Hacked cross-chain protocol Multichain has confirmed some transactions, and its backlog of queued transactions has declined to only a single transaction, according to data from Multichain’s explorer tool. Blockchain data confirms that some of the transactions have been confirmed on the destination chain, while others show as confirmed in the Multichain explorer but not on the destination chain. Browsers…
While publicly mocking non-fungible token (NFTs) during a podcast, Tesla CEO and billionaire Elon Musk appears to have inadvertently highlighted the case for Bitcoin Ordinals, also known as Bitcoin NFTs. “The funny thing is the NFT is not even on the blockchain — it’s just a URL to the JPEG,” said Musk in an Oct….
Solana has posted 30-day gains of nearly 81%, and has rallied over 30% in the past week amid the testnet launch of the blockchain’s loawaited scaling solution Firedancer. SOL reached over $41 on Nov. 2 touching highs it hasn’t seen since August last year, Cointelegraph Markets Pro data shows. Long touted as an “Ethereum killer” — SOL has…
The Ethereum layer-2 ecosystem is likely to continue evolving with diverse technological approaches, according to co-founder Vitalik Buterin. The co-founder of the smart contract blockchain unpacked the current landscape of Ethereum’s scaling ecosystem on his personal blog, with several layer-2 protocols differing in their approaches to bring greater scaling capacity, lower costs and increased security. As…
The reserves for stablecoin issuer Tether contained approximately 86% cash and cash equivalents as of September 30, according to a new attestation report from accounting firm BDO. This is the highest percentage of cash and cash equivalents that have ever made up Tether’s reserves. Tether today releases its attestation for Q3 /2023.- cash & cash equivalent portion…
To track down and counter the sudden disappearance of tokens from crypto wallets requires investors to know the various ways bad actors use to steal cryptocurrencies successfully. Blockchain investigator Bitrace has identified three effective ways hackers gain access to crypto investors’ wallets: through search engines, such as Google and Bing, pasteboard hijacking and liquidity mining and coin…