Author Archives: Crypto
Author Archives: Crypto
On May 21, the US Securities and Exchange Commission (SEC) once again postponed its decision on whether to approve the bitcoin ETF sponsored by VanEck/SolidX.
VanEck/SolidX’s ETF was originally filed with the SEC on June 6, 2018. The SEC has since revealed that it received more than 1,300 comments on the ETF application.
The SEC has delayed it’s decision on many occasions through 2018 and into 2019.
On May 20, the SEC requested a 35-day period for gathering more information. It asked for public input on 14 questions:
“The Commission is instituting proceedings to allow for additional analysis of the proposed rule change’s consistency with Section 6(b)(5) of the Act, which requires, among other things, that the rules of a national securities exchange be ‘designed to prevent fraudulent and manipulative acts and practices, to promote just and equitable principles of trade,’ and ‘to protect investors and the public interest.’”
On April 3, 2019 the U.S. Securities and Exchange Commission (SEC) FinHub released a new document with additional guidelines for distinguishing if ICO’s are in fact “Investment Contracts”.
This new guidance supplements the SEC’s existing criteria for determining if a Digital Asset is a security or not.
The full text available here and is set out below:
1 Framework for “Investment Contract” Analysis of Digital Assets
I. Introduction
If you are considering an Initial Coin Offering, sometimes referred to as an “ICO,” or otherwise engaging in the offer, sale, or distribution of a digital asset,2 you need to consider whether the U.S. federal securities laws apply. A threshold issue is whether the digital asset is a “security” under those laws.3 The term “security” includes an “investment contract,” as well as other instruments such as stocks, bonds, and transferable shares. A digital asset should be analyzed to determine whether it has the characteristics of any product that meets the definition of “security” under the federal securities laws. In this guidance, we provide a framework for analyzing whether a digital asset has the characteristics of one particular type of security – an “investment contract.”4 Both the Commission and the federal courts frequently use the “investment contract” analysis to determine whether unique or novel instruments or arrangements, such as digital assets, are securities subject to the federal securities laws. The U.S. Supreme Court’s Howey case and subsequent case law have found that an “investment contract” exists when there is the investment of money in a common enterprise with a reasonable expectation of profits to be derived from the efforts of others.5 The so-called “Howey test” applies to any contract, scheme, or transaction, regardless of whether it has any of the characteristics of typical securities.6 The focus of the Howey analysis is not only on the form and terms of the instrument itself (in this case, the digital asset) but also on the circumstances surrounding the digital asset and the manner in which it is offered, sold, or resold (which includes secondary market sales). Therefore, issuers and other persons and entities engaged in the marketing, offer, sale, resale, or distribution of any digital asset will need to analyze the relevant transactions to determine if the federal securities laws apply. The federal securities laws require all offers and sales of securities, including those involving a digital asset, to either be registered under its provisions or to qualify for an exemption from registration. The registration provisions require persons to disclose certain information to investors, and that information must be complete and not materially misleading. This requirement for disclosure furthers the federal securities laws’ goal of providing investors with the information necessary to make informed investment decisions. Among the information 2 that must be disclosed is information relating to the essential managerial efforts that affect the success of the enterprise.7 This is true in the case of a corporation, for example, but also may be true for other types of enterprises regardless of their organizational structure or form.8 Absent the disclosures required by law about those efforts and the progress and prospects of the enterprise, significant informational asymmetries may exist between the management and promoters of the enterprise on the one hand, and investors and prospective investors on the other hand. The reduction of these information asymmetries through required disclosures protects investors and is one of the primary purposes of the federal securities laws.
II. Application of Howey to Digital Assets
In this guidance, we provide a framework for analyzing whether a digital asset is an investment contract and whether offers and sales of a digital asset are securities transactions. As noted above, under the Howey test, an “investment contract” exists when there is the investment of money in a common enterprise with a reasonable expectation of profits to be derived from the efforts of others. Whether a particular digital asset at the time of its offer or sale satisfies the Howey test depends on the specific facts and circumstances. We address each of the elements of the Howey test below. A. The Investment of Money The first prong of the Howey test is typically satisfied in an offer and sale of a digital asset because the digital asset is purchased or otherwise acquired in exchange for value, whether in the form of real (or fiat) currency, another digital asset, or other type of consideration.9 B. Common Enterprise Courts generally have analyzed a “common enterprise” as a distinct element of an investment contract.10 In evaluating digital assets, we have found that a “common enterprise” typically exists.11 C. Reasonable Expectation of Profits Derived from Efforts of Others Usually, the main issue in analyzing a digital asset under the Howey test is whether a purchaser has a reasonable expectation of profits (or other financial returns) derived from the efforts of others. A purchaser may expect to realize a return through participating in 3 distributions or through other methods of realizing appreciation on the asset, such as selling at a gain in a secondary market. When a promoter, sponsor, or other third party (or affiliated group of third parties) (each, an “Active Participant” or “AP”) provides essential managerial efforts that affect the success of the enterprise, and investors reasonably expect to derive profit from those efforts, then this prong of the test is met. Relevant to this inquiry is the “economic reality”12 of the transaction and “what character the instrument is given in commerce by the terms of the offer, the plan of distribution, and the economic inducements held out to the prospect.”13 The inquiry, therefore, is an objective one, focused on the transaction itself and the manner in which the digital asset is offered and sold. The following characteristics are especially relevant in an analysis of whether the third prong of the Howey test is satisfied. 1. Reliance on the Efforts of Others The inquiry into whether a purchaser is relying on the efforts of others focuses on two key issues: Does the purchaser reasonably expect to rely on the efforts of an AP? Are those efforts “the undeniably significant ones, those essential managerial efforts which affect the failure or success of the enterprise,”14 as opposed to efforts that are more ministerial in nature? Although no one of the following characteristics is necessarily determinative, the stronger their presence, the more likely it is that a purchaser of a digital asset is relying on the “efforts of others”: An AP is responsible for the development, improvement (or enhancement), operation, or promotion of the network,15 particularly if purchasers of the digital asset expect an AP to be performing or overseeing tasks that are necessary for the network or digital asset to achieve or retain its intended purpose or functionality.16 o Where the network or the digital asset is still in development and the network or digital asset is not fully functional at the time of the offer or sale, purchasers 4 would reasonably expect an AP to further develop the functionality of the network or digital asset (directly or indirectly). This particularly would be the case where an AP promises further developmental efforts in order for the digital asset to attain or grow in value. There are essential tasks or responsibilities performed and expected to be performed by an AP, rather than an unaffiliated, dispersed community of network users (commonly known as a “decentralized” network). An AP creates or supports a market for,17 or the price of, the digital asset. This can include, for example, an AP that: (1) controls the creation and issuance of the digital asset; or (2) takes other actions to support a market price of the digital asset, such as by limiting supply or ensuring scarcity, through, for example, buybacks, “burning,” or other activities. An AP has a lead or central role in the direction of the ongoing development of the network or the digital asset. In particular, an AP plays a lead or central role in deciding governance issues, code updates, or how third parties participate in the validation of transactions that occur with respect to the digital asset. An AP has a continuing managerial role in making decisions about or exercising judgment concerning the network or the characteristics or rights the digital asset represents including, for example: o Determining whether and how to compensate persons providing services to the network or to the entity or entities charged with oversight of the network. o Determining whether and where the digital asset will trade. For example, purchasers may reasonably rely on an AP for liquidity, such as where the AP has arranged, or promised to arrange for, the trading of the digital asset on a secondary market or platform. o Determining who will receive additional digital assets and under what conditions. o Making or contributing to managerial level business decisions, such as how to deploy funds raised from sales of the digital asset. 