×
Bitcoin

John McAfee Loses Bet: Bitcoin Hasn't Hit $500K (mashable.com) 49

Slashdot reader Charlotte Web quotes Mashable: Three years ago on this date, on July 17, 2017, McAfee, the eccentric founder of the antivirus software company bearing his name, made the bet of a lifetime. McAfee made a bet that in three years a single bitcoin (1 BTC) would be worth $500,000.

Now while most people would throw down money to make this bet, McAfee had a very different idea. "if not, I will eat my **** on national television...."

Fast forward to July 17, 2020, three years from the day McAfee made his bet. Today, a bitcoin is worth around $9,150. It's certainly up from three years ago, sure. But we're far away from $500,000. The world may be very different from the one we were living in three years ago, but a bet is a bet.

Many on Twitter reminded McAfee that it was time to make good on his bet.

McAfee's response? He appears to be chickening out... "The bet was the end 8f 2020."

McAfee also tweeted that at the end of 2020, he'd still honor the bet.

"Myself, or, perhaps, a subcontractor :)"
Twitter

Many New Details Emerge About Twitter's Breach (nytimes.com) 32

The New York Times claims to have traced the origins of a Twitter security breach to "a teasing message between two hackers late Tuesday on the online messaging platform Discord." [The Times' article was also republished here by the Bangkok Post.] "yoo bro," wrote a user named "Kirk," according to a screenshot of the conversation shared with The New York Times. "i work at twitter / don't show this to anyone / seriously." He then demonstrated that he could take control of valuable Twitter accounts — the sort of thing that would require insider access to the company's computer network. The hacker who received the message, using the screen name "lol," decided over the next 24 hours that Kirk did not actually work for Twitter because he was too willing to damage the company. But Kirk did have access to Twitter's most sensitive tools, which allowed him to take control of almost any Twitter account...

[F]our people who participated in the scheme spoke with The Times and shared numerous logs and screen shots of the conversations they had on Tuesday and Wednesday, demonstrating their involvement both before and after the hack became public. The interviews indicate that the attack was not the work of a single country like Russia or a sophisticated group of hackers. Instead, it was done by a group of young people — one of whom says he lives at home with his mother — who got to know one another because of their obsession with owning early or unusual screen names, particularly one letter or number, like @y or @6... "lol" did not confirm his real-world identity, but said he lived on the West Coast and was in his 20s. "ever so anxious" said he was 19 and lived in the south of England...

The group began by selling access to highly-coveted Twitter handles for bitcoin, according to the Times, including the accounts @dark, @w, @l, @50 and @vague.

Brian Krebs had suggested tweets of Twitter's internal tools came from "notorious SIM swapper" PlugWalkJoe — but the Times spoke to the 21-year-old (real name: Joseph O'Connor) who says his only involvement was taking possession of the breached Twitter account @6. "I don't care. They can come arrest me. I would laugh at them. I haven't done anything." Mr. O'Connor said other hackers had informed him that Kirk got access to the Twitter credentials when he found a way into Twitter's internal Slack messaging channel and saw them posted there, along with a service that gave him access to the company's servers. People investigating the case said that was consistent with what they had learned so far.
Meanwhile, Twitter has said, "The attackers successfully manipulated a small number of employees and used their credentials to access Twitter's internal systems, including getting through our two-factor protections. As of now, we know that they accessed tools only available to our internal support teams."

But Mashable brings more bad news: In an update posted on Friday night, Twitter ran down what its internal investigation has discovered so far. One piece of previously unknown information: the hacker(s) downloaded the personal account data for up to eight of the accounts which they had access to.

I should make this clear up front: that data includes direct messages...

As rumors spread around the platform as to which eight accounts could have been targeted, Twitter released an additional clarification... "[T]o address some of the speculation: none of the eight were Verified accounts..." Twitter also says 130 Twitter accounts were targeted... The company said that hackers gained access to 45 of them via a password reset and, for a second time, reiterated that the passwords used on the accounts were not accessed.

An article shared by Slashdot reader kimmmos notes that one account that went untouched was that of U.S. president Donald Trump. The Verge reports "it could be because Twitter has implemented extra protections for his account." But responding to the other account breaches, "A Twitter spokesperson confirmed the company has been in touch with the FBI," reports CNN. "We're acutely aware of our responsibilities to the people who use our service and to society more generally," Twitter added in a blog post.

