Security (39)
Understand the best practices and technologies for securing crypto assets.

Bitcoin
Security
Your keys, your coins: celebrating Proof of Keys Day
The importance and responsibility of owning your cryptocurrency shouldn't be underestimated. It's like being your own bank. And holding your keys isn't just a technicality — it's a fundamental aspect of true asset control.
Apr 25, 2024
Beginners
2

Security
Is a paper wallet right for you? The pros and cons of using a paper wallet
When it comes to safely storing your crypto, it’s widely recommended to withdraw your coins from an exchange and store them in a personal wallet, as the crypto industry has a saying — not your keys, not your coins. When it comes to choosing the type of wallet you wish to store your crypto in, there's a wide selection, such as hot wallets or cold storage — which are also known as offline storage wallets.
Jan 8, 2025
Beginners
22

Security
What are SIM swap attacks: how to protect your crypto from SIM hijacking
SIM swap attacks are a growing threat in the cryptocurrency world, where attackers hijack phone numbers to gain unauthorized access to users' crypto accounts. What are SIM swap attacks exactly, and how can you prevent them? Read on to find out.
Apr 21, 2025
35

Security
Artificial intelligence
Proof of Humanity: Decentralized identity in age of AI replication
Artificial Intelligence (AI) surrounds us today, whether we realize it or not. It takes the form of Large Language Models such as ChatGPT, your smartphone’s facial recognition function, website chatbo
Apr 21, 2025
1

Security
Proof of Reserves
What's the difference between an exchange's Proof of Reserves and a token's Proof of Reserves?
You should be hearing more and more about Proof of Reserves but can you explain the difference between a token’s Proof of Reserves and an exchange’s Proof of Reserves? Here’s our quick recap, in simpl
Apr 25, 2024
1

DApps
Security
What is Internet Computer (ICP)? Understanding the decentralized cloud computing protocol
What would happen if technology could transform the public web into a decentralized platform? The Internet Computer (ICP) provides a glimpse at what might be possible, being a cloudless environment that offers another way to deploy decentralized applications (DApps).
Apr 25, 2024
1

Privacy
Security
What is a blockchain node: the technology powering decentralized networks
What makes blockchain networks secure and decentralized? Blockchain nodes are the answer. The technology validates transactions, stores the blockchain, and keeps the network running. Whether you’re new to blockchain or looking to deepen your understanding, grasping what a node does and why it’s vital is the first step to understanding how decentralized networks operate.
Nov 22, 2024
9

Bitcoin
Security
What is Proof of Work: the consensus mechanism powering Bitcoin
One of the most important parts of the Bitcoin machine is Proof of Work (PoW) — a consensus mechanism that gives the decentralized ledger robust security.The concept of PoW first emerged with the arrival of Hashcash in 1993. Hashcash's creators, Moni Naor and Cynthia Dwork, devised a form of PoW to stop denial-of-service attacks and other abuses like spam. Doing so required some work from the person requesting the service, usually involving a computer’s processing time.
Nov 28, 2024
Beginners
5

Mining
Security
What is a nonce in crypto?
Put simply, a nonce in crypto is a number that’s used once in a very specific way within the blockchain. Think of it as a unique one-time code that plays a key role in adding new data to the blockchain.In most blockchain networks, including Bitcoin, the nonce helps solve the complex puzzle that allows new blocks to be created. But here’s the thing — you don’t need to be a math whiz or a tech expert to grasp the basics. The nonce is part of how blockchain stays secure, making sure that all the transactions are valid and the network operates smoothly.
Dec 9, 2024
Intermediate

Security
TRON wallet multisignature scams: what they are and how to avoid them
As blockchain technology becomes more widespread, the security of digital assets is increasingly critical. Towards this end, the multisignature (multisig) mechanism is a security measure that's gaining attention and adoption among users. Through this system, a wallet can be controlled by multiple users, requiring several signatures to complete a transaction. This can be compared to a safe that needs multiple keys to open — only when all keyholders cooperate can the safe be accessed.
Sep 2, 2024
Intermediate
54

Security
Proof of Reserves
What are Zero Knowledge Proofs and how can they improve Proof of Reserves?
Publishing transparent and frequent Proofs of Reserves (PoR) is crucial for centralized exchanges who want to prove their solvency. OKX uses [Merkle tree verification](/learn/merkle-trees) to prove th
Jan 2, 2025
1

Security
What are the best 2FA methods to protect your crypto assets?
There's no such thing as too much security when the aim is to keep your crypto assets safe. One of the most effective tools towards this aim is two-factor authentication (2FA). 2FA greatly reduces the risk of unauthorized access to your by adding an extra layer of protection. It's an essential feature for crypto beginners to understand as they navigate the technical world of trading, and one more experienced traders would be wise to revisit to help keep their assets secure.
Apr 21, 2025
Beginners
688

Security
Wallets
Self-custody
What is cryptocurrency custody: choosing the right crypto storage option
It's tough to overestimate how disruptive cryptoassets have been to the traditional financial system. The industry provides a compelling alternative, as it aims to create a fairer and more equitable system for all. At the same time, the ripples of this disruption have reached security and ownership, guided by crypto's core concept of decentralization.
Apr 28, 2025
Beginners
6

Web3
Security
What is a Web3 wallet? How do custodial vs non-custodial wallets work?
As the world of cryptocurrencies continues to evolve, understanding the different types of wallets available is crucial for secure and convenient management of digital assets. TL;DR Explore the concept of Web3 wallets
Apr 24, 2025
2