Cube
Trade
Pro
Advanced trading interface with professional tools
Swap
Exchange cryptocurrencies instantly
Bundles
Trade multiple tokens in a single transaction
Algos
Create and manage automated trading strategies
Portfolio
Portfolio
View your cryptocurrency holdings and performance
Orders
Track your open and completed orders
Transactions
View your complete transaction history
Rewards
Rewards Dashboard
View your rewards and claim loot boxes
Blocks Leaderboard
See top traders competing for block rewards
Referral Leaderboard
See top referrers and track referral rankings
Investors
Investor Resources
Browse investor resources and documentation
Presentation (pdf)
Download investor presentation
Settings
Profile
Your profile and account verification
Subaccounts
Separate portfolios across subaccounts
Address Book
Manage saved withdrawal addresses
Multi-Factor Authentication
Add a verification step for sensitive account actions
API Keys
Connect applications to your account
Onramp
Link bank account to buy crypto
Account Recovery
Manage account recovery setup
Learn
News
Read the latest news, announcements, and updates from Cube Exchange
What-Is Guides
Learn about cryptocurrencies
FAQ
Frequently asked questions about Cube Exchange
Fees
View our transparent fee schedule and pricing information
Security
Learn more about Cube Exchange security
About
About
Learn more about Cube Exchange
Legal
Legal information, terms of service, privacy policy, and risk disclosures
EN
Select Language
EN
English
ES
Español
ID
Bahasa Indonesia
JA
日本語
PL
Polski
PT
Português
RU
Россия
TH
แบบไทย
TR
Türkçe
UK
Україна
VI
Tiếng Việt
ZH-CN
简体中文
ZH-TW
繁體中文
Light
Dark
System
Sign In
/
Foundations
/
Foundations
Core blockchain and crypto concepts: wallets, keys, consensus, and the building blocks of Web3.
#BLOCKCHAIN
#CONSENSUS
#CRYPTOGRAPHY
#DEFI
#EXECUTION
#GOVERNANCE
#INFRASTRUCTURE
#INTEROPERABILITY
#ORACLES
#PRIVACY
#SCALING
#SECURITY
#STAKING
#TOKENS
#TRANSACTIONS
#WALLETS
What is a Honeypot Token?
A honeypot token solves a scammer’s hardest problem in a decentralized market: how to let people buy while quietly making exit impossible. The trap often looks like an ordinary token trade, but the key behavior is asymmetric permission — entry is open, selling is blocked, taxed into uselessness, or selectively allowed only for insiders.
Mar 21, 2026
•
23 min read
#SECURITY
What Is Phishing?
Phishing is not mainly a malware problem or an email problem. It is a decision-manipulation problem: an attacker gets a real person to authenticate the wrong thing, trust the wrong interface, or approve the wrong action. That is why phishing keeps working even as technical defenses improve.
Mar 21, 2026
•
25 min read
#SECURITY
What is Bug Bounty?
Bug bounty programs try to solve a hard security problem: the people best able to find your flaws often live outside your organization. By turning unsolicited hacking into a structured, authorized, and rewarded reporting process, bug bounties can uncover real vulnerabilities earlier—but only if scope, triage, remediation, and safe harbor are designed well.
Mar 21, 2026
•
24 min read
#SECURITY
What is a Flash Loan Attack?
A flash loan attack looks like a lending exploit, but the loan is often just the fuel. The real failure is usually elsewhere: a protocol trusts a price, balance, or accounting rule that can be distorted for one transaction, and flash liquidity makes that distortion cheap enough to exploit.
Mar 21, 2026
•
23 min read
#SECURITY
What is Allowlist/Blocklist?
Allowlists and blocklists look similar on the surface: both are just lists of things to permit or deny. But they embody very different security assumptions. The difference between “allow known good” and “block known bad” explains why these controls are useful, where they fail, and why they show up everywhere from login systems to crypto exchange withdrawals.
Mar 21, 2026
•
24 min read
#SECURITY
What Is an Anti-Phishing Code?
An anti-phishing code is a simple idea with a narrow job: give you a secret marker that legitimate account emails include, so fake ones are easier to spot. It helps against exchange impersonation, but it is not magic — its value depends on what channel it covers, whether you actually check it, and how strong the platform’s email security is underneath.
Mar 21, 2026
•
23 min read
#SECURITY
What Is an Audit Trail?
An audit trail is the difference between 'something happened' and 'we can reconstruct what happened, who did it, and whether the record can be trusted.' In security, that distinction matters during incidents, internal investigations, compliance reviews, and everyday operations where accountability has to survive mistakes and attacks.
Mar 21, 2026
•
26 min read
#SECURITY
What Is a ZK Rollup?
ZK rollups solve a strange problem: how can a blockchain trust computation it did not perform itself? Their answer is to execute transactions offchain, publish the data needed to reconstruct state, and attach a succinct proof that the new state is correct.
Mar 21, 2026
•
23 min read
#ROLLUPS
What Is Address Poisoning?
Address poisoning looks trivial at first: a scammer sends you a worthless transfer. The danger is not the transfer itself, but the false memory it plants in your wallet history, where a lookalike address can later be mistaken for a trusted recipient and turn a routine payment into an irreversible loss.
Mar 21, 2026
•
22 min read
#SECURITY
What is Validium?
Validium is an unusual scaling design: it keeps the strongest part of a ZK rollup — cryptographic proof that state updates are valid — while moving the heaviest part, transaction data, off-chain. That trade changes fees, throughput, privacy, and trust assumptions all at once.
Mar 21, 2026
•
24 min read
#ROLLUPS
What is Volition?
Volition exists because data availability is where many rollup costs and trust assumptions actually live. It gives users or applications a choice: pay for on-chain data when you want stronger recovery guarantees, or keep data off-chain when lower cost or confidentiality matters more.
Mar 21, 2026
•
24 min read
#ROLLUPS
What is Restaking for L2 Security?
Restaking for L2 security tries to answer a hard question: how can a rollup or related service get meaningful security before it has its own large validator economy? The idea is to reuse already-staked assets as collateral for additional duties, but the details matter because shared security is never the same as native security.
Mar 21, 2026
•
25 min read
#ROLLUPS
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19