[{"data":1,"prerenderedAt":344},["ShallowReactive",2],{"api/learn-center-post-en-GB-what-is-zk-technology":3,"en-gb/learn/blockchain/what-is-zk-technology-en-GB-seo":75,"footer-en-GB":80,"navigation-en-GB-learn-center":253,"api/learn-categories-en-GB":304},{"seo":4,"locale":28,"breadcrumbs":29,"excerpt":37,"featuredImage":38,"components":39,"title":5,"formattedPublishedAt":68,"geofencings":69,"category":70,"pagination":72,"campaignExternalId":8},{"title":5,"metaTitle":6,"metaDescription":7,"keywords":8,"metaRobots":8,"structuredData":9,"metaImage":10,"metaSocial":18,"canonicalURL":8,"localizations":19},"What is ZK technology?","What is ZK technology? - Bitstamp Learn Center","What is zero-knowledge technology (zk tech)? How does it help encrypt your data  - Learn more on the Bitstamp Learn Center.",null,{},{"url":11,"mime":12,"ext":13,"width":14,"height":15,"name":16,"alt":17},"bitstampImageUrl/What_is_ZK_technologypng_4d7c057a7c_7f6200c1c0.png","image/png",".png",1920,1080,"What_is_ZK_technologypng_4d7c057a7c.png","",[],[20,23,26],{"pathname":21,"locale":22},"/learn/blockchain/what-is-zk-technology/","en",{"pathname":24,"locale":25},"/es/learn/blockchain/what-is-zk-technology/","es",{"pathname":27,"locale":28},"/en-gb/learn/blockchain/what-is-zk-technology/","en-GB",[30,34],{"id":31,"text":32,"url":31,"asUrl":33},"/learn/blockchain/","Blockchain technology",true,{"id":35,"text":5,"url":27,"asUrl":36},"what-is-zk-technology",false,"\u003Cp>ZK technology is an encryption technology that allows parties to prove and verify information without having insight into the information itself.\u003C/p>\n",{"url":11,"mime":12,"ext":13,"width":14,"height":15,"name":16,"alt":17},[40,50,61],{"component":41,"props":42,"content":43,"secondaryContent":47,"ctas":48,"secondaryCtas":49,"ctasNoMarginTop":36},"section.full-text",{"centered":36,"withoutSectionContainer":36},{"text":44,"width":45,"align":46},"\u003Cp>ZK technology is an encryption technology that allows parties to prove and verify information without having insight into the information itself. \u003C/p>\n\u003Cp>ZK technology, or zero-knowledge technology, is a blanket term for protocols and services using an encryption method called zero-knowledge proofs. Zero-knowledge proofs allow one party to prove a fact to another party so they can verify it without the second party knowing the fact itself.\u003C/p>\n\u003Cp>The concept of ZK technology emerged in the 1980s, and the development of zero-knowledge protocols has gained traction over recent years as the rise of public blockchain platforms created new applications for encryption technologies.\u003C/p>\n\u003Cp>Zero-knowledge proofs are most commonly used to introduce \u003Ca href=\"/en-gb/learn/security/how-private-is-blockchain/\">privacy\u003C/a> and \u003Ca href=\"/en-gb/learn/blockchain/what-is-blockchain-scaling/\">scalability\u003C/a> to blockchains. However, they have an array of potential use cases in identity and authentication. For example, a zero-knowledge proof could allow an individual to prove they’re over 21 years old without providing a copy of their ID.\u003C/p>\n\u003Ch2>History of zero-knowledge technology\u003C/h2>\n\u003Cp>The concept of zero-knowledge proofs was introduced in February 1989 by MIT researchers who published a paper called “The Knowledge Complexity of Interactive Proof Systems.” The first line of the paper lays out the problem statement: “A proof of a theorem contains more knowledge than the mere fact that the theorem is true.”