Zero-Knowledge Proof (ZKP)
A zero-knowledge proof lets one party prove a statement is true without revealing any other information. Covers zk-SNARK, zk-STARK, and their use in privacy and rollups.
17/4/2569

A zero-knowledge proof lets one party prove a statement is true without revealing any other information. Covers zk-SNARK, zk-STARK, and their use in privacy and rollups.
17/4/2569
Zephyr (ZEPH) is a Monero-forked privacy coin with an over-collateralized algorithmic stablecoin (ZSD). RandomX CPU mining, ring signatures, stealth addresses.
17/4/2569
Zcash (ZEC) is a privacy-focused PoW cryptocurrency using zk-SNARKs for shielded transactions. Equihash mining, 21M supply, transitioning to PoS via Crosslink.
17/4/2569
Xelis (XEL) is a privacy-focused proof-of-work BlockDAG with homomorphic encryption, smart contracts, and the XelisHash v3 algorithm. GPU-mineable, ASIC-resistant.
17/4/2569
In crypto, whitelist has three common meanings: exchange withdrawal address lists, NFT/token sale access, and smart contract allowlists. Covers all three.
17/4/2569
A white paper is the technical document introducing a crypto project — from Satoshi's 9-page Bitcoin paper to modern yellow papers. Learn what to look for and red flags.
17/4/2569
Whatsminer is the Bitcoin SHA-256 ASIC line made by MicroBT — the #2 Bitcoin ASIC manufacturer after Bitmain. Covers the M-series lineup and how it compares.
17/4/2569
Web3 is the vision of a user-owned internet built on blockchain, wallets, and smart contracts. Covers the core building blocks, real use cases, and honest criticism.
17/4/2569
A crypto wallet stores keys, not coins. Learn the difference between custodial, non-custodial, hot, cold, software, and hardware wallets — and how to pick one.
17/4/2569
Volatility measures how sharply an asset's price swings. Crypto volatility is far higher than traditional assets — key for miners, traders, and risk management.
16/4/2569
A blockchain virtual machine is the sandboxed execution environment that runs smart contracts deterministically across every node. Covers EVM, SVM, and WASM.
16/4/2569
Verification in crypto means checking that something is valid — from transaction signatures to smart contract source code. Different from confirmation.
16/4/2569
A verification code is a short one-time code used to confirm identity. Learn the difference between TOTP, SMS, and email codes and why SMS is the weakest.
16/4/2569
User interface is the visual layer through which users interact with software. Good crypto UI makes complex systems accessible to non-technical users.
16/4/2569
An uncle block is a valid but non-canonical block in Ethereum's former Proof-of-Work network. Uncles were rewarded to offset network latency penalties.
16/4/2569

เลือกแบบที่เหมาะกับคุณ
Kryptex Pool
รับเงินเป็นเหรียญที่คุณขุด — ไม่ต้องสมัครบัญชี ไม่ต้องตั้งค่าเพิ่ม เหมาะสำหรับเครื่อง ASIC, FPGA, GPU และ CPU
Kryptex Miner
แอปเดียวสำหรับพีซี Windows ไม่ต้องสร้างกระเป๋าหลายใบหรือเปลี่ยนเหรียญ ตั้งค่าง่าย จ่ายเงินเสถียร