| || |https://preview.redd.it/6in97egosnx31.png?width=800&format=png&auto=webp&s=d2e4d1b052b295cb3da49f604fab7a6113321210 submitted by reslavr to u/reslavr [link] [comments]
I wrote this lecture on the methodology of successful trading
, and more specifically on tactics, strategies, subtleties and recommendations, based on 2 years of work on Bitmex, Binance, Gate, Okex bitcoin cryptocurrency exchange
s in real combat conditions. Guided by this technique, I managed to earn 500% in excess of the deposit for 7 days of trading
(i.e. I increased the deposit amount by 5 times!). These are not fairy tales, but reality
, that is, confirming statistics of exchange transactions on the account of the crypto-exchange.
I believe that the knowledge provided in this course will help a beginner to master successful trading only if the course is not only read, but also outlined. It will be important to follow punctually, commenting on your actions in your notes.
In separate consultations, I could give personal instructions
on the nuances of technical analysis
on various timeframes, signals on entry points, information on trade automation software (algorithmic trading robots), and other tools useful in the work of a trader. But, despite a lot of additional software, my experience has shown that the most effective speculation model on the cryptocurrency and stock exchange
, which everyone chooses for themselves based on practical experience, is directly in the online trading mode on exchange terminals. Each exchange is good in its own way, but also has its drawbacks. I chose the best solution for myself and am sure that this is temporary. Perhaps in the future there will be more progressive decentralized exchanges with good liquidity and they will replace the existing platforms managed by market leaders.
Various digital designations, such as: — in what percentage of the deposit do you enter into a particular transaction; — where to put stop limit or market (Market) (market) orders (and whether to place them at all), where to exit the transaction and how. Again, I note that all the selected values are usually individual and depend both on the time trading intervals
(TimeFrame) (1m 3m 15m 1h 3h 4h 6h 1 d 1w 1m) and on the deductible amount of the bet in % percentage of the amount of your deposit.
It is important to remember that trading in the cryptocurrency market
is a high-risk investment activity that everyone chooses and carries out at their own risk. Remember that with a big bet on the whole, as they say, a patty, and even with 100x-500x leverage, you risk losing your entire deposit right away. An exchange machine or a well-tuned and trained professional broker
robot does not cost anything to go against the trend with a tidbit — easy prey. Do not be hamsters i.e. naive simpletons
— do not merge the deposit into zero due to elementary greed, incontinence, ardor and other factors that contradict the qualities that a professional trader needs to succeed in trading, namely: cold-bloodedness, endurance, accuracy, punctuality, tact, quick reaction , the ability to quickly enter numbers and timely press the desired buttons.
You ask me: “Hey … guy, you are so smart … I wonder how much you earned from trading or how much you earn or why you don’t do it yourself … why do you need competitors?” — I will answer you: it is no secret that AI (artificial intelligence) has been working on the exchange for a long time and it is constantly improving, but this still does not prevent a person from continuing to beat him. I hope that in the future this trend will not stop otherwise — we have disappeared. And as regards competition — do not worry so much for me, because there is still a trading idea, program or terminal that I have not yet implemented and not reported in this guide after its publication and, perhaps, it will not deprive me of future trading opportunities.
So, the instructions that I follow in the process of trading cryptocurrencies on the exchange terminal in online mode
- It is necessary to wait for the moment of the entry point. You need to enter the deal only then, you feel it and foreseen it in advance according to the levels of the daily period.
- It is necessary to carefully weigh their capabilities, ie to consider funds, understanding that futures trading (with leverage) leads to greater risks of liquidation / margin call (MarginCall).
- During growth, you need to fix profit and try to sell at a pullback. It is always possible to re-enter a deal, but it is unlikely to return lost profits, instead, you can get several hours of dead weight in the price movement opposite from the planned direction.
- It is very important to have cost control, namely, the timely Stop Limit (stop trade order) + sliding Stop Loss (the same thing, only with insurance against a sharp price movement).
- It is easy to understand the wave component and accept the movement by levels — press exit buttons in time at 2% and + 10% according to the 1 to 5 principle (we risk one part of the deposit against 5). The Pareto effect has not been canceled: 20% activity, gives 80% effectiveness.
