Site language
Ru En
Социальные сети

blockmanity.com Best 10 dApp Tokens Dominating April 2026: Must-Know Picks

Best 10 dApp Tokens Dominating April 2026: Must-Know Picks Blockchain goes way beyond Bitcoin. It is a secure system that lets people interact without trusting middlemen. This power drives new apps in finance, games, and more. One big hit is […] The post Best 10 dApp Tokens Dominating April 2026: Must-Know Picks appeared first on Blockmanity.

blockonomi.com From DeFi to Funded Trading: How Capital Access Models Are Evolving in Digital Finance

Access to capital in trading and investing has never been evenly distributed. Traditional systems tend to favor people with strong credit or large deposits, which leaves many capable traders stuck on the sidelines. That gap is exactly what digital finance has started to close. DeFi lets you borrow or earn with crypto without dealing with [...] The post From DeFi to Funded Trading: How Capital Access Models Are Evolving in Digital Finance appeared first on Blockonomi.

news.bitcoin.com Uzbekistan President Signs Decree Establishing Specialized Crypto-Mining Hub

Uzbekistan has established a specialized district designed to regulate and expand the nation’s cryptocurrency mining industry. Key Takeaways: On April 17, 2026, the Uzbekistan President signed decree PQ-143 to launch the Besqala Mining Valley in Karakalpakstan. NAPP will streamline licensing as companies pay a 1% revenue fee to support the 2035 regional budget goals. Mining […]

bitcoinist.com Russia Advances Bill To Regulate Crypto Market, Eyes July 1st Implementation

Russia has advanced a key crypto bill on its first reading, as part of its efforts to establish a framework and fully bring the digital assets market out of the shadows in the next few months. Related Reading: No Stablecoin Mention: Bank Of Korea’s New Governor Signals CBDC Push Russia Moves To Regulate Crypto Market […]

forklog.media Aave Experiences Over $16 Billion in Deposit Outflows in Days

Following the Kelp hack, deposits in the leading lending protocol Aave dropped by 35% — from $45.8 billion to $29.6 billion. This was noted by on-chain analyst EmberCN. Aave 上的总存款量已经跌破 $300 亿。从 rsETH 事件前的 $458 亿到现在的 $296 亿,流出 $162 亿。 https://t.co/kxalj1cZ4y pic.twitter.com/8QoI2tl8S8— 余烬 (@EmberCN) April 23, 2026 The platform's TVL continues to decline. At the time of writing, it stands at $15.1 billion, although it exceeded $26 billion on April 18. Source: DefiLlama. The native token Aave remains in a downward trend. Over the past week, AAVE quotes have fallen by 13.8%. At the time of writing, the asset is trading around $91.4. Hourly chart of AAVE/USDT on Binance. Source: TradingView. The Kelp hacker continues to launder funds. According to EmberCN, in a day and a half, the hacker almost completely converted the stolen 75,700 ETH ($175 million) into Bitcoin via THORChain. 用时一天半,KelpDAO 黑客的 75,700 枚 ETH ($1.75 亿) 现在已经基本上都换成 BTC 了。黑客把 ETH 跨链兑换成 BTC 主要走的协议是 THORChain,黑客的使用也为 THORChain 带去了 $8 亿的交易量以及 $91 万的平台手续费收入。—————————————————-#Bitget VIP… https://t.co/YHNjV4jTGy pic.twitter.com/QMsFhsjWFx— 余烬 (@EmberCN) April 23, 2026 Thanks to this activity, the platform's trading volume exceeded $800 million, and commission income reached $910,000, the expert noted. Addressing the Issue To stabilize liquidity and halt the outflow of funds from Aave, the Fluid project launched an aWETH redemption mechanism. The aWETH Redemption Protocol is now live on @Arbitrum and @Base.After processing $400M+ in redemptions on Aave Ethereum, we're expanding to L2s.This time, we’ll be opening up for all loopers to unwind while ETH lenders exit to LSTs.How it works 🧵 https://t.co/lMhmsl8vAL pic.twitter.com/JmxdxUZnHP— Fluid 🌊 (@0xfluid) April 22, 2026 In 48 hours, 166,772 aETH (about $400 million) passed through it: users converted frozen assets into wstETH or weETH. The tool is based on the Lite Vault Fluid repository, which holds wstETH and weETH as collateral for ETH debt on Aave. This allows for direct closure of counter positions. Redemption occurred at a discount of about 2.2%. For comparison, aWETH traded at a discount of up to 23% on the secondary market, according to Castle Labs. Meanwhile, Circle's Chief Economist Gordon Liao proposed raising the rate on USDC on Aave v3. A proposal on AAVE USDC market and liquidity parameters from Circle's Chief Economist @gordonliao https://t.co/7wX3TWIHop— Jeremy Allaire — jerallaire.arc (@jerallaire) April 22, 2026 The stablecoin pool on the platform has been fully loaded for four consecutive days: available liquidity fell below $3 million, decreasing by $60 million in a day. The variable loan rate is fixed at a "ceiling" of about 14% and does not "clear" the market. Following the Kelp hack, about $300 million in new borrowings appeared in Aave. Some borrowers barely react to the rate: 14% per annum is a small price to exit a position. But liquidity providers, seeing the pool empty, demand a higher premium. Liao proposed making the rate progressive: the more funds are borrowed, the higher it is. At 95% load — 37%, at 100% — 53%. This would force borrowers to repay debts and attract new liquidity. Community members criticized the idea. Avant protocol founder Rhett Shipp stated that raising rates will not stop the outflow of funds from Aave. You need to fire your chief economist. This will accelerate capital flight from both aave and usdc.If you want Morpho and usdt to win, this is a great idea.— Rhett Shipp (@RhettShipp) April 22, 2026 On April 21, the Arbitrum security council took "emergency measures" and blocked 30,766 ETH (~$71.2 million) stolen from Kelp.

