The digital assets sector has been plagued since its earliest days by malicious hacks. Hardly a month goes by without a noteworthy cyber assault draining significant funds or data from crypto operations. North Korean-linked hackers stole over $280 million from decentralized platform Drift last week. Just this week, recent incidents spurred the Solana Foundation to pursue new security measures to prevent exploits.

Billions of dollars in assets are stolen each year, often by hacker groups sponsored by nations such as North Korea. Digital security has remained one of the points of concern for U.S. lawmakers weighing legislation that would bring the crypto sector into the regulated financial system.

Read More: U.S. DOJ Pursues North Korea’s Illicit Money Machine, Seizes More Crypto

More For You

Encryption Supremacy - Zcash and Privacy in the Age of Scale

Most crypto privacy models weaken as blockchain data grows. Encryption-based models like Zcash strengthen. CoinDesk Research maps the five privacy approaches and examines the widening gap.

Why it matters:

As blockchain adoption scales, the metadata available to machine learning models scales with it. Obfuscation-based privacy approaches are structurally degrading as a result. This report provides a comprehensive comparison of all five major crypto privacy architectures and a framework for evaluating which models remain durable as AI capabilities improve.

More For You

Oil tanker at sea. (Gerhard Traschütz/Pixabay)

The Iranian regime has been increasingly using cryptocurrency over the last few years to facilitate cross border oil trading, according to data from Chainalysis.

What to know:

  • Iran recently confirmed bitcoin is being accepted as a payment to pass through the Strait.
  • The Iran-backed Houthi regime, which uses crypto to trade oil, has raised the prospect of imposing a second shipping chokepoint in the Red Sea.
  • If Iran demanded payment in the Trump family-affiliated stablecoin USD1, the…

About the Author

Leave a Reply

Your email address will not be published. Required fields are marked *

Related Stories