All
FAQ
Announcements
Product documents
What are the cryptoassets that are listed on OKX in France?
Bitcoin BTT BitTorrent CEL Celsius Network CELR Celer Network CFG Centrifuge CHZ Chiliz COMP Compound CQT Covalent CRO Crypto.com CRV Curve Finance CSPR Casper Network CVC Civic CVX Convex Finance DAI Dai DOGE Dogecoin DOT Polkadot DYDX dYdX EGLD Elrond ENJ Enjin Coin ENS Ethereum Name Service EOS EOS ETC Ethereum Classic ETH Ethereum ETHW EthereumPoW EURT Tether EUR FET Fetch.ai FIL Filecoin FLOKI Floki FLOW Flow FLR Flare FORTH Ampleforth Governance FTM Fantom FXS Frax Share GAL Galxe GALA Gala GamesPublished on 18 Mar 2024Updated on 9 Feb 20262How do I activate my Pay?
Pay also offers social features, including direct transfers within chats and the ability to create group red envelopes. While transferring digital assets to external wallet addresses is supported, please note that corresponding gas fees will apply.What are the requirements to activate Pay? A successfully registered personal account on our platform. Completed identity verification on the platform. Successful creation of a passkey (Android devices must support Google services).Published on 16 Sept 2025Updated on 28 Jan 20261What documents are accepted as proof of sources of funds from decentralized finance?
Authentic documents as proof of the source of funds Airdrop participation Screen capture that shows proof of the airdrop allocation from the Telegram airdrop games. Transaction history from your cryptocurrency wallet(s) showing the airdrop transaction, including the token name, amount received, and timestamp. Screen capture of your Telegram profile that clearly displays your registered details (for example, username and phone number) confirming ownership.Published on 12 Nov 2024Updated on 9 Feb 202653How do I capture dual-pronged arbitrage opportunities with the OKX ETH/BTC Bot?
The OKX ETH/BTC Bot is a game-changer in the realm of cryptocurrency trading. By capitalizing on the oscillation of the ETH/BTC trading pair, this automated tool empowers users to accumulate both BTC and ETH strategically. With a range of advantages, flexibility, and adaptability to market conditions, the ETH/BTC Bot stands as a beacon of innovation, inviting users to explore the vast potential of dual-pronged arbitrage opportunities in the cryptocurrency market.Published on 6 Mar 2024Updated on 10 Sept 202527What can help prevent P2P crypto scams and protect my assets?
Today, cybercriminals are getting smarter, finessing their art as they cash in on cryptocurrency's growing buzz. Crypto scams are common in peer-to-peer trading (P2P), where a buyer and seller connect directly without a third party or intermediary to buy or sell cryptocurrency. In our platform, our user's security and privacy are of utmost importance. As part of our escrow service we provide to safeguard our user's P2P transactions, we'll hold crypto for the buyer during the transaction.Published on 2 Sept 2023Updated on 12 Feb 20261,460What is the New User Full Rebate Program?
Internal transfers, red packets, P2P sharing orders, or any transfers that do not constitute a market trade.5. What is the reward mechanism for the New User Full Rebate Program? Gift Package Amount Your gift package amount equals 100% of your First Qualifying Trade, calculated in USDT equivalent at the time of the trade. There is a cap amount for total reward. Please refer to landing page for detailed amount.Published on 16 Mar 2026Updated on 22 Apr 20261Zero-Knowledge Proofs: what are zk-STARKs and how do they work? (zk-STARK V1)
For example, in Figure 1, the user with an id of id_k will calculate hashk = hash("20" + "15" + "5" + "id_k" + "99821"), and the other data in the red square frame will be the Merkle path verification. An open source tool is provided for users to do this verification. Since the leaves of the Merkle tree are hashes, none of your private information will be leaked to others.How do I verify? 1.Published on 10 May 2023Updated on 8 Sept 2025179How do I protect my account from Trojan horse takeovers?
Cracked Software and Illegal Downloads Free and unauthorized software activators, game cheats, or pirated media often contain embedded Trojans. These are widely circulated on file-sharing platforms and pose significant security risks to your device. Malicious Websites and Pop-ups Simply visiting a compromised website or clicking on deceptive pop-up ads may trigger an automatic malware download. This is known as a drive-by download.Published on 30 May 2025Updated on 5 Feb 202612What's a futures trading bot and how do you automate trades with it?
Game on!Published on 26 Dec 2023Updated on 29 Oct 202535How do I identify OKX official accounts?
Twitter: if you manage to identify the fake admin according to the identifier, please select More > Block & Report.How should I protect myself from being scammed? Protect your privacy. Never share your login credentials, and passwords, and never send assets to anyone who you haven't verified. We always send out notifications for any events users may wish to participate in. However, we don't provide compulsory advice on participation, investment, or strategic decisions, and so on.Published on 11 Aug 2023Updated on 17 Apr 20265,370
Showing 1-10 of 10 articles