Wallet security has evolved from cold storage vaults to AI-authenticated mobile apps, and the way we protect digital assets is undergoing major changes.
As crypto adoption expands beyond early enthusiasts to institutional finance, retail banking, and even national digital currencies, wallet security in 2025 is experiencing new challenges and providing new solutions.
- 1 What is Wallet Security in Crypto?
-
2
Evolution of Wallet Security
- 2.1 1. The Hot Wallet Era: Speed vs Safety
- 2.2 2. Hardware wallets and Multisig: Physical and Shared Control
- 2.3 3. Multi-Party Computation (MPC): The Decentralized Custody Revolution
- 2.4 4. Smart Contract Wallets and Social Recovery: Customizable, Programmable Security
- 2.5 5. AI and Smart Devices: The Beginnings of Contextual Wallet Security
- 3 How AI is Transforming Wallet Security in 2025
- 4 The Role of Smart Devices on Next-Generation Wallet Security
- 5 Key Security Innovations and Protocols Gaining Traction in Wallet Security
- 6 Major Threats to Wallet Security in the AI and Smart Device Era
- 7 Balancing Convenience and Wallet Security: UX Challenges in Wallet Design
- 8 Future Outlook: What Wallet Security Will Look Like by 2030
- 9 Conclusion
What is Wallet Security in Crypto?

Wallet security in crypto refers to the strategies, technologies, and best practices used to prevent unauthorized access to crypto wallets and the digital assets stored within them.
It entails protecting private keys, which are the cryptographic credentials required to validate blockchain transactions. If a private key is lost or stolen, the corresponding crypto funds can be irreversibly taken.
Key Components of Wallet Security in Crypto:
Private Key Protection:
Private key protection is the foundation of wallet security. Private keys must be protected from theft, exposure, or loss, regardless of whether they are stored in software, hardware, or a smart contract.
Authentication Mechanisms:
Authentication mechanisms include PINs, passwords, biometric verification (fingerprint or facial ID), passkeys, and multi-factor authentication to limit wallet access.
Wallet Types with Various Security Levels:
- Hot Wallets: Internet-connected wallets (such as mobile or browser wallets); more convenient but more vulnerable to hacking.
- Cold Wallet: Offline wallets (e.g., hardware wallets such as the Ledger or Trezor) that are much safer for long-term storage.
- MPC Wallets: Use multi-party computation to distribute key control among multiple devices or parties.
- Smart Contract Wallets: Programmable wallets that include social recovery and spending limits (e.g., Safe, Argent).
Backup and Recovery System:
Seed phrases, social recovery, and encrypted backups all help users regain access if they lose their devices.
Threat Detection:
Wallets now use AI or behavioral analytics to detect suspicious activity, flag phishing attempts, and automatically block risky transactions.
Crypto wallet security protects digital assets from hacks, phishing, device loss, and human error, allowing only the rightful owner to access and control them.
Evolution of Wallet Security
Wallet security has evolved in response to a single central challenge: how to safeguard digital assets in an increasingly hostile and complex threat landscape.
As the crypto ecosystem matured, so did the tools we use to protect it, progressing from simple password-based systems to intelligent, multi-layered defenses powered by AI and smart devices.
1. The Hot Wallet Era: Speed vs Safety

In the early 2010s, the majority of users used hot wallet applications or browser extensions such as Electrum and MetaMask that stored private keys on internet-connected devices.
While these wallets provided easy access and fast execution of transactions, they were frequently targeted by phishing scams, malware, and browser vulnerabilities. Security was minimal, and a single compromised device could lead to total asset loss.

The rise of hardware wallets (such as Ledger, Trezor, and BitBox) marked an important moment in wallet security. By isolating private keys in a secure chip and keeping them offline, these wallets significantly reduced their vulnerability to remote hacks.
Around the same time, multisignature (multisig) solutions emerged, such as Electrum multisig and Gnosis Safe, allowing for collaborative custody where multiple parties or devices must approve a transaction.
These measures enhanced institutional wallet security while lowering the risk of a single point of failure.
3. Multi-Party Computation (MPC): The Decentralized Custody Revolution

To address negative aspects of physical hardware (loss, damage, or seizure) and improve scalability, MPC wallets introduced a cryptographic innovation.
