Au cœur de la campagne, une exposition itinérante dévoile les histoires de douze personnes qui témoignent de leur réalité derrière les apparences, au travers de portraits photo et vidéo. La photographe Johanna De Tessières révèle, au-delà de la souffrance, des personnalités uniques et attachantes. L’exposition a été spécialement conçue comme un dispositif itinérant et est destinée à voyager dans différents lieux à Bruxelles et en Wallonie.
Des portraits vidéos
En complément des portraits photographiques, l’exposition propose aux visiteur·ices de découvrir les récits vidéos des différents témoins. Leurs récits parlent de solitude et d’incompréhension, mais aussi de courage et de résilience.
Many traders assume that a Coinbase login is an on-ramp as straightforward as entering an email and password. That’s the misconception I want to correct up front: in 2026 Coinbase’s login and account surface have evolved into a layered identity and custody system where “logging in” now implies choices about custody model, regionally gated features, API access, and the security posture you accept. For active US traders this matters because the path you pick at sign-in changes fees you face, which markets you can touch, and how recoverable your funds are if something goes sideways.
This explainer walks through the mechanisms behind Coinbase account entry, the trade-offs you implicitly accept when you log in, and practical heuristics you can use to choose the right setup for the trading you want to do. I’ll show the difference between quick consumer sign-in, institutional/Prime workflows, and the self-custody alternatives that matter for serious risk management—plus the limits and regulatory dependencies that determine what features are available in the US.
How Coinbase account layers work: identity, custody, and capability
At a mechanism level, a Coinbase account is three linked systems: identity (who you are and what you can access), custody (who controls private keys), and capability (what markets, APIs, and products you can use). For most US retail users the identity layer includes KYC checks and bank linking; this determines fiat rails, deposit/withdrawal limits, and whether you can access certain tokens. Custody sits on a spectrum: from full Coinbase custodial custody (they hold private keys) through Coinbase Wallet self-custody (you hold keys) to hardware-backed cold storage integrated via Ledger. Capability maps to product lines: Coinbase Consumer for retail trading, Coinbase Exchange with advanced order types and dynamic fee tiers, and Coinbase Prime for institutional trading and custody.
That structure has practical consequences. If you log in through the consumer app and keep assets on the exchange, you trade with an interface optimized for convenience and liquidity access but you delegate key custody to Coinbase. If you instead connect a Coinbase Wallet or a Ledger via the browser extension, you retain key control but you lose some integrated convenience—like instant fiat conversions or on-exchange margin facilities available to custodial accounts.
Common login paths and the trade-offs traders should know
There are three common entry routes US traders use, each with clear trade-offs:
– Consumer sign-in to Coinbase (custodial): fastest for fiat on/off ramps, immediate trading, access to staking and shareable payment links. Trade-off: counterparty risk and regulatory gating—some assets or fiat features can be restricted by jurisdictional rules.
– Coinbase Exchange / Advanced login (custodial with pro features): provides dynamic fee structures favorable to high-volume traders and programmatic access via FIX/REST APIs and WebSocket streams. Trade-off: more tools and lower fees for volume but still custodial; withdrawal and custody rules are unchanged, and API keys require careful lifecycle management.
– Self-custody via Coinbase Wallet or hardware (non-custodial): gives you sole control of private keys, Web3 username convenience, and hardware wallet compatibility (Ledger with blind signing). Trade-off: no built-in deposit insurance and greater responsibility for recovery phrases; reconnecting to Exchange for fiat requires moving assets on-chain.
If you want a single place to start for login instructions tailored to common workflows, this page explains the steps in plain terms: coinbase login. Use it as an operational checklist, not a substitute for the custody decision.
Security mechanics that make a difference
Two security shifts are particularly important to understand. First, Coinbase’s Base account system and OnchainKit introduce passkey biometric logins and gasless sponsored transactions. That reduces phishing risk relative to passwords but changes threat models—if your device-level biometric or passkey is compromised, attackers could get entry without a password. Second, institutional offerings like Coinbase Prime use threshold signatures and audited key management (enterprise-grade key guards); these are designed to lower single-point-of-failure risks for large pools of assets but create operational complexity and onboarding friction that many retail traders don’t need.
Practical rule: prefer multifactor protection on custodial accounts (authenticator apps, hardware 2FA) and use hardware wallets for any on-chain balances you cannot afford to lose. Remember that self-custody shifts recovery risk to you; there is no universal “undo.”
Where Coinbase breaks and what to watch for
Coinbase’s design choices expose clear boundary conditions. First, regulatory compliance is a gating factor: access to cash balances, certain deposit methods, and specific assets depends on state and federal rules. That means two US users can see different asset sets and deposit options despite having near-identical accounts. Second, zero-fee asset listings reduce pay-to-play listing pressure, but Coinbase still assesses decentralization, legal compliance, and security—tokens with unilateral admin keys often won’t be listed. Third, advanced infrastructure—staking, slashing coverage, and multi-cloud validators—reduces some protocol risks but cannot eliminate market volatility or smart contract bugs.
