#document-timestamping

[ follow ]
#circle
fromnews.bitcoin.com
3 hours ago
Cryptocurrency

Circle Announces Quantum-Resistant Roadmap to Secure Future Digital Asset Infrastructure

Circle's Arc platform will launch with post-quantum signature support to secure institutional assets against quantum threats.
Cryptocurrency
fromnews.bitcoin.com
3 days ago

Circle Reveals Wrapped Bitcoin Product With Real-Time Onchain Reserve Verification

Circle launched cirBTC, a wrapped bitcoin token fully backed by native BTC, aimed at providing institutional users with verifiable onchain exposure.
Cryptocurrency
fromnews.bitcoin.com
3 hours ago

Circle Announces Quantum-Resistant Roadmap to Secure Future Digital Asset Infrastructure

Circle's Arc platform will launch with post-quantum signature support to secure institutional assets against quantum threats.
Cryptocurrency
fromnews.bitcoin.com
3 days ago

Circle Reveals Wrapped Bitcoin Product With Real-Time Onchain Reserve Verification

Circle launched cirBTC, a wrapped bitcoin token fully backed by native BTC, aimed at providing institutional users with verifiable onchain exposure.
Deliverability
fromnews.bitcoin.com
1 day ago

Dmail Network to Cease Operations Following Five Years of Service

Dmail Network will permanently shut down its services on May 15, 2026, due to unsustainable infrastructure costs and a failed economic model.
#quantum-computing
Information security
fromnews.bitcoin.com
2 days ago

The Retroactive Decryption Trap: Why Post-Quantum Upgrades Can't Save Your Past Privacy

Google's whitepaper on quantum threats urges immediate post-quantum preparations, shifting the migration deadline to 2029 and highlighting vulnerabilities in blockchain security.
Information security
fromSecurityWeek
5 days ago

Google Slashes Quantum Resource Requirements for Breaking Cryptocurrency Encryption

Google's Quantum AI warns that cryptocurrencies are more vulnerable to quantum attacks than previously believed, shortening the timeline for potential threats.
Information security
fromnews.bitcoin.com
2 days ago

The Retroactive Decryption Trap: Why Post-Quantum Upgrades Can't Save Your Past Privacy

Google's whitepaper on quantum threats urges immediate post-quantum preparations, shifting the migration deadline to 2029 and highlighting vulnerabilities in blockchain security.
Information security
fromSecurityWeek
5 days ago

Google Slashes Quantum Resource Requirements for Breaking Cryptocurrency Encryption

Google's Quantum AI warns that cryptocurrencies are more vulnerable to quantum attacks than previously believed, shortening the timeline for potential threats.
#blockchain
Cryptocurrency
fromnews.bitcoin.com
2 hours ago

Bitgo CEO Proposes Using a Public Blockchain as the Ultimate Solution for Government Fraud

Mike Belshe proposes using a public blockchain to combat state and federal fraud, potentially addressing losses of up to $521 billion annually.
Cryptocurrency
fromnews.bitcoin.com
3 days ago

REAL and Redstone Collaborate to Enhance Data Integrity for Tokenized Assets

REAL partners with Redstone to enhance data transparency and risk intelligence in its ecosystem for tokenized assets.
Information security
fromnews.bitcoin.com
4 days ago

Naoris Protocol Deploys Post-Quantum Mainnet to Secure Global Digital Infrastructure

Naoris Protocol launched its Layer 1 mainnet for decentralized post-quantum security, processing over 106 million transactions to combat quantum computing threats.
#crypto-regulation
Cryptocurrency
fromnews.bitcoin.com
11 hours ago

This Week in Crypto Law (Mar. 29, 2026)

Regulators are increasingly asserting control over digital assets while enabling new market structures, as seen in recent developments in the U.S. and Hong Kong.
fromnews.bitcoin.com
1 week ago
Cryptocurrency

This Week in Crypto Law (Mar. 22, 2026)

Legal and regulatory uncertainty is shaping markets, business decisions, and global policy in the crypto sector.
Cryptocurrency
fromnews.bitcoin.com
11 hours ago

This Week in Crypto Law (Mar. 29, 2026)

