How Safe is Binance for Storing my Coins? - CryptoSec
How Safe is Binance for Storing my Coins? - CryptoSec
Best Binance Coin Wallets You Should Consider UseTheBitcoin
Migrating your coins from Binance Ledger - Hardware Wallet
Binance coin Wallet - Secure your Binance coin (BNB ...
How to Restore a Bitcoin Wallet in a Few Easy Steps ...
Bitcoin Wallets: Die 7 BESTEN WALLETS im Vergleich
Anleitung Bitcoins kaufen
Lost Bitcoin? How to Restore Your Bitcoin Wallet - Bitcoin ...
Let the Bitcoin Treasure Hunt Begin: 1 ... - binance.com
Ultimate glossary of crypto currency terms, acronyms and abbreviations
The events of a SIM swap attack (and defense tips)
Posted this on Coinbase and someone recommend it also be posted here. The information below on an attempted SIM swap attack was pieced together through a combination of login and security logs, recovering emails initiated by the attacker that were deleted and then deleted again from the trash folder, and learning from AT&T’s fraud representatives. The majority if this is factual, and we do our best to note where we are speculating or providing a circumstantial suspicion. TLDRs at the bottom. The full story: We were going about our business and received a text from AT&T that says “…Calls & texts will go to your new phone/SIM card. Call 866-563-4705 if you did not request.” We did not request this, and were suspicious that the text itself could be a phishing scam since we searched the phone number and it wasn’t overtly associated with AT&T. Thus, we tried calling AT&T’s main line at 611 but all we hear is beep beep beep. The phone number is already gone. We use another phone to call AT&T and at the same time start working on our already compromised email. While we didn’t see everything real time, this is what the recovered emails show. In less than 2 minutes after receiving the text from AT&T, there is already an email indicating that the stolen phone number was used to sign into our email account associated with Coinbase. 2 minutes after that, there is an email from Coinbase saying: "We have received your request for password reset from an unverified device. As a security precaution, an e-mail with a reset link will be sent to you in 24 hours. Alternatively, if you would like your password reset to be processed immediately, please submit a request using a verified device. This 24 hour review period is designed to protect your Coinbase account." This is where Coinbase got it right to have a 24 hour review period (actually a recovery period) before allowing the password to be reset. However, the attackers knew this and planned to steal the second email from Coinbase by setting email rules to forward all emails to a burner address and also have any emails containing “coinbase” re-routed so they don’t appear in the Inbox. 5 minutes later, they request a password reset from Gemini and the password was reset to the attacker’s password within a minute after that. The next minute they target and reset DropBox’s password followed immediately with Binance. Less than 2 minutes later, an email from Binance indicates that the password has been reset and another email arrives a minute later indicating a new device has been authorized. It’s at this point that we begin locking the attacker out by (1) removing the phone number as 2FA (2) changing the email password, (3) and three forcing a logout of all sessions from the email. There was a bit of back and forth where they still had an active login and re-added the stolen phone number as 2FA. They added only one more password reset to a gaming account that was not deleted. I can only suspect that was a decoy to make it look like the attack was directed at gaming rather than finances. The Gemini and Binance accounts were empty and effectively abandoned, with no balances and inactive bank accounts (if any), and no transactions in 1-3 years. DropBox had no meaningful files (they probably look for private keys and authenticator backups) and the phone number they stole from us was suspended, so as far as the attacker is concerned, there is no meat on this bone to attack again… unless they had inside information. This is where I suspect someone internal at Coinbase receiving wire deposits has been compromised in tipping off ripe accounts – accounts with new and somewhat large balances. We had completed a full withdrawal of funds from Coinbase earlier in the year, and had a balance of less than $20 heading into May. Deposits to Coinbase staggered in to get above six figures through mid-May then stopped. The attack occurred 7 days after the last large wire deposit was made to Coinbase. From the perspective of an attacker that had no inside information, we were a dead end with abandoned Gemini and Binance accounts with zero balances and stale transactions, no DropBox information, and the suspended phone number access. Our Coinbase deposits were known to no one except us, Coinbase, and our bank. We were also able to stop the hacker’s email forwarding before Coinbase’s 24 hour period to send the password reset, so this one didn’t work out for the attackers and it would make sense for them to move on to the next rather than put efforts into a second attack only for Coinbase - for what would appear to be a zero-balance Coinbase account based on the other stale accounts. Then…23 hours and 42 minutes after the first attack, another message from AT&T “…Calls & texts will go to your new phone/SIM card. Call 866-563-4705 if you did not request.” Here we go again. We had been confident in AT&T’s assurances that our account had been locked and would not be SIM swapped again, so we unwisely added the phone number back to our email account as a backup (it’s now removed permanently and we use burner emails for account recovery like we should have all along). Upon seeing that our phone number had been stolen again I knew they were after the Coinbase reset email that was delayed by 24 hours from Coinbase as part of their security. We did 4 things within 2 minutes of that text: (1) removed the phone number again from the email account – this time for good, (2) market sell all Bitcoin on Coinbase, (3) withdraw from Coinbase, (4) have AT&T suspend service on the phone line. In speaking with AT&T, they were floored that our SIM would be transferred again in light of all the notes about fraud on the account and the PIN being changed to random digits that had never been used by us before. Based on the response of disbelief from AT&T on the second port, I suspect that this attack also involved a compromised AT&T employee that worked with the attacker to provide timely access to the Coinbase password reset email. Apparently, this has been going on for years: https://www.flashpoint-intel.com/blog/sim-swap-fraud-account-takeove with phone carrier employees swapping SIMs for $80s a swap. Remember that most of this was hidden in real time, and was only known because we were able to recover emails deleted from Trash by the attacker. Since we require any withdrawals to use Google Authenticator on Coinbase, our funds may have been secure nonetheless. However, under the circumstances with attackers that were apparently working with insiders to take our phone number twice in attempts to steal Bitcoin, and it being unknown if they had additional tools related to our Google Authenticator, we decided it was safer on the sidelines. The coins were held on the exchange for a quick exit depending on whether Bitcoin was going to break up or down from $10,000. A hardware wallet is always safest, but we were looking to time the market and not have transaction delays. For some some security recommendations: AT&T: If you are going to send a text saying that calls and texts are moving to a new number, provide a 10 minute window for the phone number to reply with a “NO” or “STOP” to prevent the move. This can escalate the SIM dispute to more trusted employees to determine who actually owns the line. Don’t let entry level employees swap SIMs. Coinbase: Do not default to phone numbers as 2FA. Also, if someone logs in successfully with the password before the 24 hours are up, the password is known and there is no need to send the password reset email again for attacker to have forwarded to them. At least have an option to stop the password reset email from being sent. We did not tag our account at Coinbase with fraud because of the stories of frozen funds once an account is tagged. I’m not sure what the solution is there, but that is another problem. Being a trader, it would be nice to think of Coinbase as any other type of security brokerage where your assets are yours (someone can’t steal your phone number and transfer your stocks to their account). We fell into that mindset of security, yet this experience has reminded us of the uniqueness of cryptocurrency and the lack of custodial assurance and insurance from exchanges because of the possession-is-everything properties of cryptocurrency. As many have said before, 2FA with a phone number quickly becomes 1-factor authentication as soon as that phone number is associated with password recovery on your email or other accounts. Our overall recommendation is to avoid having a phone number associated with any recovery options across all your accounts. TLDR on the process: Scammers will steal your phone number (in our case twice in 24 hours) and use your phone number to access your email and accounts. They will use your email to reset passwords at financial accounts and file hosting such as DropBox. They will then use that combination to transfer any assets they can access from your accounts to theirs. They will do their best to hide this from you by (1) not resetting your email password so as to raise suspicion, (2) immediately delete any password reset emails you may receive from financial accounts to hide them from you, (3) attempt to forward all emails sent to your address to a burner email, and (4) set email rules to forward emails containing “coinbase” to an email folder other than your Inbox so that you don’t see the transactions and password reset emails that arrive to your inbox. TLDR on defense tips: If your phone stops working or you receive a text of your number being ported do the following as soon as possible: (1) log into your email account(s) associated with your financial accounts and remove your phone number as 2FA immediately (2) change your email password, (3) force a logout of all sessions from your email (at this point you have locked them out), then (4) check your mail forwarding settings for forwards to burner addresses, (5) check your mail rules for rerouting of emails from accounts such as Coinbase, and (6) call your carrier to have them suspend service on your lost phone number and ask them to reinstate your SIM or get a new SIM. This will require a second phone because your personal phone number has been stolen. We hope this helps some others be safe out there in protecting their coins. The more we know, the more we can protect ourselves. Wishing you all the best!
