This cross-topic article is dedicated to the process of getting started, gradually reviewing the procedures of:
This article does not provide detailed explanations on any of the covered topics, rather providing a quick review of the big picture with references to dedicated Knowledge Base articles.
TST Environment is the environment where Exscudo users can test the functional capabilities of Exscudo Exchange. With no real tokens in balance sheets, one can test ExscudoExchange with no risk.
To learn about signing up to TST Environment, check the dedicated sections of Signing up to Exscudo Exchange.
Exscudo Exchange is the production environment where Exscudousers can actually trade real assets. In this environment, every action taken has consequence and is not reversible.
To learn about signing up to ExscudoExchange, check the dedicated sections of Signing up to Exscudo Exchange.
If you have taken part in the ICO campaign and have an ICO cabinet account, you will still need to register an Exchange account with the same e-mail as the one used during the ICO to access your EON tokens. More information on accessing and withdrawing the tokens can be found in this knowledge base article.
After an Exchange account is created, the next essential step is to protect it. An Exchange account provides a direct connection to one's assets, so it is essential to take its safety and security as seriously as possible.
It is strongly recommended to apply the following means of security to the account as soon as it has been created:
Additional information on securing your account can be found in this article.
Please note, that KYC procedure is an essential step in securing the account as well as receiving assistance in restoring access to it by contacting Exscudo team. Certain functions of Exscudo Exchange are only available to the accounts, KYC procedure was completed for.
Once the security measures are applied against attacks, the next logical step is to apply measures aimed at preventing loss of data/access.
Some circumstances may lead to the situation in which users may lose access to certain layers of security applied to their Exscudo Exchange accounts, which may, in turn, lead to loss of access to the accounts.
And if in case of losing a password it is quite a trivial matter to recover it, recovering 2FA is a bit more complex.
As it was already mentioned, it is highly recommended to enable two-factor authentication (2FA) to bolster your account security, since this is an additional layer of security applied to access to an account.
Once 2FA has been enabled, a user account is accessed with something a user knows (a login and a password), and something a user has (a code). It is extremely important to make a backup of your 2FA key and QR code and keep it safe and within reach.
Restoring your Google Authenticator account in case you lost access to it (e.g. loss of the device, or reinstalled Google Authenticator app) is much easier and quicker than detaching 2FA from your Exscudo account.
Just in case you need to remove the 2FA from your account for some reason, you can do so yourself any time by following this guide.
Please note, in case you lost access to your Google Authenticator account and had not made a backup of the QR code in advance, you will not be able to log in to your Exscudo account. You will have contact Exscudo team to detach 2FA to be able to log in again. But it will take time to process all the necessary procedures related.
Once the Exchange account is registered, secured and backed up, it is imperative to maintain the highest standard and level of security while accessing it to keep all the means of access, both software and hardware, up to the proper security standard.
Keep in mind both human and technological factors while maintaining security of your accounts and associated infrastructure.
Below you can find a general set of rules, that would help you access and operate your Exscudo Exchange account in a safe and secure way:
It is always better to take security measures beforehand, than try to recover access to your data/account later or mitigate the damage caused. You can find information about the factors and security threats in this article, as well as the proactive and reactive countermeasures that can be applied.