ETHO Wallets Introduction
Last updated
Was this helpful?
Last updated
Was this helpful?
How you store and access your ETHO is directly proportional to how secure your funds will be. In the fight against malfeasance actors in the crypt scene, we are our own best ally. We need to remain vigilant and steadfast in how we approach every cryptocurrency transaction.
The Etho Protocol project currently supplies two methods for transferring ETHO between users.
: Installed on Windows or Linux machines. This wallet generates UTC/JSON files encrypted with passwords that represent the user's accounts.
:
Accessible via the web at (always check address & certificate). This wallet generated UTC/JSON files encrypted with passwords that represent the user's accounts. It also allows the user to extract the , which is another way to access the wallet in addition to the UTC/JSON way. The web wallet supports the use of hardware wallets, which greatly enhance user funds protection. To find out how to use the web wallet, see .
You can also use a trusted 3rd party web wallet from in all the same ways as the official web wallet above.