabbit hole.

Crypto’s adoption and accessibility metrics are similar to that of the early internet. In the beginning, things were overly complicated for the average individual and generalists ruled the land. In order to use the internet, you had to really know what you were doing. In the modern internet of today, you barely need to know what you are doing. The barriers to entry have dropped dramatically and specialists are now in charge.

Although the internet had massive technical learning curves at first, once protocols (like HTTP and TCP/IP mentioned earlier in the course) were standardized and the average adult understood how to operate it, it took over.

If you stick through with this course, you can count yourself a pioneer in the field of blockchain technology. As it continues to take over, you’ll be right there with it.

Ethereum has ~500,000 daily users. Every other blockchain has far less. 

Twitter has ~200,000,000 daily users. Facebook has ~2,000,000,000 daily users. 

We’re so early. 🤝

We have a new extension