The events of a SIM swap attack directed at Coinbase (and defense tips)
The information below on an attempted SIM swap attack was pieced together through a combination of login and security logs, recovering emails initiated by the attacker that were deleted and then deleted again from the trash folder, and learning from AT&T’s fraud representatives. The majority if this is factual, and we do our best to note where we are speculating or providing a circumstantial suspicion. TLDRs at the bottom. The full story: We were going about our business and received a text from AT&T that says “…Calls & texts will go to your new phone/SIM card. Call 866-563-4705 if you did not request.” We did not request this, and were suspicious that the text itself could be a phishing scam since we searched the phone number and it wasn’t overtly associated with AT&T. Thus, we tried calling AT&T’s main line at 611 but all we hear is beep beep beep. The phone number is already gone. We use another phone to call AT&T and at the same time start working on our already compromised email. While we didn’t see everything real time, this is what the recovered emails show. In less than 2 minutes after receiving the text from AT&T, there is already an email indicating that the stolen phone number was used to sign into our email account associated with Coinbase. 2 minutes after that, there is an email from Coinbase saying: "We have received your request for password reset from an unverified device. As a security precaution, an e-mail with a reset link will be sent to you in 24 hours. Alternatively, if you would like your password reset to be processed immediately, please submit a request using a verified device. This 24 hour review period is designed to protect your Coinbase account." This is where Coinbase got it right to have a 24 hour review period (actually a recovery period) before allowing the password to be reset. However, the attackers knew this and planned to steal the second email from Coinbase by setting email rules to forward all emails to a burner address and also have any emails containing “coinbase” re-routed so they don’t appear in the Inbox. 5 minutes later, they request a password reset from Gemini and the password was reset to the attacker’s password within a minute after that. The next minute they target and reset DropBox’s password followed immediately with Binance. Less than 2 minutes later, an email from Binance indicates that the password has been reset and another email arrives a minute later indicating a new device has been authorized. It’s at this point that we begin locking the attacker out by (1) removing the phone number as 2FA (2) changing the email password, (3) and three forcing a logout of all sessions from the email. There was a bit of back and forth where they still had an active login and re-added the stolen phone number as 2FA. They added only one more password reset to a gaming account that was not deleted. I can only suspect that was a decoy to make it look like the attack was directed at gaming rather than finances. The Gemini and Binance accounts were empty and effectively abandoned, with no balances and inactive bank accounts (if any), and no transactions in 1-3 years. DropBox had no meaningful files (they probably look for private keys and authenticator backups) and the phone number they stole from us was suspended, so as far as the attacker is concerned, there is no meat on this bone to attack again… unless they had inside information. This is where I suspect someone internal at Coinbase receiving wire deposits has been compromised in tipping off ripe accounts – accounts with new and somewhat large balances. We had completed a full withdrawal of funds from Coinbase earlier in the year, and had a balance of less than $20 heading into May. Deposits to Coinbase staggered in to get above six figures through mid-May then stopped. The attack occurred 7 days after the last large wire deposit was made to Coinbase. From the perspective of an attacker that had no inside information, we were a dead end with abandoned Gemini and Binance accounts with zero balances and stale transactions, no DropBox information, and the suspended phone number access. Our Coinbase deposits were known to no one except us, Coinbase, and our bank. We were also able to stop the hacker’s email forwarding before Coinbase’s 24 hour period to send the password reset, so this one didn’t work out for the attackers and it would make sense for them to move on to the next rather than put efforts into a second attack only for Coinbase - for what would appear to be a zero-balance Coinbase account based on the other stale accounts. Then…23 hours and 42 minutes after the first attack, another message from AT&T “…Calls & texts will go to your new phone/SIM card. Call 866-563-4705 if you did not request.” Here we go again. We had been confident in AT&T’s assurances that our account had been locked and would not be SIM swapped again, so we unwisely added the phone number back to our email account as a backup (it’s now removed permanently and we use burner emails for account recovery like we should have all along). Upon seeing that our phone number had been stolen again I knew they were after the Coinbase reset email that was delayed by 24 hours from Coinbase as part of their security. We did 4 things within 2 minutes of that text: (1) removed the phone number again from the email account – this time for good, (2) market sell all Bitcoin on Coinbase, (3) withdraw from Coinbase, (4) have AT&T suspend service on the phone line. In speaking with AT&T, they were floored that our SIM would be transferred again in light of all the notes about fraud on the account and the PIN being changed to random digits that had never been used by us before. Based on the response of disbelief from AT&T on the second port, I suspect that this attack also involved a compromised AT&T employee that worked with the attacker to provide timely access to the Coinbase password reset email. Apparently, this has been going on for years: https://www.flashpoint-intel.com/blog/sim-swap-fraud-account-takeove with phone carrier employees swapping SIMs for $80s a swap. Remember that most of this was hidden in real time, and was only known because we were able to recover emails deleted from Trash by the attacker. Since we require any withdrawals to use Google Authenticator on Coinbase, our funds may have been secure nonetheless. However, under the circumstances with attackers that were apparently working with insiders to take our phone number twice in attempts to steal Bitcoin, and it being unknown if they had additional tools related to our Google Authenticator, we decided it was safer on the sidelines. The coins were held on the exchange for a quick exit depending on whether Bitcoin was going to break up or down from $10,000. A hardware wallet is always safest, but we were looking to time the market and not have transaction delays. For some some security recommendations: AT&T: If you are going to send a text saying that calls and texts are moving to a new number, provide a 10 minute window for the phone number to reply with a “NO” or “STOP” to prevent the move. This can escalate the SIM dispute to more trusted employees to determine who actually owns the line. Don’t let entry level employees swap SIMs. Coinbase: Do not default to phone numbers as 2FA. Also, if someone logs in successfully with the password before the 24 hours are up, the password is known and there is no need to send the password reset email again for attacker to have forwarded to them. At least have an option to stop the password reset email from being sent. We did not tag our account at Coinbase with fraud because of the stories of frozen funds once an account is tagged. I’m not sure what the solution is there, but that is another problem. Being a trader, it would be nice to think of Coinbase as any other type of security brokerage where your assets are yours (someone can’t steal your phone number and transfer your stocks to their account). We fell into that mindset of security, yet this experience has reminded us of the uniqueness of cryptocurrency and the lack of custodial assurance and insurance from exchanges because of the possession-is-everything properties of cryptocurrency. As many have said before, 2FA with a phone number quickly becomes 1-factor authentication as soon as that phone number is associated with password recovery on your email or other accounts. Our overall recommendation is to avoid having a phone number associated with any recovery options across all your accounts. TLDR on the process: Scammers will steal your phone number (in our case twice in 24 hours) and use your phone number to access your email and accounts. They will use your email to reset passwords at financial accounts and file hosting such as DropBox. They will then use that combination to transfer any assets they can access from your accounts to theirs. They will do their best to hide this from you by (1) not resetting your email password so as to raise suspicion, (2) immediately delete any password reset emails you may receive from financial accounts to hide them from you, (3) attempt to forward all emails sent to your address to a burner email, and (4) set email rules to forward emails containing “coinbase” to an email folder other than your Inbox so that you don’t see the transactions and password reset emails that arrive to your inbox. TLDR on defense tips: If your phone stops working or you receive a text of your number being ported do the following as soon as possible: (1) log into your email account(s) associated with your financial accounts and remove your phone number as 2FA immediately (2) change your email password, (3) force a logout of all sessions from your email (at this point you have locked them out), then (4) check your mail forwarding settings for forwards to burner addresses, (5) check your mail rules for rerouting of emails from accounts such as Coinbase, and (6) call your carrier to have them suspend service on your lost phone number and ask them to reinstate your SIM or get a new SIM. This will require a second phone because your personal phone number has been stolen. We hope this helps some others be safe out there in protecting their coins. The more we know, the more we can protect ourselves. Wishing you all the best!
Crypto Banking Wars: Can Non-Custodial Crypto Wallets Ever Replace Banks?
Can they overcome the product limitations of blockchain and deliver the world-class experience that consumers expect? https://reddit.com/link/i8ewbx/video/ojkc6c9a1lg51/player This is the second part ofCrypto Banking Wars— a new series that examines what crypto-native company is most likely to become thebank of the future. Who is best positioned toreach mainstream adoptionin consumer finance? --- While crypto allows the world to get rid of banks, a bank will still very much be necessary for this verypowerfultechnology to reach the masses. As we laid out in our previous series, Crypto-Powered, we believe companies that build with blockchain at their core will have the best shot at winning the broader consumer finance market. We hope it will be us at Genesis Block, but we aren’t the only game in town. So this series explores the entire crypto landscape and tries to answer the question, which crypto company is most likely to become the bank of the future? In our last episode, we offered an in-depth analysis of big crypto exchanges like Coinbase & Binance. Today we’re analyzing non-custodial crypto wallets. These are products where only the user can touch or move funds. Not even the company or developer who built the application can access, control, or stop funds from being moved. These apps allow users to truly become their own bank. We’ve talked a little about this before. This group of companies is nowhere near the same level of threat as the biggest crypto exchanges. However, this group really understands DeFi and the magic it can bring. This class of products is heavily engineer-driven and at the bleeding-edge of DeFi innovation. These products are certainly worth discussing. Okay, let’s dive in.
Users & Audience
These non-custodial crypto wallets are especially popular among the most hardcore blockchain nerds and crypto cypherpunks.
“Not your keys, not your coins.”
This meme is endlessly repeated among longtime crypto hodlers. If you’re not in complete control of your crypto (i.e. using non-custodial wallets), then it’s not really your crypto. There has always been a close connection between libertarianism & cryptocurrency. This type of user wants to be in absolute control of their money and become their own bank. In addition to the experienced crypto geeks, for some people, these products will mean the difference between life and death. Imagine a refugee family that wants to safely protect their years of hard work — their life savings — as they travel across borders. Carrying cash could put their safety or money at risk. A few years ago I spent time in Greece at refugee camps — I know first-hand this is a real use-case. https://preview.redd.it/vigqlmgg1lg51.png?width=800&format=png&auto=webp&s=0a5d48a63ce7a637749bbbc03d62c51cc3f75613 Or imagine a family living under an authoritarian regime — afraid that their corrupt or oppressive government will seize their assets (or devalue their savings via hyperinflation). Citizens in these countries cannot risk putting their money in centralized banks or under their mattresses. They must become their own bank. These are the common use-cases and users for non-custodial wallets.
Let’s take a look at some of the strengths with non-custodial products.