\u003C/p>\n\u003Cp>For example, if someone needs to prove a credential, such as the fact they’re over 21, they can only do so by producing an identity document that shows their date of birth. However, they have no way of proving that they’re of age without disclosing their actual age or date of birth. The same is true of many other types of credentials.\u003C/p>\n\u003Cp>The researchers expanded this concept into a computing theory describing the complexity of knowledge needed to prove a fact. They drew a distinction between “interactive” zero-knowledge proofs, where two parties must repeatedly interact to prove and verify the fact, and ‘non-interactive’ zero-knowledge proofs, which eliminate the need for interaction. This issue can be illustrated by an analogy called the Ali Baba cave.\u003C/p>\n\u003Ch3>The Ali Baba cave problem\u003C/h3>\n\u003Cp>The Ali Baba cave involves two parties: Peggy, the prover, and Victor, the verifier, standing in a cave shaped like a ring. Peggy can take path A on the left or Path B on the right to reach a magic door, locked via password, blocking the path to the opposite side of the cave. Peggy wants to prove to Victor that she knows the password for the magic door without having to tell it to him.\u003C/p>\n","full","left",{"text":17},[],[],{"component":51,"props":52,"media":53,"youtubeVideo":60},"section.media",{"centered":36,"withoutSectionContainer":36},{"url":54,"mime":12,"ext":13,"width":14,"height":15,"name":55,"alt":8,"size":56,"horizontalPosition":57,"verticalPosition":58,"responsiveAttributes":59},"bitstampImageUrl/Ali_Baba_cave_problempng_147a8228c5_e3903b3aad.png","Ali_Baba_cave_problempng_147a8228c5.png","auto","center","middle",{},{"videoThumbnail":8},{"component":41,"props":62,"content":63,"secondaryContent":65,"ctas":66,"secondaryCtas":67,"ctasNoMarginTop":36},{"centered":36,"withoutSectionContainer":36},{"text":64,"width":45,"align":46},"\u003Cp>Ali Baba cave problem\u003C/p>\n\u003Cp>To prove her knowledge, Peggy enters the cave while Victor waits outside so he can’t see which path she takes. He then enters the cave and shouts the name of the path he wants Peggy to use to return.\u003C/p>\n\u003Cp>If Peggy didn’t actually know the password, there is a 50% chance of her emerging from the path Victor wanted her to use. However, if they repeat this test many times and Peggy always emerges from the right path, Victor can eventually conclude that she must know the password.\u003C/p>\n\u003Cp>The Ali Baba cave illustrates a core limitation that faced cryptographers researching zero-knowledge proofs for computing purposes – Peggy and Victor must be present and willing to interact in multiple tests for the proof to be successful. These requirements limited the practical application of zero-knowledge proofs in computing.\u003C/p>\n\u003Ch2>Criteria defining zero-knowledge proofs\u003C/h2>\n\u003Cp>A key breakthrough in ZK technology came in the 1991 when Manuel Blum, Paul Feldman, and Silvio Micali published their paper “Non-Interactive Zero-Knowledge and Its Applications.”\u003C/p>\n\u003Cp>In the paper, they propose using a cryptographic key shared between the prover and verifier. The prover and verifier agree the means of proving a fact without revealing knowledge of it and generate the shared key based on these rules. The prover can then enter their side of the shared key, which the verifier can easily verify matches theirs.