Regulators are increasingly asserting control over digital assets while enabling new market structures, as seen in recent developments in the U.S. and Hong Kong.
Privacy technologies
fromNextgov.com
2 weeks ago

New methods for assuring digital identity and authenticity

Generative AI is transforming content creation, increasing the need for reliable identity verification and authenticity in digital media.
#ai-agents
Information security
fromnews.bitcoin.com
5 days ago

Chainalysis Deploys AI Agents to Counter Criminal Use of Artificial Intelligence in Crypto

Chainalysis introduces AI agents to enhance fraud detection and compliance without requiring deep technical expertise, ensuring data quality and human oversight.
Cryptocurrency
fromnews.bitcoin.com
1 week ago

Trust Wallet Adds AI Transaction Layer to Self-Custody Wallet Infrastructure

Trust Wallet's Agent Kit allows developers to create AI agents for automated crypto transactions with user-defined permissions.
Information security
fromnews.bitcoin.com
5 days ago

Chainalysis Deploys AI Agents to Counter Criminal Use of Artificial Intelligence in Crypto

Chainalysis introduces AI agents to enhance fraud detection and compliance without requiring deep technical expertise, ensuring data quality and human oversight.
Cryptocurrency
fromnews.bitcoin.com
1 week ago

Trust Wallet Adds AI Transaction Layer to Self-Custody Wallet Infrastructure

Trust Wallet's Agent Kit allows developers to create AI agents for automated crypto transactions with user-defined permissions.
Cryptocurrency
fromnews.bitcoin.com
2 days ago

Human Error, Not Hacking, Cited as Top Cause for Crypto Access Loss

Human error is the leading cause of cryptocurrency access loss, affecting 35% of holders, primarily due to forgotten passwords and lost seed phrases.
fromFortune
2 weeks ago

Stripe-backed crypto startup Tempo releases AI payments protocol, launches blockchain | Fortune

Agentic payments is very early, and we still are figuring out the best way to structure these. So our team just came up with what we thought was the most elegant, minimal, efficient protocol that anyone can extend without our permission.
NYC startup
Privacy technologies
fromArs Technica
2 weeks ago

After Discord fiasco, age-check tech promises privacy by running locally. Does it work?

Age-verification systems using on-device face scans and cross-platform age keys reduce privacy risks, but widespread distrust of vendors and past data breaches undermine user confidence in these technologies.
Artificial intelligence
fromTheregister
2 weeks ago

World pitch: scan eyeballs to tie identity to AI agents

World is launching AgentKit, a technology linking AI agents to verified human identities through iris-scanning orbs to prevent AI abuse and establish trust in agentic systems.
Privacy professionals
fromEngadget
3 weeks ago

Social Security watchdog investigating claims that DOGE engineer copied its databases

A former software engineer associated with Elon Musk's Department of Government Efficiency is under investigation for allegedly possessing and attempting to transfer sensitive Social Security Administration databases containing personal information on over 500 million Americans.
Business intelligence
fromSecuritymagazine
4 weeks ago

AI Security and Forensic Accounting: Protecting Financial Systems in an Automated World

AI-enhanced forensic accounting is essential for detecting financial fraud and payment manipulation in automated financial systems vulnerable to sophisticated, AI-driven attacks.
Privacy technologies
fromArs Technica
2 weeks ago

World ID wants you to put a cryptographically unique human identity behind your AI agents

World ID's Agent Kit enables AI agents to prove human authorization through iris-verified identity tokens, allowing websites to distinguish legitimate automated requests from malicious Sybil attacks.
#bitcoin
Cryptocurrency
fromBitcoin Magazine
5 days ago

Google's New Quantum Research Renews Push To Secure Bitcoin

Bitcoin's reliance on elliptic curve cryptography faces potential threats from quantum computing advancements, necessitating urgent preparation among developers and investors.
fromBitcoin Magazine
5 days ago
Cryptocurrency

Satoshi's 2010 Quantum Response Is Getting A 2026 Stress Test As Google Warns Timeline May Be Closer Than Expected

fromBitcoin Magazine
1 month ago
Information security

Bitcoin Advances Toward Quantum Resistance With BIP 360

BIP 360 proposes Pay-to-Merkle-Root (P2MR) to reduce quantum vulnerability while maintaining Tapscript compatibility and enabling future post-quantum signature upgrades.
fromBitcoin Magazine
1 month ago
Cryptocurrency

Bitcoin's 50% Slide: Quantum Scare Or Capital Rotation?