"We're embarrassed, we're disappointed, and more than anything, we're sorry."
Social Networks

What Twitter's Worst Hack Means For Its Bottom Line (bloomberg.com) 42

The breach revealed Twitter's engineering prowess and management practices as subpar. Hedge fund Elliott Management can't be happy about its investment. From a report: Even if Twitter's user growth is relatively unaffected, shareholders shouldn't overlook what the latest in a long series of security incidents says about the how the company works and why its stock has been such a disappointment: Twitter's engineering prowess and management practices are simply second-rate. On Wednesday, numerous Twitter accounts from business leaders, celebrities to major companies -- including Elon Musk, Barack Obama, Jeff Bezos and Apple -- were hacked and posted cryptocurrency scam messages, promising to double the amount of any funds sent to a specific Bitcoin address. Twitter later admitted to the unprecedented nature of the breach, saying it believes it fell victim to a "coordinated social engineering attack," where hackers were able to take control of its internal systems. CEO Jack Dorsey tweeted, "Tough day for us at Twitter. We all feel terrible this happened."

Certainly, hedge fund Elliott Management must not be pleased with the turn of events. The activist hedge fund and Twitter stakeholder reached an agreement with the company earlier this year to restructure the company's board, standing down on an initial goal of replacing management including Dorsey. The lackluster security is more ammunition for Twitter's critics who have long questioned the company's efficacy in using its engineering resources. Even as Chinese super-apps such as WeChat have expanded upon core messaging services to build vast consumer internet empires, and Facebook has transformed its platforms into advertising money machines, the basic nature of Twitter's offering hasn't changed much over the past decade. That, even as the company spends an incredible amount in research and development annually -- including nearly $700 million last year alone. Where does all the money go?

Security

Who's Behind Wednesday's Epic Twitter Hack? (krebsonsecurity.com) 75

Brian Krebs has written a blog post with clues about who may have been behind yesterday's Twitter hack, which had some of the world's most recognizable public figures tweeting out links to bitcoin scams. An anonymous reader shares an excerpt from the report (though we strongly recommend you read the full analysis here): There are strong indications that this attack was perpetrated by individuals who've traditionally specialized in hijacking social media accounts via "SIM swapping," an increasingly rampant form of crime that involves bribing, hacking or coercing employees at mobile phone and social media companies into providing access to a target's account. In the days leading up to Wednesday's attack on Twitter, there were signs that some actors in the SIM swapping community were selling the ability to change an email address tied to any Twitter account. In a post on OGusers -- a forum dedicated to account hijacking -- a user named "Chaewon" advertised they could change email address tied to any Twitter account for $250, and provide direct access to accounts for between $2,000 and $3,000 apiece. "This is NOT a method, you will be given a full refund if for any reason you aren't given the email/@, however if it is revered/suspended I will not be held accountable," Chaewon wrote in their sales thread, which was titled "Pulling email for any Twitter/Taking Requests."

Hours before any of the Twitter accounts for cryptocurrency platforms or public figures began blasting out bitcoin scams on Wednesday, the attackers appear to have focused their attention on hijacking a handful of OG accounts, including "@6." That Twitter account was formerly owned by Adrian Lamo -- the now-deceased "homeless hacker" perhaps best known for breaking into the New York Times's network and for reporting Chelsea Manning's theft of classified documents. @6 is now controlled by Lamo's longtime friend, a security researcher and phone phreaker who asked to be identified in this story only by his Twitter nickname, "Lucky225."[...] But around the same time @6 was hijacked, another OG account -- @B -- was swiped. Someone then began tweeting out pictures of Twitter's internal tools panel showing the @B account. Another Twitter account -- @shinji -- also was tweeting out screenshots of Twitter's internal tools. Minutes before Twitter terminated the @shinji account, it was seen publishing a tweet saying "follow @6," referring to the account hijacked from Lucky225.

