Daily Archives: October 20, 2023

Bitcoin: All Eyes On The SEC (Cryptocurrency:BTC-USD) – Seeking Alpha

Posted: October 20, 2023 at 6:17 am

designer491

It is now clear that one of the much-anticipated catalysts for Bitcoin (BTC-USD) in the run-up to the upcoming Bitcoin halving is the approval of a spot Bitcoin ETF. For about a year, asset managers like Fidelity have been awaiting the SEC's approval for their spot in Bitcoin ETF. The world's biggest asset manager, BlackRock's (BLK), application in June to get its spot Bitcoin ETF approved increased the hopes of such approval becoming fruitful and brought the spot Bitcoin ETF topic to the front pages.

Crypto asset manager Grayscale (OTC:GBTC) scored a popular victory against the SEC in August, when the court ruled against the SEC's decision to outrightly reject Grayscale's application to convert the largest Bitcoin trust fund, GBTC, into a spot Bitcoin ETF. The SEC was given till midnight on October 13 to appeal the court order or review Grayscale's application.

By midnight on October 13, the SEC hadn't budged. The SEC refused to appeal the August court order ruled in favor of Grayscale. The SEC's silence has left analysts wondering whether the refusal to appeal the ruling signals that an ETF approval is on the horizon or if it suggests a lack of interest and a preconceived inclination to reject Grayscale's application with minimal scrutiny.

The SEC's stance on its spot BTC ETF approval has been based on the argument that spot crypto ETFs present risks; while the SEC has approved futures ETFs whose values are based on the underlying spot prices, leaving analysts confused. This stance does not appear valid because approving futures ETFs with spot price dependencies, while rejecting spot ETFs, appears inconsistent and raises questions about the rationale behind these decisions.

It is difficult to pinpoint the SEC's main rationale for delaying a spot Bitcoin ETF approval; however, in my view, some reasons why the SEC might have been dragging its feet could be because the regulator is waiting for more comprehensive Bitcoin custody solutions and market surveillance mechanisms before deciding to approve a spot Bitcoin ETF. The SEC's concern about custody solutions for spot ETFs could be a key factor. Futures contracts are typically traded on regulated exchanges, like CBOE and CME, with established custody solutions. Spot assets involve holding actual cryptocurrencies, which may pose greater custody and security challenges.

Also, the decentralized nature of the cryptocurrency market presents some challenges in ensuring market integrity. Unlike traditional financial markets, where surveillance is more straightforward due to centralized exchanges, the opposite is the case with crypto. This absence of centralization can make it difficult to monitor and prevent the risk of market manipulation, and other risks effectively. The SEC's hesitance in approving spot Bitcoin ETFs could stem from concerns about the potential impact of these risks on retail and institutional investors. The regulator might be waiting for more robust and comprehensive market surveillance solutions and regulatory frameworks to be in place before approving a spot Bitcoin ETF, to ensure that investors can confidently participate in this emerging asset class without undue risk.

Spot ETF applicants are making notable strides in addressing the SEC's concerns regarding Bitcoin spot ETFs. Some applicants, including BlackRock, Fidelity, and Invesco (IVZ), have recently submitted an updated prospectus that provides detailed insights into key aspects of their spot ETF product, including the implementation of robust market surveillance mechanisms, enhancing the safety of assets under management, and utilizing GAAP-compliant reporting mechanisms.

BlackRock updated its spot Bitcoin ETF application one day ago. In this updated application, BlackRock addresses some of the SEC's concerns by highlighting its custody arrangements with Coinbase (COIN), Bitcoin's volatility risks, and the complexities surrounding Bitcoin's valuation. BlackRock indicated its commitment to gauge fair value and prepare the trust's periodic financial statements per the Financial Accounting Standards Board (FASB) ASC 820.

Fidelity also filed an updated ETF application one day ago. Like BlackRock's updated prospectus, Fidelity's updated ETF application mentioned using a pricing source consistent with GAAP for its financial statements, and also contained risk disclosures.

Last Monday's erroneous (now-deleted) tweet, published by Cointelegraph, stated the approval of BlackRock's spot Bitcoin ETF quickly spread throughout the crypto community and led to a significant surge in Bitcoin's price, peaking at $30,000. The market's reaction to this false news is an indication of the heightened anticipation and excitement surrounding the eventual approval of a spot Bitcoin ETF. Cointelegraph has since issued an apology for the misinformation. While this incident was an isolated case of misinformation, it highlights the potential impact that a genuine ETF approval could have. The Cointelegraph incident may well be considered the tip of the iceberg, offering a tantalizing preview of what lies beneath the surface, ready to be unlocked by the arrival of a legitimate Bitcoin ETF. This is one reason I recommend holding Bitcoin at this point, especially as the halving is approaching - another likely Bitcoin price catalyst.

The coordinated update of ETF applications by asset managers shows that talks could be going on behind the scenes between the ETF applicants and the SEC. I like the fact that these asset managers are updating their ETF applications, highlighting more of the SEC's concerns and showing their readiness to make the ETFs regulatory compliant. I believe this is the quickest route to getting a spot BTC ETF approved.

Some Bitcoin maximalists who are self-custody "advocates" believe that the introduction of investment vehicles like a spot ETF will affect Bitcoin's inherent characteristic of decentralization. I believe that for Bitcoin to become a mainstream asset with worldwide mass adoption, regulation is inevitable.

