Page 1,225«..1020..1,2241,2251,2261,227..1,2301,240..»

Foodmasku Dishes Out Edible Masks on Ethereum – Decrypt

Some detractors of NFTs fixate on their ethereal, intangible nature. How can they be art, critics cry, if they're only digital, virtual, disconnected from reality?

It would be difficult to levy those claims against the works of Foodmasku.

Thats the moniker of Antonius Wiriadjaja, the multimedia performance artist whofor three years nowhas created NFTs depicting himself wearing masks made entirely of food, and then eating the masks. The ultimate consumption of the work is a rule, a key component.

The association between masks and foodand between food masks and the blockchain for that matteris not necessarily intuitive. That may be because, for Wiriadjaja, those connections were the product of organic necessity.

In the earliest months of the pandemic, the artist recalls, he and a group of remote colleagues were navigating the still-bizarre realm of Zoom encounters. One fateful day, one of his friends became inadvertently trapped in a video filter that apparently turned their face into a pickle. The caller was embarrassed. Wiriadjajas first impulse was to make them feel better.

So I took [a part of] my dinner, which was a piece of kale, put it on my face and said 'Hey, I have a filter on as well, Wiriadjaja told Decrypt at NFC Lisbon earlier this week.

The pickled participant was delighted, their shame washed away, and they asked Wiriadjaja what he was going to wear tomorrow. Foodmasku was born.

In the following weeks and months, Wiriadjaja dedicated himself to the mission of creating, documenting, and eating food masks. Banana eyes, broccoli nostrils, noodle noses, shrimp eyebrows... every day, a new sumptuous self-portrait.

The project steadily gained steam, but that success was a double-edged sword: people were so enamored with Wiriadjajas food masks that phony Foodmasku accounts began popping up across numerous social media platforms.

This was March 2021, and Wiriadjaja was frustrated. There had to be a way to own digital files, to protect his edible oeuvre. He did some searching online and came across NFTs. The artist Beeple had just sold an NFT artwork for $69 million, catapulting the emerging technology into the mainstream.

So Foodmasku became a Web3 artist. Not out of an ideological or artistic commitment to the ethos of decentralization, but insteadas with the inciting kale flapbecause it just made sense.

To date, Wiriadjaja has created almost 2,000 Foodmasku NFTs, generating about 50 ETH, or $92,000, in sales.

The artist, who was born in Indonesia and raised in Boston, has faced different reactions to his works across various cultures and contexts. A through-line, hes found, is that people across the world tend to be afraid of technology.

Technology is scary to everyone, everywhere, he said. Indonesians are worried that technologys going to kill off their traditional arts, Americans are worried technologys going to take all of their jobs. But one thing everybody relates to is food.

If foods and masks and emergent digital technologies can be brought together to give Wiriadjajas colorfully inventive and optimistic portraits a cohesive thesis, it might be that any medium possesses the capacity to tap into the universal vibrancy of humanity.

In that vein, Wiriadjaja has recently become fascinated with artificial intelligence. Hes developing a project called Proof of Eat, which is intended to clear the air on the increasing disquiet prompted by blurring of the line between humans and machines.

One big test of whether a creator is human or not, is if they can eat food, he said.

View original post here:

Foodmasku Dishes Out Edible Masks on Ethereum - Decrypt

Read More..

6 internet habits that can compromise your cybersecurity The … – The European Sting

(Credit: unsplash)

This article is brought to you thanks to the collaboration ofThe European Stingwith theWorld Economic Forum.

Author: Check Point

Nowadays we cannot live without the Internet, a basic resource among the new generations. Remember looking for information in an encyclopedia or going to a travel agency to buy a plane ticket or make a hotel reservation? It seems like ages ago, but the truth is that the network of networks has changed the way we do many tasks and has opened the doors to new possibilities that allow us, for example, to work from anywhere or make a bank transfer from our phone in just one click.

Unfortunately, this relentless evolution is also present in the multiple threats posed by cybercriminals. We have moved on from viruses distributed on floppy disks and Morris, the first worm to infect the Internet in 1988, to the emergence of Trojans, spyware and ransomware, the main protagonists of todays cybercrime scene. According to the Security Report 2023 from Check Point Software Technologies Ltd. (NASDAQ: CHKP), a leading global cyber security specialist provider, cyberattacks have increased by 38% in 2022 compared to the previous year, with an average of 1,168 attacks per week per organization and a situation that looks set to continue to worsen over the coming years.

Discover

What is the World Economic Forum doing on cybersecurity?

The World Economic Forum Centre for Cybersecurity drives global action to address systemic cybersecurity challenges. It is an independent and impartial platform fostering collaboration on cybersecurity in the public and private sectors. Here are some examples of the impact delivered by the centre:

Cybersecurity training: Salesforce, Fortinet, and the Global Cyber Alliance, in collaboration with the Forum, provide free and accessible training to the next generation of cybersecurity experts worldwide.