For traders, the takeaway is a heuristic: align custody choice with time horizon and use-case. Day traders may prefer custodial Exchange accounts for speed and API trading. Portfolio holders and DeFi users should prefer self-custody or hardware-backed wallets for long-term storage and direct protocol interactions.
One framework to choose your login and custody model
Use a three-question decision heuristic before you log in or transfer funds:
1) What’s the primary activity? (high-frequency trading, staking, DeFi interaction, long-term holding) — match custody: Exchange for speed, Wallet/hardware for long-term or DeFi.
2) What loss would be catastrophic? (small inconvenience vs. capital loss). If catastrophic, favor self-custody with hardware and segmented wallets.
3) Do you need programmatic access? If yes, configure Exchange API keys with restrictive scopes and short lifetimes; monitor via WebSocket feeds for trade confirmations.
This heuristic isn’t perfect, but it forces you to convert preferences into concrete security and cost decisions rather than treating login as a single neutral act.
Near-term signals and what to monitor
Watch two things that will change the login-and-account calculus: regulatory policy in the US and Coinbase’s product integrations. Policy shifts can instantly reclassify which assets are available to retail custodial accounts or change fiat rails. On the product side, the newly announced Coinbase Token Manager (recently rebranded from Liqui.fi) aims to smooth token management for projects and DAOs; if institutional tooling becomes more integrated with Prime custody, expect a gradual rise in on-exchange native token utilities that affect liquidity and trading costs. Both developments—regulatory gating and richer custody-token integrations—alter the cost-benefit analysis of keeping funds custodial versus self-custodial.
Signals that matter: changes in state-level crypto licensing, modifications in bank-fiat rails, and product announcements that tie token utilities to custody or trading tiers. Treat these as conditional — they change the environment, not deterministic outcomes.
FAQ
Do I need a Coinbase account to trade on Coinbase Exchange?
Yes. Coinbase Exchange is designed as an advanced layer on top of a verified Coinbase identity. That identity determines fiat access, trading permissions, and API credentialing. Institutional-grade features require additional onboarding (Prime), which includes custody and compliance checks.
Is Coinbase Wallet the same as having a Coinbase account?
No. Coinbase Wallet is a self-custody product. Holding tokens there means Coinbase cannot recover or access them without your recovery phrase. You can connect a Wallet to Exchange services, but moving between custody models requires on-chain transfers that incur network fees.
How do fees compare when I log into the Exchange vs. the consumer app?
Fee structures diverge by product. The Exchange offers dynamic fee tiers and is generally cheaper for large-volume traders; the consumer app prioritizes convenience and may have wider retail spreads. If you plan high-volume activity, use Exchange-level accounts and API access to capture lower maker/taker fees.
Can I use hardware wallets with Coinbase services?
Yes. Coinbase Wallet supports Ledger integration through the browser extension, but you must enable blind signing on your Ledger device for some interactions. Hardware wallets are the best practice for cold storage, but they complicate instant trading and fiat conversion because assets must be transferred on-chain to the custodial Exchange to trade quickly.
Okay, quick confession: I get prickly when a wallet markets “multi-chain” but really just tacks on networks without the UX or safety plumbing to back it up. Seriously, it’s one thing to list 40 chains and another to let users safely move value across them. My instinct says users notice the gaps fast — failed swaps, unexpected approvals, phantom gas costs — and they leave, or worse, lose funds.
Here’s the thing. For experienced DeFi users who care about security, three features are not bells and whistles — they’re baseline: reliable transaction simulation, robust WalletConnect handling, and honest multi-chain support that respects both UX and threat models. Initially I thought “yeah, sure — all wallets do this,” but then I dug into what actually happens under load, with aggressive gas markets, and across L2 rollups. Actually, wait — let me rephrase that: a lot of wallets claim capability but cut corners on simulation fidelity, session security, or chain handling, and those corners are where trouble lives.
Transaction simulation deserves more attention. Simulation isn’t just estimating gas; it’s about replaying the exact call graph your dApp would produce, catching slippage, reverts, and subtle reentrancy or approval flows before you sign. A good simulator runs a local EVM fork or uses a tracing RPC to produce a deterministic result that mirrors mainnet conditions as closely as possible. On one hand this sounds heavy; on the other hand, skipping it means users sign blind and pay for it later. The best approach blends short, synchronous prechecks (fast and cheap) with optional deeper traces when risk is high.
Practical patterns that actually reduce risk
Fast checks first: validate input parameters, nonce, estimated gas, and token balances locally. Medium checks: estimate slippage by simulating the swap path against an on-chain state snapshot. Longer checks: run a complete trace against a forked state (or a reliable trace RPC) to confirm no hidden reverts or state changes happen mid-transaction. These layered checks reduce false positives and keep latency manageable — because yes, users will abandon a flow that stalls for 15 seconds.