- To work with Japanese candles, the ability to draw support levels and resistance lines is enough, but this is not enough for a professional, because the presence of modern advanced indicators, such as MACD, SRSI, Ichimoku Cloud / Signal, horizontal and vertical volume indicator and so on, is very important. Everyone chooses for themselves the indicator that brings more profit to a certain trading range. But remember — the main criterion for success is an understanding of the laws of the market and trade by market. Perhaps this applies to the field of extrasensory perception, metaphysics, and other obscure and hard to prove phenomena and sciences, but one way or another — intuition is clear and has a place to be.
- In no case should you enter into short-term breakthrough deals on minute trading with market uncertainty. The situation where minute fluctuations may seem like reversal movements is often quite misleading. If you are in a pose (bull — for growth / long or bear — for fall / short) do not retreat and the market will not slow you to please you with profit. Often, a stock price feed / the same chart manipulates the minds of players, displaying false breakdowns and minute movements, on the basis of which you can not rely on a trend change (this lie is especially evident in minute time intervals / timeframes). In such cases, make decisions only at fundamental levels. On the hourly chart you will see a more truthful picture, because globally, on markets other than minute timeframes, the market is less susceptible to momentary manipulations. This knowledge will give you firmness in the intention and decision-making to remain in the chosen position and not to respond to minor market manipulations. During the day, you may repeatedly wish to unreasonably enter into such transactions, but remember that in this case you will be guaranteed to drain the deposit. Remember — the market from the middle of the trend will go up up or down and hit the stop limit order placed by you (if you play with a large leverage not for your money), after which it will go in the right direction you have chosen. Although in general the situation is banal — you are led by the nose like thousands as well as you. The only true method is to use common sense and avoid uncertainty when trying to enter a pose. A historical analysis of prices, the frequency of ranges (delta) of ups and downs, the degree of volatility and fundamental approaches — to help you. I also want to add that success is in your hands and it consists in the realization of the need not to merge a deposit under any circumstances.
- You cannot leave the market unattended, the alarm of the price change alarm is not in your favor or without a stop limit at a reliable exchange platform (broker).
- Once again I repeat, you must be prepared in advance for the fact that the market is deceiving and unexpected movements can often occur and your task is to secure your funds with a stop on the market or to fix profit by a floating stop or a fixed stop limit.
- Risk management — the basis of success in trading when trading with leverage (margin trading). It is usually recommended to go into a deal at 2% of the deposit with x leverage and stop from profit in the ratio of 1 to 5. What does this mean and why is this risk / profit sharing technique so important?It is necessary to clearly calculate probabilistic lumbago in order to avoid elimination. I recommend you not to rush into bets, but to take a sheet of paper and bargain virtually in order to understand whether your calculations were correct. A virtual game is worth nothing, but it will save you money and keep the deposit safe and sound.
- The wave theory assumes entry into the transaction after completion and a clear change in the previous trend based on signals and the news background, incl. experience of the current subject of trade — the operator pushing the buttons. For example, in the absence of price movement in the direction of the RSI indicator, analysis of all time frames with indicators, fibonacci levels, correction degree phase, time of day in time zones, stock and commodity market readings.
- It is important, before starting trading, test the presence of a manipulator on the market using the method of high rates. If you are looking for an entry into a major deal in a few weeks, keep in mind that a stop with a loss can be a significant amount in the money equivalent that you are ready to lose, and if the deal does not take place in your favor, you must set yourself up in advance for what it should be. Because a successful trader is not one who regularly guesses successful transactions, but one who successfully completes one out of five transactions according to risk management and the calculation of the leverage calculator in accordance with the chosen strategy.
- A lost position can be closed without waiting for the reverse restoration of the bidding process, thus manually participating in the balance adjustment or by setting a stop limit order in advance or after the bid in case of further decline or growth.
- There is an assumption that at the end of the working day, with a likely depreciation, traders convert stocks into fiat (money), which contributes to a depreciation, but this is not accurate)
- Incorrect entry into the transaction. How important is it to exit an unsuccessful transaction as early as possible or at the first rollback to change the direction of the trend or wait to determine a new entry point.
- The presence of two accounts on the exchange terminal is possibleand desirable in order to be able to remain in a winning position regardless of the success of the initially selected trading direction (a technique requiring careful verification by personal experience with a clear definition of the margin leverage and % of the entry into the transaction from the deposit balance to minimize the risk of loss).Successful trading does not consist in the ability to conclude as many successful trades as possible, but in minimizing losses.
- Technology is improving and strategies are changing. Before entering a transaction, it is necessary to carefully analyze the current market situation using a comparative analysis, studying the general news background (guided by the ***“buy for expectations — sell on the news”***postulate), detecting a flat (sideways), determining the level of instrument volatility (gold, oil, funds , bitcoins / cryptocurrencies — digital coins, etc.)
