Page 967«..1020..966967968969..980990..»

Encryption Flaws in Popular Chinese Language App Put Users’ Typed Data at Risk – The Hacker News

Aug 10, 2023THNPrivacy / Encryption

A widely used Chinese language input app for Windows and Android has been found vulnerable to serious security flaws that could allow a malicious interloper to decipher the text typed by users.

The findings from the University of Toronto's Citizen Lab, which carried out an analysis of the encryption mechanism used in Tencent's Sogou Input Method, an app that has over 455 million monthly active users across Windows, Android, and iOS.

The vulnerabilities are rooted in EncryptWall, the service's custom encryption system, allowing network eavesdroppers to extract the textual content and access sensitive data.

"The Windows and Android versions of Sogou Input Method contain vulnerabilities in this encryption system, including a vulnerability to a CBC padding oracle attack, which allow network eavesdroppers to recover the plaintext of encrypted network transmissions, revealing sensitive information including what users have typed," the researchers said.

CBC, short for cipher block chaining, is a mode of cryptographic operation in which each block of plaintext is XORed with the previous ciphertext block before being encrypted.

Given that a block cipher works on fixed size plaintext blocks, a padding oracle attack could be used to leak data about whether the received ciphertext, when decrypted, has a valid padding. In doing so, a threat actor could decrypt a message without actually knowing the encryption key.

Interestingly, the iOS version of Sogou Input Method was found to be secure against network eavesdropping, although it "would have been the most vulnerable" due to a second defect in the EncryptWall implementation wherein the first half of the encryption key could be trivially recovered.

It's worth noting that the scope of the issues are not limited to Chinese writers in China. Statistics from SimilarWeb show that visits to the app's website shurufa.sogou[.]com also come from the U.S., Taiwan, Hong Kong, and Japan.

Following responsible disclosure in May and June 2023, the problem has been addressed by Tencent in version 13.7 (Windows), 11.26 (Android), and 11.25 (iOS) as of late last month.

"This vulnerability could have been easily avoided by, instead of using 'homebrew' cryptography, adopting TLS, a common and mature cryptographic protocol with ubiquitous availability and up-to-date support," researchers Jeffrey Knockel, Zo Reichert, and Mona Wang said.

"While no cryptographic protocol is perfect, TLS implementations had already ameliorated vulnerability to CBC padding oracle attacks in 2003."

The development coincides with the disclosure of two zero-day flaws, CVE-2023-33241 and CVE-2023-33242 (aka BitForge), in the implementation of cryptographic multi-party computation (MPC) protocols such as GG18, GG20, and Lindell17 2PC used in popular cryptocurrency wallets that, if exploited, could allow "attackers and malicious insiders to drain funds" without their knowledge.

See more here:
Encryption Flaws in Popular Chinese Language App Put Users' Typed Data at Risk - The Hacker News

Read More..

Please do not make it public: Vulnerabilities in Sogou Keyboard encryption expose keypresses to network … – Citizen Lab

We urge Sogou Input Method users to immediately update to the most recent version of the app (at least Windows version 13.7, Android version 11.26, or iOS version 11.25).

Compared to typing alphabetic languages whose small number of letters can be represented uniquely by keys, typing logographic languages such as Chinese is more difficult. Chinese has tens of thousands of characters used in varying frequencies, far too many to fit on a single keyboard. There is no standard method of typing Chinese characters, but with the advent of modern technology a number of complementary approaches have emerged. The most popular is the pinyin method, based on the pinyin romanization of Chinese characters. Zhuyin is another popular phonetic input method, and shape or stroke-based input methods like Cangjie or Wubi are also commonly used. Modern input methods also support inputting characters via handwriting, voice recognition, and photograph or OCR (see Figure 1 for illustrations).

While alphabetic keyboards typically provide autocomplete features for more expedient typing, predictive features in Chinese input methods are more crucial when using input methods such as pinyin where hundreds of characters might match an inputted pinyin syllable. For longer strings of syllables, an IME will commonly reach out over the network to a cloud-based service for suggestions if suitable suggestions are not available in the input methods local database.

In this report, we analyze Tencents Sogou Input Method, the most popular Chinese input method with over 455 million monthly active users and versions of the app for multiple platforms, including Windows, Android, and iOS. Sogou Input Method accounts for 70% of Chinese input method users, with products by iFlytek and Baidu taking second and third place, respectively. McAfees 2015 analysis previously observed that the Windows version of the app transmitted device identifiers in the clear without any encryption, but it did not analyze the safety of data transmitted by the apps encryption system.

We analyzed Sogou Input Method on three operating system platforms, finding that the app has troubling vulnerabilities in its custom-designed encryption system which render sensitive data such as the keystrokes that users type decipherable to network eavesdroppers. The vulnerabilities which we discovered are not limited to Chinese writers in China, as market research estimates concerning visitation to the apps website put United States users as comprising over 3.3% of visits, Taiwan as nearly 1.8%, and Japan as over 1.5%.

The remainder of this report is structured as follows. In the Methodology section, we outline the reverse engineering tools and techniques we used to analyze Sogou Input Method. In Findings, we describe how Sogous custom-designed encryption system works, the vulnerabilities which we discovered in it, as well as examples of impacted data transmissions. In Mitigation and Coordinated disclosure, we discuss how Sogou can fix the vulnerabilities that we reported to them and how we reported the vulnerabilities to them. Finally, in Discussion we reflect on how these vulnerabilities speak to systemic issues in the larger Chinese app ecosystem.

We analyzed the Windows, Android, and iOS versions of Sogou Input Method. To procure the versions we analyzed, in May 2023, we downloaded the latest versions of the Windows and Android versions from the product website (the Android version of Sogou Input Method, while available as recently as June 3, 2021, is presently not available in the Google Play Store). We procured the iOS version from Apples App Store (see Table 1 for a breakdown of versions analyzed).

Table 1: Breakdown of versions of Sogou Input Method analyzed and the environments in which they were analyzed.

We analyzed these versions of Sogou Input Method using both static and dynamic analysis methods. We used jadx to statically analyze and decompile Dalvik bytecode and IDA Pro to statically analyze and decompile native machine code. We used frida to dynamically analyze the Android and iOS versions and IDA Pro to dynamically analyze the Windows version. Finally, we used Wireshark and mitmproxy to perform network traffic capture and analysis.

