Frequently Asked Questions
GETTING STARTED
There are 2 types of networks supported by AIX, ETH and BEP20
AIX is a trusted crypto asset physical trader in Labuan for crypto enthusiasts. We can facilitate you to grow your crypto portfolio in a simple and secure way.
You can see the latest news about AIX by accessing the website https://aix.asia/
In short, no one person runs Bitcoin.
Bitcoin is run collectively by the users who use the Bitcoin network, and any changes to the Bitcoin system must be supported by a majority vote of the users before they can be made.
Bitcoin is run collectively by the users who use the Bitcoin network, and any changes to the Bitcoin system must be supported by a majority vote of the users before they can be made.
Bitcoin is the first implementation of a concept called “cryptocurrency”, which was first described in 1998 by Wei Dai. He suggested a new form of money that uses cryptography to control creation and transactions, instead of a centralized authority. The concept of Bitcoin was first publicized by Satoshi Nakamoto in 2009. Satoshi later abandoned the project in late 2010 without revealing his true identity.
The Bitcoin protocol and software are openly published and users and developers of Bitcoin technology from around the world can review the code or create their own modified versions of the Bitcoin software. As with the current team of developers, Satoshi Nakomoto's influence is limited to the changes he makes that are adopted by other developers, and he does not control Bitcoin. Thus, even though Satoshi Nakamoto's identity is unknown, Bitcoin can run without any problems.
The Bitcoin protocol and software are openly published and users and developers of Bitcoin technology from around the world can review the code or create their own modified versions of the Bitcoin software. As with the current team of developers, Satoshi Nakomoto's influence is limited to the changes he makes that are adopted by other developers, and he does not control Bitcoin. Thus, even though Satoshi Nakamoto's identity is unknown, Bitcoin can run without any problems.
A Bitcoin wallet is a place where you can store your Bitcoin balance safely and efficiently. There are various Bitcoin wallets that you can use and install on your PC/Laptop, smartphone, tablet or in the cloud.
To create a personal wallet, you can visit special sites that provide Bitcoin wallets such as: Blockchain.com, Hive or BitGo.
You can choose and compare the advantages and disadvantages of each wallet at this link.
Also read this article to keep your Bitcoin wallet safe as you are the only one responsible for safeguarding your own money.
To create a personal wallet, you can visit special sites that provide Bitcoin wallets such as: Blockchain.com, Hive or BitGo.
You can choose and compare the advantages and disadvantages of each wallet at this link.
Also read this article to keep your Bitcoin wallet safe as you are the only one responsible for safeguarding your own money.
In recent years Bitcoin has become an increasingly talked-about global phenomenon. As the precursor to digital currencies, Bitcoin has changed the global financial landscape in unprecedented ways. In this article, we will explain what Bitcoin is, how it works, and why it is so important in today's financial world.
History
Bitcoin is a form of digital currency that was created in 2009 by an individual using the pseudonym Satoshi Nakamoto. However, the true identity of Satoshi Nakamoto remains a mystery to this day. Bitcoin uses blockchain technology, which is a decentralized ledger that records all transactions ever made with Bitcoin.
How it works
The uniqueness of Bitcoin lies in the fact that it is not regulated by any central bank or government. This means that Bitcoin is a decentralized currency, meaning there is no single entity that controls it. Instead, Bitcoin relies on a vast network of users that contribute to the security and transparency of the system.
Bitcoin transactions are made directly between users without involving intermediaries, such as banks or traditional financial institutions. Each transaction is recorded in the blockchain, which allows everyone to see the transactions that have been made, but without revealing the identity of the users involved. Bitcoin's security is based on strong cryptography, which involves the use of complex mathematical algorithms to protect transactions.
Furthermore, the value of Bitcoin is determined by the laws of supply and demand. In this respect, Bitcoin is similar to commodities such as gold. The value of Bitcoin can vary significantly over time, which makes it attractive to investors looking for high potential returns.
Bitcoin also allows users to conduct transactions internationally at a lower cost compared to traditional methods. This is especially useful for those who want to send money to other countries quickly and efficiently. However, Bitcoin also comes with some risks. High price fluctuations can cause the value of Bitcoin to drop quickly, which means that its value is unstable. Also, since Bitcoin is still relatively new, there is a lot of legal and regulatory uncertainty surrounding it, which may affect its use and further adoption in the future.