Editor's Note: This article discusses one or more securities that do not trade on a major U.S. exchange. Please be aware of the risks associated with these stocks.

The rest is here:
Bitcoin: All Eyes On The SEC (Cryptocurrency:BTC-USD) - Seeking Alpha

Posted in Cryptocurrency | Comments Off on Bitcoin: All Eyes On The SEC (Cryptocurrency:BTC-USD) – Seeking Alpha

6 things tax professionals need to know about cryptocurrency taxes – Thomson Reuters

Posted: at 6:16 am

As cryptocurrencies gain increasing acceptance and use, tax professionals need to become more familiar with the complex intricacies of these unique assets

Cryptocurrency may be akin to digital money but its a long way from cash for tax purposes. For example, digital assets are classified as property by the U.S. Internal Revenue Service (IRS).

Traders and investors everywhere are adding cryptocurrency to their portfolios. And at tax time, they may be going to their tax professionals for advice on how to handle these assets. Tax professionals increasingly are needing to ascend a steep learning curve to provide their clients with expert advice on cryptocurrency taxes.

However, cryptocurrency tax issues dont have to be time consuming or scary and tax professionals can provide exceptional value to clients by remembering some core principles and following established best practices.

As mentioned, the IRS classifies cryptocurrency and other digital assets as property. Standard property tax rules apply, with realized capital losses or gains typically determining crypto tax liability.

The treatment of cryptocurrency like property makes it akin to real estate or stock for tax purposes. Just like you would report capital gains or losses from any property transaction, the same is required for most transactions involving cryptocurrency.

Not all crypto transactions have tax implications. Using fiat money to buy and hold cryptocurrency is generally not taxable until the crypto is traded, spent, or sold.

Tax professionals can reduce their mental load by clearly understanding which types of crypto activities and transactions can have tax consequences, such as:

Questions like, How are new crypto tokens distributed for the first time? and Whats the role of decentralized finance (DeFi) in all this? are crucial to know. Initial coin offerings (ICOs) and DeFi are both important for tax professionals to understand.

ICOs work a lot like initial public offerings (IPOs) of stock, but they may differ in their tax treatment. Receiving a crypto token via an ICO may be treated as income at the time that the token is received, or the token may be classed as a capital asset subject to capital gains tax only when sold. The tax treatment for tokens produced by ICOs varies across jurisdictions.

DeFi, on the other hand, uses blockchain technology to eliminate the need for financial intermediaries like banks. DeFi platforms support a wide range of transactions that include buying, selling, trading, lending, and earning interest on cryptocurrency. The complexity and diversification of the activities occurring on DeFi platforms can create a challenge for tax professionals, in both understanding how DeFi works and interpreting the tax implications that arise from clients DeFi transactions.

The regulatory landscape for digital assets is evolving at breakneck speed. Federal agencies in the United States are suing major industry participants and fighting over whether and which cryptocurrencies are securities. Lawmakers and regulators in the United Kingdom are making strong moves to classify cryptocurrency as a regulated asset. And jurisdictions like Hong Kong are increasingly opening up to attract more crypto and web3 businesses.

Tax professionals need to become knowledgeable about the crypto regulatory landscape and pay close attention to whats changing. Whats true today about crypto regulation can easily be false tomorrow and clients are relying on their tax professionals to know whats happening.

Fortunately, there are a few different options for tax professionals to stay well informed in this area, including subscribing to reliable news sources that focus on crypto issues, reviewing official regulatory announcements, attending cryptocurrency taxation webinars, and joining professional forums for crypto tax professionals.

How crypto transactions are taxed, how information is reported, and what penalties apply for non-compliance all have the potential to evolve as the crypto industry matures. By monitoring crypto news and trends, tax professionals can ensure that they stay on top of all changes that matter for tax.

Tax professionals can significantly enhance their understanding of cryptocurrency and crypto taxes by engaging with crypto users directly. Participating actively in one or more of the many crypto communities is a solid way to stay informed about the latest trends, tools, and challenges that matter to crypto tax clients.

To become more active in a crypto community, tax professionals could begin to use channels like Telegram, Discord, and Reddit to participate in focused crypto forums or engage in other social media discussions about crypto. Tax professionals could also attend meet-ups of crypto groups or cryptocurrency conferences, or even join or organize a crypto tax webinar.

Engaging directly with crypto users is important because it keeps your crypto knowledge fresh and may even provide new leads additional tax business.

Tax professionals wishing to streamline the accounting and reporting process for cryptocurrency taxes can opt to use crypto tax software. Using a comprehensive software tool is how many tax professionals especially those new to crypto ensure the quality and accuracy of their work.

Most of the crypto tax software on the market can perform a variety of tasks more quickly and efficiently, including allowing the user to connect with multiple blockchains and exchanges, automatically import cryptocurrency transaction data, record and track many different types of crypto transactions, and process more complex crypto transactions. User can also calculate gains and losses using appropriate cost basis methods and efficiently generate customized tax reports for their clients.

These crypto tax software solutions can save valuable time and resources for tax professionals and their clients, as long as professionals are careful to choose crypto tax software that is reliable, secure, and in sync with current laws and regulations.

