Meet Ledger Nano™ Gen5, the most playful signer yet

Discover now

The most playful signer yet

Meet Ledger Nano™ Gen5

Shop now Learn more

What Are Custodial and Non-Custodial Wallets?

Beginner
Black closed belt on a black background.
KEY TAKEAWAYS:
— Custodial wallets are issued by a third party that holds your private keys for you, whereas non-custodial wallets allow you to hold your own keys.

— While custodial wallets relieve you of the responsibility of managing your own private keys, this comes at the cost of true ownership of your assets.

— The combination of a Ledger signer and the Ledger Wallet™ app keeps you in control of your private keys while offering a seamless experience that rivals centralized, custodial platforms.

Wallets sit at the heart of almost every action in crypto, enabling you to manage your assets and approve transactions. As a result, the way a wallet is set up has major consequences on the security and ownership of the digital assets it protects.

One of the main differences between wallets comes down to who is responsible for holding a wallet’s private keys; you either delegate that responsibility to a third party (custodial wallets) or you maintain it yourself (non-custodial). It’s a critical distinction impacting how your digital ownership ultimately works in practice.

In this article, Ledger Academy dives into the key distinctions between custodial and non-custodial wallets, the risks of surrendering your private keys to a third party, and how the Ledger ecosystem makes it easier than ever to secure your own keys.

What Is a Crypto Wallet? 

A crypto wallet is best understood as a management tool and user interface for digital assets. 

Contrary to what the name suggests, a wallet does not store coins or tokens in the way a physical wallet stores cash. In reality, digital assets stay on the blockchain at all times. What the wallet actually holds are private keys, which allow someone to authorize changes to those assets.

What Is a Private Key?

A private key is a long number that is randomly generated when a blockchain address is created, and it is what grants you access to manage the crypto associated with that address. To clarify, any time a transaction is made, it must be cryptographically signed using the private key. The network checks the signature, and if it is valid, the transaction is added to the blockchain.

This process applies whether someone is sending Bitcoin, approving a smart contract on Ethereum, or interacting with another network. The mechanics vary between chains, but the principle stays the same. 

A small but helpful detail: while private keys can be represented as a long string of alphanumeric characters, today’s wallets no longer require you to record them that way. Thanks to the standard, BIP-39, most wallets use a human-readable version called a secret recovery phrase (SRP, also called a seed phrase) as the standard way for you to store your private keys and back up your accounts.

As mentioned above, an important way to categorize wallets is by who holds custody of the private keys. That single detail explains the difference between custodial and non-custodial wallets and how each type determines who controls your assets.

What Is a Custodial Wallet? 

A custodial wallet is one in which a third party holds your private keys on your behalf. You can log in, view balances, and request transactions, but the cryptographic control remains with the service provider.

Custodial wallets are most commonly associated with centralized exchanges. These platforms provide a similar experience to online banking: there is an account, a password, two-factor authentication, and customer service. That familiarity is often the main reason why people just getting into crypto may choose a custodial wallet to get started. 

How Does a Custodial Wallet Work?

When you set up an account with a custodial provider, the platform generates and stores the private keys.  As it’s the custodian that holds these keys, the actual cryptographic signing of transactions occurs on the platform’s servers rather than on your own device.

In a typical workflow, you initiate a transaction through a website or mobile app, and the service provider uses the keys in its possession to authorize and broadcast that transaction to the blockchain.

This model also affects how wallet recovery works. Instead of using a secret recovery phrase, access is restored through identity verification, customer support, or password resets. This approach offers a familiar user experience similar to traditional finance, but it ensures that the service provider remains the final authority over your digital assets.

The Risks of Custodial Wallets

When you surrender control of your private keys to a host platform, your access depends entirely on the provider remaining secure, operational, and solvent. Something which, as shown by several high-profile exchange failures throughout crypto’s history, can not truly be guaranteed. Not to mention that a single centralized entity can become an attractive target for hackers.

Beyond the threat of hacks and failure, a custodial setup means your assets are subject to the provider’s internal policies and external regulations. A platform can freeze or otherwise restrict your account for any number of reasons, or experience outages during periods of high market volatility. As far as account recovery goes, the lack of a secret recovery phrase also puts you at the mercy of a process reliant on identity checks and support tickets. 