forklog.media Google Enhances AI Chips and Launches Agent Platform

Google has unveiled a suite of tools designed to aid companies in automating tasks through AI agents. Concurrently, a $750 million fund was launched alongside the announcement of new AI processors. Have a great #GoogleCloudNext!Watch select sessions and your favorite moments from the opening keynote on demand → https://t.co/Ss9VorZkOvhttps://t.co/VnbGXrIjvi— Google Cloud (@googlecloud) April 22, 2026 AI Agent Software At its annual conference in Las Vegas, the company's cloud division showcased a toolkit for creating AI agents and managing their operations within companies. Among the innovations is a dedicated mailbox where virtual assistants send reports on completed tasks. The Gemini Enterprise Agent Platform will feature two new modules: Memory Bank and Memory Profile, enabling agents to retain interaction histories with users. Agent Simulation will allow developers to thoroughly test tools before deployment. Google introduced updates for the Workspace application suite and described a scenario where AI agents radically transform the daily life of an ordinary worker. The corporation stated that employees could use Gemini Enterprise to create virtual assistants without coding. The company also announced Projects—a collaborative platform designed for interaction among workers or with support operators. The tool integrates information from various sources such as Workspace, Microsoft's OneDrive, and corporate chats, allowing work to be conducted with the necessary context. New Fund Google Cloud announced a $750 million fund aimed at assisting consulting firms like McKinsey, Accenture, and Deloitte in implementing agent AI for clients. DeepMind will provide select firms with early access to Gemini AI models before their official release. The capital will be directed towards training engineers, developing AI agents through the corporate platform, and co-funding projects and pre-sales activities. “Consulting firms are at the heart of some of the largest transformations occurring with clients. They understand the situation and bring unique expertise in specific industries and knowledge of business processes,” said Kevin Ichhpurani, head of Google Cloud's global partner ecosystem. New Chips Google Cloud has introduced a new generation of its proprietary tensor processing units (TPUs), designed to accelerate and reduce the cost of AI computations. The lineup includes two versions: TPU 8t — designed for AI development; TPU 8i — better suited for inference. Google holds a strong position among AI chip manufacturers, competing with Nvidia. In recent months, TPUs have seen increased demand in Silicon Valley. The new processors store more information, reducing response latency. “It's about ensuring the lowest possible response latency at the lowest possible cost per operation,” noted Mark Lohmeyer, Google's vice president of compute infrastructure. AI services are created and launched using systems capable of rapidly processing large data sets—identifying connections and patterns that are then expressed mathematically. Calculations, program launches, and services are executed on processors with large amounts of built-in memory. This approach allows AI responses to be almost instantaneous, as the component does not need to retrieve data from external sources. TPU 8t units can be clustered in groups of 9600. At such scales, energy consumption becomes a key factor. The new chips offer 124% greater performance per watt compared to the previous generation. TPU 8i offers 117%. Back in April, Google discussed with the U.S. Department of Defense the possibility of integrating Gemini into Pentagon systems across all information access categories—from open to top-secret.