Continued here:
6 things tax professionals need to know about cryptocurrency taxes - Thomson Reuters

Posted in Cryptocurrency | Comments Off on 6 things tax professionals need to know about cryptocurrency taxes – Thomson Reuters

All About Wrapped Cryptocurrency Tokens Explained – The Tech Report

Posted: at 6:16 am

Wrapped cryptocurrency tokens are like digital gift wrappers for cryptocurrencies. They take an existing cryptocurrency, like Bitcoin or Ethereum, and put it inside a special digital wrapper. This wrapper allows the original cryptocurrency to be used on a different blockchain.

It helps to make different cryptocurrencies work together and be used in various applications and services, even if they originally belong to different blockchain networks.

The concept of wrapped tokens is vast and complex. However, this concise explanation will help you understand them better. So, keep reading to learn more.

Wrapped tokens are like a special version of a cryptocurrency or digital asset tied to another coin or asset. They are usually one from a specific blockchain. They are called wrapped because they are wrapped around the original asset.

Now, whats the importance of wrapped tokens? Theyre essential for making different blockchains work together and for using decentralized financial services.

In other words, they let you easily use assets from one blockchain on another. Wrapped tokens can represent various things, like regular stablecoins, cryptocurrencies, and even unique digital items (NFTs).

For example, consider Wrapped Bitcoin (wBTC) on the Ethereum network. It stands for Bitcoin (BTC) and allows people to interact with Ethereum-based DeFi platforms and decentralized exchanges.

All these are achievable while the value and features of Bitcoin are maintained.

So, youve learned that a wrapped token is like a copy of a cryptocurrency from a different blockchain or sometimes just a different version of the same chain. But how do we actually wrap these tokens?

Lets take Wrapped Bitcoin (wBTC) as an example. Three types of entities are involved in creating wBTC on Ethereum:

Now that you know these three key players in wBTC, lets go through the simple process of wrapping a token:

Merchants can do something similar to get their BTC back and burn their wBTC on the Ethereum blockchain. wBTC relies on a DAO system to ensure everything is safe and decentralized.

But there are also wrapped tokens made by centralized groups or smart contracts.

Most people into DeFi suggest avoiding wrapped tokens managed by a centralized group. Why? Because a central group could, at any time, mess with the money thats supposed to back the wrapped token.

That money decides how much the wrapped token is worth. So, if something goes wrong with the money, the wrapped token can quickly lose its value.

Besides wBTC, there are lots of other wrapped tokens like wETH, wMATIC, renBTC, and wFTM. In the DeFi world, various platforms are creating these kinds of tokens. They are made to work smoothly with specific blockchain systems, helping to bring many different assets into a single ecosystem.

For example, Wrapped Bitcoin (wBTC) allows owners to use their BTC on Ethereums decentralized apps and DeFi platforms. Wrapped Ether (wETH) makes Ethereum more efficient for trading and smart contracts.

Stablecoins, like Dai (DAI), USD Coin (USDC), and Tether (USDT), can be easily used on different blockchains thanks to their wrapped versions. Some blockchains, like Polygon and BNB Smart Chain (BSC), have their own wrapped tokens, which help connect different blockchains and enable various decentralized uses.

In the ever-changing world of cryptocurrency, these tokens are vital for connecting different blockchain networks, promoting compatibility, increasing liquidity, and making cryptocurrency more accessible.

Wrapped tokens provide several benefits in the cryptocurrency and blockchain space. Firstly, they enhance cross-chain compatibility, allowing assets from different blockchains to work together in a specific ecosystem seamlessly.

This, in turn, improves access to a wider range of assets and increases liquidity.

Secondly, wrapped tokens streamline the use of assets for various functionalities. For example, Wrapped BTC facilitates the use of Bitcoin in the Ethereum DeFi ecosystem.

Also, they standardize and simplify how assets interact, making them more user-friendly.

Moreover, wrapped tokens empower users by giving them more control over their assets. These tokens significantly boost the utility, flexibility, and accessibility of crypto assets across several blockchain networks, promoting a more interconnected and dynamic cryptocurrency economy.

Wrapped tokens come with certain limitations despite their role in connecting different blockchain systems and increasing asset utility.

One key concern is centralization risk because wrapped tokens rely on custodians to hold the original assets, potentially leading to issues if the custodian faces problems.

This might affect the value and usefulness of the wrapped token. Moreover, the process of wrapping and unwrapping tokens can be complex and may involve additional costs, which could discourage some users.

Additionally, using external bridges and protocols for wrapping tokens carries security risks and requires trust in third-party systems.

Despite these drawbacks, wrapped tokens remain essential for linking blockchain ecosystems and expanding asset functionality. However, users should exercise caution and stay informed when utilizing them.

Wrapped tokens, like any digital value, need to be protected just like youd safeguard physical assets in the real world. Regarding security, nothing beats hardware wallets like Nano X, Ledger Nano S Plus, or Stax.

With Ledger wallets, your private keys and seed phrases are kept offline, ensuring no one can tamper with or access your wrapped tokens digitally.

Even though your keys are offline, you can still use a wide range of DeFi platforms through Ledger Live, a mobile and desktop app that connects with your Ledger wallet. This means you get top-notch security for your wrapped tokens without giving up the flexibility to use them on various DeFi platforms.

Establishing compatibility between various blockchains presents a significant challenge to the cryptocurrency industry. The issue arises because as more blockchains are created, the number of connections required to enable smooth asset transfers grows exponentially.

Efforts are underway to simplify and enhance the process of bridging assets across blockchains. One approach involves using a central bridge hub, which acts as a central point to which all other blockchains connect.