\u003C/p>\n\u003Cp>The fact can now be proven and verified in a single interaction, eliminating the need for multiple interactions. Reducing the time and burden of interaction made it feasible to deploy zero-knowledge proofs in computing at scale.\u003C/p>\n\u003Cp>The shared key works as a pair in a similar way to the \u003Ca href=\"/en-gb/learn/security/what-are-private-and-public-keys/\">public/private keys\u003C/a> encrypting a \u003Ca href=\"/en-gb/learn/bitstamp-tutorials/how-to-securely-store-crypto/\">blockchain wallet\u003C/a>.\u003C/p>\n\u003Cp>In the paper, Blum, Feldman, and Micali also laid out a set of criteria that apply to all zero-knowledge proofs:\u003C/p>\n\u003Cul>\n\u003Cli>It must be complete, meaning that as long as the input is valid, the proof will always verify the statement is true and thus can be trusted.\u003C/li>\n\u003Cli>It must be sound, so that an invalid input cannot return a true value.\u003C/li>\n\u003Cli>It must be zero-knowledge – the verifier must only learn of the validity or otherwise of a statement, not any of the information about the original input.\u003C/li>\n\u003C/ul>\n\u003Ch2>Types of ZK technology\u003C/h2>\n\u003Cp>Outside the blockchain sphere, ZK technology has applications in areas such as authentication and nuclear disarmament. Within blockchain, zero-knowledge proofs have developed and gained substantial utility over recent years. Currently, there are two types of ZK technology in use by blockchain protocols: ZK-SNARKs and ZK-STARKs.\u003C/p>\n\u003Ch3>ZK-SNARKs\u003C/h3>\n\u003Cp>ZK-SNARK is an acronym that stands for Zero-Knowledge Succinct Non-Interactive Argument of Knowledge. Each letter is a defining property:\u003C/p>\n\u003Cul>\n\u003Cli>\u003Cstrong>ZK\u003C/strong> – the protocol is zero-knowledge. A verifier can validate a fact without knowing the fact itself.\u003C/li>\n\u003Cli>\u003Cstrong>S\u003C/strong>uccinct – the proof is smaller and easier to verify than the fact itself.\u003C/li>\n\u003Cli>\u003Cstrong>N\u003C/strong>on-interactive – prover and verifier are only required to interact once thanks to a shared key.\u003C/li>\n\u003Cli>\u003Cstrong>Ar\u003C/strong>gument of \u003Cstrong>K\u003C/strong>nowledge – the protocol must meet the “soundness” criteria laid out above so that it cannot be cheated, and it must be prohibitively difficult for anyone without knowledge of the fact to create a ZK-SNARK.\u003C/li>\n\u003C/ul>\n\u003Cp>ZK-SNARKs were developed by \u003Ca href=\"/en-gb/learn/cryptocurrency-guide/what-is-zcash-zec/\">Zcash\u003C/a> as an encryption solution to enable private cryptocurrency transactions. However, a key drawback of ZK-SNARKs is that a trusted setup using a protocol or provider is needed to create the shared encryption key, meaning they aren’t an entirely trustless way to transact for everyday purposes.\u003C/p>\n\u003Ch3>ZK-STARKs\u003C/h3>\n\u003Cp>ZK-STARK stands for Zero-Knowledge Scalable Transparent Knowledge of Argument. The properties that differ from a ZK-SNARK are: \u003C/p>\n\u003Cul>\n\u003Cli>\u003Cstrong>Scalability\u003C/strong> – where there is a lot of data to be processed for a verification, ZK-STARKs are faster at generating and verifying proofs. ZK-STARKs can handle exponentially larger amounts of data with only an incremental increase in verification time.\u003C/li>\n\u003Cli>\u003Cstrong>Transparency\u003C/strong> – ZK-STARKs leverage publicly verifiable randomness to generate the shared key needed for the zero-knowledge proof. As such, they eliminate the need for a trusted setup.