Earlier this month, Motherboard revealed that contents of Microsoft’s email services were compromised. Multiple victims now say that hackers stole their cryptocurrency. Earlier this month, Motherboard broke the news that hackers were not only able to access Outlook users’ email metadata as previously reported, but also email content. The breach centered around a hacker getting hold of a Microsoft customer support worker’s login credentials; from there, the hacker could dive into the content of any non-corporate Outlook, Hotmail, or MSN account, Motherboard found.
Now, multiple victims have come forward to flag what they believe may be one of the motivating reasons behind the breach: emptying peoples’ cryptocurrency accounts.
“The hackers also had access to my inbox allowing them to password reset my Kraken.com account and withdrawal [sic] my Bitcoin,” Jevon Ritmeester, a Microsoft user that the company alerted to the data breach, told Motherboard in an email, referring to popular cryptocurrency exchange Kraken.
For verification purposes, Ritmeester provided Motherboard with the breach notification emails he received from Microsoft, as well as a screenshot showing what he said was an email forwarding rule the hackers set up: anytime an email mentioned the term “Kraken,” his account would automatically forward it to a Gmail address presumably controlled by the hackers.
That would include emails such as password reset and Bitcoin withdrawal requests. Indeed, Ritmeester only found someone had requested both of those after checking the trash of his email account, he wrote in a recent post on the tech forum Tweakers. In the post, he added that he lost just over 1 bitcoin, or around $5,000 at the current exchange rate.
It appears Ritmeester isn’t the only person who hackers stole cryptocurrency from due to the Microsoft breach.
“My account was hacked as a direct result of this,” Reddit user shinratechlabs wrote earlier this month, adding that they lost “25,000 in crypto,” although it’s not clear what currency they may be referring to, fiat or otherwise.
“Same exact for me only a lot less funds stolen, sucks,” another Reddit user, mickey_ficke, chimed in. Neither Reddit user responded to a request for comment.
“I feel Microsoft is trying to cover up and is not taking this seriously.”
In his post on Tweakers, Ritmeester said he didn’t have two-factor authentication enabled on Kraken, which may have kept the hackers out of this cryptocurrency account. If he had it enabled, the hackers may have had to take control of this phone number as well in order to intercept the two-factor authentication tokens, for instance.
A Microsoft spokesperson told Motherboard in an email on Monday that, “Customers who believe they have been impacted beyond what was outlined in the company’s notification should contact the Microsoft support team for assistance.”
Originally, when TechCrunch and other outlets reported the Outlook data breach, Microsoft said it only impacted email metadata and customer information, such as subject lines and the names of other email addresses users communicated with. After Motherboard presented Microsoft with evidence that email content had also been impacted, Microsoft revised its statement, despite already being fully aware that content was exposed; the company had issued breach notification emails to victims saying as much.
Storj Labs Helps NEM, IoDLT Improve Sync Times for MongoDB by 15x
Storj Labs today announced an integration with NEM to accelerate sync times for the NEM Symbol platform, improving the performance of connecting new nodes to the network and analyzing blockchain data. The solution—which was built by NEM partner IoDLT—leverages the native MongoDB integration that allows users to easily store data on the Tardigrade decentralized cloud storage service.
IoDLT specializes in creating an affordable internet of things (IoT) solution that leverages the power of the NEM blockchain. IoDLT operates a Symbol node and the team noticed that as blocks are added, which increases the amount of data on the blockchain, it becomes increasingly difficult to sync a full node in a reasonable amount of time. To solve this problem, IoDLT configured MongoDB snapshots to be sent to Tardigrade, making it much faster to quickly rehydrate Symbol’s API state to any location across the globe, improving accessibility.
“By using Tardigrade to store and distribute the MongoDB snapshots needed to set up a Symbol node, the process is reduced from 44 minutes to 2-3 minutes, an almost 1,500% improvement,” said Bader Youssef, IoDLT Chief Technology Officer. “Our team is proud of the Tardigrade integration we built and we’re looking forward to seeing how NEM community members and users take advantage of these new benefits from Tardigrade.”