An example is Darwinia, a cross-chain bridge hub undergoing development on the Substrate platform. Shortly, bridges and wrapped crypto tokens are expected to remain integral components of the solution for achieving interoperability between different blockchains.

Wrapped tokens are like digital versions of real-world assets, and they play a vital role in connecting different blockchains and expanding the use of cryptocurrencies.

They offer benefits like interoperability and improved utility, but there are also risks to consider, such as centralization and regulatory concerns.

To keep your wrapped tokens secure, hardware wallets like Ledger provide the best protection while allowing you to use your assets in decentralized finance (DeFi).

So, while wrapped tokens have their advantages, being cautious and well-informed is key to using them effectively in the ever-evolving world of cryptocurrency.

You can sell Wrapped Bitcoin (BTC). It functions much like regular Bitcoin (BTC), but its wrapped in an Ethereum token, allowing it to be used in Ethereums decentralized applications and DeFi platforms. You can trade or sell it like any other cryptocurrency.

Wrapped Bitcoin is designed with security measures in place. It uses a multi-signature system, each member holding a key to secure the system.

This setup is used to create an Ethereum token backed by Bitcoin. Keyholders can collectively make decisions, including adding or removing custodians and freezing wBTC tokens in case of fraud or emergencies.

While these security features provide protection, like any digital asset, its essential to be cautious and follow best practices to ensure security.

Wrapped tokens come with some limitations and risks. These include potential centralization concerns, as they often depend on custodians to hold the original assets, introducing counterparty risk.

Additionally, wrapping and unwrapping tokens can be complex and may involve fees. Relying on bridges and protocols to wrap tokens may introduce security risks and require trust in third-party systems.

Not all assets can be readily wrapped, limiting the variety used across blockchains. Lastly, regulatory uncertainties surrounding wrapped tokens can lead to legal ambiguity, affecting their adoption and use.

More:
All About Wrapped Cryptocurrency Tokens Explained - The Tech Report

Posted in Cryptocurrency | Comments Off on All About Wrapped Cryptocurrency Tokens Explained – The Tech Report

What Entrepreneurs Can Learn from the Cryptocurrency Fraud Trial … – Babson Thought & Action

Posted: at 6:16 am

The fraud trial of former cryptocurrency wunderkind Sam Bankman-Fried has plunged the barely regulated and often misunderstood industry back into the spotlight, with prosecutors alleging millions of dollars in excessive spending and flat-out dishonest communications.

But, the giddy rehash of Bankman-Frieds $32 billion cryptocurrency rise and fall and the alleged malpractice of his futures exchange company FTX Trading Ltd. likely wont cause any lasting harm to the industry, according to Babson Professor Steven Gordon, who studies cryptocurrency.

Situations such as this tarnish the industry as a whole and keep people at arms length and concerned about it, Gordon said. On the other hand, theres a lot of interest by very well-established firms such as BlackRock and Fidelity, companies that do their due diligence. If those kinds of companies are interested in investing, cryptocurrency could be moving toward the mainstream.

Nevertheless, the trial holds plenty of lessons for both entrepreneurs and investors, Gordon said. Here are some key takeaways from Bankman-Frieds trial.

The trial has underscored the importance of regulatory compliance in the cryptocurrency space. Bankman-Frieds legal proceedings have brought attention to the need for clear and transparent rules when dealing with virtual currency.

Right now, its a bit like the wild west out there, Gordon said. Bankman-Fried had advertised FTX Trading Ltd. as a safe place for traders to deposit their money. Exchanges like FTX are expected to keep nearly 100% of their customers deposits in fluid investment instruments, ideally in the cyptocurrency of the deposit. Instead, Bankman-Fried allegedly used as much money as he wanted to buy everything from real estate in Bermuda to political influence.

If a company is banking your money, then it should be regulated like a bank, Gordon said.

The trial underscores the importance of investor awareness and due diligence when entering the crypto market. Gordon, professor of information systems at Babson, said he uses Coinbase, which is a public company that operates out of New York. The Empire State requires cryptocurrency exchanges to abide by strict regulations in order to operate there.

Right now, there is very little regulation, so youve got to be ultra careful about how you invest in cryptocurrency, Gordon said. You want to be sure that you invest in companies that have good controls in place. Also, FTX was not a public company. And, unfortunately, if you invest in a private company, their books arent public, so youre always taking a risk.

Bankman-Frieds trial has led to discussions about ethical business practices not only within the cryptocurrency industry, but for all entrepreneurs.

This is a reminder that even in a rapidly evolving industry, ethical behavior remains paramount. Entrepreneurs and organizations in the cryptocurrency space must prioritize ethics and integrity to gain trust, Gordon said.

Entrepreneurs should scrutinize every aspect of their business operations, partnerships, and investments. Conduct background checks, verify information, and ensure complete transparency in all dealings. Failing to do so can lead to serious legal and reputational consequences.

I think from the standpoint of being an entrepreneur, the lessons are clear. There are plenty of temptations that they might face if they dont have enough experience and their company is growing rapidly, Gordon said. They might be tempted to take some shortcuts here and there. Thats why they have to maintain control of their assets. They need a set of strong internal controls, and they have to follow those controls. You cant willfully bypass them.