We found that each version of Sogou Input Method encrypts sensitive data using an encryption system that is internally referred to as the EncryptWall encryption system. We found that the Windows and Android versions of Sogou Input Method contain vulnerabilities in this encryption system, including a vulnerability to a CBC padding oracle attack, which allow network eavesdroppers to recover the plaintext of encrypted network transmissions, revealing sensitive information including what users have typed (see Table 2 for a breakdown of versions affected). In the case of the Android version, we are also able to recover the second halves of the symmetric encryption keys used to encrypt traffic. We also found vulnerabilities affecting the encryption implemented in the iOS version, but we are not presently aware of methods to exploit these vulnerabilities in the version which we analyzed.

Table 2: Summary of versions of Sogou Input Method affected.

In the remainder of this section we detail our attacks on Sogous EncryptWall encryption system. We begin by giving background on the encryption system, then detailing our attack on it, and finally we break down how, or whether, the attack applies to the three platforms which we analyzed, adapting our attack for deviations in the implementation of the EncryptWall system across platforms.

The attacks which we discuss in this report concern vulnerabilities that we found in Sogous EncryptWall encryption system, which appears intended for securely tunneling sensitive traffic to unencrypted Sogou HTTP API endpoints via encrypted fields in plain HTTP POST requests. In this report we call the outer, plain HTTP request the EncryptWall request and the single tunneled HTTP request each EncryptWall request encapsulates the tunneled request. Although there were differences in the implementation across the three platforms that we analyzed, we found that the system generally works as follows:

(data) = base64_encode(AES_cbc_encrypt(zlib_compress(data, wbits=-15), k, v))

The three form fields we consistently observed encrypted in this manner are as follows:

Depending on the platform analyzed and the type of request being made, the EncryptWall request may be sent over encrypted HTTPS or plain HTTP. In cases where EncryptWall requests were made over HTTPS, we believe that the requests are secure against network eavesdropping, despite any defects which might exist in the underlying cryptography of the EncryptWall request on account of the HTTPSs TLS cryptography additionally protecting it. Thus, our findings in the remainder of this section only concern EncryptWall requests which we observed being made over plain HTTP which do not benefit from the additional protection of HTTPS.

We found that the EncryptWall system is vulnerable to a CBC padding oracle attack, a type of chosen ciphertext attack originally published in 2002 impacting block ciphers using cipher block chaining (CBC) block cipher mode and PKCS#7 padding. In such an attack, the plaintext of a message can be recovered one byte at a time, using at most 256 messages per byte. While we do not intend to fully reiterate how this attack works here, the attack relies on the existence of a certain kind of side channel called a padding oracle that reveals unambiguously whether the received ciphertext, when decrypted, is correctly padded. We identified such an oracle in the EncryptWall system: we found that a ciphertext sent in the U form field returns an HTTP 400 status code when it contains incorrect padding, whereas, when correctly padded, it returns either a 200 status or 500 status code depending on whether the decrypted URL is a valid URL or not, respectively. By performing a CBC padding oracle attack, this padding oracle allows us to not only reveal the entire plaintext of U but also G and P, since they use the same key and initialization vectors. Thus, by using this padding oracle we can decrypt the contents of the entire EncryptWall request.

In the remainder of this section, we adapt this attack for all deviations in the implementation of the EncryptWall system on the Windows and Android platforms. Although they do not presently appear exploitable, we also detail defects in the EncryptWall system on iOS.

The EncryptWall system implemented in the Windows version that we analyzed deviated from the basic implementation described above in one detail, namely that the IV v, instead of being public, was encrypted in the same manner as the AES key k. Due to this discrepancy, v is not immediately known, which is potentially problematic for our attack for two reasons: first, in the CBC padding oracle attack, the IV must be known in order to decrypt the first block of plaintext. Second, since the data tunneled in the EncryptWall requests is compressed before being encrypted, the first block of plaintext is important for decompressing the remaining blocks.

However, we developed a method to recover v that exploits the fact that v is reused to encrypt multiple plaintexts. Specifically, since the URL U is easily predictable and is ever only one of a small number of possible endpoints, we are able to recover v by performing a CBC padding oracle attack on the first ciphertext block of U, assuming an all zero IV. The result of this attack will be the first plaintext block of the URL XORed with v. We then XOR this result with our prediction for the first plaintext block of the URL, yielding v alone. With v recovered, we can perform the CBC padding oracle attack on G and P as usual.

As one example of the kind of transmitted data vulnerable to this attack, we found that for EncryptWall requests sent to http://get.sogou.com/q, when U was http://master-proxy.shouji.sogou.com/swc.php, G contained version information pertaining to Sogous software, and P was a protobuf buffer containing the keystrokes that had been recently typed in (see Figure 2 for an example). We believe that these transmissions are related to a cloud-based implementation of an autocompletion service. Since these transmissions are vulnerable to our attack, the keystrokes of Sogou Input Method users can be decrypted by a network eavesdropper, informing the eavesdropper of what users are typing as they type.

The Android version which we analyzed adopts the basic implementation of EncryptWall but with the inclusion of four additional form fields: R, S, E, and F. The field R transmits another 32-byte key r. Notably, however, each byte of r is randomly chosen from the 36-character set of ASCII uppercase letters and numbers. Therefore, instead of 25632 = 2256 bits of entropy, the key only has 3632

SEF(data) = base64Encode(k AES_cbc_encrypt(data, r, EscowDorisCarlos))

Note that unlike the typical () function, SEF() features a hard-coded IV EscowDorisCarlos and no zlib compression. Additionally, although SEF() uses r instead of k as an AES key, k is additionally XORed with the result of the AES encryption. Each of the fields S, E, and F are individually encrypted and encoded according to the SEF() function.

Despite the use of this modified cryptography, we were still able to successfully attack the encryption of these fields. We were able to apply the CBC padding oracle attack, using Sogous processing of the E form field instead of the U form field that we typically would use, with the exception of the following two accommodations:

First, since the key k is 32 bytes but AES blocks are 16 bytes, when the output of the AES block cipher is XORed with k, we can think of the output being XORed with two keys k1 and k2, where k1 is XORed with odd-numbered blocks (1, 3, ) and k2 is XORed with even-numbered blocks (2, 4, ) (see Figure 3 for an illustration). Thus, when performing the CBC padding oracle attack, we had to ensure that the block that we were attacking was in an even-numbered position if it was originally even-numbered or in an odd-numbered position if it was originally odd-numbered. In other words, we had to preserve the parity of the blocks position.