5 o Playing a leading role in the validation or confirmation of transactions on the network, or in some other way having responsibility for the ongoing security of the network. o Making other managerial judgements or decisions that will directly or indirectly impact the success of the network or the value of the digital asset generally. Purchasers would reasonably expect the AP to undertake efforts to promote its own interests and enhance the value of the network or digital asset, such as where: o The AP has the ability to realize capital appreciation from the value of the digital asset. This can be demonstrated, for example, if the AP retains a stake or interest in the digital asset. In these instances, purchasers would reasonably expect the AP to undertake efforts to promote its own interests and enhance the value of the network or digital asset. o The AP distributes the digital asset as compensation to management or the AP’s compensation is tied to the price of the digital asset in the secondary market. To the extent these facts are present, the compensated individuals can be expected to take steps to build the value of the digital asset. o The AP owns or controls ownership of intellectual property rights of the network or digital asset, directly or indirectly. o The AP monetizes the value of the digital asset, especially where the digital asset has limited functionality. In evaluating whether a digital asset previously sold as a security should be reevaluated at the time of later offers or sales, there would be additional considerations as they relate to the “efforts of others,” including but not limited to: Whether or not the efforts of an AP, including any successor AP, continue to be important to the value of an investment in the digital asset. Whether the network on which the digital asset is to function operates in such a manner that purchasers would no longer reasonably expect an AP to carry out essential managerial or entrepreneurial efforts. Whether the efforts of an AP are no longer affecting the enterprise’s success. 6 2. Reasonable Expectation of Profits An evaluation of the digital asset should also consider whether there is a reasonable expectation of profits. Profits can be, among other things, capital appreciation resulting from the development of the initial investment or business enterprise or a participation in earnings resulting from the use of purchasers’ funds.18 Price appreciation resulting solely from external market forces (such as general inflationary trends or the economy) impacting the supply and demand for an underlying asset generally is not considered “profit” under the Howey test. The more the following characteristics are present, the more likely it is that there is a reasonable expectation of profit: The digital asset gives the holder rights to share in the enterprise’s income or profits or to realize gain from capital appreciation of the digital asset. o The opportunity may result from appreciation in the value of the digital asset that comes, at least in part, from the operation, promotion, improvement, or other positive developments in the network, particularly if there is a secondary trading market that enables digital asset holders to resell their digital assets and realize gains. o This also can be the case where the digital asset gives the holder rights to dividends or distributions. The digital asset is transferable or traded on or through a secondary market or platform, or is expected to be in the future.19 Purchasers reasonably would expect that an AP’s efforts will result in capital appreciation of the digital asset and therefore be able to earn a return on their purchase. The digital asset is offered broadly to potential purchasers as compared to being targeted to expected users of the goods or services or those who have a need for the functionality of the network. 7 o The digital asset is offered and purchased in quantities indicative of investment intent instead of quantities indicative of a user of the network. For example, it is offered and purchased in quantities significantly greater than any likely user would reasonably need, or so small as to make actual use of the asset in the network impractical. There is little apparent correlation between the purchase/offering price of the digital asset and the market price of the particular goods or services that can be acquired in exchange for the digital asset. There is little apparent correlation between quantities the digital asset typically trades in (or the amounts that purchasers typically purchase) and the amount of the underlying goods or services a typical consumer would purchase for use or consumption. The AP has raised an amount of funds in excess of what may be needed to establish a functional network or digital asset. The AP is able to benefit from its efforts as a result of holding the same class of digital assets as those being distributed to the public. The AP continues to expend funds from proceeds or operations to enhance the functionality or value of the network or digital asset. The digital asset is marketed, directly or indirectly, using any of the following: o The expertise of an AP or its ability to build or grow the value of the network or digital asset. o The digital asset is marketed in terms that indicate it is an investment or that the solicited holders are investors. o The intended use of the proceeds from the sale of the digital asset is to develop the network or digital asset. o The future (and not present) functionality of the network or digital asset, and the prospect that an AP will deliver that functionality. 8 o The promise (implied or explicit) to build a business or operation as opposed to delivering currently available goods or services for use on an existing network. o The ready transferability of the digital asset is a key selling feature. o The potential profitability of the operations of the network, or the potential appreciation in the value of the digital asset, is emphasized in marketing or other promotional materials. o The availability of a market for the trading of the digital asset, particularly where the AP implicitly or explicitly promises to create or otherwise support a trading market for the digital asset. In evaluating whether a digital asset previously sold as a security should be reevaluated at the time of later offers or sales, there would be additional considerations as they relate to the “reasonable expectation of profits,” including but not limited to: Purchasers of the digital asset no longer reasonably expect that continued development efforts of an AP will be a key factor for determining the value of the digital asset. The value of the digital asset has shown a direct and stable correlation to the value of the good or service for which it may be exchanged or redeemed. The trading volume for the digital asset corresponds to the level of demand for the good or service for which it may be exchanged or redeemed. Whether holders are then able to use the digital asset for its intended functionality, such as to acquire goods and services on or through the network or platform. Whether any economic benefit that may be derived from appreciation in the value of the digital asset is incidental to obtaining the right to use it for its intended functionality. No AP has access to material, non-public information or could otherwise be deemed to hold material inside information about the digital asset. 