Scan to download
BTC $75,759.32 +1.43%
ETH $2,357.01 +0.69%
BNB $632.74 +1.88%
XRP $1.45 +2.15%
SOL $88.15 +3.35%
TRX $0.3240 -0.94%
DOGE $0.0990 +2.58%
ADA $0.2577 +3.25%
BCH $450.32 +2.32%
LINK $9.52 +2.34%
HYPE $43.65 -2.77%
AAVE $116.12 +8.88%
SUI $0.9986 +2.24%
XLM $0.1692 +4.88%
ZEC $333.04 -3.07%
BTC $75,759.32 +1.43%
ETH $2,357.01 +0.69%
BNB $632.74 +1.88%
XRP $1.45 +2.15%
SOL $88.15 +3.35%
TRX $0.3240 -0.94%
DOGE $0.0990 +2.58%
ADA $0.2577 +3.25%
BCH $450.32 +2.32%
LINK $9.52 +2.34%
HYPE $43.65 -2.77%
AAVE $116.12 +8.88%
SUI $0.9986 +2.24%
XLM $0.1692 +4.88%
ZEC $333.04 -3.07%

public

XRP Ledger introduces Boundless to enable public chains to achieve bank-level privacy and compliant transactions

XRP Ledger announced the integration of zero-knowledge infrastructure provider Boundless to support banks and asset management institutions in executing transactions on the public chain that balance privacy protection and compliance.According to reports, this solution can hide sensitive information such as transaction size, frequency, and counterparties, while still allowing regulatory agencies to conduct audits through selective disclosure and role-based access control, thus achieving a balance between privacy and compliance. This integration will support institutional scenarios such as cross-border B2B payments, fund and capital management, over-the-counter (OTC) trading, tokenized asset issuance, and on-chain trading and lending.Industry insiders believe that the contradiction between the transparency of public chains and the demand for privacy has always been a significant barrier to institutional adoption, and this solution aims to reduce the so-called "transparency tax." Meanwhile, competition in the privacy track continues to heat up. Technologies such as zero-knowledge proofs (ZK) and fully homomorphic encryption (FHE) are accelerating implementation, pushing privacy capabilities from optional features to underlying infrastructure. Data shows that the market size of tokenized assets has reached approximately $29.25 billion, with a monthly increase of about 7.9%.

Security experts: North Korea's "public" theft of cryptocurrency assets has become its means of financing

As the infiltration and attacks targeting the cryptocurrency industry continue to escalate, security experts point out that the core difference from hackers with backgrounds in other countries is that cryptocurrency assets have become an important direct source of financing for military expenses in that country. Reports indicate that during a recent months-long infiltration operation against Drift Protocol, North Korean hackers once again caused a stir in the industry.Experts state that this model is not merely a "fund transfer tool," but rather a direct "predatory profit" mechanism used to bypass international sanctions and obtain immediately usable hard currency. Security researchers note that, unlike countries such as Russia and Iran, North Korea almost entirely lacks sustainable foreign economic and commodity export capabilities, making it more reliant on cryptocurrency theft as a core source of income to support its nuclear weapons and ballistic missile programs.Experts also emphasize that North Korean hacker attack targets have expanded from simple phishing to exchanges, wallet services, and key holders of DeFi protocols, commonly employing long-term social engineering and identity disguise infiltration methods. Due to the characteristic of blockchain transactions being "irreversible once confirmed," the cryptocurrency industry is far weaker than the traditional financial system in terms of freezing and recovering funds, making such attacks more destructive in speed and scale. Security personnel warn that this type of "long-term infiltration + precise power seizure" attack model has yet to be effectively addressed by the industry.

He Yifa wrote a long article listing Xu Mingxing's "six sins," accusing him of deliberately manipulating public opinion to suppress Binance

Binance co-founder He Yi (@heyibinance) published a lengthy article on the X platform on April 10, directly responding to a series of accusations made by OKX founder Xu Mingxing (@star_okx) against CZ and Binance. He Yi refuted each point in the article, stating that Xu deliberately blamed Binance for the market crash on March 11, defined the BNB chain meme as market manipulation by Binance, hired online trolls to suppress competitors, and engaged in "six tactics" such as creating controversies to drive traffic to himself. He bluntly stated, "You know too well how to attack a professional woman," emphasizing that his position is earned through independent effort and is unrelated to anyone else.At the end of the article, He Yi also responded strongly to personal attacks against him, stating, "You know too well how to attack a professional woman, just by stigmatizing 'she is where she is today because of a man,' deliberately creating scandalous rumors, and belittling me as 'a trophy'," and emphasized, "My identity is not given by anyone; I built my own empire. I came, I saw, I conquered; this applies to both my career and my relationships."Previously, CZ (@cz_binance) had posted about Xu Mingxing's public $1 billion bet, demanding that he "apologize like a man." Xu Mingxing responded by stating that CZ's public initiation of a huge bet contradicts the professional ethics expected of executives at regulated exchanges. The debate between the two parties is still ongoing.

Circle's Arc public chain releases a post-quantum cryptography roadmap, covering full-stack upgrades from wallets to validators

According to the official blog, Circle's institutional-grade blockchain Arc has released a phased upgrade roadmap for post-quantum cryptography (PQ), planning to introduce post-quantum signature schemes at the launch of the mainnet, gradually covering full-stack layers such as private state protection, infrastructure hardening, and validator authentication.The Arc mainnet will support post-quantum signatures from the outset, using an opt-in mechanism that does not require mandatory migration or a full network reset, allowing users to independently create wallets with long-term security. The recent goal is to extend quantum resistance to the private virtual machine (VM) layer, protecting private balances, private transactions, and private payees, with public keys additionally encapsulated in a symmetric encryption layer under privacy mode.The mid-term plan is to advance the upgrade of the infrastructure layer, aligning with industry standards such as TLS 1.3, covering access control, cloud environments, and hardware security modules (HSM). The long-term goal is to complete the hardening of validator signatures. Given that Arc's block finalization time is less than 1 second, the current assessment considers the risk of quantum attacks in this phase to be relatively limited, and it will be steadily advanced after the post-quantum consensus toolchain matures.Circle also warns that attackers may adopt a "collect now, decrypt later" strategy, and institutions should plan their cryptographic migration paths as early as possible.
app_icon
ChainCatcher Building the Web3 world with innovations.