Sign in

We are excited to announce a new listing for KEX token. On June 17'th at 8 AM UTC the token will be available for trading at

This is another important step in providing our token holders with liquidity and wider market access via secure and trusted listing partners.

Upon the launch of the KIRA Mainnet in the coming months, we’ll continue to support ERC20 KEX token along the staking program, while also introducing the native KEX Mainnet token. Both tokens will be able to be easily converted from ERC20 to native KEX at 1:1 rate. …

Objective: KIRA Network deployment software compatibility between different host operating systems, architectures and environments


  • Minimum 32GB of the free storage space
  • Disposable cloud instance, or VM
  • Minimum 3GB of RAM
  • Ubuntu 20.04 LTS installed on the host instance or VM
  • Stable internet connection with at least 10 Mbps download speed

Source code:

  • KIRA Management tool — kira
  • Blockchain Application — sekai

Warning: Do not use your primary operating system to test any software releases as they can cause irreversible data loss. While using a personal computer and not a dedicated instance a virtualization software should be used such as…

Don’t Trust. Verify. Twice.

The main objective is to send Testnet tokens to the provided address. During this competition you will import and start a virtual machine, setup MetaMask, identify the challenge deposit address and transfer test tokens into it.

Follow instructions and document every step of your execution with screenshots which capture the FULL screen. To succeed you have to exercise critical thinking and due diligence throughout the entire process. Winner of this competition will be the one who provides the most detailed explanation and support documentation of their thinking process within the shortest period of time. The timing…

Best Practices & What to Look out For

KIRA Network we will be exploring further security best practices and things to look out for when exercising crypto etiquette. Before continuing, you should familiarize yourself with our first edition Don’t Trust. Verify. article as well as with results and pitfalls of the KIRA First Security Challenge where only 5 out of 138 people managed to protect themselves from every instance of the potential attack or other intention to deceive.

Workspace Isolation

Malicious software is becoming of less and less concern over the past years as old operating systems become replaced with almost daily…

KIRA Network Team is pleased to announce the winners and runners-up of our Security Challenge that was launched on October 22, 2020 at 1AM UTC and was announced on our twitter.

Participants had a chance to win an allocation of 2 ETH worth of KEX and 20 USDT by solving cryptographic challenges posted once every hour on our telegram channel. The main goal of the challenge was to simulate a real life scenario where KIRA Team publicly communicates a highly important message, such as the public round announcement, contract addresses or other information that everyone must trust. …

Communication Channels & Best Security Practices

KIRA Network community, we are getting close to the grand finale of the public round and for that reason we will be highlighting in this article means of communication between Kira Team along the best practices to stay safe and vigilant in order to prevent any possible scams and social engineering techniques.

Social Networks

There are many ways through which Kira Team engages with the public, the main ones are currently twitter, medium, telegram and email. It is very important that all those channels can be easily identified and that no one is misled by fake…

In this mini-tutorial, you will set up a working relayer service that maintains a persistent connection with the Game of Zones Hub or any other Cosmos Zones of your choosing in under a minute

📋 Prerequisites

apt-get install -y jq && $GO_VERSION="1.14.2" && get$GO_VERSION.linux-amd64.tar.gz && tar -C /usr/local -xvf go$GO_VERSION.linux-amd64.tar.gz && go version
clone_dir="/home/go/src/" && mkdir -p $(dirname $clone_dir) && git clone "" $clone_dir &> clone.log && cd $clone_dir && git checkout 2282f8b && git describe - tags && make install

In this article we will try to answer the following questions

  • Can Proof of Stake networks be decentralized ?
  • What is The Enlightened Democracy ?
  • Can delegators increase value of their tokens ?
  • How to minimize risk when delegating ?


The new paradigm is slowly approaching and multitude of new Proof of Stake tokens start to arise from the ashes of cryptocurrency depression in an accelerating peace, very much similar as in the very early Days of the Proof of Work hype. In my previous article on why staking matters I argued that the economy and underlying security of the…

The PoW Era

Over the years Bitcoin empirically proven itself to hold economical value, showed that humans value trustless transfer of digital property and that this property can at least in some cases replace money. The underlying consensus, the Proof of Work (PoW) invented more than decade ago turned out to become a standard for the years to come in securing majority of cryptocurrencies. If we take a closer look at the underlying economy of the PoW, we will realize that it’s based on assumption that trustless transfers hold value thus by introducing transaction fees and inflating the monetary supply…

This article is a script, that I wrote for the purpose of creating following video, that introduces Cosmos Network and some of its features:

Hopefully as time passess I will find more time to refine it into more readable form. Until that happens I present it to you “as is”.

Because we are getting close to the main-net launch of Cosmos Network and many people might want to quickly grasp the basics behind. …


Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store