Regulatory arbitrage Because these products are “non-custodial”, they are able to avoid the regulatory burdens that centralized, custodial products must deal with (KYC/AML/MTL/etc). This is a strong practical benefit for a bootstrapped startup/buildedeveloper. Though it’s unclear how long this advantage lasts as products reach wider audiences and increased scrutiny.
User Privacy Because of the regulatory arbitrage mentioned above, users do not need to complete onerous KYC requirements. For example, there’s no friction around selfies, government-issued IDs, SSNs, etc. Users can preserve much of their privacy and they don’t need to worry about their sensitive information being hacked, compromised, or leaked.
Absolute control & custody This is really one of the great promises of crypto — users can become their own bank. Users can be in full control of their money. And they don’t need to bury it underground or hide it under a mattress. No dependence, reliance or trust in any third parties. Only the user herself can access and unlock the money.
Now let’s examine some of the weaknesses.
Knowledge & Education Most non-custodial products do not abstract away any of the blockchain complexity. In fact, they often expose more of it because the most loyal users are crypto geeks. Imagine how an average, non-crypto user feels when she starts seeing words like seed phrases, public & private keys, gas limits, transaction fees, blockchain explorers, hex addresses, and confirmation times. There is a lot for a user to learn and become educated on. That’s friction. The learning curve is very high and will always be a major blocker for adoption. We’ve talked about this in our Spreading Crypto series — to reach the masses, the crypto stuff needs to be in the background.
User Experience It is currently impossible to create a smooth and performant user experience in non-custodial wallets or decentralized applications. Any interaction that requires a blockchain transaction will feel sluggish and slow. We built a messaging app on Ethereum and presented it at DevCon3 in Cancun. The technical constraints of blockchain technology were crushing to the user experience. We simply couldn’t create the real-time, modern messaging experience that users have come to expect from similar apps like Slack or WhatsApp. Until blockchains are closer in speed to web servers (which will be difficult given their decentralized nature), dApps will never be able to create the smooth user experience that the masses expect.
Product Limitations Most non-custodial wallets today are based on Ethereum smart contracts. That means they are severely limited with the assets that they can support (only erc-20 tokens). Unless through synthetic assets (similar to Abra), these wallets cannot support massively popular assets like Bitcoin, XRP, Cardano, Litecoin, EOS, Tezos, Stellar, Cosmos, or countless others. There are exciting projects like tBTC trying to bring Bitcoin to Ethereum — but these experiments are still very, very early. Ethereum-based smart contract wallets are missing a huge part of the crypto-asset universe.
Technical Complexity While developers are able to avoid a lot of regulatory complexity (see Strengths above), they are replacing it with increased technical complexity. Most non-custodial wallets are entirely dependent on smart contract technology which is still very experimental and early in development (see Insurance section of this DeFi use-cases post). Major bugs and major hacks do happen. Even recently, it was discovered that Argent had a “high severity vulnerability.” Fortunately, Argent fixed it and their users didn’t lose funds. The tools, frameworks, and best practices around smart contract technology are all still being established. Things can still easily go wrong, and they do.
Loss of Funds Risk Beyond the technical risks mentioned above, with non-custodial wallets, it’s very easy for users to make mistakes. There is no “Forgot Password.” There is no customer support agent you can ping. There is no company behind it that can make you whole if you make a mistake and lose your money. You are on your own, just as CZ suggests. One wrong move and your money is all gone. If you lose your private key, there is no way to recover your funds. There are some new developments around social recovery, but that’s all still very experimental. This just isn’t the type of customer support experience people are used to. And it’s not a risk that most are willing to take.
Integration with Fiat & Traditional Finance In today’s world, it’s still very hard to use crypto for daily spending (see Payments in our DeFi use-cases post). Hopefully, that will all change someday. In the meantime, if any of these non-custodial products hope to win in the broader consumer finance market, they will undoubtedly need to integrate with the legacy financial world — they need onramps (fiat-to-crypto deposit methods) and offramps (crypto-to-fiat withdraw/spend methods). As much as crypto-fanatics hate hearing it, you can’t expect people to jump headfirst into the new world unless there is a smooth transition, unless there are bridge technologies that help them arrive. This is why these fiat integrations are so important. Examples might be allowing ACH/Wire deposits (eg. via Plaid) or launching a debit card program for spend/withdraw. These fiat integrations are essential if the aim is to become the bank of the future. Doing any of this compliantly will require strong KYC/AML. So to achieve this use-case — integrating with traditional finance —all of the Strengths we mentioned above are nullified. There are no longer regulatory benefits. There are no longer privacy benefits (users need to upload KYC documents, etc). And users are no longer in complete control of their money.
One of the great powers of crypto is that we no longer depend on banks. Anyone can store their wealth and have absolute control of their money. That’s made possible with these non-custodial wallets. It’s a wonderful thing. I believe that the most knowledgeable and experienced crypto people (including myself) will always be active users of these applications. And as mentioned in this post, there will certainly be circumstances where these apps will be essential & even life-saving.
However, I do not believe this category of product is a major threat to Genesis Block to becoming the bank of the future.
They won’t win in the broader consumer finance market — mostly because I don’t believe that’s their target audience. These applications simply cannot produce the type of product experience that the masses require, want, or expect. The Weaknesses I’ve outlined above are just too overwhelming. The friction for mass-market consumers is just too much. https://preview.redd.it/lp8dzxeh1lg51.png?width=800&format=png&auto=webp&s=03acdce545cd032f7e82b6665b001d7a06839557 The winning bank will be focused on solving real user problems and meeting user needs. Not slowed down by rigid idealism like censorship-resistance and absolute decentralization, as it is with most non-custodial wallets. The winning bank will be a world-class product that’s smooth, performant, and accessible. Not sluggish and slow, as it is with most non-custodial wallets. The winning bank will be one where blockchain & crypto is mostly invisible to end-users. Not front-and-center as it is with non-custodial wallets. The winning bank will be one managed and run by professionals who know exactly what they’re doing. Not DIY (Do It Yourself), as it is with non-custodial wallets. So are these non-custodial wallets a threat to Genesis Block in winning the broader consumer finance market, and becoming the bank of the future? No. They are designed for a very different audience. ------ Other Ways to Consume Today's Episode:
Is Trezor taking advantage of COVID-19 and Stealing BTC from your wallet too?
Okay, so i wanna start off by saying I've had TREZOR for over 6 months now and only since Monday i started taking it seriously by storing my Bitcoins in there. I purchased the device after seeing an ad claiming it was un-hackable and the most secure wallet on earth blah blah blah, since purchased i never transferred more than 2000 in and out of my account but recently i decided to withdraw my funds of around 1.3btc from BINANCE into my TREZOR wallet. it was in there since Monday 6th of April, but when i logged in early hours of this morning my Bitcoins was gone! and my transactions... i never updated my Trezor device in order for my previous wallets to just Disappear like that. The worst part is i recent moved houses and i cant seem to fine the piece of paper where i input my recovery seed. i just want to know if this has ever happened to anyone? why does this happen and whats the solution? will i get my money back? as im the type of person who stores all his money on bitcoin and doesn't use banks - that was literally everything i had left. I'm sat here praying that this is just a server error of some sort and it will all be by the afternoon. TREZOR if your reading this, i hope this wasn't done on purpose, i hope your not taking advantage of COVID-19 and i hope you can return to me whats mine as soon as possible. i got a strong feeling BTC is going to fall fast soon and i don't want to lose any of what i have! P.S Below is a link of the blockchain search of my account, you can see that address starting with (3Gyk52T) is mine and you can see it says i have no money in there, which is weird as i transferred a friend $108 to account ending in (1MJfxqp1Z) and at the exact same time it says 1.29863517 BTC was transferred to account starting with (31kZXzJA5) i don't know if that's one of the other accounts on my wallet as i haven't memorized it yet but i definitely didn't send my full balance to another wallet - Furthermore the money is still in the wallet... I have posted the Blochain LookUp Link in the Comments as my posts keep getting put down by moderator and making me wait 20mins before i post a new post smh
Got my Trezor One today from Amazon, bought bitcoin from Binance and now looking to store it with my Trezor. Been doing some research and am getting paranoid with possibly receiving fake. Just want to see if there is a way or a certain time to determine that the Trezor received is not a fake. This is what I did so far:
I have checked hologram and it the same as website showed. (*However, when setting up wallet on website, the picture showed that the inside the hologram has WAY bigger lock icon with "Trezor" than mine?)
Checked Amazon order and it sold by "NuWave Retail" which is listed as a reseller on Trezor website
Box was glued shut, had hard time opening it and had to rip box a bit in order to open it
Set up the Trezor and wrote down recovery words
Confirmed receive address and successfully sent a tiny amount of bitcoin to Trezor wallet
Updated the Trezor firmware
Wiped the Trezor and successfully recovered it using recovery words written down
Is there anything else I can do to check if it a fake? Can I send all my coins now into here or should I wait? Thank you for reading.
https://preview.redd.it/6w93e0afttx41.png?width=1400&format=png&auto=webp&s=c00989612ec2d52eb522405e6b6a98bf875e08bb Version 1.3.0 is a powerful update to TkeySpace that our team has been carefully preparing. since version 1.2.0, we have been laying the foundation for implementing new features that are already available in the current version. Who cares about the security and privacy of their assets is an update for you. TkeySpace — was designed to give You full control over your digital assets while maintaining an exceptional level of security, which is why there is no personal data in the wallet: phone number, the email address that could be compromised by hackers — no identity checks and other hassles, just securely save the backup phrase consisting of 12 words.
