Tag: Crypto Wallet

  • Trezor Model T Guide: How to Set Up a Trezor Model T

    Trezor Model T Guide: How to Set Up a Trezor Model T

    The Trezor Model T is a cryptocurrency hardware wallet created by SatoshiLabs Group. Released in March 2018 with the latest firmware update in April 2023, the wallet features a new operating system tagged Trezor Core. This enables faster development of features and smooth coin support. This article is a guide on how to set up your Trezor Model T.

    To buy your Trezor Model T, click here.

    You can also set up your device with my step-by-step video below.

    Check out our Trezor Model T Guide and review video!

    Trezor Model T Packaging

    This premium model costs 249 Euros (US$252). The Trezor Model T comes as a special kit, it contains the Trezor Model T device, magnetic dock, USB type C cable, stickers, user guide and recovery seed.

    Trezor Model T kit

    Trezor Model T Installation Guide

    Installation is smooth with the aid of the user guide. Their website also has a web assistant to guide you through the installation steps.

    Notably, you have to be careful in the entire process to avoid leaking your private keys and recovery phrase. Leaking your private keys or recovery phrase opens you to serious risk by hackers to steal your coins.

    For complete security, ensure the area where you are setting up your Trezor Model T is completely camera free including sealing your computer’s webcam.

    The Model T device comes with a hologram seal that you have to peel off to plug in to your PC.

    If you don’t see this seal or it looks different to the one pictured, do NOT proceed with the set up and contact Trezor support immediately.

    Hologram seal on the Trezor Model T

    Connect the Trezor Model T and your computer using the USB type C cable provided.

    Download and Install the Latest Firmware

    The next step is to download and install the latest firmware.

    Download the latest firmware from the Trezor website. Do not disconnect your device during this process!
    The Trezor will restart after installation.
    On the website, click “Check for devices” and connect to the “Unknown device from InterBiometrics”- this is actually your Trezor.

    Afterwards select the option “Create a new wallet”. This will be proof that the wallet is unused.

    Select “Create a new wallet” if you are using the Trezor for the first time. Some ebay sellers will ask you to restore your wallet, those are scams!

    Create a Backup of Your Trezor Model T

    The penultimate step is to create a back up. The wallet generates recovery words which are in a specific order. Write down those words in the same order on the piece of paper provided with your Trezor Model T.

    This is known as your recovery seed.

    Remember to create a backup of your Trezor so you can recover your funds even if you lose your physical device.
    The recovery seed will be generated on your Trezor device.
    Write down your recovery seed on the paper provided with the Trezor and keep it safe. Do not take a photo of it, upload it onto your computer or online.

    IMPORTANT: do not take a photo of your recovery seed, or upload it onto your computer or online.

    This is because you use your recovery seed to restore your funds on another Trezor if you lose your phyiscal device. Conversely, this means that any thief can do the same if they obtain your recovery seed.

    Create a New PIN Code

    Lastly, set a 4 to 50-digit PIN code which you will use to unlock your Trezor every time before using it.

    The PIN is set on your Trezor Model T device. This is so that even if someone obtains your Trezor, they cannot unlock and use it unless they have your PIN code.

    This concludes the set-up process, meaning you’re good to go. It goes without saying that at all times, be extra vigilant to ensure you don’t expose your keys or recovery seed. This is to ensure your wallet is secure.

    Using the Trezor Model T

    The wallet offers a range of coin options for trading. They include; Dash, Bitcoin, Bitcoin Cash, Bitcoin Gold, etc.

    The options are listed out on the interface once you connect your Trezor to your computer.

    For ERC-20 token coins, you can use the Trezor with MyEtherWallet or MyCrypto.

    MyEtherWallet
    MyCrypto

    In general, transacting using the Trezor Model T is smooth and really secure.

    To buy your Trezor Model T, click here.

  • Ledger Recover: Everything You Wanted To Know

    Ledger Recover: Everything You Wanted To Know

    Ledger, the company behind the Ledger Nano X and Nano S Plus cryptocurrency hardware wallets has just announced its new product called Ledger Recover. Ledger Recover is an ID-based key recovery service that provides a backup for your Secret Recovery Phrase. If you lose or don’t have access to your Secret Recovery Phrase, the service allows you to securely restore your private keys using a Ledger device.

    Check out our Ledger Nano X Review and Ledger Nano S Plus Review.

    CLICK BELOW TO BUY!

    buy now

    What is Ledger Recover?

    Ledger Recover is an ID-based key recovery service that provides a backup for your Secret Recovery Phrase. The Secret Recovery Phrase is a 24-word phrase that is used to restore your private keys if you lose access to your Ledger device. With Ledger Recover, if you lose or don’t have access to your Secret Recovery Phrase, the service allows you to securely restore your private keys using a Ledger device.

    Ledger Recover

    How to use Ledger Recover?

    The process of using Ledger Recover involves several steps. First, your identity is verified using your ID document and a selfie recording. Next, your Ledger Nano X duplicates your Secret Recovery Phrase and encrypts the duplicate. This encrypted duplicate serves as the backup for your Secret Recovery Phrase. The system then links the backup to your verified identity and fragments it into three pieces. Ledger, Coincover, and a third provider independently secure each of the encrypted fragments.

    Accessing your wallet with Ledger Recover is seamless: all you need is your ID and your current Ledger Nano X or a new one. You alone can start the recovery process, which is ensured using double ID verification. The service relies on companies with industry-leading encryption and ID verification technology to provide a secure and reliable service.

    Who is the Ledger Recover good for?

    Ledger says the Ledger Recover is good for those who are new to cryptocurrency and may find it difficult to back up and keep their Secret Recovery Phrase safe. It is also good for those who would like another backup of their Recovery Phrase in another location.

    Will the Ledger Recover be available on all Devices?

    At present, Ledger Recover only works with the Nano X. Soon, it will also work with the Nano S Plus and Ledger Stax. However, it is not compatible with the Nano S.

    Do I have to use Ledger Recover?

    No, Ledger Recover is a completely optional service that you must choose to use. To choose to use the service you must subscribe with 2 different partners and create accounts with them. After you sign up, Ledger initiates the cryptographic process and asks you to confirm your agreement to it on your Ledger device.

    Is Ledger Recover free?

    No, it is a subscription service that will cost $10 per month. To use the service, you must also complete a KYC process with an ID document and a selfie recording.

    If you don’t pay the subscription within 7 days, you can’t restore your private keys using Ledger Recover. If you don’t resolve your payment within 3 months, your subscription will be suspended. After suspension, you have 9 months to reactivate your subscription by contacting Ledger Recover Support and paying a 50 EUR fee and any outstanding balance.

    How does Ledger Recover Work?

    Ledger Recover works through 3 companies: Ledger, Coincover and a third company. You will need to opt-in to use the service. When you opt in for the service, you will be prompted to confirm if you want to use it. If you agree, you will need to sign a transaction on your Ledger device. Afterwards, the system splits your private keys into 3 parts, encrypts them on the device, and sends them through a secure channel to 3rd party providers. The providers will encrypt the parts again before storing them.