Cached copies of @Shinji's tweets prior to Wednesday's attack on Twitter are available here and here from the Internet Archive. Those caches show Shinji claims ownership of two OG accounts on Instagram -- "j0e" and "dead." KrebsOnSecurity heard from a source who works in security at one of the largest U.S.-based mobile carriers, who said the "j0e" and "dead" Instagram accounts are tied to a notorious SIM swapper who goes by the nickname "PlugWalkJoe." Investigators have been tracking PlugWalkJoe because he is thought to have been involved in multiple SIM swapping attacks over the years that preceded high-dollar bitcoin heists. Now look at the profile image in the other Archive.org index of the @shinji Twitter account (pictured below). It is the same image as the one included in the @Shinji screenshot above from Wednesday in which Joseph/@Shinji was tweeting out pictures of Twitter's internal tools.

This individual, the source said, was a key participant in a group of SIM swappers that adopted the nickname "ChucklingSquad," and was thought to be behind the hijacking of Twitter CEO Jack Dorsey's Twitter account last year. The mobile industry security source told KrebsOnSecurity that PlugWalkJoe in real life is a 21-year-old from Liverpool, U.K. named Joseph James Connor. The source said PlugWalkJoe is in Spain where he was attending a university until earlier this year. He added that PlugWalkJoe has been unable to return home on account of travel restrictions due to the COVID-19 pandemic. [...] If PlugWalkJoe was in fact pivotal to this Twitter compromise, it's perhaps fitting that he was identified in part via social engineering.

Bitcoin

TikTok Traders Are Pumping Joke Cryptocurrency Dogecoin -- and the Price is Up 95% (fortune.com) 29

Day traders on viral video app TikTok are encouraging people to speculate on a joke cryptocurrency called Dogecoin. Based on an old Internet meme -- an overly sincere and whimsically grammar-challenged Shiba Inu dog -- the digital coin was developed as a Bitcoin-spinoff in 2013, after which it quickly rose to prominence as a gag. From a report: The shenanigans of the cryptocurrency-pumpers appear to be working, at least for now. The price of Dogecoin has nearly doubled since July 6th, rising 95% to $0.00448 from $0.0023, according to data from OnChainFX, a cryptocurrency data tracker. The price of Dogecoin peaked in January 2018 at $0.013 before promptly crashing. It appears a flood of stuck-at-home market hypers is behind the push to hype the cryptocurrency. "Go invest in Dogecoin, make me rich," wrote one pumper. "They cant stop us all," encouraged another. Yet one more: "worth it. i swear #stocks #coins #dogecoin #money"
Businesses

Venture Capitalists' Critiques of Journalism Secretly Leaked to Journalists (vice.com) 118

A confrontation between venture capitalists and journalists has been slowly playing out on Twitter — and in an incendiary article on VICE US.

It started when...
  • A luggage startup's co-CEO complained on Instagram about young reporters who "forgo their personal ethics."
  • A New York Times reporter called the posts "incoherent" and "disappointing."
  • Angel investor Balaji S. Srinivasan (also the former CTO of Coinbase) later said the reporter "attacked" the co-CEO, who he then needed to defend — calling the reporter a sociopath in a multi-tweet thread.
  • The New York Times reporter tweeted that investor had "been ranting about me by name for months now."

The reporter and the angel investor both finally ended up on Clubhouse, an elite invitation-only audio social network popular with venture capitalists, but the reporter left early. Later Vice published leaked audio of the subsequent conversation, which included Srinivasan and several other Andreessen Horowitz venture capitalists, in which Vice says participants "spent at least an hour talking about how journalists have too much power to 'cancel' people and wondering what they, the titans of Silicon Valley, could do about it."

Then things got really ugly...


Security

New Mac Ransomware Is Even More Sinister Than It Appears (wired.com) 49

An anonymous reader quotes a report from Wired: The threat of ransomware may seem ubiquitous, but there haven't been too many strains tailored specifically to infect Apple's Mac computers since the first full-fledged Mac ransomware surfaced only four years ago. So when Dinesh Devadoss, a malware researcher at the firm K7 Lab, published findings on Tuesday about a new example of Mac ransomware, that fact alone was significant. It turns out, though, that the malware, which researchers are now calling ThiefQuest, gets more interesting from there. In addition to ransomware, ThiefQuest has a whole other set of spyware capabilities that allow it to exfiltrate files from an infected computer, search the system for passwords and cryptocurrency wallet data, and run a robust keylogger to grab passwords, credit card numbers, or other financial information as a user types it in. The spyware component also lurks persistently as a backdoor on infected devices, meaning it sticks around even after a computer reboots, and could be used as a launchpad for additional, or "second stage," attacks. Given that ransomware is so rare on Macs to begin with, this one-two punch is especially noteworthy.