- Immediately put a stop — is a guarantee of success or a drain of the deposit? After all, how to cope with their own feelings and not get into anxiety about a successful or unsuccessful transaction? The gradual entry scheme works well.
- Coins. We look at the trading delta with the help of a robot scanner and make a decision based on all the above criteria in the course. It has been noticed that amateurs buy coins in the hope of growth. Remember, the market for altcoins is not growing now.
- A favorable time for earning is at the time of a flat, which usually occurs after the rising flag or the implementation of a bull pennant figure, etc. It will be more clear to observe the schedule in real mode and make the required notes in your own mind.
- On the cryptocurrency market, some laptop microprocessors are heated and the fan turns on at peak times. This indicates the beginning of a sharp movement and is a signal to enter the deal. Therefore, you can not only observe the behavior of the market, but now also listen (this is my personal note, it is unlikely that you will find such information somewhere else, as they say — an exclusive / VIP signal;)).
- You can still write a lot about time, how much can or should be spent on the monitor, on which timeframes to trade and which strategies to follow, but everyone should choose this independently and preferably, under the guidance of a specialist, because what is applicable to one is to the other — contraindicated.
In fact, any market situation should be beneficial for you due to successful risk management*!*For successful online trading, it is very important to use candlestick and technical analysis*, which help to more accurately determine the entry point to the transaction (purchase or sale).*You cannot act at random when the market is hard to predict and often ready to follow your footsteps.If you lose, then I do not recommend immediately going to recoup*, because trade should ultimately be break even. In ardor, you are likely to enter into an unsuccessful deal and lose even more than before. This situation will make you very sad, so do not make this mistake. She is famous.*Use a modern powerful laptop or desktop computer with a convenient side numeric keypad, a large screen and a convenient manipulator (mouse) so that when you press the buttons you have as little physical braking and stops as possible. Practice in advance to work in the browser on the exchange terminal without making a deposit on futures trading from the exchange wallet. This training practice will reduce your losses.
Hello from Ukraine, Kramatorsk city ( “War is peace
/ freedom is slavery [and] ignorance is strength.”)
Reslav Cryptotrader (if you need find me look around — me be i near ;).
To be continued… http://twitter.com/reslav1
Nowadays, money strives to be counted more and more. Using the information technology of databases with indexes
, it has become possible to automatically and instantly capture and display the information that was previously collected by entire departments of the state within a month and after manual entry was displayed on the screens of industrial monitors and public television. The era of the Internet has come, the time of the accessibility and decentralization of information.
Today we see stock chart quotes of stock prices of leading world companies online. Everyone has the opportunity to invest their money in these stocks and earn on the difference in exchange rates
of their value. A speculative market was formed on this basis, where leaders appeared who were able to act most efficiently and, accordingly, earn money. Many specialists are studying the nature of success in speculative markets
Many works on methods of achieving success in trading are morally obsolete due to the emergence of new technologies for calculating and controlling the money supply,
for example, such as Bitcoin. After all, back in 2009 for 1309.03 BTC they gave 1 dollar. Today 1 BTC costs $ 9,000. This is due to the fact that since the appearance of bitcoin has never been hacked and the technology has shown its reliability and consistency, as a measure of the money invested in it. I will not go into the details and subtleties of Bitcoin technology, but I will note one thing — this is cryptographic software that was used in the banking sector as Swift payments
, but transformed into a P2P peer-to-peer network of private computers, as a result, like Bittorent, it became public, hard controlled, commons
. Bitcoin provides for a complexity bomb, which complicates each year, and therefore makes it more expensive, its limited production, and this is one of the main reasons for its rise in price. As well as the fact that Bitcoin is convenient for storing funds, as it is liquid and it can be easily sent without quantity restrictions and with high transaction (transfer) speed
. All details about Bitcoin are available in open sources and you can find out everything about it on the Internet, as well as the alternative coin market (altcoins / coins), such as Ethereum, USDT (dollar tokens confirmed by a US company with real dollars in bank accounts) etc.
Around this market of bitcoin cryptocurrencies, the same speculative matrix (network / exchange) arose as around ordinary currencies and created such a strong competition for traditional assets that many governments adopted it and began to use and implement technologies that arose in their turn base. Cryptocurrencies or blockchain (cryptographic chain / blocks / chain) began to be introduced in public sectors of the economy for calculating and controlling public commons, such as electricity, land, etc.
