Cube
Trade
Pro
Advanced trading interface with professional tools
Swap
Exchange cryptocurrencies instantly
Bundles
Trade multiple tokens in a single transaction
Algos
Create and manage automated trading strategies
Portfolio
Portfolio
View your cryptocurrency holdings and performance
Orders
Track your open and completed orders
Transactions
View your complete transaction history
Rewards
Rewards Dashboard
View your rewards and claim loot boxes
Blocks Leaderboard
See top traders competing for block rewards
Referral Leaderboard
See top referrers and track referral rankings
Investors
Investor Resources
Browse investor resources and documentation
Presentation (pdf)
Download investor presentation
Settings
Profile
Your profile and account verification
Subaccounts
Separate portfolios across subaccounts
Address Book
Manage saved withdrawal addresses
Multi-Factor Authentication
Add a verification step for sensitive account actions
API Keys
Connect applications to your account
Onramp
Link bank account to buy crypto
Account Recovery
Manage account recovery setup
Learn
News
Read the latest news, announcements, and updates from Cube Exchange
What-Is Guides
Learn about cryptocurrencies
FAQ
Frequently asked questions about Cube Exchange
Fees
View our transparent fee schedule and pricing information
Security
Learn more about Cube Exchange security
About
About
Learn more about Cube Exchange
Legal
Legal information, terms of service, privacy policy, and risk disclosures
EN
Select Language
EN
English
ES
Español
ID
Bahasa Indonesia
JA
日本語
PL
Polski
PT
Português
RU
Россия
TH
แบบไทย
TR
Türkçe
UK
Україна
VI
Tiếng Việt
ZH-CN
简体中文
ZH-TW
繁體中文
Light
Dark
System
Sign In
/
Foundations
/
Foundations
Core blockchain and crypto concepts: wallets, keys, consensus, and the building blocks of Web3.
#BLOCKCHAIN
#CONSENSUS
#CRYPTOGRAPHY
#DEFI
#EXECUTION
#GOVERNANCE
#INFRASTRUCTURE
#INTEROPERABILITY
#ORACLES
#PRIVACY
#SCALING
#SECURITY
#STAKING
#TOKENS
#TRANSACTIONS
#WALLETS
What Are Staking Rewards?
Staking rewards look like interest at first glance, but they come from a very different mechanism. They are payments for helping a proof-of-stake network stay live, agree on history, and punish bad behavior — which is why the return always comes bundled with rules, lockups, and risk.
Mar 21, 2026
•
24 min read
#STAKING
What is an Airdrop?
Airdrops look simple: give tokens away and users arrive. In practice, they are a distribution mechanism with hard design tradeoffs around cost, eligibility, incentives, and security — and the details of the token standard and chain matter more than most people expect.
Mar 21, 2026
•
25 min read
#TOKENS
What is ERC-1155?
ERC-1155 matters because it changes the unit of token design. Instead of deploying one contract per asset class, it lets a single contract manage many token IDs at once — fungible, non-fungible, and in-between — which makes batch transfers, shared logic, and game-style asset systems much cheaper and cleaner.
Mar 21, 2026
•
23 min read
#TOKENS
What Is Liquid Staking?
Liquid staking solves a simple but important problem: in proof-of-stake systems, earning staking rewards usually means locking up capital. By issuing a tradable token that represents the staked position, liquid staking turns an illiquid protocol claim into something you can hold, trade, or use elsewhere — while introducing new layers of market, smart contract, and centralization risk.
Mar 21, 2026
•
23 min read
#STAKING
What Is Staking?
Staking looks simple — lock tokens, earn rewards — but its real purpose is to make honest behavior cheaper than attacking the chain. Once you see staking as a way to turn capital into security, the mechanics of validators, delegation, unbonding, rewards, and slashing start to fit together.
Mar 21, 2026
•
26 min read
#STAKING
What Is 2FA (Two-Factor Authentication)?
Two-factor authentication matters because passwords fail in a predictable way: they can be guessed, reused, stolen, or phished. 2FA changes the attack from “know one secret” to “break two different mechanisms,” which is why it helps so much — and why some forms of 2FA are much stronger than others.
Mar 21, 2026
•
23 min read
#SECURITY
What is Smart Contract Risk?
Smart contract risk is what happens when software directly controls assets, permissions, and financial logic on a blockchain. The unusual part is not just that bugs exist, but that the bug can become the public, irreversible behavior of the system once the contract is deployed.
Mar 21, 2026
•
26 min read
#SECURITY
What Is Social Engineering?
Social engineering is not mainly about malware or broken cryptography. It is about getting a human to do the attacker’s work: reveal information, grant trust, or approve an action that a system would otherwise block.
Mar 21, 2026
•
25 min read
#SECURITY
What is Transaction Simulation?
Transaction simulation matters because blockchain transactions are hard to undo, but what you sign is often more opaque than it looks. By executing a transaction off-chain first, wallets and developers can preview asset movements, internal calls, and failures before committing real funds.
Mar 21, 2026
•
26 min read
#SECURITY
What is a Re-Entrancy Attack?
A re-entrancy attack happens when a contract gives control to an external contract before finishing its own bookkeeping. That small ordering mistake can let an attacker come back in through the same door repeatedly and withdraw, mint, or manipulate state as if the first action never happened.
Mar 21, 2026
•
25 min read
#SECURITY
What is a Replay Attack?
A replay attack works not by breaking a signature, but by reusing a valid one in a context where it still counts. That simple idea explains why modern systems add nonces, timestamps, session binding, genesis hashes, and chain IDs: they are ways of making “valid once” stop meaning “valid forever, everywhere.”
Mar 21, 2026
•
26 min read
#SECURITY
What Is a Rug Pull?
A rug pull is not just \"a crypto scam.\" It is a failure of control: someone retains the power to change rules, drain liquidity, mint supply, or exploit approvals after users have trusted the system. Understanding rug pulls means understanding where that power lives, how it is hidden, and what controls actually limit it.
Mar 21, 2026
•
23 min read
#SECURITY
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19