Tornado Cash co-founder Roman Storm took to Twitter with an urgent plea for support, ahead of his high-profile trial date tomorrow. Storm, who has been battling legal charges for nearly two years, is calling on the crypto community to help raise $500,000 in the next few days and $1.5 million in the coming weeks to […]
The post Urgent appeal to help defend Tornado Cash’s Roman Storm and the right to financial privacy appeared first on CryptoSlate.
Much like Bitcoin eliminates reliance on centralized intermediaries in finance, Bitchat would removes central authorities from digital communication.
Twitter founder Jack Dorsey has published the white paper for Bitchat, a decentralized messaging platform operating entirely over Bluetooth. The app is designed to work without internet access, relying instead on Bluetooth Low Energy (BLE) mesh networks for peer-to-peer communication. What is Bitchat? Bitchat is a privacy-first chat platform built on a store-and-forward architecture using BLE. […]
The post Jack Dorsey launches Bitchat, a Bluetooth-based messaging platform appeared first on CryptoSlate.
The first half of 2025 exposed deep vulnerabilities in the crypto industry, with hackers stealing over $2.1 billion across 75 separate incidents. This marks a 10% increase from the previous H1 record of $2 billion in 2022 and nearly matches the full-year figure for 2024, which closed at $2.2 billion, according to a report from […]
The post Crypto heists reach $2.1B so far in 2025 as state-backed hackers ramp up attacks appeared first on CryptoSlate.
The distribution model, called 'Glacier Drop,' invites token holders from the eight launch ecosystems to claim 100% of the NIGHT tokens.
Railgun's RAIL token has spiked 15% higher after Ethereum co-founder Vitalik Buterin transferred over $2.6 million in crypto using the privacy protocol.
An Italian tourist’s barefoot dash onto a SoHo sidewalk has cracked open one of the most violent crypto-ransom plots ever seen in New York City. With the surrender of William Duplessie, 32, on Tuesday, police say they have now charged two business partners who allegedly imprisoned and tortured the 28-year-old for 17 days in a […]
The post Kidnappers arrested for 2 week torture of tourist in NY luxury mansion to get Bitcoin keys appeared first on CryptoSlate.
Succinct has demonstrated real-time zero-knowledge proving for Ethereum blocks, generating cryptographic proofs in under 12 seconds. Succinct’s SP1 “Hypercube” zkVM produced a proof for Ethereum block 22309250 (143 transactions, 32 million gas) in 10.8 seconds, and internal benchmarks showed it could prove 93 % of 10,000 recent main-net blocks in under 12 seconds, with an […]
The post Ethereum hitting real-time zk-proof milestone is ‘ZK man on the moon moment’ appeared first on CryptoSlate.
XMR has rallied over 100% since the early April panic selling.
Google has added Zero-Knowledge Proof (ZKP) technology to its Google Wallet platform to strengthen user privacy in digital identity systems. The company confirmed this feature is active and enables users to verify their age across apps, websites, and devices, without disclosing personal information. According to Google: “We will use ZKP where appropriate in other Google […]
The post Google embraces zero-knowledge proof tech for enhanced privacy in digital IDs appeared first on CryptoSlate.
The solution comes after 8 years of development and as institutions seek transaction confidentiality.
The U.S. crypto exchange filed a brief in a longstanding privacy battle over records the tax agency sought on customers' crypto transactions.
Telegram founder Pavel Durov has criticized the French government for attempting to ban encryption, calling it a serious threat to digital privacy. In an April 21 statement on X, Durov revealed that French lawmakers nearly passed a bill last month that would have forced messaging apps to include backdoors that would give law enforcement agencies […]
The post Telegram vows to exit markets over encryption backdoor demands appeared first on CryptoSlate.
The amount of stolen funds from the Bybit hack that have slipped out of reach continues to rise as the days go by. On April 21, Bybit CEO Ben Zhou revealed that around $400 million, around 27.6% of the $1.4 billion in stolen Ethereum, can no longer be traced. This represents a sharp increase from […]
The post Bybit seeks community help as $400 million in stolen Ethereum vanishes through Wasabi mixer appeared first on CryptoSlate.