\u003C/li>\n\u003C/ul>\n\u003Cp>These features stingy ZK-STARKs offer some advantages over ZK-SNARKs; however, ZK-STARKs generate more complex proofs than ZK-SNARKs, so generally incur higher transaction costs.\u003C/p>\n\u003Ch2>ZK technology for blockchain scalability\u003C/h2>\n\u003Cp>\u003Ca href=\"/en-gb/learn/blockchain/what-are-layer-2-solutions/\">Layer 2\u003C/a> platforms leverage ZK-STARKs to make \u003Ca href=\"/en-gb/learn/cryptocurrency-guide/what-is-ethereum-eth/\">Ethereum\u003C/a> more scalable, using a solution called zero-knowledge rollups, or ZK rollups.\u003C/p>\n\u003Cp>This method is used to bundle Ethereum transactions into batches to be executed on the Layer 2 platform instead of the Ethereum mainnet, alleviating congestion. The Layer 2 platform then provides a ZK proof of the processed transactions to the Ethereum mainnet to update the overall state of the blockchain.\u003C/p>\n\u003Cp>ZK rollup projects include Layer 2 platforms StarkNet, zkSync, and \u003Ca href=\"/en-gb/learn/cryptocurrency-guide/what-is-polygon-matic/\">Polygon Zero\u003C/a>.\u003C/p>\n\u003Ch2>Other use cases of ZK technology\u003C/h2>\n\u003Cp>Although not yet widely deployed, ZK technology has the potential to help protect personal information. Suppose an individual can provide a ZK proof of being of age, resident in a particular country, or not on any sanctions list. In that case, it could eliminate the requirement for people to provide copies of government-issued IDs to service providers. In turn, this would reduce the risk of documents being hacked and leaked online, enhancing user privacy.\u003C/p>\n\u003Cp>Similarly, ZK proofs could make online authentication easier, eliminating the need to expose sensitive login credentials each time someone accesses a service.\u003C/p>\n\u003Ch2>ZK Technology essentials\u003C/h2>\n\u003Cul>\n\u003Cli>ZK proofs are an encryption method enabling parties to prove and verify information without having insight into the information itself.\u003C/li>\n\u003Cli>ZK technology emerged in the 1980s and developed into two main types of zero-knowledge proofs: ZK-SNARKs and ZK-STARKs.\u003C/li>\n\u003Cli>ZK-SNARKs are used to make cryptocurrency payments more private, while ZK-STARKs are now widely deployed in Layer 2 scaling platforms. ZK technology has other potential use cases in identity and authentication.\u003C/li>\n\u003C/ul>\n",{"text":17},[],[],"July 29th, 2024",{},{"title":32,"url":31,"geofencings":71},{},{"previous":73,"next":74},"/en-gb/learn/blockchain/what-is-turing-complete/","/en-gb/learn/blockchain/where-to-track-cryptocurrency-transactions/",{"description":7,"ogDescription":7,"ogImage":76,"twitterImage":76,"twitterSite":77,"twitterCreator":77,"twitterCard":78,"twitterTitle":6,"twitterDescription":7,"titleTemplate":79},"https://assets.bitstamp.net/msc/_ipx/enlarge_true&f_png&fit_cover&q_85&s_1200x630/bitstampImageUrl/What_is_ZK_technologypng_4d7c057a7c_7f6200c1c0.png","@Bitstamp","summary_large_image","%s",{"ready":33,"sections":81,"disclaimer":251,"copyright":252},[82,120,133,156,193,212],{"title":83,"content":17,"items":84},"About",[85,90,95,100,105,110,115],{"noFollow":33,"isExternal":36,"name":86,"value":87,"isEmail":36,"isPhoneNumber":36,"isText":36,"showOnDesktop":33,"showOnMobile":33,"attachment":88,"geofencings":89},"Who We