Second, since the IV is hard-coded, we cannot modify it and thus, similar to the Windows version, the CBC padding oracle attack cannot recover the first block of plaintext p1 without an adaptation. Namely, we found that p1 was still recoverable for form fields S, E, and F via the following procedure:

Additionally, we can now also recover the second half of r, r2, which is beneficial to an attacker in that our knowledge of r2 can be used to more easily recover k2 in subsequent requests. Recall that the form field R encodes k r. Thus, after recovering k2 we can recover r2 by XORing the second half of the R fields encoded contents with k2. Once r2 is recovered, since r, unlike k, is generated once per application lifetime, we can more easily recover k2 in future requests by simply XORing the second half of R with r2, making the attack even easier to perform in the future. Furthermore, this reduces the entropy of r, and thus, also k, to 3616

As one example of the kind of transmitted data vulnerable to this attack, we observed that for EncryptWall requests sent to http://v2.get.sogou.com/q, when U was http://swc.pinyin.sogou.com/swc.php, P was a protobuf buffer containing all of the text currently present in the input field in which the user is currently typing as well as the package name of the app in which the text was being typed (see Figure 4 for an illustration). These transmissions occurred when pressing the magnifying glass icon, and we believe that these transmissions are related to an image search feature in which typed text is searched against a database of animations and memes which can be inserted into the typed message. Since these transmissions are vulnerable to our attack, the keystrokes of Sogou Input Method users are an example of what a network eavesdropper could decrypt, informing the eavesdropper of what these users are typing as they are typing.

As one other example of the kind of transmitted data vulnerable to this attack, we observed that for EncryptWall requests sent to http://v2.get.sogou.com/q, when U was http://update.ping.android.shouji.sogou.com/update.gif, P was a query string containing a list of every app installed on the Android device. We are unaware of what feature this data transmission is intended to implement. While one can imagine knowing which app a user is presently using may be useful for providing better typing suggestions in that app, it is difficult to imagine how knowing every app that a user has installed can provide better typing suggestions, even apps which users do not intend to use with Sogou Input Method.

The iOS version which we analyzed had no major deviations from the basic EncryptWall implementation. However, unlike on some platforms where we saw some EncryptWall requests sent over encrypted HTTPS and others over plain HTTP, all EncryptWall requests that we observed transmitted by the iOS version which we analyzed were transmitted over HTTPS and thus we believe them to be secure against network eavesdropping. However, we note that without the additional protection of HTTPS, the iOS version would have been the most vulnerable due to the existence of an additional defect in the implementation of EncryptWall. Namely, we found that the iOS version randomly chooses the key k and IV v according to the following code in Figure 5:

Note that before randomly generating the key and again before randomly generating the IV the random number generator is seeded with the current time as seconds since the Unix epoch, rounded down to a whole second. There are two consequences to this behavior: first, the only information needed to derive the AES key k is the time which the request was sent, which any network eavesdropper would be able to easily record. Second, since the random number generator is re-seeded before generating the IV v with what will almost always be the same time in seconds after rounding, v is almost always the first 128 bits of k. Since v is public, all EncryptWall messages reveal the first half of k in v, despite the fact that k is encrypted with a public RSA key.

However, we note again that this defect is not currently exploitable since EncryptWall requests on iOS appear to always be additionally wrapped in HTTPS. However, due to the severity of the defect, we are nevertheless compelled to mention it on account of the fact that previous versions of the iOS version may be impacted and because this code may be reused in other apps which may be vulnerable.

In order to address the reported issues, Sogou Input Method should secure all transmissions using a popular, up-to-date implementation of HTTPS or, more generally, TLS instead of relying on custom-designed cryptography to secure the transmission of sensitive user data. Moreover, Sogou Input Method should not transmit data unnecessary for the functionality of the program.

On May 31, 2023, we disclosed our findings to Tencent in a letter attached here, following our security disclosure vulnerability policy. Below in Table 3 is our disclosure timeline:

Thank you for your interest in Tencent security. There is no low or low security risk for this issue. We look forward to your next more exciting report.

Sorry, my previous reply was wrong, we are dealing with this vulnerability, please do not make it public, thank you very much for your report.

Tencents initial rejection of our disclosure and subsequent about-face served as inspiration for the title of this report.

Thank you for the update. We will publicly disclose the vulnerability after July 31, 2023.

Thank you very much for your report, repair plan and repair time, which have been replied to disclosure@citizenlab.ca by email.

We have not received such an email at that address. However, it has come to our attention that our domain (citizenlab.ca) may not be accessible from China, and therefore emails from China may not be deliverable to it. Could you send a copy of the email you sent to disclosure@citizenlab.ca to another email address of mine, [redacted]@utoronto.ca ? I believe that there should be no issue delivering emails from China to this utoronto.ca address. Thank you.

The email we sent is security@tencent.com, the subject line is: Reply Sogou Pinyin Method vulnerabilities,which may have been classified as junk mail?

Unfortunately we have not received such an email at that address, not even in our spam folder. Would you be able to try sending a copy of the email to another email address of mine, [redacted]@utoronto.ca ? Thank you.

Can you use disclosure@citizenlab.ca to send an unsolicited email to security@tencent.com? Then Ill send the fix details to [redacted]@utoronto.ca.

Yes, we have now sent such an email and are awaiting your response.

Hello again. In the email you sent us you indicated that version 11.25 of the Android app would be upgraded to send EncryptWall requests using HTTPS. We analyzed version 11.25 (SogouInput_11.25_android_sweb.apk) and found that it still does not use HTTPS to transmit all EncryptWall requests, including the ones that we identified in our disclosure. Is version 11.25 still the version of the Android app that should contain these fixes, or will it be in a future release?

The vulnerability has been repaired, please review and check if it still exists. If it has been repaired, please click Repaired; if it has not been repaired, please click Unrepaired.

We clicked Repaired.

Thank you for your feedback. Well look into it internally.

Thank you very much for your feedback, our latest repaired version is 11.26 (SogouInput_11.26_android_sweb.apk, you can download it from our official website: https://shurufa.sogou.com/). If you have any other questions, please let us know.thanks.

We can confirm that you have fixed the vulnerabilities that we reported. We will not publicly disclose the vulnerabilities until after July 31, 2023. We will publish details regarding the security vulnerabilities in a report that will be available on our website: https://citizenlab.ca/ .

Table 3: Vulnerability disclosure timeline.

On July 4, 2023, we evaluated the partial mitigation which the Sogou Input Method developers stated they applied on June 30, 2023, in which, in the case of error, Sogou servers always return the same HTTP status code 400 instead of 400 or 500 depending on whether there is a padding error or some higher level application layer, respectively. While this mitigated our attack on the Windows version of Sogou Input Method as well as our attack on the U, G, and P fields on the Android version, our attack on Androids S, E, and F fields still worked since it relied on distinguishing between HTTP status codes 400 and 200, 200 being a success code and not an error code, and the mitigation only modified the servers to unconditionally return status code 400 in the case of an error.