Conclusion
Overall, Bitcoin is a digital currency that has a decentralized ledger using blockchain technology. By using Bitcoin, users can make direct transactions without involving intermediaries, and the currency also offers the potential for high returns. However, the risk of high prices and legal uncertainty remain factors to be aware of.
History
Bitcoin is a form of digital currency that was created in 2009 by an individual using the pseudonym Satoshi Nakamoto. However, the true identity of Satoshi Nakamoto remains a mystery to this day. Bitcoin uses blockchain technology, which is a decentralized ledger that records all transactions ever made with Bitcoin.
How it works
The uniqueness of Bitcoin lies in the fact that it is not regulated by any central bank or government. This means that Bitcoin is a decentralized currency, meaning there is no single entity that controls it. Instead, Bitcoin relies on a vast network of users that contribute to the security and transparency of the system.
Bitcoin transactions are made directly between users without involving intermediaries, such as banks or traditional financial institutions. Each transaction is recorded in the blockchain, which allows everyone to see the transactions that have been made, but without revealing the identity of the users involved. Bitcoin's security is based on strong cryptography, which involves the use of complex mathematical algorithms to protect transactions.
Furthermore, the value of Bitcoin is determined by the laws of supply and demand. In this respect, Bitcoin is similar to commodities such as gold. The value of Bitcoin can vary significantly over time, which makes it attractive to investors looking for high potential returns.
Bitcoin also allows users to conduct transactions internationally at a lower cost compared to traditional methods. This is especially useful for those who want to send money to other countries quickly and efficiently. However, Bitcoin also comes with some risks. High price fluctuations can cause the value of Bitcoin to drop quickly, which means that its value is unstable. Also, since Bitcoin is still relatively new, there is a lot of legal and regulatory uncertainty surrounding it, which may affect its use and further adoption in the future.
Conclusion
Overall, Bitcoin is a digital currency that has a decentralized ledger using blockchain technology. By using Bitcoin, users can make direct transactions without involving intermediaries, and the currency also offers the potential for high returns. However, the risk of high prices and legal uncertainty remain factors to be aware of.
Definition
In the context of a digital asset wallet on the blockchain, a private key is a critical component that allows its owner to access and control their digital assets. In simple terms, it can be thought of as a “password” or “secret key” that only the wallet owner knows. By using a Private Key, users can perform transactions such as sending and receiving digital assets, as well as securing their funds.
A Private Key is a long combination of numbers and letters. This key is randomly generated by the wallet when the user creates it. The security of the Private Key is very important, as anyone who has access to the Private Key also has full control over the associated digital assets. Users should guard their Private Key very carefully and not share it with others, because if the Private Key falls into the wrong hands, digital assets can be stolen or accessed without authorization.
Differences between Private Key and Public Key
The main difference between a Private Key and a Public Key is that a Private Key is confidential information known only to the wallet owner, while a Public Key can be shared with anyone. The Public Key is used to encrypt transactions sent to the owner's wallet address, while the Private Key is required to decrypt transactions and access the associated digital assets.
Conclusion
In maintaining the security of digital assets, it is also important to understand the importance of storing and backing up Private Keys properly. Using a trusted and secure wallet and following recommended security practices, such as storing Private Keys in a safe place and offline, can help protect your digital assets from security threats.
In the context of a digital asset wallet on the blockchain, a private key is a critical component that allows its owner to access and control their digital assets. In simple terms, it can be thought of as a “password” or “secret key” that only the wallet owner knows. By using a Private Key, users can perform transactions such as sending and receiving digital assets, as well as securing their funds.
A Private Key is a long combination of numbers and letters. This key is randomly generated by the wallet when the user creates it. The security of the Private Key is very important, as anyone who has access to the Private Key also has full control over the associated digital assets. Users should guard their Private Key very carefully and not share it with others, because if the Private Key falls into the wrong hands, digital assets can be stolen or accessed without authorization.
