A VC Explains Web3 Applications, Protocols, and What To Expectby@duett
503 reads

A VC Explains Web3 Applications, Protocols, and What To Expect

tldt arrow
EN
Read on Terminal Reader
Read this story w/o Javascript

Too Long; Didn't Read

On top of the stack are tools that enable access to Web3 activities. You may call this the Access layer of the crypto ecosystem. Think of wallets (non-custodial or custodial) that allow for holding tokens and logging in, or onramp solutions helping to buy and sell crypto securely. A prominent example would be the Metamask Chrome extension & mobile app which can be used to identify as a user in an application.

Company Mentioned

Mention Thumbnail

Coin Mentioned

Mention Thumbnail
featured image - A VC Explains Web3 Applications, Protocols, and What To Expect
Markus Düttmann HackerNoon profile picture

@duett

Markus Düttmann

VC @ Nauta Capital


Receive Stories from @duett

react to story with heart

RELATED STORIES

L O A D I N G
. . . comments & more!