    If you need to recover your private key, you will have to go through a thorough ID verification process. This is to confirm your identity. Once your identity is verified, the providers will send the encrypted parts of your private key directly to your Ledger device. Your device will then decrypt the parts and you will be able to access your private key again.

    Who keeps your private key when you use Ledger Recover?

    3 separate companies in 3 countries will store your private key if you subscribe to the service. The companies are Ledger, Coincover and Escrowtech. In particular, Coincover already works with several B2B offerings and also provides a $50k insurance plan. Additionally, two ID verification providers participate in the process.

    Is Ledger Recover Safe?

    According to Ledger, Ledger devices do not have any backdoors. The Secure Element chip and a paper backup securely store your seed phrase. If you opt to use the service, it creates an additional backup. This is done by splitting your private key into 3 encrypted parts and storing them with 3 different parties.

    Ledger also offers an added layer of protection where, subject to investigation, US$50,000 compensation may be available from Coincover in the unlikely event that something goes wrong.

    Conclusion

    In summary, Ledger Recover is an optional ID-based key recovery service that provides a backup for your Secret Recovery Phrase. It splits your private key into 3 encrypted parts and stores them with 3 different parties. The service is not free and requires a subscription fee of $10 per month. If you’re new to cryptocurrency or would like an additional backup of your Recovery Phrase, Ledger Recover may be a good option for you.

    CLICK BELOW TO BUY!

    buy now
  • Ledger Nano X Guide: Complete Setup Tutorial

    Ledger Nano X Guide: Complete Setup Tutorial

    Ledger released a new hardware wallet – the Ledger Nano X. This new device protects your cryptocurrencies with military-grade protection and prevents digital theft and hackers. These are the key new features of the Ledger Nano X:

    • Large HD screen – Displays address of receiver in full without scrolling
    • Mobile support – (Android and iOS) support via Ledger Live Mobile
    • More storage space – Install up to 100 different apps for different coins.
    • Rechargable Battery – allows the device to be powered-on without a cable.
    • Ledger Recover – A new (albeit controversial) seed phrase recovery subscription service. Learn more here.

    Click below to buy!

    buy now

    This guide will help you setup your Ledger Nano X and teach you the important features. In addition, we the most important question: Is Bluetooth Safe?

    Ledger Nano X Review: Is it worth buying?

    Ledger Live Mobile

    Cryptocurrency can be spent on the go with Ledger Nano X

    One of the biggest features of the Ledger Nano X is the support for mobile phones (both Android and iPhone). The new Ledger Live app allows for both sending and receiving of all supported cryptocurrencies on the go.

    The app connects directly to the Nano X via Bluetooth, so no cable is required. The device has a battery that allows it to be actively powered on for more than 8 hours (depending on use), so the Nano X can be brought out to send cryptocurrency on the go.

    Portfolio mode allows Ledger Live to display all available balances that is stored on the Ledger Nano X. This is accessible even if the hardware wallet is not present, so you can conveniently browse the portfolio. To send cryptocurrencies, the device must be present to sign the transaction via Bluetooth. It is important to remember that the private key to sign transactions never leaves the device or is transmitted via Bluetooth – only the signed transaction which cannot be altered (secure).

    Ledger Mobile app showing the Ethereum address with verification from Ledger Nano X

    Ledger Live Mobile also supports the installation of various apps for different cryptocurrencies via Ledger Manager, just like the desktop version. The mobile app boasts the same functionality as the desktop version with the notable exception that it does not yet allow firmware updates.

    How to Add or Remove Apps on the Ledger Nano X

    To use different cryptocurrencies on the Ledger Nano X, the app for that coin needs to be installed on the Ledger first. This is done via the Ledger Live app on either Windows, MacOS, Linux, Android or iOS. First install Ledger Live, connect the Nano X and enter the “Manager” interface. The app will require you to unlock the Ledger by entering your pin and entering the home screen. You will need to authorize Ledger Live by confirming “Allow Ledger Manager”. Once you are connected, you will see a list of different apps that are ready to be installed (if your list is shorter than in the following image, update the firmware of the Ledger Nano X).

    Use Ledger Live to install new apps on the Nano X

    Is Bluetooth Safe?

    The simple answer is: Yes. One of the initial concerns (reddit) about the Ledger Nano X is communication via Bluetooth, a form of radio communication. The previous model (Ledger Nano S) only had cable connectivity, which would not expose the device to nearby attackers. Bluetooth is safe to use in this case because the device is never controlled via Bluetooth – instead it is only used to send unsigned and signed transactions. This means the private key (the key to all the funds) is not exposed and does not leave the device.

    The Nano X operates with the assumption that the Bluetooth connection (which is a bearer, exactly like USB) is compromised. The addition of BLE doesn’t impact the security model. Transactions must always be physically verified on device by pressing both buttons. Moreover, on the Nano X screens and buttons are directly connected to the Secure Element (single chip architecture), which is also an enhancement of the general security design. (Valium)

    Nicolas Bacca, CTO at Ledger

    On top of this, the Ledger Nano X functions assuming the Bluetooth is in “compromised” mode. This means it will never give any control to other external devices and communication is limited to transaction signing only.

    Control Panel on Ledger Nano X allow Bluetooth to be turned On / Off

    Keep your Recovery Phrase Safe!

    There will be a sheet where you can write down your 24-word recovery phrase. This is the most important part because it acts as a backup to the device. You will need to keep it very safe because if someone gets access to that paper it is essentially the same as stealing your wallet.

    Do not take a photo or have a digital copy of that list!

    Ledger Nano X Setup

    1. Choose a 4 to 8-digit PIN code and confirm.
    2. Write down your 24-word recovery phrase. The order of the words is also important.
    3. After setting up the device, with it still plugged in, visit the Ledger Live website and download the app you want to use.
    4. Follow the instructions on the site and use.

    Note: after setting it up you will be navigating the device on your computer.

    You can receive cryptocurrency even when the device is offline. It’s only when you want to send that you need to connect the device and enter your PIN and login.

    After inputting all the transaction details on your computer, as an additional security measure, you can double check the details on the device. Make sure the address and amount are correct and confirm.

    Why use a Hardware Wallet?

    With traditional currencies, you, the user, are the most important person. If you have ever lost your bank card, you can always go to the bank with some sort of identification and request for access back to your account.

    Cryptocurrencies, however, don’t care about the physical person but rather the private key associated with the wallet. The private key is used to verify the account and transactions. Anyone who has access to this key can send funds and that is why you must keep it safe. Another thing is that cryptocurrency transactions cannot be reversed.

    Hardware wallets can protect you against these things. They add an extra layer of security by storing the private key on the device itself. The only way to hack it would be to have physical access to the hardware wallet or with the backup phrase.

    Paper wallets offer arguably even more security. However, the process for setting them up and using it is very complicated. Hardware wallets strike a nice balance between security and convenience.

    Is the Ledger Nano X Worth the Upgrade?