9 3. Other Relevant Considerations When assessing whether there is a reasonable expectation of profit derived from the efforts of others, federal courts look to the economic reality of the transaction.20 In doing so, the courts also have considered whether the instrument is offered and sold for use or consumption by purchasers.21 Although no one of the following characteristics of use or consumption is necessarily determinative, the stronger their presence, the less likely the Howey test is met: • The distributed ledger network and digital asset are fully developed and operational. Holders of the digital asset are immediately able to use it for its intended functionality on the network, particularly where there are built-in incentives to encourage such use. The digital assets’ creation and structure is designed and implemented to meet the needs of its users, rather than to feed speculation as to its value or development of its network. For example, the digital asset can only be used on the network and generally can be held or transferred only in amounts that correspond to a purchaser’s expected use. Prospects for appreciation in the value of the digital asset are limited. For example, the design of the digital asset provides that its value will remain constant or even degrade over time, and, therefore, a reasonable purchaser would not be expected to hold the digital asset for extended periods as an investment. With respect to a digital asset referred to as a virtual currency, it can immediately be used to make payments in a wide variety of contexts, or acts as a substitute for real (or fiat) currency. o This means that it is possible to pay for goods or services with the digital asset without first having to convert it to another digital asset or real currency. o If it is characterized as a virtual currency, the digital asset actually operates as a store of value that can be saved, retrieved, and exchanged for something of value at a later time. 10 With respect to a digital asset that represents rights to a good or service, it currently can be redeemed within a developed network or platform to acquire or otherwise use those goods or services. Relevant factors may include: o There is a correlation between the purchase price of the digital asset and a market price of the particular good or service for which it may be redeemed or exchanged. o The digital asset is available in increments that correlate with a consumptive intent versus an investment or speculative purpose. o An intent to consume the digital asset may also be more evident if the good or service underlying the digital asset can only be acquired, or more efficiently acquired, through the use of the digital asset on the network. Any economic benefit that may be derived from appreciation in the value of the digital asset is incidental to obtaining the right to use it for its intended functionality. The digital asset is marketed in a manner that emphasizes the functionality of the digital asset, and not the potential for the increase in market value of the digital asset. Potential purchasers have the ability to use the network and use (or have used) the digital asset for its intended functionality. Restrictions on the transferability of the digital asset are consistent with the asset’s use and not facilitating a speculative market. If the AP facilitates the creation of a secondary market, transfers of the digital asset may only be made by and among users of the platform. Digital assets with these types of use or consumption characteristics are less likely to be investment contracts. For example, take the case of an online retailer with a fully-developed operating business. The retailer creates a digital asset to be used by consumers to purchase products only on the retailer’s network, offers the digital asset for sale in exchange for real currency, and the digital asset is redeemable for products commensurately priced in that real currency. The retailer continues to market its products to its existing customer base, advertises 11 its digital asset payment method as part of those efforts, and may “reward” customers with digital assets based on product purchases. Upon receipt of the digital asset, consumers immediately are able to purchase products on the network using the digital asset. The digital assets are not transferable; rather, consumers can only use them to purchase products from the retailer or sell them back to the retailer at a discount to the original purchase price. Under these facts, the digital asset would not be an investment contract. Even in cases where a digital asset can be used to purchase goods or services on a network, where that network’s or digital asset’s functionality is being developed or improved, there may be securities transactions if, among other factors, the following is present: the digital asset is offered or sold to purchasers at a discount to the value of the goods or services; the digital asset is offered or sold to purchasers in quantities that exceed reasonable use; and/or there are limited or no restrictions on reselling those digital assets, particularly where an AP is continuing in its efforts to increase the value of the digital assets or has facilitated a secondary market.
III. Conclusion
The discussion above identifies some of the factors market participants should consider in assessing whether a digital asset is offered or sold as an investment contract and, therefore, is a security. It also identifies some of the factors to be considered in determining whether and when a digital asset may no longer be a security. These factors are not intended to be exhaustive in evaluating whether a digital asset is an investment contract or any other type of security, and no single factor is determinative; rather, we are providing them to assist those engaging in the offer, sale, or distribution of a digital asset, and their counsel, as they consider these issues. We encourage market participants to seek the advice of securities counsel and engage with the Staff through www.sec.gov/finhub. 1 This framework represents the views of the Strategic Hub for Innovation and Financial Technology (“FinHub,” the “Staff,” or “we”) of the Securities and Exchange Commission (the “Commission”). It is not a rule, regulation, or statement of the Commission, and the Commission has neither approved nor disapproved its content. Further, this framework does not replace or supersede existing case law, legal requirements, or statements or guidance from the 12 Commission or Staff. Rather, the framework provides additional guidance in the areas that the Commission or Staff has previously addressed. See, e.g., Report of Investigation Pursuant to Section 21(a) of the Securities Exchange Act of 1934: The DAO (Exchange Act Rel. No. 81207) (July 25, 2017) (“The DAO Report”); William Hinman, Digital Asset Transactions: When Howey Met Gary (Plastic), Remarks at the Yahoo Finance All Markets Summit: Crypto (June 14, 2018), available at https://www.sec.gov/news/speech/speech-hinman-061418. 2 The term “digital asset,” as used in this framework, refers to an asset that is issued and transferred using distributed ledger or blockchain technology, including, but not limited to, so-called “virtual currencies,” “coins,” and “tokens.” 3 The term “security” is defined in Section 2(a)(1) of the Securities Act of 1933 (the “Securities Act”), Section 3(a)(10) of the Securities Exchange Act of 1934, Section 2(a)(36) of the Investment Company Act of 1940, and Section 202(a)(18) of the Investment Advisers Act of 1940. 4 This framework is intended to be instructive and is based on the Staff’s experiences to date and relevant law and legal precedent. It is not an exhaustive treatment of the legal and regulatory issues relevant to conducting an analysis of whether a product is a security, including an investment contract analysis with respect to digital assets generally. We expect that analysis concerning digital assets as securities may evolve over time as the digital asset market matures. Also, no one factor is necessarily dispositive as to whether or not an investment contract exists. 5 SEC v. W.J. Howey Co., 328 U.S. 293 (1946) (“Howey”). See also United Housing Found., Inc. v. Forman, 421 U.S. 837 (1975) (“Forman”); Tcherepnin v. Knight, 389 U.S. 332 (1967) (“Tcherepnin”); SEC v. C. M. Joiner Leasing Corp., 320 U.S. 344 (1943) (“Joiner”). 6 Whether a contract, scheme, or transaction is an investment contract is a matter of federal, not state, law and does not turn on whether there is a formal contract between parties. Rather, under the Howey test, “form [is] disregarded for substance and the emphasis [is] on economic reality.” Howey, 328 U.S. at 298. The Supreme Court has further explained that that the term security “embodies a flexible rather than a static principle” in order to meet the “variable schemes devised by those who seek the use of the money of others on the promise of profits.” Id. at 299. 7 Issuers of digital assets, like all issuers, must provide full and fair disclosure of material information consistent with the requirements of the federal securities laws. Issuers of digital assets should be guided by the regulatory framework and concepts of materiality. What is material depends upon the nature and structure of the issuer’s particular network and circumstances. See TSC Industries v. Northway, 426 U.S. 438, 449 (1976) (a fact is material “if there is a substantial likelihood that a reasonable shareholder would consider it important” in making an investment decision or if it “would have been viewed by the reasonable investor as having significantly altered the ‘total mix’ of information made available” to the shareholder). 