A US court has dismissed the lawsuit concerning the FBI’s removal of 3,443 BTC.

A US court has dismissed the lawsuit concerning the FBI’s removal of 3,443 BTC.

Discover safe methods for partitioning your disk for crypto wallets and managing blockchain disk space. Get practical advice on optimizing storage for Bitcoin and Web3 applications tailored to users on cryptocurrency platforms.
2026-01-11 21:38:05
A dormant Bitcoin wallet from 2016 has moved $22.47 million after years of inactivity

A dormant Bitcoin wallet from 2016 has moved $22.47 million after years of inactivity

Discover trusted cryptocurrency wallets for securely storing Bitcoin. This complete guide covers wallet selection, cold storage solutions, and access recovery for new investors. Explore expert recommendations and strategies to safeguard your digital assets on Gate.
2026-01-11 15:45:16
Ledger posts all-time high revenue and accelerates business expansion

Ledger posts all-time high revenue and accelerates business expansion

Ledger posted all-time high revenue in 2025. As the leading hardware wallet provider, it protects $100 billion in Bitcoin assets, is pursuing expansion in New York, and is evaluating a potential public offering. Get the latest on security solutions and business strategies for Web3 investors.
2026-01-11 14:49:02
Berkshire Hathaway Warns Against AI Deepfake Videos Featuring Warren Buffett

Berkshire Hathaway Warns Against AI Deepfake Videos Featuring Warren Buffett

This article addresses the escalating threat of AI-generated deepfake videos in financial markets, specifically examining fraudulent content impersonating Warren Buffett used to promote investment scams. It outlines how advanced machine learning algorithms create convincingly realistic synthetic media that deceives viewers and bypasses natural skepticism. The piece details Berkshire Hathaway's official warnings and collaborative efforts with tech platforms to remove fraudulent content, while highlighting the alarming $16.6 billion in annual losses from AI-enabled fraud. The article provides practical guidance on identifying deepfake indicators—including unnatural facial movements and audio mismatches—and emphasizes verification through official channels. Designed for investors and financial consumers, it equips readers with essential protective strategies, authentication methods, and decision-making frameworks to safeguard against deepfake-based financial fraud on social platforms and trading environments.
2026-01-11 14:42:37
HTTP 402 resurfaces as AI boosts demand for micropayments

HTTP 402 resurfaces as AI boosts demand for micropayments

Learn how AI is transforming Web3 micropayments with the HTTP 402 protocol. Explore decentralized blockchain technology, machine-to-machine transactions, and Gate’s cutting-edge solutions for the AI-driven economy.
2026-01-11 11:51:59
Announcing the Fractional Syndication and Real Estate Tokenization Platform

Announcing the Fractional Syndication and Real Estate Tokenization Platform

Discover the future of real estate tokenization syndication. Through the "The Investors Pool" platform, which utilizes blockchain technology, you can invest in U.S. real estate with as little as $100. This overview details cutting-edge fractional syndication strategies and secondary market liquidity designed for Web3 investors and digital asset managers.
2026-01-11 11:41:15
EU to Ban Privacy Coins and Mandate Identity Verification for Cryptocurrency Transactions by 2027

EU to Ban Privacy Coins and Mandate Identity Verification for Cryptocurrency Transactions by 2027

This article provides a comprehensive overview of the EU's Anti-Money Laundering Regulation (AMLR) taking effect July 1, 2027, which fundamentally reshapes cryptocurrency governance. The regulation mandates identity verification for transactions exceeding 1,000 euros, bans privacy coins like Monero and Zcash from regulated platforms, and implements strict KYC procedures across the EU. Key topics include regulatory requirements, market impact on exchanges and traders, compliance infrastructure investments, and the ongoing privacy-versus-security debate. The article addresses critical questions for cryptocurrency users and businesses, offering practical guidance on adapting to new identity verification rules, portfolio adjustments, and platform compliance strategies. Essential reading for anyone operating in or affected by EU crypto markets.
2026-01-11 11:36:00
What are the main security risks and smart contract vulnerabilities in Jasmy crypto?

What are the main security risks and smart contract vulnerabilities in Jasmy crypto?

This comprehensive analysis explores critical security risks and smart contract vulnerabilities affecting the Jasmy IoT ecosystem. The article examines Jasmy's layered security architecture combining distributed DNS and FeliCa-based protection against DNS cache poisoning and remote code execution attacks. It identifies network vulnerabilities including DoS attacks, information leakage, and device control risks impacting millions of connected IoT devices. Additionally, it addresses custodial risks on centralized exchanges like Gate, analyzing JASMY's extreme price volatility and token release scheduling effects on market stability. The article concludes with essential security best practices, including smart contract verification methods, private key management protocols, cold wallet storage recommendations, and DeFi application security guidelines for protecting user assets within the Jasmy ecosystem.
2026-01-11 10:19:09
What are the main security and risk events in cryptocurrency smart contracts and exchange custody risks?

What are the main security and risk events in cryptocurrency smart contracts and exchange custody risks?