Posted in Insights

Tagged Faculty, Technology, Commentary, VC & Investing

Here is the original post:
What Entrepreneurs Can Learn from the Cryptocurrency Fraud Trial ... - Babson Thought & Action

Posted in Cryptocurrency | Comments Off on What Entrepreneurs Can Learn from the Cryptocurrency Fraud Trial … – Babson Thought & Action

Exploring the Convergence of Cryptocurrency and Online Gambling – The Cryptonomist

Posted: at 6:16 am

SPONSORED POST*

Cryptocurrency has become a popular payment method in several sectors. Leading actors in online banking, video gaming and other essential transactions now accept cryptocurrency payments. Fortunately, online casinos have caught on to the crypto payment trends and are leveraging these crypto options to offer seamless payment solutions. This review explores an overview of cryptocurrency and its influence on modern online gambling options.

Before we go too far, lets deal with the basics.

If you have ever been confused about the nature of cryptocurrency, dont worry; we have all been there. The idea of a virtual currency is easy to grasp, but cryptocurrencies are not that simple.

Cryptocurrency is a digital payment system that runs on encrypted algorithms. The encrypted nature of crypto coins makes them alternative currencies and a secure virtual accounting system. This means that cryptocurrencies are not only convenient for making payments, but they are also safe from fraud or third-party influence.

Being a secure and anonymous payment option makes cryptocurrency appealing to sectors that need unrestricted payment options. Video games and other online gaming platforms are quick to adopt different crypto coins because they offer faster payment options with anonymity, lower fees, and better security. On the other hand, players are thrilled with how seamless payments can be with them.

There is no doubt that online casinos have taken over the gambling industry. A punter that test casino with free spins no deposit Australia 2023 enjoys the convenient gaming experience and simple design. Most online casinos attract players with large collections, intuitive interfaces, and abundant game promotions. However, fast and safe payment options remain one of the biggest selling points of online casinos.

Online gambling has gone through different payment evolutions. These betting sites have explored bank transfers, internet banking, credit cards, e-wallets and finally, we are down to crypto options. Crypto coins stand out among these payment options because they are faster, safer and more convenient.

Crypto works like other payment methods. However, it is simpler because players can make deposits and withdrawals without going through third parties. Crypto options like Bitcoin, Ethereum, Litecoin, Dogecoin, and USDT are popular payment options in several online casinos. Registered players can make crypto payments without the long KYC (Know Your Customer) requirements. Players can pay from their crypto wallets or any other credible crypto transactions portal. The good news is that casinos that allow crypto payments dont demand impossible personal information.

The popularity of cryptocurrencies in online casinos comes from the security and other benefits players get from this alternative payment method. Lets explore the leading advantages of crypto coins in online gambling.

The convergence of cryptocurrency with online gambling has resolved one of the biggest iGaming challenges. Many players worry about fairness in online gaming and suspect that the casinos and game providers may be cheating them. But cryptocurrency takes care of this challenge.

Blockchain in cryptocurrency ensures accountability in the transactions, and that technology now applies in crypto-based casinos. Betting sites that accept crypto coins also provide provably fair games developed using Blockchain technology. These provably fair game options allow players to review game history and confirm that the games were fair. These games have become the hallmark of credible gaming, but they are only available in crypto-based casinos.

Payment speed is a leading condition when considering an online casino. Players want their deposits and withdrawals to reflect instantly, which is impossible. Different factors, including the limitation of the financial institution, can extend the processing time. Fortunately, cryptocurrency does not have this limitation.

Crypto coins are unregulated digital currencies, excluding them from the usual banking or finance institution challenges. Crypto transactions are strictly between the player and the casino, making it a direct interaction with no delay. The transactions dont require long processing times like other payment options. The only delay you can experience with crypto transactions is the time it takes to reflect withdrawals in your crypto wallet.

We have stated earlier that cryptocurrency runs on a cloud-based encryption algorithm. Blockchain remains the most secure data encryption with hash functions and a vast computing range. Blockchain stores crypto coins as code, blocking all unauthorised access.

This cloud encryption also protects data by securing the players identity. Only the casino and the player would have access to the payment information, and they cannot share these details with third parties.

While cryptocurrency has become the most encouraged payment method in online interactions, it still has some notable limitations. Here are some prevalent downsides to using crypto coins in online casinos.

Like other currencies, crypto coins are subject to market factors like demand and supply, affecting their values. However, the challenge here is that the value of cryptocurrency changes faster than other currencies. Crypto prices are volatile and change without notice. This price change may sometimes be in the players favour, but that rarely happens. Players may lose money if the value of their cryptocurrency drops after they have made their deposits.

Cryptocurrency is a decentralised payment method, and this feature protects it from government regulations. The lack of oversight has benefits like anonymity and lesser transaction fees discussed earlier. Unfortunately, it also makes cryptocurrencies unacceptable in some countries.

Most governments have laws against cryptocurrency because they cannot regulate its distribution or value. Gaming and betting punters in these countries may have some challenges acquiring cryptocurrencies because they have to go through illegal crypto traders before they can get crypto coins.

Crypto coins have found their way into the online gambling sector, offering a comfortable payment solution to players. It is safe to state that crypto is the future of online casinos, and this post covers everything you should know about cryptocurrencies and online casinos.

*This article was paid for Cryptonomist did not write the article or test the platform.