    At a higher price point, many users are asking the question “Is the Ledger Nano X worth the Upgrade“. For us, the answer is depends.

    If you use more than 3 apps, then consider upgrading. Coming with a much larger memory space, Nano X is able to store a lot more applications than the soon-to-be-retired Ledger Nano S. However, its updated model, the Nano S Plus, at a price of USD 79, is capable of storing up to 100 apps, making it much more competitive with the pricier Nano X. As of writing, the Ledger Nano S is only able to store 2-3 applications with Firmware 1.5.5 (such as Bitcoin and Ethereum app). Whilst you can get around this limitation by uninstalling unused apps, the constant switching often leads to confusion and time wasting.

    If you need to send large amounts of Cryptocurrencies on the go. With Bluetooth support, the new Ledger can be used with Android phones and iPhones.

    If more apps and mobility are not a big concern for you, stick with the Ledger Nano S or Nano S Plus.

    Click here to buy!

    Successfully set up your Ledger Nano X? Now it’s time to get started with trading Bitcoin and other cryptocurrencies! Check out my course created in collaboration with Jeff Kirdeikis of Uptrennd- Bitcademy: Learn, Invest & Trade Bitcoin – In Under an Hour

  • Moongate Features Innovative NFT Solutions in Taipei Blockchain Week

    Moongate Features Innovative NFT Solutions in Taipei Blockchain Week

    Taipei Blockchain Week

    Taipei Blockchain Week, the largest Web3 event in Taiwan, was held last week from December 12-17, 2022. Similar to TOKEN2049 Singapore, the event features a series of keynotes, panel discussions, workshops, and meetups with some of the leading developers and entrepreneurs in the Web3 industry. Speakers of the event included core team members from Avalanche, Solana, Filecoin, Moongate and many more, where they talked about the real-world applications of blockchain technology and the future landscape of crypto.

    Moongate, in particular, has introduced an end-to-end solution for brands and businesses to create customized NFTs for ticketing and memberships. In fact, Moongate is the official ticketing partner of Taipei Blockchain Week, having issued 4000 tickets for the event’s attendees. Despite the NFT industry getting a bad rap, Moongate helps bring meaningful and productive application of Web3 into the Web2 world with real utility NFTs that can greatly benefit everyday retail consumers. Let’s take a look at what they have to offer.

    What is Moongate?

    Moongate provides an end-to-end, no-code solution for brands and businesses looking to transform their user engagement experience via Web3. Its user application covers (1) membership and loyalty programs, (2) events and conferences, and (3) NFT projects. All customers will be able to own their membership as NFTs which unlock token-gated rewards and access.

    CEO of Moongate Jonathan Mui told Boxmining that they have helped brands, businesses, conferences, and sports leagues with NFT-empowered memberships and tickets. So far, Moongate has 30+ live programs, 50+ ecosystem partners, and 5000+ end customers. Notable partners include Polygon, SimpleHash (backed by Y Combinator), DTTD (backed by Animoca Brands), Limewire and many more.

    How Does Moongate’s App Work?

    Moongate’s User App is very easy to use, catering to both Web3 and Web2 users. You can create an account, which is also your crypto wallet, with your email, phone number or social media account. For experienced Web3 users, you can instead use your self-custodial wallet such as MetaMask to sign up.

    Moongate App

    Private Key Security Features

    To onboard Web2 users more easily, there won’t be any traditional Web3 private key management such as seed phrases. Moongate understands that with traditional private keys, users can never get their NFTs back if they lose their key. This can be a problem for most Web2 users who are not used to Web3 interfaces.

    Instead, Moongate is collaborating with some of the top endpoint security solutions to implement a next-gen key management architecture. Its security infrastructure involves two independently-created mathematical secret shares, eliminating the single point of failure for traditional private keys. The wallet is still non-custodial as users have full control over their NFTs but it also allows them to restore their account safely if they delete the App or lose their phones.

    User App Interface

    In the App, users can enroll in membership programs via one-click join/redemption. Users can view and claim exclusive benefits tied to their NFT memberships. Tiered rewards can be earned, and benefits will increase overtime with increased spending/usage. Moreover, users can earn token rewards by completing promotions, and use tokens to claim extra rewards across partnered brands.

    Moongate App

    Mui said that it is important for Moongate to integrate blockchain technology with legacy systems so that it would require less steps and create less friction for Web2 users to get onboard while reaping the benefits of Web3. Since most retail customers are accustomed to Point of Sale (POS) systems, Mui said that adopting some of the Web2 approaches can help make their product scalable and viable.

    Merchant Setup for Moongate’s App

    Apart from retail customers, brands and businesses with no Web3 knowledge can also easily manage their Moongate account. NFT projects can keep track of the holders engagement for future rewards and airdrops, without requiring holders to reveal personal information.

    NFT Design and Minting

    Users can create, deploy, and mint their own NFTs without any coding knowledge. Moongate’s smart contract builder is a simple drag-and-drop deployment. It supports dynamic NFT integration and can be issued on multiple chains. Moongate’s mint site builder provides customized storefront design with personalized information. Users can checkout with fiat or crypto via Web2 social logins or crypto wallets.

    Moongate App

    Utility Management Dashboard

    No-code dashboards are available for merchants and projects to set the parameters of online or offline token-gated content, access, and discounts across different tiers of membership. There are also key applications on offline discounts, exclusive events, and online e-commerce stores. Additionally, off-chain data can be captured to support corresponding changes to dynamic NFTs.

    Moongate App

    NFT Ownership Verification

    Moongate has a one-scan solution to complete real-time, on-chain NFT ownership verification across multiple blockchains including Ethereum, Polygon, and Solana. Users will have their own ephemeral QR code for merchants to scan and verify as it supports whitelabel integration with other apps or third-party scanners. Moreover, it is also compatible with near-field communication (NFC) “phygital” gateways, which are essentially physical cards that hold the QR code verification.

    Moongate App

    NFT Usage Management and Analytics Portal

    Moongate provides data analytics for merchants and projects to monitor membership usage in real-time and post-attendance. It can integrate with traditional technology stack such as POS and CRM (Customer Relationship Management) marketing software. The portal also displays API for data integration with other sites, supporting tracking of spending credits.

    Moongate App

    Key Takeaway

    Moongate introduces a new paradigm in customer loyalty while maintaining positive business impact. It changes how businesses can build better branding and how customers approach purchasing goods and services.

    Since customers can truly own their NFT membership, they can also choose to sell the NFT along with all the rewards stored in it, as the NFT is a transferrable token. That way instead of “spending”, customers are actually investing because they are creating value for their NFT. This also helps businesses better connect with the next generation of customers, lowering their Customer Acquisition Cost (CAC). After all, that is what Web3 is all about — ownership by users.