Are","/about-us/",{},{},{"noFollow":33,"isExternal":33,"name":91,"value":92,"isEmail":36,"isPhoneNumber":36,"isText":36,"showOnDesktop":33,"showOnMobile":33,"attachment":93,"geofencings":94},"Careers","https://bitstamp.workable.com/",{},{},{"noFollow":33,"isExternal":36,"name":96,"value":97,"isEmail":36,"isPhoneNumber":36,"isText":36,"showOnDesktop":33,"showOnMobile":33,"attachment":98,"geofencings":99},"Legal & Privacy","/legal/",{},{},{"noFollow":33,"isExternal":36,"name":101,"value":102,"isEmail":36,"isPhoneNumber":36,"isText":36,"showOnDesktop":33,"showOnMobile":33,"attachment":103,"geofencings":104},"Legal & Privacy - USA","/legal/terms-of-use/inc/",{},{},{"noFollow":33,"isExternal":36,"name":106,"value":107,"isEmail":36,"isPhoneNumber":36,"isText":36,"showOnDesktop":33,"showOnMobile":33,"attachment":108,"geofencings":109},"For Law Enforcement","/legal/guidelines-for-law-enforcement-agencies/",{},{},{"noFollow":33,"isExternal":36,"name":111,"value":112,"isEmail":36,"isPhoneNumber":36,"isText":36,"showOnDesktop":33,"showOnMobile":33,"attachment":113,"geofencings":114},"Fee Schedule","/fee-schedule/",{},{},{"noFollow":36,"isExternal":36,"name":116,"value":117,"isEmail":36,"isPhoneNumber":36,"isText":36,"showOnDesktop":33,"showOnMobile":33,"attachment":118,"geofencings":119},"FAQ","/faq/",{},{},{"title":121,"content":17,"items":122},"Products",[123,128],{"noFollow":36,"isExternal":36,"name":124,"value":125,"isEmail":36,"isPhoneNumber":36,"isText":36,"showOnDesktop":33,"showOnMobile":33,"attachment":126,"geofencings":127},"Mobile Apps","/mobile/",{},{},{"noFollow":36,"isExternal":36,"name":129,"value":130,"isEmail":36,"isPhoneNumber":36,"isText":36,"showOnDesktop":33,"showOnMobile":33,"attachment":131,"geofencings":132},"Tradeview","/market/tradeview/",{},{},{"title":134,"content":17,"items":135},"Services",[136,141,146,151],{"noFollow":36,"isExternal":36,"name":137,"value":138,"isEmail":36,"isPhoneNumber":36,"isText":36,"showOnDesktop":33,"showOnMobile":33,"attachment":139,"geofencings":140},"Institutions & Partners","/institutional-trading/",{},{},{"noFollow":36,"isExternal":36,"name":142,"value":143,"isEmail":36,"isPhoneNumber":36,"isText":36,"showOnDesktop":33,"showOnMobile":33,"attachment":144,"geofencings":145},"Bitstamp as a Service","/bitstamp-as-a-service/",{},{},{"noFollow":36,"isExternal":36,"name":147,"value":148,"isEmail":36,"isPhoneNumber":36,"isText":36,"showOnDesktop":33,"showOnMobile":33,"attachment":149,"geofencings":150},"The Bitstamp Ecosystem","/partners/",{},{},{"noFollow":36,"isExternal":36,"name":152,"value":153,"isEmail":36,"isPhoneNumber":36,"isText":36,"showOnDesktop":33,"showOnMobile":33,"attachment":154,"geofencings":155},"Pro","/pro/",{},{},{"title":157,"content":17,"items":158},"Resources",[159,164,169,174,178,183,188],{"noFollow":33,"isExternal":36,"name":160,"value":161,"isEmail":36,"isPhoneNumber":36,"isText":36,"showOnDesktop":36,"showOnMobile":33,"attachment":162,"geofencings":163},"HTTP API","/api/",{},{},{"noFollow":36,"isExternal":36,"name":165,"value":166,"isEmail":36,"isPhoneNumber":36,"isText":36,"showOnDesktop":36,"showOnMobile":33,"attachment":167,"geofencings":168},"Websocket API v2","/websocket/v2/",{},{},{"noFollow":36,"isExternal":36,"name":170,"value":171,"isEmail":36,"isPhoneNumber":36,"isText":36,"showOnDesktop":36,"showOnMobile":33,"attachment":172,"geofencings":173},"FIX v2","/fix/v2/",{},{},{"noFollow":33,"isExternal":36,"name":175,"value":161,"isEmail":36,"isPhoneNumber":36,"isText":36,"showOnDesktop":33,"showOnMobile":36,"attachment":176,"geofencings":177},"API