Scan to download
BTC $74,538.09 +5.30%
ETH $2,388.41 +9.15%
BNB $617.97 +3.42%
XRP $1.37 +3.55%
SOL $86.11 +5.16%
TRX $0.3214 -0.23%
DOGE $0.0945 +3.96%
ADA $0.2445 +2.54%
BCH $437.25 +2.71%
LINK $9.22 +5.53%
HYPE $44.88 +7.68%
AAVE $101.07 +7.34%
SUI $0.9514 +5.33%
XLM $0.1569 +3.68%
ZEC $376.41 +4.67%
BTC $74,538.09 +5.30%
ETH $2,388.41 +9.15%
BNB $617.97 +3.42%
XRP $1.37 +3.55%
SOL $86.11 +5.16%
TRX $0.3214 -0.23%
DOGE $0.0945 +3.96%
ADA $0.2445 +2.54%
BCH $437.25 +2.71%
LINK $9.22 +5.53%
HYPE $44.88 +7.68%
AAVE $101.07 +7.34%
SUI $0.9514 +5.33%
XLM $0.1569 +3.68%
ZEC $376.41 +4.67%

public

Security experts: North Korea's "public" theft of cryptocurrency assets has become its means of financing

As the infiltration and attacks targeting the cryptocurrency industry continue to escalate, security experts point out that the core difference from hackers with backgrounds in other countries is that cryptocurrency assets have become an important direct source of financing for military expenses in that country. Reports indicate that during a recent months-long infiltration operation against Drift Protocol, North Korean hackers once again caused a stir in the industry.Experts state that this model is not merely a "fund transfer tool," but rather a direct "predatory profit" mechanism used to bypass international sanctions and obtain immediately usable hard currency. Security researchers note that, unlike countries such as Russia and Iran, North Korea almost entirely lacks sustainable foreign economic and commodity export capabilities, making it more reliant on cryptocurrency theft as a core source of income to support its nuclear weapons and ballistic missile programs.Experts also emphasize that North Korean hacker attack targets have expanded from simple phishing to exchanges, wallet services, and key holders of DeFi protocols, commonly employing long-term social engineering and identity disguise infiltration methods. Due to the characteristic of blockchain transactions being "irreversible once confirmed," the cryptocurrency industry is far weaker than the traditional financial system in terms of freezing and recovering funds, making such attacks more destructive in speed and scale. Security personnel warn that this type of "long-term infiltration + precise power seizure" attack model has yet to be effectively addressed by the industry.

He Yifa wrote a long article listing Xu Mingxing's "six sins," accusing him of deliberately manipulating public opinion to suppress Binance

Binance co-founder He Yi (@heyibinance) published a lengthy article on the X platform on April 10, directly responding to a series of accusations made by OKX founder Xu Mingxing (@star_okx) against CZ and Binance. He Yi refuted each point in the article, stating that Xu deliberately blamed Binance for the market crash on March 11, defined the BNB chain meme as market manipulation by Binance, hired online trolls to suppress competitors, and engaged in "six tactics" such as creating controversies to drive traffic to himself. He bluntly stated, "You know too well how to attack a professional woman," emphasizing that his position is earned through independent effort and is unrelated to anyone else.At the end of the article, He Yi also responded strongly to personal attacks against him, stating, "You know too well how to attack a professional woman, just by stigmatizing 'she is where she is today because of a man,' deliberately creating scandalous rumors, and belittling me as 'a trophy'," and emphasized, "My identity is not given by anyone; I built my own empire. I came, I saw, I conquered; this applies to both my career and my relationships."Previously, CZ (@cz_binance) had posted about Xu Mingxing's public $1 billion bet, demanding that he "apologize like a man." Xu Mingxing responded by stating that CZ's public initiation of a huge bet contradicts the professional ethics expected of executives at regulated exchanges. The debate between the two parties is still ongoing.

Circle's Arc public chain releases a post-quantum cryptography roadmap, covering full-stack upgrades from wallets to validators

According to the official blog, Circle's institutional-grade blockchain Arc has released a phased upgrade roadmap for post-quantum cryptography (PQ), planning to introduce post-quantum signature schemes at the launch of the mainnet, gradually covering full-stack layers such as private state protection, infrastructure hardening, and validator authentication.The Arc mainnet will support post-quantum signatures from the outset, using an opt-in mechanism that does not require mandatory migration or a full network reset, allowing users to independently create wallets with long-term security. The recent goal is to extend quantum resistance to the private virtual machine (VM) layer, protecting private balances, private transactions, and private payees, with public keys additionally encapsulated in a symmetric encryption layer under privacy mode.The mid-term plan is to advance the upgrade of the infrastructure layer, aligning with industry standards such as TLS 1.3, covering access control, cloud environments, and hardware security modules (HSM). The long-term goal is to complete the hardening of validator signatures. Given that Arc's block finalization time is less than 1 second, the current assessment considers the risk of quantum attacks in this phase to be relatively limited, and it will be steadily advanced after the post-quantum consensus toolchain matures.Circle also warns that attackers may adopt a "collect now, decrypt later" strategy, and institutions should plan their cryptographic migration paths as early as possible.
app_icon
ChainCatcher Building the Web3 world with innovations.