  • Enjin Wallet Review and Tutorial (2022)

    Enjin Wallet Review and Tutorial (2022)

    Enjin Wallet Review

    Enjin wallet is a secure and easy to use mobile cryptocurrency wallet (iOS/Android). It’s extremely simple to use and contains advanced features such as Dapp Browser, QR code airdrops, Cryptocurrency Exchanges and Enjin’s own NFT marketplace integration. It’s the most secure mobile wallet we’ve tested with a two-layer security encryption and secure keyboard. Enjin wallet supports a wide range of cryptocurrencies such as Bitcoin, Ethereum (all ERC-20 and ERC-1155 Tokens), Binance Chain, Litecoin, Polkadot and Kusama. Enjin wallet is created as a companion to the Enjin Platform.

    Best Software Wallet Award

    Enjin Wallet is our Gold Award winner in the Free / Software wallet category. We were impressed by the wallet’s security features such as custom memory sweeps and double encryption. Enjin wallet is our top recommendation for any beginner who wants to keep their cryptocurrencies safe.

    Is Enjin Wallet Safe to Use?

    Security is the biggest concern for wallets as hackers are known to attack various wallets and attempt to steal funds. Enjin wallet offers the best in class security for mobile wallets.

    • Two-layer encryption: Hardware AES and software encryption is employed on the lower and application layer respectively
    • Secure keyboard: The protected keyboard bars keyloggers and/or data sniffers from tapping into your mobile device to steal data. It can also be randomized to increase security.
    • Screenshot blocking and Random Access Memory (RAM) encryption: The wallet’s operating system level restricts screenshots and video recording. On the memory level, transactions are conducted on a secure RAM.
    • Custom libraries: Enjin Wallet features custom libraries that remove the private keys from the device memory after use – significantly reducing the attack service.
    • Protection processor flaws: special code is put in place to deal with flaws in ARM processors.
    • Security Audited: ORU security team found no issues that could be used to compromise the wallet or the cryptographic keys stored in the system (full security report here)
    • Samsung Blockchain Keystore support: Enjin supports the Samsung Blockchain Keystore for private key protection under Samsung’s military grade security Knox.

    Mobile wallets are classified as a “Hot Wallet” – meaning this wallet is connected to the internet. The Enjin team has devised special counter-measures to deal with hackers attempting to steal cryptocurrencies. All private keys are double encrypted, so even if hackers stole the file it cannot be decrypted. On top of this, the special designed Enjin keyboard deals with keyloggers – making sure that the on-device decryption process is safe. Lastly Enjin used custom libraries to wipe the private key from device memory once the transaction is sent – unlike other mobile wallets.

    We added many security features that regular wallets don’t have. Enjin Wallet cannot be Keylogged and not affected by CPU flaws like Meltdown and Specture.

    Witek Radomski CTO of Enjin

    Hot wallets are generally considered less safe due to possible device based vulnerabilities (CPU or Memory flaws) which could compromise the security of the mobile phone. That being said, Enjin wallet’s can be considered to be the best out of all mobile wallets. For large amounts of cryptocurrency storage, we recommend the use of cold wallets like the Ledger Nano X.

    We found the security of Enjin Wallet to be the best among mobile wallets, with external security audits confirming our viewpoint. We give it the highest security rating of 4/5 – the highest possible rating for “hot wallets“.

    Security: 4/5

    What Cryptocurrencies does Enjin Wallet Support?

    The Enjin wallet supports the storage of Bitcoin (BTC), Ethereum (ETH), Litecoin (LTC), Binance Coin (BNB), Binance Chain tokens (BEP2), Polkadot (DOT), Kusama (KSM) and Ethereum-based tokens. For Ethereum-based tokens, Enjin supports those created using the ERC20 and ERC1155 standards. Select ERC-721 collectible tokens are also supported, namely for God’s Unchained, CryptoKitties, Blockchain Cuties and Axe Infinity.

    Did you know that Enjin introduced the ERC1155 token standard? Learn more with our ERC1155 token explainer.

    The ERC1155 tokens fit into the Enjin ecosystem as these tokens can represent in-game assets. This fits perfectly into Enjin’s game development ecosystem for blockchain-based games.

    The wallet allows users to sort, view, and show virtual currency balances in your local currency. Enjin’s partners Bancor, Kyber, and Changelly allow you to easily swap tokens.

    Multi-currency Support: 4/5

    Enjin Wallet Exchange Interface
    Enjin Wallet Cryptocurrecy Exchange Interface

    Design and interface

    The Enjin wallet sports a clean and intuitive design. The wallet also allows you to easily switch from viewing your balances in cryptocurrency or the equivalent in your local fiat currency. This is extremely helpful in allowing you to know how much your portfolio is worth with a simple glance.

    What is also helpful is the ability to easily create additional wallets. So say if you send or receive cryptocurrencies for different purposes, you can create a wallet for each of them (kind of like having partitions in your actual physical wallet) which makes managing your finances very convenient and easy to trace.

    One slight gripe I have about the Enjin wallet is that when you look at the individual cryptocurrency balances in your wallet, there is a discrepancy in the balance shown at the top and the bottom (which is the correct balance). Though this does not affect your usage of the wallet, you just need to know and accept that the bug is there.

    Incorrect balance shown
    The balances shown are inconsistent, the one circled in red is actually correct

    Despite this, Enjin wallet makes up for it with the fact that features the cleanest interface out there and additional functions not seen in any other software wallet. Because as we will see below, the Enjin wallet is more than a really good software wallet. The wallet is only one small part of Enjin’s whole gaming ecosystem. Rather, the wallet opens up additional features such as a QR code scanner, wallet for in-game collectible items and marketplace for you to trade these collectibles.

    Other features on Enjin wallet
    Other features on the Enjin wallet

    Software design: 5/5
    Ease of use: 5/5

    Final thoughts- my experiences with Enjin wallet

    I personally store small amounts of crypto on the Enjin Wallet so I can trade, or pay or receive crypto on the go. It has an easy to understand interface with a wide range of supported coins. So I have no hesitation to use it as my primary wallet. I had friends who were new to cryptocurrency and were completely overwhelmed when hearing other people talk about hardware wallets, exchanges and crazy hacks. I showed them my Enjin Wallet and it only took them less than 30 minutes to install and master. My guess is that without Enjin wallet’s simple and easy to understand design, they would have not bothered with cryptocurrencies at all. 6 months on, they are now trading cryptocurrencies regularly.

    Enjin Wallet Ecosystem

    Collectable Token Support

    Enjin has created its own ERC-1155 digital token standard which can be used to create both fungible (currencies) and non-fungible (NFT) (digital cards, pets and in-game skins) assets on the Ethereum Network.

    With the Enjin wallet, you can receive, send or melt these NFTs. The NFTs can be collectable items or in-game assets.

    You can use the wallet to trade NFTs with your friends and there are Telegram forums dedicated to buying and trading collectibles!

    Boxmining NFT collectable items
    Boxmining NFT collectable items

    To learn more about all the games and the Enjin Multiverse, check out their website. Though a fantastic feature, the Enjin Mintshop, where you could mint your own NFTs was unfortunately deprecated upon launching the public mainnet of the Enjin Platform in 2020.

    Boxmining collectable items are frequently given out as a way to say “Thank you!!” to our fans. Subscribe to Boxmining’s YouTube channel and click the notification bell so you don’t miss out!