WalletConnect is wonderful and also a constant attack surface. Wow — the convenience of QR or deep linking is addictive. But the session model matters: session-scoped permissions should be minimal by default. Session requests should clearly list methods requested (not just generic “sign” wording). If an app asks for broad access, nudge the user to require only what’s needed. There’s a balance: power users want batch signatures and conveniences; security-conscious users want granular approvals. Wallet UX should support both, not pretend one-size-fits-all works.
Something felt off about many implementations: they keep the session alive forever unless a user manually revokes it. That’s a no. Time-limited sessions, device whitelisting, or one-click quick-revoke flows reduce attack windows. Also—oh, and by the way—displaying the dApp origin prominently, along with a clear summary of pending RPC methods, cuts down social-engineering tricks. My instinct says that transparency reduces errors, and the industry data backs that up: visible intent = fewer accidental approvals.
Multi-chain support is more than swapping RPC endpoints. It’s about canonical identities for tokens and contracts, gas estimation differences, and UX that respects per-chain idiosyncrasies. For instance, L2s often have different sequencing guarantees and fee tokens. A wallet needs a per-chain adapter layer: chain metadata, gas model, explorer links, token representation, and simulation backends. On one hand it’s engineering overhead; though actually, the payoff is huge — consistent user expectations even when the underlying L1/L2 behavior diverges.
Here’s a practical checklist wallets should implement for multi-chain safety:
Canonical chain IDs and contract address normalization (ensures you don’t confuse wrapped assets across chains).
Per-chain simulation endpoints (forked or traced) so simulations reflect real gas and state behavior.
Automatic network suggestions only when safe; never auto-switch without explicit user confirmation.
Clear gas payment previews (native vs sponsored fees, L1 batching costs), plus “why this gas” explanations.
WalletConnect integration and multi-chain simulation are related. When a dApp requests a transaction on a chain different from the wallet’s active chain, the wallet should either reject with a clear error or prompt a one-click, atomic network switch that includes a pre-simulated result for that chain. If the wallet merely offers to switch networks without re-simulating on the target chain, you’ve introduced subtle failure modes — and users will feel betrayed when a trade fails or overpays.
Okay, real talk: no solution is bulletproof. There are tradeoffs. Deep trace simulations are expensive and add latency. Light-weight checks can miss stateful attack vectors. Wallet UX that forces micro-decisions can overwhelm users. On one hand you need strict security defaults. On the other, forcing power users into friction is bad. The best design? Conservative defaults with expert modes that expose more control for advanced users.
If you’re evaluating wallets, watch for three signals: how they present transaction simulation results (is it actionable?), how they manage WalletConnect sessions (granular, revocable, time-limited?), and how they implement multi-chain metadata (is token identity consistent?). A wallet that nails these will save users from a large fraction of common losses — approvals gone wrong, failed swaps, and cross-chain mishaps.
Try it practically — what to test as an advanced user
Want to audit a wallet quickly? Try these steps: create a WalletConnect session with a familiar dApp and note the session permissions. Initiate a swap to a chain the wallet supports but is not currently selected and observe whether it re-simulates on the target chain. Create a token approval flow and see if the wallet shows exact spender addresses and allowance amounts, not vague “dApp wants access.” Finally, simulate a high-gas scenario and watch whether the wallet’s estimates align with on-chain outcomes — if there’s a pattern of huge undershoots, that’s a red flag.
If you want to try a wallet that focuses on developer- and security-minded UX, check this one out here. It’s not the only option, but the implementation choices they highlight — granular sessions, clear simulation outputs, and chain-aware behaviors — are worth studying.
FAQ
Q: How reliable are on-device simulations versus RPC trace services?
A: On-device (local) simulations are fast and private, but they can miss subtle differences present on the real network unless you fork state. RPC trace services are higher fidelity but depend on RPC provider quality and can introduce privacy concerns. Best practice: combine both—do a quick local precheck, and run an optional, deeper trace when the transaction is large or complex.
Q: Should WalletConnect always require explicit approval for every signature?
A: For safety, yes—by default. But experienced users often need batch approvals. Offer a tiered model: conservative default with an opt-in “power mode” that allows session-scoped batching, combined with time limits and quick-revoke.
Q: How do wallets handle token identity across chains?
A: The robust approach is mapping tokens by (chainId, contractAddress) and showing canonical names and logos from trusted metadata sources. Cross-chain tokens should be labeled clearly (e.g., “USDC (Polygon)”) and linked to on-chain metadata where possible. Ambiguity is a common source of user error—don’t let it happen.
Nous utilisons des cookies pour vous garantir la meilleure expérience sur notre site. Si vous continuez à utiliser ce dernier, nous considérerons que vous acceptez l'utilisation des cookies.