Bitcoin's decline appears driven by shifting capital flows, tightening liquidity, and miner economics rather than imminent quantum-computing threats to cryptographic security.
Cryptocurrency
fromBitcoin Magazine
5 days ago

Google's New Quantum Research Renews Push To Secure Bitcoin

Bitcoin's reliance on elliptic curve cryptography faces potential threats from quantum computing advancements, necessitating urgent preparation among developers and investors.
Cryptocurrency
fromBitcoin Magazine
5 days ago

Satoshi's 2010 Quantum Response Is Getting A 2026 Stress Test As Google Warns Timeline May Be Closer Than Expected

Bitcoin's security can adapt to cryptographic threats, with potential upgrades to stronger algorithms if vulnerabilities arise.
Data science
fromTheregister
4 weeks ago

Unpacking the deceptively simple science of tokenomics

AI datacenter efficiency is measured by tokens generated per watt, with profitability determined by token revenue minus infrastructure costs, but optimization must balance throughput with service quality requirements.
Privacy professionals
fromFast Company
3 weeks ago

Crypto is in its "cloned cell phone" era

1990s cellular fraud cost the industry $650 million annually until carriers implemented authentication systems and law enforcement coordination that dramatically reduced cloning crimes.
Philosophy
fromWarpweftandway
1 month ago

ToC: Dao 25:1

Dao 25:1 publishes scholarly articles examining Confucian and Daoist philosophy, democratic leadership, aesthetic value, narrative ethics, and Islamic-Confucian synthesis within East-West intellectual dialogue.
Marketing tech
fromExchangewire
1 month ago

AI Slop and Peril for the Open Web

AI-generated content farms (slop) waste 25-30% of open-web ad spend through fraudulent sites, with over 100,000 such sites now existing and 10,000 new ones appearing monthly.
fromnews.bitcoin.com
6 days ago

Circle Deploys USDC and CCTP on Pharos Network to Advance RealFi Goals

The integration of USDC at the protocol level introduces a transparent, fully reserved, dollar-denominated stablecoin into the Pharos ecosystem, enhancing its financial capabilities.
Cryptocurrency
Miscellaneous
fromBitcoin Magazine
1 month ago

The Core Issue: Why Bitcoin Needed A Remodel With Segwit And Taproot

Segregated Witness and Taproot represent the two largest Bitcoin protocol changes, addressing fundamental transaction structure limitations and scripting language constraints to enable broader network functionality.
Information security
fromSecuritymagazine
2 weeks ago

Document Protection: Why Hybrid Storage Is the Future of Security

A hybrid approach combining digital storage for frequently accessed documents and physical storage for sensitive historical information provides optimal security and efficiency.
Miscellaneous
fromBitcoin Magazine
1 month ago

Citrea Launches Foundation To Advance Bitcoin's Programmable Future

Citrea Foundation established to accelerate Bitcoin's programmable ecosystem through decentralized development, research funding, and community support.
Cryptocurrency
fromBitcoin Magazine
1 week ago

Trust Wallet Launches Agent Kit That Lets AI Execute Crypto Transactions

Trust Wallet launched the Agent Kit, enabling AI agents to execute crypto transactions while keeping users in control.
Cryptocurrency
fromBitcoin Magazine
1 week ago

The Core Issue: Beneath The Binary, Verifying Trust

Bitcoin Core's build system emphasizes decentralization, transparency, and verifiability, allowing users to verify software without trusting intermediaries.
fromFast Company
1 month ago

This crypto ring certifies your digital self with real-life handshakes

Identity spoofing against older adults alone grew by 8x between 2020 and 2024, driven in part by convincing AI impersonations of friends and loved ones. It's a problem costing people in the U.S. nearly half a billion dollars a year with no end in sight.
Privacy technologies
#tether
Cryptocurrency
fromFortune
1 week ago

Tether announces it has brought on a Big Four firm to conduct long awaited audit | Fortune

Tether has engaged a Big Four accounting firm for its first full audit to enhance transparency and legitimacy in the stablecoin market.
Cryptocurrency
fromnews.bitcoin.com
1 week ago