Ethereum co-founder Vitalik Buterin has renewed calls for stronger privacy protections across emerging crypto and artificial intelligence (AI) technologies. In an April 14 blog post, Buterin argued that privacy is not just a personal right but a vital safeguard for decentralization, innovation, and freedom. He wrote: “Supporting privacy for everyone, and making the necessary tools […]
The post Ethereum co-founder Vitalik Buterin calls for stronger privacy protections amid AI centralization concerns appeared first on CryptoSlate.
Ethereum developers have begun kicking around a series of ideas that could make the Ethereum network private at its core.
Ethereum co-founder Vitalik Buterin has outlined a streamlined roadmap to enhance Layer-1 privacy on the blockchain network. In a blog post on April 11, Buterin introduced a framework focused on improving user confidentiality without requiring significant changes to the network’s core infrastructure. The proposal targets four distinct areas of privacy, including making on-chain payments private, […]
The post Ethereum’s Vitalik Buterin reveals roadmap to boost Layer-1 privacy appeared first on CryptoSlate.
Alongside new platform, the foundation also launching the Veridian Wallet, a tool designed to keep personal info secure and let users prove who they are online without the usual hassles.
The system uses zero-knowledge proofs to ensure privacy while maintaining compliance by screening for illicit funds.
Address poisoning attacks are malicious tactics used by attackers who can reroute traffic, interrupt services, or obtain unauthorized access to sensitive data by inserting bogus data or changing routing tables. The integrity of data and network security are seriously threatened by these assaults, which take advantage of flaws in network protocols.This article will explain what address poisoning attacks are, their types and consequences, and how to protect oneself against such attacks.Address poisoning attacks in crypto, explainedIn the world of cryptocurrencies, hostile actions where attackers influence or deceive consumers by tampering with cryptocurrency addresses are referred to as address poisoning attacks.On a blockchain network, these addresses, which are made up of distinct alphanumeric strings, serve as the source or destination of transactions. These attacks use a variety of methods to undermine the integrity and security of cryptographic wallets and transactions.Address poisoning attacks in the crypto space are mostly used to either illegally acquire digital assets or impair the smooth operation of blockchain networks. These attacks may encompass:TheftAttackers may trick users into transmitting their funds to malicious addresses using strategies such as phishing, transaction interception or address manipulation.DisruptionAddress poisoning can be used to disrupt the normal operations of blockchain networks by introducing congestion, delays or interruptions in transactions and smart contracts, reducing the effectiveness of the network.DeceptionAttackers frequently attempt to mislead cryptocurrency users by posing as well-known figures. This undermines community trust in the network and might result in erroneous transactions or confusion among users.To protect digital assets and the general integrity of blockchain technology, address poisoning attacks highlight the significance of strict security procedures and constant attention within the cryptocurrency ecosystem.Related: How to mitigate the security risks associated with crypto paymentsTypes of address poisoning attacksAddress poisoning attacks in crypto include phishing, transaction interception, address reuse exploitation, Sybil attacks, fake QR codes, address spoofing and smart contract vulnerabilities, each posing unique risks to users’ assets and network integrity.Phishing attacksIn the cryptocurrency realm, phishing attacks are a prevalent type of address poisoning, which involves criminal actors building phony websites, emails or communications that closely resemble reputable companies like cryptocurrency exchanges or wallet providers.These fraudulent platforms try to trick unsuspecting users into disclosing their login information, private keys or mnemonic phrases (recovery/seed phrases). Once gained, attackers can carry out unlawful transactions and get unauthorized access to victims’ Bitcoin (BTC) assets, for example.For instance, hackers might build a fake exchange website that looks exactly like the real thing and ask consumers to log in. Once they do so, the attackers can gain access to customer funds on the actual exchange, which would result in substantial financial losses.Transaction interceptionAnother method of address poisoning is transaction interception, in which attackers intercept valid cryptocurrency transactions and change the