Wallet Logo

NakitCoins

Latest release: 2.2.0 ( 3rd April 2022 ) 🔍 Last analysed 21st October 2022 . Custodial: The provider holds the keys Not functioning anymore
5 ★★★★★
2 ratings
21st April 2021

Jump to verdict 

Help spread awareness for build reproducibility

Please help us spread the word discussing the risks of centralized custodians with NakitCoins  via their Twitter!

Do your own research!

Try out searching for "lost bitcoins", "stole my money" or "scammers" together with the wallet's name, even if you think the wallet is generally trustworthy. For all the bigger wallets you will find accusations. Make sure you understand why they were made and if you are comfortable with the provider's reaction.

If you find something we should include, you can create an issue or edit this analysis yourself and create a merge request for your changes.

The Analysis 

Update 2022-10-21: This app is not available anymore.

(Analysis from Android review)

App Description

NakitCoins Wallet, the easy way to get and start using Bitcoin and other Cryptocurrencies..

NakitCoins Wallet offers an easy and friendly visual experience, you will quickly get used to all of the features that our wallet offers. You will enjoy the possibility to label your transactions to sort your transaction and keep track of them with a private memo.

The Site

The website is incomplete, with pages such as the about us or terms without any content.

NakitCoins offers a non-custodial coin swap service on their website, although this service appears to be separate from the app.

The App

We tried the app and registered. It’s possible to send and receive via BTC addresses. Alternatively, you have options to send money to another user or withdraw to a bank card, if applicable.

Users are not provided with an option to backup the wallet or view mnemonics.

Verdict

In the case of this app, the user is not in charge of the keys. This app is custodial and as such, not verifiable.

(dg)

Verdict Explained

As the provider of this product holds the keys, verifiability of the product is not relevant to the security of the funds!

As part of our Methodology, we ask:

Is the product self-custodial?

If the answer is "no", we mark it as "Custodial: The provider holds the keys".

A custodial service is a service where the funds are held by a third party like the provider. The custodial service can at any point steal all the funds of all the users at their discretion. Our investigations stop there.

Some services might claim their setup is super secure, that they don’t actually have access to the funds, or that the access is shared between multiple parties. For our evaluation of it being a wallet, these details are irrelevant. They might be a trustworthy Bitcoin bank and they might be a better fit for certain users than being your own bank but our investigation still stops there as we are only interested in wallets.

Products that claim to be non-custodial but feature custodial accounts without very clearly marking those as custodial are also considered “custodial” as a whole to avoid misguiding users that follow our assessment.

This verdict means that the provider might or might not publish source code and maybe it is even possible to reproduce the build from the source code but as it is custodial, the provider already has control over the funds, so it is not a wallet where you would be in exclusive control of your funds.

We have to acknowledge that a huge majority of Bitcoiners are currently using custodial Bitcoin banks. If you do, please:

  • Do your own research if the provider is trust-worthy!
  • Check if you know at least enough about them so you can sue them when you have to!
  • Check if the provider is under a jurisdiction that will allow them to release your funds when you need them?
  • Check if the provider is taking security measures proportional to the amount of funds secured? If they have a million users and don’t use cold storage, that hot wallet is a million times more valuable for hackers to attack. A million times more effort will be taken by hackers to infiltrate their security systems.

But we also ask:

Is the product still supported by the still existing provider?

If the answer is "no", we mark it as "Not functioning anymore".

Discontinued products or worse, products of providers that are not active anymore, are problematic, especially if they were not formerly reproducible and well audited to be self-custodial following open standards. If the provider hasn’t answered inquiries for a year but their server is still running or similar circumstances might get this verdict, too.