Latest audit time:
2023-11-10 00:00:00 (UTC+0)
Excess reserve value:
$ 0.43B
Algorithm:
Merkle Tree + zk-SNARKs
Total reserve rate:
115.69%
Merkle Root Hash:
06f0730b17adcc4ceacf61e5a1af7f51c1310df562366065af45a6558fae74e6
Customer Net Balance
$ 2,771,130,152
Gate Wallet Balance
$ 3,206,056,126
Excess reserve value
$ 434,925,974
Customer Net Balance
13,849
Gate Wallet Balance
17,108
Gate Wallet Balance USD
$ 624,531,052
Customer Net Balance
486,589,607
Gate Wallet Balance
495,951,134
Gate Wallet Balance USD
$ 495,951,134
Customer Net Balance
192,842
Gate Wallet Balance
224,676
Gate Wallet Balance USD
$ 471,649,798
Customer Net Balance
70,935
Gate Wallet Balance
71,296
Gate Wallet Balance USD
$ 149,583,998
Customer Net Balance
1,879,638,677
Gate Wallet Balance
1,973,623,332
Gate Wallet Balance USD
$ 146,152,728
Customer Net Balance
736,865,511
Gate Wallet Balance
738,508,943
Gate Wallet Balance USD
$ 67,115,692
When you use hot or cold wallets, you transfer a randomly designated amount to the addresses designated by the audit company to prove your ownership over the wallet.
The audit company will add up the balance of the relevant addresses to calculate the total amount involved in the transaction (including users' assets and self-owned assets of the platform).
Please refer to the diagram below for illustration. After the merkle tree is successfully built, the leaf nodes will be exported into a plain text file, which will be published together with the merkle root hash by the auditor.
In cryptography and computer science, a hash tree or Merkle tree is a tree in which every leaf node is labeled with the cryptographic hash of a data block. Every non-leaf node is labeled with the hash of the labels of its child nodes. Hash trees allow efficient and secure verification of the contents of large data structures.
a. The total amount of assets managed by the platform includes the total asset balance of all users.
b. The net balance of each user is greater than or equal to zero.
c. Change of any user's assets will result in alteration of the Merkle root hash value.
zk-SNARK, standing for Zero-Knowledge Succinct Non-Interactive Argument of Knowledge, is a groundbreaking tool rooted in cryptography. Utilizing advanced mathematical algorithms, it can proficiently validate the reserve amount without disclosing specific asset details. zk-SNARK not only facilitates swift asset verification but also negates privacy breach risks. Owing to these benefits, coupled with its non-interactive nature and high scalability, it finds extensive applications in areas like on-chain transaction verification, data privacy safeguards, and identity authentication
1. Install the program and download data:
1)Download the verification program:
First, download the verification program via the link provided or access GitHub to download the verification program. Then rename it to main.
2)Download required data:
Access to the Audit Page and locate the batch you need to verify. Click on [Download Merkle Tree] and [Download User Config] to download the data.
Unzip the zkmerkle_cex_xxx.tar.gz compressed file, place the mainprogram inside this folder, and put the user_config.json file inside the config folder.
The program folder is now
zkmerkle_cex_xxx
Config
cex_config.json
user_config.json
proof.csv
zkpor864.vk.save
main
2. Assets verification:
From cmd or terminal, use the cd command to navigate into the downloaded folder, such as cd ~/Downloads/zkmerkle_cex_xxx.
(Before running the program, you might need to execute chmod 777 mainto grant permissions or set security items.)
Execute the following command to begin verification.
./main verify cex
Upon successful verification, the message will be displayed.
All proofs verify passed!!!
For detailed technical documentation and verification principles, please check the GitHub open-source project.