NEM’s Symbol is a distributed ledger technology (DLT) built by NEM developers that is designed to deliver high throughput, accelerating sync times for new nodes, data analysis, and reducing costs for node operators. Symbol extracts NEM blockchain data into a MongoDB instance, which greatly improves accessibility. By pushing these MongoDB snapshots to Tardigrade—Storj Labs’ decentralized cloud storage service—NEM can make the data even more accessible by leveraging the service’s decentralized architecture.
Tardigrade’s decentralized architecture makes it a great place to store large datasets that are downloaded from many different locations, such as blockchain data. With nearly 9,000 nodes located around the world, Tardigrade has a very wide distribution, making downloads fast even from remote locations. The platform has been designed to easily integrate with an array of open source software partners including MongoDB.
“To drive wide adoption of blockchains, we need to greatly accelerate their speed and scalability and our team has made this a top priority for NEM,” said Dave Hodgson, Chief Investment Officer at NEM Group. “We’re excited about this community-led integration with Tardigrade by IoDLT, as it supports the ecosystem’s performance goals, while also adding to our decentralized infrastructure. By leveraging new technologies, approaches, and working together with robust projects like Storj to solve some of the biggest challenges in the blockchain industry, we will help drive broader adoption.”
Every file uploaded to Tardigrade is end-to-end encrypted by design, erasure-coded for redundancy, and stored across 80 uncorrelated end-points. A file can be rebuilt by downloading any 30 of its 80 parts. This delivers cross-geography redundancy for every file at no additional cost. The platform’s decentralized architecture also means that end-points have a greater geographic distribution, making it much faster to download from anywhere in the world.
JCI US and Trend Micro partner to research and develop SIM card-based mobile network security solutions
JCI US Inc., a subsidiary of Japan Communications Inc., (JCI, Tokyo Stock Exchange First Section code: 9424), and provider of secure and reliable communications, and Trend Micro Inc. (T: 4704), a global leader in cybersecurity solutions, today announced the completion of the proof-of-concept phase of their joint research and development in to SIM card based security solutions. The first phase of the research and development centered on securing mobile devices deployed within CBRS private 4G/5G networks via the SIM card. Future R&D efforts will focus on utilizing digital signatures and blockchain technology housed on the SIM card to ensure security and create circles of trust for mobile devices connected to a CBRS or another network. These efforts will leverage the JCI Group’s world-leading FPoS (Fintech Platform over SIM) blockchain version and Trend Micro’s Mobile Network Security (MNS) solution.
The joint research project took place in JCI US’ Denver SIM Technology and CBRS lab environment. Trend Micro and JCI US engineers deployed programmed SIM cards to Internet of Things (IoT) devices connected to a JCI US private 4G/5G network. The Proof-of-Concept aimed to confirm the ability to secure the IoT device via technologies housed on its SIM card. The testing successfully confirmed that malicious actors can be successfully blocked from the network even in cases where they manage to physically access a good device on the network and swap the SIM card to a compromised, bad device. Additionally, the joint research successfully highlighted how DDoS and other attacks from inside the network can be automatically identified and stopped via the SIM card by directly interacting with Trend Micro Virtual Network Function Suite (VNFS), which utilizes a zero trust security model. As a final stage of the first phase of the project, JCI US deployed and validated the solution within its commercial CBRS network at Southlands, a major mall in Colorado.
For the next phase of R&D, JCI US will expand FPoS technology to the Secure IoT area by collaborating with Trend Micro, a world leading cyber security company, and combining FPoS with Blockchain. In this phase, FPoS will generate “blockchainable” data so that information generated in the IoT terminal can be sent directly to the blockchain, minimizing the risk of compromise between the original data point and the blockchain data storage. Using blockchain, FPoS for Secure IoT and Trend Micro’s MNS layered security will be used to secure individual endpoints, for example through digital signature based firmware validation where if an endpoint’s firmware fails validation and is identified as having been changed without authorization, the endpoint is denied access to the network.
