"AIR"

Search result of

Courses (0)

Articles (171)

Glossary (0)

What is an Air-Gapped Wallet?
Intermediate

What is an Air-Gapped Wallet?

Explore the world of air-gapped wallets, offering superior security for cryptocurrency storage. Learn how they work and why they're essential for safeguarding digital assets.
9/1/2023, 10:07:35 AM
What Are Air-Gapped Crypto Wallets?
Intermediate

What Are Air-Gapped Crypto Wallets?

Air-gapped wallets are cold storage wallets that are completely disconnected from the internet. This makes them very secure against online threats, such as malware and phishing attacks. However, they can be more difficult to use than other types of wallets.
12/12/2023, 4:42:10 PM
What is Ellipal Wallet?
Beginner

What is Ellipal Wallet?

The Ellipal wallet is a secure, air-gapped cold wallet for storing and managing cryptocurrencies offline. Supports 10,000+ coins, staking, and tamper-proof QR code-based transactions.
1/14/2025, 6:24:01 AM
The Rise and Fall of the Crypto World: From a Pile of Air to $3 Trillion
Intermediate

The Rise and Fall of the Crypto World: From a Pile of Air to $3 Trillion

Where there are people, there are communities. But in the Web3 world, which is closer to money, the community is even more ruthless. This article will use the first-person perspective to reflect on the past seven years of the cryptocurrency world. "We will reflect on where we stand today and why we are still moving forward in this field."
12/9/2024, 6:04:17 AM
Is the Fed's Rate Cut Really Good for Bitcoin?
Advanced

Is the Fed's Rate Cut Really Good for Bitcoin?

If the Fed decides to cut rates on September 19, it will impact financial markets, including cryptocurrencies, with Bitcoin being the most prominent. Is this a booster for the market or a "Sword of Damocles" hanging in mid-air? Let's look back at history to learn from past experiences.
9/3/2024, 3:02:36 AM
How Cysic Aims to Bring PoW Back to Ethereum with ZKP and DePIN?
Beginner

How Cysic Aims to Bring PoW Back to Ethereum with ZKP and DePIN?

The article explores Cysic, a real-time Zero-Knowledge Proof (ZKP) generation and verification layer that offers Zero-Knowledge Computing as a Service (ZK-CaaS), powered by its proprietary ASIC, FPGA, and GPU chips. Cysic's innovation lies in its ability to provide hardware acceleration for various ZK algorithms, significantly reducing the time and resources required for proof generation. Its hardware solutions, including ZK Air and ZK Pro, are designed to make the generation of ZK proofs more efficient and accessible. Additionally, Cysic plans to establish a DePIN network, inviting users to contribute their computing power to expedite the ZKP process. Cysic has secured investments from entities including Polychain Capital and has been awarded in the ZPrize competition.
5/5/2024, 2:13:19 PM
Moca Network: Digital Identity Infrastructure for Open Internet
Intermediate

Moca Network: Digital Identity Infrastructure for Open Internet

Fragmented digital identities cause inefficiencies and missed opportunities for users and businesses. An open and user-centric infrastructure is essential to resolve this issue. This article aims to examine Moca Network’s MOCA 3.0 vision and its innovations in digital identity infrastructure for the open internet.
1/16/2025, 7:51:11 AM
Ani
Intermediate

Ani

This article analyzes and compares various hardware wallets.
1/5/2024, 2:24:34 PM
"Inscribing" Bitcoin Inscriptions: What Exactly is Being "Inscribed"? Considered a Flaw by The Core Developers, Could it Lead to Zero Value?
Beginner

"Inscribing" Bitcoin Inscriptions: What Exactly is Being "Inscribed"? Considered a Flaw by The Core Developers, Could it Lead to Zero Value?

This article introduces Bitcoin Inscription and explains the possible impact of the current external environment on it.
1/24/2024, 3:14:03 PM
DePIN Popular Science Article: How do Infrastructure like IoTeX, DePHY, and peaq Operate?
Beginner

DePIN Popular Science Article: How do Infrastructure like IoTeX, DePHY, and peaq Operate?

This article reviews the process of IoT devices generating data, storing data, and rolling up to the blockchain. It also introduces the DePIN infrastructure platform, which can help project teams quickly launch DePIN application projects. DePIN utilizes blockchain for incentive distribution and token allocation, requiring the use of public-private keys to generate and verify physical proof of work. To prevent Sybil attacks, DePIN device manufacturers monopolize the generation authority of identity information and expose malicious behavior through social consensus. DePHY provides DID authentication services to ensure the credibility of data sources. DePHY also provides a co-processor to listen to finalized messages on the message network and perform state transitions. Both DePHY and IoTeX choose to collect data off-chain and then roll up to the chain, with DePHY focusing on decentralized data availability layers and IoTeX emphasizing binding handlers to different events.
3/24/2024, 7:20:06 PM
 ZK DePIN Hardware Acceleration and Compute Power Network Leader Cysic
Intermediate

ZK DePIN Hardware Acceleration and Compute Power Network Leader Cysic

Cysic will integrate chip-based computing power with community GPU computing power, incorporating a massive number of community validation nodes to ultimately build the Cysic Network, offering a reliable, all-in-one compute power and validation network for the entire industry.
5/20/2024, 9:57:50 AM
How to measure the open value of on-chain data
Intermediate

How to measure the open value of on-chain data

Just like the number of active users (DAU) and page views (PV) are used to evaluate platform activity in the Web2 era, on-chain data usage also shows the true vitality of Web3.0 applications: not only on-chain transactions, but also on-chain transactions. Multi-dimensional data such as user behavior, smart contract execution, on-chain interaction and voting reflect the comprehensive capabilities of Web3.0 applications in terms of user stickiness, interaction quality and innovation and expansion.
10/9/2024, 1:16:15 AM
 In-Depth Analysis of Large-Scale Rug Pull Techniques
Intermediate

In-Depth Analysis of Large-Scale Rug Pull Techniques

The current situation where the security of tokens depends entirely on the project's self-awareness. To address this, we may need to improve token mechanisms or introduce effective token supply monitoring schemes to ensure transparency in token quantity changes. We need to be vigilant, as while people's awareness of fraud is increasing, attackers' anti-fraud techniques are also constantly evolving. This is an ongoing game, and we need to continue learning and thinking to protect our interests.
3/28/2024, 2:26:54 AM
My techno-optimism
Advanced

My techno-optimism

This article explores the intersection of artificial intelligence and blockchain, introducing the concept of "d/acc" (decentralized acceleration). With different philosophical backgrounds, Vitalik advocates for a balanced and thoughtful approach, urging developers to prioritize choices and intentions while constructing technology.
1/4/2024, 7:02:45 PM
Our highly subjective view on the history of Zero-Knowledge Proofs
Beginner

Our highly subjective view on the history of Zero-Knowledge Proofs

This article describes the advancements of SNARK since its introduction in the mid-1980s.
2/27/2024, 8:09:35 AM

Your Gateway to Crypto World, Subscribe to Gate for A New Perspective

Your Gateway to Crypto World, Subscribe to Gate for A New Perspective