Choose your Bitcoin wallet

Find your wallet and start making payments with merchants and users.

Bitcoin Core

WindowsMacLinux
Control over your money

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Full validation

This wallet is a full node that validates and relays transactions on the Bitcoin network. This means no trust in a third party is required when verifying payments. Full nodes provide the highest level of security and are essential to protecting the network. However, they require more space (over 20GB), bandwidth, and a longer initial synchronization time.

Complete transparency

This wallet is open-source and built deterministically. This means any developer in the world can audit the code and make sure the final software isn't hiding any secrets.

Vulnerable environment

This wallet can be loaded on computers which are vulnerable to malware. Securing your computer, using a strong passphrase, moving most of your funds to cold storage or enabling two-factor authentication can make it harder to steal on your bitcoins.

Improved privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Avoids disclosing information

This wallet does not disclose information to peers on the network when receiving or sending a payment.

Tor can be used

This wallet lets you setup and use Tor as a proxy to prevent attackers or Internet service providers from associating your payments with your IP address.

Bitcoin Core is a full Bitcoin client and builds the backbone of the network. It offers high levels of security, privacy, and stability. However, it has fewer features and it takes a lot of space and memory.

screenshot
Bitcoin CoreBitcoin
Core

MultiBit

WindowsMacLinux
Control over your money

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Simplified validation

This wallet uses SPV and the Bitcoin network. This means very little trust in third parties is required when verifying payments. However, it is not as secure as a full node like Bitcoin Core.

Basic transparency

The developers of this wallet publish the source code for the client. This means any developer in the world can audit the code. However, you still need to trust developers of this wallet when installing or updating the final software because it was not built deterministically like Bitcoin Core.

Vulnerable environment

This wallet can be loaded on computers which are vulnerable to malware. Securing your computer, using a strong passphrase, moving most of your funds to cold storage or enabling two-factor authentication can make it harder to steal on your bitcoins.

Weak privacy

Allows spying on your payments

This wallet makes it easy for anyone to spy on your balance and payments because it reuses the same addresses.

Discloses limited information to peers

Peers on the network can log your IP address and associate your payments together when receiving or sending payment.

Tor not supported

This wallet does not let you use Tor to prevent attackers or Internet service providers from associating your payments with your IP address.

MultiBit is a lightweight client that focuses on being fast and easy to use. It synchronizes with the network and is ready to use in minutes. MultiBit also supports many languages. It is a good choice for non-technical users.

screenshot
MultiBitMultiBit

Armory

WindowsMacLinux
Control over your money

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Full validation

This wallet requires you to install full node software that validates and relays transactions on the Bitcoin network. This means no trust in a third party is required when verifying payments. Full nodes provide the highest level of security and are essential to protecting the network. However, they require more space (over 20GB), bandwidth, and a longer initial synchronization time.

Basic transparency

The developers of this wallet publish the source code for the client. This means any developer in the world can audit the code. However, you still need to trust developers of this wallet when installing or updating the final software because it was not built deterministically like Bitcoin Core.

Vulnerable environment

This wallet can be loaded on computers which are vulnerable to malware. Securing your computer, using a strong passphrase, moving most of your funds to cold storage or enabling two-factor authentication can make it harder to steal on your bitcoins.

Improved privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Avoids disclosing information

This wallet does not disclose information to peers on the network when receiving or sending a payment.

Tor can be used

This wallet lets you setup and use Tor as a proxy to prevent attackers or Internet service providers from associating your payments with your IP address.

Armory is an advanced Bitcoin client that expands its features for Bitcoin power users. It offers many backup and encryption features, and it allows secure cold-storage on offline computers.

screenshot
ArmoryArmory

Electrum

WindowsMacLinux
Control over your money

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Simplified validation

This wallet uses SPV and random servers from a list. This means little trust in third parties is required when verifying payments. However, it is not as secure as a full node like Bitcoin Core.

Basic transparency

The developers of this wallet publish the source code for the client. This means any developer in the world can audit the code. However, you still need to trust developers of this wallet when installing or updating the final software because it was not built deterministically like Bitcoin Core.

Vulnerable environment

This wallet can be loaded on computers which are vulnerable to malware. Securing your computer, using a strong passphrase, moving most of your funds to cold storage or enabling two-factor authentication can make it harder to steal on your bitcoins.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This wallet uses central servers which are able to associate your payments together and log your IP address.

Tor can be used

This wallet lets you setup and use Tor as a proxy to prevent attackers or Internet service providers from associating your payments with your IP address.

Electrum's focus is speed and simplicity, with low resource usage. It uses remote servers that handle the most complicated parts of the Bitcoin system, and it allows you to recover your wallet from a secret phrase.

screenshot
ElectrumElectrum

mSIGNA

WindowsMacLinux
Control over your money

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Full validation

This wallet requires you to install full node software that validates and relays transactions on the Bitcoin network. This means no trust in a third party is required when verifying payments. Full nodes provide the highest level of security and are essential to protecting the network. However, they require more space (over 20GB), bandwidth, and a longer initial synchronization time.

Basic transparency

The developers of this wallet publish the source code for the client. This means any developer in the world can audit the code. However, you still need to trust developers of this wallet when installing or updating the final software because it was not built deterministically like Bitcoin Core.

Vulnerable environment

This wallet can be loaded on computers which are vulnerable to malware. Securing your computer, using a strong passphrase, moving most of your funds to cold storage or enabling two-factor authentication can make it harder to steal on your bitcoins.

Improved privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Avoids disclosing information

This wallet does not disclose information to peers on the network when receiving or sending a payment.

Tor can be used

This wallet lets you setup and use Tor as a proxy to prevent attackers or Internet service providers from associating your payments with your IP address.

mSIGNA is an advanced yet easy-to-use wallet featuring speed and simplicity, enterprise-level scalability, and strong security. It supports BIP32, multisignature transactions, offline storage, multidevice synchronization, and encrypted electronic and paper backups.

screenshot
mSIGNAmSIGNA

Bitcoin Wallet

AndroidBlackBerry
Control over your money

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Simplified validation

This wallet uses SPV and the Bitcoin network. This means very little trust in third parties is required when verifying payments. However, it is not as secure as a full node like Bitcoin Core.

Basic transparency

The developers of this wallet publish the source code for the client. This means any developer in the world can audit the code. However, you still need to trust developers of this wallet when installing or updating the final software because it was not built deterministically like Bitcoin Core.

Secure environment

This wallet is loaded on mobiles where apps are usually isolated. This provides a good protection against malware, although mobiles are usually easier to steal or lose. Encrypting your mobile and backing up your wallet can reduce that risk.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses limited information to peers

Peers on the network can log your IP address and associate your payments together when receiving or sending payment.

Tor not supported

This wallet does not let you use Tor to prevent attackers or Internet service providers from associating your payments with your IP address.

Bitcoin Wallet is easy to use and reliable, while also being secure and fast. Its vision is de-centralization and zero trust; no central service is needed for Bitcoin-related operations. The app is a good choice for non-technical people.

screenshot
Bitcoin WalletBitcoin
Wallet

Airbitz Bitcoin Wallet

AndroidiOS
Hosted control over your money

This wallet gives you control over your bitcoins. However, this service is retaining an encrypted copy of your wallet. This means your bitcoins can be stolen if you don't use a strong password and the service is compromised.

Centralized validation

This wallet relies on a centralized service by default. This means a third party must be trusted to not hide or simulate payments.

New app

This wallet has not been tested and publicly reviewed by a significant number of people. This means this app might be more at risk of hiding dangerous code or doing something you wouldn't agree to.

Secure environment

This wallet is loaded on mobiles where apps are usually isolated. This provides a good protection against malware, although mobiles are usually easier to steal or lose. Encrypting your mobile and backing up your wallet can reduce that risk.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This service can associate your payments together, log your IP address and know your real identity if you provide personal information like your email, name or banking account.

Tor not supported

This wallet does not let you use Tor to prevent attackers or Internet service providers from associating your payments with your IP address.

Airbitz is a mobile Bitcoin Wallet making high levels of privacy, security, and decentralization very familiar and usable to the masses. Airbitz wallets are always automatically encrypted, backed up, and even function when Airbitz servers go down.

screenshot
Airbitz Bitcoin WalletAirbitz

breadwallet

iOS
Control over your money

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Simplified validation

This wallet uses SPV and the Bitcoin network. This means very little trust in third parties is required when verifying payments. However, it is not as secure as a full node like Bitcoin Core.