Cyber resilience: Working its partners, the Centre is playing a pivotal role in enhancing cyber resilience across multiple industries: Oil and Gas, Electricity, Manufacturing and Aviation.

IoT security: The Council on the Connected World, led by the Forum, has established IoT security requirements for consumer-facing devices, safeguarding them against cyber threats. This initiative calls upon major manufacturers and vendors globally to prioritize better IoT security measures.

Paris Call for Trust and Security in Cyberspace: The Forum is proud to be a signatory of the Paris Call, which aims to ensure global digital peace and security, emphasizing the importance of trust and collaboration in cyberspace.

Contact us for more information on how to get involved.

All of this makes it clear that we need to be prepared to face these threats, which is why Check Point Software has assembled this list of tips to remind us of the bad habits that we continue to maintain and that affect our digital security:

This is one of the most common mistakes, and yet one of the practices that most affects the maintenance of proper cybersecurity. We all find it easier to recycle passwords and use the same one for work and personal emails, but we are putting important data at risk. It is also very common to share them Netflix or Spotify passwords, for example and oftentimes we write them down or send them in a message or email to family or close friends. This reality translates into millions of users who every year see their accounts breached because they do not take care of their passwords. To avoid this, it is advisable to create secure passwords, with at least 12 characters and a combination of uppercase and lowercase letters, numbers, and special characters. Likewise, it is always recommended to update them every few months, and not to reuse them on several different platforms or accounts.

All systems and devices have regular updates designed not only to improve or correct usability, but also to apply patches for possible vulnerabilities. The message to update often appears at inconvenient times or when we do not have a Wi-Fi connection and we usually end up postponing or even ignoring its installation, unconsciously leaving an open door for cyberattacks. Just by keeping our devices up to date, we can avoid many of the vulnerabilities that can occur.

While most cyberattacks today focus on data theft, there has recently been a growth in hacktivist practices and other state-related threats. This type of practice often includes the distribution of disinformation with fake news or biased and incomplete messages that prey on the emotional side of users to generate discord. For this reason, it is advisable to use several sources when informing ourselves, as well as to check any news or chain message before falling into practices such as mass dissemination. One of the main pillars of Internet security is common sense.

To avoid using up your own data, it is increasingly common to surf between hot spots and free Wi-Fi networks in restaurants, airports, train or metro stations, hotels and even public or private transport. However, security researchers have demonstrated on numerous occasions that these types of wireless networks have little or no security. It is advisable not to access an unknown network, but if you must, limit your use to basic browsing, avoid entering passwords or using sensitive applications such as payment platforms or banking access.

Who ever reads the terms and conditions of data use? These lengthy and difficult to understand texts encourage most people to accept all the terms of use for any application without further ado. While this allows us to start enjoying them more quickly, it can lead to a serious security problem and even a breach of all our data. On the one hand, cybercriminals often use some popular applications or programs to spread their malicious code, while some malicious developers hide some clauses for the transfer of permissions to collect, store and even trade with this data. By taking a few minutes to review the permissions and conditions before installing a program, we can avoid falling victim to deception or exposure of our personal information.

A way to identify this type of fraudulent website is to look for small errors such as typos, poorly written text or the presence of misleading or poor-quality images. However, the most effective method is undoubtedly the analysis of the URL, with security indicators such as SSL certificates (indicated by the presence of a padlock next to the web address); or alerts, such as the presence of irregular characters or subdomains.

Although the Internet is still a fairly young tool, we already have a lot of experience at our disposal to avoid becoming victims of cyber attackers. Once again, we must call for education and common sense, as education and knowledge are key to achieving a safe digital space for everyone.

Like Loading...

Related

Go here to see the original:
6 internet habits that can compromise your cybersecurity The ... - The European Sting

Read More..

Adoption strategy of Bitcoin, Ethereum, and DogeMiyagi – Analytics Insight

As cryptocurrency becomes vastly normalised in the modern day, the adoption of various coins is becoming commonplace in many industries. Bitcoin (BTC) and Ethereum (ETH) are two of the most widely used cryptocurrencies, and as they continue to be accepted in many different use cases, while new currencies like DogeMiyagi (MIYAGI) have emerged as fascinating projects with a unique adoption strategy.

Different features of these coins contribute to the wider acceptance and use of cryptocurrencies, and with their adoption strategies the wider financial market is turning to crypto to explore fresh new approaches to the economy. So, lets take the time to access these tokens, to see how they fare in the world of finance.

DogeMiyagi (MIYAGI), a rising star in the crypto world, has garnered attention through its distinctive adoption strategy. The projects focus on meme-inspired branding and community engagement sets it apart from traditional cryptocurrencies like Bitcoin (BTC) and Ethereum (ETH). DogeMiyagi leverages the popularity of meme culture to attract a wide audience, particularly younger individuals who are more familiar with internet trends.