Though ThiefQuest is packed with menacing features, it's unlikely to infect your Mac anytime soon unless you download pirated, unvetted software. Thomas Reed, director of Mac and mobile platforms at the security firm Malwarebytes, found that ThiefQuest is being distributed on torrent sites bundled with name-brand software, like the security application Little Snitch, DJ software Mixed In Key, and music production platform Ableton. K7's Devadoss notes that the malware itself is designed to look like a "Google Software Update program." So far, though, the researchers say that it doesn't seem to have a significant number of downloads, and no one has paid a ransom to the Bitcoin address the attackers provide. [...] Given that the malware is being distributed through torrents, seems to focus on stealing money, and still has some kinks, the researchers say it was likely created by criminal hackers rather than nation state spies looking to conduct espionage.

Bitcoin

Someone Mysteriously Sent Almost $1 Billion In Bitcoin (vice.com) 147

Someone transferred bitcoins worth close to $1 billion on Tuesday morning, a move that was public for everyone to see while the identities of the sender and receiver remain unknown. Motherboard reports: Big money moves hiding in plain sight tend to be events of some interest among Bitcoiners. Decrypt noted that the sending wallet was recognized as the largest Bitcoin wallet not known to be associated with a business such as an exchange. This means that it could belong to a wealthy private individual, or it could really belong to an exchange, investor, or other business that is simply currently unknown. There's no obligation to publicize which Bitcoin addresses one controls, and if nobody else puts two and two together, one's activities may remain shrouded in pseudonymity.

If the Bitcoin wallet belongs to someone legit, then it's likely the transfer was internal to the business, or it represents a large purchase of goods or services, or the sale of bitcoins. Regardless of what it was, the business would be expected to pay taxes in any relevant circumstances. If the transfer wasn't legit, well, pseudonymity and the ability to freely move money without the pre-approval of an authority is the point of Bitcoin. That being said, law enforcement is certainly aware of Bitcoin at this stage in the game and if I'm talking about this transfer then I'm sure more important people could be, too.

Security

A Hacker Gang is Wiping Lenovo NAS Devices and Asking for Ransoms (zdnet.com) 36

A hacker group going by the name of 'Cl0ud SecuritY' is breaking into old LenovoEMC (formerly Iomega) network-attached storage (NAS) devices, wiping files, and leaving ransom notes behind asking owners to pay between $200 and $275 to get their data back. From a report: Attacks have been happening for at least a month, according to entries on BitcoinAbuse, a web portal where users can report Bitcoin addresses abused in ransomware, extortions, cybercrime, and other online scams. Attacks appear to have targeted only LenovoEMC/Iomega NAS devices that are exposing their management interface on the internet without a password. ZDNet was able to identify around 1,000 such devices using a Shodan search.
Bitcoin

You Can Now Buy Bitcoin At CVS, 7-Eleven, Rite-Aid (forbes.com) 64

Bitcoin ATM operator LibertyX now offers bitcoin purchases at the United States' most popular convenience and drug stores. From a report: Per a PR Newswire released on Jun 22, the company has finished rolling out the buying option which will be available in "20,000 retail locations around the U.S., including major convenience store and pharmacy chains, such as 7-Eleven, CVS Pharmacy, and Rite Aid." This service will give LibertyX users the option to purchase bitcoin with cash at any of the participating retailers' cashier counters. These 20,000 new buying centers add to the 5,000 Bitcoin ATMs that the company has established across the United States since it launched in 2014.
The Internet

'Largest Distributed Peer-To-Peer Grid' On Earth Laying Foundation For A Decentralized Internet (forbes.com) 80

Forbes reports on ThreeFold, an ambitious new "long-term project to rewire the internet in the image of its first incarnation: decentralized, unowned, accessible, free." "We have 18,000 CPU cores and 90 million gigabytes, which is a lot of capacity," founder Kristof de Spiegeleer told me recently on the TechFirst podcast. "It's probably between five and ten times more than all of the capacity of all the blockchain projects together..."