Platforms such as Fireblocks, Zengo, and Qredo distribute private key generation and signing across multiple devices or stakeholders without ever combining the entire key.
This strengthened wallets’ resistance to theft, collusion, and accidental loss, providing a cloud-native alternative to multisig with superior privacy and performance.
4. Smart Contract Wallets and Social Recovery: Customizable, Programmable Security

As Web3 applications became more complex, so did user demands. Smart contract wallets like Safe (formerly Gnosis Safe), Argent, and Ambire added programmable security, allowing users to set time delays, daily spend limits, and whitelist addresses.
A significant innovation here was social recovery, which allowed trusted contacts or backup devices to help recover access without relying on seed phrases. This significantly improved the user experience without compromising security.
5. AI and Smart Devices: The Beginnings of Contextual Wallet Security
By 2025, the latest innovations in wallet security will be leveraging artificial intelligence and smart devices to provide adaptive, contextual protection. AI now powers behavioral analytics, which uses login patterns, typing dynamics, and usage habits to detect anomalies in real-time.
Voice, facial recognition, and biometric verification via smartphones and wearables provide invisible layers of security. Smart agents integrated into wallets can detect phishing attempts, predict risk, and even launch proactive countermeasures.
This new era represents a shift from rigid passphrase-based protection to dynamic, intelligent, and user-centric security, with wallets that learn from context, respond to threats autonomously, and work seamlessly across devices.
How AI is Transforming Wallet Security in 2025
AI is significantly redefining wallet security by moving away from static credentials and toward context-aware, adaptive systems. In 2025, AI-powered wallets are more than just vaults; they are intelligent guardians.
1. Behavioral Biometrics: Continuous, Passive Authentication
Instead of relying solely on passwords or seed phrases, modern wallets use behavioral biometrics, which involves AI tracking user-specific patterns such as typing rhythm, swipe gestures, mouse movement, or touch pressure.
This enables continuous authentication, which silently verifies the user throughout the session. If behavior deviates from expected patterns, the system can freeze transactions or request secondary confirmation.
- Note: Behavioral biometrics are highly resistant to phishing and credential theft due to their difficulty in replication.
2. Machine Learning for Real-Time Fraud Detection
AI models trained on massive datasets now monitor wallet activity in real-time to detect anomalies, such as:
- Unusual login times/geolocations
- Suspicious contract interactions
- Known phishing domain access.
- SIM-swap indicators (e.g., sudden device change plus IP mismatch)
These algorithms improve over time via feedback loops, reducing false positives and identifying threats before funds are transferred.
3. Autonomous Risk Scoring and Permission Adjustment
Leading wallets now use AI-powered risk engines to assign real-time risk scores to each transaction attempt. Based on this score, a wallet can:
- Block the transaction.
- Require multifactor approval.
- Tigger time-locked execution.
For example, if a user attempts to send a large sum to a new address from a different device and location, the wallet might automatically increase the security level.
4. Natural Language Interfaces: Conversational Wallet Guardians
2025 wallets use AI assistants to interact with users through natural language interfaces. These agents:
- Explain the security prompts in plain English.
- Warn users when they interact with potentially malicious contracts.
- Provide recovery guidance or flag unusual access attempts.
- Allow users to perform basic functions (such as sending or freezing funds) using voice or chat interfaces.
This not only improves usability but also makes advanced wallet security more accessible to non-technical users.
The Role of Smart Devices on Next-Generation Wallet Security
As the crypto ecosystem matures, smart device capabilities increasingly shape wallet security. In 2025, smartphones, wearables, and IoT-connected hardware will be critical in creating seamless yet secure wallet experiences.
These devices go beyond convenience by actively improving multi-factor authentication, biometric access, and real-time environmental sensing.
Wearable and Mobile Integration: Biometric-Enabled Two-Factor
Modern crypto wallets now work with smartwatches, fitness bands, and smartphones to provide context-aware two-factor authentication (2FA). For example:
- A wallet can request confirmation with a tap on a smartwatch.
- Fitness bands can verify identity through continuous heart rate or motion tracking.
- Smartphones use secure elements (such as Apple’s Secure Enclave or Google’s Titan M2 chip) to locally store cryptographic keys and biometric data.
This ensures multi-device verification without the user having to manually enter seed phrases or codes, lowering the risk of phishing and SIM-swap attacks.