The team behind DogeMiyagi has successfully tapped into the power of social media platforms, creating a strong online presence. Through humorous and relatable content, they have captured the attention of crypto enthusiasts and those new to the space. By using comical elements and catchy phrases, as well as a sense of nostalgia, DogeMiyagi has created a sense of FOMO (Fear of Missing Out) among potential investors, further driving the adoption of their cryptocurrency.

In contrast to DogeMiyagis (MIYAGI) meme-driven approach, Bitcoin (BTC) and Ethereum (ETH) have established themselves as stalwarts in the crypto industry. BTC, often referred to as digital gold, gained popularity due to its decentralisation and limited supply. ETH, on the other hand, revolutionised the space by introducing smart contracts and paving the way for decentralised applications (DApps).

BTC and ETHs adoption strategies have been shaped by their technological advancements and the communitys recognition of their potential as digital assets. BTCs rise was driven by its store of value narrative and the increasing demand for a censorship-resistant digital currency. ETH, with its programmable blockchain, opened up a world of possibilities for developers and businesses seeking to leverage decentralised applications.

Several factors contribute to the wider acceptance and use of cryptocurrencies like DogeMiyagi (MIYAGI), Bitcoin (BTC), and Ethereum (ETH). First and foremost, technological advancements and the increasing ease of access have lowered barriers to entry, attracting a broader audience. Additionally, the growing recognition of cryptocurrencies as an alternative investment has led to increased adoption.

Community engagement and marketing play crucial roles in the success of any cryptocurrency. DogeMiyagis emphasis on meme culture and its active presence on social media platforms have resonated with a younger demographic, driving adoption. BTCs and ETHs established communities, built over the years, have also contributed to their widespread use.

Furthermore, partnerships with established institutions and integration into mainstream financial systems have played a vital role in wider acceptance. As more companies and payment processors begin to accept cryptocurrencies as a form of payment, the use and adoption of digital assets continue to expand.

DogeMiyagis (MIYAGI) adoption strategy, rooted in meme culture and community engagement, sets it apart from Bitcoin (BTC) and Ethereum (ETH). While the established giants of the crypto industry rely on technical advancements and their respective narratives, MIYAGI leverages humour and relatability to attract a wider audience.

The factors driving wider acceptance and use of cryptocurrencies include technological advancements, ease of access, community engagement, marketing strategies, and integration into mainstream financial systems. As more industries accept that crypto is the future, its strength in the financial sector will only continue to grow.

Website: https://dogemiyagi.com

Twitter: https://twitter.com/_Dogemiyagi_

Telegram: https://t.me/dogemiyagi

Read the original post:

Adoption strategy of Bitcoin, Ethereum, and DogeMiyagi - Analytics Insight

Read More..

Guardz Launches AI-Powered Multilayered Phishing Protection To … – PR Newswire

With more than 3 billion phishing emails sent every day, Guardz protects SMEs from the increased risk of this growing attack vector

TEL AVIV, Israel, June 8, 2023 /PRNewswire/ -- Guardz, the cybersecurity company securing and insuring SMEs, today announced a new AI-powered Multilayered Phishing Protection solution to help small and medium-sized enterprises (SMEs) and managed service providers (MSPs) prevent phishing attacks before their security is compromised. The hassle-free and cost effective solution uses AI to provide small businesses and the MSPs that support them with automatic detection and remediation capabilities to protect against phishing attacks the number one threat they face. By combining email security, web browsing protection, perimeter posture, and awareness culture in one native solution, businesses can now efficiently safeguard against phishing threats, bolstering resilience and future-proofing their systems.

Ninety percent of all cyber attacks are initiated with phishing, which relies on social engineering to prey on human nature. Cybercriminals attempt to obtain sensitive information such as usernames, passwords, and credit card details by tricking recipients clicking on malicious links or providing personal information, which can then be used for identity theft, ransomware attacks, or other malicious activities. These attacks can result in data breaches, financial loss, and reputational damage to small businesses and even compromise the security of a business's entire network, leading to the exposure of further confidential information.

Guardz's new Multilayered Phishing Protection: continuously scans for all inbound traffic with its advanced anti-phishing email protection solution; initiates detection through AI-powered anti-phishing and anti-malware engines; removes risky emails from users' inboxes and automatically sends them to quarantine; monitors internet browsing to detect potential phishing attempts and delivers real-time alerts to system admins to enable timely responses; and provides ongoing, active cyber awareness training and tailored phishing simulations for employees, fostering a culture of caution and vigilance. Perhaps most importantly when dealing with phishing, the Guardz solution empowers every employee to behave in ways that support and strengthen the business's cybersecurity posture.

"The proliferation of phishing attack as a service (AaaS) tools sold on the dark web is putting the SME ecosystem increasingly at risk. Our new AI-powered phishing protection solution provides SMEs and MSPs with a holistic and accessible solution to prevent the success of phishing attacks," said Dor Eisner, CEO and Co-Founder of Guardz. "This is a significant addition to Guardz's holistic cyber security offering for small businesses, ensuring that they can react to cyber risks in real time with swift remediations, but also be protected by cyber insurance for complete peace of mind a true secure and insure approach."

