Exchange
DEX
Buy crypto
Express buy
Visa, Mastercard, and others
P2P trading
Buy/Sell with zero trading fees via 100+ payment methods
Discover
Markets
View the latest crypto prices, volume, and data
Opportunities
Discover hot and new crypto
Trade
Trading instruments
Convert
Quick conversion, zero trading fees, no slippage
Spot
Buy and sell crypto with ease
Futures
Trade perpetual and expiry futures with leverage
Options
Capitalize on market volatility with options
Pre-market Futures
Get early access and trade upcoming crypto
Powerful tools
Trading bots
Multiple strategies to help you trade with ease
Marketplace
Create a bot
Liquid Marketplace
Deep liquidity on expiry spreads, custom multi-leg strategies, and block trades
Nitro Spreads
RFQ
Grow
Earn
Don’t just HODL. Earn
Simple Earn
On-chain Earn
Structured Products
Loan
Borrow to earn, borrow to spend
Jumpstart
Discover new, high-quality projects around the world
Build
X Layer network
Explore
Enter the world of Web3
X Layer
Ignite your creativity
Mainnet explorer
Explore mainnet on-chain data
Testnet explorer
Explore testnet on-chain data
X Layer ecosystem
Explore DApps on X Layer
Developers
Expand without limits
Developer docs
Explore our protocol documents
Testnet faucet
Get OKB on testnet
Testnet bridge
X Layer testnet bridge
Oracle
Get price data
GitHub
Explore X Layer repositories
Official DApps
Infrastructure products
Bridge
Connect Ethereum and X Layer
Institutional
Institutional home
The world’s most powerful suite of crypto trading solutions
Liquid Marketplace
OTC liquidity network for pro and institutional traders
APIs
Seamless and ultra-low latency API connectivity
VIP Loan
Improve capital efficiency
Broker Program
Access world-class market depth with high commissions
Managed Trading Sub-accounts
Manage sub-accounts, trade easily and safely with more profits
Historical market data
Candlesticks, aggregate trades, order book data and more
Institutional Insights
Our latest institutional trading research, news, and more
Learn
More
Products
OKB
Security of funds
Status
Proof of Reserves
Others
Campaign center
My rewards
Referral
Affiliates
OKX Ventures
Trade on TradingView
Listing application
Log in
Sign up
Support
Support center
My tickets
Connect with OKX
This page is for information purposes only. Certain services and features may not be available in your jurisdiction.
Learn
Security
Trading tools
Trading guide
DeFi
Trading basics
Security
Derivatives
Ventures
Layer2
OKX
DAO
Bitcoin
Ethereum
NFT
Research
Blockchain
Taxes
Farming
Web3
Trading
Industry news
Strategies
Stablecoins
Altcoin
Institutional news
Security (63)
Understand the best practices and technologies for securing crypto assets.
Security
What are crypto recovery scams?
For most crypto traders, there are few worse scenarios than having your wallet hacked, losing access to your wallet, or having your digital assets stolen. When it happens, many reach out to communities on X, Reddit, or Telegram, asking for support. Although this may seem like a wise first move, it does leave traders vulnerable to crypto recovery scams. Here, the scammer preys on those requesting help by falsely claiming that they can help recover the assets. However, the opposite is true, as the scammer lures victims in to steal funds before disappearing.
Dec 9, 2024
Beginners
Mining
Security
What is a nonce in crypto?
Put simply, a nonce in crypto is a number that’s used once in a very specific way within the blockchain. Think of it as a unique one-time code that plays a key role in adding new data to the blockchain.In most blockchain networks, including Bitcoin, the nonce helps solve the complex puzzle that allows new blocks to be created. But here’s the thing — you don’t need to be a math whiz or a tech expert to grasp the basics. The nonce is part of how blockchain stays secure, making sure that all the transactions are valid and the network operates smoothly.