Regarding the completion of the proof-of-concept testing for Trend Micro’s MNS Endpoint Security utilizing SIM cards, JCI US President and COO Greg Deickman said “The SIM card is a discrete and highly secure computer housed inside all cellular devices. The JCI Group has long recognized this and created its Fintech Platform over SIM (FPoS) to provide the world’s most secure ID for the digital age, delivered via a SIM card. We are pleased to be working with Trend Micro to develop SIM card solutions to augment their layered security suite of products and services in 5G private networks to secure enterprise end-points and networks.”
Upon hearing of the successful delivery of the proof-of-concept, Akihiko Omikawa, executive vice president of IoT security for Trend Micro, said: “With over 30 years of security expertise and continuous innovation, Trend Micro protects and secures businesses, governments, and consumers with connected solutions across cloud workloads, endpoints, email, IoT, networks and telecom environments. Our Mobile Network Security is a comprehensive platform for protecting cellular networks and untrusted IoT devices. We’re delighted to be collaborating with JCI US, a leader in their industry, to make this vision a reality.”
In the recent past, various eye-opening revelations have been made about spying by government and private organizations. As a result, there has been a growing interest in how people can keep their communications private. After all, nobody likes to have his or her private conversations being snooped on.
Why Digital Privacy Matters So Much
Today, most people have their lives connected to their digital identities. With just a few keystrokes, hackers could empty your bank account and take measures that destroy your lives and the lives of those around you. Today, keeping your private communications is not simply a matter of philosophy; it is about guarding your livelihood. There are numerous examples of people who have their finances ruined because their private details leaked online.
How to Preserve Privacy
Today, there are various options for preserving privacy. For instance, you can opt to use a messaging service that offers end-to-end encryption. There are encrypted email services that allow you to send and receive encrypted emails to your friends and business partners. In general, there are numerous platforms and tools online to help you protect your privacy. It is especially important when you are sending sensitive documents with personal details.
Using Encrypted Phones
The problem with using encrypted apps and platforms is that communications still take place over an unsecured phone. As a result, even when those snooping on you cannot access these services, they can still access the phone itself and discover private details about you.
It is the reason why people seeking more protection are turning to encrypted phones. Cryptophones, as secure encrypted phones are called, offer a high degree of privacy protection compared to using individual apps. The pones use high-grade encryption to protect every aspect of the phone.
Consequently, those trying to gain access to any secure information will fail. Another benefit of these phones is that they encrypt voice communications between the two parties using the phones. The result is that anyone can discuss sensitive information on air without the fear that their information is visible to third parties, who might have malicious intent.
How to Pick a Secured Encrypted Phone
Besides communication, a modern Cryptophone should enable you to conduct financial transactions anonymously. You should thus go for a phone with full cryptocurrency supports. Cryptocurrencies ensure that your financial transactions do not go through a central hub, where they can be tracked.
Another you should look for is protection from GMS and GPS location tracking and IMSI catcher. The feature ensures that not only is your digital footprint protected but your physical movements also remain private.
A good example of a cryptophone that secures your privacy is the secure, encrypted Ano Phone from Germany. The phone is fitted with a protected Android OS that eliminates the risky backdoor APIs and Google library with tracking services. It arrives with a mobile-first secure private VPN service, and a firewall. It ensures all your private details remain protected at all times. The phone also brings support for cryptocurrencies and other payment options in favor of discerning customers. In recent comparisons and longterm tests, Ano Phone encryption on the hardware disk and the communication with end-to-end have been confirmed. In addition to the high-level security layer, it takes care of the OS performance, not slowing down though meeting the high encryption requirement and saving your battery with VPN running without leaks or interruptions.