Basic transparency

The developers of this wallet publish the source code for the client. This means any developer in the world can audit the code. However, you still need to trust developers of this wallet when installing or updating the final software because it was not built deterministically like Bitcoin Core.

Secure environment

This wallet is loaded on mobiles where apps are usually isolated. This provides a good protection against malware, although mobiles are usually easier to steal or lose. Encrypting your mobile and backing up your wallet can reduce that risk.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses limited information to peers

Peers on the network can log your IP address and associate your payments together when receiving or sending payment.

Tor not supported

This wallet does not let you use Tor to prevent attackers or Internet service providers from associating your payments with your IP address.

Simplicity is breadwallet's core design principle. As a real standalone Bitcoin client, there is no server to get hacked or go down, and by building on iOS's strong security base, breadwallet is designed to protect you from malware, browser security holes, even physical theft.

screenshot
breadwalletbreadwallet

TREZOR

Control over your money

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Variable validation

Payment validation features are provided by the software wallet you use with this device. Please see the Validation score for the software wallet you plan to use.

New app

This wallet has not been tested and publicly reviewed by a significant number of people. This means this app might be more at risk of hiding dangerous code or doing something you wouldn't agree to.

Very secure environment

This wallet is loaded from a secure specialized environment provided by the device. This provides very strong protection against computer vulnerabilities and malware since no software can be installed on this environment.

Variable privacy

Privacy features are provided by the software wallet you use with this device. Please see the Privacy score for the software wallet you plan to use.

TREZOR is a hardware wallet providing a high level of security without sacrificing convenience. Unlike cold storage, TREZOR is able to sign transactions while connected to an online device. That means spending bitcoins is secure even when using a compromised computer.

screenshot
TREZORTREZOR

Ledger Nano

Control over your money

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Variable validation

Payment validation features are provided by the software wallet you use with this device. Please see the Validation score for the software wallet you plan to use.

New app

This wallet has not been tested and publicly reviewed by a significant number of people. This means this app might be more at risk of hiding dangerous code or doing something you wouldn't agree to.

Very secure environment

This wallet is loaded from a secure specialized environment provided by the device. This provides very strong protection against computer vulnerabilities and malware since no software can be installed on this environment.

Variable privacy

Privacy features are provided by the software wallet you use with this device. Please see the Privacy score for the software wallet you plan to use.

Ledger Nano is a hardware wallet built upon a ST23YT66 banking smartcard platform. It keeps the user private keys safe, validates transactions, can be used as a secure prepaid card or a multisignature party. While not open-source, it can be deterministically validated.

screenshot
Ledger NanoLedger
Nano

Bither

iOS
Control over your money

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Simplified validation

This wallet uses SPV and the Bitcoin network. This means very little trust in third parties is required when verifying payments. However, it is not as secure as a full node like Bitcoin Core.

Basic transparency

The developers of this wallet publish the source code for the client. This means any developer in the world can audit the code. However, you still need to trust developers of this wallet when installing or updating the final software because it was not built deterministically like Bitcoin Core.

Secure environment

This wallet is loaded on mobiles where apps are usually isolated. This provides a good protection against malware, although mobiles are usually easier to steal or lose. Encrypting your mobile and backing up your wallet can reduce that risk.

Weak privacy

Allows spying on your payments

This wallet makes it easy for anyone to spy on your balance and payments because it reuses the same addresses.

Discloses limited information to peers

Peers on the network can log your IP address and associate your payments together when receiving or sending payment.

Tor not supported

This wallet does not let you use Tor to prevent attackers or Internet service providers from associating your payments with your IP address.

Bither is a simple and secure wallet on many platforms. With special designed Cold/Hot modes, user can easily get both safety and simplicity. Bither's XRANDOM uses different entropy sources to generate true random number for users. Also with HDM, users can have HD's advantages and Multisig's security.

screenshot
BitherBither

Hive

Android
Control over your money

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Centralized validation

This wallet relies on a centralized service by default. This means a third party must be trusted to not hide or simulate payments.

New app

This wallet has not been tested and publicly reviewed by a significant number of people. This means this app might be more at risk of hiding dangerous code or doing something you wouldn't agree to.

Secure environment

This wallet is loaded on mobiles where apps are usually isolated. This provides a good protection against malware, although mobiles are usually easier to steal or lose. Encrypting your mobile and backing up your wallet can reduce that risk.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This service can associate your payments together, log your IP address and know your real identity if you provide personal information like your email, name or banking account.

Tor not supported

This wallet does not let you use Tor to prevent attackers or Internet service providers from associating your payments with your IP address.

Hive is a human-friendly Bitcoin and Litecoin wallet, which features a beautiful, elegant and simple interface. It offers Waggle, a simple way to send & receive tokens with other Hive users near you. Your passphrase generates your wallet, making it portable and backups easy.

screenshot
HiveHive

Mycelium

Android
Control over your money

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Centralized validation

This wallet relies on a centralized service by default. This means a third party must be trusted to not hide or simulate payments.

Basic transparency

The developers of this wallet publish the source code for the client. This means any developer in the world can audit the code. However, you still need to trust developers of this wallet when installing or updating the final software because it was not built deterministically like Bitcoin Core.

Secure environment

This wallet is loaded on mobiles where apps are usually isolated. This provides a good protection against malware, although mobiles are usually easier to steal or lose. Encrypting your mobile and backing up your wallet can reduce that risk.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This wallet uses central servers which are able to associate your payments together and log your IP address.

Tor can be used

This wallet lets you setup and use Tor as a proxy to prevent attackers or Internet service providers from associating your payments with your IP address.

Mycelium Bitcoin Wallet is an open source wallet for Android designed for security, speed, and ease of use. It has unique features to manage your keys and for cold storage that help you secure your bitcoins.

screenshot
MyceliumMycelium

BitGo

WindowsMacLinux
Shared control over your money

This wallet requires every transaction to be authorized both by you and this third party. Under normal circumstances, you can regain full control over your bitcoins using your initial backup or pre-signed transactions sent by email.

Centralized validation

This wallet relies on a centralized service by default. This means a third party must be trusted to not hide or simulate payments.

Remote app

This wallet is loaded from a remote location. This means that whenever you use your wallet, you need to trust the developers not to steal or lose your bitcoins in an incident on their site. Using a browser extension or mobile app, if available, can reduce that risk.

Two-factor authentication

This wallet can be used from insecure environments. However, this service requires two-factor authentication. This means access to multiple devices or accounts is required to steal your bitcoins.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This service can associate your payments together, log your IP address and know your real identity if you provide personal information like your email, name or banking account.

Tor can be used

This wallet lets you setup and use Tor as a proxy to prevent attackers or Internet service providers from associating your payments with your IP address.

BitGo is a high-security multi-sig wallet, which protects your bitcoin from theft and loss. You maintain full custody; BitGo cannot spend or freeze funds. BitGo wallets are easy to use and offer advanced security features such as spending limits and multi-user access.

screenshot
BitGoBitGo

GreenAddress

AndroidiOS
Shared control over your money

This wallet requires every transaction to be authorized both by you and this third party. Under normal circumstances, you can regain full control over your bitcoins using your initial backup or pre-signed transactions sent by email.

Decentralized validation

This wallet connects to a random server from a list. This means some trust in third parties is required when verifying payments. However, it is not as secure as a full node like Bitcoin Core.

Basic transparency

The developers of this wallet publish the source code for the client. This means any developer in the world can audit the code. However, you still need to trust developers of this wallet when installing or updating the final software because it was not built deterministically like Bitcoin Core.

Two-factor authentication

This wallet can be used from insecure environments. However, this service requires two-factor authentication. This means access to multiple devices or accounts is required to steal your bitcoins.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This service can associate your payments together, log your IP address and know your real identity if you provide personal information like your email, name or banking account.

Tor not supported

This wallet does not let you use Tor to prevent attackers or Internet service providers from associating your payments with your IP address.

GreenAddress is a user-friendly multi-signature wallet with improved security and privacy. At no time are your keys server side, even encrypted. For security reasons, you should always use 2FA and the browser extension or Android App.

screenshot
GreenAddressGreen
Address

Coinbase

Money controlled by a third party

This service has full control over your bitcoins. This means you need to trust this service will not lose your funds in an incident on their side. As of today, most web wallets don't insure their deposits like a bank, and many such services have suffered from security breaches in the past.