8 See The DAO Report. 9 The lack of monetary consideration for digital assets, such as those distributed via a so-called “bounty program” does not mean that the investment of money prong is not satisfied. As the Commission explained in The DAO Report, “[i]n determining whether an investment contract exists, the investment of ‘money’ need not take the form of cash” and “in spite of Howey’s reference to an ‘investment of money,’ it is well established that cash is not the only form of contribution or investment that will create an investment contract.” The DAO Report at 11 (citation omitted). See In re Tomahawk Exploration LLC, Securities Act Rel. 10530 (Aug. 14, 2018) (issuance of tokens under a so-called “bounty program” constituted an offer and sale of securities because the issuer provided tokens to investors in exchange for services designed to advance the issuer’s economic interests and foster a trading market for its securities). Further, the lack of monetary consideration for digital assets, such as those distributed via a socalled “air drop,” does not mean that the investment of money prong is not satisfied; therefore, an airdrop may constitute a sale or distribution of securities. In a so-called “airdrop,” a digital asset is distributed to holders of another digital asset, typically to promote its circulation. 13 10 In order to satisfy the “common enterprise” aspect of the Howey test, federal courts require that there be either “horizontal commonality” or “vertical commonality.” See Revak v. SEC Realty Corp., 18 F.3d. 81, 87-88 (2d Cir. 1994) (discussing horizontal commonality as “the tying of each individual investor’s fortunes to the fortunes of the other investors by the pooling of assets, usually combined with the pro-rata distribution of profits” and two variants of vertical commonality, which focus “on the relationship between the promoter and the body of investors”). The Commission, on the other hand, does not require vertical or horizontal commonality per se, nor does it view a “common enterprise” as a distinct element of the term “investment contract.” In re Barkate, 57 S.E.C. 488, 496 n.13 (Apr. 8, 2004); see also the Commission’s Supplemental Brief at 14 in SEC v. Edwards, 540 U.S. 389 (2004) (on remand to the 11th Circuit). 11 Based on our experiences to date, investments in digital assets have constituted investments in a common enterprise because the fortunes of digital asset purchasers have been linked to each other or to the success of the promoter’s efforts. See SEC v. Int’l Loan Network, Inc., 968 F.2d 1304, 1307 (D.C. Cir. 1992). 12 Howey, 328 U.S. at 298. See also Tcherepnin, 389 U.S. at 336 (“in searching for the meaning and scope of the word ‘security’ in the [Acts], form should be disregarded for substance and the emphasis should be on economic reality.”) 13 Joiner, 320 U.S. at 352-53. 14 SEC v. Glenn W. Turner Enter., Inc., 474 F.2d 476, 482 (9th Cir.), cert. denied, 414 U.S. 821, 94 S. Ct. 117, 38 L. Ed. 2d 53 (1973) (“Turner”). 15 In this guidance, we are using the term “network” broadly to encompass the various elements that comprise a digital asset’s network, enterprise, platform, or application. 16 We recognize that holders of digital assets may put forth some effort in the operations of the network, but those efforts do not negate the fact that the holders of digital assets are relying on the efforts of the AP. That a scheme assigns “nominal or limited responsibilities to the [investor] does not negate the existence of an investment contract.” SEC v. Koscot Interplanetary, Inc., 497 F.2d 473, 483 n.15 (5th Cir. 1974) (citation and quotation marks omitted). If the AP provides efforts that are “the undeniably significant ones, those essential managerial efforts which affect the failure or success of the enterprise,” and the AP is not merely performing ministerial or routine tasks, then there likely is an investment contract. See Turner, 474 U.S. at 482; see also The DAO Report (although DAO token holders had certain voting rights, they nonetheless reasonably relied on the managerial efforts of others). Managerial and entrepreneurial efforts typically are characterized as involving expertise and decision-making that impacts the success of the business or enterprise through the application of skill and judgment. 17 See, e.g., Gary Plastic Packaging Corp. v. Merrill Lynch, Pierce Fenner & Smith, 756 F.2d 230 (2d Cir. 1985). 18 See Forman, 421 U.S. at 852. 19 Situations where the digital asset is exchangeable or redeemable solely for goods or services within the network or on a platform, and may not otherwise be transferred or sold, may more likely be a payment for a good or service in which the purchaser is motivated to use or consume the digital asset. See discussion of “Other Relevant Considerations.” 20 As noted above, under Howey, courts conduct an objective inquiry focused on the transaction itself and the manner in which it is offered. 21 See Forman, 421 U.S. at 852-53 (where a purchaser is not “’attracted solely by the prospects of a return’ on his investment . . . [but] is motivated by a desire to use or consume the item purchased . . . the securities laws do not apply.”).
Updated December 24, 2018 – How to Avoid Coinbase Fees.
Coinbase is a very popular gateway to access the Crypto world.
And for good reason. It’s easy interface and seamless connections to major banks make it the ideal way for most people to buy Bitcoin, Bitcoin Cash, Ethereum and Litecoin.
But it’s expensive. As you can see, it costs $14 in Coinbase fees just to buy $1000 of ETH.
Over time paying those high Coinbase fees start to add up quickly and can eat into your crypto investment funds.
Well you’re in luck. There is a way to pay zero Coinbase fees.
Instead of buying Bitcoin/Bitcoin Cash/Litecoin/Ethereum directly from Coinbase, Deposit USD into your USD wallet.
Click “Accounts” – “USD Wallet” – “Deposit”
Now go to GDAX.com and click “Create Account”.
You may not know this, but GDAX is Coinbase’s own trading platform. So once you’ve created your GDAX account it will give you the option to link your GDAX and Coinbase accounts.
Now that your GDAX and Coinbase accounts are linked, all you need to do is move some USD into GDAX to buy Bitcoin/Ethereum with.
This step couldn’t be easier. Just click on “Deposit”
Then click on the link for “Coinbase Account”, enter the amount of USD you want to transfer and click “Deposit funds”
Now you have a USD balance sitting in your GDAX trading account.
All you have to do is select whether its Bitcoin, Bitcoin Cash, Ethereum or Litecoin that you want to buy.
Now click on buy at “Limit” (not “Market”).
Choose your desired trade price and amount.
Then click on the “Advanced” drop-drop ensure the “Post Only” box is checked.
Now click Place Your Buy Order.
Note – to ensure you don’t pay any Coinbase or Gdax trading fees (known as maker/taker fees) it’s essential that you select a “Limit” order and that you check the “Post Only” box.
There you have it. You’ve successfully bought your favorite cryptocurrency at the your specific price all without paying Coinbase’s transaction fees. No Coinbase fees or Coinbase commissions. But you still get the safety and security of the Coinbase/Gdax platform.
I hope you’ve found this helpful (and it saves you some money).
This is a short guide to safely buying InsurePal (also known as IPL coin) on the LiveCoin exchange. LiveCoin is a fast-growing exchange where you can buy Altcoins (meaning “alternative coins”).
(Affiliate Disclosure: Some of the links in this post are affiliate links. At no additional cost to you, we’ll earn a commission if you decide to make a purchase after clicking through the link. Read our Affiliate Disclosure.)
InsurePal token (IPL) will be the fuel of the InsurePal platform, used by clients and third-party partners worldwide. It is an application specific token, built on top of existing Ethereum blockchain, allowing us to give the users back the value of the InsurePal insurance network.
To buy the token, you first need to sign up at LiveCoin.
First go to LiveCoin.net.
Go ahead and Register at LiveCoin by adding your personal details.
To sign up for LiveCoin you’ll need a valid email address and create a secure password.
Create a strong Password, click the check boxes for the LiveCoin terms and conditions and the anti-spam captcha.
Click “Register Account”.
You’ll be asked to activate your account before you can log in on LiveCoin.
Go to the email you entered and click on the link sent by LiveCoin to complete the registration process.
Go back to LiveCoin.net and use your new account details to log in.
Before you can buy your new tokens, you need to have funds in your LiveCoin wallet.
Note that you can’t send fiat currency direct to LiveCoin. Instead you need to send your favorite crypto (we recommend ETH or LTC due to low transaction costs and fast transfer times).
The easiest way is to buy crypto at Coinbase.com then send it to LiveCoin.
Back at LiveCoin, click the “Deposit” link on top menu.