The Multilayered Phishing Protection enables MSPs to provide their SME customers complete protection across all potential phishing attack vectors. It does so by automatically scanning the perimeter posture, inbound email traffic and internet browsing, and by providing ongoing, tailored cyber awareness training and simulation for employees. The platform automatically verifies emails for authentication protocols including Domain-based Message Authentication, Reporting and Conformance (DMARC), Sender Policy Framework (SPF) and checks for malicious forwarding rules.

The new Multilayered Phishing Protection solution is available now from Guardz. For further details, please visit Guardz's website:https://guardz.com/phishing-protection/

About Guardz

Guardzis a holistic cyber security and insurance solution designed for SMEs. Guardz's solution continuously monitors businesses' digital landscapes to protect their entire range of assets, enables them to react to cyber risks in real time with swift remediations, and provides cyber insurance for peace of mind. Its all-in-one, affordable platform is on guard 24/7, and is easy to use for both in-house IT personnel and MSPs. With cutting-edge technologies stacked into a robust platform, Guardz was founded in 2022 by Dor Eisner and Alon Lavi along with a team of cyber and insurance experts who combine innovation, experience, and creativity to create a safer digital world for small businesses.

Media Contact

Allison GreyHeadline Media[emailprotected]US: +1 323 283 8176UK: +44 203 807 4482IL: +972 53 820 2606

SOURCE Guardz

Link:
Guardz Launches AI-Powered Multilayered Phishing Protection To ... - PR Newswire

Read More..

From Passwords To AI: The Future Of Cybersecurity In The Digital Age – Tech Build Africa

As the pace of digital change accelerates, so will the quantity and intelligence of data breaches. Even if you have a team of professionals working together to improve internet security, be rest assured that phishers, hackers, scammers, and fraudsters are becoming more advanced by the day, to break into your secured vault.

The globe is researching alternate authentication techniques and moving away from depending entirely on standard passwords.

While AI does not replace passwords directly, it does play a role in enabling more secure and convenient authentication processes.

AI is a strong technology that provides sophisticated capabilities for combating assaults by detecting and preventing threats as well as securing networks and services, compared to conventional cybersecurity techniques, which only detect known risks, AI uses autonomous algorithms and learning patterns to avoid future assaults.

The field of cybersecurity is undergoing substantial shifts in the digital age, with old password-based systems being supplemented and, in certain instances, supplanted by AI-driven solutions.

Beyond conventional password-based tactics, the future of cybersecurity involves integrating AI technology to improve threat detection, enhance authentication methods, assess risks, and implement proactive defense mechanisms.

As AI advances, it will become increasingly important in bolstering cybersecurity defenses in the digital age

Lets take a look at the future of cybersecurity where it transitions away from passwords and toward AI:

With the advancement of technology, passwords have become very vulnerable to theft, loss, or poor user behavior.

Biometric identification, such as fingerprint, iris, or facial recognition, is a safer and more user-friendly option. AI algorithms are critical in correctly recognizing and verifying biometric data.

Furthermore, behavioral authentication analyzes user behavior characteristics, such as typing speed or mouse movements, to authenticate users without depending simply on passwords.

Also, conventional techniques of detecting and responding to cyber threats frequently fail to keep up with the threat landscapes rapid evolution.

AI-powered cybersecurity solutions can more effectively analyze large amounts of data, discover trends, and detect anomalies.

Machine learning algorithms may learn from new data indefinitely to increase threat detection accuracy and automate responses, allowing firms to remain ahead of emerging dangers, passwords cant cut it

By evaluating historical data, user activity, and network patterns, AI-driven predictive analytics can analyze prospective cybersecurity vulnerabilities.

These insights enable firms to discover vulnerabilities proactively and make informed decisions to eliminate risks before they become major security breaches.

Conventional cybersecurity methods tend to depend on static rules and signatures, which can be circumvented by smart attackers.

AI allows the creation of adaptive security systems capable of learning and adapting to new threats in real-time.

These systems may automatically adapt their defenses in response to changing attack patterns, resulting in a more robust security posture.

AI technology can be used to proactively look for sophisticated threats and vulnerabilities in threat hunting and intelligence collecting.

To identify prospective risks and anticipate attack routes, AI algorithms may scan massive volumes of data from numerous sources, such as threat intelligence feeds, dark web tracking, and security logs.

As AI gets more integrated into cybersecurity, privacy, and ethical concerns become increasingly important.

AI models should be built and implemented using privacy-preserving strategies to ensure te safety of users personal data.

Furthermore, to avoid misuse or unforeseen repercussions, ethical AI norms like transparency, fairness, and accountability should be followed.

Dont miss important articles during the week. Subscribe totechbuild weekly digestfor updates.

More here:
From Passwords To AI: The Future Of Cybersecurity In The Digital Age - Tech Build Africa

Read More..

The ETH Question: Why does the SEC avoid taking action against Ethereum when all else are fair game? – CryptoSlate

The U.S. Securities and Exchange Commission (SEC) filed suit against Binance today in a move that has rocked the cryptocurrency industry.

