Rating Bitcoin Wallets
|Privacy||Trust||Security||Ease of Use|
|Hidden Wallet (not in production)||☑☑||☑||☑☑☑☑||☑|
|Blockchain.info + SharedCoin (not in production)||☑||☑||☑☑☑|
|Electrum (Desktop) + Bitcoin Core with Electrum Server||☑||☑☑||☑☑☑☑☑|
|Electrum (Desktop) + Bitcoin Core (through Electrum Personal Server)||☑||☑☑||☑☑☑☑☑|
|Trezor + Electrum (Desktop)||☑||☑☑☑☑||☑☑|
|Trezor + Electrum (Desktop) + Bitcoin Core with Electrum Server||☑||☑☑||☑☑☑☑☑|
|Trezor + Electrum (Desktop) + Bitcoin Core (through Electrum Personal Server)||☑||☑☑||☑☑☑☑☑|
|Mycelium + ShufflePuff (not in production)||☑||☑☑||☑☑☑|
|JoinMarket with blockr.io API (not in production)||☑||☑☑☑||☑☑|
|JoinMarket + Bitcoin Core||☑☑||☑☑||☑☑☑☑☑|
|Stratis: Breeze Wallet||☑☑||☑||☑☑☑☑||☑|
|Paper Wallet (generated offline, spent by imported into a full node)||☑||☑☑||☑☑☑☑☑☑|
If any decision I made here is not clear or you find debatable, please open an issue.
Jonas rated the wallets in three main categories: privacy, trust and security. I expand on these with sub categories, define requirements and I add a new, ease of use category to this.
Beware that, the properties of privacy, trust and security are similar in a sense that, they fail where they are the weakest. This notion limits the reliability of this rating system.
I/a. Blockchain Level Privacy
Can the wallet sufficiently withstand blockchain analysis? (☑/ )
I/b. Network Level Privacy
Does the wallet get to know the current state of the blockchain without leaking relevant information to third parties? (☑/ )
Full Nodes (☑☑) / SPV nodes (☑) / Centrally Validating Nodes ( )
III/a. Privacy (Hiding)
Hiding (☑/ ) could be another subcategory of Privacy, however it is less relevant from a privacy point of view and more relevant from a security point of view. The criteria for Hiding is, if the wallet runs on a general purpose environment or not. Currently all wallets are such wallets, except hardware wallets.
This subcategory is the same as the Trust main category. This is necessary to include into the Security, because getting tricked by third parties is a direct security risk. Thus we duplicate it, so to denote the interconnectedness of the properties. (☑☑ / ☑ / )
III/c. Key Safety
Is spending from the wallet happens in a...
- cold environment (☑☑☑)
- desktop (☑☑)
- mobile (☑)
- browser ( )
- private keys are not controlled by the user (
Ease of Use
- Using the wallet is instant and doesn't require initial sync or setup. (☑☑☑)
- Using the wallet is instant, but a bit of initial sync is required or setup. (☑☑)
- Using the wallet requires sync every time when opening it and a bit of initial sync or setup required (☑)
- Using the wallet requires sync every time when opening it and a considerable amount of initial sync or setup is required ( )