Connecting to a singular exchange via their API may be all that is required. But as the crypto coin landscape continues to evolve, the ability to switch exchanges, or even use arbitrage between exchanges can require a sizable investment of time and resources on your part.
Learning the intricacies of the Crypto Currency Exchange Connector can provide a solution.
Industry Standard Protocols
The protocol of choice for many financial exchanges is the FIX Protocol. This is the protocol that the Crypto Currency Exchange Connector uses. If your systems already speak FIX, using this service is the way to go.
Consolidated Transaction Information
Looking at your transaction history across exchanges can be cumbersome. The history of all transactions sent through the system can be reviewed. You now have a singular place to retrieve your transaction history, making trading system profitability calculations easier.
Additional Exchanges / Changes to an Exchange
Should an API change at one of the exchanges, we change our system. Changes to your system will probably be minimal or nothing at all. If an additional exchange appears, we implement their API on our side. You enter your account information on our website, and you then have access to the new exchange.
Contact us today to find out more about the Crypto Currency Exchange Connector.
Connecting to the Crypto Currency Exchange Connector may seem complex. However it was designed to give users the access they need without allowing rogue users access to your accounts.
To access the service, you must connect through TLS 1.2. Once connected, everything sent between you and the Exchange Connector is encrypted. No other system can eavesdrop on your communications if they receive encrypted packages.
On top of the encrypted communications, client side certificates are also required. A certificate held by you is installed on your machine. You and our systems have previously agreed that the certificate is yours. When you encrypt, you also sign your transmission using a key only known by you. Once your transmission is received by our system, we compare your signature to the one we computed by looking at your certificate. Once this process is complete, we are reasonably assured that
- A machine that has access to your client side certificate is the machine that generated the transmission.
- No entity between your systems and our systems has modified the transmission.
- No eavesdropper has seen the information shared between the two systems.
Software to Ease the Burden
While this may seem quite complex to set up, there is a utility to help. STunnel takes care of this for you. A properly configured STunnel client can handle the encryption and verification steps with little to no modifications to your existing software. More details of STunnel can be found at http://www.stunnel.org.
Here are some pictures of the Sunny Hill project done by the Georgia 3 Regional Building Committee.
Yes, I know my photo skills are bad. But here’s some details:
- 2 Apartments sit atop the hill
- Beneath the apartments is Auditorium C
- Auditorium C is much smaller than A & B, which are the same size.
- Auditoriums A & B are separated where you see the carport.
- Between A & B is a common area where a literature counter, bathrooms, and offices reside.
- Just outside each of auditoriums A & B are 2 libraries.