Cold, Warm, and Hot Wallet Strategies with Liminal Wallet: Optimizing Security Without Sacrificing Access