Dec 9, 2024
Intermediate
Security
The major crypto investment and withdrawal scams you need to know about
While the crypto industry offers groundbreaking opportunities for growth and innovation, it also attracts its share of fraudulent activities . Investment scams in crypto often come dressed as tantalizing opportunities, promising high returns with minimal risks. They can range from sophisticated Ponzi schemes to deceptive ICOs (initial coin offerings), luring investors into traps set by cunning fraudsters.
Dec 9, 2024
Beginners
Bitcoin
Security
What is Proof of Work: the consensus mechanism powering Bitcoin
One of the most important parts of the Bitcoin machine is Proof of Work (PoW) — a consensus mechanism that gives the decentralized ledger robust security.The concept of PoW first emerged with the arrival of Hashcash in 1993. Hashcash's creators, Moni Naor and Cynthia Dwork, devised a form of PoW to stop denial-of-service attacks and other abuses like spam. Doing so required some work from the person requesting the service, usually involving a computer’s processing time.
Nov 28, 2024
Beginners
Security
What rug pull scams are and how to avoid them
In November 2024, a 12-year old trader made headlines after attempting a crypto rug pull on a memecoin he created, called Gen Z Quant (QUANT), during a live stream. The trader launched QUANT on the popular Solana-based platform . The token quickly gained traction as its price surged. During a live stream, the trader expressed surprise at the growth before dumping his holdings — 51 million QUANT tokens — for 128 Solana (SOL), equivalent to $30,000.Despite his attempts to exit the market, the crypto community rallied behind the token, pushing its price up by an astonishing 77,000%. QUANT briefly reached a market cap of $82.3 million, peaking at $0.08 before retracing to $50 million. Ironically, the trader’s holdings would have been worth $4 million had he not sold them prematurely.
Nov 22, 2024
Beginners
Privacy
Security
What is a blockchain node: the technology powering decentralized networks
What makes blockchain networks secure and decentralized? Blockchain nodes are the answer. The technology validates transactions, stores the blockchain, and keeps the network running. Whether you’re new to blockchain or looking to deepen your understanding, grasping what a node does and why it’s vital is the first step to understanding how decentralized networks operate.
Nov 22, 2024
Security
What crypto remittance scams are and how to avoid them
Crypto remittance scams are a growing concern in the crypto space. These scams deceive individuals into sending crypto or fiat money, with the false promise of receiving a larger sum in return. Like , remittance scams exploit vulnerabilities, using false promises and emotional manipulation. This article outlines what crypto remittance scams are and offers guidance on how to protect yourself.
Oct 17, 2024
Beginners
Security
Is your crypto side hustle a scam? Identifying part-time job crypto scams
How does a part-time job in the world of crypto sound to you? To many, it's an exciting opportunity to be involved in a technology that's positively disrupting industries. The crypto sector can be thrilling, especially for those passionate about new technology and digital assets who want to merge their interests with a career.
Oct 17, 2024
Beginners
Security
How to protect your crypto from phishing attacks
As the fascination with blockchain technology and digital assets grows, so too does the threat of cyber attacks. Among these threats, phishing scams have become a considerable challenge for crypto natives.
Oct 17, 2024
Beginners
Security
What crypto romance scams are and how to avoid them
Romance scams have been around for some time, and now often use crypto as their means of defrauding victims. This is a form of confidence trick that involves a scammer faking romantic intentions with the victim. The aim is to create an emotionally intimate relationship to persuade the victim to hand over their money, digital assets, or personal information.
Oct 17, 2024
Beginners
Security
What pig butchering scams are and how to avoid them
Pig butchering scams, which are a relatively new form of fraud in crypto , involve bad actors using the false illusion of romance or friendship to financially defraud their victims. This scam is typically built over a long period, and involves earning trust with the victim to encourage them to deposit their funds in a seemingly legitimate opportunity — before the fraudster disappears.
Oct 17, 2024
Beginners
Security
Coin mixer: What is it and how does it work?
A coin mixer, also known as a Bitcoin mixer or a cryptocurrency tumbler, is a tool that allows users to mix their cryptocurrency funds with those of other users to obscure the source and destination o
Oct 3, 2024
Security
51% Attack: What Is It and How Does It Work?
