Connect with us

Blockchain

How to Make & Setup A VPN Server – 2020 DIY Guide

Published

on

The Internet is no longer a safe place. Sometimes it seems that the Internet was designed to make it easy for governments, businesses, and snoops of all sorts to spy on regular people. So it is no surprise that vast numbers of people are using VPNs to protect themselves.

How to set up your own VPN

But even the best commercial VPN services have their weaknesses. That’s why more and more people are looking to create their own VPN.

It is also 2020 and with everything that is happening in the world you may be tight on money, looking to pass the time in lockdown etc.

In this article, we’ll look at the various reasons to set up your own VPN as well as reasons not to do so. We’ll also talk about three ways to get the job done and look at one of them in more detail.

By the end of this article, you should have a good sense of whether or not setting up your own VPN makes sense for you, and which approach you would like to take.

Reasons to Setup Your Own VPN

There are lots of reasons to use a VPN in today’s world. But since you are here, we assume you already know why you need a VPN. We further assume that you are trying to decide between using a commercial VPN Service like ExpressVPN or NordVPN or creating your own VPN.

To help you make that decision, here are some good reasons to setup your own VPN instead of subscribing to a commercial service:

  • You want the benefits of a VPN Service without the monthly payments.
  • You don’t want to take the chance that your online activities will be logged by a VPN Service. (Although, services like ExpressVPN have proven themselves to be zero log time and time again in various legal battles)
  • You want access to your home network from anywhere in the world.
  • You want access to local resources (your home Netflix account, for example) when you are in a different geographic location.
  • You want to give other people access to resources on your home network.

Reasons Not to Setup Your Own VPN

While there are some good reasons to set up your own VPN, there are also a lot of reasons not to do so. These include:

  • You don’t have a fast Internet connection – You need both fast upload and download speeds wherever your VPN Server is located or it will slow down everything connected to your personal VPN.
  • You need a VPN to connect to resources in other geographic locations – VPN Services with multiple servers let you make it appear you are located in any of dozens, even hundreds of locations around the world. Since your VPN would have only one server you can only appear to be located in one place.
  • You want to hide your IP Address – If you build your VPN Server on your own hardware, it will have an IP Address associated with your home network.
  • You don’t want to handle the maintenance – It falls on you to maintain and update the VPN Server as well as the hardware and software it runs on.
  • You have to have the technical ability to set up the VPN Server and clients.
  • You want to hide your payment and identity information fully. The VPN you setup yourself might be safe from logging, but if you purchased the server you tunnel through, with your real name and payment details you are much more vulnerable than using a VPN service.

VPN Basics

If you are considering setting up your own VPN, you’ve probably got all the basics down already, but just in case, we’re going to start at the beginning. If you are clear on this stuff already, go ahead and skip ahead to, “Three Ways to Setup a VPN of Your Own.”

When you connect your device to an Internet resource without a VPN, the contents of the messages going back and forth are potentially visible to snoops. In addition, for the Internet to know where to send the messages, each message must expose a header that contains your IP Address as well as the IP address of the Internet resource you are connected to.

Your IP Address Can Be Seen If You’re Not Using a VPN

So everything is visible to snoops with the right tool.

Many Internet resources try to stop snoops with HTTPS. This is an Internet protocol that automatically encrypts the contents of messages. This can definitely help since it prevents snoops from seeing the contents of the messages going back and forth.

But HTTPS doesn’t do anything to prevent snoops from seeing that you (a device at your IP Address to be more precise) are communicating with that particular Internet resource. Using a VPN eliminates this problem. Here’s why:

A VPN addresses this problem by putting a VPN Server in the middle of the conversation. The VPN Server sits between your device and an Internet resource. Your device only connects to the VPN Server. The Internet resource only connects to the VPN Server. The VPN Server passes messages back and forth between your device and the resource.

This helps because the VPN Server uses its own IP Address when communicating with the resource on behalf of your device. Anyone spying on the connection between the server and the resource would only see the IP Addresses of the VPN Server and the Internet resource. Your privacy is protected on this part of the connection because no one looking at this connection can see your IP Address.

VPN Diagram

But that still leaves the connection between the VPN Client and the VPN Server. To address this part of the problem, the client and server encapsulate messages passing between them. That is, they encrypt the entirety of the messages between the device and the resource. Then they include the encrypted messages inside another message. This second message is what goes back and forth between the client and the server.

The advantage of doing this is that only the second message’s header information needs to be visible to the world. And all that message’s header can reveal is that your device and a VPN Server are communicating with each other. Snoops can’t see anything of the original message because the whole message, including the header, is encrypted in the body of the outer message.

