Midas Protocol - Crypto Wallet
source

Midas Protocol - Crypto Wallet

(70)
Price
Free
Category
Finance Business
Last update
May 05, 2021
Publisher
Midas Core Pte Ltd Contact publisher
View in store
Loading...

Ratings & Reviews performance

Ratings & Reviews performance provides an overview of what users think of your app. Here are the key metrics to help you identify how your app is rated by users and how successful is your review management strategy.

Number of reviews,
total
70
Avg rating,
total
⭐5.0
Loading...

User Reviews for Midas Protocol - Crypto Wallet

Why to reply to reviews?face_screaming

User reviews affect conversion to installs and app rating. Featured and helpful reviews are the first to be noticed by users and in case of no response can affect download rate.

Description

1273 chars

Midas wallet’s focus is speed, with low resource usage and simplifying the heavy traditional wallets. ● Instant on, always up-to-date: the wallet client does not download the blockchain, it requests that information from a Midas wallet services. Able to store hundreds of coins and tokens with low resource usage (few MB only) ● Encrypted wallet: the data file that contains private keys (of coins and tokens) and API keys (of exchange-account) is encrypted by user’s password, therefore user's data & private key are protected from thieves. ● Deterministic key generation: if the user loses the wallet, they can recover it from its seed. ● Transactions are signed locally: private keys are never sent outside, it verifies the information reported by Midas wallet service, using a technique called SPV (Simple Payment Verification). Users do not have to trust any external party (including Midas) with their money. ● Privacy: The servers do not store user accounts, unless they are sharing their portfolio and trading rules to earn leaderboard reward. Even in that case, users’ private keys would still be safe and no one could steal their money. ● No scripts: The wallet does not download any script. A compromised server cannot send arbitrary code and steal users' money.

Screenshots

https://is1-ssl.mzstatic.com/image/thumb/PurpleSource114/v4/f5/44/50/f5445051-1adf-aba6-2fc0-f32d50815828/aec278b6-c9f1-40e4-a235-c710322285b6_1.png/1242x2208bb.pnghttps://is2-ssl.mzstatic.com/image/thumb/PurpleSource124/v4/a9/0e/bd/a90ebd86-d573-af03-e6ac-4d2a5e64af29/72c9748b-eed2-4e9f-9dd3-44e66af3a0c3_4.png/1242x2208bb.pnghttps://is2-ssl.mzstatic.com/image/thumb/PurpleSource124/v4/95/7c/68/957c6841-df88-db36-c4bd-18b0262ca469/17e58798-76d1-4476-8d9d-1279f15be3ed_7.png/1242x2208bb.pnghttps://is1-ssl.mzstatic.com/image/thumb/PurpleSource124/v4/8a/97/38/8a973845-70ce-81d7-d263-73ee68927e68/18d53759-f7d7-4bbc-ab5b-81dfa1f2aadf_6.png/1242x2208bb.pnghttps://is4-ssl.mzstatic.com/image/thumb/PurpleSource124/v4/1e/09/9f/1e099fa4-1df1-f6f2-6d5b-8c59b0307138/76294afa-c1c1-431a-b531-ca8f141fb22d_3.png/1242x2208bb.pnghttps://is2-ssl.mzstatic.com/image/thumb/PurpleSource124/v4/9d/69/1e/9d691e44-0782-ea40-3721-a795550e26d1/3731cb5f-7ef5-4b24-be2c-8bbd0fecb4a2_8.png/1242x2208bb.pnghttps://is4-ssl.mzstatic.com/image/thumb/PurpleSource124/v4/c0/5a/8e/c05a8eb5-e5cb-5a99-495d-7891f14ddeae/81b6149b-39b5-47ac-a1d5-ff04505ca336_10.png/1242x2208bb.pnghttps://is2-ssl.mzstatic.com/image/thumb/PurpleSource114/v4/2b/fe/78/2bfe788a-bfef-1031-349f-3531914fabb1/48f7d927-1eb3-4f04-a2fe-e3ecc4e98315_12.png/1242x2208bb.pnghttps://is3-ssl.mzstatic.com/image/thumb/PurpleSource124/v4/6f/fb/54/6ffb5425-0dc0-87a9-f839-bb3cd81f660b/3f7fe568-0f2f-4fcd-b458-015ea1bc74c9_13.png/1242x2208bb.pnghttps://is2-ssl.mzstatic.com/image/thumb/PurpleSource124/v4/71/3a/c2/713ac268-4c54-c096-480f-d4eefdf12467/50687dfc-15cb-4aea-9fec-d10c793e698d_14.png/1242x2208bb.png
Loading...
Loading...

Find growth insights on our blog

React to user feedback and market trends faster