Documentation",{},{},{"noFollow":36,"isExternal":36,"name":179,"value":180,"isEmail":36,"isPhoneNumber":36,"isText":36,"showOnDesktop":33,"showOnMobile":33,"attachment":181,"geofencings":182},"PGP Key","/pgp-key/",{},{},{"noFollow":36,"isExternal":36,"name":184,"value":185,"isEmail":36,"isPhoneNumber":36,"isText":36,"showOnDesktop":33,"showOnMobile":33,"attachment":186,"geofencings":187},"Lightning Network","/lightning-network-node/",{},{},{"noFollow":36,"isExternal":36,"name":189,"value":190,"isEmail":36,"isPhoneNumber":36,"isText":36,"showOnDesktop":33,"showOnMobile":33,"attachment":191,"geofencings":192},"Crypto Pulse","/crypto-pulse/",{},{},{"title":194,"content":17,"items":195},"Address",[196,200,204,208],{"noFollow":36,"isExternal":36,"name":197,"value":17,"isEmail":36,"isPhoneNumber":36,"isText":33,"showOnDesktop":33,"showOnMobile":33,"attachment":198,"geofencings":199},"Bitstamp Ltd",{},{},{"noFollow":36,"isExternal":36,"name":201,"value":17,"isEmail":36,"isPhoneNumber":36,"isText":33,"showOnDesktop":33,"showOnMobile":33,"attachment":202,"geofencings":203},"5 New Street Square",{},{},{"noFollow":36,"isExternal":36,"name":205,"value":17,"isEmail":36,"isPhoneNumber":36,"isText":33,"showOnDesktop":33,"showOnMobile":33,"attachment":206,"geofencings":207},"London, EC4A 3TW",{},{},{"noFollow":36,"isExternal":36,"name":209,"value":17,"isEmail":36,"isPhoneNumber":36,"isText":33,"showOnDesktop":33,"showOnMobile":33,"attachment":210,"geofencings":211},"United Kingdom",{},{},{"title":213,"content":17,"items":214},"Contact",[215,220,224,228,232,236,241,246],{"noFollow":36,"isExternal":36,"name":216,"value":217,"isEmail":36,"isPhoneNumber":36,"isText":36,"showOnDesktop":33,"showOnMobile":33,"attachment":218,"geofencings":219},"Customer support","/customer-support/",{},{},{"noFollow":36,"isExternal":36,"name":221,"value":221,"isEmail":33,"isPhoneNumber":36,"isText":36,"showOnDesktop":33,"showOnMobile":33,"attachment":222,"geofencings":223},"info@bitstamp.net",{},{},{"noFollow":36,"isExternal":36,"name":225,"value":225,"isEmail":33,"isPhoneNumber":36,"isText":36,"showOnDesktop":33,"showOnMobile":33,"attachment":226,"geofencings":227},"press@bitstamp.net",{},{},{"noFollow":36,"isExternal":36,"name":229,"value":229,"isEmail":33,"isPhoneNumber":36,"isText":36,"showOnDesktop":33,"showOnMobile":33,"attachment":230,"geofencings":231},"support@bitstamp.net",{},{},{"noFollow":36,"isExternal":36,"name":233,"value":233,"isEmail":33,"isPhoneNumber":36,"isText":36,"showOnDesktop":33,"showOnMobile":33,"attachment":234,"geofencings":235},"complaints@bitstamp.net",{},{},{"noFollow":36,"isExternal":36,"name":237,"value":238,"isEmail":36,"isPhoneNumber":33,"isText":36,"showOnDesktop":33,"showOnMobile":33,"attachment":239,"geofencings":240},"+44 20 3868 9628","+442038689628",{},{},{"noFollow":36,"isExternal":36,"name":242,"value":243,"isEmail":36,"isPhoneNumber":33,"isText":36,"showOnDesktop":33,"showOnMobile":33,"attachment":244,"geofencings":245},"+1 800 712 5702","+18007125702",{},{},{"noFollow":36,"isExternal":36,"name":247,"value":248,"isEmail":36,"isPhoneNumber":33,"isText":36,"showOnDesktop":33,"showOnMobile":33,"attachment":249,"geofencings":250},"+352 20 88 10 96","+35220881096",{},{},"\u003Cp>Please read the general \u003Ca href=\"/legal/risk-warning/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Risk Warning\u003C/a>, and \u003Ca