All in all, while a custodial wallet may offer an appealing user interface and a familiar setup procedure, the price you pay for that convenience is the loss of the sovereign control that defines true digital ownership.

What Is a Non-Custodial Wallet? 

Choosing a non-custodial wallet gives you absolute control over your digital assets. In this model, you hold the private keys directly, meaning no third party can move your funds, freeze your access, or censor your transactions. This independence allows you to interact directly with blockchain networks, authorizing and broadcasting transactions yourself without needing approval from an intermediary.

However, this level of control requires a high degree of personal responsibility. As the sole holder of your private keys, you are entirely in charge of managing your wallet and safeguarding your SRP. 

Unlike a bank or a centralized exchange, there is no “forgot password” button or customer support team to assist you if you lose your credentials; your recovery phrase is the only way to restore your wallet if your device is lost, stolen, or damaged. If this backup is lost or compromised, you can permanently lose access to your assets. 

In a non-custodial setup, you are your own bank, and only you have the power to recover your assets.

How Does a Non-Custodial Wallet Work? 

Non-custodial wallets can be subdivided into two main groups: software wallets and hardware wallets. Both give users direct control, but they protect keys in different ways.

Software Wallets

Software wallets run on phones and computers through software applications or browser extensions. They generate keys locally and sign transactions on the same device. 

While they are widely used due to their accessibility and convenience, software wallets are fundamentally insecure. They live on general-purpose devices that are perpetually connected to the internet, leaving your private keys constantly exposed to online threats like malware designed to extract sensitive data.

To make matters worse, the screen and operating system of these devices are designed for convenience, not security, which means they can be easily compromised by bad actors. Sophisticated attackers can monitor your activity or even alter the transaction details shown on your screen without your knowledge. 

Since the interface you use to verify and sign transactions is fundamentally insecure, you cannot trust that the information it displays is authentic. Without a secure, offline environment to store keys and a secure screen to verify actions, your assets remain at the mercy of the device’s vulnerabilities.

Hardware Wallets

A hardware wallet is a purpose-built device designed to store private keys in an isolated, offline environment. By generating and protecting keys offline, these devices provide a fortress against digital threats. Ideally, a hardware wallet should allow you to review the details on its own screen and sign the transaction without ever exposing your private keys to an insecure operating system.

From Hardware Wallet to signer

While the term hardware wallet was a useful metaphor in the earliest days of crypto, Ledger now uses the term signer to describe these devices because it more accurately portrays their active role in a modern digital ecosystem. 

Reframing the hardware wallet as a signer addresses common misconceptions that so often lead users astray. This terminology helps clarify that while assets are secured on the blockchain, your Ledger signer is the essential, active key to managing that value safely and providing proof that you are you.

What sets Ledger signers apart is a unique security architecture that combines the Secure Element chip (the same certified chips found in passports and credit cards) with Ledger OS, and a Secure Screen powered by the secure element. This ensures the security of your private keys and that the details shown on your Ledger signer’s screen can never be altered.

Custodial vs Non-Custodial Wallets

The difference between custodial and non-custodial wallets comes down to where control sits and how responsibility is shared.

Ownership

Custodial wallets place complete control of your private keys in the hands of a third party, such as a centralized exchange or a specialized custody provider. In this arrangement, you do not technically own your assets. Instead, you hold a claim against the provider for those assets, much like a balance in a traditional bank account. 

Conversely, non-custodial wallets place key control directly in your hands. This ensures that you are the sole authority capable of authorizing transactions or moving funds, fulfilling the fundamental promise of crypto by giving you true, unmediated digital ownership.

Security

The security of a custodial wallet depends entirely on the provider’s internal custody systems, governance controls, and operational resilience against external attacks. If the institution’s security is breached or its internal processes fail, your assets are at risk regardless of your personal security habits. 

Non-custodial security, however, shifts this responsibility to you. While this can require a little more effort, it eliminates the institutional intermediary as a single point of failure, allowing you to manage your own security through offline storage and robust backup practices.

Privacy

Custodial wallets usually require an account creation process that involves extensive identity checks and Know Your Customer (KYC) documentation. This links your real-world identity to your onchain activity, giving the service provider a complete view of your financial history. 

Non-custodial wallets can be generated and used without providing any personal information, offering a higher degree of pseudonymity. While on-chain activity remains public by design on most networks, a non-custodial setup ensures that no central intermediary holds a database linking your identity to your wallet address.