Centralized validation

This wallet relies on a centralized service by default. This means a third party must be trusted to not hide or simulate payments.

Remote app

This wallet is loaded from a remote location. This means that whenever you use your wallet, you need to trust the developers not to steal or lose your bitcoins in an incident on their site. Using a browser extension or mobile app, if available, can reduce that risk.

Vulnerable environment

This wallet can be loaded on computers which are vulnerable to malware. Securing your computer, using a strong passphrase, moving most of your funds to cold storage or enabling two-factor authentication can make it harder to steal on your bitcoins.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This service can associate your payments together, log your IP address and know your real identity if you provide personal information like your email, name or banking account.

Tor can be used

This wallet lets you setup and use Tor as a proxy to prevent attackers or Internet service providers from associating your payments with your IP address.

Coinbase is a web wallet service that aims to be easy to use. It also provides an Android web wallet app, merchant tools and integration with US bank accounts to buy and sell bitcoins.

screenshot
CoinbaseCoinbase

Coinkite

Money controlled by a third party

This service has full control over your bitcoins. This means you need to trust this service will not lose your funds in an incident on their side. As of today, most web wallets don't insure their deposits like a bank, and many such services have suffered from security breaches in the past.

Centralized validation

This wallet relies on a centralized service by default. This means a third party must be trusted to not hide or simulate payments.

Remote app

This wallet is loaded from a remote location. This means that whenever you use your wallet, you need to trust the developers not to steal or lose your bitcoins in an incident on their site. Using a browser extension or mobile app, if available, can reduce that risk.

Vulnerable environment

This wallet can be loaded on computers which are vulnerable to malware. Securing your computer, using a strong passphrase, moving most of your funds to cold storage or enabling two-factor authentication can make it harder to steal on your bitcoins.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This service can associate your payments together, log your IP address and know your real identity if you provide personal information like your email, name or banking account.

Tor can be used

This wallet lets you setup and use Tor as a proxy to prevent attackers or Internet service providers from associating your payments with your IP address.

Coinkite is a web wallet & debit card service that aims to be easy to use. It also works on mobile browsers, has merchant tools, point-of-sale payment terminals. It is a hybrid wallet and full reserve vault.

screenshot
CoinkiteCoinkite

Xapo

Money controlled by a third party

This service has full control over your bitcoins. This means you need to trust this service will not freeze or mismanage your funds. Although this service claims to be providing insurance against failures on their side, you are still responsible for securing your wallet.

Centralized validation

This wallet relies on a centralized service by default. This means a third party must be trusted to not hide or simulate payments.

Remote app

This wallet is loaded from a remote location. This means that whenever you use your wallet, you need to trust the developers not to steal or lose your bitcoins in an incident on their site. Using a browser extension or mobile app, if available, can reduce that risk.

Vulnerable environment

This wallet can be loaded on computers which are vulnerable to malware. Securing your computer, using a strong passphrase, moving most of your funds to cold storage or enabling two-factor authentication can make it harder to steal on your bitcoins.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This service can associate your payments together, log your IP address and know your real identity if you provide personal information like your email, name or banking account.

Tor can be used

This wallet lets you setup and use Tor as a proxy to prevent attackers or Internet service providers from associating your payments with your IP address.

Xapo combines the convenience of an everyday Bitcoin wallet with the security of an insured deep cold storage vault. Xapo Debit Card links to your Xapo Wallet and allows you to spend bitcoins at millions of merchants all around the world.

screenshot
XapoXapo

Coinapult

Money controlled by a third party

This service has full control over your bitcoins. This means you need to trust this service will not lose your funds in an incident on their side. As of today, most web wallets don't insure their deposits like a bank, and many such services have suffered from security breaches in the past.

Centralized validation

This wallet relies on a centralized service by default. This means a third party must be trusted to not hide or simulate payments.

Remote app

This wallet is loaded from a remote location. This means that whenever you use your wallet, you need to trust the developers not to steal or lose your bitcoins in an incident on their site. Using a browser extension or mobile app, if available, can reduce that risk.

Vulnerable environment

This wallet can be loaded on computers which are vulnerable to malware. Securing your computer, using a strong passphrase, moving most of your funds to cold storage or enabling two-factor authentication can make it harder to steal on your bitcoins.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This service can associate your payments together, log your IP address and know your real identity if you provide personal information like your email, name or banking account.

Tor can be used

This wallet lets you setup and use Tor as a proxy to prevent attackers or Internet service providers from associating your payments with your IP address.

Coinapult's wallet is designed with Bitcoin newcomers in mind. It allows sending bitcoins via email and SMS, and a handy tool called Locks helps protecting your balance from Bitcoin price swings. Users can Lock bitcoins to Gold, Euros, and more!

screenshot
CoinapultCoinapult

Circle

Money controlled by a third party

This service has full control over your bitcoins. This means you need to trust this service will not freeze or mismanage your funds. Although this service claims to be providing insurance against failures on their side, you are still responsible for securing your wallet.

Centralized validation

This wallet relies on a centralized service by default. This means a third party must be trusted to not hide or simulate payments.

Remote app

This wallet is loaded from a remote location. This means that whenever you use your wallet, you need to trust the developers not to steal or lose your bitcoins in an incident on their site. Using a browser extension or mobile app, if available, can reduce that risk.

Two-factor authentication

This wallet can be used from insecure environments. However, this service requires two-factor authentication. This means access to multiple devices or accounts is required to steal your bitcoins.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This service can associate your payments together, log your IP address and know your real identity if you provide personal information like your email, name or banking account.

Tor can be used

This wallet lets you setup and use Tor as a proxy to prevent attackers or Internet service providers from associating your payments with your IP address.

Circle is a web wallet service that aims to be easy to use. It provides the ability to instantly purchase and sell bitcoins using either a credit card or a U.S. bank account. It also provides an Android and an iOS web wallet app.

screenshot
CircleCircle

Ninki Wallet

WindowsMacLinux
Shared control over your money

This wallet requires every transaction to be authorized both by you and this third party. Under normal circumstances, you can regain full control over your bitcoins using your initial backup or pre-signed transactions sent by email.

Centralized validation

This wallet relies on a centralized service by default. This means a third party must be trusted to not hide or simulate payments.

New app

This wallet has not been tested and publicly reviewed by a significant number of people. This means this app might be more at risk of hiding dangerous code or doing something you wouldn't agree to.

Two-factor authentication

This wallet can be used from insecure environments. However, this service requires two-factor authentication. This means access to multiple devices or accounts is required to steal your bitcoins.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This service can associate your payments together, log your IP address and know your real identity if you provide personal information like your email, name or banking account.

Tor not supported

This wallet does not let you use Tor to prevent attackers or Internet service providers from associating your payments with your IP address.

Ninki is a multi-signature wallet with a beautiful user interface that makes sending bitcoin as easy as email. You have full control of your bitcoins at all times.

screenshot
Ninki WalletNinki

Bitcoin Core

WindowsMacLinux
Control over your money

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Full validation

This wallet is a full node that validates and relays transactions on the Bitcoin network. This means no trust in a third party is required when verifying payments. Full nodes provide the highest level of security and are essential to protecting the network. However, they require more space (over 20GB), bandwidth, and a longer initial synchronization time.

Complete transparency

This wallet is open-source and built deterministically. This means any developer in the world can audit the code and make sure the final software isn't hiding any secrets.

Vulnerable environment

This wallet can be loaded on computers which are vulnerable to malware. Securing your computer, using a strong passphrase, moving most of your funds to cold storage or enabling two-factor authentication can make it harder to steal on your bitcoins.

Improved privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Avoids disclosing information

This wallet does not disclose information to peers on the network when receiving or sending a payment.

Tor can be used

This wallet lets you setup and use Tor as a proxy to prevent attackers or Internet service providers from associating your payments with your IP address.

Bitcoin Core is a full Bitcoin client and builds the backbone of the network. It offers high levels of security, privacy, and stability. However, it has fewer features and it takes a lot of space and memory.

screenshot
Bitcoin CoreBitcoin
Core

MultiBit

WindowsMacLinux
Control over your money

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Simplified validation

This wallet uses SPV and the Bitcoin network. This means very little trust in third parties is required when verifying payments. However, it is not as secure as a full node like Bitcoin Core.

Basic transparency

The developers of this wallet publish the source code for the client. This means any developer in the world can audit the code. However, you still need to trust developers of this wallet when installing or updating the final software because it was not built deterministically like Bitcoin Core.