You now need to find the deposit address for the specific type of crypto you are transferring over from Coinbase.
In this example we’re using ETH.
Search for “ETH” in the Cryptocurrency Balance field and then click on the “DEPOSIT” button.
You’ll need to check the various acknowledgment boxes and then click the “Show address” button. You ETH deposit address will now appear. Copy and paste that and use that as the destination/outward address at your Coinbase account.
Wait a few minutes and the crypto (ETH in this case) will be credited to your LiveCoin account.
Click on the ‘BUY/SELL’ link at the top menu, near the LiveCoin logo.
Search for the IPL/ETH pair among the list displayed on the page. Do this by selecting the “ETH” tab and clicking on the coin pair you would like to buy.
Under the IPL/ETH chart, you’ll find the Buy IPL section.
The first box with the Amount label is where you enter the number of IPL tokens you plan to buy.
The first box with the Price label displays how much ETH or fraction of ETH you pay to buy each IPL token.
The Total box shows how much Ether in total you are paying for the transaction. This includes any transaction fees by LiveCoin.
Ready to buy?
Go ahead and Click on the “BUY” button.
This content for educational purposes only and should not be considered investment advice or a trading recommendation. Buying any cryptocurrency involves a lot of risk. The cryptocurrency market is highly volatile and any money you invest is at your own risk. TL:DR – crypto is risky, don’t spend money you can’t afford to lose. Now would be a great time to read our full Terms of Use and our Affiliate Disclosure.
Are you new to Bitcoin, Ethereum and cryptocurrencies? Is your head spinning trying to understand confusing new terms?
Don’t worry, we’ve put together a short glossary explaining the most important concepts – all in plain-English.
An address is used to send and receive transactions on a network (e.g. Bitcoin). Usually an address is a very long string of numbers and letters. Typically there are two parts to each address – the Public Key (often just called the “address”) and the Private Key. While generally you can receive assets (incoming transactions) using only your Public Key, you cannot spend assets (outgoing transactions) unless you have the Private Key. See Public Key and Private Key below.
Any cryptocurrency that isn’t Bitcoin. Examples include ether, dash and litecoin.
Acronym for “Anti-Money Laundering”. Laws and regulations designed to prevent the proceeds of criminal activity being converted into (“laundered”) money that appears to come from legitimate sources.
The most well-known cryptocurrency. Bitcoin was the first decentralized cryptocurrency to run on a global peer to peer network, without the need for middlemen and a centralized issuer or backer.
Blocks are chunks of data that carry permanent records of action on the blockchain network.
A record of all transactions that ever occurred. The record or “ledger” grows with each transaction by the addition of new “blocks” to the end. Learn more about the Blockchain here.
An acronym for Bitcoin. A BTC is a single unit of the Bitcoin currency.
This refers to the practice of storing cryptocurrency offline to increase security. Common examples include a hard drive or USB drive, a hardware wallet and a paper wallet. Contrast storing your digital currencies in online wallets or at exchanges. Here is a good explanation of cold storage.
Also known as tokens, cryptocurrencies are representations of digital assets where encryption is used to regulate the generation of currency units and verify the transfer of funds.
An abbreviation for “decentralized application”. A Dapp is an application that is open source, has no central point of control with its consensus data stored on a blockchain.
Distributed ledgers are ledgers in which data is consensually shared and stored across a decentralized network of decentralized nodes. A distributed ledger may be public, private or permissioned.
Where a single token (a bitcoin for example) is spent twice. This problem is unique to digital currencies because such information can be reproduced with relative ease.
Launched in 2015, Ethereum is open-source, public, distributed computing platform and programming language based on blockchain technology.
A government issued currency with status as legal tender, but is not backed by a physical commodity (e.g. gold).
An unregulated means by which a new cryptocurrency project sells its own tokens in exchange for legal tender or other cryptocurrency.
See Private Key and Public Key.
Acronym for “Know Your Customer”. KYC is the due diligence process of a business identifying and verifying the identity of its clients. KYC typically applies financial institutions and other regulated entities.
Market capitalization of a cryptocurrency is the price per unit for the currency, multiplied by the current number of outstanding units in the market. This gives the overall ‘value’ of the cryptocurrency.
Mining is the process where new units of currency are generated by rewarding computers for solving highly complex math problems. This is a computer intensive task and most users join mining pools to combine processing power of multiple machines.
A node is any individual computer that connects to a cryptocurrency network. Typically, the more nodes a network has, the safer the network. Unlike mining, where users receive bounties for successfully confirming transactions, running a node does not provide any financial incentive.
This is the address used to publicly receive cryptocurrency. In the same way that your email address is public, anyone in the world can know your public address in order to send you tokens (e.g. Bitcoin).
A Private Key is a string of letters and numbers that allows you to access (and spend) the tokens or currency in a specific wallet. Private Keys act a lot like passwords to be kept hidden from anyone but the owner of the wallet. Read more here.
An algorithm that rewards users based on the number of coins you own or hold. The more you invest in the coin, the more you gain by mining with this protocol.
An algorithm that rewards users based on the amount of computational power the user provides.
A cryptographic code that allows a user to receive cryptocurrencies into his or her account.
The name used by the unknown person or group persons who created bitcoin. Bitcoin was launched in 2008 and by 2011, Nakamoto vanished with his frequent forum posts and e-mails going silent. Claims in 2016 by Craig Wright, an Australian entrepreneur, that he was Nakamoto were met with skeptisim.
Smart contracts are self-executing contracts with the terms directly written into lines of code. Smart contracts typically exist across a distributed ledger which allows contracts to be carried out between anonymous parties without the need for a central enforcement authority.
A “token” is a representation of an asset, usually for something that has a value. The most common example is coins but crypto tokens can represent a wide variety of assets ranging from shares in a company to voting rights of an entity.
A Russian-Canadian programmer and writer primarily known as a co-founder of Ethereum. You can follow Buterin on Twitter here.
A software program that stores Private Keys and enables the user to view and create transactions on a specific blockchain.
A “whale” is a very wealthy investor or institution active in the cryptocurrency markets.
If you found this resource helpful, please Share with someone who will also appreciate it.
Unless you’ve been hiding under a rock in Outer Mongolia, you’ve heard of Bitcoin. The once-marginalized digital currency may have started as an anonymous way to buy and sell contraband, but over the past few years, it’s become a hot investment vehicle. So what articles do you need to read to familiarize yourself with Bitcoin?
Here’s a list of 7 that should be a huge help in your journey toward Bitcoin expertise.
A super basic summary of the main gist of Bitcoin. This will start you off and walk you through some of the most basic ideas surrounding Bitcoin. It’s also helpful because it’s done through infographics, so it’s a simple introduction. Very simple but very useful.
The old standby, Wikipedia, strikes again. But this time, the article is really informative and has links to every detail of Bitcoin life, from fundamentals to where to spend. It’s helpful to understand some of the deeper thinking around Bitcoin, as well as some of the history. Worth a read.
The underlying fundamental of Bitcoin that keeps it safe and protected from fraud is blockchain technology. Blockchain technology is a distributed ledger, or database, that requires consent from all parties to verify a transaction. Therefore it is inherently free from It’s worth understanding the basics in order to feel safe.