At the VPN Server, messages coming from your device are extracted from the body of the outer message and decrypted. Then, in the header of your device’s message, the IP Address of your device is replaced by the IP Address of the VPN Server. This modified message is what gets sent to the Internet resource.

Messages coming from the Internet resource arrive at the VPN Server. There, the IP Address of the VPN Server gets replaced by the IP Address of your device. This modified message then travels down the tunnel to the VPN Client in your device, where it is extracted, decrypted, and passed along to your device as if the VPN wasn’t in the middle of everything.

Guide on How to Setup Your Own VPN

As we’ve just seen, the VPN Server is the core of a functional VPN. In the rest of this article, we will look at ways to set up your own VPN Server and ignore the VPN Client. There are two reasons for this.

  • The VPN Server you set up will dictate how you need to set up your VPN Clients.
  • There are way too many devices you can connect to your VPN. If we tried to talk about the VPN Clients for each we would never finish writing this article.

As it turns out, setting up your own VPN Server is plenty complicated enough for one article. We’ll start exploring this topic by looking at the three ways to set up a VPN server of your own.

Three Ways to Setup a VPN Server of Your Own

There are three ways to setup your own VPN Server. The way you go will depend on what you plan to do with the VPN and what hardware you will be using. You can set up the VPN Server:

  • On your router – If you are using a router with built-in VPN capabilities, or your router supports custom firmware like DD-WRT or OpenWrt, you can set up the VPN Server on your router.
  • On your own computer – If installing the VPN Server on your router isn’t an option, you can set up a VPN Server on a spare computer, even something tiny and low-powered like a Raspberry Pi. This is relatively easy to do, particularly if you use a computer running Microsoft Windows, which has built-in VPN capabilities. Of course, if you go this route, you will need to keep the computer that hosts your VPN Server running whenever you want to use the VPN.
  • On a cloud service – This approach doesn’t require you to have any additional hardware. However, if you host your VPN Server on a cloud service, you need to keep in mind that the cloud service will be able to see whatever you do with the VPN.

Let’s look at each of these options in more detail.

Setting Up a VPN Server on Your Router

Some home and business routers have a VPN Server built right into them. To use it, you simply need to log into the router, then turn on and configure the VPN Server. If your router has this capability, the manual that came with it should give you instructions on how to activate it. If not, a search formatted something like this should lead you to those instructions:

Router name VPN configuration

A more common situation is where your router doesn’t have a built-in VPN Server but “supports” one. This typically means that you can install third-party firmware on the router and that when the right firmware is installed, the router will be able to function as a VPN Server.

Three types of third-party router firmware are the most popular. These are:

Not all routers support these firmware packages. To find out if yours does, you’ll either need to dig through your router’s documentation or check the site of the firmware you want to use.

  • DD-WRT has a Router Database where you can search for your router to see if it is supported.
  • The main Tomato page linked above lists the routers that are known to work with this firmware.
  • OpenWrt has a Supported Devices page with the information you need.

Even if your router does support one of these firmware packages, installing new firmware on a router is not a job for a computer beginner. While the sites provide detailed instructions for installing their firmware, there is a lot more involved than running an install program.

And one possible result of making a mistake is turning your router into a useless piece of junk that you can only throw away.

Here’s a high-level view of the DD-WRT installation process:

DD-WRT installation process

As you can see, this isn’t a spur of the moment project. But if you do decide you want to give it a go, you’ll find more information in our guide on ‘How to Set up a VPN on a Router.’

Setting Up a VPN Server on Your Own Computer

If your router doesn’t support third-party firmware, or you don’t want to take the chance of wrecking it, you can install a VPN Server on one of your own computers. Doing this will allow you to have access to files on the computer that hosts the VPN Server, as well as resources on your network that are accessible from the computer.

The easiest route is to use a Windows or Mac desktop that you are willing to leave running 24 hours a day. After all, a VPN Server does you no good if the computer it runs on is turned off when you need it.

Turning a Single-Board Computer into a Dedicated VPN Server

A slightly geekier approach is to take a small device like a Raspberry Pi and turn it into a dedicated VPN Server. This approach has the advantage of not tying up a larger, more expensive, more power-hungry computer for this single task.

Raspberry Pi – Photo courtesy Ruth Salinas Correa

Even a Raspberry Pi is potent enough for a basic VPN Server.

While this is a cool way to go and appeals to the geek side of your author, there are a few disadvantages to this approach:

  • You need a Raspberry Pi to dedicate to the task.
  • It adds an additional level of learning to the project if you aren’t already familiar with these devices.
  • The performance of the VPN could suffer. Encrypting, encapsulating, and decrypting messages takes a lot of computing power and small devices like this will do the job slower than full-sized machines.