Vulnerable environment

This wallet can be loaded on computers which are vulnerable to malware. Securing your computer, using a strong passphrase, moving most of your funds to cold storage or enabling two-factor authentication can make it harder to steal on your bitcoins.

Weak privacy

Allows spying on your payments

This wallet makes it easy for anyone to spy on your balance and payments because it reuses the same addresses.

Discloses limited information to peers

Peers on the network can log your IP address and associate your payments together when receiving or sending payment.

Tor not supported

This wallet does not let you use Tor to prevent attackers or Internet service providers from associating your payments with your IP address.

MultiBit is a lightweight client that focuses on being fast and easy to use. It synchronizes with the network and is ready to use in minutes. MultiBit also supports many languages. It is a good choice for non-technical users.

screenshot
MultiBitMultiBit

Armory

WindowsMacLinux
Control over your money

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Full validation

This wallet requires you to install full node software that validates and relays transactions on the Bitcoin network. This means no trust in a third party is required when verifying payments. Full nodes provide the highest level of security and are essential to protecting the network. However, they require more space (over 20GB), bandwidth, and a longer initial synchronization time.

Basic transparency

The developers of this wallet publish the source code for the client. This means any developer in the world can audit the code. However, you still need to trust developers of this wallet when installing or updating the final software because it was not built deterministically like Bitcoin Core.

Vulnerable environment

This wallet can be loaded on computers which are vulnerable to malware. Securing your computer, using a strong passphrase, moving most of your funds to cold storage or enabling two-factor authentication can make it harder to steal on your bitcoins.

Improved privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Avoids disclosing information

This wallet does not disclose information to peers on the network when receiving or sending a payment.

Tor can be used

This wallet lets you setup and use Tor as a proxy to prevent attackers or Internet service providers from associating your payments with your IP address.

Armory is an advanced Bitcoin client that expands its features for Bitcoin power users. It offers many backup and encryption features, and it allows secure cold-storage on offline computers.

screenshot
ArmoryArmory

Electrum

WindowsMacLinux
Control over your money

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Simplified validation

This wallet uses SPV and random servers from a list. This means little trust in third parties is required when verifying payments. However, it is not as secure as a full node like Bitcoin Core.

Basic transparency

The developers of this wallet publish the source code for the client. This means any developer in the world can audit the code. However, you still need to trust developers of this wallet when installing or updating the final software because it was not built deterministically like Bitcoin Core.

Vulnerable environment

This wallet can be loaded on computers which are vulnerable to malware. Securing your computer, using a strong passphrase, moving most of your funds to cold storage or enabling two-factor authentication can make it harder to steal on your bitcoins.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This wallet uses central servers which are able to associate your payments together and log your IP address.

Tor can be used

This wallet lets you setup and use Tor as a proxy to prevent attackers or Internet service providers from associating your payments with your IP address.

Electrum's focus is speed and simplicity, with low resource usage. It uses remote servers that handle the most complicated parts of the Bitcoin system, and it allows you to recover your wallet from a secret phrase.

screenshot
ElectrumElectrum

mSIGNA

WindowsMacLinux
Control over your money

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Full validation

This wallet requires you to install full node software that validates and relays transactions on the Bitcoin network. This means no trust in a third party is required when verifying payments. Full nodes provide the highest level of security and are essential to protecting the network. However, they require more space (over 20GB), bandwidth, and a longer initial synchronization time.

Basic transparency

The developers of this wallet publish the source code for the client. This means any developer in the world can audit the code. However, you still need to trust developers of this wallet when installing or updating the final software because it was not built deterministically like Bitcoin Core.

Vulnerable environment

This wallet can be loaded on computers which are vulnerable to malware. Securing your computer, using a strong passphrase, moving most of your funds to cold storage or enabling two-factor authentication can make it harder to steal on your bitcoins.

Improved privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Avoids disclosing information

This wallet does not disclose information to peers on the network when receiving or sending a payment.

Tor can be used

This wallet lets you setup and use Tor as a proxy to prevent attackers or Internet service providers from associating your payments with your IP address.

mSIGNA is an advanced yet easy-to-use wallet featuring speed and simplicity, enterprise-level scalability, and strong security. It supports BIP32, multisignature transactions, offline storage, multidevice synchronization, and encrypted electronic and paper backups.

screenshot
mSIGNAmSIGNA

Bitcoin Wallet

AndroidBlackBerry
Control over your money

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Simplified validation

This wallet uses SPV and the Bitcoin network. This means very little trust in third parties is required when verifying payments. However, it is not as secure as a full node like Bitcoin Core.

Basic transparency

The developers of this wallet publish the source code for the client. This means any developer in the world can audit the code. However, you still need to trust developers of this wallet when installing or updating the final software because it was not built deterministically like Bitcoin Core.

Secure environment

This wallet is loaded on mobiles where apps are usually isolated. This provides a good protection against malware, although mobiles are usually easier to steal or lose. Encrypting your mobile and backing up your wallet can reduce that risk.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses limited information to peers

Peers on the network can log your IP address and associate your payments together when receiving or sending payment.

Tor not supported

This wallet does not let you use Tor to prevent attackers or Internet service providers from associating your payments with your IP address.

Bitcoin Wallet is easy to use and reliable, while also being secure and fast. Its vision is de-centralization and zero trust; no central service is needed for Bitcoin-related operations. The app is a good choice for non-technical people.

screenshot
Bitcoin WalletBitcoin
Wallet

Bitcoin Wallet

AndroidBlackBerry
Control over your money

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Simplified validation

This wallet uses SPV and the Bitcoin network. This means very little trust in third parties is required when verifying payments. However, it is not as secure as a full node like Bitcoin Core.

Basic transparency

The developers of this wallet publish the source code for the client. This means any developer in the world can audit the code. However, you still need to trust developers of this wallet when installing or updating the final software because it was not built deterministically like Bitcoin Core.

Secure environment

This wallet is loaded on mobiles where apps are usually isolated. This provides a good protection against malware, although mobiles are usually easier to steal or lose. Encrypting your mobile and backing up your wallet can reduce that risk.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses limited information to peers

Peers on the network can log your IP address and associate your payments together when receiving or sending payment.

Tor not supported

This wallet does not let you use Tor to prevent attackers or Internet service providers from associating your payments with your IP address.

Bitcoin Wallet is easy to use and reliable, while also being secure and fast. Its vision is de-centralization and zero trust; no central service is needed for Bitcoin-related operations. The app is a good choice for non-technical people.

screenshot
Bitcoin WalletBitcoin
Wallet

Bitcoin Wallet

AndroidBlackBerry
Control over your money

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Simplified validation

This wallet uses SPV and the Bitcoin network. This means very little trust in third parties is required when verifying payments. However, it is not as secure as a full node like Bitcoin Core.

Basic transparency

The developers of this wallet publish the source code for the client. This means any developer in the world can audit the code. However, you still need to trust developers of this wallet when installing or updating the final software because it was not built deterministically like Bitcoin Core.

Secure environment

This wallet is loaded on mobiles where apps are usually isolated. This provides a good protection against malware, although mobiles are usually easier to steal or lose. Encrypting your mobile and backing up your wallet can reduce that risk.

Weak privacy

Allows spying on your payments

This wallet makes it easy for anyone to spy on your balance and payments because it reuses the same addresses.

Discloses limited information to peers

Peers on the network can log your IP address and associate your payments together when receiving or sending payment.

Tor not supported

This wallet does not let you use Tor to prevent attackers or Internet service providers from associating your payments with your IP address.

Bitcoin Wallet is easy to use and reliable, while also being secure and fast. Its vision is de-centralization and zero trust; no central service is needed for Bitcoin-related operations. The app is a good choice for non-technical people.

screenshot
Bitcoin WalletBitcoin
Wallet

Airbitz Bitcoin Wallet

AndroidiOS
Hosted control over your money

This wallet gives you control over your bitcoins. However, this service is retaining an encrypted copy of your wallet. This means your bitcoins can be stolen if you don't use a strong password and the service is compromised.

Centralized validation

This wallet relies on a centralized service by default. This means a third party must be trusted to not hide or simulate payments.

New app

This wallet has not been tested and publicly reviewed by a significant number of people. This means this app might be more at risk of hiding dangerous code or doing something you wouldn't agree to.

