Menu

Blog

Archive for the ‘cryptocurrencies’ category

May 27, 2023

OpenAI’s Sam Altman raises $115 million for Worldcoin crypto project

Posted by in categories: blockchains, cryptocurrencies, robotics/AI

May 25 (Reuters) — OpenAI Chief Executive Sam Altman has raised $115 million in a Series C funding round led by Blockchain Capital for a cryptocurrency project he co-founded.

The project, Worldcoin, aims to distribute a crypto token to people “just for being a unique individual”. The project uses a device to scan irises to confirm their identity, after which they are given the tokens for free.

Worldcoin has faced criticism for perceived privacy risks. In response to Altman’s tweet introducing the project in 2021, former U.S. intelligence contractor Edward Snowden tweeted, “Don’t catalogue eyeballs”.

Apr 28, 2023

Stanford team shines light on cryptocurrency, designs photonic circuits to save energy

Posted by in categories: blockchains, computing, cryptocurrencies, space travel

Cryptocurrency mining is only accessible to those with access to highly discounted energy. The newly-developed low-energy chips will make it possible for everyone to participate in mining profitably.

If you were to ask anyone their feelings about cryptocurrency in 2020, chances are they would respond along the lines of “to the moon”(Crypto investors often use the phrase when they believe that certain cryptocurrencies will rise significantly in price). However, a year later, those sentiments seemed to have jaded. A sense of negativity — FUD (fear, uncertainty, and doubt), as crypto-sympathizers would call it — seemed rife.


Stanford University.

Continue reading “Stanford team shines light on cryptocurrency, designs photonic circuits to save energy” »

Apr 15, 2023

The Digital Currency Monetary Authority (DCMA) Launches an International Central Bank Digital Currency (CBDC)

Posted by in categories: cryptocurrencies, finance, governance

Banks can attach SWIFT Codes and bank accounts to a UMU digital currency wallet and transaction SWIFT-like cross-border payments over digital currency rails completely bypassing the correspondent banking system at best-priced wholesale FX rates and with instantaneous real-time settlement.

In an IMF interview with Tobias Adrian, Financial Counsellor at the International Monetary Fund, he states “Cross-border payments can be slow, expensive, and risky. In today’s world of payments, counterparties in different jurisdictions rely on costly trusted relationships to offset the lack of a common settlement asset together with common rules and governance. But imagine if a multilateral platform existed that could improve cross-border payments—at the same time transforming foreign exchange transactions, risk sharing, and more generally, financial contracting.”

According to Darrell Hubbard, the Executive Director of the DCMA, and the chief architect of UMU, “This vision expressed by the IMF is the exact solution the DCMA is delivering to central banks worldwide.”

Apr 13, 2023

Strange New Explanation for Why Quantum World Collapses Into Reality

Posted by in categories: bitcoin, cosmology, cryptocurrencies, quantum physics

Get a Wonderful Person Tee: https://teespring.com/stores/whatdamath.
More cool designs are on Amazon: https://amzn.to/3wDGy2i.
Alternatively, PayPal donations can be sent here: http://paypal.me/whatdamath.

Hello and welcome! My name is Anton and in this video, we will talk about the suggestion that horizons from black holes and the expansion of the universe cause the quantum collapse into reality.
Links:
https://arxiv.org/pdf/2301.00026.pdf.
#quantumphysics #blackhole #universe.

Continue reading “Strange New Explanation for Why Quantum World Collapses Into Reality” »

Apr 13, 2023

Cybercriminals Turn to Android Loaders on Dark Web to Evade Google Play Security

Posted by in categories: cryptocurrencies, cybercrime/malcode, finance, mobile phones

Malicious loader programs capable of trojanizing Android applications are being traded on the criminal underground for up to $20,000 as a way to evade Google Play Store defenses.

“The most popular application categories to hide malware and unwanted software include cryptocurrency trackers, financial apps, QR-code scanners, and even dating apps,” Kaspersky said in a new report based on messages posted on online forums between 2019 and 2023.

