Centralized Exchange (CEX)

Centralized Exchange (CEX)

Centralized exchanges most commonly facilitate trades between users by maintaining an order book: a collection of buy and sell orders posted by individual traders. Orders are requests to buy or sell a certain amount of a specific cryptocurrency at a certain price. CEXs aggregate orders from their users and then use special software to match and execute the corresponding buy and sell orders.

CEX users do not actually exchange crypto or fiat currencies with each other. Instead, when they deposit their funds onto an exchange, the latter takes over the custody of those assets and issues a corresponding amount of IOUs to the trader. The exchange tracks every user’s IOUs internally as they change hands in trades and only converts them into actual currency at the moment of withdrawal of funds.

As of 2020, CEXs are the most widespread mode of operation for cryptocurrency exchanges. The speed and cost-efficiency of processing transactions by a single point of authority make them a convenient venue for day traders and crypto investors to purchase and sell crypto.

The reliance of CEXs on a central entity does lead to some disadvantages, however. Centralized exchanges do not reveal their internal operations to the users, leading to a lack of transparency that enables malicious practices such as wash trading and price manipulation.

The fact that they hold custody over users’ assets makes a centralized exchange a lucrative target for potential attackers both from outside and from within the organization: in 2019, over $292 million worth of customer funds have been lost in just the 12 largest CEX hacks.

Technical issues or coordinated attacks can lead to significant downtime of CEX services, leading to lost trade opportunities for their customers. Finally, centralized exchanges represent an easy target for government censorship, allowing regulators to freeze and/or seize user funds and force the exchanges’ parent companies to reveal their customers’ personal information.
    • Related Articles

    • Centralized

      Centralized structures rely on a central point of authority to make decisions and maintain the operation of the entire system. Some examples of a centralized organization are a company that is controlled from the top-down by a single CEO or a small ...
    • Crypto Invoicing

      Crypto invoicing allows you to create different itemized bills and invoices for the products or services you offer. It enables you to bill clients in crypto via email, without the hassle of switching between wallets and apps. As cryptocurrencies ...
    • Crypto Debit Card

      A crypto debit card is a type of debit card that allows its holder to pay for goods and services using cryptocurrencies like Bitcoin (BTC), Litecoin (LTC) and Ethereum (ETH). Most crypto debit cards in use today are powered by Visa and MasterCard, ...
    • Cross-Border Trading

      “Cross-border trading grants the opportunity to trade in international markets against local counterparties and currencies, which presents unique trading opportunities. Investors engaged in cross-border trading can benefit from access to global ...
    • Denial-of-Service (DoS) Attack

      A denial-of-service attack restricts access to a computer or network in order to prevent intended users from using it. DoS attacks have become one of the go-to tools hackers employ in order to disturb the normal operation of computer-based services. ...