Briefly about the TkeySpace 1.3.0 update :
Code optimization and switching to AndroidX;
Selecting the privacy mode;
Selecting the recovery method for each currency;
Choosing the address format for Litecoin;
Enhanced validation of transactions and blocks in the network;
Starting with the current update, the TkeySpace wallet can communicate via the TOR network, includes new privacy algorithms, and supports 59 different currencies. https://i.redd.it/kn5waeskttx41.gif Tor is a powerful privacy feature for those who own large assets or live in places where the Internet is heavily censored.
Tor technology provides protection against traffic analysis mechanisms that compromise not only Internet privacy, but also the confidentiality of trade secrets, business contacts, and communications in General.
When you enable TOR settings, all outgoing traffic from the wallet will be encrypted and routed through an anonymous network of servers, periodically forming a chain through the Tor network, which uses multi-level encryption, effectively hiding any information about the sender: location, IP address, and other data. This means that if your provider blocks the connection, you can rest easy — after all, by running this function, you will get an encrypted connection to the network without restrictions. https://preview.redd.it/w9y3ax4mttx41.png?width=960&format=png&auto=webp&s=972e375fc26d479e8b8d2999f7659ec332e2af55 In TOR mode, the wallet may work noticeably slower and in some cases, there may be problems with the network, due to encryption, some blockchain browsers may temporarily not work. However, TOR encryption is very important when Internet providers completely block traffic and switching to this mode, you get complete freedom and no blocks for transactions.
Confidentiality of transactions (the Blockchain transaction)
The wallet can change the model of a standard transaction, mixing inputs and outputs, making it difficult to identify certain cryptocurrencies. In the current update, you can select one of several modes for the transaction privacy level: deterministic lexicographic sorting or shuffle mode.
Mode: Lexicographic indexing
Implemented deterministic lexicographic sorting using hashes of previous transactions and output indexes for sorting transaction input data, as well as values and scriptPubKeys for sorting transaction output data; We understand that information must remain confidential not only in the interests of consumers but also in higher orders, financial systems must be kept secret to prevent fraud. One way to address these privacy shortcomings is to randomize the order of inputs and outputs.
Lexicographic orderingis a comparison algorithm used to sort two sets based on their Cartesian order within their common superset. Lexicographic order is also often referred to as alphabetical order or dictionary order. The hashes of previous transactions (in reverse byte order) are sorted in ascending order, lexicographically.
In the case of two matching transaction hashes, the corresponding previous output indexes will be compared by their integer value in ascending order. If the previous output indexes match, the input data is considered equal.
Shuffle Mode: mixing (random indexing)
To learn more about how “shuffle mode” works, we will first analyze the mechanisms using the example of a classic transaction. Current balance Of your wallet: 100 TKEY, coins are stored at different addresses: x1. Address-contains 10 TKEY. x2. Address-contains 20 TKEY. x3. Address-contains 30 TKEY. x4. Address-contains 15 TKEY. x5. Address-contains 25 TKEY.
Addresses in the blockchain are identifiers that you use to send cryptocurrency to another person or to receive digital currency.
Let’s look at a similar example: you have 100 TKEY on your balance, and you need to send 19 TKEY. x1. Address-contains 10 TKEY. x2. Address-contains 20 TKEY. x3. Address-contains 30 TKEY. x4. Address-contains 15 TKEY. x5. Address-contains 25 TKEY. You send 19 TKEY, the system analyzes all your addresses and balances on them and selects the most suitable ones for the transaction. To send 19 TKEY, the miners will be given coins with x2. Addresses, for a total of 20 TKEY. Of these, 19 TKEY will be sent to the recipient, and 0.99999679 TKEY will be returned to Your new address as change minus the transaction fee. https://preview.redd.it/doxmqffqttx41.png?width=1400&format=png&auto=webp&s=5c99ec41363fe50cd651dc0acab05e175416006a In the blockchain explorer, you will see the transaction amount in the amount of 20 TKEY, where 0.99999679 TKEY is Your change, 19 TKEY is the amount you sent and 0.00000321 is the transaction fee. The shuffle mode has a cumulative effect. with each new transaction, delivery Addresses will be created and the selection of debit addresses/s that are most suitable for the transaction will change. Thus, if you store 1,000,000 TKEY in your wallet and want to send 1 TKEY to the recipient, the transaction amount will not display most of your balance but will select 1 or more addresses for the transaction.
Selecting the recovery method for each digital currency (Blockchain restore)
Now you can choose the recovery method for each currency: API + Blockchain or blockchain.
Note: This is not a syncing process, but rather the choice of a recovery method for your wallet. Syncing takes place with the blockchain — regardless of the method you choose.
What are the differences between recovery methods?
API + Blockchain
In order not to load the entire history of the blockchain, i.e. block and transaction headers, the API helps you quickly get point information about previous transactions. For example, If your transactions are located in block 67325 and block 71775, the API will indicate to the node the necessary points for restoring Your balance, which will speed up the “recovery” process. As soon as the information is received, communication with the peers takes place and synchronization begins from the control point, then from this moment, all subsequent block loading is carried out through the blockchain. This method allows you to quickly restore Your existing wallet. ‘’+’’ Speed. ‘’-’’ The API server may fail.
This method loads all block headers (block headers + Merkle) starting from the BIP44 checkpoint and manually validates transactions. ‘’+’’ It always works and is decentralized. ‘’-’’ Loading the entire blockchain may take a long time.
Why do I need to switch the recovery method?
If when creating a wallet or restoring it, a notification (!) lights up in red near the selected cryptocurrency, then most likely the API has failed, so go to Settings — Security Center — Privacy — Blockchain Restore — switch to Blockchain. Syncing will be successful.
Enhanced validation of transactions and blocks in the network
Due to the increased complexity in the Tkeycoin network, we have implemented enhanced validation of the tkeycoin consensus algorithm, and this algorithm is also available for other cryptocurrencies.
What is the advantage of the enhanced validation algorithm for the user
First, the name itself speaks for itself — it increases the security of the network, and second, by implementing the function — we have accelerated the work of the TkeySpace blockchain node, the application consumes even fewer resources than before.
High complexity is converted to 3 bytes, which ensures fast code processing and the least resource consumption on your device.
The synchronization process has been upgraded. Node addresses are added to the local storage, and instant synchronization with nodes occurs when you log in again.
Checking for double-spending
TkeySpace eliminates “double-spending” in blockchains, which is very valuable in the Bitcoin and Litecoin networks.
For example, using another application, you may be sent a fake transaction, and the funds will eventually disappear from the network and your wallet because this feature is almost absent in most applications.
Using TkeySpace — you are 100% sure that your funds are safe and protected from fraudulent transactions in the form of “fake” transactions.
The bloom filter to check for nodes
All nodes are checked through the bloom filter. This allows you to exclude fraudulent nodes that try to connect to the network as real nodes of a particular blockchain. In practice, this verification is not available in applications, Tkeycoin — decided to follow a new trend and change the stereotypes, so new features such as node verification using the bloom filter and double-spending verification are a kind of innovation in applications that work with cryptocurrencies.
Updating the Binance and Ethereum libraries
Updated Binance and Ethereum libraries for interaction with the TOR network.
Function — to hide the balance
This function allows you to hide the entire balance from the main screen.
Advanced currency charts and charts without authentication
Detailed market statistics are available, including volumes, both for 1 day and several years. Select the period of interest: 1 day, 7 days, 1 month, 3 months, 6 months, 1 year, 2 years.
In version 1.3.0, you can access charts without authentication. You can monitor the cryptocurrency exchange rate without even logging in to the app. If you have a pin code for logging in, when you open the app, swipe to the left and you will see a list of currencies.
Transaction verification for Tkeycoin is now available directly in the app.
Independent Commission entry for Bitcoin
Taking into account the large volume of the Bitcoin network, we have implemented independent Commission entry — you can specify any Commission amount. For other currencies, smart Commission calculation is enabled based on data from the network. The network independently regulates the most profitable Commission for the sender.
New digital currencies
The TkeySpace wallet supports +59 cryptocurrencies and tokens.
We are constantly expanding the range of supported tokens and cryptocurrencies — new ERC20 tokens have been added: Bancor (BNT), Cashaaa (CAS), Chainlink (LINK), Decentraland (MANA), Maker (MKR).
Now the multi-currency wallet supports 25 cryptocurrencies and tokens:
Cryptocurrencies:Tkeycoin, Bitcoin, Ethereum, Bitcoin Cash, DashERC20 tokens and 1:1 stablecoins to the USD exchange rate: *Binance ERC20 (BNB), Bancor (BNT), Cashaaa (CAS), Chainlink (LINK), Decentraland (MANA), Maker (MKR), 0x Protocol, TrueUSD, Tether USD, USD Coin, Gemini Dollar, Statis EURO, Paxos Standart.*Stablecoins 1:1 to the gold exchange rate: *Digix Gold Token, PAX Gold.Binance DEX tokens (BEP2): Binance Dex, Binance USD, Bitcoin BEP2, Ripple BEP2.*EOS:available only for recovery if you want to transfer funds using a backup phrase from another wallet. Full EOS support will be available in future releases.
Support for new devices
Optimized compatibility with Android devices, now TKEYSPACE is supported on 4600 devices. Many Android smartphone manufacturers often change the source code, regardless of whether it is Samsung or Xiaomi, so Android app developers are always forced to take into account various nuances on the released devices.
Fixed bugs with push notifications, now the notification about the price changes come on time.
Updating the USER-AGENT
Changed the USER-AGENT blockchain wallet: from cryptogramm: 220.127.116.11 to TKEYSPACE-ANDROID.