Differences between Private Key and Public Key
The main difference between a Private Key and a Public Key is that a Private Key is confidential information known only to the wallet owner, while a Public Key can be shared with anyone. The Public Key is used to encrypt transactions sent to the owner's wallet address, while the Private Key is required to decrypt transactions and access the associated digital assets.
Conclusion
In maintaining the security of digital assets, it is also important to understand the importance of storing and backing up Private Keys properly. Using a trusted and secure wallet and following recommended security practices, such as storing Private Keys in a safe place and offline, can help protect your digital assets from security threats.
There are several sites that discuss Bitcoin in depth and are easy to understand. Here are these sites.
Bitcoin.org - This site managed by the Bitcoin core developer team is the most complete site that explains what Bitcoin is and how it works. This site is suitable to be used as an initial guide for Bitcoin users who are still laymen.
CoinDesk, Cointelegraph and CCN - The most comprehensive news sites that discuss prices, regulations and developments around the world of digital assets.
Bitcoin.org - This site managed by the Bitcoin core developer team is the most complete site that explains what Bitcoin is and how it works. This site is suitable to be used as an initial guide for Bitcoin users who are still laymen.
CoinDesk, Cointelegraph and CCN - The most comprehensive news sites that discuss prices, regulations and developments around the world of digital assets.
1. Open an account online: Opening a crypto account at AIX is fully done online, users do not need to go to the office.
2. User friendly interface: AIX's attractive website makes it easy for anyone to start investing.
3. Accessible 24/7: Market activity around the clock. Transactions can be done anytime, anywhere.
4. Free Deposit Fee: No fees are charged to users for deposit transactions at AIX.
2. User friendly interface: AIX's attractive website makes it easy for anyone to start investing.
3. Accessible 24/7: Market activity around the clock. Transactions can be done anytime, anywhere.
4. Free Deposit Fee: No fees are charged to users for deposit transactions at AIX.
REGISTRATION
At this time we will provide you with information on how to easily register at AIX Please follow these steps:
1. Go to https://aix.asia/ then click Register.
2. Fill in the fields with email name, username, then a password combination of min 8 characters (upper/lower case, symbols) and Referral ID number (Optional). After that, check the captcha and click if you have read and agree with the user terms. Then click Create account.
3. Registration Verification is sent to the email address registered during registration.
4. Please confirm your email to get a confirmation code. This is to validate your email.
5. If the verification is successful, the Basic Info view of your account will appear.
6. If you want to login, please go to our main page then click Login.
7. Please enter the email address and password as registered at AIX. Then click Login.
8. Congratulations you have successfully logged into AIX.
1. Go to https://aix.asia/ then click Register.
2. Fill in the fields with email name, username, then a password combination of min 8 characters (upper/lower case, symbols) and Referral ID number (Optional). After that, check the captcha and click if you have read and agree with the user terms. Then click Create account.
3. Registration Verification is sent to the email address registered during registration.
4. Please confirm your email to get a confirmation code. This is to validate your email.
5. If the verification is successful, the Basic Info view of your account will appear.
6. If you want to login, please go to our main page then click Login.
7. Please enter the email address and password as registered at AIX. Then click Login.
8. Congratulations you have successfully logged into AIX.
1. Not included in high risk countries
2. Already have Passport
3. You are at least 18 years old
2. Already have Passport
3. You are at least 18 years old
KYC PROCESS
At this time we will provide you with information on how to easily register at AIX Please follow these steps:
1. Go to https://aix.asia/ then click Register.
2. Fill in the fields with email name, full name, then a password combination of min 8 characters (upper/lower case, symbols, and numbers) Reference ID (Optional) and click the Captcha field. After that click if you have read and agree with the user terms. Then click Register.
3. Please confirm your email and please click the “Click Account Activation” button to proceed to the next process.
4. If you have successfully verified it will appear, the Basic Info display of your account.
5. Please verify your phone number before performing KYC verification.
6. Enter the phone number you want to register then click Get OTP code for verification.
7. If the phone number is already registered please click Verify Now to proceed to the next process.
8. Choose your nationality and take a photo of your Passport then click Next.
9. Please fill in your personal data and make sure the data you input is correct.
10. Please do the Liveness verification process and after that click I am Responsible for the information I provide, then click Submit.