Another option is the EMP line of phones from Canada. These phones also offer encrypted storage as well as secure voice and text communication. Other features included in the phone are secure call history protection, dynamic key generation after each call with same phone, and the lack of a central key management system. The device protects the data on the disk by software encryption. The product is not optimized for VPN usage for longterm but compatible for VPN on Wireless Lan without mobile data connections. By customer support, additional end-to-end communication tools can be purchased.
Besides, we found a lot of bad apples on the market with different brand names that still offer Google and Blackberry devices with built-in backdoors. Features like remote access, remote wipe, enrollment or distribution let you give up control to the provider, put privacy at risk and are a red flag.
In general, if your line of work entails handling sensitive communications over the internet, it is important to protect yourself. You never know what malicious actor could be dropping in on your calls. Cryptophones are also great for anyone who values their privacy and who wants to stay safe amidst the growing digitization of everyday life and the growth in cybercrime, especially identity theft.
DeFi Token WGRT Hit the New High 2020
As NewsBTC reported, Tron’s fomer Cofounder joined WaykiChain DeFi project as the Strategic Marketing Advisor. At the mean time, the DeFi token WGRT moon to 500% on August 13th (UTC Time).
Though It has been claimed that after the shocking rocketing wave of DeFi token WGRT on OKEx, the market might potentially have its correction.
However, the price shown on OKEx Exchange of WGRT shows a great new high, breaks the record the ROI 500% to almost 600% and keeps its trend substantially skyrocketing towards 1000%.
The token design of DeFi token WGRT with its low circulation rate in marketing less than 10% and the marvelous market speculating as well as the crazy investors based in HongKong and China will push the WGRT to a higher level which will lasts at least 10 months.
The new member from Tron will cause a gravity effect to attract more investors rushing to the race of DeFi WGRT, stared by Vincent, Global Partner of Hong Kong WaykiChain Technology Ltd.
6 Tips You Need to Know About DeFi WGRT
1. Low circulation supply less than 10% and huge market value.
2. WGRT will be constantly repurchased and destroyed to increase the users’ benefits with its DeFi yield farming design.
3. WGRT is a deflationary token, and the rise WGRT price can be maintained for about 1 year.
4. WGRT has strict control over the market value and the price is bound to rise. The price does not follow the market fluctuations.
5. During the process of ‘3-12’ collapse, the whole system had stood the test with no congestion and bad debt without issuing additional tokens.
6. Huge users in China and Hong Kong more than 2 Million WaykiChain followers since 2017.
OTC Markets Group Welcomes TAAL Distributed Information Technologies Inc. to OTCQX
OTC Markets Group Inc. (OTCQX: OTCM), operator of financial markets for over 10,000 U.S. and global securities, today announced TAAL Distributed Information Technologies Inc. (CSE: TAAL;OTCQX: TAALF), a provider of value-added blockchain services, has qualified to trade on the OTCQX® Best Market. TAAL Distributed Information Technologies Inc. upgraded to OTCQX from the Pink® market.
TAAL Distributed Information Technologies Inc. begins trading today on OTCQX under the symbol “TAALF.” U.S. investors can find current financial disclosure and Real-Time Level 2 quotes for the company on www.otcmarkets.com.
Upgrading to the OTCQX Market is an important step for companies seeking to provide transparent trading for their U.S. investors. For companies listed on a qualified international exchange, streamlined market standards enable them to utilize their home market reporting to make their information available in the U.S. To qualify for OTCQX, companies must meet high financial standards, follow best practice corporate governance and demonstrate compliance with applicable securities laws.
Securities Law USA, PC acted as the company’s OTCQX sponsor.
About TAAL Distributed Information Technologies Inc.
TAAL Distributed Information Technologies Inc. delivers value-added blockchain services, providing professional grade, highly scalable blockchain infrastructure and transactional platforms to support businesses building solutions and applications upon the Bitcoin SV platform, and developing, operating, and managing distributed computing systems for enterprise users.
About OTC Markets Group Inc.