Further, on the basis of this market, the need for regulation arose and the US authorities were very worried about the uncontrolled development of technology
, on the basis of which a news background (negative or positive)
arose, which powerfully affects cryptocurrency rates. In the era of information, this network began to act as a money pump, skillfully pumping money from the hands of inept speculators into the pockets of experienced traders.
As a result of reading a lot of books, watching various telecasts in the industry of bitcoin trading analytics, I came to the conclusion that successfully trading cryptocurrencies is akin to art
and as statistics have shown, only 20% in 2–3 years are able to consistently earn money, and of which, in turn, only 2 -3% become billionaires.
I bring to your attention a technique by which you can enter the ranks of these 20% successful traders and possibly, jointly, open the door to those notorious 2–3% successful traders who are fortunate enough to touch the notorious golden fleece and discover the world of unlimited financial opportunities.
All knowledge is available in open sources and collected by me in the book “Basics of Bitcoin Trading from Reslav” (2019), most of them are available.
Hello! My name is Inna Halahuz, I am a sales manager at Platinum, the largest listing service provider for the STO and ICO projects. We know all about the best and most useful STO and ICO marketing services.
By the way, we developed the best blockchain platform:
We also created the UBAI, the unique educational project with the best and most useful online courses. We not only share our knowledge but also help the best graduates to find a job! After finishing our courses you will know all about crypto securities, ICO and STO advertizing and best blockchain platforms.
What a Blockchain Wallet is? What is its purpose?
Find the answer after reading this article.
The public key is the digital code you give to someone that wants to transfer ownership of a unit of cryptocurrency to you; and a private key is what you need to be able to unlock your own wallet to transfer a unit of a cryptocurrency to someone else. The encoding of information within a wallet is done by the private and public keys. That is the main component of the encryption that maintains the security of the wallet. Both keys function in simultaneous encryption systems called symmetric and asymmetric encryption. The former, alternatively known as private key encryption, makes use of the same key for encryption and decryption. The latter, asymmetric encryption, utilizes two keys, the public and private key, wherein a message-sender encrypts the message with the public key, and the recipient decodes it with their private key. The public key uses asymmetric algorithms that convert messages into an unreadable format. A person who possesses a public key can encrypt the message for a specific receiver.
Methods of wallet access vary depending on the type of wallet being used. Various types of currency wallets on an exchange will normally be accessed via the exchange’s entrance portal, normally involving a combination of a username/password and optionally, 2FA (Two factor authentication, which we explain in more detail later). Whereas hardware wallets need to be connected to an internet enabled device, and then have a pin code entered manually by the user in possession of the hardware wallet in order for access to be gained. Phone wallets are accessed through the device on which the wallet application has been downloaded. Ordinarily, a passcode and/or security pattern must be entered before entry is granted, in addition to 2FA for withdrawals.
Satoshi Nakamoto built the Satoshi client which evolved into Bitcoin in 2009. This software allowed users to create wallets and send money to other addresses. However, it proved to be a nightmarish user experience, with many transactions being sent to incorrect addresses and private keys being lost. The MtGox (Magic the Gathering Online exchange, named after the original intended use of the exchange) incident, which will be covered in greater detail later, serves as a reminder of the dangers present in the cryptosphere regarding security, and the need to constantly upgrade your defenses against all potential hacks. The resulting loss of 850k BTC is a still unresolved problem, weighing heavily on the victims and the markets at large. This caused a huge push for a constantly evolving and improving focus on security. Exchanges that developed later, and are thus considered more legitimate and secure, such as Gemini and Coinbase, put a much greater emphasis on vigilance as a direct result of the MtGox hacking incident. We also saw the evolution of wallet security into the physical realm with the creation of hardware wallets, most notable among them the Ledger and Trezor wallets.
Types of Wallets & Storage Methods
The simplest way to sift through the dozens of cryptocurrency storage methods available today, is to divide them up into digital and non-digital, software and hardware wallets. There are also less commonly used methods of storage of private keys, like paper wallets and brain wallets. We will examine them all at least briefly, because in the course of your interaction with cryptocurrencies and Blockchain technology, it is essential to master all the different types of hardware and software wallets. Another distinction must be made between hot wallets and cold wallets. A hot wallet is one that is connected to the internet, and a cold wallet is one that is not. Fun fact: The level below cold storage, deep cold storage has just recently been implemented by the Regal RA DMCC, a subsidiary of an internationally renowned gold trading company licensed in the Middle East. After having been granted a crypto trading license, Regal RA launched their “deep cold” storage solution for traders and investors, which offers the ability to store crypto assets in vaults deep below the Almas Tower in Dubai. This storage method is so secure that at no point is the vault connected to a network or the internet; meaning the owners of the assets can be sure that the private keys are known only to the rightful owners.