    Scan for QR Airdrops (Enjin Beam)

    Enjin Beam QR giveaway
    Enjin Beam QR giveaway

    These giveaways could be found on various websites, games, and promotions on the Boxmining Channel. The Enjin Beams can take two forms: Airbeam, which sends all users the same collectible, or Lootbeam, which includes a variety of assets of varying rarities, so each user is likely to get different combinations of these loot assets. Read more about Enjin Beam here.

    Enjin Wallet Marketplace

    Collectibles listed for sale on the Marketplace in the Enjin Wallet

    Digital Collectible items (ERC-1155 tokens) can be directly sold on the Enjin marketplace using the built in features of the Enjin Wallet. This first of a kind feature allows gamers to trade items safely without any risk by using ethereum smart contracts. Items can be listed on the marketplace by using the “sell” feature in the Collectibles tab. The procedure is a 1 step process where seller directly inputs a selling price and confirms by executing the contract on Ethereum (paying gas in the process). The item will be directly listed on the Enjin Marketplace for public purchase.

    Exchange Function

    Enjin’s partners Changelly, Bancor, and Kyber allow users to easily swap between different cryptocurrencies. All you need to do is type in the amount and type of cryptocurrency you want to convert and the cryptocurrency you want to convert it to. The amount you will receive and the details of the transaction will be automatically calculated and displayed you. If more than 1 exchange offers the type of conversion you want, the information will be displayed for you to compare and choose the one that’s best for you. Then all you need to do is press “convert” and it’s done!

    Exchange function
    Enjin wallet’s exchange function

    Marketplace

    The Enjin wallet also allows you to directly access their Marketplace, where you can browse and buy various NFTs. Payment can be made directly from your Enjin wallet.

    Marketplace function
    Enjin’s marketplace for NFTs

    Dapp Browser

    Enjin Dapp Browser Support
    Enjin Dapp Browser Support

    Enjin wallet includes one of the best Decentralized App Browser we’ve ever seen. The clean user interface displaces the various Exchanges, Financial, Games and Social Media Services.

    Remember to check out our Enjin Guide to learn more about Enjin’s ecosystem and what’s next for Enjin.

    Enjin Wallet Tutorial: How to Set Up Enjin Wallet

    Downloading and setting up your Enjin wallet is super easy and most importantly, its FREE.

    First you will need to download the Enjin wallet app from the Apple App Store or Google Play Store.

    Download Enjin wallet

    Open up the app, select “crypto wallet” and then “create wallet“.

    Select "crypto wallet" and then "create wallet"
    Select “crypto wallet” and then “create wallet”

    Select the password you want for your wallet. When setting up your passwords and later backing up your wallet, make sure you are in a secure environment where you are not being recorded. Thieves will be able to access your wallet if they obtain this information.

    Then, select which cryptocurrencies you would want to hold in your wallet. You can always add or remove more types of cryptocurrencies later. Then press “create wallet“.

    Select your password and  cryptocurrencies
    Select your password and the cryptocurrencies you want your wallet to hold

    The app will then ask if you want to backup your wallet. This is so that you can reinstate your wallet at a later date, for example when you change your phone and need to reinstall everything. So it’s highly recommended to do this step, even though it may seem tedious.

    The backup is a 12 word recovery phrase that you will need to correctly re-enter to reinstate your wallet. So keep these 12 words recorded and stored in a safe place. See here for some ideas and tips on how to keep your recovery phrase safe.

    Backing up your wallet
    Backing up your wallet

    You will then be asked to verify your passphrase by entering 2 of your 12 word recovery phrase at random. You will then be taken to the select coins menu where you have another chance to select the coins you want to hold in your wallet. Again, you can choose to add other coins later. If you are happy with the list of coins selected, click “create wallet“. The setup is then completed and you will then be taken to the main page of your wallet.

    Verify passphrase and create wallet
    Backing up your wallet

    How to Send and Receive Cryptocurrency Using Enjin Wallet

    Sending Cryptocurrency

    On the main page of your wallet, select the cryptocurrency you wish to send.

    For this demo I will be sending Bitcoin, so I selected “BTC”.

    Then on the following page (second picture below), select “send“. On this page you can also see your transaction history for this cryptocurrency. Note: the balance shown on the top left hand side of the second picture below is sometimes inaccurate. This is a bug in the app which hasn’t been fixed yet. However this is only a display issue and does not affect your actual wallet balance which is displayed in the larger font.

    On the send page (third picture below), I usually select “Advanced mode” which allows you to type in the number of satoshis per byte you wish to send your cryptocurrency with. The more satoshis per byte, the faster the send and of course the higher the transaction fee.

    Sending cryptocurrency
    Sending cryptocurrency

    On the send page you have 3 options for inputting the receiver’s address, either: (a) type in the address; (b) paste the address; or (c) scan the recipient’s QR code address.

    For the demo I will scan the recipient’s QR code address, so I selected the QR code icon on the top right hand corner, which opens up my phone’s camera, as shown in the second picture below. There I can either choose a QR code from my photo gallery, or in this case, I scanned the QR code of the recipient.

    Input receiving address
    Input receiving address

    Once you’ve scanned the recipient’s QR code you will be brought back to the send page (first picture below) with the recipient’s address filled in. In the second entry you can enter in the amount you wish to send or simply click “ALL” to send the entire balance in your wallet. And in the third entry the number of Satoshis per byte, which as mentioned will determine how fast your transaction will be sent.

    To see how many satoshis per byte I would want to send my cryptocurrency with I go on the website whatthefee. This website gives an estimate of how fast my transaction will go through at any given time (second picture below). On the table, the figures in black represent the percentage likelihood a transaction will take a given length of time. The figures in the middle represent the number of satoshis per byte. So for example, the green shaded entry on the top right hand corner means that with 20.1 satoshis per byte, there would be a 95% chance your transaction will go through in 0.5 hours. The higher the satoshis per byte, the faster my transaction and consequently the higher the transaction fee.

    Enter in the details and confirm
    Enter in the details and confirm

    Once you’ve entered in the recipient’s address, send amount and satoshis per byte, click “next step“. This will bring you to the confirm transaction page (third picture above). Here you can double check that the details are correct, if it is, click “send now“. Now you are all done!

    Receiving Cryptocurrency

    On the main page of your wallet, select the cryptocurrency you wish to receive. If the cryptocurrency you want to receive is not shown, click the “+” button on the top right hand corner, select the coin you want to receive and then click “update coin list”.

    For this demo I will be receiving Bitcoin, so I selected “BTC”. Then on the following page, select “receive“. Your Bitcoin address will then be displayed in the form of a string of letters and numbers, or a QR code representing your address. You can then either (a) copy the address and give it to whoever will be sending your cryptocurrencies; or (b) have them scan your QR code address.

    Note: the balance shown on the top left of the second picture below is sometimes inaccurate. This is a bug in the app which hasn’t been fixed yet. However this is only a display issue and does not affect your actual wallet balance which is displayed in the larger font.