news.bitcoin.com ETH Whale That Sold $24.9M Three Days Ago Buys Back $17.5M as Ether Stabilizes Above $2,350

A large ethereum whale sold 10,829 ether worth $24.91 million three days ago and has now re-entered the market, purchasing 7,448 ether worth $17.5 million at $2,350, according to data shared by Lookonchain. Key Takeaways: Wallet 0x65B4 bought back 7,448 ETH worth $17.5M at $2,350, days after selling 10,829 ETH at $2,300. The reentry at […]

forklog.media The zero-day market: discover, sell and keep quiet

For years cyberweapons for espionage were thought to be the preserve of a narrow circle of intelligence services. But a US government investigation into Operation Zero has exposed the scale of the zero-day trade. Two markets now surround exploits: one with brokers, price lists and suppliers; and a second where hackerware ends up after leaks or deliberate dumps. What skimping on intelligence can cost, how much states will pay to crack a smartphone, and how to trust researchers who surface bugs decades on—the answers are in ForkLog’s new report. The players  A zero-day vulnerability is a critical flaw in software or hardware used by hackers before the developer learns of it and ships a fix (a patch). The name hints that creators have zero days to eliminate the threat. Demand centres not on the bug itself but on the “window of opportunity”—the guaranteed period of covert access before detection. The 0-day market features three sets of participants: The cybersecurity researcher. An individual or team that finds a vulnerability. The broker. Intermediary firms that buy exploits and refine them into ready-to-use commercial products (infection chains) for resale. The customer. Intelligence and military agencies that want turnkey spying tools—cheaper and safer than recruiting human agents on the ground. On the edge of legality This market long sat in a grey zone, but recent events have shed light on its true scale. In February 2026 the US Treasury and State Department imposed sanctions on the Russian firm “Matrica” (the Operation Zero brand) and its founder, Sergey Zelenyuk.  The organisation openly styled itself as a cyberweapons broker. According to materials from the Treasury’s Office of Foreign Assets Control (OFAC), Operation Zero’s cardinal rule was to sell tools to clients outside NATO, in particular to state intelligence bodies.  The case hinged on an Operation Zero supplier who stole accesses from a US defence contractor (reportedly L3Harris). From 2022 to 2025 the Australian freelancer Peter Williams pilfered eight 0-day exploits built for intelligence use. He sold them for $1.3m in cryptocurrency. This was not the first deployment of cyberweapons against US citizens, but it broke the market’s unwritten rules. While others tried to balance in the grey zone of “national security”, Operation Zero chose open confrontation with NATO. Previously, OFAC’s sanctions list tended to catch malware developers only after high-profile scandals: 2021 — restrictions hit Israel’s NSO Group, creator of Pegasus, which was used to spy on diplomats, journalists and dissidents; 2024 — for aiding repression and surveillance, sanctions were imposed on the makers of the Predator spyware, Intellexa and Cytrox (Europe, Middle East). Defining a cyberweapons seller’s legality is slippery. The market of official or semi-official (grey) outfits is fiercely competitive, with clear leaders such as the UAE’s Crowdfense. That firm has managed to avoid OFAC lists for several reasons: jurisdiction and export control. Crowdfense is registered in a country with partner ties to the US and its allies. Its leadership says it adheres to strict export-control and compliance rules. The transfer of cyberweapons is regulated much like the trade in conventional arms; choice of customers. Clients include the Five Eyes, as well as allied governments and law-enforcement bodies. For the US, Crowdfense is a lawful contractor supplying weaponry; legalisation. Crowdfense presents itself as a national-security instrument. When buying a vulnerability, it signs an NDA with the hacker and passes the exploit, say, to security services for tracking terrorists. Legally, that is procurement of special equipment. Yet this “white zone” is conditional. In practice, a legal player’s status lasts only until its tools are swept up in a public scandal—especially if they enable surveillance of journalists or politicians in Western countries. The price list Disclaimer This section is for information of public interest only. The ForkLog editorial team condemns cybercrime and all forms of violence. Zerodium was the first to haul zero-day trading out of the dark web into the open—formally lawful—arena. Founded in 2015 by cybersecurity researcher Chaouki Bekrar, the firm began publishing public price lists for buying exploits. The company then refined the purchased accesses and resold them to a small circle of vetted clients—chiefly state intelligence services and law-enforcement agencies in NATO countries. By the mid-2020s, however, that model had lost its edge. Pressure rose from two directions. On one side came new entrants with substantially deeper pockets, notably Dubai-based Crowdfense. On the other came faster update cycles at Apple and Google: exploit shelf lives shrank and broker risks grew. Against this backdrop Zerodium’s top payout—about $2.5m—ceased to look attractive. The market quickly shifted to more aggressive pricing. Crowdfense effectively set a new marker: complex exploitation chains neared $10m, and in 2024 the company allocated $30m to an exploit-acquisition programme. Today the hottest commodity remains a trace-free, zero-click smartphone compromise. At the time of writing the broker offers up to $7m for iOS and up to $5m for Android. Price list. Source: Crowdfense. Intermediaries do not notify the vendor, preserving usability for the buyer. That exclusivity lets them write cheques far beyond classic bug bounties from leading software and gadget makers. In all of 2025 Google’s total bug-bounty payouts reached about $17m. In 2022 the tech giant set a record: $605,000 went to a five-bug Android exploit chain.  