href=\"/legal/uk-investment-risk-warning/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Risk Summary\u003C/a> for UK residents before investing in crypto-assets. \u003C/p>\n\u003Cp>Crypto-assets services are provided by the following Bitstamp legal entities depending on client residency: (1) Bitstamp Europe S.A., which is authorized by the Commission de Surveillance du Secteur Financier (CSSF) in Luxembourg as a payment institution (licence number Z00000012) and crypto-asset service provider (licence number N00000003); Registered address: 40, avenue Monterey, L-2163 Luxembourg, Grand Duchy of Luxembourg; Registration number: B196856; (2) Bitstamp UK Ltd., which is registered with the Financial Conduct Authority (FCA) in the UK for the provision of certain cryptoassets activities under the Money Laundering Regulations (Firm Reference Number 978690); Registered address: 5 New Street Square, EC4A 3TW London, United Kingdom; Registration number: 14174243; (3) Bitstamp Ltd.with its registered address at 5 New Street Square, EC4A 3TW London, United Kingdom and registration number: 8157033; (4) Bitstamp Global Ltd., which is registered as a Virtual Asset Service Provider in the British Virgin Islands and is supervised by the British Virgin Islands Financial Services Commission (FSC); Registered address: Floor 4, Banco Popular Building, Road Town, Tortola VG1110, British Virgin Islands; Registered number: 2086429; and (5) Bitstamp Asia Pte Ltd, which is authorized by the Monetary Authority of Singapore (MAS) as a major payment institution (licence number PS20200667); Registered address: 63 Chulia Street, OCBC Centre East, #15-01, Singapore 049514; Registered number: 202016687K;\u003C/p>\n\u003Cp>Virtual currency services to US residents are provided by Bitstamp USA, Inc., which is licensed to engage in virtual currency business activity by the New York State Department of Financial Services. Licensed as a Money Transmitter by the New York State Department of Financial Services. Review a \u003Ca href=\"/legal/usa-inc/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">list of its licenses and other registrations\u003C/a> (NMLS number \u003Ca href=\"https://www.nmlsconsumeraccess.org/EntityDetails.aspx/COMPANY/1905429\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">1905429\u003C/a>) for more information; Registered address: 85 Willow Road, Menlo Park, CA 94025, United States of America; Registered number: 5481543.\u003C/p>\n\u003Cp>Investment services with regards to trading in crypto derivatives are provided by Bitstamp Financial Services Ltd., which is authorized and supervised by the Slovenian Securities Market Agency (ATVP) as a MiFiD investment firm. Trading crypto derivatives carries significant risks and may result in substantial losses. Please trade responsibly and ensure you understand the associated risks. You can find more about the risks \u003Ca href=\"/legal/financial-services/general-terms-and-conditions/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">here\u003C/a>. To help you understand the risks involved we have put together a series of \u003Ca href=\"/derivatives/key-information-documents/\" target=\"_blank\" rel=\"noopener noreferrer\">Key Information Documents (KIDs)\u003C/a> highlighting the risks and rewards related to each derivatives contract. Crypto derivatives trading is not available to customers in the US, Canada, Japan and some other countries. Bitstamp Financial Services Ltd. does not provide crypto-asset services.