IoT-Based Proximity Verification: Location-Aware Security
Advanced wallets now support proximity-based authentication, which uses the Internet of Things (IoT) to detect when trusted devices are nearby. For example:
- A wallet on your phone may only unlock if your paired smartwatch or laptop is in Bluetooth range.
- Smart home devices (such as connected routers or geofenced hubs) can ensure that access is coming from a secure, pre-approved location.
This layer of spatial wallet security helps to prevent unauthorized access, even if the login credentials are compromised.
Voiceprint and Facial Recognition Using Advanced Devices
Because of advancements in facial and voice recognition, smart devices can now provide fast, non-intrusive, and highly secure biometric authentication.
- Voiceprints use distinct vocal frequencies to verify identity even in noisy environments.
- Facial ID systems, particularly on iPhones and AR/VR headsets, now include liveness detection to prevent spoofing through photos or deepfakes.
These biometric methods are gradually replacing passwords and PINs as the primary layer of wallet security.
Use Case: Apple Secure Enclave and Samsung Knox in Crypto
Major technology manufacturers are adapting their trusted hardware security modules to support crypto wallet use:
- Apple’s Secure Enclave enables wallets such as Coinbase Wallet and Trust Wallet to encrypt and store private keys securely on iOS devices, separate from the operating system and apps.
- Samsung Knox works with blockchain-based services to provide secure key management, biometric authentication, and app sandboxing, especially for MetaMask and Ledger wallets on Galaxy devices.
These platforms provide bank-grade security, making smartphones and tablets suitable as hardware-based crypto wallets.
Key Security Innovations and Protocols Gaining Traction in Wallet Security
As digital asset adoption grows, the race to wallet security has spurred rapid innovation in both cryptographic techniques and blockchain infrastructure.
In 2025, wallet security is more than just storing private keys; it’s about building resilient, intelligent systems that can defend against a wide range of evolving threats.
The latest protocols, from passkey authentication to programmable smart wallets, are changing how users interact with and protect their crypto assets.
1. Passkeys and the Rise of Passwordless Authentication
One of the most promising developments is the widespread adoption of passkey authentication via open standards such as FIDO2 and WebAuthn.
These protocols enable users to log in using biometric credentials or hardware security modules, which eliminates the need to manually enter passwords or private keys.
- Unlike traditional methods that are vulnerable to phishing and keylogging, passkeys:
- Bind access to a physical device, such as a smartphone or YubiKey.
- Authenticate users with secure elements and biometric data.
- Offer cross-platform synchronization (supported by Apple, Google, and Microsoft).
Wallet providers such as MetaMask, Trust Wallet, and newer Web3 apps are beginning to add passkey support, allowing for seamless, high-security authentication without the risk of written seed phrases.
2. Multi-Party Computation (MPC) Wallets: Distributed, Resilient Key Custody
Multi-party computation (MPC) wallets have become an essential component of enterprise and user-level wallet security.
Rather than storing a single private key in a single location, MPC distributes the key across multiple encrypted shares on different devices or custodians. The key is never completely assembled, even during transactions.
Advantages of MPC wallets include:
- There is no single point of failure or compromise.
- Threshold-based authorization (e.g., 2 of 3 shares required).
- Increased resilience against theft, hacking, and insider threats
Fireblocks, Zengo, Qredo, and Lit Protocol are among the leading MPC wallet platforms.
This technology is particularly useful for institutions managing large treasuries or multi-signature workflows, but it is also being used by user-facing wallets that want to eliminate seed phrase risks while remaining decentralized.
3. Account Abstraction (AA): Smart Contract Wallets with Programmable Security
Account Abstraction is arguably the most significant development in Ethereum wallet design.
AA, which was formalized in ERC-4337 and is now active on the Ethereum mainnet as well as Layer 2s such as zkSync, Base, and Arbitrum, enables wallets to function as smart contracts rather than externally owned accounts.
This unlocked:
- Programmable logic for wallet access, such as multi-factor rules or daily withdrawal limits
- Sponsored transactions (gasless) allow dApps to cover fees for users.
- Modular plugins allow users to add social recovery, whitelist rules, or automatic backups.
Smart contract wallets powered by AA, such as Safe, Stackup, Biconomy, and ZeroDev, allow users to tailor security to their specific needs while maintaining on-chain control.