destination address. Funds destined for the genuine receiver are diverted by changing the recipient address to one under the attacker’s control. This kind of attack frequently involves malware compromising a user’s device or network or both.Address reuse exploitationAttackers monitor the blockchain for instances of address repetition before using such occurrences to their advantage. Reusing addresses can be risky for security because it might reveal the address’s transaction history and vulnerabilities. These weaknesses are used by malicious actors to access user wallets and steal funds.For instance, if a user consistently gets funds from the same Ethereum address, an attacker might notice this pattern and take advantage of a flaw in the user’s wallet software to access the user’s funds without authorization.Sybil attacksTo exert disproportionate control over a cryptocurrency network’s functioning, Sybil attacks entail the creation of several false identities or nodes. With this control, attackers are able to modify data, trick users, and maybe jeopardize the security of the network.Attackers may use a large number of fraudulent nodes in the context of proof-of-stake (PoS) blockchain networks to significantly affect the consensus mechanism, giving them the ability to modify transactions and potentially double-spend cryptocurrencies.Fake QR codes or payment addressesAddress poisoning can also happen when fake payment addresses or QR codes are distributed. Attackers often deliver these bogus codes in physical form to unwary users in an effort to trick them into sending cryptocurrency to a location they did not plan.For example, a hacker might disseminate QR codes for cryptocurrency wallets that look real but actually include minor changes to the encoded address. Users who scan these codes unintentionally send money to the attacker’s address rather than that of the intended receiver, which causes financial losses.Address spoofingAttackers who use address spoofing create cryptocurrency addresses that closely resemble real ones. The idea is to trick users into transferring money to the attacker’s address rather than the one belonging to the intended recipient. The visual resemblance between the fake address and the real one is used in this method of address poisoning.An attacker might, for instance, create a Bitcoin address that closely mimics the donation address of a reputable charity. Unaware donors may unintentionally transfer money to the attacker’s address while sending donations to the organization, diverting the funds from their intended use.Smart contract vulnerabilitiesAttackers take advantage of flaws or vulnerabilities in decentralized applications (DApps) or smart contracts on blockchain systems to carry out address poisoning. Attackers can reroute money or cause the contract to behave inadvertently by fiddling with how transactions are carried out. Users may suffer money losses as a result, and decentralized finance (DeFi) services may experience disruptions.Consequences of address poisoning attacksAddress poisoning attacks can have devastating effects on both individual users and the stability of blockchain networks. Because attackers may steal crypto holdings or alter transactions to reroute money to their own wallets, these assaults frequently cause large financial losses for their victims.Beyond monetary losses, these attacks may also result in a decline in confidence among cryptocurrency users. Users’ trust in the security and dependability of blockchain networks and related services may be damaged if they fall for fraudulent schemes or have their valuables stolen.Additionally, some address poisoning assaults, such as Sybil attacks or the abuse of smart contract flaws, can prevent blockchain networks from operating normally, leading to delays, congestion or unforeseen consequences that have an effect on the entire ecosystem. These effects highlight the need for strong security controls and user awareness in the crypto ecosystem to reduce the risks of address poisoning attacks.Related: How to put words into a Bitcoin address? Here’s how vanity addresses workHow to avoid address poisoning attacksTo protect users’ digital assets and keep blockchain networks secure, it is crucial to avoid address poisoning assaults in the cryptocurrency world. The following ways may help prevent being a target of such attacks:Use fresh addressesBy creating a fresh crypto wallet address for each transaction, the chance of attackers connecting an address to a person’s identity or past transactions can be decreased. For instance, address poisoning attacks can be reduced by using hierarchical deterministic (HD) wallets, which create new addresses for each transaction and lessen the predictability of addresses.Utilizing an HD wallet increases a user’s protection against