CEX.IO News

CEX.IO WebSocket API Goes Public

, March 17, 2016

We are glad to inform that WebSocket API documentation is now available in open access on CEX.IO website. WebSocket API is a useful tool for automated trading management. Allowing to get real-time notifications without sending extra requests, WebSocket API is a faster way to obtain data from the exchange.

Apart from WebSocket API, CEX.IO provides several more solutions for automated trading based on needs of individuals and institutions. Basic tool for quick access to CEX.IO market data and trade management using custom written software is REST API. 

The last API solution provided by CEX.IO is FIX API. Being developed through cooperation of many financial players, such as banks, exchanges, broker leaders, FIX has become leading trade-communication protocol. CEX.IO supports the FIX protocol version 4.4. and provides FIX API exclusively to institutional traders upon request.

Cross-Platform Trading on CEX.IO

All in all, CEX.IO offers cross-platform trading via website, mobile app, WebSocket, REST and FIX API, suiting needs of beginners and traders, and providing access to high liquidity order book for most popular currency pairs on Bitcoin market. Official mobile application is available for free download on iOS and Android.

Related

CEX.IO News

Proven Card Payment Security: CEX.IO Meets PCI DSS Level 1 Requirements

We are observing a continuous increase in the number of customers and card transactions processed on CEX.IO. With that in mind, we are proud to share that we have recently proved our card payment processing to be 100% secure and have upgraded our PCI DSS Certificate to Level 1.

Mar 15, 2019 | 3 min read
CEX.IO News

$25,000 Trading Competition Begins on CEX.IO!

We’re launching our $25,000 Trading Competition to celebrate lowered trading fees on CEX.IO. Trade and win prizes!

Feb 07, 2022 | 7 min read
CEX.IO News Education

What are Public and Private Keys?

Public key cryptography, also known as asymmetric cryptography, is a type of cryptographic algorithms that operate with the help of two separate keys — private and public keys. These two are different, but at the same time they are mathematically related to one another. The keys have unrelated functional

Oct 08, 2014 | 3 min read