If you’re going to buy Bitcoin, you’ll need a wallet, and not just any wallet, but a digital wallet that will store your Bitcoin. Sound funny? It’s ok – this article will help you understand what a digital wallet is and how it works. You’ll need to have a pretty strong grip on this concept before diving into Bitcoin.
Cryptocurrency is a fancy name for digital currencies, rather than fiat currency issued by a government. While the ways to spend cryptocurrencies like BTC are growing (see the article below), it’s also important to find a way to exchange your Bitcoin for fiat currency like dollars or euros. To do that, you’ll need a cryptocurrency exchange. It’s important to understand cryptocurrency exchanges. The best way to do that is to read some pages, and pick one exchange and open an account. The exchange allows for the purchase and sale of Bitcoin and converts the sale into other fiat currencies.
This site offers weekly price analysis. Just go to the link above and search the author’s name, and you’ll find an up to date price analysis of Bitcoin. It’s worth keeping track of where the market has been in order to know where the market may go from here.
If you’re really wanting to understand what’s going on with Bitcoin down to its very roots, this site is the place to go. The author has compiled an incredible series of articles on the programming roots of the blockchain that is the foundation for Bitcoin. It’s worth taking time to read through the articles, but only if you’re really into understanding everything there is to know about Bitcoin. It’s the equivalent of understanding the complexities of printing a $100 bill, rather than just understanding the value of $100.
With these seven articles, you should be able to go from Bitcoin zero to 60 in a relatively short time. Bitcoin is here to stay, so learning all you can is a good decision.
With new digital assets and crypto projects being launched every day, it can be difficult to keep track of everything.
The cryptocurrency industry has experienced massive growth in the recent months. Some of the popular cryptocurrencies available today include Bitcoin, Ripple, Ethereum, Dash, Bitcoin Cash and Litecoin. But that’s not the end of the list. The latest data confirms that there are 900 more cryptocurrencies in the industry and the number keeps on growing.
But if you’re new to this space or want to learn more about cryptocurrencies, you’re in the right place.
First, keep track of all the latest developments and breaking news on our Coin Street Facebook Page.
Then head on over to these 10 websites that can quickly get you up to speed on all things Bitcoin and Cryptocurrencies.
“How can I keep my Bitcoin safe?”
It’s the most common question we get asked here at Coin Street. Crypto security is a hot topic.
As the price of various cryptocurrencies continues to rise, more and more people are investing in digital assets. And it’s clear from the hundreds of emails we get on this topic that the security of your digital assets is the biggest concern you have.
Here’s the good news. It’s not difficult to dramatically improve your security.
And to give you the peace of mind you deserve, we’ve put together a complete step-by-step guide to keeping your cryptocurrency safe.
Remember, there’s nothing inherently insecure about Bitcoin or cryptocurrency. The security risks are not due to the blockchain technology itself, but rather old-fashioned theft.
As our friends at Chainalysis note, the security risks you face can be grouped into four categories. Phishing, Exploits, Hacks and Ponzi Schemes.
(photo credit Chainalysis)
The good news is that if you follow the simple steps in this Guide, you’ll greatly reduce your chances of falling prey to any of these.
One point needs to be made clear.
YOU are responsible for the security of your own digital assets.
Unlike traditional investments like stocks and bonds, there is no regulated and insured institution whose job it is to keep your assets safe.
Unlike tangible assets like gold, digital assets aren’t “stored” anywhere. Cryptocurrencies like Bitcoin exist only as an entry on a ledger. And they are sent and received through an address which requires a set of keys.
Take Bitcoin for example:
Every Bitcoin address has two keys: a “Public Key” and a “Private Key.”
The Public Key is used to generate your Bitcoin address. It can be shared freely as the place where you want to receive Bitcoin. It acts just like your email address. They main point is that the Public Key can only receive, not send.
Contrast that with your Private Key. This key is what enables someone to move Bitcoin out of a wallet and send it elsewhere. So whoever has the Private Key has control of the contents of that wallet.
Note, for a more in-depth explanation of Public and Private Keys, check out our Crypto Terms in Plain English post.
So ultimately securing your digital assets all comes down to keeping your Private Key safe.
Before we discuss how to keep your Private Keys safe, you must take some basic security measures.
Honestly, these really aren’t just for cryptocurrency. Anyone with an online presence should implement these.
Before we go any further, you need to make sure your computer itself is secure and free from viruses.
The easiest way to do this is to install and run Malwarebytes.
Once you’ve done that, you can move on to Step 2.
The next step to take is to ensure that your computer is running all the latest manufacturer software. This means you should download and install all system updates and security patches.
This isn’t difficult to do – simply follow the easy steps in these links:
Updates for Windows PCs
Updates for Macs
Now that your computer is up to date and free of any nasty viruses, it’s time to talk passwords.
Hands up if you’ve been using the same password for more than 6 months? A year? Longer?
Ok, how about this one. Do you re-use the same passwords for multiple sites?
Don’t feel bad, you’re in good company as the vast majority of us either use weak passwords or reuse passwords. I know it’s a major hassle to use strong and updated passwords.
And that’s where a password manager comes in.
A password manager will create and store secure, random passwords across all your accounts. All your (now super strong) passwords will be stored encrypted on their servers. It’s incredibly convenient. Now you only need to remember your “master” password that you use to log-in to the password manager vault.
It’s pretty simple to set up.
First, you download and install an extension for your browser. Google Chrome is our preferred choice.
To set up your account, you’ll use your email address and you’ll need to come up with a master password.
Now, given how important it is to keep your “vault” safe, you should make this password crazy strong. Make it something long, throw in some numbers and symbols.
Remember it and write it down and keep it stored in a secure location.
Next, you tell the password manager about your various accounts. You can import passwords you have stored elsewhere or store the details the next time you log-in to a site. This will create your “vault” of stored passwords.
Now when you need to log in to any of your stored sites, you’ll see the small red square at the top right of your screen. This shows you that Lastpass has recognized the site and has your details ready to go.
All you need to do is click on the small grey box in the login field and Lastpass will give you the option to log in using the stored details. Just click on the pop-up and Lastpass will auto-complete the username and password details.
Which password manager is best? Well, we recommend Lastpass. LastPass is the leading online password manager because it’s easy to use and very secure.
Even better. LastPass lets you implement stronger two-factor authentication (we’ll discuss that next).
You can try their premium service for free for 14 days here.
Creating ultra-strong passwords (and freshening them up every so often) is a must-do. But even that leaves you open to risk.
The next step is to enable Two-Factor Authentication — or 2FA — on your most valuable online accounts.
Think of 2FA as a second layer of protection over and above your password.
It’s pretty simple. The best kind of 2FA is what’s known as a One-Time Password (OTP).
This is a short – usually 6-digit – number that you need to input to access your online accounts. After you’ve logged-in with your standard username and password.
Here’s the catch.
The OPT changes every 60 seconds and you need to have the mobile app such as Google Authenticator physically with you to get the latest code.