The complaint notably includes language in which the SEC clearly elucidates that it considers many of the tokens that traded on Binance to be unregistered securities and lays out its case against several it considers notable offenders. The SEC identifies these crypto asset securities as including (but not limited to) Solana, Cardano, Polygon, Filecoin, Cosmos, The Sandbox, Decentraland, Algorand, Axie Infinity, and Coti.

Todays filing contains some of the SECs most explicit language to date in clarifying its judgment, but once again avoids taking on the big question: is Ethereum a security or not? If so, why is the SEC silent on it? And if not, what is it?

The SECs argument for designating these tokens as crypto asset securities is exhaustively outlined in Section VIII of the complaint (pages 85 through 123). Notable patterns emerge from the filing: the process of initial coin offerings (ICOs), vesting of tokens, allocations for the core team, and the promotion of profit generation through ownership of these tokens, are all repeated themes.

But Ethereum is not listed among these. Gensler has remained consistently vague on the question of whether Ethereum and its namesake coin count as securities. ETH is commonly held as an investment, suggesting it could be classified as a security, but it is also extensively used day-to-day as a medium of exchange across protocols, making its function more akin to cash or ACH settlement.

Gensler has previously suggested that everything other than Bitcoin in the crypto space could be seen as a security, but has notably refused to clearly state as much about Ethereum. When pressed to say the words, I believe Ethereum is a security, the Hon. Chair just will not do it. Genslers reluctance to classify Ether is curious when his SEC is so eager to claim as much for others. Why?

It might be a simple matter of intragovernmental contention. Ethereum could potentially fall under the purview of the Commodity Futures Trading Commission (CFTC), which regards Bitcoin, Ethereum, and Tether as commodities, not securities. Not only do the two categories differ wildly from one another, this overlap could create a regulatory tug-of-war that would Genslers public stance on Ethereum while trying to avoid the appearance of infighting within the federal government.

Another analysis from Protos, argues that Genslers evasion on the matter may be a consequence of the SECs earlier inaction following the infamous DAO hack, which saw the blockchain fork into Ethereum Classic and put the entire ecosystem at risk. However, at the time the SEC did nothing, and now Gensler finds himself in the unenviable position of making up for his predecessors oversights. Now that the Ethereum ecosystem has spent years recovering and building credibility, retroactively declaring it an unregistered security would have unforeseen, but no doubt disastrous, consequences for investors.

In other words, protecting investors in this case would mean protecting them from the protector.

However, perhaps another reason could lie beneath Genslers reluctance to clearly classify Ethereum: he may not know.

Cryptocurrencies and their underlying technologies are innovative and novel. They represent a fundamental shift in how we understand finance and asset ownership, and in the case of decentralized ecosystems like Ethereum, they introduce entirely new paradigms.

If this is true, its not unreasonable to suspect that most peopleeven those deeply involved in the spacemay not fully understand the implications of these innovations just yet. Anything that is fundamentally new will resist categorization, and Ethereum does sothis lack of a concrete concept that both defines Ethereum but fits into previous understandings is the core problem around regulating it.

This regulatory ambiguity presents a complex challenge for Ethereum, but it does not lessen the urgency to address it.The advancement of the crypto industry hinges on obtaining clear legal definitions for Layer 1 (L1) tokens, such as Ethereum, that function simultaneously as mediums of daily exchange and investment vehicles within their respective ecosystems. The ambiguity in their status poses a significant hurdle, stalling progress and fostering uncertainty in a space that is ripe for growth and innovation.

The dichotomy of these tokens roles blurs the boundary between conventional asset classes, forcing us to confront inadequacies in existing legal structures. To propel the crypto industry forward, regulators must acknowledge and address this nuanced reality. Until a refined framework emerges that accurately captures the dual functionality of these L1 tokens, regulatory ambiguity will continue to shroud the industry, stifling its full potential and deterring mainstream adoption. This unique crypto space requires equally unique rulesones that can encapsulate its dynamism and complexity.

The path towards comprehensive crypto regulation is obscured by two significant obstacles, which must be addressed urgently for the sectors responsible advancement.

Firstly, the U.S. Securities and Exchange Commission (SEC) must establish a formal position on Ethereum. Given the SECs historical inaction in restraining Ethereums growth when opportunities were present, it has inadvertently fostered an environment where investors are left in regulatory limbo. The SEC, as the protector of investors, has a duty to provide some form of regulatory guidanceeven if it proves to be temporaryto offer a foundational starting point and eliminate the current state of speculation. The lack of clear regulation is not merely an inconvenience; it is a failure to provide the necessary protections for participants in an increasingly significant market.

Secondly, authentic, open-ended discussions about the nature of digital assets are crucial. This implies engaging in conversations devoid of preconceived notions, biases, ideological posturing, or empty rhetoric. We often speak of making space to have the conversation, but acknowledging that conversation needs to take place and actually having one are two very different exercises indeed. Perhaps everyone in the industryas well as those watching over itwould benefit from practicing the latter.

