Tools and resources
Research workflow, privacy, and exchange evaluation.
A neutral resource page for paper-stage traders and bot builders. This is not financial
advice and does not contain trading signals.
Research first
Paper workflow checklist
- Start with paper or backtest evidence before any live exchange connection.
- Track fees, slippage, funding, drawdown, exposure, and blocked-entry reasons.
- Keep API keys, secrets, private strategy parameters, and live execution out of shared reports.
- Use sanitized screenshots, logs, configs, and summaries for external reviews.
Open sample risk checklist report
Disclosure
Affiliate and referral note
Some links on this page may become affiliate or referral links. If you sign up through
them, we may earn a commission at no extra cost to you.
These links are optional resources, not financial advice, investment recommendations,
trading signals, or guarantees that any provider is suitable for your situation.
Exchange evaluation
Before choosing a crypto exchange
Availability
Check whether the provider, product, commission eligibility, and payout route work in your country or region.
Risk controls
Review account security, permissions, withdrawal protection, API scopes, and trading limits.
Costs
Compare spot fees, futures fees, funding, spread, withdrawal fees, and hidden operational costs.
Crypto trading involves risk. Product availability, affiliate eligibility, and commission rules
may vary by country or region. Do not trade with money you cannot afford to lose. We do not
manage capital, execute trades, provide live trading access, or ask for exchange API keys.
Crypto card reality
Before applying for a crypto card
Region first
Check whether the card is available for your country, residence, documents, and KYC status.
Fees and limits
Compare issuance, monthly, top-up, conversion, FX, ATM, and daily or monthly transaction limits.
Everyday use
Check virtual/physical card support, Apple Pay or Google Pay, supported assets, and unsupported transaction types.
Crypto cards are payment tools, not investment products. Availability, KYC, fees, limits,
supported assets, and referral eligibility may vary by country or region.
Privacy and infrastructure
VPN and proxy tools
VPN use cases
Public Wi-Fi security, remote work hygiene, creator account safety, and general privacy.
Proxy use cases
Compliant public-data research, QA workflows, monitoring, and business infrastructure testing.
Hard boundary
Do not use VPN or proxy tools to bypass KYC, sanctions, exchange restrictions, bans, or platform rules.
Candidate partners
Programs to evaluate