1. KYC Process Successful
1. Go to https://aix.asia/ then click Register.
2. Fill in the fields with email name, full name, then a password combination of min 8 characters (upper/lower case, symbols, and numbers) Reference ID (Optional) and click the Captcha field. After that click if you have read and agree with the user terms. Then click Register.
3. Please confirm your email and please click the “Click Account Activation” button to proceed to the next process.
4. If you have successfully verified it will appear, the Basic Info display of your account.
5. Please verify your phone number before performing KYC verification.
6. Enter the phone number you want to register then click Get OTP code for verification.
7. If the phone number is already registered please click Verify Now to proceed to the next process.
8. Choose your nationality and take a photo of your Passport then click Next.
9. Please fill in your personal data and make sure the data you input is correct.
10. Please do the Liveness verification process and after that click I am Responsible for the information I provide, then click Submit.
1. KYC Process Successful
You can contact our Customer Service via Live Chat or Email to inquire about the KYC process that has not been approved.
If you don't do the KYC process then you can't buy and sell crypto assets.
KYC (Know Your Customer) verification is one of the important stages in the AIX account registration process. This stage is carried out with the aim of verifying the user's identity. If you are experiencing problems in carrying out the KYC process, here is a variety of information about tips on how to pass KYC verification at AIX that can help you
Requirements needed
Before you can access AIX's various services and facilities, you must complete the account registration and KYC verification stages. The main requirements in the AIX account registration process are to be over 18 years old and use a valid email address and mobile number.
The following are the requirements and documents needed to make it easier for you to pass KYC verification at AIX.
1. Requires original Passport.
2. Passport can be read clearly during the Passport photo upload process.
3. Stable internet connection.
4. Personal data submitted must be appropriate.
5. Make sure your Email address and cell phone number have never been registered with AIX.
6. Make sure you do the verification photo correctly according to the guidelines on the screen.
7. Make sure that you also do the face verification process yourself to help verify your account.
Requirements needed
Before you can access AIX's various services and facilities, you must complete the account registration and KYC verification stages. The main requirements in the AIX account registration process are to be over 18 years old and use a valid email address and mobile number.
The following are the requirements and documents needed to make it easier for you to pass KYC verification at AIX.
1. Requires original Passport.
2. Passport can be read clearly during the Passport photo upload process.
3. Stable internet connection.
4. Personal data submitted must be appropriate.
5. Make sure your Email address and cell phone number have never been registered with AIX.
6. Make sure you do the verification photo correctly according to the guidelines on the screen.
7. Make sure that you also do the face verification process yourself to help verify your account.
For the KYC process, it takes a maximum of 2x24 hours from the time you have done the KYC process.
AIX's KYC verification aims to maintain the security of user accounts as well as ensure smooth sailing when investing in AIX. Every incoming account verification request will be processed immediately by AIX's KYC team. However, there are a few things you should be aware of that may cause your account KYC verification request to be rejected.
Below are some of the most common reasons why your AIX KYC verification process may be rejected:
1. You are under 18 years old.
2. The identity you uploaded is corrupted.
3. The quality of the uploaded photo is not clear.
4. The document does not comply with AIX KYC terms and conditions.
5. You have another account with the same mobile number and/or Passport Number.
Below are some of the most common reasons why your AIX KYC verification process may be rejected:
1. You are under 18 years old.
2. The identity you uploaded is corrupted.
3. The quality of the uploaded photo is not clear.
4. The document does not comply with AIX KYC terms and conditions.
5. You have another account with the same mobile number and/or Passport Number.
ACCOUNT
Here are the steps to change the Password:
1. Click on Password
2. Click Submit
3. Please check your AIX-registered email for the password reset link
1. Click on Password
2. Click Submit
3. Please check your AIX-registered email for the password reset link
Here are the steps to add a personal bank account:
1. Click on Bank Account
2. Click Add Account
3. Please fill in the Bank Account, Account number and Account opening address and make sure the bank account added is privately owned.
4. Click Submit
1. Click on Bank Account
2. Click Add Account
3. Please fill in the Bank Account, Account number and Account opening address and make sure the bank account added is privately owned.