Secure environment

This wallet is loaded on mobiles where apps are usually isolated. This provides a good protection against malware, although mobiles are usually easier to steal or lose. Encrypting your mobile and backing up your wallet can reduce that risk.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This service can associate your payments together, log your IP address and know your real identity if you provide personal information like your email, name or banking account.

Tor not supported

This wallet does not let you use Tor to prevent attackers or Internet service providers from associating your payments with your IP address.

Airbitz is a mobile Bitcoin Wallet making high levels of privacy, security, and decentralization very familiar and usable to the masses. Airbitz wallets are always automatically encrypted, backed up, and even function when Airbitz servers go down.

screenshot
Airbitz Bitcoin WalletAirbitz

Airbitz Bitcoin Wallet

Android
Hosted control over your money

This wallet gives you control over your bitcoins. However, this service is retaining an encrypted copy of your wallet. This means your bitcoins can be stolen if you don't use a strong password and the service is compromised.

Centralized validation

This wallet relies on a centralized service by default. This means a third party must be trusted to not hide or simulate payments.

New app

This wallet has not been tested and publicly reviewed by a significant number of people. This means this app might be more at risk of hiding dangerous code or doing something you wouldn't agree to.

Secure environment

This wallet is loaded on mobiles where apps are usually isolated. This provides a good protection against malware, although mobiles are usually easier to steal or lose. Encrypting your mobile and backing up your wallet can reduce that risk.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This service can associate your payments together, log your IP address and know your real identity if you provide personal information like your email, name or banking account.

Tor not supported

This wallet does not let you use Tor to prevent attackers or Internet service providers from associating your payments with your IP address.

Airbitz is a mobile Bitcoin Wallet making high levels of privacy, security, and decentralization very familiar and usable to the masses. Airbitz wallets are always automatically encrypted, backed up, and even function when Airbitz servers go down.

screenshot
Airbitz Bitcoin WalletAirbitz

Airbitz Bitcoin Wallet

iOS
Hosted control over your money

This wallet gives you control over your bitcoins. However, this service is retaining an encrypted copy of your wallet. This means your bitcoins can be stolen if you don't use a strong password and the service is compromised.

Centralized validation

This wallet relies on a centralized service by default. This means a third party must be trusted to not hide or simulate payments.

New app

This wallet has not been tested and publicly reviewed by a significant number of people. This means this app might be more at risk of hiding dangerous code or doing something you wouldn't agree to.

Secure environment

This wallet is loaded on mobiles where apps are usually isolated. This provides a good protection against malware, although mobiles are usually easier to steal or lose. Encrypting your mobile and backing up your wallet can reduce that risk.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This service can associate your payments together, log your IP address and know your real identity if you provide personal information like your email, name or banking account.

Tor not supported

This wallet does not let you use Tor to prevent attackers or Internet service providers from associating your payments with your IP address.

Airbitz is a mobile Bitcoin Wallet making high levels of privacy, security, and decentralization very familiar and usable to the masses. Airbitz wallets are always automatically encrypted, backed up, and even function when Airbitz servers go down.

screenshot
Airbitz Bitcoin WalletAirbitz

breadwallet

iOS
Control over your money

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Simplified validation

This wallet uses SPV and the Bitcoin network. This means very little trust in third parties is required when verifying payments. However, it is not as secure as a full node like Bitcoin Core.

Basic transparency

The developers of this wallet publish the source code for the client. This means any developer in the world can audit the code. However, you still need to trust developers of this wallet when installing or updating the final software because it was not built deterministically like Bitcoin Core.

Secure environment

This wallet is loaded on mobiles where apps are usually isolated. This provides a good protection against malware, although mobiles are usually easier to steal or lose. Encrypting your mobile and backing up your wallet can reduce that risk.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses limited information to peers

Peers on the network can log your IP address and associate your payments together when receiving or sending payment.

Tor not supported

This wallet does not let you use Tor to prevent attackers or Internet service providers from associating your payments with your IP address.

Simplicity is breadwallet's core design principle. As a real standalone Bitcoin client, there is no server to get hacked or go down, and by building on iOS's strong security base, breadwallet is designed to protect you from malware, browser security holes, even physical theft.

screenshot
breadwalletbreadwallet

breadwallet

iOS
Control over your money

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Simplified validation

This wallet uses SPV and the Bitcoin network. This means very little trust in third parties is required when verifying payments. However, it is not as secure as a full node like Bitcoin Core.

Basic transparency

The developers of this wallet publish the source code for the client. This means any developer in the world can audit the code. However, you still need to trust developers of this wallet when installing or updating the final software because it was not built deterministically like Bitcoin Core.

Secure environment

This wallet is loaded on mobiles where apps are usually isolated. This provides a good protection against malware, although mobiles are usually easier to steal or lose. Encrypting your mobile and backing up your wallet can reduce that risk.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses limited information to peers

Peers on the network can log your IP address and associate your payments together when receiving or sending payment.

Tor not supported

This wallet does not let you use Tor to prevent attackers or Internet service providers from associating your payments with your IP address.

Simplicity is breadwallet's core design principle. As a real standalone Bitcoin client, there is no server to get hacked or go down, and by building on iOS's strong security base, breadwallet is designed to protect you from malware, browser security holes, even physical theft.

screenshot
breadwalletbreadwallet

TREZOR

Control over your money

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Variable validation

Payment validation features are provided by the software wallet you use with this device. Please see the Validation score for the software wallet you plan to use.

New app

This wallet has not been tested and publicly reviewed by a significant number of people. This means this app might be more at risk of hiding dangerous code or doing something you wouldn't agree to.

Very secure environment

This wallet is loaded from a secure specialized environment provided by the device. This provides very strong protection against computer vulnerabilities and malware since no software can be installed on this environment.

Variable privacy

Privacy features are provided by the software wallet you use with this device. Please see the Privacy score for the software wallet you plan to use.

TREZOR is a hardware wallet providing a high level of security without sacrificing convenience. Unlike cold storage, TREZOR is able to sign transactions while connected to an online device. That means spending bitcoins is secure even when using a compromised computer.

screenshot
TREZORTREZOR

Ledger Nano

Control over your money

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Variable validation

Payment validation features are provided by the software wallet you use with this device. Please see the Validation score for the software wallet you plan to use.

New app

This wallet has not been tested and publicly reviewed by a significant number of people. This means this app might be more at risk of hiding dangerous code or doing something you wouldn't agree to.

Very secure environment

This wallet is loaded from a secure specialized environment provided by the device. This provides very strong protection against computer vulnerabilities and malware since no software can be installed on this environment.

Variable privacy

Privacy features are provided by the software wallet you use with this device. Please see the Privacy score for the software wallet you plan to use.

Ledger Nano is a hardware wallet built upon a ST23YT66 banking smartcard platform. It keeps the user private keys safe, validates transactions, can be used as a secure prepaid card or a multisignature party. While not open-source, it can be deterministically validated.

screenshot
Ledger NanoLedger
Nano

Bither

iOS
Control over your money

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Simplified validation

This wallet uses SPV and the Bitcoin network. This means very little trust in third parties is required when verifying payments. However, it is not as secure as a full node like Bitcoin Core.

Basic transparency

The developers of this wallet publish the source code for the client. This means any developer in the world can audit the code. However, you still need to trust developers of this wallet when installing or updating the final software because it was not built deterministically like Bitcoin Core.

Secure environment

This wallet is loaded on mobiles where apps are usually isolated. This provides a good protection against malware, although mobiles are usually easier to steal or lose. Encrypting your mobile and backing up your wallet can reduce that risk.

Weak privacy

Allows spying on your payments

This wallet makes it easy for anyone to spy on your balance and payments because it reuses the same addresses.

Discloses limited information to peers

Peers on the network can log your IP address and associate your payments together when receiving or sending payment.

Tor not supported

This wallet does not let you use Tor to prevent attackers or Internet service providers from associating your payments with your IP address.

Bither is a simple and secure wallet on many platforms. With special designed Cold/Hot modes, user can easily get both safety and simplicity. Bither's XRANDOM uses different entropy sources to generate true random number for users. Also with HDM, users can have HD's advantages and Multisig's security.

screenshot
BitherBither

Bither

iOS
Control over your money

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Simplified validation

This wallet uses SPV and the Bitcoin network. This means very little trust in third parties is required when verifying payments. However, it is not as secure as a full node like Bitcoin Core.