    Receiving cryptocurrency
    Receiving cryptocurrency

    When the cryptocurrency is successfully sent to your wallet, the balance on your main page will be updated. Tip: You can select the small circular arrows next to “value” to display the balance in your local currency or the cryptocurrency itself.

    sucessfully received
    Successfully received- your balance on the main page of the wallet will be updated

    Congratulations! You are all set!

    Successfully set up your Enjin wallet? Learned how to send and receive crypto? Now it’s time to get started with trading Bitcoin and other cryptocurrencies! Check out my course created in collaboration with Jeff Kirdeikis of Uptrennd- Bitcademy: Learn, Invest & Trade Bitcoin – In Under an Hour

    Enjin Wallet 2.0

    Enjin is also currently enrolling users in testing its Enjin Wallet 2.0 Beta, although it’s only available for Android users. This new wallet will be a completely re-written Enjin Wallet from the ground up, including all of the code to ensure better performance, stability and reliability, as well as a completely new UX and design.

    If you want to participate in testing the Enjin Wallet 2.0 Beta, you can sign up here!

    FAQs

    How to download the Enjin Wallet?

    The wallet is available for use on mobile devices powered by iOS or Android operating systems. Download the Enjin wallet on the Apple App Store or Google Play Store.

    Can I import cryptocurrencies from other wallets to the Enjin wallet?

    The Enjin wallet allows coins to be imported from other cryptocurrency wallets. Examples of cryptocurrency wallets are: Bread, Eidoo, Exodus, Coinomi, MetaMask, Trezor Model T, Ledger Nano S, Ledger Nano X and Jaxx.

    The wallet uses an extremely interactive and secure user interface. This eliminates the confusion of copying and pasting addresses.

    How does Enjin bring NFTs to Video Games?

    One of the key features unique to the Enjin Wallet is the ability to bind the wallet to various video games. So together with the ability to send and receive, scan QR codes and their Marketplace, players can obtain NFT tokens representing various in-game items and import them into different video games. This allows players to truly own digital assets – the items are not stored centrally on databases but on the Ethereum blockchain instead. (https://www.hanakaimaui.com/)

  • Blockchain Analytics: Powering The New Data Economy

    Blockchain Analytics: Powering The New Data Economy

    The vast amount of innovations and creativity happening within the crypto space is overwhelming.  Countless projects, protocols, apps, tokens, and communities are launching, layering, merging, forking and growing every day.  It can be a lot to keep up with.

    Fortunately, blockchains are public data sources, and the historical ledger of addresses and transactions is a treasure trove of data, just waiting to be unpacked and explored. Anyone can view the transactions that are occurring in real time and interpret what is happening on the blockchain. However, in its raw form, blockchain data is kind of like binary code: great for machines but tough for humans. What is needed is not only a data platform that can convert it to a more useful form, but also a community of analysts that can give it meaning.

    Enter blockchain analytics. Blockchain analytics is the act of inspecting, identifying, understanding, and visualizing data on a blockchain. Doing so allows users to gain valuable insights that would otherwise be hidden in traditional systems. Just as Google organized the internet of information for consumers and commerce by indexing the World Wide Web, making it accessible without requiring any knowledge about the underlying TCP/IP protocol, blockchain analytics technology is building the pathway for an easy-to-navigate internet of value as well as the emerging data economy.

    What Is Blockchain Analytics?

    Blockchain analytics is the process of analyzing, identifying and clustering data on the blockchain. Blockchain analytics also models and visually represents data in order to identify key information about users and transactions.

    More and more companies operating with cryptocurrencies are using blockchain analytics tools to analyze transactions and assess the level of risks to meet regulatory requirements worldwide. This is done to help stop illicit transactions such as money laundering and fraud from being carried out. 

    Crypto asset transactions carried out are inherently anonymous so blockchain analytics providers help to provide the data needed to match a transaction with a person or company. This helps to keep cryptocurrency markets and transactions safer for everyone. Blockchain analytics can achieve this by scraping blockchain data, which is all public.

    How Does It Work?

    Blockchain analytics providers scrape publicly-available transactional data to tie crypto wallets back to illicit or criminal behavior. Data scraping is the act of collecting and structurally storing and updating data in real-time. This data includes information on which cryptocurrency wallets the cryptocurrency were sent to and from, the type of cryptocurrency, the amount, and the time of the transaction. As for cryptocurrency wallets, they are digital wallets that can send and receive payments. And specifically for those wallets maintained by cryptocurrency exchanges, users must first go through a Know Your Customer (KYC) onboarding processes whereby the personal details of the crypto wallet’s owner are recorded and stored. 

    When a crypto wallet transaction is made, that data is forever on the blockchain. It cannot be altered or erased. Through the scraping of these blockchains, blockchain analytics ties crypto transactions to illicit activity through certain signifiers such as a crypto wallet previously linked to illicit transactions like drug smuggling or terrorist financing. Through that, a wallet or transaction is flagged and given a risk score. When a crypto business or a financial institution works with a blockchain analytics provider, any transaction they undertake can be screened to provide a risk score for the crypto wallet in question.

    If further investigation is needed, a blockchain analytics provider can forward this type of information and analysis to the relevant law enforcement authorities, who can match an identity with an anonymous wallet, via a Suspicious Activity Report (SAR). Because the transactional data in the wallet represents all transactions that the specific cryptocurrency has been used in, an end-to-end trail is thus created.

    The wallet is tagged with a typology by the analytics provider, which ties it to a certain illicit activity that will be flagged in future transactions. The provider will also create a heuristic which clusters transactional wallet data with similar typologies. (Ultram) When multiple wallets are owned by the same person, blockchain analytics can help to determine if transactions carried out by different wallets are actually coming from the same place. 

    Collecting data on the identifiers of illicit transactions is a continuous process. Blockchain analytics is a key line of defense for creating fair and legal crypto environments, helping to discover the source and destination of illicit funds.

    Why Is Blockchain Analytics Important?

    Often hackers and web criminals use cryptocurrency due to its pseudonymous nature. Thanks to blockchain analytics, we now have access to specialized analytics tools that can scan otherwise hard to track the trail of transactional data on public blockchains. Blockchain analytics makes it possible to follow who is buying what and paying for which product and services utilizing cryptocurrency.

    Many blockchain analytics providers help to create these insights by turning blockchain raw data into searchable and executable data that individuals and businesses can easily search and build services on top of. This has tremendous value to regulators, law enforcement, companies and users within the crypto space. 

    Regulators and law enforcement can have full visibility on illicit transactions and track the movement, allowing them to uncover the identities of the criminals over time. Companies are able to have full visibility over transactions made by vendors or third parties and ensure legitimacy of those claims. Users such as traders are able to have visibility on what smart money is doing and make better informed decisions, leveling the playing field. Smart money in crypto represents a new type of economy where knowledge is open and powerful actors’ behavior is revealed.