These wallets are also ideal for onboarding non-technical users because they abstract complex security decisions while improving security under the hood.
4. Leading Protocols Shaping Wallet Security in 2025
Several forward-thinking startups and protocols are paving the way for the future of wallet security:
- Safe (formerly Gnosis Safe): The most popular smart contract wallet for teams and DAOs, featuring modular AA support and deep DeFi integrations.
- Webacy: Specializes in digital death planning, allowing users to pre-define contingency actions (e.g., key handover, transaction halts) in case they become inactive or compromised.
- Ledger Recover: An optional service that shards encrypted keys based on a user’s verified ID, providing a recovery path that does not require a seed phrase.
- Silent Protocol: Focuses on wallet security layers that protect privacy through zero-knowledge proofs and stealth authentication.
These innovations are part of a larger trend in wallet security, which is shifting from passive key storage to intelligent, programmable, and decentralized defense systems.
Wallet security is changing drastically in 2025. The combination of passkey-based login systems, MPC key management, and account abstraction is establishing a new standard.
One whereby users gain control without adding complexity and security becomes invisible but robust. As new protocols mature, future wallets will not only be safer but also smarter.
Major Threats to Wallet Security in the AI and Smart Device Era
As crypto wallets adopt biometric authentication, smart devices, and AI-powered interfaces, so do the threats that target them.
In 2025, wallet security is more than just a cryptographic concern; it’s a multifaceted defense challenge encompassing artificial intelligence, behavioral modeling, wearable technology, and supply chain integrity.
Attackers are exploiting the same innovations used to secure wallets to compromise them, resulting in a rapidly evolving threat landscape.
1. Deepfake Phishing and Voice Cloning Attacks
In the age of AI, social engineering has become extremely realistic. Attackers are now using advanced generative models to create deepfakes, which are highly convincing audio or video forgeries that trick people into revealing wallet credentials or authorizing fraudulent transactions.
For example:
- A DAO treasurer might receive a voice call from a “familiar” executive requesting a fund transfer without realizing it is an AI clone.
- Users may be deceived by video deepfakes that impersonate wallet support staff and encourage them to enter seed phrases or approve smart contract actions.
- Traditional phishing detection methods are no longer enough. Wallet security must evolve to include multiple layers of verification, such as behavior-based prompts, contextual alerts, and out-of-band confirmations.
2. Malware in Wearable Devices
With the proliferation of smartwatches, AR/VR headsets, and fitness trackers in crypto authentication workflows, these devices have unexpectedly become a weak link. In 2025, cybercriminals target wearables to gain indirect access to wallets.
Malware can:
- Monitor biometric inputs (e.g., heart rate or motion data) used for continuous authentication.
- Intercept encrypted communication between a wearable and a smartphone or wallet app.
- Simulate proximity signals to spoof location-based wallet unlock features.
Because these devices frequently lack advanced security protocols or are running insecure firmware, they represent a stealthy vector for intrusion.
Modern wallet security practices must now include device hygiene, such as encouraging firmware updates, isolating devices, and restricting access to connected wearables.
3. Adversarial AI, Behavioral Spoofing
As wallets become more reliant on AI-based authentication, such as behavioral biometrics, pattern recognition, and anomaly detection, adversarial machine learning has emerged as a serious threat.
Attackers train AI models to:
- Mimic legitimate user behavior, such as typing rhythm, swipe gestures, and login frequency.
- Evade anomaly detection systems by gradually adapting to a user’s patterns.
- Poison machine learning models with subtle manipulations during training or input.
This type of attack does not compromise encryption; rather, it bypasses defenses by tricking them into believing the attacker is legitimate.
To defend against adversarial AI, resilient models must be continuously retrained, as well as ensemble detection systems and fallback logic to verify unexpected activity.
4. Supply Chain Attacks Against Wallet Hardware and Firmware
Even the most trusted wallets, particularly hardware-based ones, can be compromised before the user even opens the box. In recent years, supply chain attacks have become increasingly common, with:
- Counterfeit wallets come preloaded with malware or backdoors.
- Firmware updates are intercepted and tampered with.
- Peripheral accessories, such as charging cables, are embedded with spy tools.
These attacks typically avoid user error entirely and are nearly impossible to detect until it is too late.