"It's a movement," de Spiegeleer says about ThreeFold. "It's where we invite a lot of people to...basically help us to build a new internet. Now it sounds a little bit weird building a new internet. We're not trying to replace the cables... what we need help with is that we get more compute and storage capacity close to us." That would be a fundamentally different kind of internet: one we all collectively own rather than just one we all just use.

It requires a lot of different technology for backups and storage, for which ThreeFold is building a variety of related technologies: peer-to-peer technology to create the grid in the first place; storage, compute, and network technologies to enable distributed applications; and a self-healing layer bridging people and applications. Oh, and yes. There is a blockchain component: smart contracts for utilizing the grid and keeping a record of activities. "Farmers" (read: all of us) provide capacity and get micropayments for usage.

So instead of a Bitcoin scenario where some of the fastest computers in the world waste country-scale amounts of electricity doing arcane math to create an imaginary currency with dubious value (apologies, are my biases showing?) you have people providing actual tangible services for others in exchange for some degree of cryptocurrency reward. Which, in my (very) humble opinion, offers a lot more social utility...

ThreeFold and partners have invested more than $40 million in make it happen, de Spiegeleer says, and there are more than 30 partners working on the project or onboarding shortly. "So it's happening," he says.

In the interview, de Spiegeleer points out 80% of current internet capacity is owned by less than 20 companies, arguing on the podcast that "It really needs to be something like electricity.

"It needs to be everywhere and everyone needs to have access to it. It needs to be cost effective, it needs to be reliable, it needs to be independent..."
The Almighty Buck

The US Government Just Paid a Crypto Startup to Explore Digital Dollars (futurism.com) 49

"The U.S. federal government just awarded a grant to the blockchain startup Key Retroactivity Network Consensus (KRNC)," reports Futurism.com, "to study the feasibility of integrating cryptocurrency into the economy." That doesn't mean that the U.S. is going to pivot to a digital blockchain dollar, CoinDesk reports. Rather, the National Science Foundation funded KRNC because it's interested in exploring new ways to improve the security of digital transactions.

The protocol KRNC is developing would meter out a new cryptocurrency in proportion to a user's existing wealth, CoinDesk reports, instead of requiring them to purchase or actively mine new crypto. In other words, it wouldn't make people richer, but it would grant them an alternative means to transfer funds online.

"Bitcoin, which runs on the principle of Proof-of-Work, is wasteful," KRNC CEO Clint Ehrlich told CoinDesk. "It requires people to waste money and computing power solving pointless problems."

Java

New Java-Based Ransomware Targets Linux and Windows Systems (zdnet.com) 37

"A newly uncovered form of ransomware is going after Windows and Linux systems," reports ZDNet, "in what appears to be a targeted campaign." Named Tycoon after references in the code, this ransomware has been active since December 2019 and looks to be the work of cyber criminals who are highly selective in their targeting. The malware also uses an uncommon deployment technique that helps stay hidden on compromised networks. The main targets of Tycoon are organisations in the education and software industries.

Tycoon has been uncovered and detailed by researchers at BlackBerry working with security analysts at KPMG. It's an unusual form of ransomware because it's written in Java, deployed as a trojanised Java Runtime Environment and is compiled in a Java image file (Jimage) to hide the malicious intentions... [T]he first stage of Tycoon ransomware attacks is less uncommon, with the initial intrusion coming via insecure internet-facing Remote Desktop Protocol servers. This is a common attack vector for malware campaigns and it often exploits servers with weak or previously compromised passwords. Once inside the network, the attackers maintain persistence by using Image File Execution Options (IFEO) injection settings that more often provide developers with the ability to debug software. The attackers also use privileges to disable anti-malware software using ProcessHacker in order to stop removal of their attack...

After execution, the ransomware encrypts the network with files encrypted by Tycoon given extensions including .redrum, .grinch and .thanos — and the attackers demand a ransom in exchange for the decryption key. The attackers ask for payment in bitcoin and claim the price depends on how quickly the victim gets in touch via email.

The fact the campaign is still ongoing suggests that those behind it are finding success extorting payments from victims.