Commitment to Transparency: The author of this article is invested and/or has an interest in one or more assets discussed in this post. CryptoSlate does not endorse any project or asset that may be mentioned or linked to in this article. Please take that into consideration when evaluating the content within this article.

Disclaimer: Our writers' opinions are solely their own and do not reflect the opinion of CryptoSlate. None of the information you read on CryptoSlate should be taken as investment advice, nor does CryptoSlate endorse any project that may be mentioned or linked to in this article. Buying and trading cryptocurrencies should be considered a high-risk activity. Please do your own due diligence before taking any action related to content within this article. Finally, CryptoSlate takes no responsibility should you lose money trading cryptocurrencies.

More here:

The ETH Question: Why does the SEC avoid taking action against Ethereum when all else are fair game? - CryptoSlate

Read More..

Congress Introduces A Game-Changing Crypto Bill Amid $350 Billion Bitcoin, Ethereum, BNB And XRP Price Pump – Forbes

06/05 update below. This post was originally published on June 3

BitcoinBTC and ethereumas well as rival top five cryptocurrencies Ripple's XRPXRP and Binance's BNBBNBhave rocketed this year, adding $350 billion to the crypto market in 2023 (triggering a flood of bullish predictions).

Subscribe now to Forbes' CryptoAsset & Blockchain Advisor and successfully navigate the bitcoin and crypto market rollercoaster

The bitcoin price dropped back last month from its 2023 peak of just over $30,000, dragging on the ethereum price as well as XRP and BNB, even as Goldman Sachs and Microsoft quietly lay the groundwork for the next bull run.

Now, amid fears a crypto "powder keg" could be about to ignite, U.S. lawmakers have proposed a "functional framework" aimed at providing regulatory clarity for bitcoin and crypto companies in the country.

It's at the beginning of a bull run you need up-to-date information the most! Sign up now for the free CryptoCodexA daily newsletter for traders, investors and the crypto-curious that will keep you ahead of the market

The 162-page draft bill, unveiled by House financial services committee chair Patrick McHenry, a Republican from North Carolina, and House agriculture committee chair Glenn Thompson, a Republican from Pennsylvania, is an attempt to kickstart discussions between Republicans and Democrats on the two committees, Bloomberg reported.

In recent weeks, some of the largest U.S. bitcoin and crypto companies have warned the country is falling behind the rest of the world on crypto legislation, with Hong Kong's new regulatory regime coming into force this week alongside the Europe Union's landmark markets in crypto assets (MiCA) regulation being signed into law.

Major crypto exchanges, including the Nasdaq-listed Coinbase, have been feuding with regulators over whether certain cryptocurrencies are being sold and traded as unregistered securities. In late 2020, the U.S. Securities and Exchange Commission (SEC) sued Ripple, accusing the company of selling $1.3 billion in unregistered securities via its XRP cryptocurrency (Ripple's chief executive has recently said he's "confident" of an imminent outcome).

06/05 update: The new draft crypto bill comes amid growing fears in the crypto industry that the U.S. government and regulators are involved in a concerted effort to de-platform crypto from the banking system as "operation choke point 2.0"a reference to a 2013 U.S. Department of Justice policy to lock industries thought to be high risk for fraud and money laundering out of the banking system.

"In the U.S., we know its coordinated," Nic Carter, an investor with Castle Island Ventures who coined the term operation choke point 2.0, told the What Bitcoin Did podcast. "We absolutely know that. Its certain officials in the Biden administration that are working together with specific regulators, in particular the bank regulators, to marginalize the bitcoin and crypto industry."

Carter warned that the Biden administration and regulators' hostility to the crypto industry has grown in the aftermath of the FTX meltdown last year and played a part in the collapse of crypto-friendly banks Signature and Silvergate earlier this year.

The new U.S. crypto billafter several attempts to pass crypto legislation in previous sessionsproposes cryptocurrencies offered as part of an investment contract would fall under SEC oversight, while those that qualify as commodities would be overseen by the Commodity Futures Trading Commission (CFTC).

Whether cryptocurrencies such as bitcoin, ethereum, Binance's BNB or Ripple's XRP are defined as securities or commodities would depend on how decentralized their underlying blockchain is, decided by an SEC ruling.

Sign up now for CryptoCodexA free, daily newsletter for the crypto-curious

The bill was cheered by some in the bitcoin and crypto industry ahead of a House agriculture committee hearing on digital asset regulation scheduled for June 6.

The bill "lays a strong foundation for regulatory jurisdiction and definitions," Paul Grewal, the chief legal officer at bitcoin and crypto exchange Coinbase, posted to Twitter. "A comprehensive bill of this magnitude warrants an in-depth review, which well be conducting over the coming days, but what were seeing so far is encouraging."