A User-agent is a client application that uses a specific network Protocol. For example, local wallets for Linux are marked as CryptoGramm: 18.104.22.168. Now in the list of nodes (peers), you can see the connected clients of TKEYSPACE-ANDROID, which allows you to understand which peers are connected to Your full node.
Tezos (XTZ) Is 20% Down Regardless Of Binance Listing
Even With Live Trading, Tezos Still Lacks Bullish Support. The Entire Crypto Sector Is Also Down The tenth-largest cryptocurrency based on market capitalization, Tezos (XTZ), followed the trend of the crypto sector, and wasn`t affected by Binance.US announcement for supporting XTZ/USD and XTZ/BUSD trading pairs. The valued at $950 million altcoin made a sharp drop in its price, currently trading at $1,30 which is a 20 percent drop over the course of the past 24 hours. Tezos, as well as the entire crypto sector, made another drop into the red, with the total market capitalization of all cryptocurrencies shrinking down to $135,3 billion. However, amid the crypto turmoil, Binance.US announced that the platform would support trading for XTZ. The U.S. users could buy and deposit XTZ tokens directly to their wallets, but trading and withdrawal functionalities would be active on a later date. Traders would also have to pass account verifications to gain access to trading with Tezos. The verification method now includes fiat verification, as well as the basic and advanced authentication methods. Looking at the technical side of trading, Tezos made a recovery to $1,81 but quickly tumbled to trade as low as $1,16. Trading volumes crashed, and even the Binance listing couldn’t get enough bullish momentum to hold on to the significant sell-off pressure. Experts are predicting the price per XTZ token to slip below $1.2, as the sell-off pressure in the crypto sector is still high. Tezos became famous for being one of the best ICO projects of 2017, raising $232 million. Despite being at the bottom of the top-10, XTZ outperformed the majority of altcoins, recording highs of $3,90 in February. Meanwhile, the crypto sector took yet another hit into the red, with Bitcoin (BTC) slipping below $4,500 to trade as low as $4,400. Currently, Bitcoin recorded a small recovery, trading at $4,925.97. Trading volumes for the world’s biggest cryptocurrency seem to gain upwards momentum, which may indicate the formation of strong supports in the $4,700 range.
Why the Verge-Pornhub partnership didn't move the market, and why usability continues to stall adoption
I'll let somebody else point out that very few people pay for porn to begin with. Very optimistically let's say its 1:10 PH users. Within that group, there's going to be small pool that own bitcoin, and much much fewer people have the technical ability to understand how to use exchanges and wallets. A raw crypto checkout option is not a product. One that is basically a credit card funnel through ProbilleCoinpayments is even less of a crypto checkout option (which is what they did). This is a glorified extra-long credit card checkout option in disguise, where you still have to create a username and tie it to an email address. No email, no checkout. Yeah. Think about it. Let's say I'm your average college hornball and I want to get a PH subscription. Exit the Matrix and walk through the steps of a normal human being just trying to use this new bold Internet:
Spend 3 days feverishly researching how to use a wallet
Sign up for Coinbase where I likely can't use a credit card
Pay my bank a crazy fee to transfer money, if I even can
Wait literally days later to jerk off in the future
Sign up for a Binance account or some other exchange
Setup 2FA after completing an intro course in computer science
Trade my coins to Verge
Move Verge to Pornhub through their cryptic checkout option . (Probiller which then sends you to CoinPayments)
No redirect into your account. Apparently wait for an email to confirm the transaction (seriously?)
Imagine trying to do all that from a smartphone. No way. Yeah, not going to happen. Consider this check-out flow instead: 1) Let's buy porn! Do you already own Verge (y/n) Y) Here's our wallet address and a QR code, on standby to let you in (confirms it and you're in, here's your randomly generated usepass pair, to recover it here's a 12 word recovery phrase -- zero bullshit!) N) First you'll need a wallet, let's install one. Mobile or Desktop? And the wallet uses an API to a fiat processor, instead of the madness they implemented. It's not that hard, people. I said it before and I said it again: the user experience is the product. Verge-Pornhub have no product. What they built is a tiny pinhole to crawl through, and that means nothing for adoption. Adoption starts when using crypto requires no explanation. Had Verge focused on usability instead of this incredibly expensive stunt there would be more volume and more integrations without having to throw crowdfunded money at a site to add them. It's not going last. There is no substitute or shortcut towards building a good user experience. You have to sit down with real people. Instead, we have this awkward moment where early Verge investors feel misled, if not embarrassed, to forcefully have their portfolios thrown into the porn business.
Electrum-ltc, Today I found out Two thousand three hundred ninety nine Litecoins were stolen from my wallet on April 12, 2018. Here is what I did that day: 1- On the morning of April 12, I decided to reset Windows 10 using the recovery option. and wipe out all files, which I had already backed-up on another drive. 2- After installing Windows office, Chrome and Adobe Reader, I then decided to download the Electrum Litecoin wallet from . 3- I downloaded the "Windows installer" version, typed in my seed during the setup and next a message indicating an error popped-up. The message said something about not being able to connect to the server. 4- I tried once again and the same thing happened. I quickly goggle for an answer but couldn't find a simple one. 5- I then downloaded the "Standalone Executable" version, typed my seed during the setup and the wallet opened. I don't remember checking the balance, but I do remember deciding to give it a few minutes to update. So, I then went to install other wallets and programs, etc. and totally forgot about the wallet. 6- Then, I restarted my computer after some windows updates or something, got carried away with work, and didn't check my Litecoin wallet. 7- Today, April 17, 2018, I decided to check my wallet and I found out my wallet had been emptied. 8- After trying to figure out how I had been hacked I found out that my wallet was emptied seconds after I installed the wallet on April 12. The hack didn't just stop there, my seed was also used to claim and take my Litecoin Cash. Because the hack happened exactly at the moment of the Electrum Litecoin wallet was installed and seems like it was an automatic process, I suspect the hack came through the wallet downloaded web page electrumltc.org. New information/ Add 4/24/2018 6:26 pm East time Through the Bing search, we typed electrum ltc, and the false page appeared. Electrumltc.org I had the windows wallets from that site analysed by a programmer. We discovered that it sends the seeds 12 words to this address ip 22.214.171.124. I beg the community for any help . We will be very attentive .. We have been studying how the Litecoins have moved in the Blockchain, and we notice that they were sent to some wallets that, according to Chainz's explorer. belong to Bitfinex and Binance. In the end, the coins arrived to Wallet LTU2cds4aSdXFip9sV4gXphnhxGQjgfjmg. I would like to ask you from my heart to help from the whole community, to publish this information, in hopes that Binance and Bitfinex, recognize the Litecoins as stolen and take actions. From our wallet the coin passed through their systems. I remember when I started in the world of cryptocurrencies, Bitfinex was hacked for an amount of 60million dollars equivalent in Bitcoin, at that moment ...time flies. We are following the Litecoin and organizing all the information to let the cryptocurrency community know about the stolen 2,449 LTC (first 2,399 LTC and then 50 LTC). In the following direction, a whole discussion on the subject was started ... and there are images related to the theft: https://github.com/pooleelectrum-ltc/issues/176
Exchanges The best way to support XRP is to buy/sell XRP directly with your local currency, not with USDT, ETH, LTC, or BTC. Available XRP pairs - AUD, BRL, CAD, CNY, EUR, GBP, IDR, INR, JPY, KRW, MXN, PHP, RUB, THB, TRY, UAH, USD, ZAR. You can find the complete list of XRP exchanges and supported XRP/fiat pairs Here.