OTC Markets Group Inc. (OTCQX: OTCM) operates the OTCQX® Best Market, the OTCQB® Venture Market and the Pink® Open Market for 10,000 U.S. and global securities. Through OTC Link® ATS and OTC Link ECN, we connect a diverse network of broker-dealers that provide liquidity and execution services. We enable investors to easily trade through the broker of their choice and empower companies to improve the quality of information available for investors.
PayPal to be available on Pundi X’s blockchain-based POS devices
Singapore-based blockchain developer Pundi X has recently announced that its blockchain-based point-of-sale device, the XPOS®, is now capable of supporting PayPal. Deployed in over 30+ countries all over the world from Japan to Brazil, the XPOS® has been providing scores of brick-and-mortar stores with an alternative payment method to cash by allowing them to securely and efficiently transact on the blockchain.
The idea for the new development came about after Pundi X ran an official Twitter poll asking their followers which mobile payment app they’d like to see first supported on the XPOS. Among the choices were other platforms like WeChat Pay/Alipay, GoPay and PayTM but PayPal received an overwhelming majority of the vote, with nearly 70% of all respondents choosing the California-based service.
Since 1998, PayPal has provided millions around the world with a way to transfer funds online and has provided an efficient alternative to traditional paper methods for online vendors, auction sites and countless more. Its inclusion on XPOS machines will make it easier for both merchants and customers to streamline their transactions.
“This is definitely exciting for us,” revealed Pundi X CEO and co-founder Zac Cheah. “To be able to support a leading online payment provider in our XPOS devices can give people more confidence in using them, and can move usage of blockchain technology closer to the mainstream.”
PayPal on XPOS® devices will work in pretty much the same way as anywhere else. The online finance platform’s basic features will be functional on XPOS® devices, including accepting payments. This feature will include payments made via email or mobile phone number. In the US, merchants will only have to show a certain QR code for their customers to pay. PayPal Here, on the other hand, offers features for merchants to accept credit card payment.
PayPal’s inclusion to XPOS® devices brings more than just streamlined transactions. It also means that users can easily purchase cryptocurrencies such as BTC, ETH, BNB, NPXS, etc. at any XPOS® merchant who has activated the device’s “Crypto Sale” feature. These coins can then be securely stored in an XPASS Card, which makes dealing with cryptocurrency as simple as using the card to complete a transaction. For better management, the use of the XPASS can also be paired with Pundi X’s XWallet app.
Kronoverse Secure Further Investment From Persimmon Hill Limited and Calvin Ayre
Kronoverse Inc., the independent game-development company behind the CryptoFights skill-based fighting game, and member of ESIC (Esports Integrity Commission), has secured further funding via technology investment firm Persimmon Hill Ltd. and technology entrepreneur Calvin Ayre. This is Persimmon Hill’s first, and Calvin Ayre’s third, investment in Kronoverse.
CryptoFights utilizes the Kronoverse platform which replaces the games networking layer from traditional cloud servers to the Bitcoin SV (BSV) blockchain – a public and auditable ledger. This unlocks massive benefits for gaming by giving the eSports ecosystem a transparent and fair way to have game integrity.
Kronoverse also adds value to ESIC’s mission to be the guardian of eSports integrity in different ways such as the use of blockchain technology and native-cash tournaments. Kronoverse’s use of blockchain technology opens up ways for government regulators to enforce gaming standards since all actions taken in a blockchain game are public and auditable.
Adam Kling, CEO of Kronoverse, commented: “The growth we’ve seen in a relatively short time is hugely encouraging for the company and, obviously, we hope that makes CryptoFights an exciting proposition for investors. To have people with the business and blockchain knowledge of Persimmon Hill coming on board, and further support from online gaming entrepreneur Calvin Ayre who is also a big believer in Bitcoin, is a clear endorsement for a transparent eSports experience.”
Red Cat to Hold Investor Webinar and Q&A Session with CEO on April 28
Red Cat Holdings, Inc. (OTC: RCAT), a leading provider of distributed data storage, analytics and services for the drone industry, today announced its CEO Jeff Thompson will share insight into the company’s recent developments during an investor webinar on Tuesday, April 28, 2020 at 4:05 p.m. ET. A live Q&A session with Thompson will follow the presentation.