"Its a win this year for crypto to even get some attention in DC right now, after last year's setbacks," Ryan Selkis, founder at crypto data company Messari, posted to Twitter, adding: "There is still a lot of work to do to get to a viable piece of legislation, but this is a good starting point for a sensible market structure bill."

I am a journalist with significant experience covering technology, finance, economics, and business around the world. As the founding editor of Verdict.co.uk I reported on how technology is changing business, political trends, and the latest culture and lifestyle. I have covered the rise of bitcoin and cryptocurrency since 2012 and have charted its emergence as a niche technology into the greatest threat to the established financial system the world has ever seen and the most important new technology since the internet itself. I have worked and written for CityAM, the Financial Times, and the New Statesman, amongst others. Follow me on Twitter @billybambrough or email me on billyATbillybambrough.com.Disclosure: I occasionally hold some small amount of bitcoin and other cryptocurrencies.

Go here to see the original:

Congress Introduces A Game-Changing Crypto Bill Amid $350 Billion Bitcoin, Ethereum, BNB And XRP Price Pump - Forbes

Read More..

USDC Introduced on Ethereum’s Layer 2 Scaling Solution Arbitrum – Crypto Briefing

Share this article

Circle brought its native USDC on Arbitrum, Ethereums leading layer 2 scaling solution, making Arbitrum the ninth blockchain to extend support for USDC, according to Circles official announcement.

The newly enabled function allows businesses utilizing Circle to conveniently swap USDC across supported chains, avoiding the costs and time lags typically linked with bridging transactions:

Following a recent bug in Arbitrums Sequencer software which caused a temporary halt to on-chain transaction verification, Circles USDC introduction on the Arbitrum network now allows developers, businesses and users to access Arbitrum USDC and take advantage of faster settlement times and lower costs offered by the Arbitrum network, according to the announcement.

Arbitrum, one of Ethereums layer 2 scaling solutions with a $2.2 billion TVL, leverages Optimistic Rollup technology to boost the throughput of transactions for decentralized apps, all while maintaining the security features of the Ethereum blockchain.

Circles deployment of native USDC on Arbitrum maintains a 1:1 ratio with USD, with Arbitrum releasing a bridged USDC called USDC.e, not issued by Circle. Plans are underway to transition liquidity smoothly from USDC.e to USDC over time:

Circle Account and Circle APIs to access Arbitrum USDC for diverse use cases including programmable, quick and global transactions, as well as trading, lending and borrowing on DApps such as Camelot, GMX and Uniswap. Users can also use Arbitrums USDC for payments for e-commerce, NFT marketplaces and gaming.

The Circle Account and APIs also simplify the swapping process of USDC natively across the nine supported blockchains: Aave, Balancer, Camelot, Coinbase, Curve, GMX, Radiant, Trader Joe and Uniswap.

The information on or accessed through this website is obtained from independent sources we believe to be accurate and reliable, but Decentral Media, Inc. makes no representation or warranty as to the timeliness, completeness, or accuracy of any information on or accessed through this website. Decentral Media, Inc. is not an investment advisor. We do not give personalized investment advice or other financial advice. The information on this website is subject to change without notice. Some or all of the information on this website may become outdated, or it may be or become incomplete or inaccurate. We may, but are not obligated to, update any outdated, incomplete, or inaccurate information.

You should never make an investment decision on an ICO, IEO, or other investment based on the information on this website, and you should never interpret or otherwise rely on any of the information on this website as investment advice. We strongly recommend that you consult a licensed investment advisor or other qualified financial professional if you are seeking investment advice on an ICO, IEO, or other investment. We do not accept compensation in any form for analyzing or reporting on any ICO, IEO, cryptocurrency, currency, tokenized sales, securities, or commodities.

See full terms and conditions.

See the original post here:

USDC Introduced on Ethereum's Layer 2 Scaling Solution Arbitrum - Crypto Briefing

Read More..

Match Group Tells Spammers To Bot Off As It Continues Investing In … – PR Newswire

Match Group says it companies have blocked nearly 5 million spam and bot accounts in the first quarter at sign up or before a user sees it

DALLAS, June 9, 2023 /PRNewswire/ -- To mark Internet Safety Month, today, Tinder and Match Group are highlighting Tinder's efforts to combat online fraudsters through tools that help reduce spam on the platform. Match Group companies are continuing making investments to enhance machine learning tools that proactively detect, prevent and remove spam across Match Group's global portfolio.

Tinder has also led the portfolio on rolling out several safety features, including Photo Verification with selfie video, background checks through Garbo and in-app video chat, which have been implemented in other Match Group brands.

According to internet crime experts, cyber criminals use various tactics and forms of communications across online platforms, from email and text phishing scams to social media platforms and online dating services. Match Group companies constantly invest in advanced detection and removal tools to help maintain the integrity of their services.

Match Group says every minute, there are an average of 44 spam accounts removed across its portfolio as an effort to help curtail suspected fraudulent accounts either blocked at sign up or before a user sees them. Additionally, nearly 5 million bots and spam accounts have been removed between January and March of this year before the account gained access to the platform or shortly after signup, in an effort to prevent potential harm.

