http://invest2yty6gsidoypbjkkqopj5ugpupr3fd5hteqlhgjv7ntxps7uqd.onion/ethereum-faucets/index3.html
These can take different forms, from third-party web applications offering insurance and debit cards, to QR codes printed on pieces of paper. The most important distinction is between 'hot' wallets, which are connected to the internet and therefore vulnerable to hacking, and 'cold' wallets, which are not connected to the internet.