CEX.IO News

Ethereum Fork and CEX.IO

, February 28, 2019

The Ethereum Constantinople upgrade that was initially scheduled for November 2018 is expected to take place on February 28, 2019. The fork will happen at block number 7,280,000. We would like to inform you that CEX.IO will take all necessary steps to update our system and make sure your funds are completely safe.

What happens with Ethereum on CEX.IO

We will take care of all the technical issues before and during the upgrade to secure your funds so that you can be confident about the safety of your money.

Approximately an hour before the upgrade, we will pause ETH, GUSD, and QASH deposits and withdrawals. That is why we encourage you to carry out all the transactions in advance for them to reach your accounts or wallets without delays.

After the upgrade, we will test the network and make sure that everything runs smoothly. This will take around three hours. After we ensure that everything works properly, we will re-enable deposits and withdrawals of the mentioned cryptocurrencies. Please note that if you send the mentioned coins during the fork, you will receive the money after deposits and withdrawals are back on track.

We hope that you will gain better experience with Ethereum after the upgrade. We will do our best to make sure that you get the service you deserve.

Related

CEX.IO News

Get $50 from CEX.IO for the Holidays

The holiday season is approaching, and only two weeks are left before we start the new year. During this season, we would like to give presents to all users who trade with us during this holidays season. How do I get $50? The holidays are the perfect time for

Dec 17, 2018 | 2 min read
CEX.IO News

CEX.IO March 2022 Media Report

March 2022 was full of key media mentions and external recognition for the company. All of them are in our monthly media report!

Apr 08, 2022 | 4 min read
CEX.IO News Education

What are Public and Private Keys?

Public key cryptography, also known as asymmetric cryptography, is a type of cryptographic algorithms that operate with the help of two separate keys — private and public keys. These two are different, but at the same time they are mathematically related to one another. The keys have unrelated functional

Oct 08, 2014 | 3 min read