At Consensus 2026, Charles Hoskinson from Cardano proposed that the future of crypto wallets lies within smartphones like iPhones and Android devices. He emphasized that users should ideally never have access to their private keys, suggesting these should be managed by secure phone hardware instead.
Hoskinson highlighted that the secure chips embedded in modern phones surpass those found in Ledger and Trezor devices. Most users already carry superior signing technology without realizing it. The management of private keys has been a hurdle since Bitcoin’s inception, with issues like forgotten or improperly stored seed phrases leading to lost funds.
Hardware wallets have resolved some problems by keeping keys on the device itself, although this added friction is often rejected by mainstream users. FIDO reported that 5 billion active passkeys are currently in use worldwide, with 75% of consumers having enabled at least one. This trend shows growing acceptance of device-bound credentials.
Coinbase has implemented a smart wallet system allowing onboarding without recovery phrases, using Apple or Google passkeys and creating non-exportable credentials linked to secure hardware. Biometric authentication such as Face ID or PIN simplifies the user experience.
Hoskinson pointed out that mainstream phones contain robust security features like Apple’s Secure Enclave, Android’s Keystore system with StrongBox implementations, and Samsung’s Knox system, which provides additional encryption layers for work profiles.
There are various models of how keys can be stored and protected. Seed phrase wallets rely on user-managed recovery phrases, while phone-based hardware-backed wallets keep keys non-exportable and bound to device hardware. Dedicated hardware wallets like Ledger or Trezor offer even stronger isolation but require separate devices.
Dedicated wallets have advantages in terms of security for larger balances, whereas phones are more suitable for everyday transactions and routine self-custody due to their integrated nature. The integration of AI into payments introduces bounded delegation as a viable architecture, with agents transacting under preset limits without direct access to private keys.
The transition from handling cryptographic secrets directly to using biometric authentication represents a shift in how users control their digital assets. Apple’s secure intent mechanism and Android Keystore offer per-operation authentication requirements that focus on verifying user authorization rather than simply keeping secrets.
However, even with key non-extractability, compromised applications can still mislead users into approving malicious transactions. The Bybit incident analyzed by CertiK demonstrated this risk, where private keys remained secure but were used fraudulently. Chainalysis reported a significant increase in AI-enabled scams.
Two potential futures exist for mobile self-custody: if user experience and security measures are effective, phone-based wallets could dominate the retail market by 2028; otherwise, losses due to compromised mechanisms might limit their adoption.
Ultimately, integrating self-custody into smartphone hardware may lead to increased dependency on major platform providers like Apple, Google, and Samsung. While non-custodial in a technical sense, wallet security will increasingly rely on the policies of these operating systems.