Table 4: Fixed versions of Sogou Input Method.

In the Sogou Input Method developers July 4 correspondence, they stated that version 13.7 of the Windows version of the app and version 11.25 of the Android and iOS versions of the app would address the issues that we reported. On July 18, 2023, we found that these versions of the app had been released. Note that these updates were released ahead of the July 31 deadline which we imposed. Analyzing the updated Windows version, we found that all EncryptWall traffic was encrypted using the TLS implementation provided by the operating systems WinHTTP service, satisfyingly fixing the vulnerabilities we reported in the Windows version. Recall that we were unaware of any way to exploit the issue which we discovered in the iOS version of the app. Nevertheless, we found via static analysis that the updated version of the iOS version addressed the issue that we reported. Despite version 11.25 being originally identified by the Tencent developers as resolving the vulnerabilities we reported, we found that on July 20, 2023, the Sogou Input Method developers released version 11.26 of the Android app and that this version used TLS to encrypt all EncryptWall traffic, satisfyingly fixing the vulnerabilities we reported in the Android version. Thus, by July 20, 2023, all issues that we reported were fixed (see Table 4 for a summary of fixed versions).

Our difficulties receiving Tencents email response to our disclosure highlight unexpected challenges in disclosing vulnerabilities to companies in certain jurisdictions. After disclosing the vulnerabilities to Tencent, we measured that our email domain (citizenlab.ca) is blocked in China. Specifically, we found that Chinas national firewall injected anomalous DNS replies in response to queries for this domain, including MX record lookups. The injected DNS replies contain an A record with a seemingly arbitrary IP address, even when the lookup was for an MX record, not an A record. When a client making an A record lookup receives one of these injected responses, it will erroneously use the bogus IP address in the injected response. However, for MX records, these injected responses are likely to be interpreted as errors by DNS clients due to receiving an A record in response to an MX lookup, and a DNS clients MX lookup for an injected domain is likely to simply fail rather than erroneously using a bogus record as in the case of A lookups. While this injection behavior may have been intended to block Chinese users from accessing our website, it also hampers the ability for users in China to email us, even if such an email has been solicited.

We cannot be certain that Chinas blocking of our domain is why Tencents email was not delivered to an email server on our domain, but we received some late evidence that further strengthened this hypothesis. The July 27 email that we received at [redacted]@utoronto.ca was also addressed to disclosure@citizenlab.ca. The disclosure@citizenlab.ca address ultimately received the email on July 28, just over 24 hours later. By inspecting the emails headers, we found that the delivery of the email stalled between one of Tencents mail servers and Googles MX servers. As Google is our mail provider in the citizenlab.ca MX records, this finding strengthens the hypothesis that Tencents mail servers were struggling to look up our domains MX records. The email may have eventually been delivered over 24 hours later due to an intermittent failure in Chinas firewall or due to packet loss dropping the firewalls injected DNS responses, allowing the MX lookup on our domain to finally succeed. Therefore, we have chosen to communicate all future disclosures from a different domain that, to our best knowledge, is not blocked in any country, to ensure that we do not fail to receive crucial communication during a coordinated disclosure. Simultaneously, we ask firewall operators to consider how blocking domains may have unintended consequences such as contributing to continued vulnerabilities in the software developed by those behind their firewalls who may be hampered in participating in important dialog during coordinated disclosures.

In this report we detail vulnerabilities in Sogous EncryptWall encryption system as used in Sogou Input Method. However, in this work we did not perform a full audit of Sogou Input Method or make any attempt to exhaustively find every security vulnerability in the software. Our report concerns a single set of related vulnerabilities that we discovered, and the absence of our reporting of other vulnerabilities should not be considered evidence of their absence.

Over the last eight years we have dedicated immense effort analyzing, documenting, and responsibly disclosing vulnerabilities concerning the insecure transmission of sensitive data in Chinese-developed apps. While we have had some success in coordinating with developers to resolve these issues, the ecosystem remains problematic, as here we are, again, reporting on how an unimaginably popular Chinese-developed app fails to adopt even simple best practices to secure the sensitive data which it transmits. In the present case, Sogou Input Method, an app with over 450 million users, failed to properly secure the transmission of sensitive data, including the very keypresses which its users were typing, allowing such data to be recovered by any network eavesdropper. This vulnerability could have been easily avoided by, instead of using homebrew cryptography, adopting TLS, a common and mature cryptographic protocol with ubiquitous availability and up-to-date support. While no cryptographic protocol is perfect, TLS implementations had already ameliorated vulnerability to CBC padding oracle attacks in 2003, two decades prior to the time of this writing. We have come to believe that coordinated security disclosures are sorely inadequate to protect the data of users transmitted by Chinese apps. We believe that holistic change in the software development ecosystem is required to resolve these systemic issues.

Even with the reported vulnerabilities now resolved, the Sogou app relies on transmitting typed content to Sogous servers as part of its ordinary functionality. Keystrokes coming from users anywhere in the world are transmitted to servers in mainland China, which are operating under the legal jurisdiction of the Chinese government. High risk users of Sogou should be cautious, as typed material could include sensitive or personal information. The attacks outlined in this report demonstrate how network eavesdroppers can decipher such data in transit. However, even with the vulnerabilities resolved, such data will still be accessible by Sogous operators and by anyone with whom they share the data.

We would like to thank Jakub Dalek, Pellaeon Lin, Adam Senft, and Mari Zhou for valuable editing and peer review. Research for this project was supervised by Ron Deibert.

Read more:
Please do not make it public: Vulnerabilities in Sogou Keyboard encryption expose keypresses to network ... - Citizen Lab

Read More..

Telegram crypto bots gain momentum in the market: Binance … – Cointelegraph

Telegram bots have been increasingly emerging as a new tool to get exposure to cryptocurrency markets and a number of related services.

The cumulative crypto trading volume associated with Telegram bots exceeded $190 million as of early August 2023, according to a new report by Binances research arm, Binance Research.

Crypto activity facilitated through Telegram bots has been specifically on the rise in recent months. On July 23, daily volumes of chatbot-enabled crypto trades hit a record high of $10 million, Binance Research analyst Jie Xuan Chua wrote in the report. User metrics also hit a record high in July, reaching more than 6,000 daily unique users.

In total, Telegram bots have collected more than 15,500 Ether (ETH), or about $28 million, in all-time revenue, Chua reported.

