Search our executive blockchain insights and services.
What Is a Crypto Hardware Wallet and How Does It Work? Hardware wallets are one of the most secure methods for storing crypto. Here we break down what they are, how they work, and if you need one. What Is a Crypto Hardware Wallet and How Does It Work?Level UpNEWIndividualsBusinessesDevelopersDiscoverCompanyUNIVERSITYTrending17 Jun 2022|BEGINNERS|4.5 MIN READWhat Is a Crypto Hardware Wallet and How Does It Work?Hardware wallets are one of the most secure methods for storing crypto. Here we break …
Learn MoreSound Wallet A succinct definition of Sound Wallet Sound WalletLevel UpNEWIndividualsBusinessesDevelopersDiscoverCompanyGLOSSARYSOUND WALLETCopy linkShare on TwitterShare on FacebookShare on LinkedinSound WalletA sound wallet in cryptocurrency is a novel way of storing private keys using sound or audio. The concept involves encoding a private key as a sound file to provide an additional layer of security, which can then be stored in various formats like a CD, vinyl record, MP3 file, or even an a…
Learn MorePublic Key A succinct definition of Public Key Public KeyLevel UpNEWIndividualsBusinessesDevelopersDiscoverCompanyGLOSSARYPUBLIC KEYCopy linkShare on TwitterShare on FacebookShare on LinkedinPublic KeyA public key is a cryptographic key used to encrypt messages intended for a particular recipient. A more technical definition of a public key is a series of letters and numbers used to encrypt plaintext into ciphertext. Because of this, public keys can be freely shared, as opposed to private keys, …
Learn MoreCryptography — Putting the Crypto Into Currency This article explores the fundamental technology behind cryptocurrencies and cryptography, from the basics of encryption to ciphers. Cryptography — Putting the Crypto Into CurrencyLevel UpNEWIndividualsBusinessesDevelopersDiscoverCompanyUNIVERSITYBlockchain6 Jan 2022|ADVANCED|10 MIN READCryptography — Putting the Crypto Into CurrencyThis article explores the fundamental technology behind cryptocurrencies and cryptography, from the basics of e…
Learn MoreNon-Custodial Wallets: Your Keys, Your Crypto Non-custodial wallets offer users several advantages, but also come with responsibilities. Read on for what they are. Non-Custodial Wallets: Your Keys, Your CryptoLevel UpNEWIndividualsBusinessesDevelopersDiscoverCompanyUNIVERSITYTrending16 Oct 2024|INTERMEDIATE|8 MIN READNon-Custodial Wallets: Your Keys, Your CryptoNon-custodial wallets offer users several advantages, but also come with responsibilities. Read on for what they are. Key Takeaways: Non…
Learn MoreCryptography — Putting the Crypto Into Currency This article explores the fundamental technology behind cryptocurrencies and cryptography, from the basics of encryption to ciphers. Cryptography — Putting the Crypto Into CurrencyLevel UpNEWIndividualsBusinessesDevelopersDiscoverCompanyUNIVERSITYBlockchain6 Jan 2022|ADVANCED|10 MIN READCryptography — Putting the Crypto Into CurrencyThis article explores the fundamental technology behind cryptocurrencies and cryptography, from the basics of e…
Learn MoreWhat Is a Crypto Hardware Wallet and How Does It Work? Hardware wallets are one of the most secure methods for storing crypto. Here we break down what they are, how they work, and if you need one. What Is a Crypto Hardware Wallet and How Does It Work?Level UpNEWIndividualsBusinessesDevelopersDiscoverCompanyUNIVERSITYTrending17 Jun 2022|BEGINNERS|4.5 MIN READWhat Is a Crypto Hardware Wallet and How Does It Work?Hardware wallets are one of the most secure methods for storing crypto. Here we break …
Learn MoreSoftware Wallet A succinct definition of Software Wallet Software WalletLevel UpNEWIndividualsBusinessesDevelopersDiscoverCompanyGLOSSARYSOFTWARE WALLETCopy linkShare on TwitterShare on FacebookShare on LinkedinSoftware WalletA type of hot wallet, software cryptocurrency wallets exist solely as software files on a computer or mobile device. In most cases, software wallets are more accessible and convenient for users to send, receive, and store cryptocurrency compared to hardware wallets. Dependi…
Learn MoreHot Wallet A succinct definition of Hot Wallet Hot WalletLevel UpNEWIndividualsBusinessesDevelopersDiscoverCompanyGLOSSARYHOT WALLETCopy linkShare on TwitterShare on FacebookShare on LinkedinHot WalletHot wallets are connected to the internet, meaning that funds stored in hot wallets are more accessible. However, because of this connection, they are also susceptible to malicious attacks. Examples of hot wallets include web-based wallets, mobile wallets, and desktop wallets. Hot wallets work as …
Learn MoreERC-884 A succinct definition of ERC-884 ERC-884Level UpNEWIndividualsBusinessesDevelopersDiscoverCompanyGLOSSARYERC-884Copy linkShare on TwitterShare on FacebookShare on LinkedinERC-884Short for Ethereum Request for Comment, ERC provides application-level standards for the Ethereum blockchain. ERC-884 allows companies specifically registered in Delaware, which can conduct business in any state, to utilise blockchain technology. This enables them to create ERC-20 tokens, which can represent a nu…
Learn More