Cube
Trade
Pro
Advanced trading interface with professional tools
Swap
Exchange cryptocurrencies instantly
Bundles
Trade multiple tokens in a single transaction
Algos
Create and manage automated trading strategies
Portfolio
Portfolio
View your cryptocurrency holdings and performance
Orders
Track your open and completed orders
Transactions
View your complete transaction history
Rewards
Rewards Dashboard
View your rewards and claim loot boxes
Blocks Leaderboard
See top traders competing for block rewards
Referral Leaderboard
See top referrers and track referral rankings
Investors
Investor Resources
Browse investor resources and documentation
Presentation (pdf)
Download investor presentation
Settings
Profile
Your profile and account verification
Subaccounts
Separate portfolios across subaccounts
Address Book
Manage saved withdrawal addresses
Multi-Factor Authentication
Add a verification step for sensitive account actions
API Keys
Connect applications to your account
Onramp
Link bank account to buy crypto
Account Recovery
Manage account recovery setup
Learn
News
Read the latest news, announcements, and updates from Cube Exchange
What-Is Guides
Learn about cryptocurrencies
FAQ
Frequently asked questions about Cube Exchange
Fees
View our transparent fee schedule and pricing information
Security
Learn more about Cube Exchange security
About
About
Learn more about Cube Exchange
Legal
Legal information, terms of service, privacy policy, and risk disclosures
EN
Select Language
EN
English
ES
Español
ID
Bahasa Indonesia
JA
日本語
PL
Polski
PT
Português
RU
Россия
TH
แบบไทย
TR
Türkçe
UK
Україна
VI
Tiếng Việt
ZH-CN
简体中文
ZH-TW
繁體中文
Light
Dark
System
Sign In
/
Foundations
/
Privacy
/
Foundations: Privacy
What Are Stealth Addresses?
Stealth addresses solve a simple but stubborn problem: on a public blockchain, publishing one receiving address lets everyone map your incoming payments. A stealth-address scheme keeps the convenience of a public payment identifier while making each payment land at a different one-time address that only the recipient can recognize and spend from.
Mar 21, 2026
•
25 min read
#PRIVACY
What is Ring Signatures?
Ring signatures solve a very specific problem: proving that *someone in a chosen set* authorized a message without revealing who it was. That simple shift from identity to set membership is why they matter in privacy systems, from anonymous disclosures to private cryptocurrency transactions.
Mar 21, 2026
•
26 min read
#PRIVACY
What Are Shielded Transactions?
Shielded transactions solve a basic tension in blockchains: everyone needs to verify transfers, but not everyone should learn who paid whom and how much. They do this by moving the public ledger from revealing transaction contents to verifying cryptographic commitments and zero-knowledge proofs instead.
Mar 21, 2026
•
26 min read
#PRIVACY
What Are Privacy Coins?
Privacy coins exist because ordinary blockchains reveal more than most people realize. They use cryptography to hide who paid whom and often how much, but the real story is not just secrecy — it is the attempt to preserve fungibility on a public ledger without giving up verifiability.
Mar 21, 2026
•
24 min read
#PRIVACY
What is a View Key?
View keys solve a very specific problem in private blockchains: how can a system hide transaction data from the public while still letting the intended recipient, or an authorized auditor, see what matters? They are the mechanism behind *selective disclosure*—privacy by default, with controlled visibility when the user chooses.
Mar 21, 2026
•
23 min read
#PRIVACY