Lets take a quick look at specific features and functionality of varieties of crypto wallets. Software wallets: wallet applications installed on a laptop, desktop, phone or tablet. Web Wallets: A hot wallet by definition. Web Wallets are accessible through the web browser on your phone or computer. The most important feature to recognize about any kind of web wallet, is that the private keys are held and managed by a trusted third party. MyEtherWallet is the most commonly used non-exchange web wallet, but it can only be used to store Ethereum and ERC-20 tokens.
Though the avenue of access to MEW is through the web, it is not strictly speaking a web wallet, though this label will suffice for the time being. The MEW site gives you the ability to create a new wallet so you can store your ETH yourself. All the data is created and stored on your CPU rather than their servers. This makes MEW a hybrid kind of web wallet and desktop wallet. Exchange Wallets: A form of Web Wallet contained within an exchange. An exchange will hold a wallet for each individual variety of cryptocurrency you hold on that exchange. Desktop Wallets: A software program downloaded onto your computer or tablet hard drive that usually holds only one kind of cryptocurrency. The Nano Wallet (Formerly Raiwallet) and Neon wallet for storage of NEO and NEP-5 tokens are notable examples of desktop wallets Phone Wallets: These are apps downloaded onto a mobile phone that function in the same manner as a desktop wallet, but actually can hold many different kinds of cryptocurrency. The Eidoo Wallet for storing Ethereum and its associated tokens and Blockchain Wallet which currently is configured to hold BTC, ETH and Bitcoin Cash, are some of the most widely used examples.
Hardware wallets — LedgeTrezoAlternatives
Hardware wallets are basically physical pathways and keys to the unique location of your crypto assets on the Blockchain. These are thought to be more secure than any variety of web wallet because the private key is stored within your own hard wallet, an actual physical device. This forcibly removes the risk your online wallet, or your exchange counter party, might be hacked in the same manner as MtGox. In hardware wallet transactions, the wallet’s API creates the transaction when a user requests a payment. An API is a set of functions that facilitates the creation of applications that interact and access features or data of an operating system. The hardware then signs the transaction, and produces a public key, which is given to the network. This means the signing keys never leave the hardware wallet. The user must both enter a personal identification number and physically press buttons on the hardware wallet in order to gain access to their Blockchain wallet address through this method, and do the same to initiate transfers.
Possibly the safest form of cryptocurrency storage in terms of avoiding hacking, Paper Wallets are an offline form of crypto storage that is free to set up, and probably the most secure way for users, from beginners to experts, to hold on to their crypto assets. To say it simply, paper wallets are an offline cold storage method of storing cryptocurrency. This includes actually printing out your public and private keys on a piece of paper, which you then store and save in a secure place. The keys are printed in the form of QR codes which you can scan in the future for all your transactions. The reason why it is so safe is that it gives complete control to you, the user. You do not need to worry about the security or condition of a piece of hardware, nor do you have to worry about hackers on the net, or any other piece of malware. You just need to take care of one piece of paper!
Real World Historical Examples of Different Wallet Types
Web Wallet: Blockchain.info Brief mechanism & Security Blockchain.info is both a cryptocurrency wallet, supporting Bitcoin, Ethereum and Bitcoin cash, and also a block explorer service. The wallet service provided by blockchain.info has both a Web Wallet, and mobile phone application wallet, both of which involve signing up with an email address, and both have downloadable private keys. Two Factor Authentication is enabled for transfers from the web and mobile wallets, as well as email confirmation (as with most withdrawals from exchanges). Phone Wallet: Eidoo The Eidoo wallet is a multi-currency mobile phone app wallet for storage of Ethereum and ERC-20 tokens. The security level is the standard phone wallet level of email registration, confirmation, password login, and 2 factor authentication used in all transfers out. You may find small volumes of different varieties of cryptocurrencies randomly turning up in your Eidoo wallet address. Certain projects have deals with individual wallets to allow for “airdrops” to take place of a particular token into the wallet, without the consent of the wallet holder. There is no need to be alarmed, and the security of the wallet is not in any way compromised by these airdrops.