Basic transparency

The developers of this wallet publish the source code for the client. This means any developer in the world can audit the code. However, you still need to trust developers of this wallet when installing or updating the final software because it was not built deterministically like Bitcoin Core.

Secure environment

This wallet is loaded on mobiles where apps are usually isolated. This provides a good protection against malware, although mobiles are usually easier to steal or lose. Encrypting your mobile and backing up your wallet can reduce that risk.

Weak privacy

Allows spying on your payments

This wallet makes it easy for anyone to spy on your balance and payments because it reuses the same addresses.

Discloses limited information to peers

Peers on the network can log your IP address and associate your payments together when receiving or sending payment.

Tor not supported

This wallet does not let you use Tor to prevent attackers or Internet service providers from associating your payments with your IP address.

Bither is a simple and secure wallet on many platforms. With special designed Cold/Hot modes, user can easily get both safety and simplicity. Bither's XRANDOM uses different entropy sources to generate true random number for users. Also with HDM, users can have HD's advantages and Multisig's security.

screenshot
BitherBither

Bither

Android
Control over your money

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Simplified validation

This wallet uses SPV and the Bitcoin network. This means very little trust in third parties is required when verifying payments. However, it is not as secure as a full node like Bitcoin Core.

Basic transparency

The developers of this wallet publish the source code for the client. This means any developer in the world can audit the code. However, you still need to trust developers of this wallet when installing or updating the final software because it was not built deterministically like Bitcoin Core.

Secure environment

This wallet is loaded on mobiles where apps are usually isolated. This provides a good protection against malware, although mobiles are usually easier to steal or lose. Encrypting your mobile and backing up your wallet can reduce that risk.

Weak privacy

Allows spying on your payments

This wallet makes it easy for anyone to spy on your balance and payments because it reuses the same addresses.

Discloses limited information to peers

Peers on the network can log your IP address and associate your payments together when receiving or sending payment.

Tor not supported

This wallet does not let you use Tor to prevent attackers or Internet service providers from associating your payments with your IP address.

Bither is a simple and secure wallet on many platforms. With special designed Cold/Hot modes, user can easily get both safety and simplicity. Bither's XRANDOM uses different entropy sources to generate true random number for users. Also with HDM, users can have HD's advantages and Multisig's security.

screenshot
BitherBither

Bither

WindowsMacLinux
Control over your money

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Simplified validation

This wallet uses SPV and the Bitcoin network. This means very little trust in third parties is required when verifying payments. However, it is not as secure as a full node like Bitcoin Core.

Basic transparency

The developers of this wallet publish the source code for the client. This means any developer in the world can audit the code. However, you still need to trust developers of this wallet when installing or updating the final software because it was not built deterministically like Bitcoin Core.

Vulnerable environment

This wallet can be loaded on computers which are vulnerable to malware. Securing your computer, using a strong passphrase, moving most of your funds to cold storage or enabling two-factor authentication can make it harder to steal on your bitcoins.

Weak privacy

Allows spying on your payments

This wallet makes it easy for anyone to spy on your balance and payments because it reuses the same addresses.

Discloses limited information to peers

Peers on the network can log your IP address and associate your payments together when receiving or sending payment.

Tor not supported

This wallet does not let you use Tor to prevent attackers or Internet service providers from associating your payments with your IP address.

Bither is a simple and secure wallet on many platforms. With special designed Cold/Hot modes, user can easily get both safety and simplicity. Bither's XRANDOM uses different entropy sources to generate true random number for users. Also with HDM, users can have HD's advantages and Multisig's security.

screenshot
BitherBither

Hive

Android
Control over your money

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Centralized validation

This wallet relies on a centralized service by default. This means a third party must be trusted to not hide or simulate payments.

New app

This wallet has not been tested and publicly reviewed by a significant number of people. This means this app might be more at risk of hiding dangerous code or doing something you wouldn't agree to.

Secure environment

This wallet is loaded on mobiles where apps are usually isolated. This provides a good protection against malware, although mobiles are usually easier to steal or lose. Encrypting your mobile and backing up your wallet can reduce that risk.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This service can associate your payments together, log your IP address and know your real identity if you provide personal information like your email, name or banking account.

Tor not supported

This wallet does not let you use Tor to prevent attackers or Internet service providers from associating your payments with your IP address.

Hive is a human-friendly Bitcoin and Litecoin wallet, which features a beautiful, elegant and simple interface. It offers Waggle, a simple way to send & receive tokens with other Hive users near you. Your passphrase generates your wallet, making it portable and backups easy.

screenshot
HiveHive

Hive

Android
Control over your money

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Centralized validation

This wallet relies on a centralized service by default. This means a third party must be trusted to not hide or simulate payments.

New app

This wallet has not been tested and publicly reviewed by a significant number of people. This means this app might be more at risk of hiding dangerous code or doing something you wouldn't agree to.

Secure environment

This wallet is loaded on mobiles where apps are usually isolated. This provides a good protection against malware, although mobiles are usually easier to steal or lose. Encrypting your mobile and backing up your wallet can reduce that risk.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This service can associate your payments together, log your IP address and know your real identity if you provide personal information like your email, name or banking account.

Tor not supported

This wallet does not let you use Tor to prevent attackers or Internet service providers from associating your payments with your IP address.

Hive is a human-friendly Bitcoin and Litecoin wallet, which features a beautiful, elegant and simple interface. It offers Waggle, a simple way to send & receive tokens with other Hive users near you. Your passphrase generates your wallet, making it portable and backups easy.

screenshot
HiveHive

Hive

iOS
Control over your money

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Centralized validation

This wallet relies on a centralized service by default. This means a third party must be trusted to not hide or simulate payments.

New app

This wallet has not been tested and publicly reviewed by a significant number of people. This means this app might be more at risk of hiding dangerous code or doing something you wouldn't agree to.

Secure environment

This wallet is loaded on mobiles where apps are usually isolated. This provides a good protection against malware, although mobiles are usually easier to steal or lose. Encrypting your mobile and backing up your wallet can reduce that risk.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This service can associate your payments together, log your IP address and know your real identity if you provide personal information like your email, name or banking account.

Tor not supported

This wallet does not let you use Tor to prevent attackers or Internet service providers from associating your payments with your IP address.

Hive is a human-friendly Bitcoin and Litecoin wallet, which features a beautiful, elegant and simple interface. It offers Waggle, a simple way to send & receive tokens with other Hive users near you. Your passphrase generates your wallet, making it portable and backups easy.

screenshot
HiveHive

Hive

Mac
Control over your money

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Simplified validation

This wallet uses SPV and the Bitcoin network. This means very little trust in third parties is required when verifying payments. However, it is not as secure as a full node like Bitcoin Core.

Basic transparency

The developers of this wallet publish the source code for the client. This means any developer in the world can audit the code. However, you still need to trust developers of this wallet when installing or updating the final software because it was not built deterministically like Bitcoin Core.

Vulnerable environment

This wallet can be loaded on computers which are vulnerable to malware. Securing your computer, using a strong passphrase, moving most of your funds to cold storage or enabling two-factor authentication can make it harder to steal on your bitcoins.

Weak privacy

Allows spying on your payments

This wallet makes it easy for anyone to spy on your balance and payments because it reuses the same addresses.

Discloses limited information to peers

Peers on the network can log your IP address and associate your payments together when receiving or sending payment.

Tor can be used

This wallet lets you setup and use Tor as a proxy to prevent attackers or Internet service providers from associating your payments with your IP address.

Hive is a fast, integrated, user-friendly Bitcoin wallet for Mac OS X. With a focus on usability, Hive is translated into many languages and has apps, making it easy to interact with your favorite Bitcoin services and merchants.

screenshot
HiveHive

Hive

Control over your money

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Centralized validation

This wallet relies on a centralized service by default. This means a third party must be trusted to not hide or simulate payments.

Remote app

This wallet is loaded from a remote location. This means that whenever you use your wallet, you need to trust the developers not to steal or lose your bitcoins in an incident on their site. Using a browser extension or mobile app, if available, can reduce that risk.

Vulnerable environment

This wallet can be loaded on computers which are vulnerable to malware. Securing your computer, using a strong passphrase, moving most of your funds to cold storage or enabling two-factor authentication can make it harder to steal on your bitcoins.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This service can associate your payments together, log your IP address and know your real identity if you provide personal information like your email, name or banking account.

Tor can be used

This wallet lets you setup and use Tor as a proxy to prevent attackers or Internet service providers from associating your payments with your IP address.

