Starcoinz logo

"private keys"

Search our executive blockchain insights and services.

token standard

Crypto.com Glossary: Your Guide to Key Terms and Jargon in Blockchain and Cryptocurrency

★★★★

…Crypto.com Glossary: Your Guide to Key Terms and Jargon in Blockchain and CryptocurrencyLevel UpNEWIndividualsBusinessesDevelopersDiscoverCompanyCrypto GlossaryLearn all of the most important blockchain and cryptocurrency terms and jargon here.Trending TermsSolana Program LibraryThe Solana Program Library (SPL) is a collection of ready-to-use, open-source components for building decentralised applications (dapps) on the Solana blockchain.HODLerA ‘HODLer’ is someone who holds onto their digit…

Learn More
your account

What Are Passkeys and How to Use Them With Your Crypto.com Account

★★★★

…In the WebAuthn context, credentials are cryptographic private keys — in other words, the actual secrets that make Passkeys secure. Just like with cryptocurrency wallets, each private key has a matching public key that resides on the server and will be used to check signatures created with the private key.  Each passkey is unique and bound to a username and a website or app, meaning a user will have at least as many Passkeys as they have accounts; and, in most cases, even more, as most users …

Learn More
public key

How Do Bitcoin Transactions Work?

★★★★

…The public key allows anyone to verify that a message signed with the private key is valid. Submitting a Payment Alice’s wallet holds the private keys to each of her addresses. She tells her Bitcoin client that she’d like to transfer BTC to Bob’s address. The Bitcoin client then signs her transaction request with the private key of the address she is transferring bitcoins from. Anyone on the network can now use the public key to verify that the transaction request is actually coming from t…

Learn More
bitcoin wallet

Bitcoin Wallets: A Comprehensive Guide to How They Work

★★★★

…A popular and secure software wallet is the Crypto.com DeFi Wallet. Learn more about the different types of cryptocurrency wallets here. Hardware wallets (cold wallets) Considered the most secure option, hardware wallets store a user’s private keys offline on a physical device, offering protection against malware and hacking attempts compared to hot wallets. As these devices keep a user’s Bitcoin offline, they are considered ‘cold wallets’. Popular cold wallets include Trezor, Ledger, an…

Learn More
products services

Multi-Signature Authentication

★★★★

…Multi-Signature Authentication A succinct definition of Multi-Signature Authentication Multi-Signature AuthenticationLevel UpNEWIndividualsBusinessesDevelopersDiscoverCompanyGLOSSARYMULTI-SIGNATURE AUTHENTICATIONCopy linkShare on TwitterShare on FacebookShare on LinkedinMulti-Signature AuthenticationMulti-signature authentication (often referred to as multisig in cryptocurrency and blockchain) is a security feature that requires multiple private keys to authorise a transaction. Instead of relyin…

Learn More
products services

Cryptography

★★★★

…Any changes to the original data automatically result in a new hash, rendering it an invalid transaction on the blockchain.Key TakeawayCryptography is keeping information secure from malicious actors by transforming an original text into something only the intended reader can understand.Related WordsSolana Program LibraryThe Solana Program Library (SPL) is a collection of ready-to-use, open-source components for building decentralised applications (dapps) on the Solana blockchain.HODLerA ‘HODL…

Learn More
your account

What Are Passkeys and How to Use Them With Your Crypto.com Account

★★★★

…In the WebAuthn context, credentials are cryptographic private keys — in other words, the actual secrets that make Passkeys secure. Just like with cryptocurrency wallets, each private key has a matching public key that resides on the server and will be used to check signatures created with the private key.  Each passkey is unique and bound to a username and a website or app, meaning a user will have at least as many Passkeys as they have accounts; and, in most cases, even more, as most users …

Learn More
private keys

Hardware Wallet

★★★★

…Hardware Wallet A succinct definition of Hardware Wallet Hardware WalletLevel UpNEWIndividualsBusinessesDevelopersDiscoverCompanyGLOSSARYHARDWARE WALLETCopy linkShare on TwitterShare on FacebookShare on LinkedinHardware WalletA hardware wallet is an offline physical cryptocurrency wallet that heavily emphasises the security of private keys. Hardware-based cold storage is generally considered more secure than software-based hot wallets because it keeps the private keys of a digital wallet complet…

Learn More
airdrop scams

What Are Crypto Airdrop Scams and How to Avoid Them

★★★★

…Here’s how to spot phishing airdrops and protect your assets from scammers. Key Takeaways: Airdrop scams are fraudulent schemes designed to steal personal information, private keys, or funds by exploiting the allure of free cryptocurrency tokens. Be aware of the various types of airdrop scams, including phishing scams, fake airdrops, malware airdrops, and impersonation scams. To avoid falling victim to airdrop scams, always verify the authenticity of airdrops, avoid sharing private keys, rese…

Learn More
airdrop scams

What Are Crypto Airdrop Scams and How to Avoid Them

★★★★

…Here’s how to spot phishing airdrops and protect your assets from scammers. Key Takeaways: Airdrop scams are fraudulent schemes designed to steal personal information, private keys, or funds by exploiting the allure of free cryptocurrency tokens. Be aware of the various types of airdrop scams, including phishing scams, fake airdrops, malware airdrops, and impersonation scams. To avoid falling victim to airdrop scams, always verify the authenticity of airdrops, avoid sharing private keys, rese…

Learn More