Google’s Android-focused bug-bounty rates. Source: Google. In such conditions, security researchers must choose: accept a princely sum knowing an exploit may become a cyberweapon, or work within responsible disclosure. The biggest name among the “white hats” in this niche is Zero Day Initiative (ZDI). It buys details of vulnerabilities and passes them to Microsoft, Apple or Google, demanding a fix within a set deadline. ZDI offers up to $1m only for exceptional, highly complex attack vectors during the public Pwn2Own competitions. Day to day, the white broker’s catalogue pays from $500 to $150,000.  Beyond direct payouts, ZDI runs an incentives system ($1 = 1 point). As points accrue over a calendar year, a researcher gains status and a matching bonus. Cumulative rewards. Source: ZDI. Thus the 0-day market is bifurcating: high-margin but opaque versus legal yet far less lucrative. The gap is widening. When weapons migrate to hackers The market’s central problem is the impossibility of keeping exploits contained. When intelligence officers deploy 0-days, their code can be intercepted, analysed and copied. The tool loses exclusivity and becomes available to groups pursuing simpler, mass attacks. In spring 2026 two headline cases showed this migration: Coruna and DarkSword. In March Google Threat Intelligence Group (GTIG) observed use of the Coruna framework, which packed 23 exploits and five full zero-day chains for iOS from versions 13.0 to 17.2.1.  Researchers found that Coruna has direct links to Operation Triangulation, a spying campaign in 2023. The source code was most likely written by a US Department of Defense contractor and later resold via brokers on the secondary market. Coruna’s subsequent path: The framework was used by the hacktivist group UNC6353 (Star Blizzard) for targeted espionage and attacks on Ukrainian users. The tool fell into the hands of China-based hackers UNC6691. They planted government-grade cyberweapons on fake cryptocurrency and financial sites. Visiting via Safari silently loaded the PLASMAGRID stealer, opening access to device data, including crypto wallets. The other case was DarkSword. Attacks ran via malicious websites: visiting them triggered an infection chain on iPhones, granting full device access without the user’s knowledge.  DarkSword’s distribution proved similar: initially it was used by the same UNC6353 group to implant spyware. The framework was later modified with the GHOSTBLADE, GHOSTKNIFE and GHOSTSABER infostealers, geared to pilfer financial data, including crypto wallets. DarkSword’s lifecycle ended with its leak to GitHub in March 2026. Experts believe the developer firm may have gone bankrupt and tried to monetise leftover code on the grey market, leaving a tool at the level of the NSA in the open for common cybercriminals. A Bitcoin bug: flaw or feature? Amid the exploit trade, a natural question arises: is a discovered breach a programmer’s mistake or a deliberately planted backdoor? Cybersecurity has a concept of “plausible deniability”. It is the guiding principle for professional backdoors. The ideal planted entry point should look like a trivial flaw— a typo, faulty memory handling or a classic buffer overflow. If a researcher finds such a “hole”, the vendor can call it an accident, ship a patch and preserve its reputation. Proving malicious intent in millions of lines of code is nearly impossible. There are, however, markers that can raise suspicions of a backdoor: non-standard cryptography. The use of little-known or weakened cryptographic constants vulnerable to mathematical attacks; anomalous logic. Needlessly complex data paths where architecture does not require them; obfuscation. Deliberate tangling of code in open-source projects, or supply-chain compromise, when malicious code is injected via third-party libraries. Closed or partly closed systems such as iOS or Android are often thought to be more vulnerable because of limited transparency. Open-source blockchain projects are sometimes held up as a counterexample. In practice, they offer no guarantees either. In April 2026 researcher Loïc Morel discovered a computational flaw in Bitcoin’s mechanism. Under the protocol, the mining difficulty of digital gold is adjusted every 2016 blocks to keep block time near ten minutes. But because of a bug, the timestamp of the last block in the previous period is omitted from the next calculation (it compares 2015 blocks, not 2016). This gap made a “time-warp” attack possible. If a miner or pool with overwhelming hashrate exploited the flaw, it could trick the algorithm. The system would conclude that mining took longer than it did and dramatically cut difficulty, enabling bitcoin to be mined at an anomalously high pace—up to six blocks per second. Recent incidents have prompted a rethink of the role of independent security researchers, for whom financial temptation has become a severe test of professionalism and ethics. Systems are made by humans, so errors are inevitable. While they persist, there will be a market for those who monetise, conceal or even create them.