Bitcoin

Latest Satoshi Nakamoto Candidate Buying Bitcoin No Matter What (bloomberg.com) 53

Adam Back's name has surfaced again in the crypto community's favorite guessing game: Who is the anonymous creator of Bitcoin who went by the pseudonym Satoshi Nakamoto. From a report: In mid-May, YouTube channel Barely Sociable, with nearly 400,000 subscribers, released a 40-minute video claiming that 49-year-old Back is Satoshi. The video has since raked up nearly 300,000 views. Back does check off a lot of the boxes: He is a British cryptographer with a PhD in computer science, who, back in the 1990s, invented Hashcash, a system of verification that Bitcoin uses. He is also the first person Satoshi contacted online in 2008, asking about Hashcash.

So is he Satoshi? "No, I am not," Back said in a June 1 phone interview from Malta. But he also pointed out it's better for the creator of the world's largest cryptocurrency to remain a mystery. "It's generally viewed at this point as better that the founder of Bitcoin is not known, because a lot of people have a hierarchical mindset," Back said. "If you read about a technology, you try to figure out who is the CEO of a company, and people want to ask questions. Because Bitcoin is more like a digital gold, you wouldn't want gold to have a founder. For Bitcoin to keep a commodity-like perception, I think it's a very good thing that Satoshi stays out of the public."

Security

Hackers Plan To Use Stolen Cryptocurrency Exchange Data for SIM Swapping (vice.com) 10

Hackers who obtained personal data on users of Canadian cryptocurrency exchange Coinsquare say they plan to use the information to perform so-called SIM swapping attacks, according to one of the hackers. Motherboard: The news shows hackers' continued interest in trying to leverage security issues with telecom-based forms of authentication. In a SIM swapping attack, a hacker takes control of a target's phone number, which then gives them the ability to request password resets for some websites or a victim's two-factor authentication code. Often, SIM swappers will use these techniques to steal cryptocurrency. The breach also signals the continued risk of insider access, with Coinsquare telling Motherboard a former employee was responsible for stealing the data. "The original intent was to sell it [the data] but we figured we would make more money by SIM swapping the accounts," a pseudonymous hacker who provided the Coinsquare data to Motherboard said in an online chat.
Bitcoin

Bitcoin Mining Difficulty Drops by 6% In First Adjustment After Halving (coindesk.com) 48

The Bitcoin network just fine-tuned a key parameter to coax back miners who quit after last week's halving hammered their profits. From a report: More than 20 exahashes per second (EH/s) of computing power -- the equivalent of around 1.5 million older-generation mining machines -- has been switched off from Bitcoin since the network's halving. The 7-day rolling average of Bitcoin's hash rate has dropped over 20% from around 122 EH/s just prior to the halving on May 11 to now 97 EH/s. The once-in-four-years event reduced miners' block rewards from 12.5 to 6.25 bitcoin (BTC) per block. The hash rate drop after the halving has significantly outrun the hashing sprint prior to it. As such, Bitcoin's mining difficulty, which measures how hard it is to compete for block rewards, decreased 6% to 15.14 Trillion at 2:00 UTC on Wednesday in the network's first biweekly difficulty adjustment since the halving. The amount of computing power connected to Bitcoin has been on a roller-coaster ride over the past two weeks. Bitcoin's mining difficulty adjusts itself every 2,016 blocks, roughly 14 days, to ensure the average interval between blocks remains at 10 minutes. If a large number of miners are switched off from the network, resulting in a longer-than-10-minute average block interval, the difficulty will decrease to encourage participation. And Bitcoin's third halving on May 11 happened exactly at the halfway mark of the previous 2,016-block difficulty cycle.
Bitcoin

JPMorgan Extends Banking Services To Bitcoin Exchanges (coindesk.com) 15

According to The Wall Street Journal, JPMorgan Chase has taken on Coinbase and Gemini Trust as banking customers (Warning: source paywalled; alternative source) -- "the first time the bank has accepted clients from the cryptocurrency industry." From the report: The move is the latest in a string of positive developments for bitcoin and another sign that Wall Street is becoming more comfortable with the business of cryptocurrencies. Coinbase, founded in 2012, is the largest U.S.-based bitcoin exchange, with more than 30 million accounts. Gemini, founded in 2014 by Tyler and Cameron Winklevoss, is a smaller exchange, but it has been in the vanguard of the industry's movement to attract mainstream clients and embrace regulation. The accounts were approved in April, and transactions are just starting to be processed, the people said.