Just like common Telegram bots, cryptocurrency-enabled Telegram bots allow users to interact with certain programs to complete certain tasks by sending messages on the Telegram messenger. Such bots are often connected to peer-to-peer or decentralized cryptocurrency exchanges, enabling users to execute trades by using commands in the chatbot.

According to Chua, Telegram bots could potentially become an integral part of the cryptocurrency ecosystem, as they offer various types of crypto services, including trading, airdrop farming and automated token operations known as sniping. He added:

Telegrams recent sharp growth in activity related to Telegrams crypto trading bots should be attributed to the surging prices of related tokens. The Unibot (UNIBOT) token, which serves as the governance token on the eponymous trading bot on Telegram, rallied as much as 400% by late July, hitting an all-time high of $199 on July 28.

According to Chua, UNIBOT was a key contributor to the recent burst of activity on Telegram trading bots. The token reportedly accounts for over 77% of the market in terms of its market capitalization.

Related: Telegram Wallet bot enables in-app payments in Bitcoin, USDT and TON

The analyst suggested that its too early to tell if recent action in Telegram bots-enabled crypto activity suggests a trend reversal or merely represent[s] a blip before activity rallies again.

Nonetheless, we will likely see continued developments, at least in the near future, as projects compete for market share, Chua stated.

The analyst also called on users to conduct their own research before interacting with any Telegram bot. Considering the nascency of the sector, its essential for users to be aware of associated risks, including those related to the security of assets and smart contracts, he added.

Magazine: Deposit risk: What do crypto exchanges really do with your money?

Read the original post:

Telegram crypto bots gain momentum in the market: Binance ... - Cointelegraph

Read More..

‘BitForge’ security flaw to threaten Binance, Coinbase, and other … – Cryptopolitan

Description

Recent revelations indicate that a host of leading cryptocurrency wallet providers were susceptible to potential security breaches. These vulnerabilities, now known as BitForge, have highlighted the inherent cyber risks in the cryptocurrency realm, even as the world grapples with increasing adoption and tighter regulatory oversight. Cybersecurity company Fireblocks presented its findings at the Black Hat Read more

Recent revelations indicate that a host of leading cryptocurrency wallet providers were susceptible to potential security breaches. These vulnerabilities, now known as BitForge, have highlighted the inherent cyber risks in the cryptocurrency realm, even as the world grapples with increasing adoption and tighter regulatory oversight.

Cybersecurity company Fireblocks presented its findings at the Black Hat USA conference, disclosing that over 15 predominant cryptocurrency wallets, making up over 80% of the market, were affected. These vulnerabilities could have easily been harnessed to compromise user funds on celebrated exchanges, including Binance and Coinbase.

These security flaws primarily targeted multiparty computation protocols (MPCs). MPCs typically fracture private keys into multiple fragments, dispersed over different devices. This method should ideally bolster security. However, it was discovered that certain implementations of MPCs made it feasible for malicious actors to access the full key after merely 16 transactions. Such rapid-fire transactions could occur within seconds on high-frequency wallets.

Fireblocks CEO, Michael Shaulov, explained the simplicity of exploiting these vulnerabilities. He remarked, The BitForge vulnerabilities operate in line with common cyber-attack mechanisms. A single compromised user through malware is all thats needed. This underscores the ever-present threat of malware, often delivered via phishing scams designed to deceive users into downloading malevolent software or revealing sensitive data.

This vulnerabilitys disclosure comes amidst a mixed landscape of crypto crimes. While the overall figure was down 65% to $3.3 billion in H1 2023 from 2022, ransomware attacks malicious software that encrypts a victims files and demands payment for their release, typically in cryptocurrency are rising sharply. These are predicted to nearly touch $900 million this year, only slightly behind 2021s $940 million.

The international community and regulatory bodies have long been apprehensive about cybersecurity linked to digital assets. Given the burgeoning incidents of cryptocurrency thefts, many governments are ramping up efforts to integrate digital assets and their providers within a regulatory framework. As an illustration, Hong Kongs Securities and Futures Commission (SFC) now necessitates cryptocurrency exchanges operating within its jurisdiction to acquire a license. This move seeks to impose benchmarks in cybersecurity, private key management, and other areas.

However, uncertainties remain. While Fireblocks has pinpointed vulnerabilities in a significant number of wallet providers, determining the exact number affected by these flawed MPC implementations remains elusive.

Fireblocks research pinpointed vulnerabilities in implementations of certain multi-party computation (MPC) protocols, specifically GG-18, GG-20, and Lindell17. These vulnerabilities were traced back to deviations from standard implementations or previous efforts to patch known flaws.

Notably, GG-18 and GG-20 protocols faced issues where earlier attempts to rectify vulnerabilities inadvertently introduced newer ones. Lindell17s flaw, on the other hand, revolved around deviations from the original academic specifications and mishandling of failed signatures.

As a testament to industry collaboration, Fireblocks undertook a 90-day disclosure process. Their endeavors were met with a proactive response. Leading wallet providers, particularly Coinbase WaaS and Zengo, were commended for their swift action in addressing and rectifying the security flaws.

As digital currencies continue to weave themselves into the worlds financial fabric, its evident that maintaining cybersecurity will remain a top priority for providers and regulators alike.

Read more here:

'BitForge' security flaw to threaten Binance, Coinbase, and other ... - Cryptopolitan

Read More..

Livepeer (LPT) Goes Parabolic With Epic 30% Pump on Binance … – Captain Altcoin

Home Journal Livepeer (LPT) Goes Parabolic With Epic 30% Pump on Binance What Instigated the Run?

There has been a noticeable surge in the price of $LPT on Binance, sparking interest and curiosity among both new and experienced traders. Wendy Orchid, an analyst, has shared the reasons behind this significant price increase and provides insights into the promising world of Livepeer.

Livepeer stands out as a decentralized video streaming protocol that operates on the Ethereum blockchain. Its primary goal is to facilitate decentralized live video applications, enabling users to both stream and view videos in a cost-effective and smooth manner.

The protocol employs a decentralized approach to distribute video transcoding across various servers. This not only enhances the performance and reliability of video streaming but also cuts down costs for users. Some of the renowned video streaming applications such as DLive, Theta.tv, and Livepeer.tv have integrated Livepeer into their platforms. Furthermore, notable investors like Andreessen Horowitz, Coinbase Ventures, and Pantera Capital have shown their support for Livepeer.