blockonomi.com Best Crypto to Invest In for 2026 After Coinbase’s Quantum Warning and Pepeto’s Presale Crosses $9.29M With Binance Ahead

The best crypto to invest in for 2026 has to hold up against a new infrastructure question. Coinbase’s advisory board released a 50 page paper on April 21 concluding that blockchains remain safe today but a fault tolerant quantum computer capable of breaking current encryption is increasingly realistic, and preparation must begin now. Every serious [...] The post Best Crypto to Invest In for 2026 After Coinbase’s Quantum Warning and Pepeto’s Presale Crosses $9.29M With Binance Ahead appeared first on Blockonomi.

blockonomi.com Ethereum Rally Runs into Retail Selling on Binance as Whales Hold Ground

TLDR: Ethereum rose 1.93% to $2,368.14, with daily volume hitting 337K ETH above its 20-day average. Binance ETH inflows surged to 372,534, far exceeding the 7-day SMA of 277,709 ETH on-chain. The global SOPR of 1.0157 confirms retail investors are moving coins to Binance to take profits. Whale cohorts holding 10K–100K ETH show negative MVRV, [...] The post Ethereum Rally Runs into Retail Selling on Binance as Whales Hold Ground appeared first on Blockonomi.

cryptobriefing.com Elizabeth Reid: AI threatens Google’s search dominance, user engagement is shifting towards AI summaries, and understanding diverse user needs is crucial for adaptation | Odd Lots

AI-driven search innovations could challenge Google's dominance by altering user engagement with traditional results. The post Elizabeth Reid: AI threatens Google’s search dominance, user engagement is shifting towards AI summaries, and understanding diverse user needs is crucial for adaptation | Odd Lots appeared first on Crypto Briefing.

