Wallets for Miners

Languages

Wallets for Miners

Cryptocurrency security is always a tradeoff between convenience and risk.

Only you can determine the balance between the two. Only you can be responsible for the security of your private keys, passwords, etc.

Mining to an exchange wallet is not recommended.

The various wallets available for ZEN are shown a this link.

Depending on the mining pool, your wallet might be receiving a very large number of transactions. This can overwhelm some hardware wallets whose computing capability is limited. For that reason, hardware wallets are not advised for mining purposes, unless you change your payout to minimize UTXOs..

You must take ordinary security precautions. If you choose to mine to a hot wallet, you must be mindful of malware that can infect the computer it resides on. There are malware threats that can capture screenshots, record clipboard data, etc and transmit that information to an attacker.


The security of your private keys, seed phrases, etc are paramount. If you choose to keep them in electronic form, do not store them on any sort of cloud computing platform such as Google Drive, iCloud, etc. Consider an encrypted database such as KeyPassXC, an open-source password manager.

Consider keeping any backups on encrypted thumb drives which can be kept in a secure location.

How to create an encrypted thumb drive in Mac OS using Disk Utility

How to create an encrypted thumb drive in Linux using Disks Utility

How to create an encrypted thumb drive on Windows 10 Pro with BitLocker

How to create an encrypted thumb drive using VeraCrypt

Some users have created encrypted Linux Virtual Box guest operating systems to hold their wallets so that they can be enabled only when desiring to user their wallets. This would be beyond the scope of this document.



© 2020 Horizen. All rights reserved.