LPT, an ERC-20 token, is the driving force behind the Livepeer network. These tokens are primarily used to remunerate for video transcoding services and to bolster the networks security. The distribution of LPT tokens is carried out through various means such as staking, mining, and the Livepeer Foundation. Designed with the intent to encourage participation, decentralize the network, and bolster security, LPT tokens play a pivotal role in the ecosystem.

Unibot: Trading Intelligence that Makes You 7x More Successful!

Discover the edge in crypto trading with Unibot a user-friendly Telegram bot that boasts a 35% profitability rate amongst users, seven times higher than the average trader (only 5% of traders are profitable)!

Experience top-notch features like decentralized copytrading, DEX-based limit orders, and protection against MEV bots. Click to connect with Unibot !

Livepeers journey ahead is marked by several milestones:

The platform has showcased commendable progress and has set its sights on continued growth and evolution in the foreseeable future.

At the heart of Livepeer is a team of skilled and seasoned engineers and developers, all united by their passion for shaping the future of decentralized video streaming. The team operates under the leadership of Doug Petkanics, a veteran with over two decades of experience in technology and a renowned expert in online video streaming. With a commitment to open-source development, the team actively collaborates with the Ethereum community, working tirelessly to establish Livepeer as the premier decentralized video streaming platform.

Theres a palpable excitement surrounding Livepeers potential to redefine the landscape of video streaming. As a decentralized platform, it promises to make video streaming more affordable, reliable, and secure. Given its innovative approach and the myriad benefits it offers, Livepeer undoubtedly holds the potential to transform the way we engage with media.

Join us on Facebook and Twitter for the latest insights and discussions in the world of crypto.

Explore our news section and stay ahead of the curve with our expert price predictions.

CaptainAltcoin's writers and guest post authors may or may not have a vested interest in any of the mentioned projects and businesses. None of the content on CaptainAltcoin is investment advice nor is it a replacement for advice from a certified financial planner. The views expressed in this article are those of the author and do not necessarily reflect the official policy or position of CaptainAltcoin.com

Read this article:

Livepeer (LPT) Goes Parabolic With Epic 30% Pump on Binance ... - Captain Altcoin

Read More..

Analisys crypto of Stellar, Cosmos and Binance – The Cryptonomist

In this article we look at the latest relevant news and a price analysis for the crypto assets Stellar (XLM), Cosmos (ATOM) and Binance Coin (BNB).

What does the cryptocurrency market have in store for us these days?

All the details below.

The latest crypto news for Stellar talks about the launch of a series of incentive programs that are part of the $100 million Soroban fund, aimed at helping the developer community test and experiment with projects on the smart contract platform.

In total there are 7 different programs that have already been launched or will be launched soon: Sorobounty Spectacular, Sorobanathon: Road to Mainnet, Stellar Community Fund (SCF), SCF Startup Camp, Soroban Dapps Challenge, RPCiege, and Soroban Quest.

Each of these is aimed at a certain class of developers with different skills and experience.

Speaking instead of Cosmos, it is worth noting the latest announcement by the Wormhole Foundation, which has launched an application, powered by the Cosmos SDK, to expand access to the interchain.

It is Wormhole Gateway and will help bring liquidity within all 23 blockchains connected to the project, improving security and protocol sovereignty.

Through a simple IBC integration, users will be able to link their funds to any IBC chain without added bridging costs.

The Cosmos SDK framework helps increase transparency and allows Wormhole to use IBC clients to facilitate liquidity transfers within the interchain while maintaining the free-flowing characteristics of the data.

Finally, as far as Binance is concerned, there is absolutely no denying the exchanges latest collaboration with Canadian singer-songwriter The Weeknd who participated in his world tour, which began on 6 June.

Binance presided over all of the artists concerts bringing various gadgets and organizing some events to enhance the fan experience in the web3 world.

In particular, the exchange organized some after hours and gave away commemorative NFTs from the concert.

In parallel, at each of The Weeknds stops, a huge cube with the Binance logo was brought in on which an immersive AR experience was featured.

The last concert was in Prague and involved more than 60,000 people.

These kinds of participations by crypto service providers such as Binance help bring the younger generation into the world of web3 and enhance their brand in front of different audiences than those encountered in financial circles.

Lets now move to the markets and individually analyze the price-level situation of the crypto assets Stellar (XLM), Cosmos (ATOM) and Binance coin (BNB)

Starting with Stellar (XLM) we can immediately observe the positivity of the price action over the past month, propelled by the successful outcome of Ripples lawsuit against the SEC.

As Stellar is related to the blockchain network for transnational trades, on the day the court victory was announced, XLM pumped more than 60%.

In the following days, prices slightly corrected their trajectory by going into a bull flag with base at $0.13 and high at $0.19.

It is important for the cryptocurrency that the structure is not compromised and remains above the 60-period exponential moving average on the daily to continue the bullish trend.

Next target $0.236 where two tops touched in the past by the crypto converge.

In case of a bearish break, prices could easily return to the $0.1 area.

On the Cosmos (ATOM) front, things are decidedly worse: after closing out 2022 with a good year-end rally, the cryptocurrency saw a 2023 marked by only declines, with prices holding steady below the EMA 10 on the daily.

A few barren attempts at an upward restart were promptly blocked by the bears that drove ATOMs value further downward.

Hence, the main trend is purely bearish, and the ending scenario for this years EMA is unchanged.

However, we may find a good entry for a speculative long as soon as (and if) the chart touches oversold levels in the RSI indicator, as happened for example on 10 June.

If you believe in the Cosmos project and the future of the interchains, no worries: these moments could be important to accumulate your holding and lower the average carrying price.

Finally, analyzing Binance coin (BNB) we cannot but notice an excess of volatility in the asset during 2023, driven by lawsuits and regulatory issues affecting federal agencies on various continents.

The exchange is working hard so that it can obtain the proper licenses in all the countries where it operates, although the undertaking is not trivial.

The failure of some of its actions in this area and the SEC attack have caused the value of Binance coin (BNB) to decline this year.

We are currently in a phase of lateralization, waiting for new stimulus to push prices toward a recovery of lost ground.

Although we are still in an uncertain market and there are few trading volumes on crypto market platforms, Binance still remains the leading exchange in the sector and its coin will be the first to pump in the event of a return to the bull market.

Therefore, no fears in the long run for BNB, which will find more serene moments.

In the short term, for an immediate restart it is first necessary to recover the $250 threshold, on which the daily EMA 60 flows, and then attack $280 and later $300.

The bearish scenario could instead see a return of the currency to the $220-$210 area.

In order to find a complete analysis cue of the altcoin sector of the crypto market and better understand the price action of Stellar, Cosmos, and Binance Coin, it is essential to take a look at the total market cap chart of the sector.