Related posts More from author

Link:
Exploring the Convergence of Cryptocurrency and Online Gambling - The Cryptonomist

Posted in Cryptocurrency | Comments Off on Exploring the Convergence of Cryptocurrency and Online Gambling – The Cryptonomist

New 100x Crypto Coins | Fastest Growing Cryptocurrency and New … – Analytics Insight

Posted: at 6:16 am

In 2023, the crypto terrain pulsates with fervor, thanks to a confluence of established juggernauts and vibrant entrants. ApeMax, a recent addition, is at an interesting juncture, encapsulating the allure of meme coins, innovative tokenomics, and a noteworthy presale. While stalwarts like Bitcoin and Ethereum persist in being pivotal, the emergence of tokens such as ApeMax suggests a diversifying crypto panorama. Lets journey through these intriguing cryptocurrencies, their trajectories, and the narratives they weave.

Bitcoin: Pioneering the decentralized cryptocurrency space, Bitcoins legacy remains unparalleled. As of November 2021, Bitcoin reached an impressive all-time high of $68,789.

ApeMax: A synthesis of meme coin charm and novel tokenomics, its Boost-to-Earn system, coupled with a rapidly expanding presale, positions ApeMax in a unique spotlight.

Ethereum: Anchoring decentralized applications, Ethereums influence in blockchain is undiminished. Between its inception in August 2015 and its pinnacle, Ethereum surged by over 1700x.

Dogecoin: From its meme origins, Dogecoin has evolved into a significant cryptocurrency, highlighting the sectors unpredictability. Its market cap has soared beyond $8.4 billion.

Shiba Inu: Amplifying the meme coin narrative post-Dogecoin, its strategic initiatives and community fervor maintain its relevance. Shiba Inu witnessed an astounding 8,300,000% growth from August 2020 to its zenith in October 2021.

Ripple: Aiming to revolutionize cross-border transactions and buoyed by strategic alliances with financial powerhouses, Ripples significance in the crypto story remains in flux.

Pepe Coin: A fresh face in the crypto arena, Pepe Coins trajectory is impressive, achieving a $1 billion market cap shortly post-launch.

ApeMax is more than meme aesthetics. Its unique attributes and systems present a fresh perspective in the meme coin domain. Beyond traditional staking, ApeMax empowers its holders to boost entities they like, melding potential rewards with decentralized engagement.

>> Visit the ApeMax website to Learn More <<

ApeMaxs presale captures the attention of eligible early birds seeking out new coins. Presales herald new tokens, granting eligible individuals an opportunity to obtain tokens before broader accessibility. ApeMaxs is doubly distinctive, with both early token acquisition and the introduction of an innovative crypto coin.

ApeMaxs differentiators earmark it as a significant contender:

Innovative Staking: Its Boost-to-Earn transcends conventional staking paradigms. It lets stakers boost entities they like, forging a decentralized engagement landscape with potential staking rewards.

Transparent Tokenomics: In a realm yearning for transparency, ApeMaxs lucid tokenomics engender trust and curiosity.

Presale Momentum: The accelerated traction of ApeMaxs presale accentuates its burgeoning stature in the young crypto and top new presale domain.

While Bitcoin and Ethereums ascents are legendary, meme coins like Dogecoin and Shiba Inu underscore that significant growth can emerge from unanticipated avenues. Pepe Coins swift rise and the ongoing intrigue around new token presales, such as ApeMaxs, highlight the enduring enthusiasm and innovation in the crypto sphere.

The crypto tapestry is intricate, interweaving established luminaries like Bitcoin and Ethereum with vibrant novelties like ApeMax. As ApeMaxs presale garners traction, its distinctive features and presale dynamics underscore that the crypto narrative remains in flux. Engaging with crypto necessitates well-informed discernment, caution, and a comprehensive grasp of its inherent risks and volatilities. Note: this article does not proffer financial guidance. The volatile nature of cryptocurrencies implies potential risks, and its essential not to overspend. Crypto engagement may not resonate with everyone. Acquiring ApeMax tokens is subject to territorial restrictions. Exclusions encompass the USA, Canada, among others. Always reference the official ApeMax site for a full list of restricted nations and prerequisites before proceeding.

Read the rest here:
New 100x Crypto Coins | Fastest Growing Cryptocurrency and New ... - Analytics Insight

Posted in Cryptocurrency | Comments Off on New 100x Crypto Coins | Fastest Growing Cryptocurrency and New … – Analytics Insight

US imposes new sanctions on Hamas members, cryptocurrency … – NHK WORLD

Posted: at 6:16 am

The US Treasury Department has imposed sanctions on nine individuals of the Palestinian Islamist group Hamas and a Gaza-based cryptocurrency exchange in an effort to stem the revenue flow to the group.

The department announced on Wednesday that the sanction targets Hamas senior officials and other members managing assets in a secret Hamas investment portfolio, as well as the virtual currency exchange used for money transfers and other purposes.

The department said in the announcement that in addition to the funds Hamas receives from Iran, the group's global portfolio of investment generates a large amount of revenue through its assets worth hundreds of millions of dollars.

It added that companies in Sudan, Algeria, Turkey, the United Arab Emirates and other countries managed the funds under the guise of legitimate businesses.

It said the designations are part of the US continuous efforts to "root out Hamas's sources of revenue."

US Treasury Secretary Janet Yellen said in the announcement, "We will continue to take all steps necessary to deny Hamas terrorists the ability to raise and use funds to carry out atrocities and terrorize the people of Israel."