The NEON wallet sets the standard for web wallets in terms of security and user-friendly functionality. This wallet is only designed for storing NEO, Gas, and NEP-5 tokens (Ontology, Deep Brain Chain, RPX etc.). As with all single-currency wallets, be forewarned, if you send the wrong cryptocurrency type to a wallet for which it is not designed, you will probably lose your tokens or coins. MyEtherWallet My Ether Wallet, often referred to as MEW, is the most widely used and highly regarded wallet for Ethereum and its related ERC-20 tokens. You can access your MEW account with a hardware wallet, or a different program. Or you can also get access by typing or copying in your private key. However, you should understand this method is the least safe way possible,and therefore is the most likely to result in a hack. Hardware: TrezoLedger Brief History Mechanism and Security A hardware wallet is a physical key to your on-chain wallet location, with the private keys contained within a secure sector of the device. Your private key never leaves your hardware wallet. This is one of the safest possible methods of access to your crypto assets. Many people feel like the hardware wallet strikes the right balance between security, peace of mind, and convenience. Paper Wallet Paper wallets can be generated at various websites, such as https://bitcoinpaperwallet.com/
. They enable wallet holders to store their private keys totally offline, in as secure a manner as is possible.
Real World Example — Poor Practices
MtGox Hack history effects and security considerations MtGox was the largest cryptocurrency exchange in the world before it was hacked in 2014. They were handling over 70% of BTC transactions before they were forced to liquidate their business. The biggest theft of cryptocurrency in history began when the private keys for the hot wallets were stolen in 2011 from a wallet.dat file, possibly by hacking, possibly by a rogue employee. Over the course of the next 3 years the hot wallets were emptied of approximately 650000 BTC. The hacker only needed wallet.dat file to access and make transfers from the hot wallet, as wallet encryption was only in operation from the time of the Bitcoin 0.4.0 release on Sept 23rd 2011. Even as the wallets were being emptied, the employees at Mt Gox were apparently oblivious to what was taking place. It seems that Mt Gox workers were interpreting these withdrawals as large transfers being made to more secure wallets. The former CEO of the exchange, Mark Karpeles, is currently on trial for embezzlement and faces up to 5 years in prison if found guilty. The Mt Gox hack precipitated the acceleration of security improvements on other exchanges, for wallets, and the architecture of bitcoin itself. As a rule of thumb, no small-to-medium scale crypto holders should use exchange wallets as a long-term storage solution. Investors and experienced traders may do this to take advantage of market fluctuations, but exchange wallets are perhaps the most prone to hacking, and storing assets on exchanges for an extended time is one of the riskiest ways to hold your assets.
In a case strikingly similar to the MtGox of 2011–2014, the operators of the BitGrail exchange “discovered” that approximately 17 million XRB ($195 million worth in early 2018) were missing. The operators of the exchange were inexplicably still accepting deposits, long after they knew about the hack. Then they proceeded to block withdrawals from non-EU users. And then they even requested a hard fork of the code to restore the funds. This would have meant the entire XRB Blockchain would have had to accept all transactions from their first “invalid” transaction that were invalid, and rollback the ledger. The BitGrailexchange attempted to open operations in May 2018 but was immediately forced to close by order of the Italian courts. BitGrail did not institute mandatory KYC (Know your customer) procedures for their clients until after the theft had been reported, and allegedly months after the hack was visible. They also did not have 2 factor authentication mandatory for withdrawals. All big, and very costly mistakes.
Case Study: Good Practice Binance, the Attempted Hack
During the 2017 bull run, China-based exchange Binance quickly rose to the status of biggest altcoin exchange in the world, boasting daily volumes that surged to over $4 billion per day in late December. Unfortunately, this success attracted the attention of some crafty hackers. These hackers purchased domain names that were confusingly similar to “binance.com”. And then they created sufficiently convincing replica websites so they could phish traders for their login information. After obtaining this vital info, the scammers created API keys to place large buy orders for VIAcoin, an obscure, low volume digital currency. Those large buy orders spiked VIA’s price. Within minutes they traded the artificially high-priced VIA for BTC. Then they immediately made withdrawal requests from the hacked BTC wallets to wallets outside of the exchange. Almost a perfect fait accompli! But, Binance’s “automating risk management system” kicked in, as it should, and all withdrawals were temporarily suspended, resulting in a foiled hacking attempt.
