LogoLogo
Go to Bitcoin Support Home
  • Why we recommend Phoenix Wallet
  • Guide Overview
  • 🏰Security Overview
    • Securing the wallet: Overview of the basics
    • WARNING! Important basics to know before setting up a backup
    • How can you lose your Bitcoin?
  • 🔐Create your wallet & backup
    • What you need
    • Wallet Creation
    • Securing Your Backup
  • 📲Send & Receive Bitcoin
    • Steps for receiving payments
    • Steps for Sending Bitcoin
  • 🔎Security & Privacy Configurations
    • Overview
    • Security & Privacy Options
  • ⚠️Summary
    • DO's & DONT's
Powered by GitBook
On this page

Was this helpful?

Export as PDF
  1. Security & Privacy Configurations

Overview

PreviousSteps for Sending BitcoinNextSecurity & Privacy Options

Last updated 3 years ago

Was this helpful?

Phoenix Wallet is a safe method for using Bitcoin if you are not using a hardware wallet or a "multisignature" custody setup.

  • The wallet is open-source and has been reviewed independently to make sure there is no malware or backdoor.

  • The developers cannot have access to your Bitcoin wallet.

  • The private keys that control the Bitcoin are encrypted on your phone. To spend money, you must decrypt your device with your biometrics.

  • Phoenix Wallet protects you well against non-hacker people that gain access to your phone.

  • Phoenix Wallet is more vulnerable to malware and hackers than hardware wallets.

  • Phoenix Wallet lets you create backups easily and securely which let you recover access to your money if your phone is damaged, lost or stolen.

  • See their

  • Additional

  • support group

🔎
Codebase
Documentation
Telegram