originally posted by ankarlie https://steemit.com/blockchain/@ankarlie/decentralized-exchange-true-crypto-ownership-realized Introduction For over a decade we have seen blockchain technology developed into one of the most important technologies in recent history. Many visionaries, thought leaders, business gurus, and government authorities have recognized its immense potential that they have often associated it as one of the primary technologies that will drive Web 3.0 or even the 4th industrial revolution. Blockchain technology is so powerful that it has the capacity to disrupt any sector in our society where trust is a primary concern, which is pretty much is everything. As such we might consider businesses engaged in blockchain technology are in the business of trust. Business of Trust Blockchain technology has often been described as a trust layer that enables an individual to exchange value without having to rely on any central authority or third party intermediary. Often times transactions that are done using this technology are called trustless transactions, meaning, transacting parties do not have to trust each other to ensure that transactions will be consummated. In other words, the technology itself will guarantee that all transactions will push through, irreversible and immutable. Banks are good examples of business of trust. We entrust them with our money and valuables, but sometimes these very same banks restrict our access to our own money and valuables due to many reasons. These might be server maintenance, AML and KYC requirements, regulatory obligations or whatever reason they might deem applicable. This is the very reason why blockchain technology through its first application, Cryptocurrency, has gained enormous success. Cryptocurrencies enable everyone total and complete control of their money. Scams and Fake Blockchain Initiatives The awesome potential of the blockchain technology might have afforded us the necessary tools and infrastructure for more financial freedom, inclusivity, and mobility, but it is not immune to bad actors that try to exploit the advantages of this burgeoning industry. The excitement and demand for blockchain technology have opened the doors for scammers and con-artists who try to “sell” the technology to investors who are more than willing to invest huge amounts of money to get the piece of the action that has the potential to explode in value. One good example of a project that has been masquerading as blockchain technology is the $4 Billion fake crypto scam called OneCoin. The leader of this project, Dr. Ruja Ignatova aka Cryptoqueen have positioned OneCoin as the Bitcoin killer which she claims will become the biggest cryptocurrency in the world. Coming from an Oxford University graduate with a doctorate degree from Konstanz University in Germany and worked at McKinsey and Company who would have known that the project would turn out to be a scam. OneCoin exploited the idea of leveraging blockchain technology, the potential of hitting it big like bitcoin and played on the greed of investors who were fearful of missing out on a life-changing opportunity envisioned by Dr. Ruja. That was several years back, of course we all know now that there was never an underlying blockchain technology in the first place and what we have left are disgruntled investors some of which are financially ruined due to investing more than they can afford to lose. Sad to say this has been a common narrative in the crypto space. Blockchain is Real and Here To Stay The many scams and fake or failed blockchain projects in the space have not dampened the interest of investors into blockchain and its first use case, cryptocurrencies. Instead, it has been gaining traction as the industry begins to mature, gaining regulatory clarity and widespread acceptance as a valid and legitimate asset class and investment vehicle. They can serve as alternative investments that can be used to hedge against uncertainties in traditional finance and investments. There are now over four thousand cryptocurrencies in the world and this number will continue to increase well into the future. In fact, cryptocurrency proponents see a future where there will be hundreds of blockchains and thousands of digital assets. An integral part of this growing ecosystem will be cryptocurrency exchanges which serve as venues for open markets where cryptocurrency holders, traders, and investors interact. Not only there is an increasing number of digital assets in the space but also the places where you can trade. CEX vs DEX There are two general types of cryptocurrency exchanges: Centralized Exchange (CEX) and Decentralized Exchanges (DEX). Their functions are essentially the same but the way users interact with these types of exchanges differs significantly. CEX typically require their customers to undergo Know-Your-Customer (KYC) procedures and ID verification processes, DEX does not. In addition, CEX requires its customers to their cryptocurrencies deposit into its internal wallets while DEX allows its users to keep their wallets in non-custodial wallets. CEX is generally considered by the wider cryptocurrency community as the lesser secure venue for users due to the following reasons. First, CEX typically uses one single crypto wallet address per blockchain. This means users of all Ether and Ethereum based-tokens share (The same can be said with other blockchain platform) the same address and demarcated only using a Memo or a Tag. This creates a honeypot that is just waiting to be exploited by hackers. Second, users of CEX have limited access to their digital assets as they will have to ask permission from the CEX operator access to their digital assets. KYC procedures in CEX are also of great concern as users are typically required to submit supporting documents that can be used to verify their identity. This means users are relying on the security and competency of the CEX to secure their valuable information. Information that can be used for identity theft, false representation, and recovery of other online accounts. One good example of this is Binance where it found some of their customer information have been compromised. This is on top of the recent hack last May 2019. Although no user funds were lost by the hack as Binance shouldered all the lost funds amounting to $40M USD, users were not able to access their accounts for several days. One can only imagine the great stress and anxiety It might have brought its users, not knowing when they will be able to regain access to their digital assets. These risks do not exist when using DEX as users will not have to deposit or withdraw their Cryptocurrencies. Transactions are all done on-chain and directly transacted from their own non-custodial wallet and there is no risk of your information falling into the wrong hands as there is no need for KYC. Decentralized Exchange— Newdex DEXs were made possible through the evolution of blockchain technology. The first-generation blockchain tech like the one used by bitcoin simply does not have the capabilities to host decentralized exchanges. This was only made possible through the integration of smart contracts with Ethereum being the first one to incorporate such capabilities. While the technology has shown promise the limitations of Ethereum’s blockchain made it impossible and uneconomical to reach mass adoption. Decentralized exchanges (DEX) relies heavily on the blockchain where it has been built on. This is the primary reason why Newdex developers have decided to build their DEX on two of the most successful, scalable and used blockchain in the whole industry EOS and TRON. By doing so their DEX has the capacity to scale to mass adoption without having to worry that the underlying technology that hosts their DEX will not be able to cope up with the load and demand of their decentralized exchange. EOS and TRON both use Delegated Proof-of-Stake (DPOS) consensus mechanism which has been described as a more power-efficient, scalable and democratic consensus protocol compared to Proof-of-Work. This enables them higher throughputs, consumes a whole lot less energy and secures its blockchain more efficiently. Aside from the scalability advantage, the absence of miners in DPOS makes transactions in EOS and TRON more cost-efficient and often times fee-less like. By offering a simple yet powerful trading venue for traders of EOS, TRON Newdex has become one of the world’s leading decentralized exchanges. To ensure that the digital assets of its customers are always safe Newdex, does not require its clients to input their private keys. Instead, Newdex opted to partner with all conceivable wallets for both EOS and TRON to enable its users to log in through their non-custodial wallets of choice. This is an additional layer of security and serves as a deterrent to phishing risk. Apart from not asking for the private key to login in, Newdex does not require its traders to deposit and withdraw their digital assets. This was made possible because all trades are transacted on-chain which means trades are triggered, executed and finalized using smart contracts making them irreversible, immutable and secure. This also makes them auditable and transparent as anyone can basically follow and inspect the transaction on the various blockchain explorer available online. Since users of Newdex never lose custody of their digital assets we can say it is the prime example of true digital asset ownership. Unlike centralized exchanges that require their customers to deposit and withdraw, Newdex executes transactions straight out of customers’ wallets which means there is no need to move digital assets in and out of the DEX. Hence there will be no chance for Newdex to lockdown user assets, there will also be no need to pay for deposits and withdrawals. World’s Leading Decentralized Exchange DEXs are the only trading venues where users have full custody and control of their cryptocurrencies through the use of blockchain technology. Newdex has emerged as the world’s leading DEX for not only offering all the advantages of decentralized exchanges but offering value-added services that set it above all other decentralized exchanges. These include an OTC market that enables its users to use Fiat currencies to trade with cryptocurrencies, a VIP membership for various trading and airdrops privileges and utilizing its own utility token called Newdex ecological Platform Token (NDX). Conclusion Cryptocurrencies have not yet reached mass adoption but through the power of blockchain technology and the many advantages that it brings it is only a matter of time when the masses come marching along searching for the proper venue where they can fully exercise their newfound financial freedom. Where there are no censorship, no restrictions, borderless and frictionless. More importantly, where true ownership of cryptocurrency is realized, decentralized exchanges and there is no better embodiment of this than Newdex, the world’s leading decentralized exchange. For more information about Newdex please follow its official links below: Website: https://newdex.vip/ Twitter: https://twitter.com/NewdexOfficial Medium: https://medium.com/@marketing\_27690 Let's Connect!!!
With the large number of new readers coming to this sub we need to make information easy to access so those readers can make informed decisions. We all know there is an unusually large amount of Fear, Uncertainty and Doubt (FUD) surrounding EOS. Frankly, when clear evidence is provided it’s not that difficult to see EOS for the extremely valuable project it is. This post hopes to begin to put an end to all the misinformation by doing the following:
Giving a clear and concise answer to the most frequently asked questions in regards to EOS.
Giving a more in-depth answer for those who want to read more.
Allowing readers to make informed decisions by making credible information easy to access.
As EOS climbs the ranks we need to recognise there are going to be a lot of skeptical readers coming over and posting their questions. Sometimes they will be irrational, hostile and often just looking for a reaction. We should make it our responsibility to welcome everyone and refrain from responding emotionally to provocative posts, instead providing factual and rational answers. I will add to this post as and when I can, if you have any ideas or spot any mistakes let me know and I'll get them fixed ASAP. Im planning to add a bit on the team, centralisation and DPOS, governance and EOS VC shortly but please let me hear your suggestions!
1. How do you registeclaim your EOS tokens before June 2018?
Select Metamask, MyEtherWallet, or Ethereum Wallet
Follow the guide.
Remember that the reason you need to register your Ethereum ERC-20 address is to include your EOS tokens in order for the balance of your EOS Tokens to be included in the Snapshot if a Snapshot is created, you must register your Ethereum address with an EOS public key. The EOS snapshot will take place prior to the 1 June 2018. After this point your ERC-20 EOS tokens will be frozen. And you will be issued EOS tokens on the EOS blockchain.
So PLEASE REGISTER your Ethereum address NOW, don't forget about it, or plan on doing it some time in the near future.
There are a lot of submissions about this in /eos, so rather than making a new one please reply to this thread with any questions you may have. Don't forget to join the EOS mailing list: https://eos.io/#subscribe and join the EOS community on your platform(s) of choice: Telegram, Discord and/or Facebook. And remember, if anyone instructs you to transfer ETH to an EOS contract address that doesn't match the address found on https://eos.io you are being scammed.
2. How will the token the ERC-20 EOS tokens be transferred to the native blockchain?
There isn't one! Read the long answer then read it again, registering your Ethereum wallet is mandatory!
Within 23 hours after the end of the final period on June 1, 2018 at 22:59:59 UTC, all EOS Tokens will become fixed (ie. frozen) and will become non-transferrable on the Ethereum blockchain. In order to ensure your tokens are transferred over to the native blockchain you must register your Ethereum address with an EOS public key, if you do not you will lose all your tokens! I am not going to link any tutorials as there are many that can be found by searching Google and YouTube. block.one is helping with the development of snapshot software that can be used to capture the EOS token balance and registered EOS public key of wallets on the Ethereum blockchain. It is then down to the community to create the snapshot. This snapshot can be used when generating a genesis block for a blockchain implementing eos.io software. block.one will not be launching EOS blockchains or operating any of their nodes.
Exchange Support Some exchanges have announced that they will support the token swap. Although using this method will undoubtedly be much simpler than registering the tokens yourself it also comes with its pitfalls.
It is highly likely there are going to be multiple networks running on the eos.io software that use the snapshot. It is highly unlikely that exchanges will support them all.
It is highly likely that exchanges will not support airdrops that use the snapshot.
Exchanges that have announced support for the token swap include:
EOS.IO software is aiming to provide a decentralized operating system which can support thousands of industrial scale DApps by enabling vertical and horizontal scaling.