Dropper apps are the primary means for threat actors looking to sneak malware via the Google Play Store. Such apps often masquerade as seemingly innocuous apps, with malicious updates introduced upon clearing the review process and the applications have amassed a significant user base.

Apr 6, 2023

CryptoClippy: New Clipper Malware Targeting Portuguese Cryptocurrency Users

Posted by in categories: cryptocurrencies, cybercrime/malcode

New CryptoClippy malware steals cryptocurrency by replacing wallet addresses during transactions.

Apr 2, 2023

Trojanized Tor browsers target Russians with crypto-stealing malware

Posted by in categories: cryptocurrencies, cybercrime/malcode

A surge of trojanized Tor Browser installers targets Russians and Eastern Europeans with clipboard-hijacking malware that steals infected users’ cryptocurrency transactions.

Kaspersky analysts warn that while this attack is not new or particularly creative, it’s still effective and prevalent, infecting many users worldwide.

While these malicious Tor installers target countries worldwide, Kaspersky says that most are targeting Russia and Eastern Europe.

Mar 27, 2023

Do We Live In a Simulation? Experiment To Prove/Disprove It

Posted by in categories: bitcoin, cryptocurrencies, quantum physics

Get a Wonderful Person Tee: https://teespring.com/stores/whatdamath.
More cool designs are on Amazon: https://amzn.to/3wDGy2i.
Alternatively, PayPal donations can be sent here: http://paypal.me/whatdamath.

Hello and welcome! My name is Anton and in this video, we will talk about an experiment that may be able to show whether we live in a simulation.
Links:
https://cqi.inf.usi.ch/qic/wheeler.pdf.
https://en.wikipedia.org/wiki/Simulation_hypothesis.
https://en.wikipedia.org/wiki/Zhuangzi_(book)
https://theconversation.com/how-to-test-if-were-living-in-a-…ion-194929
https://aip.scitation.org/doi/10.1063/5.0087175
Great explanation of double slit experiment: https://www.youtube.com/watch?v=A9tKncAdlHQro.
#simulationhypothesis #quantumphysics #physics.

Continue reading “Do We Live In a Simulation? Experiment To Prove/Disprove It” »

Mar 24, 2023

Enzyme That Creates Energy From Air Is Sort of Groundbreaking

Posted by in categories: bitcoin, cryptocurrencies, energy

Get a Wonderful Person Tee: https://teespring.com/stores/whatdamath.
More cool designs are on Amazon: https://amzn.to/3wDGy2i.
Alternatively, PayPal donations can be sent here: http://paypal.me/whatdamath.

Hello and welcome! My name is Anton and in this video, we will talk about a potential discovery of a new way to generate energy using an unusual protein found in bacteria.
Links:
https://theconversation.com/electricity-from-thin-air-an-enz…ere-200432
https://www.nature.com/articles/s41586-023-05781-7
#bacteria #energy #enzymes.
0:00 Source of electricity we currently use.
3:15 New discovery: incredible enzyme from bacteria.
4:07 More about the Mycobacterium.
5:20 Enzyme that they use to generate energy.
6:50 More about the protein and what it could do for us.
8:45 Additional questions.

Continue reading “Enzyme That Creates Energy From Air Is Sort of Groundbreaking” »

Mar 16, 2023

Cryptojacking Group TeamTNT Suspected of Using Decoy Miner to Conceal Data Exfiltration

Posted by in categories: cryptocurrencies, cybercrime/malcode

The cryptojacking group known as TeamTNT is suspected to be behind a previously undiscovered strain of malware used to mine Monero cryptocurrency on compromised systems.

That’s according to Cado Security, which found the sample after Sysdig detailed a sophisticated attack known as SCARLETEEL aimed at containerized environments to ultimately steal proprietary data and software.

Specifically, the early phase of the attack chain involved the use of a cryptocurrency miner, which the cloud security firm suspected was deployed as a decoy to conceal the detection of data exfiltration.

Page 1 of 6012345678Last