Questions can be pre-submitted to [email protected] or online during the event.
About Red Cat
Red Cat (OTC: RCAT) is a leading provider of secure blockchain-based distributed storage, analytics and SaaS for the drone industry. Through its innovative products and leadership, Red Cat provides solutions for regulators to track and review flight data, insurance companies to insure drones, and pilots to become compliant with regulations. Red Cat’s success is driven by a commitment to deliver unrivaled innovation that makes drones trackable, accountable and the sky a safer place. Red Cat is headquartered in San Juan, Puerto Rico. For more information, visit www.redcatpropware.com.
Best Web Crypto Wallet: PRIZM Light Wallet
The initial idea behind the emergence of cryptocurrencies is to ensure anonymity and security when paying for goods and services with the associated depersonalization of finances; ensuring decentralized financial operations and eliminating the possibility of the existence of regulatory bodies as such.
The main problem of cryptocurrency availability for users is a high entry threshold. At the moment, an ordinary user who wants to plunge into the world of cryptocurrencies has only two main options:
1. Understand in detail the technological process of the currency of interest, deploy the node, synchronize the blockchain and learn how to receive / send funds through uncomfortable, complex or congested interfaces / consoles / API
2. Immediately start using “hot” wallets, for the most part completely destroying the pillars on which the idea of cryptocurrency stands
If the complexity of the first paragraph is clear, then what’s wrong with hot wallets, you ask?
Let’s get a look:
1. Hot wallets require data for authorization, at least email, often other, even more personal and personal information. This completely breaks the anonymity of the cryptocurrency user, opening the easy way to personalize your transactions and accounts.
2. Hot wallets store the secret keys to your cryptocurrency on their servers. In this case, you risk immediately in many directions – the server can be hacked and funds stolen; one of the service employees may turn out to be dishonest, or the entire service itself may unexpectedly close without explanation; your secret keys can be transmitted over the Internet without your knowledge and without the necessary conditions to ensure their safety. All these events can be combined and multiply the risks. This centralizes part of the system and breaks the security of cryptocurrency, depriving you of control over your finances – your funds are controlled by the wallet, not by you.
Not all web wallets are the same! After all, the requirement of e-mail, username and password, as well as verification is not an inevitable need, but only an approach that certain developers decided to take.
We found exceptions to the rule, carefully checked them all, talked with the developers, clarifying the nuances, and found an unequivocal leader providing a level of security of access to currency at a level comparable to “cold wallets” like Trezor!
Meet the best «hot» crypto wallet!
PRIZM Light Wallet
Crypto wallet PRIZM Light Wallet got rid of all the shortcomings of hot wallets and provided the best web wallet on the cryptocurrency market.
Security is ensured by the fact that the wallet is just a set of cryptographic encryption and hashing functions, sufficient to perform any actions associated with the secret key directly in the user’s browser without transmitting sensitive information.
To gain access to the wallet, you must use a mnemonic phrase that is optimized for easy memorization by a person
1. Mnemonic phrase – words encoded secret key
2. The raw transaction is signed with the secret key in the browser and only the raw transaction with the finished signature is sent to the server
3. The encrypted data inside the transaction comes from the server, and is decrypted in the browser by the user key
4. The secret key is deleted from memory when you close the tab with the PRIZM Light Wallet.
5. The secret key is not stored on the server and is never sent to the server.
6. New secret keys are created using a complex algorithm in which three objects take part: a browser, a user, and a server hardware random number generator
Details on generating a mnemonic phrase
A new mnemonic phrase for a new wallet is created in several stages:
1. The browser generates a set of random numbers using a secure generator
2. The server generates a second set of random numbers with the Intel RdRand hardware generator and sends it to the browser
3. The browser combines both sets of numbers and creates a basic mnemonic phrase of 17 words (“prizm” plus 16 random)
4. The user adds his own additional 16 characters in the mnemonic phrase
5. A new wallet with a new phrase is ready
This approach makes it impossible for an attacker to reproduce the algorithm to generate identical password phrases, because for this it is necessary to reproduce the state of three systems: a hardware number generator, a user’s computer, and a user’s brain. If with a computer it’s even more or less clear, then fantastic problems await the hacker’s brain and hardware generator.
