πŸ”
bloXsafe
  • πŸ•ΈοΈWelcome to bloXbook
  • πŸ“šKnowledge Base
    • 🌏Understanding Blockchain
      • What is a Blockchain?
      • What is a blockchain address?
    • πŸ—οΈUnderstanding Private & Public Keys
      • What is a private key
      • What is a public key?
      • How are Private and Public keys generated?
      • Seed Phrases
        • What is a Seed Phrase?
        • Why to use Seed Phrases
        • How a Seed Phrase works?
        • Types of Seed Phrases
        • The BIP39 Standard
        • Types of Backup
      • Can someone guess my keys?
      • What if I lose my Private Keys or Seed Phrase?
      • What if I lose my public key?
    • 🌱Understanding Send & Receive processes
      • Basic Concept
      • Detailed but Simplified
    • πŸ’°Understanding Wallets
      • What is a Crypto Wallet?
      • Cold vs Hot Wallets
      • Categories of Wallets
      • Why not to use a Hot Wallet?
      • What is a Hardware Wallet?
        • Why Trezor?
        • BitBox02
      • Multi-Sig(nature) Wallets
    • 🧾Understanding Decentralisation & Blockchains.
      • What is Decentralisation in the Blockchain era?
      • Decentralized Network
      • Censorship Resistance and Security
      • Consensus Mechanisms
      • Immutable Ledger
      • Decentralized Applications (dApps)
      • Pros and Cons of a decentralised Blockchain network
      • Pros and Cons of a centralised Blockchain network
      • Hybrid Blockchain Networks
        • Pros and Cons of a hybrid Blockchain network
    • 🧭Understanding Decentralized Autonomous Organizations (DAOs)
    • βš™οΈUnderstanding Decentralised Applications (DApps)?
    • πŸ“”Understanding Smart Contracts
      • Risk associated to Smart Contracts
    • πŸ”What is a Blockchain explorer?
  • πŸ’±Understanding Centralised Exchanges (CEX)
    • Why it's not the best place to be?
    • Mitigating the risk of CEXs
    • Why Proof of Reserves says nothing
    • Key ellement of CEXs
  • πŸ’±Understanding Decentralised Exchanges (DEX)
    • What is a DEX
    • Types of DEXs
    • Risk involved using DEXs
  • Understanding coins & tokens
    • Understanding ERC, BRC, TRC, etc
  • πŸ’²Understanding Stablecoins
    • What is a Stablecoin?
    • Main types of Stablecoins
    • What is the risk involved in stablecoins?
    • Mitigating the risk of stablecoins
  • Understanding DeFi
    • Understanding liquidity pools
    • Understanding lending & borrowing protocols
    • Understanding yield farming
    • Understanding oracles
    • Understanding slippage
    • Understanding how DEXs work
      • Understanding AMMs
      • Understanding order book
      • Understanding aggregators
    • Risk involved using DeFi DAPPs
  • πŸ„β€β™€οΈStaying Safe
    • Safety
    • Security
    • Privacy
  • Recommendations
    • Recommended Practises
      • First thing to do after you setup your wallet
      • Using VPN Kill Switch
      • Software Updates
    • Recommended Software
      • Wallet Clients
        • Frame Wallet
        • Trezor Suite
        • Metamask
      • Password Managers & 2FA clients
        • Bitwarden
        • KeePass2.x
      • OS
        • Arch Linux
        • Windows without the Bloatware
    • Recommended Services
      • DNS Services
        • Quad9 DNS
        • Mullvad DNS
      • VPN Services
        • Proton VPN
        • Mullvad VPN
      • Mail Sevices
        • Protonmail
        • Tutanota
    • Recommended Hardware
      • Trezor hardware wallet
      • VPN compatible routers
  • How to
    • Transfer funds
    • Trade on DEX
    • Check my balance
  • πŸ‘©β€πŸš€Common Misconceptions
    • Where my coins are stored?
    • Are all Blockchains decentralised?
    • Crypto is a scam
  • ⁉️Answering the most common questions
    • What is FIAT money?
    • What is a commodity?
    • What is blockchain and why is it important?
    • What is Bitcoin and how does it work?
    • How do I buy Bitcoin?
    • Is Bitcoin the only cryptocurrency?
    • What is a wallet and how do I get one?
    • How do I keep my cryptocurrency safe?
    • Can I make money with cryptocurrency?
    • How do I sell cryptocurrency and convert it back to cash?
    • Are there any risks associated with cryptocurrencies?
    • What are altcoins and how do they differ from Bitcoin?
    • How can I learn more about cryptocurrency and blockchain technology?
    • My wallet shows 0 balance! Are my funds lost?
    • What is the KISS concept?
      • Professional Context
Powered by GitBook
On this page

Was this helpful?

  1. Understanding Decentralised Exchanges (DEX)

Risk involved using DEXs

1. Smart Contract Vulnerabilities: Smart contracts are self-executing contracts with the terms of the agreement directly written into code. DEXs rely on smart contracts to facilitate trades. However, these contracts can have vulnerabilities or bugs that could be exploited by hackers, leading to the loss of funds.

2. Fees: While DEXs generally have lower fees compared to centralized exchanges, users still need to be mindful of transaction fees. These fees can vary depending on network congestion and the type of transaction. It's essential to consider these fees when trading on DEXs to avoid unexpected costs.

3. Slippage: Slippage refers to the difference between the expected price of a trade and the price at which the trade is executed. In highly volatile markets or during periods of high trading volume, slippage can occur, resulting in traders receiving a less favorable price than expected. This can lead to losses for traders.

4. MEV Bots & Sandwich Attacks: Miner Extractable Value (MEV) refers to the potential profits that miners can extract from reordering and including transactions in a block. MEV bots are automated tools used by miners to front-run transactions on the blockchain, exploiting price discrepancies for their own gain. Sandwich attacks involve placing one's own trades between two legitimate trades to manipulate prices and cause losses for traders.

5. Rug Pull Attacks: Rug pull attacks occur when the creators of a decentralized project suddenly abandon the project or drain its funds, leaving investors with worthless or significantly devalued assets. These attacks often target projects with low liquidity or those lacking proper auditing and transparency.

6. Vampire Tokens: Vampire attacks involve a new decentralized protocol draining liquidity from an existing one by offering incentives to users to migrate their funds. This can result in significant losses for users of the original protocol as liquidity is siphoned away.

Token-Specific Risks:

  • Token Tax: Some tokens may have additional fees or taxes associated with their use or transfer. It's important to research and understand any token-specific taxes to avoid unexpected costs.

  • Token Name Identifier Confusion: Tokens on DEXs can have similar or identical names, leading to confusion among users. It's crucial to verify the token's contract address and other details before trading to ensure you're interacting with the correct token.

PreviousTypes of DEXsNextUnderstanding coins & tokens

Last updated 1 year ago

Was this helpful?

πŸ’±