Hive is a human-friendly Bitcoin and Litecoin wallet, which features a beautiful, elegant and simple interface. It offers Waggle, a simple way to send & receive tokens with other Hive users near you. Your passphrase generates your wallet, making it portable and backups easy.

screenshot
HiveHive

Mycelium

Android
Control over your money

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Centralized validation

This wallet relies on a centralized service by default. This means a third party must be trusted to not hide or simulate payments.

Basic transparency

The developers of this wallet publish the source code for the client. This means any developer in the world can audit the code. However, you still need to trust developers of this wallet when installing or updating the final software because it was not built deterministically like Bitcoin Core.

Secure environment

This wallet is loaded on mobiles where apps are usually isolated. This provides a good protection against malware, although mobiles are usually easier to steal or lose. Encrypting your mobile and backing up your wallet can reduce that risk.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This wallet uses central servers which are able to associate your payments together and log your IP address.

Tor can be used

This wallet lets you setup and use Tor as a proxy to prevent attackers or Internet service providers from associating your payments with your IP address.

Mycelium Bitcoin Wallet is an open source wallet for Android designed for security, speed, and ease of use. It has unique features to manage your keys and for cold storage that help you secure your bitcoins.

screenshot
MyceliumMycelium

BitGo

WindowsMacLinux
Shared control over your money

This wallet requires every transaction to be authorized both by you and this third party. Under normal circumstances, you can regain full control over your bitcoins using your initial backup or pre-signed transactions sent by email.

Centralized validation

This wallet relies on a centralized service by default. This means a third party must be trusted to not hide or simulate payments.

Remote app

This wallet is loaded from a remote location. This means that whenever you use your wallet, you need to trust the developers not to steal or lose your bitcoins in an incident on their site. Using a browser extension or mobile app, if available, can reduce that risk.

Two-factor authentication

This wallet can be used from insecure environments. However, this service requires two-factor authentication. This means access to multiple devices or accounts is required to steal your bitcoins.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This service can associate your payments together, log your IP address and know your real identity if you provide personal information like your email, name or banking account.

Tor can be used

This wallet lets you setup and use Tor as a proxy to prevent attackers or Internet service providers from associating your payments with your IP address.

BitGo is a high-security multi-sig wallet, which protects your bitcoin from theft and loss. You maintain full custody; BitGo cannot spend or freeze funds. BitGo wallets are easy to use and offer advanced security features such as spending limits and multi-user access.

screenshot
BitGoBitGo

BitGo

Shared control over your money

This wallet requires every transaction to be authorized both by you and this third party. Under normal circumstances, you can regain full control over your bitcoins using your initial backup or pre-signed transactions sent by email.

Centralized validation

This wallet relies on a centralized service by default. This means a third party must be trusted to not hide or simulate payments.

Remote app

This wallet is loaded from a remote location. This means that whenever you use your wallet, you need to trust the developers not to steal or lose your bitcoins in an incident on their site. Using a browser extension or mobile app, if available, can reduce that risk.

Two-factor authentication

This wallet can be used from insecure environments. However, this service requires two-factor authentication. This means access to multiple devices or accounts is required to steal your bitcoins.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This service can associate your payments together, log your IP address and know your real identity if you provide personal information like your email, name or banking account.

Tor can be used

This wallet lets you setup and use Tor as a proxy to prevent attackers or Internet service providers from associating your payments with your IP address.

BitGo is a high-security multi-sig wallet, which protects your bitcoin from theft and loss. You maintain full custody; BitGo cannot spend or freeze funds. BitGo wallets are easy to use and offer advanced security features such as spending limits and multi-user access.

screenshot
BitGoBitGo

GreenAddress

AndroidiOS
Shared control over your money

This wallet requires every transaction to be authorized both by you and this third party. Under normal circumstances, you can regain full control over your bitcoins using your initial backup or pre-signed transactions sent by email.

Decentralized validation

This wallet connects to a random server from a list. This means some trust in third parties is required when verifying payments. However, it is not as secure as a full node like Bitcoin Core.

Basic transparency

The developers of this wallet publish the source code for the client. This means any developer in the world can audit the code. However, you still need to trust developers of this wallet when installing or updating the final software because it was not built deterministically like Bitcoin Core.

Two-factor authentication

This wallet can be used from insecure environments. However, this service requires two-factor authentication. This means access to multiple devices or accounts is required to steal your bitcoins.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This service can associate your payments together, log your IP address and know your real identity if you provide personal information like your email, name or banking account.

Tor not supported

This wallet does not let you use Tor to prevent attackers or Internet service providers from associating your payments with your IP address.

GreenAddress is a user-friendly multi-signature wallet with improved security and privacy. At no time are your keys server side, even encrypted. For security reasons, you should always use 2FA and the browser extension or Android App.

screenshot
GreenAddressGreen
Address

GreenAddress

WindowsMacLinux
Shared control over your money

This wallet requires every transaction to be authorized both by you and this third party. Under normal circumstances, you can regain full control over your bitcoins using your initial backup or pre-signed transactions sent by email.

Centralized validation

This wallet relies on a centralized service by default. This means a third party must be trusted to not hide or simulate payments.

Remote app

This wallet is loaded from a remote location. This means that whenever you use your wallet, you need to trust the developers not to steal or lose your bitcoins in an incident on their site. Using a browser extension or mobile app, if available, can reduce that risk.

Two-factor authentication

This wallet can be used from insecure environments. However, this service requires two-factor authentication. This means access to multiple devices or accounts is required to steal your bitcoins.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This service can associate your payments together, log your IP address and know your real identity if you provide personal information like your email, name or banking account.

Tor can be used

This wallet lets you setup and use Tor as a proxy to prevent attackers or Internet service providers from associating your payments with your IP address.

GreenAddress is a user-friendly multi-signature wallet with improved security and privacy. At no time are your keys server side, even encrypted. For security reasons, you should always use 2FA and the browser extension or Android App.

screenshot
GreenAddressGreen
Address

GreenAddress

Shared control over your money

This wallet requires every transaction to be authorized both by you and this third party. Under normal circumstances, you can regain full control over your bitcoins using your initial backup or pre-signed transactions sent by email.

Centralized validation

This wallet relies on a centralized service by default. This means a third party must be trusted to not hide or simulate payments.

Remote app

This wallet is loaded from a remote location. This means that whenever you use your wallet, you need to trust the developers not to steal or lose your bitcoins in an incident on their site. Using a browser extension or mobile app, if available, can reduce that risk.

Two-factor authentication

This wallet can be used from insecure environments. However, this service requires two-factor authentication. This means access to multiple devices or accounts is required to steal your bitcoins.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This service can associate your payments together, log your IP address and know your real identity if you provide personal information like your email, name or banking account.

Tor can be used

This wallet lets you setup and use Tor as a proxy to prevent attackers or Internet service providers from associating your payments with your IP address.

GreenAddress is a user-friendly multi-signature wallet with improved security and privacy. At no time are your keys server side, even encrypted. For security reasons, you should always use 2FA and the browser extension or Android App.

screenshot
GreenAddressGreen
Address

GreenAddress

AndroidiOS
Shared control over your money

This wallet requires every transaction to be authorized both by you and this third party. Under normal circumstances, you can regain full control over your bitcoins using your initial backup or pre-signed transactions sent by email.

Decentralized validation

This wallet connects to a random server from a list. This means some trust in third parties is required when verifying payments. However, it is not as secure as a full node like Bitcoin Core.

Basic transparency

The developers of this wallet publish the source code for the client. This means any developer in the world can audit the code. However, you still need to trust developers of this wallet when installing or updating the final software because it was not built deterministically like Bitcoin Core.

Two-factor authentication

This wallet can be used from insecure environments. However, this service requires two-factor authentication. This means access to multiple devices or accounts is required to steal your bitcoins.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This service can associate your payments together, log your IP address and know your real identity if you provide personal information like your email, name or banking account.

Tor not supported

This wallet does not let you use Tor to prevent attackers or Internet service providers from associating your payments with your IP address.

GreenAddress is a user-friendly multi-signature wallet with improved security and privacy. At no time are your keys server side, even encrypted. For security reasons, you should always use 2FA and the browser extension or Android App.

screenshot
GreenAddressGreen
Address

GreenAddress

AndroidiOS
Shared control over your money

This wallet requires every transaction to be authorized both by you and this third party. Under normal circumstances, you can regain full control over your bitcoins using your initial backup or pre-signed transactions sent by email.

