/
No results

Try adjusting your search

guarding against phishing attacks
Guarding Against Phishing Attacks

In a phishing attack, hackers try to gain access to your account and your crypto funds by impersonating an official email or web page. Here is advice for safeguarding your account against these ingenious and increasingly common attacks.

using crypto for shopping, charity, gaming, and more
Using Crypto for Shopping, Charity, Gaming, and More

Cryptocurrency isn’t just for hodlers anymore. New opportunities are emerging to make crypto part of everyday life. You can use your crypto funds to pay bills, purchase games, make charitable donations, and much more. 

what is cryptocurrency omg network and how does it work?
What is cryptocurrency OMG Network and how does it work?

OMG is a Layer-2 scaling solution for Ethereum. OMG Network’s Plasma engine executes smart contracts like Ethereum, but broadcasts only completed transactions to the public blockchain, reducing processing power, time, and costs.

what is cryptocurrency polygon and how does it work?
What is cryptocurrency Polygon and how does it work?

Polygon provides inexpensive, fast transactions on Ethereum-compatible blockchains using Layer-2 sidechains. The project is based on Polygon as the hub of a seamless worldwide network of interconnected Ethereum sidechains.

what is cryptocurrency ocean protocol and how does it work?
What is cryptocurrency Ocean Protocol and how does it work?

A crypto on-ramp for data exchange, Ocean Protocol uses blockchain technology to connect data providers and consumers. Data owners can sell data through the Ocean Market app while preserving privacy and control.

what is cryptocurrency qtum and how does it work?
What is cryptocurrency Qtum and how does it work?

Qtum combines the security of Bitcoin with the flexibility and smart contracts of Ethereum, resulting in a hybrid blockchain that delivers the best of both worlds while employing an efficient Proof of Stake consensus mechanism. QTUM is the Qtum blockchain's native coin.

how to deposit funds into your kriptomat account
How To Deposit Funds Into Your Kriptomat Account

When you’re ready to start building a portfolio, you’ll need funds so you can purchase crypto coins and tokens. To fund these transactions, you instruct your bank to make a wire transfer to your Kriptomat account. Here's how it is done.

what is a blockchain oracle?
What Is a Blockchain Oracle?

Suppose you wanted to make crypto transactions based on changes in the price of gold. The smart contract for your app would be simple to write except for one thing: Gold isn't on the blockchain. Your app can't access or verify the price.

what is cryptocurrency thorchain and how does it work?
What is cryptocurrency THORChain and how does it work?

The need for cross-chain liquidity and reliable and prompt exchanging of multiple assets is increasing with the development of decentralized finance and DeFi products and services. THORChain is one of the DeFi projects that offer immutability and multi-chain exchanging of various cryptocurrencies without wrapping.

what is cryptocurrency stacks and how does it work?
What is cryptocurrency Stacks and how does it work?

Have you ever asked yourself why there are so many different cryptocurrencies out there with new ones being made all the time? Well, one answer is that many of them are trying to address the shortcomings of Bitcoin. BTC may be the most secure blockchain out there but it simply can’t handle many features like privacy and smart contract functionality.

blockchain-security-guide
An Essential Blockchain Security Guide

People say blockchain technology is highly secure, but the news is full of stories about scams, hacks, and security breaches that result in millions of euros in losses. What’s the truth about blockchains? How can you keep your crypto secure?

blockchain-enabled identity management
Blockchain-Enabled Identity Management

Identity management is a complex process involving the authentication and authorization of individuals to access systems, networks, and applications. Robust digital identity solutions reduce the risk of fraud, identity theft, and data breaches.

1 10 11 12 13 14
Kriptomat App
Fast, secure and easy