    All organizations who work within the crypto asset market, whether it be crypto businesses or financial institutions, also need to remain compliant. Blockchain analytics providers can help these financial institutions pursue their compliance efforts. Through blockchain analytics, compliance departments can identify fraudulent or illicit activity, protect themselves from risk and work to create increased trust and transparency within the system and thus maximizing opportunities for growth and profitability. 

    Blockchain Analytics Providers

    Let us take a look at some of the most popular blockchain analytics providers that are developing new insights from raw blockchain data to make it accessible to users of all levels.

    1- Dune

    Dune, formerly known as Dune Analytics, is a powerful tool for blockchain research. It can be used to query, extract, and visualize vast amounts of data on the Ethereum blockchain. Users can simply query the database to extract almost any information that resides on the blockchain. Dune released its free version in 2019. Since that release, Dune has grown exponentially with users from all around the world joining in to leverage the on-chain analytics it provides. 

    Example of a graph visualization from a popular query dashboard
    Example of a graph visualization from a popular query dashboard

    Dune’s strengths are in its open data source. Analysts, traders, and number crunching data enthusiasts make up the community. They create and openly share their queries which can then be forked and remixed in a multitude of ways by others. That is why Dune has been described as the “Github for on-chain analysis.” The secret sauce is the collaborative effort that is built-in to the Dune platform. So instead of dealing with the status quo, siloed sets of dashboards, the queries on Dune Analytics are open source, creating a revolutionary way for their community to harvest and remix blockchain data.

    Dashboard page on Dune Analytics
    Dashboard page on Dune Analytics

    The community version of Dune allows users to conduct any kind of on-chain analysis. Dune converts the raw blockchain data into a readable format, and queries can be completed with SQL. Dune gives its users access to datasets and they can create their charts and dashboards. Users can then share what they are working on. And working with Dune provides one with good education and powerful insights into how on-chain analytics systems work in general.  

    With Dune, users can explore the dashboards and queries of others in the community. It is similar to sharing dashboards on Google Analytics. And by researching the work of others, users can find inspiration to come up with even more queries to find deeper insights.

    It is not much of a stretch to say that Dune is fast becoming the default platform for Ethereum data seekers.

    Use Case: Dune has more than 22,000 different dashboards, a method of discovery. Given that the queries within the dashboards are user-generated, the quality varies. Some may be professional-grade and easy to scan, while others result from a SQL student’s early lessons. These are searchable by name or tags.

    Looking for OpenSea’s monthly volume? There is a dashboard for that. 

    Want to compare it to LooksRare? No problem.

    Intrigued by STEPN’s recent rise? Dune has the info.

    2- PARSIQ

    PARSIQ is the next-generation monitoring and intelligence platform for various blockchains, successfully connecting legal systems and off-chain applications to precious blockchain-based data. PARSIQ’s platform provides a suite of products that handle everything from database querying to instant notifications. The use case of PARSIQ extends not only to the on-chain blockchain but also to the off-chain universe. 

    Transaction tracking for compliance purposes, financial accounting, or building insights on the different properties of competing blockchains are some of the jobs that PARSIQ’s applications perform as off-chain jobs. PARSIQ also provides a tool that monitors and processes blockchain data. Every single blockchain activity that occurs on the platform results in a massive amount of information. All of this circulates through the PARSIQ platform and activates various parts of it. Every product that belongs to the ecosystem has a particular processing subsystem of the platform standing behind it.

    Smart Triggers on PARSIQ
    Smart Triggers on PARSIQ

    With Smart Triggers, users can create “if-this-then-that” workflows, allowing users to watch for a specific on-chain event and initiate downstream actions when they occur. PARSIQ’s Trigger Wizard is a no-code editor that allows users to create Smart Triggers for the most common use cases in just minutes. Smart Triggers can be used for a variety of use cases:

    • Build user notifications — PARSIQ delivers real-time alerts to users when relevant activities occur
    • Expand product functionality — users are able to build capabilities on top of blockchain data without writing custom code
    • Manage risk — PARSIQ instantly detects risky transactions and blacklisted accounts

    In order to solve actual problems and meet the demands of business use cases, PARSIQ introduces the possibility of using various on-demand services and data delivered by third party providers integrated to the PARSIQ platform. Smart Triggers are deployed to the PARSIQ system and continue to circulate the on-chain data. External Data Providers (EDP) are the source of external off-chain or even on-chain data that can be plugged in and additionally combined with Smart Trigger data. With this feature, it is possible to combine the on-chain data with off-chain data, such as market data, risk scoring, forensics information, and more

    Use Case: PARSIQ’s wallet surveillance tools notify wallet holders on every inflow and outflow of funds. Any alert sent by PARSIQ’s transports informs users who are at risk with a potentially exploited wallet in their possession.

    Whitelisting is another useful tool to preserve users’ trigger count. It gives the user control of what they deem trigger worthy transactions. Making frequent transactions & interactions with certain addresses or addresses they are familiar with would be acceptable without triggers, but addresses not whitelisted will trigger alerts. 

    To set up wallet surveillance with PARSIQ, you can refer to this tutorial video.

    3- Elementus

    Elementus is the first universal blockchain search engine and institutional-grade crypto forensic solution. They are building the next generation “Who’s Who” of crypto entities on the blockchain with the best-in-class search and analytics capabilities. Their compliance solution and data analytics platform are being used by key U.S. governmental agencies to solve some of the most high-profile cyber investigations and by financial institutions to build the future of finance and commerce on the bedrock of blockchain and digital currencies.

    Elementus applies data science to restructure underlying blockchain data into a schema optimized around the relationships between blockchain activity, providing valuable context far beyond manual investigations on individual transaction level. The Elementus view provides a powerful clustering and confident entity attribution based on insights that exist tens or even thousands of transactions away. 

    A visualization of token sales created using Elementus
    A visualization of token sales created using Elementus

    As the use of cryptocurrency increases, so does the complexity of investigations. Elementus’s Intelligent Network Expansion technology allows users to generate a network in seconds based on custom parameters relevant to their investigation. 

    Elementus is an agile team of data and computer scientists, analysts, and developers representing alumni of Palantir, Facebook, LinkedIn, Slack, Bloomberg, Credit Suisse, Deutsche Bank, and the United States Intelligence Community (IC).

    Elementus offers several products dedicated to different solutions within its ecosystem:

    • Radar — for compliance solutions. Users are able to extract risk scores for any public blockchain address, consumable via API, real-time alert, or via the Radar user interface.
    • Echo — for custom analytics. Users are able to harness the power of Elementus Analytics paired with the versatility of Palantir Foundry, accessing custom data analysis applications for any use case.
    • Pulse — for investigations. Pulse provides almost instantaneous tracing of funds from source to destination with multi-level entity attribution, powered by proprietary RapidTrace™ and EntityIndex™ technology

    Use Case: Elementus was used to track down billions of stolen bitcoin in a fraud investigation of a YouTube rapper named Razzlekhan and her husband Ilya Lichtenstein. The couple was arrested on federal charges of conspiring to launder a multibillion-dollar trove of bitcoins stolen from cryptocurrency exchange Bitfinex in 2016. The couple was not accused of the theft itself. 