Software Wallets Web/Desktop/Phone/Exchange Advantages and Limitations
As we said before, it is inadvisable to store crypto assets in exchange wallets, and, to a lesser extent, Web Wallets. The specific reason we say that is because you need to deliver your private keys into the hands of another party, and rely on that website or exchange to keep your private key, and thus your assets, safe. The advantages of the less-secure exchange or web wallets, are the speed at which you can transfer assets into another currency, or into another exchange for sale or for arbitrage purposes. Despite the convenience factor, all software wallets will at some point have been connected to the internet or a network. So, you can never be 100% sure that your system has not been infected with malware, or some kind of keylogging software, that will allow a third party to record your passwords or private keys. How well the type of storage method limits your contact with such hazards is a good way to rate the security of said variety of wallet. Of all the software wallets, desktop and mobile wallets are the most secure because you download and store your own private key, preferably on a different system. By taking the responsibility of private key storage you can be sure that only one person has possession of it, and that is you! Thereby greatly increasing the security of your crypto assets. By having their assets in a desktop wallet, traders can guard their private key and enjoy the associated heightened security levels, as well keep their assets just one swift transfer away from an exchange.
Hardware Wallets Advantages and Limitations
We briefly touched on the features and operation of the two most popular hardware wallets currently on the market, the Ledger and Trezor wallets. Now it will be helpful to take a closer look into the pros and cons of the hardware wallet storage method. With hardware wallets, the private keys are stored within a protected area of the microcontroller, and they are prevented from being exported out of the device in plain text. They are fortified with state-of-the-art cryptography that makes them immune to computer viruses and malware. And much of the time, the software is open source, which allows user validation of the entire performance of the device. The advantages of a hardware wallet over the perhaps more secure paper wallet method of crypto storage is the interactive user experience, and also the fact that the private key must at some stage be downloaded in order to use the paper wallet. The main disadvantage of a hardware wallet is the time-consuming extra steps needed to transfer funds out of this mode of storage to an exchange, which could conceivably result in some traders missing out on profits. But with security being the main concern of the vast majority of holders, investors and traders too, this slight drawback is largely inconsequential in most situations.
Paper Wallets Advantages and Limitations
Paper wallets are thought by some to be the safest way to store your crypto assets, or more specifically, the best method of guarding the pathways to your assets on the Blockchain. By printing out your private key information, the route to your assets on the Blockchain is stored 100% offline (apart from the act of printing the private key out, the entire process is totally offline). This means that you will not run the risk of being infected with malware or become the victim of keylogging scams. The main drawback of using paper wallets is that you are in effect putting all your eggs in one basket, and if the physical document is destroyed, you will lose access to your crypto assets forever.
Key things to keep in mind about your Wallet Security: Recovery Phrases/Private Key Storage/2FA/Email Security
Recovery phrases are used to recover the on-chain location for your wallet with your assets for hardware wallets like ledgers and Trezors that have been lost. When you purchase a new ledger for example, you just have to set it up again by entering the recovery phrase into the display and the lost wallets will appear with your assets intact. Private key storage is of paramount importance to maintain the safety of your on-chain assets! This should be done in paper wallet form, or stored offline on a different computer, or USB device, from the one you would typically use to connect to the 2 Factor Authentication (2FA) sometimes known as “two step authentication”. This feature offers an extra security layer when withdrawing funds from cryptocurrency wallets. A specialized app, most commonly Google Authenticator, is synced up to the exchange to provide a constantly changing code. This code must be entered within a short time window to initiate transfers, or to log into an exchange, if it has also been enabled for that purpose.
You must always consider the level of fees, or the amount of Gas, that will be needed to carry out the transaction. In times of high network activity Gas prices can be quite high. In fact, in December 2017 network fees became so high that some Bitcoin transactions became absolutely unfeasible. But that was basically due to the anomalous network congestion caused by frantic trading of Bitcoin as it was skyrocketing in value. When copying wallet addresses, double check and triple check that they are correct. If you make a mistake and enter an incorrect address, it is most likely your funds will be irretrievably lost; you will never see those particular assets again. Also check that you haven’t input the address of another one of your wallets that is designed to hold a different variety of cryptocurrency. You would similarly run the very great risk of losing your funds forever. Or, at the very least, if you have sent the wrong crypto to a large exchange wallet, for example on Coinbase, maybe you could eventually get those funds back, but it would still entail a long and unenjoyable wait.