Tether Engages Big Four for First Full Audit

Tether plans to undergo its first full independent financial audit by a Big Four accounting firm to enhance transparency and accountability.
fromFortune
2 months ago
Venture

A crypto social media network's failure raises an awkward question: Is blockchain good for anything beside finance? | Fortune

Cryptocurrency
fromFortune
1 week ago

Tether announces it has brought on a Big Four firm to conduct long awaited audit | Fortune

Tether has engaged a Big Four accounting firm for its first full audit to enhance transparency and legitimacy in the stablecoin market.
Cryptocurrency
fromnews.bitcoin.com
1 week ago

Tether Engages Big Four for First Full Audit

Tether plans to undergo its first full independent financial audit by a Big Four accounting firm to enhance transparency and accountability.
fromFortune
2 months ago
Venture

A crypto social media network's failure raises an awkward question: Is blockchain good for anything beside finance? | Fortune

Miscellaneous
fromBitcoin Magazine
1 month ago

The Core Issue: Libsecp256k1, Bitcoin's Cryptographic Heart

Libsecp256k1 evolved from a hobby project into essential consensus-critical software protecting Bitcoin's multi-trillion dollar network through secure elliptic curve cryptography implementation.
fromSilicon Canals
1 month ago

The global infrastructure of digital ID is being built right now - and nobody voted for it - Silicon Canals

What I walked through wasn't just an immigration gate. It was a node in a rapidly expanding global infrastructure of digital identity, one being constructed at extraordinary speed, across dozens of countries, by a mix of governments, multilateral organizations, and private technology vendors. The people building it believe they are solving real problems: fraud, statelessness, inefficient public services, financial exclusion.
Privacy technologies
#quantum-computing-threat
Cryptocurrency
fromBitcoin Magazine
2 weeks ago

Bitcoin's Quantum Risk May Be Real, But The Network Is Preparing: Report

Quantum computing poses a long-term threat to Bitcoin's security through elliptic curve cryptography, but developers are actively building protective solutions before the technology becomes viable.
fromSecuritymagazine
1 month ago
Information security

Harvest Now, Decrypt Later: Preparing for the Quantum Hangover

Adversaries are currently stealing encrypted data through harvest-now, decrypt-later attacks, planning to decrypt it once quantum computing matures, making the quantum threat an immediate cybersecurity concern rather than a distant future problem.
Cryptocurrency
fromBitcoin Magazine
2 weeks ago

Bitcoin's Quantum Risk May Be Real, But The Network Is Preparing: Report

Quantum computing poses a long-term threat to Bitcoin's security through elliptic curve cryptography, but developers are actively building protective solutions before the technology becomes viable.
Cryptocurrency
fromCointelegraph
2 weeks ago

Why Ethereum Developers Want 'One-Click Staking' for Institutions

Ethereum developers are implementing one-click staking using simplified distributed validator technology to reduce technical complexity, enable institutional participation, and enhance network decentralization.
Software development
fromMedium
2 months ago

Immutability by Default: The Foundation of Reliable Systems

Immutability preserves historical facts in distributed systems, preventing truth drift and ensuring predictable downstream behavior despite changing rules and deployments.
#quantum-resistance
Cryptocurrency
fromBitcoin Magazine
2 weeks ago

BTQ Deploys First Working BIP 360 Implementation On Bitcoin Quantum Testnet

BTQ Technologies released the first working implementation of BIP 360, introducing quantum-resistant transaction infrastructure on Bitcoin Quantum testnet v0.3.0 for live testing and developer experimentation.
Cryptocurrency
fromBitcoin Magazine
2 weeks ago

BTQ Deploys First Working BIP 360 Implementation On Bitcoin Quantum Testnet

BTQ Technologies released the first working implementation of BIP 360, introducing quantum-resistant transaction infrastructure on Bitcoin Quantum testnet v0.3.0 for live testing and developer experimentation.
fromwww.housingwire.com
1 month ago

Can on-chain protocols make U.S. land records fraud-proof?