Here’s one very important warning. Make sure you disable the option of unlocking your 2FA by being sent a SMS text message. We’ll discuss it more later, but for now just understand that its easy for hackers to get control of your SMS phone number. This means hackers can “recover” access to your secured account just via that number. So, avoid using SMS for 2FA, especially on anything of value.
So even if someone steals your password, it’s useless unless they also have your mobile app. And they won’t, because it will be secure on your smart phone.
We like the Google Authenticator app. It’s easy to install on both iPhone and Android and works with all major online sites that require that extra level of security (hint – any website you use for cryptocurrencies!).
For a step-by-step guide on how install and use Google Authenticator, you can check out the official Google guide here.
Once you have the Google app installed on your phone, its time to visit each of your accounts and enable 2FA protection. The process differs on each website, but the option is usually found in either the Settings or Security sections of “My Account”.
The fifth and final “basic” security step you should take is to secure your phone.
First up, make sure you require a password or pin to unlock your phone. That way if it’s ever lost or stolen, there’s a secure wall between a potential hacker and sensitive information.
The final thing to address is kind of shocking. It turns out hackers are contacting cellphone carriers and tricking them into transferring or “porting” your phone number to a new device.
Why would they want to do this?
Think for a minute about the last time you tried resetting your password on a website. It probably sent you a confirmation code to ensure that the password reset was valid, right? And, often, I bet one of the options was to receive that code by SMS or text message.
Now you see the damage a thief could do if they got those codes on their newly-ported cellphone. Instead of yours.
Poor Cody Brown had $8000 of Bitcoin stolen using this method – you can read his story here.
Unfortunately, there doesn’t seem to be a perfect way of avoiding being the victim of phone porting. Each cell provider has their own procedures and security requirements.
For a more detailed analysis on preventing phone porting, read Krakken’s excellent blog post.
Now that all you’ve finished your basic online security improvements, it’s time to talk crypto safety.
As the value of cryptocurrencies goes up so does the chance of being a theft target. .
One of the most common ways to fall victim to crypt theft is through Phishing. “Phishing” (pronounced “fishing”) is where legitimate looking websites trick you into giving away their important security information. Here likely your passwords and Private Keys.
The most common examples are where you click on a link in an email, chat message or website. The link takes you to a website that looks authentic but is in fact a clone set up by the thief. Online banking sites used to be the most common target for phishing attempts. But now cryptocurrency wallets are being targeted.
Here’s a recent example for the cryptocurrency Omisego. This link was shared around various social media sites.
Like in the Omisego example, you can spot a Phishing site by the incorrect website URL. (Here it was a .com.co URL). Unfortunately sometimes these URLs are so close, it’s tough to spot the fakes.
So how do you avoid being a Phishing victim?
There are a few easy steps you can take.
First, avoid clicking on links that you see on websites or in messages. This may sound hard, but you shouldn’t be relying on these types of links to take your most trusted sites.
This leads us on to the second precaution.
There will be a short list of “core” sites you use most often. Maybe it will be Coinbase (for buying cryptocurrency), Bittrex (for trading) and an online transaction searching site such as Etherscan.
Whatever your list looks like, there’s no reason why you should be clicking on links or using Google to get there. Instead, use bookmarks. The first time you visit the site, double and triple check the URL and then save the URL to your Bookmarks.
Then always, ALWAYS, use the Bookmark link going forward. No more Google, no more links from Facebook and no more typing the site address in by hand.
Remember when we said you should be using a Password Manager like Lastpass? Well as an added bonus, it will protect you against Phishing sites.
How?
When you visit a site that’s stored in your vault, Lastpass will recognize it and auto populate the login fields.
Lastpass isn’t tricked by fake URLs that look ‘similar’. It only recognizes the website’s official URL and won’t give you the auto-fill option if you happen to land on a Phishing site. That alone is always a red flag suggesting you’ve landed on a phishing site.
The final piece of advice is simple. Don’t EVER give out your Private Key online. It’s yours and no other website has any reason to need it. If a site asks you for your Private Key it should set off alarm bells in your head.
Think of it like someone asking for your debit card PIN number, your social security number and your mom’s maiden name all at once.
Just don’t give it out. Seriously.
A web wallet is any kind of service where a third party hosts your Private Keys. We get it, these are convenient. But your private keys are being stored online outside your direct control. This makes web wallets vulnerable to hacks.
If it’s absolutely necessary to use a web wallet, do your research first. Only choose the service that can has the very best reputation for security.
Even then, only use web wallets like your checking account. Only keep the smallest amounts that you need in the very near future. Anything above this should be stored in more-secure ways.
Mobile wallets are just web wallets accessible through a smartphone app. That makes them even more of a security risk that web wallets. If you lose your phone or your phone is hacked your funds are gone forever. These may be useful to store small amounts of “spending cash” but nothing more.
What applies to Web Wallets applies double to Mobile Wallets.
Online cryptocurrency exchanges are a necessary evil. At some point you’ll want to trade some of your base currencies (Bitcoin or Ethereum) into other assets. And that’s where an exchange comes into play.
It’s unrealistic to think that you’ll never leave currency on these exchanges. How else are you going to be able to take advantage of price dips if you don’t have funds available to invest?
Unfortunately there have been many high-profile thefts from exchanges (see Mt.Gox and BTC-E).
So how to protect yourself against exchange theft while also being able to trade?
We’ve spent long enough talking about what not to do. Now it’s time to discuss how you should keep your crypto safe online.
Using a Desktop Wallet is far more secure than web or mobile wallets. Here, you store your Private Keys on your local machine, not online. You still run the risk that when your computer gets infected with a virus or someone manages to hack in to steal your Keys.
One way to further protect yourself is to encrypt your wallet using a very strong password. It’s best not to trust this password with an online password manager. Instead pick a password that is long but that you’ll remember. Next, write it down somewhere offline. Make multiple copies of the written-down password and store them in separate physical locations.
As we explained above, you’re still vulnerable to attack even when using a Desktop Wallet.
For that reason, it’s better to keep your Private Keys in an offline location. This is what’s known as “Cold Storage”.
For the 99.9% of time that you don’t need access to your Private Keys, they stay away from the internet. It’s only when you need to make a payment or transfer online that you expose the offline location to the internet. Compromising a cold wallet is very difficult without physical access to the device.
The most secure cold storage systems are Paper and Hardware Wallets
A Paper Wallet is exactly what it sounds like. You store your Private Keys on a physical piece of paper. Creating a completely secure paper wallet does require some technical knowledge. Here is a guide that walks you through the process of creating a secure paper wallet step by step.
The paper wallet process is complex. So we prefer storing Private Keys on a Hardware Wallet.
Hardware wallets have become very popular. And it’s because they provide cold storage without any technical knowledge. Even better, the setup process is very simple to follow.
These are encrypted USB drives that run their own special operating system. Their only purpose is to protect your Private Keys. They never reveal them – even if you need to connect the device to the internet.
When you want to make a transaction, you attach a hardware wallet to an online machine. It processes the transaction using the Private Keys but without ever revealing them. That way, even if the computer is infected with malware or a virus, there’s no way your Private Keys can be accessed. Even better, no personal information is required to set up your hardware wallet. So there’s no personal identifying data that can be leaked.