    Analysis provided by Elementus has found that the pair were able to shield the unseized money through a complex series of crypto transfers. Max Galka, the CEO of Elementus, said the bitcoins were moved across more than 20,000 transactions, indicating that some form of automation software was used. 

    According to Galka, some of the unseized bitcoins were transferred through the Russia-based darknet market Hydra. “It’s the largest darknet market in existence,” Galka says. “It is highly unlikely law enforcement has the ability to trace these funds further.” According to Elementus, the last known movement of the unseized cache occurred on January 25th 2022, shortly before the couple’s arrests at their Wall Street apartment.

    4- AllianceBlock

    AllianceBlock is building a globally compliant decentralized capital market by providing a bridge between traditional finance (TradFi) and decentralized finance (DeFi), unlocking trillions of dollars in capital.  The AllianceBlock Protocol is a decentralized, blockchain-agnostic layer 2 that automates the process of converting any digital or crypto asset into a bankable product, simplifying the capital transfer process between regulated and opaque markets.

    The protocol has three main pillars, focusing on compliance and regulation, data, and DeFi technology. The AllianceBlock Data Tunnel is a key component of the data element, and it leverages their partner Ocean Protocol’s technology, as well as partnerships with Parsiq, API3, Covalent, DIA and Chainlink. The Data Tunnel is a data marketplace that makes data accessible to all through a monetized marketplace, while ensuring traceability, transparency, and trust. Data providers and consumers will benefit from increased access to one another, driven through a secure and easy-to-use solution.

    The Data Tunnel dashboard
    The Data Tunnel dashboard

    The AllianceBlock Data Tunnel makes it possible to publish data in a decentralized and simplified manner, without needing to be proficient in DeFi, MetaMask, or private keys. This is crucial to attracting a wider, more mainstream audience. In line with this, the Data Tunnel also simplifies usability for data consumers and developers through a standardized output format. This is in contrast to current offerings, with datasets found in a wide range of formats, making it more difficult for consumers.

    Ultimately, the Data Tunnel aims to become the oracle of oracles, being able to take data from oracles to the Data Tunnel, enhancing this data, and then feeding it back to the oracle providers. The Data Tunnel is chain-agnostic, in line with AllianceBlock’s wider vision, to allow for the greatest access and breadth to both datasets and consumers and to ensure as wide adoption as possible. The AllianceBlock Data Tunnel aims to incentivize data providers to share more data, acting as the conduit through which both DeFi and TradFi users can access and take advantage of increased data opportunities.

    Use Case: Financial institutions are largely excluded from offering investors access to DeFi. Fund distribution is one of the issues. AllianceBlock provides a solution to these issues by offering access to Open Finance that allows all market entities to participate. It is an end-to-end regulatory compliance framework that serves as a bridge between stakeholders and all actors within the capital markets chain. 

    In a traditional fund distribution model, all intermediaries between the investor and fund manager can operate independently. Many may only communicate with the next chain in the link. When they do communicate, it is likely through email correspondence, or, for certain operations, even fax or post. This creates inefficiencies.

    Traditional fund distribution model
    Traditional fund distribution model

    AllianceBlock seeks to create a fund protocol which hosts all of the required activities on one platform. This allows for greater operational transparency and efficiency. 

    The AllianceBlock fund distribution model
    The AllianceBlock fund distribution model

    Learn more here about AllianceBlock’s solution to fund distribution, and to explore more use cases for the platform.

    5- HUBX

    HUBX elevates private placement and loan syndication deal distribution for banks, exchanges, and brokerage firms by connecting into core systems to deliver dynamic data insights and a richer customer experience. In the world of syndicated lending, accessing accurate and timely data is critical for origination and distribution teams to make meaningful and effective decisions. The way data is captured and interpreted constitutes the single most important success criteria to protect and scale capital raising operations. HUBX brings together all relevant data from across an organization to deliver a single source of truth for all participants. 

    Founded in 2015, HUBX platforms facilitate collaboration between banks and their institutional clients, connect syndicate desks with the rest of the organization, and simplify execution. Each network hub is private, ensuring that the clients’ data is always protected. HUBX strives to help banks adapt quickly and seamlessly to the rapid digital transformation that is driving private capital markets today.

    By connecting all participants on their own terms, HUBX will help accelerate deal execution, reduce costs, and introduce standardization and automation into the market. By offering unrivaled customer experience and dynamic insights and tools to their clients, banks are able to harness the true potential of their data and the network effect.

    Use Case: HUBX has partnered with financial software solution developer Finastra to help corporate lenders during the loan syndication process by reducing manual workloads. As a first step, this deal sees HUBX Arranger integrated with Finastra’s back-office loan software Fusion Loan IQ, which is used by 90% of the world’s top 100 banks to process over 70% of global syndicated loans. While the market is worth around $4.5trn annually, much like in private equity, the majority of work is manual and disconnected.

    According to Axel Coustere, HUBX co-founder, “HUBX Arranger provides a key missing link for Finastra’s clients. The ability to digitally scale the arduous syndication process by tackling the lack of end-to-end execution. There are many manual, time consuming steps and a lack of real -time visibility currently associated with this piece of a bank’s business. Not doing this well limits the banks’ ability to manage and improve risk and ultimately reputation.”

    Conclusion: The Rise of Data Analytics

    Modern businesses have been benefiting from data analytics for several years now. According to Forbes, data analytics adoption in enterprises increased from 17% in 2015 to 59% in 2018. Now, only 10% of businesses have refused to utilize big data. One category of data analytics that is poised to change and transform the industry is predictive analytics. It is focused on making predictions about future outcomes based on a massive amount of historical data as well as techniques like machine learning. With this type of technology, enterprises will be able to forecast trends and behaviors.

    The current state of predictive analytics is hardly perfect. A huge obstacle to overcome is getting quality data from different sources and correlating them. Digital agencies and IT firms have their own silos of data and use different tools in obtaining them. There is also the issue of whether there is enough of the right data. When there is not enough for the system to make conclusions from, the results of predictions may be biased and untrustworthy. Blockchain technology might be able to fill the gap in this space. 

    Blockchain’s computational power is gained from multiple connected computers, hence it is powerful enough to properly define the model to be analyzed based on a vast number of data sets. It would use its power to analyze the different stored datasets across computers and pull up the ones that can provide the answer. Furthermore, blockchain may be the cloud equivalent to one physical supercomputer, which makes it accessible to small businesses. Currently, companies that want to utilize predictive analytics have to rely on expensive super machines. With blockchain implemented, the costs to obtain such analytics tools will be greatly reduced.

    As for potential applications, blockchain analytics could be used in marketing strategies. Marketers could be able to prepare for future marketing campaigns with the help of data gained from market realities. The system might be able to forecast price movements for financial markets, including cryptocurrencies.

    The fusion of data and blockchain technology is poised to grow even more in the next couple of years. This could provide an opportunity for blockchain to display its potential as developers continue to experiment.