The created phrase consists of 17 basic words (16 effective, since the first word is always “prizm”) and 16 additional characters entered by the user.
The total size of the dictionary for creating a mnemonic phrase is 1626 words.
In total there are 1626¹⁶ (1626 to the 16th degree) = 2.387419079 × 10⁵¹ possible basic mnemonic phrases, and about 2.857942575 × 10²⁷ possible combinations of an additional 16 characters from the user
The potential number of possible mnemonic phrases created by wallet.prizm.space is 2,387419079 × 10⁵¹ * 2.857942575 × 10²⁷ =
6.82310663 × 10⁷⁸ (6.82310663 times 10 in the power of 78)
pieces, which makes collisions impossible even theoretically, like brute force of a passphrase (if you start breaking a passphrase with brute force, it will end after the heat death of the Universe).
An example of a mnemonic phrase:
prizm opposite crimson both shower precious hopefully here keep trace barelymany upset give image scream movement peaceful reveal
Cryptographic technologies used by wallet.prizm.space:
– Key exchange: Diffie-Hellman protocol on elliptic curves
Well-established and secure protocol
– Symmetric encryption: AES-256 GCM
It is used by the military to transmit classified data of the “Top Secret” class.
– Hashing: SHA-256
– Reed-Solomon Code
It is used for a human-friendly representation of the wallet identifier and correction of user errors when entering it
Security is guaranteed by the approach used to work with the wallet – the online wallet works as a standalone client, using the server only as a source of information and a way to transmit transactions.
A truly outstanding method of creating mnemonic phrases is used.
Security Rating: 10/10
Anonymity and Depersonalization
There are two ways to enter your wallet:
1. Enter the identifier of your wallet – this allows you to view current balances and transactions without placing a secret key, even in browser memory
2. Enter a mnemonic phrase – this allows you to decrypt the contents of transactions and make an outgoing transaction to another wallet
Given that the mnemonic phrase and secret key are not sent over the Internet, the only information that the user reveals is wallet id. No other information is required that violates the anonymity of the wallet – there is no connection between the user’s wallet and his email and / or name. This approach also provides 100% protection against the “man in the middle” attack!
Anonymity is guaranteed by the lack of personal data.
Anonymity rating: 10/10
Decentralization and control
When each user is anonymous and contains his private keys, it is impossible to exercise control over users and there is simply nothing to centralize. However, the IP addresses of visitors can be tracked just like on any other site, however, the success of trying to associate IP with a specific wallet is extremely unlikely.
Decentralization score: 9/10
To start using PRIZM Light Wallet to manage a personal wallet, you need to understand only 3 concepts:
1. Mnemonic phrase – wallet password
2. Public key
3. Wallet ID
The meanings of these concepts are close to intuitive for an ordinary user. This is the lowest entry threshold on the cryptocurrency market to date.
The interface is as minimalistic and conservative as possible, providing access to the necessary information – transactions, messages and balance – without distracting the eye with tinsel. The absence of “excesses” and “luxury” allows us to provide the maximum wallet performance – we have not yet met a web wallet for cryptocurrency without periodic juggling and loading. Even the same giant https://blockchain.com/wallet periodically raises performance questions.
We believe that minimalism increases accessibility for users – and cryptocurrencies are actively gaining popularity among non-IT people.
And that is important.
Availability Rating: 10/10
Final grade: 39/40
PRIZM Light Wallet is a real cryptocurrency wallet in its purest form, that is how direct access to cryptocurrency should be. He is quite capable сompete with hardware wallets regarding usage safety.