Ledger Nano: this is a wallet in a USB stick that is plugged directly into your computer’s USB port to when you need to transfer coins. Buy the Ledger Nano S on Amazon here.
TREZOR: this is like the Nano except that it offers a screen. This means you can confirm transactions on the TREZOR itself, meaning it can still be used even if the computer it’s plugged into is infected. Buy TREZOR on Amazon here.
This has been a long post. But don’t use that as an excuse for not improving your online security right now.
Remember, you don’t have to be perfect.
The goal is simply to make yourself a harder than average target. There will always be theft and people will always fail to take even basic security steps. Just make sure it’s not you.
When you’re being chased by a bear in the woods, you don’t need to be faster than it is. Just faster than the person running next to you!
Seriously, stop what you’re doing right now and protect yourself.
I hope you’ve found this Ultimate Guide helpful (and it saves you from being a victim of theft).
This is a short guide to safely buying CanYa (also known as CAN coin) on the Kucoin exchange.
(Affiliate Disclosure: Some of the links in this post are affiliate links. At no additional cost to you, we’ll earn a commission if you decide to make a purchase after clicking through the link. Read our Affiliate Disclosure.)
CanYa is a peer to peer market of skilled services – where users are instantly connected to service providers.
CanYa launched its initial product to Australia in 2017 and conducted its ICO to fund expansion into the international market as well as launching CAN token. Being able to bring a skilled services marketplace to the cryptocurrency community allows instant spending of crypto for real services – bringing value to the ecosystem. On top of this, CanYa also benefits cryptocurrency by allowing us to bring crypto to those who want a skilled services marketplace but who are yet to become familiar to cryptocurrency.
To buy the token, you first need to sign up at Kucoin.
First go to Kucoin.
Next you need to click on the “Sign up” link.
Go ahead and Register at Kucoin by adding your personal details.
To sign up for Kucoin you’ll need a valid email address and create a secure password.
You’ll be asked to activate your account before you can log in on Kucoin.
Go to the email you entered and click on the link sent by Kucoin to complete the registration process.
You may need to check your spam folder.
We strongly recommend you set up 2 factor authorization (2FA) on your account.
Go back to Kucoin and use your new account details to log in.
Before you can buy your new tokens, you need to have funds in your Kucoin wallet.
Note that you can’t send fiat currency direct to Kucoin. Instead you need to send your favorite crypto (we recommend ETH or LTC due to low transaction costs and fast transfer times).
The easiest way is to buy crypto at Coinbase.com then send it to Kucoin.
You now need to find the deposit address for the specific type of crypto you are transferring over from Coinbase.
In this example we’re using ETH.
First, click the dollar ($) symbol to open the deposit page
Then click on the “Deposit” button and search for ETH.
Now, copy the ETH Deposit Address and use that as the destination/outward address at your Coinbase account.
Wait a few minutes and the crypto (ETH in this case) will be credited to your Kucoin account.
Click on the ‘Markets’ link at the top menu, next to the Kucoin logo. And navigate to the ETH tab.
Search for the CAN/ETH pair among the list displayed on the page. You can type CAN in the search bar if you can’t find it.
This will take you into a trading screen like the one below. It’s straightforward to purchase from here.
Under the CAN/ETH chart, you’ll find the Buy CAN section.
The first box with the Price label displays how much ETH or fraction of ETH you pay to buy each CAN token.
The second box with the Amount label is where you enter the number of CanYa Tokens you plan to buy.
You can also use the ratio slider to indicate what percentage of your funds you want to spend. sliding to 100% button uses all the ETH in your account. 50% uses 50% etc. If you use the percentage buttons, the number of tokens you can buy will be automatically entered into the Amount box.
The Total box shows how much Ether in total you are paying for the transaction. This includes any transaction fees by Kucoin.
Ready to buy?
Go ahead and Click on the “BUY CAN” button.
This content for educational purposes only and should not be considered investment advice or a trading recommendation. Buying any cryptocurrency involves a lot of risk. The cryptocurrency market is highly volatile and any money you invest is at your own risk. TL:DR – crypto is risky, don’t spend money you can’t afford to lose. Now would be a great time to read our full Terms of Use and our Affiliate Disclosure.
This is a short guide to safely buying Deepbrain Chain (also known as DBC coin) on the Kucoin exchange.
Leveraging blockchain technology, we developed a decentralized, low-cost, and private AI computing platform. We also provide perfect peripheral products.
The DeepBrain Chain token, the DeepBrain Coin (DBC), is traded via smart contract based on NEO. The mining node is incentivized through a system designed through smart contracts.
DeepBrain Chain is a decentralized neural network. Countless mining nodes across the world will supply computational power for AI use to meet world-wide enterprise demand. Mining nodes receive DBC as compensation. The GAS fee each enterprise need to pay is far less than the intrinsic fee.
The DeepBrain Chain is also a secure data trading platform that allows both parties to not worry about data leakage or reselling. Blockchain technology is used to realize the explicit separation of data ownership and data usage rights. Thus, the value of data will be promoted greatly.
To buy the token, you first need to sign up at Kucoin.
First go to Kucoin.
Next you need to click on the “Sign up” link.
Go ahead and Register at Kucoin by adding your personal details.
To sign up for Kucoin you’ll need a valid email address and create a secure password.
You’ll be asked to activate your account before you can log in on Kucoin.
Go to the email you entered and click on the link sent by Kucoin to complete the registration process.
You may need to check your spam folder.
We strongly recommend you set up 2 factor authorization (2FA) on your account.
Go back to Kucoin and use your new account details to log in.
Before you can buy your new tokens, you need to have funds in your Kucoin wallet.
Note that you can’t send fiat currency direct to Kucoin. Instead you need to send your favorite crypto (we recommend ETH or LTC due to low transaction costs and fast transfer times).
The easiest way is to buy crypto at Coinbase.com then send it to Kucoin.
You now need to find the deposit address for the specific type of crypto you are transferring over from Coinbase.
In this example we’re using ETH.
First, click the dollar symbol to open the deposit page
Then click on the “Deposit” button and search for ETH.
Now, copy the ETH Deposit Address and use that as the destination/outward address at your Coinbase account.
Wait a few minutes and the crypto (ETH in this case) will be credited to your Kucoin account.
Click on the ‘Markets’ link at the top menu, next to the Kucoin logo. And navigate to the ETH tab.
Search for the DBC/ETH pair among the list displayed on the page. You can type DBC in the search bar if you can’t find it.
This will take you into a trading screen like the one below. It is straightforward to purchase from here.
Under the DBC/ETH chart, you’ll find the Buy DBC section.
The first box with the Price label displays how much ETH or fraction of ETH you pay to buy each DBC token.
The second box with the Amount label is where you enter the number of Deepbrain Chain you plan to buy.
You can also use the ratio slider to indicate what percentage of your funds you want to spend. sliding to 100% button uses all the ETH in your account. 50% uses 50% etc. If you use the percentage buttons, the number of tokens you can buy will be automatically entered into the Amount box.
The Total box shows how much Ether in total you are paying for the transaction. This includes any transaction fees by Kucoin.
Ready to buy?
Go ahead and Click on the “BUY DBC” button.