EOS.IO is software that introduces a blockchain architecture designed to enable vertical and horizontal scaling of decentralized applications. This is achieved through an operating system-like construct upon which applications can be built. The software provides accounts, authentication, databases, asynchronous communication and the scheduling of applications across multiple CPU cores and/or clusters. The resulting technology is a blockchain architecture that has the potential to scale to millions of transactions per second, eliminates user fees and allows for quick and easy deployment of decentralized applications.
CEO Brendan Blumer - Founder of ii5 (1group) and okay.com. He has been in the blockchain industry since 2014 and started selling virtual assets at the age of 15. Brenden can be found on the Forbes Cypto Rich List. Brendan can be found on Twitter.
CTO Dan Larimer - Dan's the visionary industry leader who built BitShares, Graphene and Steemit as well as the increasingly popular Proof of Stake Governance and Decentralised Autonomous Organization Concept. He states his mission in life is “to find free market solutions to secure life, liberty, and property for all.”. Dan can also be found on the Forbes Cypto Rich List. Dan can be found on Twitter and Medium.
Partner Ian Grigg - Financial cryptographer who's been building cryptographic ledger platforms for 2+ decades. Inventor of the Ricardian Contract and Triple-Entry Accounting.
6. Which consensus mechanism does EOS use and what are Block Producers?
Delegated Proof of Stake (DPOS) with Byzantine Fault Tolerance. Block Producers (BPs) produce the blocks of the blockchain and are elected by token holders that vote for them. BPs will earn block rewards for their service, these block rewards come in the form of EOS tokens produced by token inflation.
“EOS.IO software utilizes the only known decentralized consensus algorithm proven capable of meeting the performance requirements of applications on the blockchain, Delegated Proof of Stake (DPOS). Under this algorithm, those who hold tokens on a blockchain adopting the EOS.IO software may select block producers through a continuous approval voting system. Anyone may choose to participate in block production and will be given an opportunity to produce blocks, provided they can persuade token holders to vote for them. The EOS.IO software enables blocks to be produced exactly every 0.5 second and exactly one producer is authorized to produce a block at any given point in time. If the block is not produced at the scheduled time, then the block for that time slot is skipped. When one or more blocks are skipped, there is a 0.5 or more second gap in the blockchain. Using the EOS.IO software, blocks are produced in rounds of 126 (6 blocks each, times 21 producers). At the start of each round 21 unique block producers are chosen by preference of votes cast by token holders. The selected producers are scheduled in an order agreed upon by 15 or more producers. Byzantine Fault Tolerance is added to traditional DPOS by allowing all producers to sign all blocks so long as no producer signs two blocks with the same timestamp or the same block height. Once 15 producers have signed a block the block is deemed irreversible. Any byzantine producer would have to generate cryptographic evidence of their treason by signing two blocks with the same timestamp or blockheight. Under this model a irreversible consensus should be reachable within 1 second."
7. How does the voting process work?
The voting process will begin once the Block Producer community releases a joint statement ensuring that it is safe to import private keys and vote. Broadly speaking there will be two methods of voting:
Command Line Interface (CLI) tools
EOS Canada has created eosc, a CLI tool that supports Block Producer voting. Other Block Producer candidates such as LibertyBlock are a releasing web portal that will be ready for main net launch. There will be many more options over the coming weeks, please make sure you are always using a service from a trusted entity. Remember: Do not import your private key until you have seen a joint statement released from at least five Block Producers that you trust which states when it is safe to do so. Ignoring this warning could result in tokens lost.
8. What makes EOS a good investment?
Team - EOS is spearheaded by the visionary that brought us the hugely successful Bitshares and Steem - arguably with two projects already under his belt there is no one more accomplished in the space.
Funding - EOS is one of the best funded projects in the space. The block.one team has committed $1B to investing in funds that grow the EOS echo system. EOS VC funds are managed by venture leaders distributed around the world to insure founders in all markets have the ability to work directly with local investors. Incentives such as the EOS hackathon are also in place with $1,500,000 USD in Prizes Across 4 Events.
Community Focus - The team is aware that the a projects success depends almost entirely on its adoption. For this reason there has been a huge push to develop a strong world wide community. There is already a surplus number of block producers that have registered their interest and started to ready themselves for the launch and incentives the EOS hackathon are being used to grow the community. A index of projects using EOS can be found at https://eosindex.io/posts.
Technical Advantages - See point 9!
9. What are the unique selling points of EOS?
Potential to scale to millions of transactions per second
This depends entirely on your definition of working product. If a fully featured developer release meets your definition then yes!. Otherwise the public release will be June 2018.
EOS differs from other projects in that it aims to deliver a fully featured version of the software on launch. The Dawn 3.0 RC1 feature complete pre-release became available on April 5th. This version has all the features of the final release that is due June 2018. Further development will involve preparing the final system contract which implements all of the staking, voting, and governance mechanics. The common notion that there is no viewable code published is wrong and the initial Dawn 1.0 release has been available from September 14th 2017.
11. EOS is an ERC-20 token, how can it possibly be a competitor to other platforms?
The ERC-20 token is used only for raising funds during the token distribution; all tokens will be transferred to the native blockchain once launched.
EOS team has clearly stated their reason for choosing the Ethereum network when they described the rationale behind the ICO model. Specifically, the ICO should be a fair and auditable process, with as little trust required as possible. If you believe that an ICO should be fair, auditable, and trustless, you have no choice but to use a decentralized smart contract blockchain to run the ICO, the largest, and by-far most popular of which is Ethereum. Since EOS is intended to be a major competitor for Ethereum, some have seen this as a hypocritical choice. - Stolen from trogdor on Steam (I couldn’t word it any better myself).
12. Why do the eos.io T&C’s say the ERC-20 token has no value?
The EOS T&C’s famously state:
"The EOS Tokens do not have any rights, uses, purpose, attributes, functionalities or features, express or implied, including, without limitation, any uses, purpose, attributes, functionalities or features on the EOS Platform."
This is legal wording to avoid all the legal complications in this emerging space, block.one do not want to find themselves in a lawsuit as we are seeing with an increasing amount of other ICOs. Most notably Tezos (links below).
This all comes down to legal issues. Anyone who’s been into crypto for 5 minuets knows that government bodies such as the Securities and Exchange Commission (SEC) are now paying attention to crypto in a big way. This legal wording is to avoid all the legal complications in this emerging space, block.one do not want to find themselves in a lawsuit as we are seeing with an increasing amount of other ICOs. Many token creators that launched ICOs are now in deep water for selling unregistered securities.
A filing from the Tezos lawsuit:
"In sum, Defendants capitalized on the recent enthusiasm for blockchain technology and cryptocurrencies to raise funds through the ICO, illegally sold unqualified and unregistered securities, used a Swiss-based entity in an unsuccessful attempt to evade U.S. securities laws, and are now admittedly engaged in the conversion, selling, and possible dissipation of the proceeds that they collected from the Class through their unregistered offering."
To ensure EOS tokens are not classed as a unregistered security block.one has made it clear that they are creating the EOS software only and won’t launching a public blockchain themselves. This task is left down to the community, or more precisely, the Block Producers (BPs). The following disclaimer is seen after posts from block.one:
"block.one is a software company and is producing the EOS.IO software as free, open source software. This software may enable those who deploy it to launch a blockchain or decentralized applications with the features described above. block.one will not be launching a public blockchain based on the EOS.IO software. It will be the sole responsibility of third parties and the community and those who wish to become block producers to implement the features and/or provide the services described above as they see fit. block.one does not guarantee that anyone will implement such features or provide such services or that the EOS.IO software will be adopted and deployed in any way.”
It is expected that many blockchains using eos.io software will emerge. To ensure DAPPs are created on an ecosystem that aligns with the interests of block.one a $1bn fund will be has been created to incentivise projects to use this blockchain.
“A lot of token distributions only allow a small amount of people to participate. The EOS Token distribution structure was created to provide a sufficient period of time for people to participate if they so choose, as well as give people the opportunity to see the development of the EOS.IO Software prior to making a decision to purchase EOS Tokens.”
It is also worth noting that block.one had no knowledge how much the the token distribution would raise as it is determined by the free market and the length of the token distribution is coded into the Ethereum smart contract, which cannot be changed.
14. Where is the money going from the token distribution?
Funding for the project was raised before EOS was announced, the additional money raised from the token distribution is largely going to fund projects on EOS.
A large portion of the money raised is getting put back into the community to incentivise projects using eos.io software. block.one raised all the money they needed to develop the software before the ERC-20 tokens went on sale. There are some conspiracies that block.one are pumping the price of EOS using the funds raised. The good thing about blockchain is you can trace all the transactions, which show nothing of the sort. Not only this but the EOS team are going to have an independent audit after the funding is complete for piece of mind.
From eos.io FAQ:
“block.one intends to engage an independent third party auditor who will release an independent audit report providing further assurances that block.one has not purchased EOS Tokens during the EOS Token distribution period or traded EOS Tokens (including using proceeds from the EOS Token distribution for these purposes). This report will be made available to the public on the eos.io website.”
A more complete list of EOS projects can be found at eosindex.io.
16. Dan left his previous projects, will he leave EOS?
When EOS has been created Dan will move onto creating projects for EOS with block.one.