While blockchain technology is generally deemed safer than most traditional systems, it still has its risks. One of the biggest threats to the integrity of blockchain is the 51% attack, also known as
Sep 24, 2024
Bitcoin
Security
What is Babylon: scaling Bitcoin for secure Proof of Stake
Blockchain security has always been a balancing act, especially for Proof of Stake (PoS) networks that, while energy-efficient, can face unique vulnerabilities. Babylon, the Bitcoin staking project, offers the best of both worlds, bringing Bitcoin’s security and trust into the PoS ecosystem. By using Bitcoin’s strengths, Babylon helps to improve security and address common weaknesses found in PoS chains.
Sep 5, 2024
Intermediate
Security
What are SIM swap attacks: how to protect your crypto from SIM hijacking
SIM swap attacks are a growing threat in the cryptocurrency world, where attackers hijack phone numbers to gain unauthorized access to users' crypto accounts. What are SIM swap attacks exactly, and how can you prevent them? Read on to find out.
Sep 2, 2024
Security
TRON wallet multisignature scams: what they are and how to avoid them
As blockchain technology becomes more widespread, the security of digital assets is increasingly critical. Towards this end, the multisignature (multisig) mechanism is a security measure that's gaining attention and adoption among users. Through this system, a wallet can be controlled by multiple users, requiring several signatures to complete a transaction. This can be compared to a safe that needs multiple keys to open — only when all keyholders cooperate can the safe be accessed.
Sep 2, 2024
Intermediate
Security
What are the best 2FA methods to protect your crypto assets?
There's no such thing as too much security when the aim is to keep your crypto assets safe. One of the most effective tools towards this aim is two-factor authentication (2FA). 2FA greatly reduces the risk of unauthorized access to your by adding an extra layer of protection. It's an essential feature for crypto beginners to understand as they navigate the technical world of trading, and one more experienced traders would be wise to revisit to help keep their assets secure.
Aug 6, 2024
Beginners
Security
What Is censorship resistance?
Censorship resistance is a concept that is becoming increasingly important in today's world, where the internet and other communication technologies are essential for social, political and economic in
Apr 25, 2024
Beginners
Security
Is a paper wallet right for you? The pros and cons of using a paper wallet
When it comes to safely storing your crypto, it’s widely recommended to withdraw your coins from an exchange and store them in a personal wallet, as the crypto industry has a saying — not your keys, not your coins. When it comes to choosing the type of wallet you wish to store your crypto in, there's a wide selection, such as hot wallets or cold storage — which are also known as offline storage wallets.
May 29, 2024
Beginners
DApps
Security
What is Internet Computer (ICP)? Understanding the decentralized cloud computing protocol
What would happen if technology could transform the public web into a decentralized platform? The Internet Computer (ICP) provides a glimpse at what might be possible, being a cloudless environment that offers another way to deploy decentralized applications (DApps).
Apr 25, 2024
Security
What role do UTXO and PSBT play in inscription trading?
An unspent transaction output (UTXO) is a vital component of blockchain transactions, especially in Bitcoin . UTXOs are a user's remaining digital assets following a transaction — similar to receiving change in physical cash transactions.
Apr 25, 2024
Intermediate
Bitcoin
Security
Your keys, your coins: celebrating Proof of Keys Day
The importance and responsibility of owning your cryptocurrency shouldn't be underestimated. It's like being your own bank. And holding your keys isn't just a technicality — it's a fundamental aspect of true asset control.
Apr 25, 2024
Beginners
Security
Artificial intelligence
Proof of Humanity: Decentralized identity in age of AI replication
Artificial Intelligence (AI) surrounds us today, whether we realize it or not. It takes the form of Large Language Models such as ChatGPT, your smartphone’s facial recognition function, website chatbo
Apr 25, 2024
OKX
Security
How we use AI to fight fraud and bad actors
As the digital world expands, scammers and fraudsters constantly find new ways to exploit unsuspecting victims. At OKX, we know we must stay ahead of the curve for security and to protect our users. T
Apr 25, 2024
1
2
3
Sign up
to OKX