cryptobriefing.com Dylan Patel: Unbounded demand for AI tools is reshaping budgets, AI spending could exceed salary expenses, and workforce efficiency is drastically changing | Invest Like the Best

AI spending could soon outpace traditional salaries, reshaping workforce dynamics and business priorities. The post Dylan Patel: Unbounded demand for AI tools is reshaping budgets, AI spending could exceed salary expenses, and workforce efficiency is drastically changing | Invest Like the Best appeared first on Crypto Briefing.

blockmanity.com Best 10 dApp Tokens Dominating April 2026: Must-Know Picks

Best 10 dApp Tokens Dominating April 2026: Must-Know Picks Blockchain goes way beyond Bitcoin. It is a secure system that lets people interact without trusting middlemen. This power drives new apps in finance, games, and more. One big hit is […] The post Best 10 dApp Tokens Dominating April 2026: Must-Know Picks appeared first on Blockmanity.

news.bitcoin.com Tom Lee’s Bitmine Adds 101,627 ETH Worth $233 Million in Its Largest 2026 Accumulation

Bitmine, the ethereum treasury firm led by Fundstrat founder Tom Lee, has added 101,627 ether worth approximately $233 million to its holdings via Bitgo. Key Takeaways: Tom Lee’s Bitmine acquired 101,627 ETH worth $233 million from Bitgo, its largest weekly buy of 2026. The purchase brings Bitmine’s total ether holdings to approximately 4.97 million ETH […]

forklog.media Documentary names Hal Finney and Len Sassaman as Bitcoin’s creators

Satoshi Nakamoto is a pseudonym jointly used by cryptographers Hal Finney and Len Sassaman, according to the makers of a new documentary, Finding Satoshi, released on April 22. The answer to the greatest financial mystery of our time. Finding Satoshi, available now only at https://t.co/latbrWNjit pic.twitter.com/toxrj7fmXl— Finding Satoshi (@findingsatoshi_) April 22, 2026 Directors Tucker Tooley and Matthew Miele conducted a four-year investigation led by American business writer William D. Cohan and private investigator Tyler Maroney. One of the film’s key arguments is an analysis of candidates’ digital footprints. The authors matched Satoshi’s online behaviour with that of known early crypto figures and concluded that Finney and Sassaman fit the profile best. By their account, the former handled the code and technical implementation, while the latter wrote and shaped the project’s prose and academic framing, including the white paper. Dozens of interviews feature in the film. Among them: Bill Gates, Gary Gensler, Michael Saylor, Joseph Lubin and Fred Ehrsam. Finding Satoshi, April 22nd pic.twitter.com/VZDNiD3Mhs— Finding Satoshi (@findingsatoshi_) April 4, 2026 What pointed to Finney and Sassaman The filmmakers cited several circumstantial indicators for Finney, who received the first bitcoin transaction from Satoshi, and who also: helped create RPOW — a key precursor to the first cryptocurrency; was renowned for fluency across programming languages. They also noted a pause in his repository activity between the publication of the white paper in October 2008 and the launch of the main network in January 2009. In their view, Finney could have been working on Bitcoin during that window. As for Sassaman, the film highlights his academic writing style, ties to the cypherpunks and expertise in anonymity. The investigation also notes that, like Satoshi, the cryptographer used British spellings and intentionally depersonalised his texts stylistically. That could frustrate attempts to attribute the white paper by linguistic markers. A co-authorship theory A key plank of the co-authorship thesis is the confirmed link between the two figures. Finney and Sassaman knew each other, worked in the PGP community and stayed in contact in 2008 — the period when Bitcoin was being created, the filmmakers note. The film also addresses a principal counterargument to the Finney hypothesis. Earlier, researcher Jameson Lopp noted that at one point Satoshi was corresponding with a developer while the latter was running a race. Finding Satoshi treats this not as a refutation but as potential support for a two-author model: one may have focused on code, the other on public communications. The widows of both presumed co-authors also took part. Fran Finney allowed that her husband might have contributed to the cryptocurrency — chiefly to code and editing. Sassaman’s wife, Meredith Patterson, deemed the theory plausible and confirmed the cryptographers stayed in touch around the coin’s launch. Still a hypothesis Tooley and Miele stress that the film does not claim to have definitively unmasked Nakamoto. What Finding Satoshi presents is a version of events. The film offers one of the most detailed explanations for why the creator’s early coins (about 1.1m BTC) remain untouched: both presumed authors have died. The industry reaction has been cautious but at times warm. Coinbase chief executive Brian Armstrong called it “the most thoughtful” take on the subject he has seen and allowed the authors may have landed on the right answer. The Finding Satoshi documentary is the most thoughtful take on this subject I've seen out there.It's coming out tomorrow, but Coinbase users can get early access today. Open your Coinbase app to find out more! pic.twitter.com/dN15Y8VZBU— Brian Armstrong (@brian_armstrong) April 21, 2026 Not everyone supported the new version. A community member using the pseudonym Cam noted that Sassaman did not know the C++ programming language and never used a Windows computer. Len Sassaman didn't know C++ and never owned a windows machine. This according to his wife. He also was a vocal critic of Bitcoin.— Cam (@noremacback) April 22, 2026 “In addition, Sassaman was a prominent critic of Bitcoin,” he added. Adam Back, a noted cryptographer and cypherpunk whom journalist John Carreyrou of the NYT had also named as the creator of the first cryptocurrency, agreed. however Hal did help satoshi as he was an early user and submitted bug reports. not the same thing as co-author, and that Fran the way i heard it said it was not Hal. plus @nathanielpopper (also @nytimes) and author of "digital gold" book, got to meet with @halfin and was shown— Adam Back (@adam3us) April 22, 2026 “Hal did help Satoshi — as an early user, he filed bug reports. But that is not co-authorship. And Fran, as I heard it, said it was not Hal. […] It is not very convincing to propose that Len and/or Hal were Satoshi yet left their families without bitcoins (and Hal had huge medical bills) and/or exposed them to risk,” he noted. In April, Back questioned the size of Nakamoto’s fortune and suggested the Bitcoin creator might have lost the private keys.