Removing the respective values of Bitcoin and Ethereum from the chart will provide a more realistic view of how much capital is entering/exiting the alt sector.

At this time it is obvious that investor interest is very low, with really sterile volatility and really low netflow.

Unlike the bull market period where several tens of billions of dollars were coming in every week, and the bear periods where as much was going out, right now we see little movement.

The total market cap (excluding BTC and ETH) currently comes in at $339.9 billion with a chart that is trending slightly downward.

It is difficult to find any cues to trade in the short term, whereas in the long term we can take advantage of these opportunities to increase holding positions.

A recovery of the $400 billion and later the $500 billion could trigger a restart of the whole market bringing back the much-loved alt-season that traders like.

Before then, there is much to watch out for.

See the rest here:

Analisys crypto of Stellar, Cosmos and Binance - The Cryptonomist

Read More..

Intel ‘Downfall’ Bug Steals Encryption Keys, Data From Years of CPUs (Update) – Tom’s Hardware

A new security vulnerability, called Downfall, was revealed today by Intel and the researcher who discovered it, Daniel Moghimi. The new attack uses Gather Data Sampling to steal data and other sensitive information from other users on a computer with Intel processors from 2015 through 2019 ranging from sixth gen Skylake through eleventh gen Rocket Lake and Tiger Lake.

Intel has posted about the vulnerability in a security advisory, INTEL-SA-00828, and has reserved CVE-2022-40982.

Moghami, a senior research scientist at Google (and formerly of the University of California San Diego posted details on downfall.page.

"The vulnerability is caused by memory optimization features in Intel processors that unintentionally reveal internal hardware registers to software," Moghami wrote. "This allows untrusted software to access data stored by other programs, which should not be normally be accessible. I discovered that the Gather instruction, meant to speed up accessing scattered data in memory, leaks the content of the internal vector register file during speculative execution."

On the page, Moghami shows demos stealing 128-bit and 256-bit AES keys from other users, as well as spying on typed characters and taking data from the Linux kernel. He suggests that even if you don't own an Intel powered-device, Intel's dominance in the server market means that everyone on the internet is affected, and that "in cloud computing environments, a malicious customer could exploit the Downfall vulnerability to steal data and credentials from other customers who share the same cloud computer."

Intel is releasing microcode for its affected chips. The company "recommends that users of affected Intel Processors update to the latest version firmware provided by the system manufacturer that addresses these issues." If you're not using Intel SGX, a hardware-based memory encryption technology from Intel, you can load it from the operating system.

In a statement to Tom's Hardware, Intel wrote: "The security researcher, working within the controlled conditions of a research environment, demonstrated the GDS issue which relies on software using Gather instructions. While this attack would be very complex to pull off outside of such controlled conditions, affected platforms have an available mitigation via a microcode update. Recent Intel processors, including Alder Lake, Raptor Lake and Sapphire Rapids, are not affected. Many customers, after reviewing Intel's risk assessment guidance, may determine to disable the mitigation via switches made available through Windows and Linux operating systems as well as VMMs. In public cloud environments, customers should check with their provider on the feasibility of these switches.

The overhead, per Moghami and Intel, could be as high as 50% depending on if a workload uses Gather. Notably, Intel will have an "opt-out mechanism" in the microcode that allows the mitigation for Downfall to be disabled in order to "avoid the performance impact on certain vectorization-heavy workloads."

The researcher recommends against opting out: "This is a bad idea. Even if your workload does not use vector instructions, modern CPUs rely on vector registers to optimize common operations, such as copying memory and switching register content, which leaks data to untrusted code exploiting Gather."

Moghami will present Downfall at the BlackHat USA conference on August 9 and USENIX Security Symposium on August 11. His technical paper can be found here.

Newer Intel chips, like 12th Gen Alder Lake, 13th Gen Raptor Lake, and Sapphire Rapids server chips aren't affected.

Updated August 9 with comment from Intel.

Original post:
Intel 'Downfall' Bug Steals Encryption Keys, Data From Years of CPUs (Update) - Tom's Hardware

Read More..

Navigating the Complex World of Data Encryption: Key Strategies for … – Fagen wasanni

Understanding and Implementing Data Encryption: Essential Tactics for International Businesses

In the digital age, data encryption has become a critical component of business operations, particularly for global businesses that handle sensitive data. As cyber threats continue to evolve, understanding and implementing data encryption is no longer an option but a necessity. This article aims to provide key strategies for navigating the complex world of data encryption.

Data encryption is a method of converting data into a code to prevent unauthorized access. It is a vital tool for protecting sensitive information, such as financial transactions, personal data, and corporate information. With the rise of cybercrime, businesses worldwide are increasingly recognizing the importance of data encryption in safeguarding their data assets.

The first step in implementing data encryption is understanding the different types of encryption algorithms. Symmetric encryption, for instance, uses the same key for encryption and decryption, making it faster but less secure. On the other hand, asymmetric encryption uses different keys for encryption and decryption, offering more security but at the cost of speed. Businesses must carefully consider their specific needs and the nature of their data to choose the most suitable encryption method.

Next, businesses must consider where to apply encryption. Data can be encrypted at rest, in transit, or in use. Encrypting data at rest protects it from physical theft or unauthorized access on storage devices. Encrypting data in transit safeguards it from interception during transmission over networks. Encrypting data in use protects it while being processed or accessed. Each approach has its advantages and challenges, and businesses must evaluate their risk profile and operational requirements to determine the best approach.

Another crucial aspect of data encryption is key management. Encryption keys are what lock and unlock encrypted data. If these keys are lost or fall into the wrong hands, the encrypted data can be compromised. Therefore, businesses must have robust key management policies and procedures in place. This includes regular key rotation, secure key storage, and immediate key revocation in case of a security breach.

Moreover, businesses must stay abreast of the latest developments in encryption technology and regulations. Encryption standards and best practices are continually evolving in response to emerging threats and technological advancements. Similarly, data protection regulations vary across countries and regions, and businesses must ensure their encryption practices comply with these laws to avoid hefty fines and reputational damage.

Lastly, businesses should consider seeking expert advice or outsourcing their encryption needs to a trusted third-party provider. Data encryption is a complex field that requires specialized knowledge and skills. By partnering with experts or reputable service providers, businesses can ensure their data encryption strategy is robust, compliant, and up-to-date.

In conclusion, navigating the complex world of data encryption requires a comprehensive understanding of encryption methods, careful consideration of where to apply encryption, robust key management, staying updated with the latest trends and regulations, and seeking expert advice when needed. By adopting these strategies, global businesses can effectively protect their sensitive data, maintain trust with their customers, and stay ahead in the ever-evolving digital landscape.