The bank is primarily providing cash-management services to the firms and handling dollar-based transactions for the exchanges' U.S.-based customers, according to the people. It will process wire transfers, and deposits and withdrawals through the Automated Clearing House network, an electronic funds-transfer system. Although Coinbase and Gemini are built around trading cryptocurrencies, many of their customers link traditional bank accounts to their accounts on the exchanges. Handling transfers in and out of those bank accounts requires a payments processor. JPMorgan's services don't extend to any bitcoin or cryptocurrency-based transactions. The firms handle those themselves.

Bitcoin

It Happened: Bitcoin Just Experienced Third Halving In Its History (cointelegraph.com) 52

The most anticipated cryptocurrency event of 2020, Bitcoin's (BTC) third halving, has just taken effect. Occurring only once every four years, the latest Bitcoin mining block reward halving just reduced the Bitcoin block reward from 12.5 BTC to 6.25 BTC. Cointelegraph reports: Since the first Bitcoin block was generated back in 2009, there have been three halving events. Taking place once every 210,000 blocks mined, or approximately once every four years, a Bitcoin halving cuts the current miner block reward by 50%. The first Bitcoin halving event took place in 2012, cutting the original block reward from 50 BTC to 25 BTC. The second halving took place in 2016, with the reward dropping from 25 BTC to 12.5 BTC. As Bitcoin's supply is limited to 21 million coins, Bitcoin halving events should continue to take place until the year 2140, or until the 21-millionth BTC. By that time, the block reward should reach 1 satoshi, or the smallest unit of Bitcoin at 0.00000001 BTC. At the time of publication, the number of Bitcoin in circulation amounts to 18.37 million, according to Blockchain.com.

As the two previous Bitcoin halvings eventually impacted Bitcoin's price in positive ways, Bitcoin halvings have become the subject of diverse price predictions and speculation. While some crypto players have predicted that the third Bitcoin halving will have no effect on Bitcoin's price, others are confident that the halving will definitely affect the price of the cryptocurrency due to a cut in new Bitcoin supply.

Bitcoin

Bitcoin Crashes as Halving Hype Loses Impetus Over the Weekend (bloomberg.com) 139

Bitcoin appears to be running out of steam just before one of the most anticipated milestones among cryptocurrency enthusiasts. From a report: The largest digital token tumbled over the weekend, declining about 13% to around $8,675. It rebounded to about $8,840 as of 10 a.m. in New York trading on Monday. The decline took place ahead of a closely watched technical event known as its halving, when the rewards miners receive for processing transactions will be cut in half as soon as later today. "It's likely that we're going to see increased volatility through May, with the pandemic, ongoing stimulus measures and the halving," Rich Rosenblum, co-head of trading at crypto market maker GSR, said in an email. "The record open interest for futures and options at multiple exchanges adds to this. The market is in a state of information and position overload, exacerbating the potential for volatile moves."
Security

Details of 44 Million Pakistani Mobile Users Leaked Online, Part of Bigger 115 Million Cache (zdnet.com) 11

An anonymous reader quotes a report from ZDNet: The details of 44 million Pakistani mobile subscribers have leaked online this week, ZDNet has learned. The leak comes after a hacker tried to sell a package containing 115 million Pakistani mobile user records last month for a price of $2.1 million in bitcoin. Data contains names, phone numbers, national IDs, and home addresses among others, and is believed to have originated from Jazz, a local mobile provider. According to our analysis of the leaked files, the data contained both personally-identifiable and telephony-related information. This includes the likes of: Customer full names; Home addresses (city, region, street name); National identification (CNIC) numbers; Mobile phone numbers; Landline numbers; and Dates of subscription.

Based on the dates of subscription, the oldest entries in the leaked files are from late 2013, suggesting that hackers either got their hands on an older backup file, or the breach took place in 2013, and only now surfaced online. The vast majority of entries in the leaked files contained mobile phone numbers belonging to Jazz (formerly Mobilink), a Pakistani mobile operator. However, ZDNet also identified phone numbers that appeared to belong to other mobile operators. [...] The incident is already under investigation in Pakistan, where the Pakistan Telecommunication Authority (PTA) and the Federal Investigation Agency (FIA) are looking into the matter since last month when the hacker first tried to sell the entire 115 million batch on a hacker forum.

Slashdot Top Deals