bitcoinist.com Core Scientific Seeks $3.3B As It Shifts From Bitcoin Mining To AI Data Centers

Core Scientific has announced that it’s looking to raise $3.3 billion through senior secured notes as it shifts its business away from Bitcoin mining. Core Scientific Is Transitioning From Bitcoin To AI Data Centers According to a press release, Core Scientific’s finance subsidiary is planning to offer $3.3 billion in senior secured notes in a […]

blockonomi.com U.S. Military Confirms It Runs a Bitcoin Node for Cybersecurity Testing

TLDR: The U.S. government runs a Bitcoin node for cybersecurity testing, not for mining or investment. Admiral Paparo calls Bitcoin a computer science tool to secure and protect military networks. The military views Bitcoin’s blockchain and proof-of-work as assets for projecting defense power. Paparo backed the GENIUS Act, saying stablecoin laws help reinforce global U.S. [...] The post U.S. Military Confirms It Runs a Bitcoin Node for Cybersecurity Testing appeared first on Blockonomi.

news.bitcoin.com Brian Armstrong Says Base Is the Best Chain for Trading, Payments, and Agents

Coinbase CEO Brian Armstrong declared Base as the leading blockchain for trading, payments, and artificial intelligence (AI) agents, as the layer-2 ( L2) holds its position as the largest Ethereum rollup by total value locked (TVL). Key Takeaways: Coinbase CEO Brian Armstrong named Base the top chain for trading, payments, and AI agents on April […]

blockmanity.com How Blockchain Technology Powers the Future of Crypto AI Coins

Introduction to the Digital Revolution In today’s fast-paced digital world, blockchain technology stands out as a game-changer. It goes beyond just cryptocurrencies like Bitcoin. This tech is reshaping finance, data security, and even smart systems powered by artificial intelligence (AI). […] The post How Blockchain Technology Powers the Future of Crypto AI Coins appeared first on Blockmanity.