At Consensus 2026, Cardano founder Charles Hoskinson delivered a bold vision for the future of cryptocurrency wallets, stating that "users should probably never have their private keys." He emphasized that "something should have the private keys for the users," shifting the burden of security from individuals to the devices they already trust.
Hoskinson argued that the secure chips embedded in modern smartphones—including iPhones, Android devices, and Samsung phones—offer superior protection compared to traditional hardware wallets like Ledger and Trezor. Most crypto users, he noted, already carry advanced signing hardware in their pockets without realizing it.
Why Private Key Management Has Been a Barrier to Crypto Adoption
Private key management has long been a major obstacle to retail adoption in cryptocurrency. Since Bitcoin’s early days, users have struggled with 12- or 24-word seed phrases, often losing them, misplacing them, or storing them insecurely—such as in cloud notes or photographs. While hardware wallets like Ledger and Trezor solved the extraction problem by keeping keys offline, they introduced friction that mainstream users have consistently rejected.
Recent data from FIDO Alliance reveals that there are now 5 billion active passkeys globally, with 75% of consumers having enabled at least one. This shift reflects a growing acceptance of device-bound, biometric-unlocked credentials as a standard authentication method.
Coinbase’s smart wallet exemplifies this trend by allowing users to onboard without a recovery phrase. Instead, it leverages Apple or Google passkeys to create a non-exportable credential bound to secure hardware. Users interact with their wallets via Face ID or a PIN, eliminating the need for complex seed phrases.
How Modern Smartphone Security Stacks Up Against Hardware Wallets
Hoskinson highlighted the robust security features of leading smartphone platforms:
- Apple’s Secure Enclave: A dedicated, isolated subsystem that protects sensitive data even if the main processor is compromised.
- Android’s Keystore system: Supports hardware-backed keys that remain non-exportable and can bind to a Trusted Execution Environment (TEE) or secure element. StrongBox implementations add a dedicated CPU and further isolation.
- Samsung’s Knox system: Provides hardware-backed key protection through TrustZone, with DualDAR adding extra encryption layers for managed work profile data. Knox’s work profile, Hoskinson noted, functions as "a separate operating system, separate circuits in the hardware."
Comparison: Seed Phrase Wallets vs. Phone-Based Hardware-Backed Wallets
| Model | Where the key lives | Can the key be extracted? | Can malware still trick signing? | How transaction details are verified | Best use case |
|---|---|---|---|---|---|
| Seed phrase wallet | Derived from a 12- or 24-word recovery phrase, often stored in software or written down by the user | Yes, potentially — the secret can be exposed through bad storage, screenshots, cloud backups, phishing, or device compromise | Yes — if the wallet app or device is compromised, the attacker may trick the user or steal the secret outright | Usually through the wallet app interface on the same device | Low-friction onboarding, small balances, users comfortable with manual backup |
| Phone-based hardware-backed wallet | Inside a phone’s secure hardware, such as Apple Secure Enclave, Android Keystore/TEE/StrongBox, or Samsung Knox-backed protections | Generally no — the key can remain non-exportable and bound to device hardware | Yes — the key may stay protected, but a compromised app or OS could still try to get the device to sign something malicious | Through the phone UI, biometrics, PIN, and wallet prompts; security depends heavily on approval UX and intent verification | Everyday payments, routine self-custody, mainstream users, seedless/passkey-style onboarding |
What This Means for the Future of Crypto Wallets
Hoskinson’s vision aligns with the broader industry shift toward passwordless authentication and device-bound security. By leveraging the secure hardware already present in smartphones, crypto wallets could become more accessible, secure, and user-friendly for mainstream adoption.
The rise of passkeys and smart wallets suggests that users are increasingly comfortable with biometric authentication and hardware-backed credentials. As these technologies evolve, the need for traditional seed phrases may diminish, paving the way for a more seamless crypto experience.