Wallet manufacturers such as Ledger, Trezor, and Safe are now using secure element chips, tamper-evident packaging, decentralized firmware signing, and attestation protocols to ensure authenticity from production to the user.
Best practices for end users now include the following:
- Buying wallets exclusively from verified manufacturers or authorized resellers
- Verifying firmware versions and device hashes before use.
- Avoid used or pre-owned hardware wallets at any cost.
The AI and smart device era has made crypto ownership more convenient than ever, but it has also increased the attack surface in subtle, scalable, and increasingly automated ways.
Deepfake impersonations, compromised wearables, adversarial AI, and hardware supply chain attacks are the new battlegrounds for wallet security in 2025.
To remain secure, both users and wallet providers must look beyond passwords and private keys, adopting adaptive authentication, continuous monitoring, and defense-in-depth architectures that anticipate and outmaneuver modern attackers.
Balancing Convenience and Wallet Security: UX Challenges in Wallet Design
As crypto adoption increases in 2025, one of the most important and often overlooked factors determining a digital wallet’s success is its user experience (UX).
While strong wallet security remains critical, the challenge is to design interfaces that empower users without overwhelming them.
A secure wallet is only useful if users can understand and use it confidently. Too much complexity causes users to abandon best practices. Too little security, and assets are vulnerable to theft or irreversible loss.
Striking the right balance between convenience and security has become a critical design challenge in crypto wallets.
1. The UX Pitfall of Over-Securing Wallets
In the name of wallet security, many wallets require users to:
- Memorize or manually write down 12- to 24-word seed phrases.
- Complete long verification steps every time they transact.
- Manage their private keys without guidance.
- Confirm each action across multiple devices or apps.
While these practices improve wallet security, they also present friction. New users find them intimidating, and even experienced users may make critical mistakes, such as backing up seed phrases insecurely, reusing passwords, or turning off security features entirely.
Paradoxically, overly strict security can lead to poorer real-world outcomes by causing users to take shortcuts.
2. The Need for a Frictionless, Yet Secure Design
The industry is now shifting toward invisible or adaptive security solutions that offer robust protection without burdening the user. This includes:
- Instead of passwords or PINs, use biometric authentication (e.g., face ID, fingerprint).
- Trusted device logic, where wallets require fewer checks on known devices.
- Context-aware prompts are triggered only when a transaction or behavior appears risky.
- Time locks and spending limits that reduce the damage caused by potential breaches.
These features operate silently in the background, providing a secure but user-friendly experience. Users do not have to worry about security every step of the way; it just works.
3. The Role of Smart Agents and Embedded AI
In 2025, smart wallets will begin to incorporate AI-powered agents that serve as real-time security companions. These agents help close the usability gap by:
- Guiding users through setup and backup (e.g., recommending social recovery over seed phrase storage).
- Analyzing on-chain activity and warning users before they approve risky contracts.
- Customizing security settings based on user behavior, transaction history, and risk profile.
- Providing human-readable explanations of complex DeFi operations and gas fees.
This is especially important for mainstream users who are unfamiliar with the crypto language. With AI assistants, wallets can provide enterprise-grade security without requiring expert knowledge.
4. Case Studies: Wallets That Get It Right
- Argent Wallet offers seed phrase removal and biometric login and uses guardians for social recovery while maintaining non-custodial control.
- Safe (with Account Abstraction) supports modular security logic, such as requiring multi-signature approvals for large transactions but only one approval for routine actions.
- Webacy provides real-time risk scoring and wallet monitoring without the need to constantly engage users, thereby safeguarding assets from external threats or accidental loss.
These wallets demonstrate how security can be tailored to the user rather than forced upon them.
5. Educating Without Overwhelming
UX is more than just clean interfaces; it’s about communication. Wallets should help users understand:
- What their responsibilities are.
- What would happen if they lost access?
- What threats look like and how to respond.
This can be accomplished through:
- Interactive onboarding flows
- In-app education modules
- Simplified language and risk alerts
Wallet security does not have to be intimidating if it is well-explained and integrated into the user experience.
The future of wallet security relies not only on cryptography but also on design thinking. Wallets that can hide complexity without sacrificing safety will be the ones that scale crypto to the masses. The challenge is clear: create tools that are as simple to use as they are difficult to hack.
User experience is not the enemy of security; rather, it serves as the foundation for real-world protection.