Let’s hope that other wallets will go in the same direction and increase not additional fields to fill in personal data, but cryptographic functions directly in the browser and try to ensure anonymity of users.
When using wallet.prizm.space, you temporarily place your wallet key in the RAM of your computer / phone / tablet – for your part, you should take care of the safety of your devices. In the ideal case, the mnemonic phrase is stored permanently in only one place – in your head, which is the safest, but sometimes not the most reliable repository.
The threats that await while using wallet.prizm.space are only on our user conscience; You can lose your key in the following situations:
1. Lose the mnemonic phrase
2. Make the root of your phone or turn off the antivirus on the computer and have specialized viruses on the device
Let’s see what risks exist if you use the Trezor hardware wallet – the list of threats is identical:
1. Lose Trezor
2. Flash Trezor with unofficial “custom” firmware and have specialized viruses on the device
On the PRIZM Light Wallet side, all possible measures have been implemented in reality to provide the best service to cryptocurrency users, and we believe that other wallets should focus on it.
MicroBT to hold the Global WhatsMiner M30 Launch Event online
MicroBT will hold the Global WhatsMiner M30 Launch Event to explain in detail the M30 series of full-line products and sales strategies and share. In the current epidemic situation, miners and people in the entire cryptocurrency industry are in a difficult winter period. At this difficult time, MicroBT hopes to spend the time with practitioners and stick to their beliefs. Bitcoin mining senior practitioner F2Pool’s co-founder Chun, and Adam Back CEO of Blockstream will show their blessings from the videos.
In early December of last year, mining machine manufacturer MicroBT announced the parameters of the WhatsMiner M30 series, saying that the power consumption ratio of the entire series of bitcoin rigs will be lower than 50W / T, which has caused widespread concern among cryptocurrency mining practitioners for a while.
In mid-May this year, Bitcoin will usher in the third halving of history, which is also regarded as a critical period for the test of the computing power of the entire Bitcoin network. Miners are also updating their equipment for the arrival of the halving. In order to survive and develop, miners must gain a comparative advantage over their peers. The game process of miner behavior in Bitcoin halving is actually quite interesting. Blockware Solutions, a cryptocurrency mining service provider, conducted a detailed merger and analysis of the game stage.
The online event can break the shackles of physical space through the online method, and deliver the latest news of M30 in the first time efficiently. Since MicroBT announced the news of the new product launch of the WhatsMiner M30 series, it has raised widespread concern among peers in the mining circle and practitioners in the blockchain industry. Therefore, MicroBT has been sharing the latest news through Twitter and Telegram groups.
Various actions revealed MicroBT’s willingness to improve user operation and after-sales service, from a relatively primary operation promotion method to a more professional service method, and more actively understand users’ feedback. The exchanges enable users to understand WhatsMiner more comprehensively and conveniently, which reflects the determination of MicroBT to deeply cultivate the industry and carefully serve users, so that the new WhatsMiner M30 series can provide help to more miners and overcome difficulties.
Blockchain2 weeks ago
Mphasis and R3 Partner to Develop a Blockchain-Based Payments and Financing Network for Global Supply Chains
Business3 weeks ago
Curzio Research Completes Listing On MERJ Exchange
Business2 weeks ago
AST’s Mutual Fund Proxy Campaign Platform ProxyIQ® Recognized as a 2020 Benzinga Fintech Awards Finalist
Blockchain3 weeks ago
BlocPal Partners with Shashank Joshi to Form mBnk, Phygital Financial Marketplace for India
Blockchain3 weeks ago
Verde Leaf Signs Deal with TRACE for Supply Chain Traceability Services
Blockchain2 weeks ago
AuBit announces 400,000,000 Freeway Token investment worth US$3.2m by GreenBank portfolio company
Blockchain2 weeks ago
CoinAd.media has Launched Marketplace for Ad Crypto Services
Blockchain1 week ago
Blockchain Labs Introduces InfraBlockchain – the Blockchain Solution for Governments and Enterprises