Review and sign transactions from a single secure screen with Ledger Flex™

Discover now

Kaspa wallet

The right crypto wallet for your Kaspa

Looking for a Kaspa Wallet to buy and store your Kaspa? Join 7+ million customers who trust Ledger hardware wallets to securely store their crypto and use them on the day-to-day basis.

  • Secured by Ledger™

Trusted by over 6 million customers

Kaspa wallet
Ledger Secured Solution

How to secure your Kaspa ?

Connect your Ledger hardware wallet to a compatible third-party wallet to secure and manage your Kaspa.

Ledger hardware wallet

Ledger hardware wallet store your private keys and allow you to sign transactions offline, making them resistant to malicious attacks and threats.

KasVault wallet

With KasVault, you can send/receive, swap Kaspa, view transaction history, and more.

How to get a Kaspa wallet?

1
Get a Ledger Hardware Wallet

Get a Ledger Hardware Wallet

Select and purchase a Ledger wallet of your choice.

  • Beginner in the crypto world? Get started with Ledger Nano X™ or Ledger Nano S Plus™.
  • Prefer a bigger secure touchscreens? Try Ledger Flex X™ or Ledger Stax™.

Get Ledger Hardware Wallet

2
Connect your Ledger device to KasVault

Connect your Ledger device to KasVault

  • Visit the official KasVault website and download and install KasVault.
  • Connect your Ledger Nano to KasVault.
3
Start your Kaspa journey securely

Start your Kaspa journey securely

With your Ledger hardware wallet connected to KasVault, you can review and sign transactions securely.

The best way to keep your Kaspa secure

Compare our wallets

Choice of 7,000,000+ customers

Bertil A.

5/5

In order to secure cryptocurrencies, Ledger is the perfect tool.

Kevin L.

5/5

Simply a very elegant peace of hardware, with a gorgeous UI in the app.

James P.

5/5

ALL is good, all legal resources bought was as specified and compliant, party on.

Read more reviews

What is Kaspa?

Kaspa is a proof-of-work cryptocurrency which implements the GHOSTDAG protocol. Unlike traditional blockchains, GHOSTDAG does not orphan blocks created in parallel, rather allows them to coexist and orders them in consensus. Whereby our blockchain is actually a blockDAG; you can see GHOSTDAG in action in a real time blockDAG visualizer). This generalization of Nakamoto consensus allows for secure operation while maintaining very high block rates (currently one block per second, aiming for 10/sec, dreaming of 100/sec) and minuscule confirmation times dominated by internet latency (cf. chapter 6 of the the paper for some initial benchmarks). The Kaspa implementation includes a lot of cool features and subprotocols including Reachability to query the DAG’s topology, Block data pruning (with near-future plans for block header pruning), SPV proofs, and later subnetwork support which will make future implementation of layer 2 solutions much easier.

Frequently Asked Questions

When you first buy token, you’re issued with two keys: public and private.

  • A public key serves as an address that can be shared with other parties to perform transactions.
  • A private key represents a randomly generated number that signs transactions and protects your assets from malicious attacks. If it gets compromised or lost, you won’t be able to access your hardware wallet to spend, withdraw, or transfer your assets.

To safeguard and keep track of your keys, you can use online or offline wallets. Online wallets, also known as hot wallets, store private keys on systems or devices that are connected to the internet. Hot wallets are easy and convenient to use, however, they come with several drawbacks. Besides being susceptible to attacks and a honeypot for hackers, with hot wallets, the custody of private keys is often entrusted to a third party such as a crypto exchange, which means you never have full control over your funds. The safer choice are specialized hardware wallets that store private keys offline. Stealing private keys from a hardware wallet would require physical access to the wallet and corresponding PIN or the recovery phrase. What’s more, with hardware wallet, you don’t need to rely on third party custodians.

Ledger Nano is the industry-leading hardware wallet. With more than five million customers, Ledger Nano wallets have several layers of security that protect private keys, and hence your assets:

  • Your private keys are stored on secure element chips.
  • A PIN code and a 24-word recovery phrase are required to access the wallet.
  • Ledger Nano wallets have been built using highly durable materials for protection against physical damage.

With full isolation between private keys and your computer/mobile, Ledger Nano cold wallets keep your keys secure and give you complete control over your cryptocurrencies.

Related Resources

Stay in touch

Announcements can be found in our blog. Press contact:
[email protected]

Subscribe to our
newsletter

New coins supported, blog updates and exclusive offers directly in your inbox


Your email address will only be used to send you our newsletter, as well as updates and offers. You can unsubscribe at any time using the link included in the newsletter.

Learn more about how we manage your data and your rights.