Future Outlook: What Wallet Security Will Look Like by 2030
As the digital asset ecosystem becomes more integrated into mainstream finance, commerce, and governance, wallet security will evolve beyond key storage.
By 2030, crypto wallets are expected to evolve into autonomous, intelligent agents capable of defending themselves, integrating with larger financial systems, and adhering to both technological and ethical standards.
1. Prediction: What’s Next for Wallet Security
Self-Healing Wallets
Future wallets will include self-healing mechanisms and AI-powered systems capable of detecting compromise, isolating the threat, and restoring wallet integrity without user intervention. Think about wallets that:
- Automatically revoke leaked access credentials.
- Initiate recovery using preset conditions.
- Recover wallet permissions from an encrypted cloud or social backups.
This reduces the need for users to understand and manage security incidents themselves.
AI Wallets with Legal Personhood
By 2030, AI-driven wallets may become semi-autonomous actors in DeFi and DAO ecosystems. In some jurisdictions, these wallets could be granted legal personhood to:
- Manage on-chain contracts.
- File legal actions (e.g., asset recovery).
- Hold and transfer digital and real-world assets without direct human input.
This blurs the distinction between identity, code, and legal agency, redefining the scope of wallet security and responsibility.
Quantum-Resistant Encryption
Traditional public key cryptography is at risk of becoming obsolete as quantum computing advances. To protect against quantum attacks, future wallets will include post-quantum encryption algorithms (such as lattice-based and hash-based schemes).
Projects such as Open Quantum Safe and NIST’s post-quantum cryptography standards are already guiding the transition.
Wallets that aren’t quantum-ready risk losing integrity once quantum threats become a reality, so forward compatibility is critical.
2. The Broader Impact on DeFi, CBDCs, and Commerce
In DeFi
Wallets will serve as AI-managed portfolios that rebalance assets, execute yield strategies, and enforce programmable compliance rules, transforming users from active traders to passive capital allocators through smart governance tools.
In CBDCs and Government Systems
As more central banks introduce central bank digital currencies (CBDCs), wallets will act as digital identity hubs, incorporating biometric verification, tax automation, and social benefits tracking.
This raises the standard for wallet security, necessitating state-level privacy and policy enforcement.
In Everyday Commerce
Wallets will become multi-chain, multi-currency payment layers embedded into smartphones, browsers, AR/VR wearables, and vehicles. Tap-to-pay with a crypto wallet or even a voice command to authorize transactions will be standard.
Wallet security will need to adapt to these frictionless interfaces while maintaining protection.
3. The Need for Standardization and Ethical AI
As wallet technology advances, the risk of fragmentation and abuse increases. The industry should prioritize:
- Standards for wallet interoperability across blockchains, devices, and legal jurisdictions
- Transparent governance of AI agents acting on users’ behalf
- Privacy-by-design architectures prevent wallets from becoming surveillance tools.
Leading organizations, such as the Ethereum Foundation, FIDO Alliance, and the World Economic Forum’s Crypto Council, are actively working to establish these standards.
Without ethical frameworks and clear technical standards, the next generation of wallets could pose as many risks as they address.
By 2030, wallet security will be characterized by intelligence, autonomy, and resilience. Wallets will evolve into the core trust infrastructure of digital life, incorporating self-healing AI agents and quantum-resistant cryptography.
To fully realize this future, the industry must act now, balancing innovation with usability, privacy, and ethical AI design.
Conclusion
In an era characterized by deepfake scams, wearable vulnerabilities, and adversarial AI, wallet security cannot rely on static defenses or outdated practices.
As smart devices and AI become more integrated into our daily finances, the tools used to protect digital assets must evolve in tandem, becoming as adaptable, intelligent, and user-centric as the technologies they protect.
The future of wallet protection lies in combining invisible security with frictionless UX, where smart agents, behavioral analytics, and multi-layered defenses operate silently behind the scenes.
From AI-powered authentication to quantum-resistant encryption, future wallets must be able to detect, defend, and self-heal in real-time.
Users must also take an active role in selecting wallets that follow best security practices, staying informed about emerging threats, and adopting systems that prioritize privacy and usability.
Wallets that will lead in 2025 and beyond are those that evolve with the threat landscape, designed not only to store assets but also to anticipate attacks, guide users, and adapt intelligently.
Choose wisely, update frequently, and stay secure.