"Tinder has an exceptional team with deep experience in detecting bad behavior, including spam," said Rory Kozoll, SVP of product integrity, Tinder. "Fraud detection is just one of many efforts we deploy to remove potential fraudulent accounts and it is something we will continue to invest in. By simultaneously investing in and building innovative online tools, we are also adding an additional level of security and confidence for users across the portfolio.

Over the few years, Tinder says spammers have evolved their tactics to exploit common member behaviors like posting a social handle on their bio to direct traffic to another platform, where they often monetize directly, or share yet another link that redirects to a third site for monetization.

In its continued efforts to help create a fun and safer place to meet new people, Tinder announced changes to its existing Community Guidelines last month, outlining the good behaviors that help lead to the best possible experience for everyone on the app. As part of these changes, Tinder says it will remove social handles from public bios that advertise or promote their social profiles to gain followers, sell things, fundraise, or campaign.

"We are continuously enhancing our spam prevention tools to help make them more effective, while also making investments in machine learning, both which we view as essential for Match Group to help maintain a safer service for our users around the world," said Jess Johnson, director, safety product, Match Group. "By implementing a combination of technology, human moderation, and user education to encourage reporting of suspicious activity, we are able to help remove the vast majority of spam at sign up or before a user ever sees it."

Garbo first launched on Tinderin March of 2022 and is now available on Plenty of Fish, Match and Stir. Following new enhancements incorporated in Tinder's Photo Verification process, the tools were implemented on Hinge, Archer, and Plenty of Fish, with more brands to follow.

About Match GroupMatch Group (NASDAQ: MTCH), through its portfolio companies, is a leading provider of digital technologies designed to help people make meaningful connections. Our global portfolio of brands includes Tinder, Match, Meetic, OkCupid, Hinge, Pairs, PlentyOfFish, OurTime, Azar, Hakuna Live, and more, each built to increase our users' likelihood of connecting with others. Through our trusted brands, we provide tailored services to meet the varying preferences of our users. Our services are available in over 40 languages to our users all over the world.

SOURCE Match Group

Go here to read the rest:
Match Group Tells Spammers To Bot Off As It Continues Investing In ... - PR Newswire

Read More..

Crypto Price Update: Bitcoin Up 0.70%, Ethereum Up 0.23% – Outlook India

Outlook Money

The global cryptocurrency market cap was at $1.1 trillion on Friday morning, up by 0.34 per cent. Pepe PEPE was the most trending cryptocurrency, while Mask Network MASK was the top gainer and Sui SUI was the top loser

Updated: 09 Jun 2023 12:45 pm

The global cryptocurrency market cap was at $1.1 trillion on Friday morning, up by 0.34 per cent inthe past 24 hours, while the total trading volume was at $26.02 billion, down by 30.47 per cent.

Pepe PEPE was the most trending cryptocurrency, up by 4.20 per cent to $0.000001091 from theprevious day. Its 24-hour trading volume was $108.38 million.

Mask Network MASK was the top gainer, up by 5.07 per cent to $4.20 over the previous day. Its 24-hour trading volume was $65.61 million. Sui SUI was the top loser, down by 3.24 per cent to $0.7313.Its 24-hour trading volume was $156.21 million.

DeFi fell 7.37 per cent to $1.92 billion, Coinmarketcap.com reported.

Cryptocurrency Prices

Bitcoin: Bitcoin was up by 0.70 per cent to $26,483.48. Its 24-hour trading volume was $11.87 billion.It is currently ranked number 1 on Coinmarketcap, based on market cap. Bitcoins market dominancewas at 46.63 per cent, up by 0.07 per cent over the last 24 hours.

Ethereum: Ethereum was up by 0.23 per cent to $1,837.91 over the previous day. Its 24-hour tradingvolume was $4.61 billion.

Tether: Tether was steady at $1, same as yesterday. Tethers 24-hour trading volume was $18.16billion. It is ranked third on Coinmarketcap.

Other Altcoins

Solanas (SOL) was up by 1.32 per cent to $18.67 in the last 24 hours. Its 24-hour trading volume was$229.68 million.

Avalanche was trading at $13.82, up by 0.13 per cent, while its 24-hour trading volume was at$111.53 million.

Cardano (ADA) fell by 1.90 per cent to $0.3172. It is ranked seventh, with a 24-hour trading volume of$240.85 million.

Meme Coins

Dogecoin (DOGE) was up by 0.65 per cent, with a 24-hour price of $0.06785.

Shiba Inu was up by 0.48 per cent to $0.000007955.

Decentralised Finance

DeFi coin was trading at $0.009305, up by 8.01 per cent over the past 24 hours.

Yearn.Finance was down by 0.91 per cent to $5,924.55 in the last 24 hours, while its 24-hour tradingvolume was $11.09 million.

Originally posted here:

Crypto Price Update: Bitcoin Up 0.70%, Ethereum Up 0.23% - Outlook India

Read More..