Recovery

The process of account recovery highlights a fundamental difference between custody models: custodial recovery relies on third-party support and identity checks, whereas traditional non-custodial recovery depends entirely on the user’s management of their Secret Recovery Phrase.

While the lack of a simple “forgot password” path has historically been a hurdle for newcomers, Ledger’s modern recovery solutions make this responsibility significantly more accessible. 

Ledger Recovery Key offers a hardware-based, PIN-protected backup card that stores the recovery phrase offline in a Secure Element chip, providing a portable and durable alternative to paper. For those seeking an identity-based safety net, the fully optional paid service Ledger Recover provides a secure way to restore access using encrypted fragments. 

These innovations ensure that users can enjoy a manageable recovery process, bridging the gap between absolute control and user-friendly accessibility.

Ease of use

Custodial wallets have traditionally been favored for their familiar onboarding and recovery paths, which mirror the low-friction apps people already understand from the Web2 world. In the past, this convenience was a primary reason users accepted the risks and drawbacks of centralized custody. 

However, the Ledger ecosystem has effectively closed this gap. The combination of the Ledger Wallet™ app and Ledger signers provides a user experience as intuitive and seamless as any centralized application, without requiring you to surrender control of your assets. 

Features like cash-to-stablecoin, account synchronization with Ledger Sync, and seamless cross-chain swaps remove the technical friction once associated with non-custodial solutions.

Users can now enjoy true digital ownership, free from compromise, with the same ease of use found in traditional financial services.

Best Non-Custodial Wallet Options

Non-custodial wallets represent the only path to true digital ownership and personal sovereignty. Ledger’s suite of signers makes the management of private keys easier than ever, utilizing a battle-tested security model that sets these devices apart from other hardware solutions on the market.

Ledger Nano™ Gen5

Ledger Nano™ Gen5 is the affordable daily driver of the Ledger lineup, combining a classic design with modern security features. It features a 2.8” E Ink® secure monochrome touchscreen that allows for effortless navigation and clear on-device review. With excellent battery life and full support for passkeys, it’s a robust and accessible tool for anyone seeking security without sacrificing convenience.

Ledger Flex™

Ledger Flex™ is an intuitive and compact secure-touchscreen signer built to fit any lifestyle. It utilizes a 2.84″ E-Ink secure touchscreen with 16 grayscale levels, offering a highly readable and responsive interface for verifying digital consent. Like all modern Ledger signers, it provides uncompromising protection through Clear Signing and Transaction Check, making it an ideal choice for users who want sophisticated security in a pocket-sized form factor.

Ledger Stax™

Ledger Stax™ is the premium flagship of the Ledger family, featuring a world-first 3.7″ curved E-Ink secure touchscreen with 16 grayscale levels. The larger canvas is designed for the clearest transaction review possible, supporting custom lock-screen art and a suite of magnetic accessories. With the best battery life in the range and a high-readability display, Ledger Stax™ represents the ultimate fusion of world-class design and uncompromising digital ownership.

Ledger: Seamless Security for Your Digital Assets

The fundamental difference between custodial and non-custodial wallets is key ownership. While custodians offer familiarity by managing keys for you, they require you to trust an intermediary with your assets. Non-custodial solutions remove this middleman, granting you sovereign control and true digital ownership along with higher personal responsibility. Understanding this distinction is the first step toward navigating the crypto ecosystem with clarity.

The Ledger ecosystem eliminates the traditional tradeoff between security and convenience. By combining a Ledger signer with Ledger Wallet™, users gain full ownership and unparalleled security alongside the seamless user experience of a centralized application. This integrated approach ensures that your private keys remain offline and under your control, while providing an intuitive interface for managing your digital life.

Explore the suite of Ledger signers and download Ledger Wallet to experience digital ownership, free from compromise.


Stay in touch

Announcements can be found in our blog. Press contact:
[email protected]

Subscribe to our
newsletter

New coins supported, blog updates and exclusive offers directly in your inbox


Your email address will only be used to send you our newsletter, as well as updates and offers. You can unsubscribe at any time using the link included in the newsletter. Learn more about how we manage your data and your rights.

Own your crypto future

Stay informed with security tips, updates, and exclusive offers from Ledger

Your email address will only be used to send you our newsletter, as well as updates and offers. You can unsubscribe at any time. Learn more

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.