Image Source: Pixabay
24 random words aren’t enough to keep your crypto safe — here’s why
From Legacy Transfer to an advanced Web3 Firewall, this self-custodial wallet makes crypto ownership more convenient and secure.
The multichain self-custodial Zengo Wallet addresses the inherent vulnerabilities of seed phrases by employing multiparty computation cryptography as a more secure alternative.
Over the years, numerous news reports have detailed how people have lost their life savings while using centralized crypto custodians. This, coupled with the high-profile collapses of major crypto firms such as FTX, Celsius, and BlockFi, caused users to turn their attention to self-custody solutions, which can be a safer approach for avid investors. Still, over $100 Billion dollars of Bitcoin alone has been lost or stolen in the last 10 years because of seed phrase mismanagement.
And according to Chainalysis, hackers siphoned off a staggering $3.8 billion in 2022. While flawed smart contracts and vulnerable cross-chain bridges contributed significantly to this figure, many victims lost their crypto holdings due to compromised seed phrases. Read More
Axie Infinity NFTs Can Soon Evolve Like Pokémon—Here's How
Exclusive: You can finally power-up your Axies and give them a new look with upgraded parts, but it'll take money, materials, and time.
Monster NFT characters in play-to-earn game Axie Infinity can soon be upgraded thanks to a major update that brings a “Stage 2” evolution to every Axie monster, details of which the game’s developers at Sky Mavis have exclusively shared with Decrypt.
Over 250 different Axie “parts” can be evolved on any Axie NFT beginning December 14, upgrading the character’s battle strength and aesthetic look.
“We’re turning Axies into digital collectibles that evolve as you play with them,” Sky Mavis co-founder Jeffrey “Jiho” Zirlin told Decrypt in an interview. “This has been something that’s actually been at the core of our vision for over five years now.” Read More
From Infancy to Giant — Tracing Bitcoin's Roots in Satoshi's Final Communication
Roughly thirteen years ago, the mysterious creator of Bitcoin, Satoshi Nakamoto, posted their final message on the bitcointalk.org forum on Dec. 12, 2010. Nakamoto’s brief yet impactful message alerted the community to the ongoing need for enhancements in denial of service (DoS) attack prevention. Interestingly, although Nakamoto’s final communication was dated Dec. 12, Bitcoin’s originator had some level of activity on the forum the subsequent day.
Nakamoto’s Final Forum Post and the Network’s Youth:
Thirteen years have passed since Satoshi Nakamoto, the enigmatic figure behind Bitcoin, made their final post on bitcointalk.org. This retrospective examines the condition of Bitcoin at that juncture and Nakamoto’s sudden departure. On Dec. 12, 2010, Nakamoto addressed the community regarding Bitcoin version 0.3.19, where the elusive engineer remarked that DoS limits had been implemented, and safe mode alerts had been turned off.
“As Gavin and I have said clearly before, the software is not at all resistant to DoS attack,” Nakamoto told the community. “This is one improvement, but there are still more ways to attack than I can count.” Read More
Report: South African Financial Institutions Will Soon Offer Services Related to Cryptocurrencies
About 73 applicants who are seeking a licence to offer crypto products in South Africa are already registered as accountable institutions with the Financial Intelligence Centre, an executive at the crypto exchange Luno has said. According to the Luno executive, this may be an indication that regulated financial institutions are planning to add crypto to their product offerings.
Only a Few Non-Licensed Financial Service Providers Have Applied:
According to Tarris Arnold, the business development manager at the crypto exchange Luno, a majority of the entities that have applied for licences to offer crypto-related products are financial institutions. This, according to Arnold, may be an indication that many regulated financial institutions plan to add crypto to their offerings. Read More
We have a lot to be grateful for within Markethive. It’s like stepping out of the rat race into an oasis of humanity at its best. As an inbound marketing, business-based blockchain platform with an inherent entrepreneurial spirit, we have all the tools to get our message out to the whole world. We have a social media interface with a collaborative ethos rarely experienced on legacy social media.
We are starting to see new integrations in the blogging section in preparation for the customized, more intuitive interface and dashboard of Markethive and, of course, the Markethive Wallet that will facilitate the Merchant accounts for members as well as personal transactions, the Vault, etc.
The new-look Blogcasting Hub is located at the top of all blogs in the system. Blogcasting is a term introduced by Markethive and is an enhanced broadcasting system. In the traditional broadcasting sense, only the people who physically subscribe to your blog or newsletter are usually notified of your updates via email.
With this blogcasting system, your social networks are informed of your blog as and when you publish them. What this means is the potential reach is into the millions. Read More
Solana phone sales skyrocket as degens scramble for pumped-up BONK
At current prices, the free BONK airdrop for Saga owners stands at $877, making it — at least temporarily — a “phone that pays for itself.”
Memecoin hopefuls have been snapping up Solana’s crypto phone in droves after a recent price hike for Solana memecoin Bonk (BONK), which has risen more than 1,100% in the last 30 days.
Since the Solana phone was launched on May 8, new owners have been able to claim a free 30 million airdrop of the memecoin, but a recent rise in the token’s price has presented an interesting arbitrage opportunity for buyers.
“Solana phone sales have > 10x’d in the past 48 hours, and are now on track to sell out before the new year,” wrote Solana co-founder Raj Gokal in a Dec. 15 post to X (formerly Twitter).
At current prices, the 30 million BONK airdrop is worth an astonishing $877 — $278 more than the current $599 price tag of the Saga phone — making it one of the more bizarre arbitrage opportunities available for crypto enthusiasts. Read More
How the Ledger Connect hacker tricked users into making malicious approvals
According to Cyvers, the attacker caused malicious code to be inserted into multiple app user interfaces, allowing the exploiter to fool users into confirming transactions.
The Ledger hacker who siphoned away at least $484,000 from multiple Web3 apps on Dec. 14 did so by tricking users into making malicious token approvals, according to the team behind blockchain security platform Cyvers.
According to public statements made by multiple parties involved, the hack occurred on the morning of Dec. 14. The attacker used a phishing exploit to compromise the computer of a former Ledger employee, gaining access to the employee’s node package manager JavaScript (NPMJS) account.
Once they gained access, they uploaded a malicious update to Ledger Connect’s GitHub repo. Ledger Connect is a commonly used package for Web3 applications. Read More
How a Single Phishing Link Unleashed Chaos on Crypto
Ledger has confirmed the attack began because “a former Ledger employee fell victim to a phishing attack.”
Crypto wallet manufacturer Ledger has confirmed an exploit that led it to warn users to “stop using dapps” started because a former employee fell for a phishing scam.
The former employee’s name and email address showed up in the compromised code. Initially, the crypto community took it to mean that the developer himself was responsible for the exploit, but Ledger later confirmed the attack began because “a former Ledger employee fell victim to a phishing attack.” Read More
What are stealth addresses, and how do they work?
The purpose of crypto stealth addresses is to enable privacy for each transaction, concealing the recipient’s identity and transaction history.
Crypto stealth addresses are a privacy-enhancing feature in blockchain technology that lets users receive money anonymously. Unlike conventional public addresses, stealth addresses provide distinct, one-time addresses for every transaction. The recipient’s actual address is kept secret when a sender transfers funds using a stealth address; the transaction is broadcast to the network.
The recipient does not directly generate a private key from the stealth address; the wallet is designed to identify incoming transactions. It then utilizes the private key associated with the recipient’s public address to facilitate the recognition and processing of these transactions. This process allows the recipient to access and control the received funds without exposing their primary address. Read More
Disclaimer: These articles are provided for informational purposes only. They are not offered or intended to be used as legal, tax, investment, financial, or any other advice.