4. Click Submit
Here are the steps to change the Mobile Number:
1. Click on User Profile
2. Click Change on the Phone number menu
3. Please check your registered email for the password
1. Click on User Profile
2. Click Change on the Phone number menu
3. Please check your registered email for the password
Here are the steps you can take to secure your account on AIX:
1. NEVER share the OTP you receive with anyone for any purpose. AIX will never ask for OTP codes and Passwords.
2. Delete all devices connected to your account.
3. Reset your password regularly.
Don't panic and worry
“Your Wallet balance in your account remains safe because it can only be disbursed to a bank account registered in your name according to your Passport. The registered account cannot be changed to something other than your name.”
1. NEVER share the OTP you receive with anyone for any purpose. AIX will never ask for OTP codes and Passwords.
2. Delete all devices connected to your account.
3. Reset your password regularly.
Don't panic and worry
“Your Wallet balance in your account remains safe because it can only be disbursed to a bank account registered in your name according to your Passport. The registered account cannot be changed to something other than your name.”
Here are the steps to delete a Bank account:
1. Click Bank Account
2. Please select the bank account you want to delete
3. Click the waste basket icon
4. Click confirm
1. Click Bank Account
2. Please select the bank account you want to delete
3. Click the waste basket icon
4. Click confirm
Here are the steps to edit your personal bank account:
1. Click on Bank Account
2. Please select the bank account you want to edit
3. Click the pencil icon
4. Please edit the bank account data
5. Click send
1. Click on Bank Account
2. Please select the bank account you want to edit
3. Click the pencil icon
4. Please edit the bank account data
5. Click send
2FA VERIFICATION
A security feature designed to protect user accounts by adding an extra layer of security apart from passwords. It aims to prevent unauthorized access to online accounts, such as email accounts, social media, online banking services, and more.
If you don't receive an SMS authentication code, here are some steps you can try:
1. Make sure the mobile number you are using is registered correctly. Double-check the number you provided and make sure there are no typing errors.
2. Make sure your phone has a good enough signal. In some cases, a weak signal can hinder the reception of SMS messages.
3. Make sure your SMS mailbox is not full. If it is full, delete some unnecessary messages to make room for new incoming messages.
4. Check the settings on your phone. Some phones have settings that block or filter messages from unknown senders or certain types of messages. Make sure that your phone's settings are not preventing you from receiving SMS messages from the right sources.
1. Make sure the mobile number you are using is registered correctly. Double-check the number you provided and make sure there are no typing errors.
2. Make sure your phone has a good enough signal. In some cases, a weak signal can hinder the reception of SMS messages.
3. Make sure your SMS mailbox is not full. If it is full, delete some unnecessary messages to make room for new incoming messages.
4. Check the settings on your phone. Some phones have settings that block or filter messages from unknown senders or certain types of messages. Make sure that your phone's settings are not preventing you from receiving SMS messages from the right sources.
1. Download Google Authenticator:
2. Set Up 2FA:
3. Link with Google Authenticator:
4. Complete the Setup:
5. Use 2FA:
- * Android: Go to the Google Play Store, search for 'Google Authenticator,' and install it.
- * iOS: Go to the App Store, search for 'Google Authenticator,' and install it.
2. Set Up 2FA:
- * Log in to the service you want to secure (e.g., Google).
- * Go to the account’s security settings and enable 2FA.
- * Choose 'Authenticator App' as the method.
3. Link with Google Authenticator:
- * Open the Google Authenticator app on your device.
- * Scan the QR code provided by the service or enter the setup key manually.
- * The app will start generating codes for you.
4. Complete the Setup:
- * Enter the verification code from Google Authenticator into the service’s security settings.
- * Confirm and save the settings.
5. Use 2FA:
- * Whenever you log in, open Google Authenticator, enter the code generated, and gain access.
1. Login to your AIX account, and go to the Profile menu and click 2FA.
2. Next, make sure you already have the Google authenticator application on your cellphone and if not you are required to download the Google authenticator.
3. Then scan the QR code in the Google authenticator application on the Google Authenticator application on your cellphone then click connect.
2. Next, make sure you already have the Google authenticator application on your cellphone and if not you are required to download the Google authenticator.
3. Then scan the QR code in the Google authenticator application on the Google Authenticator application on your cellphone then click connect.