Here is the original post:
US imposes new sanctions on Hamas members, cryptocurrency ... - NHK WORLD

Posted in Cryptocurrency | Comments Off on US imposes new sanctions on Hamas members, cryptocurrency … – NHK WORLD

Online dating apps are colliding with cryptocurrency and human … – KCRW

Posted: at 6:16 am

Oct. 17, 2023

The most brutal thing about these scams is it preys on your vulnerability. By necessity, when you're in the dating pool, you have to open yourself up to meeting new people and experiencing new things. And that's part of how these kinds of scams work, says Joel Khalili, crypto and tech reporter for Wired. Photo by Shutterstock.

A recent online dating scam called pig-butchering is tricking people into giving away big bucks via cryptocurrency.

President Biden heads to the Middle East on Wednesday. Hell have to walk a fine line of supporting Israel, while advocating for humanitarian needs in Gaza.

Hamas Oct. 7 attack on Israel has been compared to 9/11. Is Israel risking a similar outcome with plans to march into Gaza to destroy the terrorist group?

In the 1980s, RJ Reynolds and Phillip Morris bought Kraft and Nabisco, pumping their food with sugar, fat, sodium, and other additives that made people crave them.

What comedy shows to watch this season? Consider Our Flag Means Death, Gen V, Shrinking, and Bobs Burgers, says one critic.

See the original post here:
Online dating apps are colliding with cryptocurrency and human ... - KCRW

Posted in Cryptocurrency | Comments Off on Online dating apps are colliding with cryptocurrency and human … – KCRW

Top 10 misconfigurations: An NSA checklist for CISOs – The Stack

Posted: at 6:15 am

A new advisory from signals intelligence and cybersecurity experts at the National Security Agency (NSA) highlights the top 10 most common cybersecurity misconfigurations in large organisations including regular exposure of insecure Active Directory Certificate Services.

It comes as the NSAs Cybersecurity Director Rob Joyce warned that if your infrastructure cant survive a user clicking a link, you are doomed.

"Im the director of cybersecurity at NSA and you can definitely craft an email link I will click he added on X writing as generative AI models make it far easier for non-native speakers to craft convincing phishing emails and as such campaigns remain highly effective for threat actors.

The list is a useful guidebook to those seeking to secure IT estates and is no doubt based in part on the NSAs extensive experience of breaching services, as well as support defending CNI. To The Stack, it is also a crisp reminder that strict organisational discipline is critical for cyber hygiene.

Too many network devices with user access via apps or web portals still hide default credentials for built-in administrative accounts. (Cisco, were looking at you, you, you. (Others are also regularly guilty.) The problem extends to printers and scanners with hard coded default credentials on them but are set up with privileged domain accounts loaded so that users can scan and send documents to a shared drive).

NSA says: Modify the default configuration of applications and appliances before deployment in a production environment . Refer to hardening guidelines provided by the vendor and related cybersecurity guidance (e.g., DISA's Security Technical Implementation Guides (STIGs) and configuration guides)

More specifically on default permissions risks, NSA says it regularly says issues with configuration of Active Directory Certificate Services (ADCS); a Microsoft feature used to manage Public Key Infrastructure (PKI) certificates, keys, and encryption inside of AD environments.

Malicious actors can exploit ADCS and/or ADCS template misconfigurations to manipulate the certificate infrastructure into issuing fraudulent certificates and/or escalate user privileges to domain administrator privileges it warns, pointing to ADCS servers running with web-enrollment enabled; ADCS templates where low-privileged users have enrollment rights and other associated issues with external guidance on a handful of known escalation paths here, here and here.

Ensure the secure configuration of ADCS implementations. Regularly update and patch the controlling infrastructure (e.g., for CVE-2021-36942), employ monitoring and auditing mechanisms, and implement strong access controls to protect the infrastructure. Disable NTLM on all ADCS servers. Disable SAN for UPN Mapping. If not required, disable LLMNR and NetBIOS in local computer security settings or by group policy.

Already have an account? Sign in

Read this article:
Top 10 misconfigurations: An NSA checklist for CISOs - The Stack

Posted in NSA | Comments Off on Top 10 misconfigurations: An NSA checklist for CISOs – The Stack

CISA and NSA Issues New Identity and Access Management Guidance for Vendors – TechRepublic

Posted: at 6:15 am

The National Security Agency and the Cybersecurity and Infrastructure Security Agency published on October 4, 2023, a document titled Identity and Access Management: Developer and Vendor Challenges. This new IAM CISA-NSA guidance focuses on the challenges and tech gaps that are limiting the adoption and secure employment of multifactor authentication and Single Sign-On technologies within organizations.

The document was authored by a panel of public-private cross-sector partnerships working under the CISA-NSA-led Enduring Security Framework. The ESF is tasked with investigating critical infrastructure risks and national security systems. The guidance builds on their previous report, Identity and Access Management Recommended Best Practices Guide for Administrators.

SEE: 8 Best Identity and Access Management (IAM) Solutions for 2023

In an email interview with TechRepublic, Jake Williams, faculty member at IANS Research and former NSA offensive hacker, said, The publication (its hard to call it guidance) highlights the challenges with comparing the features provided by vendors. CISA seems to be putting vendors on notice that they want vendors to be clear about what standards they do and dont support in their products, especially when a vendor only supports portions of a given standard.

Jump to:

The CISA-NSA document detailed the technical challenges related to IAM affecting developers and vendors. Specifically looking into the deployment of multifactor authentication and Single-Sign-On, the report highlights different gaps.

