What-is-Yield-YLD

Yield ($YLD): An Incentivized P2P Lending dApp?

0
Yield ($YLD) is a peer-to-peer cryptocurrency lending/borrowing platform with incentivized mechanism. Decentralized finance (DeFi) has opened new profit-making avenues for people who have additional...
VIMworld_8hours

8Hours Foundation (VIMworld) $EHrT: The Next Evolution of Gaming?

0
8Hours Foundation ($EHrT) aims to integrate the real world into the blockchain to create beneficial implications for the time we spend with our friends...
What-is-Unido

Unido ($UDO): Crypto Banking and DeFi for Enterprise

0
Unido ($UDO), powered by Polkadot, provides enterprises crypto-asset management solutions, that specialize in governance, security, and interoperability within the crypto banking sphere guaranteeing the...

SushiSwap ($SUSHI) Explained

6
Before we begin We've been closely following the events involving SushiSwap and its founder "Chef Nomi". This article will not be making any comments or...

OIN Finance ($OIN): DeFi’s first foray into Ontology

1
OIN Finance ($OIN) devised a way to build a Decentralised Finance (DeFi) project that seeks to deliver what most Ethereum products can too, but...

1inch Exchange, Mooniswap and Chi GasToken: The ultimate review and guide

2
1inch Exchange is a decentralized exchange (DEX) aggregator, designed to roll liquidity and pricing from major DEXs into one platform, offering users the cheapest...
What-is-KIRA-Network

KIRA Network ($KEX): What is it?

0
KIRA Network ($KEX) is an interchain exchange protocol that allows users to earn block and fee rewards while staking any digital assets, such as...
MahaDAO ($MAHA $ARTH)

MahaDAO ($MAHA / $ARTH): Can it fight depreciation?

0
MahaDAO has a bold mission: to correct the systemic flaw of inflation and hyperinflation in global economic systems. Thereby resulting in currencies across the...

Kusama ($KSM): How is it Polkadot’s wild cousin?

0
Kusama ($KSM) calls itself "Polkadot's wild cousin". Yet, is an initiative that seeks to solve the Polkadot ecosystem's concerns of coding vulnerabilities. Going beyond...