Decentralized validation

This wallet connects to a random server from a list. This means some trust in third parties is required when verifying payments. However, it is not as secure as a full node like Bitcoin Core.

Basic transparency

The developers of this wallet publish the source code for the client. This means any developer in the world can audit the code. However, you still need to trust developers of this wallet when installing or updating the final software because it was not built deterministically like Bitcoin Core.

Two-factor authentication

This wallet can be used from insecure environments. However, this service requires two-factor authentication. This means access to multiple devices or accounts is required to steal your bitcoins.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This service can associate your payments together, log your IP address and know your real identity if you provide personal information like your email, name or banking account.

Tor not supported

This wallet does not let you use Tor to prevent attackers or Internet service providers from associating your payments with your IP address.

GreenAddress is a user-friendly multi-signature wallet with improved security and privacy. At no time are your keys server side, even encrypted. For security reasons, you should always use 2FA and the browser extension or Android App.

screenshot
GreenAddressGreen
Address

Coinbase

Money controlled by a third party

This service has full control over your bitcoins. This means you need to trust this service will not lose your funds in an incident on their side. As of today, most web wallets don't insure their deposits like a bank, and many such services have suffered from security breaches in the past.

Centralized validation

This wallet relies on a centralized service by default. This means a third party must be trusted to not hide or simulate payments.

Remote app

This wallet is loaded from a remote location. This means that whenever you use your wallet, you need to trust the developers not to steal or lose your bitcoins in an incident on their site. Using a browser extension or mobile app, if available, can reduce that risk.

Vulnerable environment

This wallet can be loaded on computers which are vulnerable to malware. Securing your computer, using a strong passphrase, moving most of your funds to cold storage or enabling two-factor authentication can make it harder to steal on your bitcoins.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This service can associate your payments together, log your IP address and know your real identity if you provide personal information like your email, name or banking account.

Tor can be used

This wallet lets you setup and use Tor as a proxy to prevent attackers or Internet service providers from associating your payments with your IP address.

Coinbase is a web wallet service that aims to be easy to use. It also provides an Android web wallet app, merchant tools and integration with US bank accounts to buy and sell bitcoins.

screenshot
CoinbaseCoinbase

Coinkite

Money controlled by a third party

This service has full control over your bitcoins. This means you need to trust this service will not lose your funds in an incident on their side. As of today, most web wallets don't insure their deposits like a bank, and many such services have suffered from security breaches in the past.

Centralized validation

This wallet relies on a centralized service by default. This means a third party must be trusted to not hide or simulate payments.

Remote app

This wallet is loaded from a remote location. This means that whenever you use your wallet, you need to trust the developers not to steal or lose your bitcoins in an incident on their site. Using a browser extension or mobile app, if available, can reduce that risk.

Vulnerable environment

This wallet can be loaded on computers which are vulnerable to malware. Securing your computer, using a strong passphrase, moving most of your funds to cold storage or enabling two-factor authentication can make it harder to steal on your bitcoins.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This service can associate your payments together, log your IP address and know your real identity if you provide personal information like your email, name or banking account.

Tor can be used

This wallet lets you setup and use Tor as a proxy to prevent attackers or Internet service providers from associating your payments with your IP address.

Coinkite is a web wallet & debit card service that aims to be easy to use. It also works on mobile browsers, has merchant tools, point-of-sale payment terminals. It is a hybrid wallet and full reserve vault.

screenshot
CoinkiteCoinkite

Xapo

Money controlled by a third party

This service has full control over your bitcoins. This means you need to trust this service will not freeze or mismanage your funds. Although this service claims to be providing insurance against failures on their side, you are still responsible for securing your wallet.

Centralized validation

This wallet relies on a centralized service by default. This means a third party must be trusted to not hide or simulate payments.

Remote app

This wallet is loaded from a remote location. This means that whenever you use your wallet, you need to trust the developers not to steal or lose your bitcoins in an incident on their site. Using a browser extension or mobile app, if available, can reduce that risk.

Vulnerable environment

This wallet can be loaded on computers which are vulnerable to malware. Securing your computer, using a strong passphrase, moving most of your funds to cold storage or enabling two-factor authentication can make it harder to steal on your bitcoins.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This service can associate your payments together, log your IP address and know your real identity if you provide personal information like your email, name or banking account.

Tor can be used

This wallet lets you setup and use Tor as a proxy to prevent attackers or Internet service providers from associating your payments with your IP address.

Xapo combines the convenience of an everyday Bitcoin wallet with the security of an insured deep cold storage vault. Xapo Debit Card links to your Xapo Wallet and allows you to spend bitcoins at millions of merchants all around the world.

screenshot
XapoXapo

Coinapult

Money controlled by a third party

This service has full control over your bitcoins. This means you need to trust this service will not lose your funds in an incident on their side. As of today, most web wallets don't insure their deposits like a bank, and many such services have suffered from security breaches in the past.

Centralized validation

This wallet relies on a centralized service by default. This means a third party must be trusted to not hide or simulate payments.

Remote app

This wallet is loaded from a remote location. This means that whenever you use your wallet, you need to trust the developers not to steal or lose your bitcoins in an incident on their site. Using a browser extension or mobile app, if available, can reduce that risk.

Vulnerable environment

This wallet can be loaded on computers which are vulnerable to malware. Securing your computer, using a strong passphrase, moving most of your funds to cold storage or enabling two-factor authentication can make it harder to steal on your bitcoins.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This service can associate your payments together, log your IP address and know your real identity if you provide personal information like your email, name or banking account.

Tor can be used

This wallet lets you setup and use Tor as a proxy to prevent attackers or Internet service providers from associating your payments with your IP address.

Coinapult's wallet is designed with Bitcoin newcomers in mind. It allows sending bitcoins via email and SMS, and a handy tool called Locks helps protecting your balance from Bitcoin price swings. Users can Lock bitcoins to Gold, Euros, and more!

screenshot
CoinapultCoinapult

Circle

Money controlled by a third party

This service has full control over your bitcoins. This means you need to trust this service will not freeze or mismanage your funds. Although this service claims to be providing insurance against failures on their side, you are still responsible for securing your wallet.

Centralized validation

This wallet relies on a centralized service by default. This means a third party must be trusted to not hide or simulate payments.

Remote app

This wallet is loaded from a remote location. This means that whenever you use your wallet, you need to trust the developers not to steal or lose your bitcoins in an incident on their site. Using a browser extension or mobile app, if available, can reduce that risk.

Two-factor authentication

This wallet can be used from insecure environments. However, this service requires two-factor authentication. This means access to multiple devices or accounts is required to steal your bitcoins.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This service can associate your payments together, log your IP address and know your real identity if you provide personal information like your email, name or banking account.

Tor can be used

This wallet lets you setup and use Tor as a proxy to prevent attackers or Internet service providers from associating your payments with your IP address.

Circle is a web wallet service that aims to be easy to use. It provides the ability to instantly purchase and sell bitcoins using either a credit card or a U.S. bank account. It also provides an Android and an iOS web wallet app.

screenshot
CircleCircle

Ninki Wallet

WindowsMacLinux
Shared control over your money

This wallet requires every transaction to be authorized both by you and this third party. Under normal circumstances, you can regain full control over your bitcoins using your initial backup or pre-signed transactions sent by email.

Centralized validation

This wallet relies on a centralized service by default. This means a third party must be trusted to not hide or simulate payments.

New app

This wallet has not been tested and publicly reviewed by a significant number of people. This means this app might be more at risk of hiding dangerous code or doing something you wouldn't agree to.

Two-factor authentication

This wallet can be used from insecure environments. However, this service requires two-factor authentication. This means access to multiple devices or accounts is required to steal your bitcoins.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This service can associate your payments together, log your IP address and know your real identity if you provide personal information like your email, name or banking account.

Tor not supported

This wallet does not let you use Tor to prevent attackers or Internet service providers from associating your payments with your IP address.

Ninki is a multi-signature wallet with a beautiful user interface that makes sending bitcoin as easy as email. You have full control of your bitcoins at all times.

screenshot
Ninki WalletNinki

warningTake time to educate yourself

Bitcoin is different from what you know and use every day. Before you start using Bitcoin for any serious transaction, be sure to read what you need to know and take appropriate steps to secure your wallet. Always remember that it is your responsibility to choose your wallet carefully and adopt good practices in order to protect your money.