According to CISA and the NSA, the definitions and policies of the different variations of MFAs are unclear and confusing. The report notes there is a need for clarity to drive interoperability and standardization of different types of MFA systems. This is impacting the abilities of companies and developers to make better-informed decisions on which IAM solutions they should integrate into their environments.

The CISA-NSA report notes that vendors are not offering clear definitions when it comes to the level of security that different types of MFAs provide, as not all MFAs offer the same security.

For example, SMS MFA are more vulnerable than hardware storage MFA technologies, while some MFA are resistant to phishing such as those based on public key infrastructure or FIDO while others are not.

SEE: The 10 Universal Truths of Identity and Access Management (One Identity white paper)

The CISA and NSA say that the architectures for leveraging open standard-based SSO together with legacy applications are not always widely understood. The report calls for the creation of a shared, open-source repository of open standards-based modules and patterns to solve these integration challenges to aid in adoption.

SSO capabilities are often bundled with other high-end enterprise features, making them inaccessible to small and medium organizations. The solution to this challenge would require vendors to include organizational SSOs in pricing plans that include all types of businesses, regardless of size.

Another main gap area identified is MFA governance integrity over time as workers join or leave organizations. The process known as credential lifecycle management often lacks available MFA solutions, the CISA-NSA report stated.

The overall confusion regarding MFA and SSO, lack of specifics and standards and gaps in support and available technologies, are all affecting the security of companies that have to deploy IAM systems with the information and services that are available to them.

An often-bewildering list of options is available to be combined in complicated ways to support diverse requirements, the report noted. Vendors could offer a set of predefined default configurations, that are pre-validated end to end for defined use cases.

Williams told TechRepublic that the biggest takeaway from this new publication is that IAM is extremely complex.

Theres little for most organizations to do themselves, Williams said, referring to the new CISA-NSA guidance. This (document) is targeted at vendors and will certainly be a welcome change for CISOs trying to perform apples-to-apples comparisons of products.

Williams said another key takeaway is the acknowledgment that some applications will require users to implement hardware security modules to achieve acceptable security. HSMs are usually plug-in cards or external devices that connect to computers or other devices. These security devices protect cryptographic keys, perform encryption and decryption and create and verify digital signatures. HSMs are considered a robust authentication technology, typically used by banks, financial institutions, healthcare providers, government agencies and online retailers.

In many deployment contexts, HSMs can protect the keys from disclosure in a system memory dump, Williams said. This is what led to highly sensitive keys being stolen from Microsoft by Chinese threat actors, ultimately leading to the compromise of State Department email.

CISA raises this in the context of usability vs. security, but its worth noting that nothing short of an HSM will adequately meet many high-security requirements for key management, Williams warns.

The CISA-NSA document ends with a detailed section of key recommendations for vendors, which as Williams says, puts them on notice as to what issues they need to address. Williams highlighted the need for standardizing the terminology used so its clear what a vendor supports.

Chad McDonald, chief information security officer of Radiant Logic, also talked to TechRepublic via email and agreed with Williams. Radiant Logic is a U.S.-based company that focuses on solutions for identity data unification and integration, helping organizations manage, use and govern identity data.

Modern-day workforce authentication can no longer fit one certain mold, McDonald said. Enterprises, especially those with employees coming from various networks and locations, require tools that allow for complex provisioning and do not limit users in their access to needed resources.

For this to happen, a collaborative approach amongst all solutions is essential, added McDonald. Several of CISAs recommendations for vendors and developers not only push for a collaborative approach but are incredibly feasible and actionable.

McDonald said the industry would welcome standard MFA terminology to allow equitable comparison of products, the prioritization of user-friendly MFA solutions for both mobile and desktop platforms to drive wider adoption and the implementation of broader support for and development of identity standards in the enterprise ecosystem.

Create standard MFA terminology Regarding the use of ambiguous MFA terminology, the report recommended creating standard MFA terminology that provides clear, interoperable and standardized definitions and policies allowing organizations to make value comparisons and integrate these solutions into their environment.

Create phishing-resistant authenticators and then standardize their adoption In response to the lack of clarity on the security properties that certain MFA implementations provide, CISA and NSA recommended additional investment by the vendor community to create phishing-resistant authenticators to provide greater defense against sophisticated attacks.

The report also concludes that simplifying and standardizing the security properties of MFA and phishing-resistant authenticators, including their form factors embedded into operating systems, would greatly enhance the market. CISA and NSA called for more investment to support high-assurance MFA implementations for enterprise use. These investments should be designed in a user-friendly flow, on both mobile and desktop platforms, to promote higher MFA adoption.

Develop more secure enrollment tooling Regarding governance and self-enrollment, the report said its necessary to develop more secure enrollment tooling to support the complex provisioning needs of large organizations. These tools should also automatically discover and purge enrollment MFA authenticators that have not been used in a particular period of time or whose usage is not normal.

Vendors have a real opportunity to lead the industry and build trust with product consumers with additional investments to bring such phishing-resistant authenticators to more use cases, as well as simplifying and further standardizing their adoption, including in form factors embedded into operating systems, would greatly enhance the market, stated the CISA and the NSA.

Follow this link:
CISA and NSA Issues New Identity and Access Management Guidance for Vendors - TechRepublic

Posted in NSA | Comments Off on CISA and NSA Issues New Identity and Access Management Guidance for Vendors – TechRepublic