As HousingWire recently reported, the fragmentation across 3,000-plus local registries has created a multibillion-dollar opening for deed fraud. When ownership data is siloed and verification relies on manual oversight, the system becomes a playground for bad actors. Digitization was supposed to fix this, but moving a paper deed to a PDF doesn't change the underlying vulnerability. If a fraudulent signature is recorded digitally, the speed of the system simply makes the fraud harder to claw back.
Real estate
Cryptocurrency
fromBitcoin Magazine
2 weeks ago

The Core Issue: Your Node Vs. The Digital Wilderness

Bitcoin's peer-to-peer networking layer is its most vulnerable attack surface, requiring Core to prevent denial-of-service vectors while enabling safe node communication in adversarial Internet environments.
#agentic-commerce
Cryptocurrency
fromBitcoin Magazine
2 weeks ago

SEC, CFTC Jointly Say Most Crypto Are Not Securities

The SEC and CFTC jointly issued guidance classifying most digital assets as non-securities, establishing a formal token taxonomy and ending over a decade of regulatory uncertainty.
Business
fromFortune
1 month ago

Crypto is facing an identity crisis-but it's hardly the first time | Fortune

A shirtless spectator's crypto ad stunt at the Super Bowl worsened public perception amid a major crypto sell-off and internal industry disillusionment.
fromwww.theguardian.com
1 month ago

How cryptocurrency's second largest coin missed out on the industry's boom

Ryan, who had worked for seven years at the Ethereum Foundation (EF), Ethereum's de facto governing body, suggested that Ethereum could be on the cusp of an era-defining shift. Since its founding in 2014, the foundation had prioritized technical upgrades and had avoided centralizing power while its user base was growing, but Ethereum had now grown up, and the cryptocurrency world around it had grown up, too.
US politics
Digital life
fromFast Company
2 months ago

3 shifts in crypto into 2026

Mainstream crypto adoption is quietly increasing through practical use cases, making digital assets more accessible without technical or financial expertise.
fromThe Drum
2 months ago

This Week in the Metaverse: arrest warrant for top crypto creator and 'the merge' arrives

According to data from Statista, approximately 67% of Roblox users were under the age of 17 - and the vast majority were under the age of 13 - in September 2020. Now that distribution appears to be shifting - there now appear to be more daily active users (DAUs) over the age of 13 than below. At the same time, Roblox has been falling short of its financial goals; the company's most recent financial report shows that it missed both its top and bottom lines.
Marketing tech
fromTheregister
2 months ago

SSA admits DOGE had more access than first said

Even worse than that, the DOJ noted in its filing, email evidence shows that a pair of DOGE employees at SSA were approached by a political advocacy group asking them to help the group find evidence of voter fraud in a bid to overturn state-level elections. One of the DOGE employees even signed a "voter data agreement," the contents of which weren't explained in the filing, with the unnamed group.
US politics
Software development
fromInfoWorld
2 months ago

GitHub Artifact Attestations sign and verify software artifacts

Artifact Attestations in GitHub Actions is now generally available to secure artifacts and verify provenance using Sigstore, Kubernetes Policy Controller, and gh attestation verify.
fromFast Company
2 months ago

What are tokenized securities? Risks and what to know as stock exchange NYSE embraces the blockchain

The blockchain is coming to Wall Street. The New York Stock Exchange (NYSE) said on Monday that it was developing a platform to trade tokenized securities, digital representations of assets like stocks and bonds. But exactly when the 233-year-old financial institution will turn it on is still up in the air. Supporters of the technology argue that the change could modernize the NYSE, giving traders some of the same advantages that are enjoyed by investors in the cryptocurrency world.
Business
Venture
fromEntrepreneur
1 month ago

Why Founders Can't Ignore Commodity Tokenization Anymore

Commodity tokenization modernizes how capital interacts with physical commodities without altering the underlying assets, giving founders optionality in volatile, capital-constrained markets.
#web3
fromThe Drum
2 months ago
Marketing tech

Web3 is coming faster than anyone thought. Agencies need to adapt even more quickly

fromThe Drum
2 months ago
Marketing tech

Web3 is coming faster than anyone thought. Agencies need to adapt even more quickly

Cryptocurrency
fromBitcoin Magazine
3 weeks ago

Blockstream's Jade Hardware Wallet Adds Lightning Support For Instant Bitcoin Payments