How to Monitor Funds
There are two ways to monitor you funds and your wallets. The first is by searching for individual wallet addresses on websites specifically designed to let you view all the transactions on a particular Blockchain. The other is to store a copy of your wallet contents on an application that tracks the prices of all cryptocurrencies. Blockchain.info is the block explorer for Bitcoin, and it allows you to track all wallet movements so you can view your holdings and all the historical transactions within the wallet. The Ethereum blockchain’s block explorer is called Ether scanner, and it functions in the same way. There is a rival to Ether scanner produced by the Jibrel Network, called JSearch which will be released soon. JSearch will aim to offer a more streamlined and faster search method for Ethereum blockchain transactions. There are many different kinds of block explorer for each individual crypto currency, including nanoexplorer.io for Nano (formerly Rai Blocks) and Neotracker for NEO. If you simply want to view the value of your portfolio, the Delta and Blockfolio apps allow you to easily do that. But they are not actually linked to your specific wallet address, they just show price movements and total value of the coins you want to monitor.
That’s not all! You can learn how to transfer and monitor the funds in and out of your wallet by clicking on the link.
To be continued! UBAI.co
Contact me via Facebook, Instagram and LinkedIn to learn more about the best online education: LinkedIn Facebook Instagram
Discover historical prices for BTC-USD stock on Yahoo Finance. View daily, weekly or monthly format back to when Bitcoin USD stock was issued. What Is Bitcoin (BTC)? Bitcoin is a decentralized cryptocurrency originally described in a 2008 whitepaper by a person, or group of people, using the alias Satoshi Nakamoto.It was launched soon after, in January 2009. Bitcoin is a peer-to-peer online currency, meaning that all transactions happen directly between equal, independent network participants, without the need for any intermediary to ... Bitcoin Historical Price Snapshot 2009 - Bitcoin is Born. The first days in January (3rd)- Satoshi Nakamoto released the Whitepaper and the new take on decentralized money is born. Peer to Peer cryptographic transfers and distributed ledger technology starts to breach itself into the worldwide web. Known as Proof of work and based around the ... Bitcoin's price since it began in 2009 and all the way up to today. Complete with historical events and how they affected Bitcoin's price. Bitcoin history for 2009, 2010, 2011, 2012, 2013, 2014, 2015, 2016, 2017, 2018, 2019. Bitcoin price chart since 2009 to 2019. The historical data and rates of BTC ... Bitcoin Daily Performance. Today's Bitcoin price is $14,902, which is down 6% over the last 24 hours. Bitcoin's market cap is $276.24B. 24 hour BTC volume is $30.03B.It has a market cap rank of 1 with a circulating supply of 18,536,818 and max supply of 21,000,000. Bitcoin is traded on exchanges. Bitcoin had an all-time high of $19,338 almost 3 years ago. Over the last day, Bitcoin has had 16% ...
Some information about Binance, its native cryptocurrency Binance Coin, related news and my price predictions. What are your thoughts about these price predictions and the information contained ... NEW CHANNEL: https://www.youtube.com/channel/UCH9HlTrjyLmLRS0iE1P4rrg ----- Rich Dad Poor Dad: https://amzn.to/3cKJ4Ia C... Chapter 4 Building a Binance Bot in Python: Collecting and Analyzing historic cryptocurrency price data. In this video we collect and analyze price data from... CryptoRobert's quick and easy tutorial on how easy it is to send Bitcoin or Ethereum to Binance using GDAX. You read that correctly. ANYONE can use GDAX to quickly fund not just your Binance ... In this video I will show you how to import live data and Historical data for Bitcoin, Ethereum, Ripple and other 1384 coins from web to excel. Data is refre... 🟡Binance Futures 10% Discount: ... Hashrate Suggests Bitcoin Price Should Be A LOT HIGHER - Duration: 12:17. Altcoin Daily 26,163 views. 12:17. THE END OF THE US DOLLAR? BUY BITCOIN NOW ... A Small investment of just $100 In 2009 (If the Stats Are True) Would be worth a whopping $8 Billion Today! (Bitcoins Price When I Checked *$8,075*. Hopefully that can still happen with the Alt ... Amazon Affiliate Link - (If You Buy Something On Amazon, I Get A Small Commission As A Way To Support The Channel) - (There is NO extra cost for you) https:/... Amazon Affiliate Link - (If You Buy Something On Amazon, I Get A Small Commission As A Way To Support The Channel) - (There is NO extra cost for you) https://amzn.to/39MXp4q Computer I Use To ... In this video I talk about the basics of using Python requests by showing you how to call the Coinbase Bitcoin Price Index API. You can see the API docs here...