\u003C/p>\n\u003Cp>To find out more about which Bitstamp entity you receive services from, please check the Profile/My information in your Bitstamp account. You can read more about our legal terms, policies and disclosures \u003Ca href=\"/legal/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">here\u003C/a>.\u003C/p>\n","\u003Cp>All rights reserved © 2026 Bitstamp by Robinhood. \u003Ca href=\"https://www.nmlsconsumeraccess.org/EntityDetails.aspx/COMPANY/1905429\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">NMLS #1905429\u003C/a>\u003C/p>\n",{"items":254,"ready":33,"platformButtonText":300,"backButtonText":301,"logInButtonText":302,"signUpButtonText":303},[255,260,266,269,273,278,283,286,291,296],{"headerName":256,"sidemenuName":137,"url":257,"noFollow":36,"showInHeader":33,"showInSidemenu":33,"geofencings":258,"submenu":259,"tag":17},"Institutions","/en-gb/institutional-trading/",{},[],{"headerName":261,"sidemenuName":261,"url":262,"noFollow":36,"showInHeader":33,"showInSidemenu":33,"geofencings":263,"submenu":264,"tag":265},"Derivatives","/perpetual-futures/",{},[],"NEW",{"headerName":152,"sidemenuName":152,"url":153,"noFollow":36,"showInHeader":33,"showInSidemenu":33,"geofencings":267,"submenu":268,"tag":17},{},[],{"headerName":270,"sidemenuName":270,"url":125,"noFollow":36,"showInHeader":33,"showInSidemenu":33,"geofencings":271,"submenu":272,"tag":17},"Mobile App",{},[],{"headerName":274,"sidemenuName":274,"url":275,"noFollow":36,"showInHeader":33,"showInSidemenu":33,"geofencings":276,"submenu":277,"tag":17},"Markets","/markets/",{},[],{"headerName":279,"sidemenuName":279,"url":280,"noFollow":36,"showInHeader":33,"showInSidemenu":33,"geofencings":281,"submenu":282,"tag":17},"Earn Stake","/en-gb/crypto-staking/",{},[],{"headerName":129,"sidemenuName":129,"url":130,"noFollow":36,"showInHeader":33,"showInSidemenu":33,"geofencings":284,"submenu":285,"tag":17},{},[],{"headerName":287,"sidemenuName":287,"url":288,"noFollow":36,"showInHeader":33,"showInSidemenu":33,"geofencings":289,"submenu":290,"tag":17},"Blog","https://blog.bitstamp.net/",{},[],{"headerName":292,"sidemenuName":292,"url":293,"noFollow":36,"showInHeader":33,"showInSidemenu":33,"geofencings":294,"submenu":295,"tag":17},"Learn","/learn/",{},[],{"headerName":297,"sidemenuName":297,"url":125,"noFollow":36,"showInHeader":36,"showInSidemenu":33,"geofencings":298,"submenu":299,"tag":17},"Get Bitstamp by Robinhood app",{},[],"Go to platform","Back","Log in","Get started",[305,308,312,316,320,324,328,332,336,340],{"title":32,"url":306,"geofencings":307},"/en-gb/learn/blockchain/",{},{"title":309,"url":310,"geofencings":311},"Company profiles","/en-gb/learn/company-profiles/",{},{"title":313,"url":314,"geofencings":315},"Crypto 101","/en-gb/learn/crypto-101/",{},{"title":317,"url":318,"geofencings":319},"Crypto definitions","/en-gb/learn/crypto-definitions/",{},{"title":321,"url":322,"geofencings":323},"Crypto trading","/en-gb/learn/crypto-trading/",{},{"title":325,"url":326,"geofencings":327},"Cryptocurrency guide","/en-gb/learn/cryptocurrency-guide/",{},{"title":329,"url":330,"geofencings":331},"People profiles","/en-gb/learn/people-profiles/",{},{"title":333,"url":334,"geofencings":335},"Security","/en-gb/learn/security/",{},{"title":337,"url":338,"geofencings":339},"Tutorials","/en-gb/learn/bitstamp-tutorials/",{},{"title":341,"url":342,"geofencings":343},"Web3","/en-gb/learn/web3/",{},1775562984779]