1
0
mirror of https://github.com/oceanprotocol/docs.git synced 2024-11-26 19:49:26 +01:00

Retry PR #136 and also do 'npm run format'

This commit is contained in:
Troy McConaghy 2019-02-05 17:33:30 +01:00
parent e6792bb1c7
commit eba0fdbc0c
3 changed files with 13 additions and 14 deletions

View File

Before

Width:  |  Height:  |  Size: 259 KiB

After

Width:  |  Height:  |  Size: 259 KiB

View File

Before

Width:  |  Height:  |  Size: 295 KiB

After

Width:  |  Height:  |  Size: 295 KiB

View File

@ -23,7 +23,6 @@ Ocean Tokens are [ERC-20 tokens](https://en.wikipedia.org/wiki/ERC-20), so any w
There are many kinds of wallets (e.g. paper wallets, hardware wallets, software wallets, custodial wallets), each with its own advantages and disadvantages. There is a tradeoff between security and convenience. We encourage you to search around and read about wallets to understand the options. In this section, we will explain how to setup a create a MetaMask wallet account.
## Software Wallet
### MetaMask Setup
@ -33,7 +32,6 @@ We will be walking you through a tutorial on how setup Metamask.
**What is MetaMask?**
MetaMask is a browser extension that allows web applications to interact with the Ethereum blockchain. In our current setup, browsers like Chrome/Firefox display information by fetching it from a database. Our current web browsers (web 2.0 as its called) are not build to interface with distributed databases. This is why MetaMask is needed, as it allows modern web browsers to interface with the Ethereum blockchain.
**Why is Metamask required?**
The unique part about MetaMask is that it serves a dual purpose as an ERC-20 wallet and a Web 3.0 browser. For users, it works as an Ethereum wallet, allowing them to store and send any ERC-20 tokens. For developers, it allows you to design and run Ethereum DApps right in your browser without running a full Ethereum node. MetaMask talks to the Ethereum blockchain for you.
@ -44,7 +42,7 @@ Here are some setup Instructions for Metamask
2. It will get added as a browser extension on the top right portion. Go ahead and accept the terms and conditions. Create a username and password as well. ![tandc-metamask](images/metamask-create-username-password.png)
3. MetaMask will generate a secret backup phrase for you. Write it down, store it in a safe place, and click next. ![backup](images/metamask-secret-passcode.png)
4. Confirm your secret backup phrase and finish your MetaMask wallet set up! ![setup-final-metamask](images/metamask_view-account%20options.png)
4. Confirm your secret backup phrase and finish your MetaMask wallet set up! ![setup-final-metamask](images/metamask_view-account-options.png)
5. Voila! Your account is now created! You can now buy and sell tokens. You can copy your account address to clipboard from the options. This address is where you will be receiving all your ERC-20 tokens.
You can find more resources for setting up [here](https://drive.google.com/open?id=1N68MsRlbxJ4h6otCaTIwN4y904unh1QO).
@ -75,11 +73,12 @@ Unlike traditional pocket wallets, digital wallets do not actually store the cur
**What are the different types of wallets?**
Just as wallets come in various shapes and sizes in the real world, several types crypto-wallets are also available offering different ways of storing your cryptocurrencies. Each type has its own strengths and weaknesses. Heres a brief overview
| **Type of Wallet** | **Strengths** | **Weaknesses**
| --- | --- | --- |
| Desktop or mobile | Can be downloaded and stored on the desktop or mobile device. Can only be accessed through this one device so it's highly secure. Mobile wallets have the additional benefit of being portable | If the computer/phone is hacked or gets a virus, it's possible that your funds could be lost forever. Mobile wallets are also restricted by limited space so tend to be smaller.
| Hardware | The private keys are stored on a physical device such as a USB stick.Hardware wallets have the ability to make transactions online, but are very secure because they are stored offline. | If you lose your hardware wallet, all your funds are lost. So this may not be the best option if you're careless.
| **Type of Wallet** | **Strengths** | **Weaknesses** |
| ------------------ | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ |
| Desktop or mobile | Can be downloaded and stored on the desktop or mobile device. Can only be accessed through this one device so it's highly secure. Mobile wallets have the additional benefit of being portable | If the computer/phone is hacked or gets a virus, it's possible that your funds could be lost forever. Mobile wallets are also restricted by limited space so tend to be smaller. |
| Hardware | The private keys are stored on a physical device such as a USB stick.Hardware wallets have the ability to make transactions online, but are very secure because they are stored offline. | If you lose your hardware wallet, all your funds are lost. So this may not be the best option if you're careless. |
| Software | These are cloud-based wallets that are accessible over the internet. They are the most convenient to access, and are currently the most popular way to store cryptos. | Since online wallets are controlled by third parties, this centralization leads to a greater risk of your private keys being stolen through hacking. | |
| Paper | A physical copy or printout of your public and private keys. Highly secure, portable and easy to store. These can come in the form of printing out hexa numbers or via a QR code. | Similar weaknesses to a hardware wallet, that if you loose the keys, then you don't have any access.
| Paper | A physical copy or printout of your public and private keys. Highly secure, portable and easy to store. These can come in the form of printing out hexa numbers or via a QR code. | Similar weaknesses to a hardware wallet, that if you loose the keys, then you don't have any access. |
| | | | |
This article isn't a deep-dive into how various wallets work, but is a primer into how to buy and sell cryptos. For a more in-depth understanding, you can [check out this article](https://blockgeeks.com/guides/cryptocurrency-wallet-guide/).