Blockstream Jade hardware wallet now enables Lightning Network payments while maintaining cold storage security through atomic swaps with the Liquid Network.
Cryptocurrency
fromLondon Business News | Londonlovesbusiness.com
3 weeks ago

NFTs with purpose: How NFTs will rule the real world from 2026 to 2030 - London Business News | Londonlovesbusiness.com

NFTs are evolving from digital art into infrastructure for fractional ownership of real-world assets, with the market projected to reach $211 billion by 2030 through tokenization of physical property and investments.
fromCointelegraph
5 months ago

How Batched Threshold Encryption could end extractive MEV and make DeFi fair again

On most modern blockchains, transaction data is publicly viewable in the mempool before it is sequenced, executed and confirmed in a block. This transparency creates avenues for sophisticated parties to engage in extractive practices known as Maximal Extractable Value (MEV). MEV exploits the block proposer's ability to reorder, include or omit transactions for financial gain.
Cryptocurrency
Marketing tech
fromThe Drum
2 months ago

Web3 isn't dead! Here are 3 brands building on the blockchain in 2023

Brand enthusiasm for NFTs and web3 surged in 2021–2022 but collapsed after crypto scandals and the rise of AI shifted marketing attention.
fromCointelegraph
6 months ago

Applied MEV protection via Shutter's threshold encryption

MEV is especially notorious on Ethereum, where it continues to be extracted at a rate equivalent to 11% of block rewards. Data shows that nearly $300,000 was lost in sandwich attacks in September. This reveals that MEV is a recurring hidden fee, not a minor inefficiency, hitting large trades hardest in volatile markets.
Cryptocurrency
Privacy technologies
fromPCMAG
7 years ago

Why Google Is Embracing Blockchain

Google's exploration of blockchain could enable greater user control of data and help address privacy scandals while evolving its cloud-dominated business model.
Cryptocurrency
fromFortune
3 weeks ago

There's a strong case for AI and crypto-but you have to squint to see it | Fortune

Stripe, Circle, and Coinbase are positioning stablecoins for AI agent payments as a structural alternative to credit cards for high-frequency, low-value transactions between software agents.
#bitcoin-lightning-network
Cryptocurrency
fromBitcoin Magazine
1 month ago

Tired Of Choosing Between Bitcoin Speed And Privacy? Cake Wallet's New Lightning Update Fixes That For Good

Cake Wallet integrates Bitcoin's Lightning Network with advanced privacy features, enabling fast payments while maintaining self-custody and user anonymity through custom Spark implementation.
Cryptocurrency
fromBitcoin Magazine
1 month ago

Tired Of Choosing Between Bitcoin Speed And Privacy? Cake Wallet's New Lightning Update Fixes That For Good

Cake Wallet integrates Bitcoin's Lightning Network with advanced privacy features, enabling fast payments while maintaining self-custody and user anonymity through custom Spark implementation.
Information security
fromCointelegraph
1 month ago

Why Address Poisoning Works Without Stealing Private Keys

Address poisoning steals funds by manipulating transaction history and exploiting users copying lookalike addresses, not by stealing private keys.
Cryptocurrency
fromBitcoin Magazine
1 month ago

The Core Issue: Consensus Cleanup

The Consensus Cleanup soft fork proposal addresses four long-standing Bitcoin protocol vulnerabilities, including the Timewarp attack, to strengthen Bitcoin's security and long-term viability.
#fourth-amendment
Information security
fromTheregister
2 months ago

DeadLock ransomware uses smart contracts to evade defenders

DeadLock ransomware uses Polygon smart contracts and decentralized messaging wrappers to rotate proxy URLs and evade detection while relying on encryption-only extortion.
Information security
fromEntrepreneur
2 months ago

Crypto Builders Can't Ignore This Crucial Component Anymore

Outdated wallet infrastructure undermines crypto security and user trust, requiring a fundamental redesign for safe, user-friendly self-custodial management.
Information security
fromCointelegraph
2 months ago

BTQ's Bitcoin Quantum Testnet and "Old BTC" Risk, Explained

Quantum risk to Bitcoin arises primarily from exposed on-chain public keys enabling future quantum computers to derive private keys and authorize unauthorized spending.
[ Load more ]