Link:
Navigating the Complex World of Data Encryption: Key Strategies for ... - Fagen wasanni

Read More..

The Role of Mobile Encryption in Safeguarding Business Data … – Fagen wasanni

Understanding the Crucial Role of Mobile Encryption in Safeguarding Business Data Worldwide

In the digital age, the role of mobile encryption in safeguarding business data worldwide has become increasingly crucial. As businesses continue to embrace digital transformation, the need to protect sensitive information from unauthorized access has never been more paramount. Mobile encryption, a technology that converts data into a code to prevent unauthorized access, has emerged as a vital tool in the fight against cybercrime.

Mobile encryption works by scrambling data on a device, making it unreadable to anyone without the correct decryption key. This means that even if a device is lost or stolen, the data it contains remains secure. This is particularly important for businesses, which often store sensitive information such as customer details, financial records, and proprietary business information on mobile devices.

The rise of remote working has further underscored the importance of mobile encryption. With employees accessing company data from various locations and on different devices, the risk of data breaches has significantly increased. Mobile encryption helps mitigate this risk by ensuring that data remains secure, regardless of where it is accessed from.

Moreover, mobile encryption is not just about protecting data from external threats. It also plays a crucial role in preventing internal data breaches. Employees, whether intentionally or unintentionally, can cause data breaches. Mobile encryption can help prevent such incidents by ensuring that only authorized personnel have access to sensitive data.

In addition to its security benefits, mobile encryption also helps businesses comply with various data protection regulations. Regulations such as the General Data Protection Regulation (GDPR) in Europe and the California Consumer Privacy Act (CCPA) in the United States require businesses to implement appropriate security measures to protect personal data. Mobile encryption is widely recognized as a key component of these measures.

However, despite its importance, mobile encryption is not without its challenges. One of the main challenges is the complexity of implementing and managing encryption across multiple devices and platforms. This requires a significant investment in terms of time and resources. Furthermore, encryption can sometimes lead to performance issues on devices, which can impact user experience.

To overcome these challenges, businesses need to adopt a strategic approach to mobile encryption. This includes choosing the right encryption solution that fits their needs, training employees on the importance of data security, and regularly reviewing and updating their encryption policies and procedures.

In conclusion, mobile encryption plays a crucial role in safeguarding business data worldwide. It not only helps protect data from unauthorized access but also helps businesses comply with data protection regulations. However, to fully reap the benefits of mobile encryption, businesses need to overcome the challenges associated with its implementation and management. With the right approach, businesses can leverage mobile encryption to enhance their data security and stay ahead in the digital age.

Go here to see the original:
The Role of Mobile Encryption in Safeguarding Business Data ... - Fagen wasanni

Read More..

Cardano (ADA) and Binance Coin (BNB) Feeling the Heat as … – Captain Altcoin

Home Journal Cardano (ADA) and Binance Coin (BNB) Feeling the Heat as InQubeta (QUBE) Takes Center Stage

The crypto landscape is witnessing an interesting twist in the narrative as two widely recognized digital assets, Cardano (ADA) and Binance Coin (BNB), find themselves under the spotlight. The reason? The rising popularity and growing potential of an innovative contender InQubeta (QUBE). In this riveting plot of market dynamics and technological strides, we explore how InQubetas unique proposition is impacting the standing of Cardano and Binance Coin.

InQubetas Inception and Accelerated Momentum

The story of InQubeta is undoubtedly a fascinating tale of ambition, innovation, and the foresight to harness the untapped potential of the AI space. Designed as a unique platform to democratize investment in AI startups, InQubeta is facilitating a major shift in the investment paradigm. By enabling fractional investment in AI startups through its native QUBE tokens, InQubeta has positioned itself as a forerunner of inclusivity and equality in the AI investment landscape.

The QUBE token further distinguishes itself with its deflationary characteristics, operating on a fixed tax system on buying and selling that feeds into a burn wallet and a dedicated rewards pool. This strategy not only safeguards the tokens value but also creates an opportunity for investors to benefit from staking their tokens.

Having successfully raised over $2.1 million in their ongoing presale, InQubetas disruptive vision has already gained substantial traction among investors. With a multi-chain expansion on the horizon in 2024, the platform is poised for impressive growth and potentially significant implications for the crypto market at large.

Cardano (ADA) and Binance Coin (BNB): The Pressure to Adapt

Cardano and Binance Coin, despite their established presence and considerable achievements, are finding the emerging competition increasingly challenging. Cardano, with its focus on creating a platform for the secure development and execution of smart contracts, and Binance Coin, as an integral part of the widely used Binance Exchange ecosystem, have held strong positions in the market.

However, as the crypto landscape evolves and the demand for innovative solutions grows, both these giants are feeling the pressure from trailblazing platforms like InQubeta. The need to adapt and innovate has never been more crucial to maintain their market position and continue to attract investors.

Comparing the Contenders

While Cardano and Binance Coin have their strengths and a loyal user base, the novel approach and potential of InQubeta cannot be underestimated. InQubetas groundbreaking concept and the rapidly growing interest it has garnered from the investment community poses a challenge that Cardano and Binance Coin will have to meet head-on.

While they each cater to different aspects of the blockchain space, the inherent competitive nature of this industry calls for constant evolution. The pressure to adapt and stay relevant in the face of such competition might very well be the catalyst that sparks the next wave of innovation for both Cardano and Binance Coin.

Conclusion

The cryptocurrency space is in a state of constant flux, and the rise of InQubeta serves to underline this point. The progress and growing influence of this innovative platform are a reminder of the dynamic and ever-changing landscape of digital assets. While stalwarts like Cardano and Binance Coin have had a significant impact on the market, they are now facing the challenge to adapt and innovate to maintain their positions. As this situation unfolds, it will be interesting to see how the balance shifts.

Visit InQubeta Presale | Join The InQubeta Communities

Disclaimer: This sponsored publication by CaptainAltcoin does not endorse or assume responsibility for the content, accuracy, or quality of materials and readers should conduct their research before engaging with any mentioned company, as the featured information is not intended as legal, tax, investment, or financial advice, and CaptainAltcoin is not liable for any damages or losses arising from the use of content, goods, or services featured on this page. You should do your own research in the crypto industry before investing in any of the projects mentioned in this article.

Follow this link:

Cardano (ADA) and Binance Coin (BNB) Feeling the Heat as ... - Captain Altcoin

Read More..