When a blockchain project has gained momentum and a strong community has formed the project takes on a life of its own and the communities often have ideas that differ from the creators. As we have seen with the Bitcoin and Ethereum hark forks you cant pivot a community too much in a different direction, especially if its changing the fundamentals of the blockchain. Instead of acting like a tyrant Dan has let the communities do what they want and gone a different way. Both the Bitshares and Steem were left in a great position and with Dans help turned out to be two of the most successful blockchain projects to date. Some would argue the most successful projects that are actually useable and have a real use case. What Dan does best is build the architecture and show whats possible. Anyone can then go on to do the upgrades. He is creating EOS to build his future projects upon it. He has stated he loves working at block.one with Brendan and the team and there is far too much momentum behind EOS for him to possibly leave.
No one could have better knowledge on this subject than our Block Producer candidates, I have chosen to look to EOS New York for this answer:
"DDoS'ing a block producing is not as simple as knowing their IP address and hitting "go". We have distributed systems engineers in each of our candidate groups that have worked to defend DDoS systems in their careers. Infrastructure can be built in a way to minimize the exposure of the Block Producing node itself and to prevent a DDoS attack. We haven't published our full architecture yet but let's take a look at fellow candidate EOSphere to see what we mean. As for the launch of the network, we are assuming there will be attacks on the network as we launch. It is being built into the network launch plans. I will reach out to our engineers to get a more detailed answer for you. What also must be considered is that there will be 121 total producing and non-producing nodes on the network. To DDoS all 121 which are located all around the world with different security configurations at the exact same time would be a monumental achievement."
18. If block producers can alter code how do we know they will not do so maliciously?
Block producers are voted in by stake holders.
Changes to the protocol, constitution or other updates are proposed to the community by block producers.
Changes takes 2 to 3 months due to the fact block producers must maintain 15/21 approval for a set amount of time while for changes to be processed.
To ensure bad actors can be identified and expelled the block.one backed community will not back an open-entry system built around anonymous participation.
For this question we must understand the following.
Governance and why it is used.
The process of upgrading the protocol, constitution & other updates.
Dan’s view on open-entry systems built around anonymous participation.
Governance Cryptography can only be used to prove logical consistency. It cannot be used to make subjective judgment calls, determine right or wrong, or even identify truth or falsehood (outside of consistency). We need humans to perform these tasks and therefore we need governance! Governance is the process by which people in a community:
Reach consensus on subjective matters of collective action that cannot be captured entirely by software algorithms;
Carry out the decisions they reach; and
Alter the governance rules themselves via Constitutional amendments.
Embedded into the EOS.IO software is the election of block producers. Before any change can be made to the blockchain these block producers must approve it. If the block producers refuse to make changes desired by the token holders then they can be voted out. If the block producers make changes without permission of the token holders then all other non-producing full-node validators (exchanges, etc) will reject the change.
Upgrade process The EOS.IO software defines the following process by which the protocol, as defined by the canonical source code and its constitution, can be updated:
Block producers propose a change to the constitution and obtains 15/21 approval.
Block producers maintain 15/21 approval of the new constitution for 30 consecutive days.
All users are required to indicate acceptance of the new constitution as a condition of future transactions being processed.
Block producers adopt changes to the source code to reflect the change in the constitution and propose it to the blockchain using the hash of the new constitution.
Block producers maintain 15/21 approval of the new code for 30 consecutive days.
Changes to the code take effect 7 days later, giving all non-producing full nodes 1 week to upgrade after ratification of the source code.
All nodes that do not upgrade to the new code shut down automatically.
By default, configuration of the EOS.IO software, the process of updating the blockchain to add new features takes 2 to 3 months, while updates to fix non-critical bugs that do not require changes to the constitution can take 1 to 2 months.
Open-entry systems built around anonymous participation To ensure bad actors can be identified and expelled the block.one backed community will not back an open-entry system built around anonymous participation. Dan's quote:
"The only way to maintain the integrity of a community is for the community to have control over its own composition. This means that open-entry systems built around anonymous participation will have no means expelling bad actors and will eventually succumb to profit-driven corruption. You cannot use stake as a proxy for goodness whether that stake is held in a bond or a shareholder’s vote. Goodness is subjective and it is up to each community to define what values they hold as good and to actively expel people they hold has bad. The community I want to participate in will expel the rent-seeking vote-buyers and reward those who use their elected broadcasting power for the benefit of all community members rather than special interest groups (such as vote-buyers). I have faith that such a community will be far more competitive in a market competition for mindshare than one that elects vote buyers."
19. What is the most secure way to generate EOS key pairs?
Block producer candidates EOS Cafe and EOS New York have come forward to help the community with this topic. The block producer candidate eosnewyork has kindly posted a tutorial on steemit detailing the steps that need to be taken to generate key pairs using the official code on the EOS.IO Github. The block producer candidate eoscafe has gone a step further and released an Offline EOS Key Generator application complete with GUI for Windows, Linux & Mac. Not only can this application generate key pairs but it can also validate key pairs and resolve public keys from private keys. This application has also been vouched for by EOS New York
Here’s how you can get set up on Trust Wallet and start using Binance Smart Chain in just a couple of minutes. Read More. Today. 00:00. Your Binance Card Just Got Better. Just like Bitcoin, we haven't been standing still. We are continuously improving the Binance Visa Card by adding more features and functionalities. Read More. Oct 29. 2020. $100M Accelerator Fund Supports 5 More Projects ... Trezor was the first Bitcoin hardware wallet ever created, and it is known for its top security features which protect your BNB coins against virtual and physical theft. It is no doubt one of the best Binance Coin wallets if you are keen on having the greatest security available. Trezor is a small device with buttons and an OLED screen which can be connected to your computer via USB port. You ... — CZ Binance 🔶🔶🔶 (@cz_binance) May 7, 2019 While the exchange itself might be secure, your account might not be. On the 8th of May 2019, hackers have stolen $40 million worth of Bitcoin from the Binance exchange through “variety of techniques, including phishing, viruses and other attacks”, as said by ChangPeng “CZ” Zhao, Binance’s CEO, on their article publicized on the ... Store wallet backups in multiple locations (USB drive, CD, paper wallet, private cloud, etc.). Backup regularly when backing up a data file (such as wallet.dat). Backing up your wallet will secure your bitcoin in the event of a hardware or software failure, or if you have a device with a wallet lost or stolen. Schritt 8: Du kannst Deine Bitcoin beliebig lange bei Binance halten. Dort werden sie kostenfrei und relativ sicher aufbewahrt. Dennoch gelingt es Hackern (bei Börsen mit niedrigeren Sicherheitsstandards) immer wieder, Coins aus Konten zu entwenden. Um auch dieses Risiko zu minimieren, kannst Du die Bitcoin in eine Wallet transferieren. Es werden Paper Wallets, Software Wallets und Hardware ... Binance Coin wallet Secure your (BNB) assets. Secure your Binance Coin assets with the most trusted hardware wallet. Cold storage wallets are typically encrypted devices that store users' Binance Coin assets offline, providing a layer of security against the evolving threats emerging from being connected to the Internet. Bitcoin Wallet Vergleich: Alles was man über Bitcoin Wallets wissen muss Auch wenn eine Investition in Bitcoins heutzutage immer einfacher wird, gilt es doch einige wichtige Informationen zu kennen. So sollte man als zukünftiger Anleger beispielsweise wissen, was ein Bitcoin Wallet ist, welche unterschiedlichen Arten es gibt, wie man ein Bitcoin Wallet erstellen kann und welche Anbieter am ... Learn how to move your crypto assets from your Binance account to your Ledger Live account. Beware of phishing attacks, Ledger will never ask for the 24 words of your recovery seed. Never share them. Dealing with any crypto, it's important to know what to actually do if you accidentally lose the coins. In this article, we’ll focus on Bitcoin and explain best methods to keep your wallet safe ... Wallet Four. Do I have to be a Binance user to participate in the treasure hunt? No, the Bitcoin treasure hunt is open to everyone who reads the article. The treasure hunt is completely private and anonymous, and therefore anyone can win, although we would appreciate it if you join Binance and spread the word to your friends and family. How do I recover the wallet? Once you found all the 12 ...
Bitcoin Golden-Cross Binance Hack FUD Ripple wie Amazon? Chainlink löst DeFi Problem Tezos Rakete IOTA Sicherheits Update 🔐 Bitcoin & Crypto Wallet... Start hier met een binance account: https://www.binance.com/?ref=35226333 In deze video laat ik zien hoe je Bitcoins van een wallet adres in dit geval op coi... This video explains how you can buy Bitcoin via credit card and send the Bitcoin directly to your favorite wallet. I used Binance BTC wallet as an example. O... Trust Wallet also supports the leading crypto curencies: Bitcoin, Ethereum, ETC, GoChain, Wanchain, TRon, Litecoin, Bitcoin Cash and more. Currently more than 20,000 tokens that are built on ... Kostenloses & Sicheres Bitcoin Wallet - Electrum - https://electrum.org/ 🐃 Bitcoin & Co. einfach kaufen (inkl. 10€ Bonus) https://talerbox.com/go/bison/?ut... Kostenlos bei Binance registrieren http://bit.ly/Binance-Start In diesem Video zeige ich Schritt für Schritt wie ihr auf euer Bitcoin Wallet bei Binance ei... Brief intro on how to get any coin wallet address to deposit funds to. In this example I'm using Binance Exchange and wallet address ETH- Ethereum In order t... Know how to transfer from Binance to Coinbase. This video will help you move your coins from Binance to hardware wallet or other exchange. In this video, I s... Part 1 of video tutorial on how to transfer Tokens to Coins Ph: https://www.youtube.com/watch?v=kwhtV3-h5ds Trust Wallet: https://share.trustwallet.com/sFOSu... If you want to use bitcoin for buying things online, you should use a bitcoin wallet that broadcasts transactions immediately. Most accounts and exchange ser...