This comprehensive article examines critical security threats facing cryptocurrency infrastructure across three interconnected domains. It traces smart contract vulnerabilities from the historic DAO hack to today's AI-driven autonomous attack vectors, highlighting how reentrancy flaws and logic bugs continue evolving into sophisticated exploits. The article details supply chain attacks targeting exchanges, with 39% focusing on critical infrastructure through compromised development packages. Additionally, it analyzes centralized custody risks, revealing that over $2.47 billion was stolen in 2025 alone, demonstrating the dangers of single-point-of-failure models. By comparing centralized versus decentralized exchange security frameworks and providing practical vulnerability identification methods, this guide equips cryptocurrency users and platforms with essential knowledge for protecting digital assets against emerging threats on Gate and other infrastructure.
2026-01-11 09:10:29
Ethereum Proposes Protocol to Recover Locked ETH Funds

Ethereum Proposes Protocol to Recover Locked ETH Funds

The Ethereum Fund Recovery Protocol (EFRP) addresses the critical challenge of inaccessible ETH locked due to smart contract vulnerabilities and protocol-level issues. This innovative solution implements recovery mechanisms through smart contracts and a decentralized Technical Council DAO, ensuring transparent governance without modifying Ethereum's core protocol. The EFRP specifically targets historical incidents like the Parity wallet freeze that locked over 513,743 ETH, establishing clear criteria for legitimate recovery claims while maintaining network security principles. By employing rigorous verification procedures and cryptographic proofs, the protocol balances fund recovery with blockchain immutability. This framework demonstrates Ethereum's evolution toward practical problem-solving and could serve as a model for other blockchain ecosystems addressing similar fund-locking challenges.
2026-01-11 08:47:31
What are the major cryptocurrency security risks and smart contract vulnerabilities in 2026?

What are the major cryptocurrency security risks and smart contract vulnerabilities in 2026?

This comprehensive guide examines cryptocurrency security risks and smart contract vulnerabilities in 2026, analyzing unprecedented losses from sophisticated attack vectors. The article covers critical vulnerabilities including reentrancy attacks, access control failures, and precision errors that drained millions across DeFi protocols like Yearn Finance and Balancer. It explores centralized exchange custody risks, where state-sponsored actors accounted for 76% of breaches, and emerging network threats spanning Layer-2 solutions and cross-chain bridges. From flash loan exploits to oracle manipulation and AI-driven attacks, the analysis reveals how attackers exploit economic invariants beyond traditional code flaws. Designed for traders, developers, and security professionals, this resource provides actionable insights on defense-in-depth strategies, protocol audits, and best practices for protecting digital assets on Gate and blockchain ecosystems.
2026-01-11 08:42:57
User Loses $1.22 Million in Stablecoins to Phishing Scam

User Loses $1.22 Million in Stablecoins to Phishing Scam

This article examines a critical $1.22 million stablecoin phishing attack involving USDC and aPlaUSDT0, highlighting the evolving threats in Web3 security. It details how sophisticated permit signature scams exploit user trust through deceptive interfaces and unauthorized token approvals. The guide provides essential protection strategies including URL verification, transaction scrutiny, and hardware wallet usage. By understanding permit function vulnerabilities and implementing multi-layer security measures like two-factor authentication and withdrawal whitelists, users can significantly reduce phishing risks. The article emphasizes that while recovery from phishing scams remains extremely difficult due to blockchain's irreversible nature, proactive security awareness and verification practices serve as the most effective defense against stablecoin theft in decentralized ecosystems.
2026-01-11 05:32:27
N4T Unveils the World's First Peace Prize Token on Ethereum

N4T Unveils the World's First Peace Prize Token on Ethereum

Explore N4T, the first peace prize token built on the Ethereum blockchain. Find out how to purchase N4T, unlock the advantages of ERC-20, and understand its fair distribution system. Become part of the peaceful crypto community on Gate today.
2026-01-11 04:47:36
Inferno Drainer Phishing Group Targets Cryptocurrency Users

Inferno Drainer Phishing Group Targets Cryptocurrency Users

This comprehensive guide exposes the Inferno Drainer phishing threat targeting cryptocurrency users across multiple blockchains. The article details how this sophisticated cybercriminal group steals digital assets through fake wallet addresses, fraudulent websites, and domain spoofing techniques, with reported losses exceeding 70 million USD from over 100,000 victims. It reveals notable security breaches including BNBChain's compromised social media accounts used to distribute malicious links. The guide provides essential protective measures including URL verification, multi-factor authentication, and skepticism toward suspicious offers. Users will learn to identify common phishing tactics, implement security best practices, and respond effectively if compromised. Practical recommendations cover verifying official websites on Gate, using hardware wallets, and staying informed about evolving threats through reputable security channels.
2026-01-11 04:39:16
Vitalik Buterin Criticizes Web3 Apps Relying on Google Login

Vitalik Buterin Criticizes Web3 Apps Relying on Google Login

This article examines the critical gap between Web3's decentralization promises and current implementation realities, focusing on Vitalik Buterin's Devconnect 2023 remarks about applications falsely claiming decentralization while relying on centralized services like Google authentication. The piece analyzes how centralized login mechanisms undermine privacy, create single points of failure, and contradict blockchain principles. It explores true decentralization requirements across technical and governance layers, including blockchain-based authentication systems, decentralized identifiers (DIDs), and self-sovereign identity frameworks. The article highlights leading Web3 projects like ENS, Litentry, and Idena implementing genuine decentralized identity solutions on platforms such as Gate. Targeted at developers, investors, and Web3 stakeholders, this comprehensive guide provides actionable insights for building authentically decentralized applications and holds the industry accountable to its core values of
2026-01-11 03:51:54