At Pundi X SA, Optimal User Experience is at the forefront of our goals. We strive to provide our merchants and customers with all the resources necessary to ensure ease-of-use of our system.
Check out our User Manual below and learn how to use the best and most simple Crypto POS System in South Africa!
Accepted
cryptos & networks
Bitcoin
The Lightning Network
Mainnet
BNB
BSC - BEP20
USDT
BSC - BEP20
TRC20
ERC20
Ethereum
ERC20
Binance Pay
70+ Crypto's With Binance Pay!
More Listings Coming Soon!
Table of contents
1
accepting crypto payments
2
step
one
Select Cashier Pro
3
step
two
Input The Amount To Be Paid
4
step
three
Input The Amount To Be Paid
7
step
four
The Customer Will Need To Select This Icon On Binance And Then Scan The QR Code
8
step
five
The Customer Can Now Pick Which Cryptocurrency To Pay With
9
The Customer
wants to pay with
11
step
three
Display The QR Code To The Customer
12
step
four
Make Sure To Input The Exact BTC Amount As Shown
13
step
four
Click 'Send' And Scan The QR Code
17
The Customer
wants to pay witH BNB
This Includes USDT
On The BEP20
Network
19
Adding bnb network
Click 'Wallet' At The Top Of The Screen
Select 'Add a network
Choose BNB Smart Chain
21
step
four
Scan The QR Code
22
step
five
Make Sure To Input The Amount Exactly As It Is Shown
23
The Customer
wants to pay witH eth
This Includes USDT
On The ERC20
Network
25
step
four
Scan The QR Code
27
step
five
Make Sure To Input The Amount Exactly As It Is Shown
28
step
four
Scan The QR Code
32
the
wallet guide
In The World Of Crypto, There Are Countless Wallets Available For Customers To Use.
These Wallets Vary In The Following Ways:
34
1. Hardware Wallets: These are physical devices that store your private keys offline, making them the most secure type of wallet. They are immune to computer viruses and hacking attacks and are ideal for long-term storage of large amounts of cryptocurrency.
2. Software Wallets: These are digital wallets that can be accessed through a computer or mobile device. They can be further classified as "hot" or "cold" wallets. Hot wallets are connected to the internet and are more vulnerable to hacking attacks, while cold wallets are offline and offer more security.
3. Mobile Wallets: These are software wallets that can be accessed through a mobile device. They are convenient for making transactions on the go, but they are less secure than hardware wallets.
4. Custodial Wallets: These are wallets that are hosted by a third party, such as a cryptocurrency exchange. They are convenient for beginners but are less secure than non-custodial wallets.
5. Non-Custodial Wallets: These are wallets in which you take responsibility for securing your keys. They are the most secure type of wallet but require more technical knowledge to use.
35
Since There Are SO Many Wallets In Existence, It Is Impossible For Us To Know Them All!
In Order To Make Things More Simple, We Have Made Some Recommendations
36
What we
recommend
37
hardware
wallets
There Are 2 Main Hardware Wallets Available These Are:
These Wallets Often Pair With A Mobile App. Bear In Mind, Whenever A Withdrawal Is Attempted - Authorisation From The Hardware Device Might Be Required!
38
software
wallets
This Is The Most Abundant Form Of Wallet Available.
These Wallets Can Be Either Custodial Or Non-Custodial
Payments From Custodial Wallets Are Welcomed!
However, It Must Be Noted That When Using Custodial Wallets For Transactions, There Might Be Some Delays In Transaction Time As Well As Higher Transactions Fees!