address poisoning attacks because the wallet’s automatic address rotation makes it more difficult for hackers to redirect funds.Utilize hardware walletsWhen compared to software wallets, hardware wallets are a more secure alternative. They minimize exposure by keeping private keys offline.Exercise caution when disclosing public addressesPeople should exercise caution when disclosing their crypto addresses in the public sphere, especially on social media sites, and should opt for using pseudonyms.Choose reputable walletsIt is important to use well-known wallet providers that are known for their security features and regular software updates to protect oneself from address poisoning and other attacks.Regular updatesTo stay protected against address poisoning attacks, it is essential to update the wallet software consistently with the newest security fixes.Implement whitelistingUse whitelisting to limit transactions to reputable sources. Some wallets or services allow users to whitelist particular addresses that can send funds to their wallets.Consider multisig walletsWallets that require multiple private keys to approve a transaction are known as multisignature (multisig) wallets. These wallets can provide an additional degree of protection by requiring multiple signatures to approve a transaction.Utilize blockchain analysis toolsTo spot potentially harmful conduct, people can track and examine incoming transactions using blockchain analysis tools. Sending seemingly trivial, small quantities of crypto (dust) to numerous addresses is a common practice known as dusting. Analysts can spot potential poisoning efforts by examining these dust trade patterns.Unspent transaction outputs (UTXOs) with tiny amounts of cryptocurrency are frequently the consequence of dust transactions. Analysts can locate possibly poisoned addresses by locating UTXOs connected to dust transactions.Report suspected attacksIndividuals should respond right away in the event of a suspected address poisoning attack by getting in touch with the company that provides their crypto wallet through the official support channels and detailing the occurrence.Additionally, they can report the occurrence to the relevant law enforcement or regulatory authorities for further investigation and potential legal action if the attack involved considerable financial harm or malevolent intent. To reduce possible risks and safeguard both individual and group interests in the cryptocurrency ecosystem, timely reporting is essential.
Last May, Pertsev was sentenced to 64 months in prison for money laundering.
The US District Court for the Western District of Texas has overturned the sanctions imposed by the US Treasury’s Office of Foreign Assets Control (OFAC) on crypto-mixing protocol Tornado Cash. A Jan. 21 filing from the Fifth Circuit Court of Appeals ordered OFAC to remove Tornado Cash-linked addresses from its Specially Designated Nationals and Blocked […]
The post US court overturns Treasury sanctions on Tornado Cash appeared first on CryptoSlate.
In contrast to World’s iris scanning, Humanity’s palm scans are more user-friendly and maintain a high level of security, according to Humanity’s founder.
Telegram reportedly fulfilled 900 total requests from the US for IP addresses and phone numbers affecting 2,253 users.
“The whole problem with centralized systems is that there’s a center,” Naoris chief strategy officer David Holtzman told Cointelegraph.
“Cryptocurrency transactions are not anonymous; they are the most traceable and trackable assets,” Tether CEO Paolo Ardoino said in April.
Decentralization must be codified into AI now to ensure a healthy trajectory for the technology.
Vitalik Buterin, Ethereum’s co-founder, has donated 50 ETH (approximately $170,000) to support the legal defense of Roman Storm, a Tornado Cash developer. The donation, confirmed by Storm on Dec. 31, marks another significant gesture by Buterin in defense of privacy and open-source development within the crypto space. Storm expressed heartfelt appreciation for Buterin’s contribution while […]
The post Vitalik Buterin helps Tornado Cash developer Roman Storm with $170k New Year donation appeared first on CryptoSlate.
Threat actors using artificial intelligence and scalable quantum computers will see centralized information systems as a honeypot.
Bitcoin (BTC) whales have been accumulating BTC through privacy transactions for more than two years, according to CryptoQuant CEO and co-founder Ki Young Ju. Ki assessed the average number of transactions passing through CoinJoin, an anonymization service, and discovered that the number had tripled this cycle. Although some may tie this to hackers laundering stolen […]
The post Bitcoin whales quietly amass BTC using privacy transactions, fueling speculation appeared first on CryptoSlate.