If this approach appeals to you, we suggest you visit the PiVPN site. It shows you how to set up OpenVPN on a Raspberry Pi with a minimum of fuss and bother. Or watch this video:

Setting Up a VPN Server on a Cloud Service

Setting up a VPN Server on a cloud service eliminates the need for your own hardware. You don’t need to hack your router or dedicate a computer to playing the role of VPN Server. This can be a convenient way to go.

But there are drawbacks to this approach as well. When you set up a VPN Server on a cloud service, you do so by installing software on a virtual machine running on the cloud services servers. This means that your VPN Server will be slow since it will be running on distant, simulated hardware.

It also means that you need to trust the cloud service completely. Everything you do will happen on their hardware, using their virtual machines. This leaves you with the same problem as using a commercial VPN Service: you need to trust a third-party.

The difference here is that commercial VPN Services sell themselves on their commitment to protecting your privacy. Services like ExpressVPN and NordVPN base themselves in jurisdictions where your privacy rights are protected. They cannot easily be forced to log your activities and share that information with the NSA, MI6, or whoever else is out there trying to spy on you.

Cloud services have a very different business model and are often based in places like the USA, where your privacy is not well protected. In our opinion, the chances that a cloud service would log your activities on their own, or be pressured into it by their local government, are much higher than with a top-notch commercial VPN Service.

How to Set Up a Personal VPN Server on DigitalOcean

One of the triggers for writing this article was seeing some online claims that it is quick and easy to set up a VPN Server on a cloud service. With people claiming you could have a VPN Server up and running in 10 minutes for only a few dollars a month (or even free for the first year), we thought we should investigate.

What we found was not encouraging.

The approaches we found a FOSS VPN Server called Algo. Algo seems to be a great software and works as advertised. It provides encrypted communications between your devices, and the Algo VPN Server running on Amazon EC2, DigitalOcean, Microsoft Azure, and other similar services.

Algo VPN

But it doesn’t give you anonymity, and it doesn’t support the commonly-used OpenVPN protocol.

The problems come in with fast and easy claims. Unless you are a computer tech with Linux experience, setting up Algo isn’t easy or fast. It takes around 20 steps, many of which are done on the Linux command line. We had an experienced engineer set up Algo on DigitalOcean, and it took about 45 minutes.

To give you an idea of what you will need to deal with if you decide to install Algo on a cloud service, here are selected screenshots of the process.

First, you need to set up an account at the service (DigitalOcean in this example):

DigitalOcean Dashboard

Clicking the Get Started with a Droplet (the DigitalOcean version of a virtual machine) gave us the options shown in the next screenshot. We created a Droplet running Ubuntu 18.04 by clicking the relevant button and selecting the plan we wanted:

Create Droplets – DigitalOcean

After a few minutes of waiting while DigitalOcean created the Droplet for us, we had a virtual machine running Ubuntu 18.04 ready to roll:

Virtual Machine running Ubuntu 18.04

We logged into the Droplet and followed the instructions in the Algo Github repository to download and extract the Algo files, install Algo core and remaining dependencies. Then we opened the Algo Config.cfg file and edited it to include the list of users who would be able to log into the VPN:

Algo Config File

With all that out of the way we launched the Algo installer, and selected the DigitalOcean option:

Algo Installer

The Algo installer uses the DigitalOcean API to do most of the configuration work, so we sat back and waited about 15 minutes for the installation to finish.

As mentioned in the following screen capture, there are several values you must copy from the console once the installer finishes its work. Without these, you will not be able to add new users later:

Algo Installer – Last Step

With that, the Algo VPN Server is installed in a DigitalOcean Droplet.

Now all you have to do is manually configure every client device that will connect to the server. Depending on the device, setting up the client could be pretty easy, or not so easy. As with setting up the server, the Algo Github page has links to the details of setting up clients on various popular types of devices.

When you finish that task you will have a fully functioning VPN Service of your own. It will be a slow VPN. You will need to trust that DigitalOcean won’t snoop on you as we discussed earlier. And because it has only a single server, it will be of limited use compared to commercial VPN Services, but it will be yours.

Despite the articles talking about the benefits of doing so, we really can’t see much reason to create your own VPN using a cloud service other than as an exercise for hardcore techies.

Conclusion

There are some privacy and security advantages of setting up your own VPN. These are most pronounced when you set up a VPN Server on your own hardware. In this article, we looked at three ways to get the job done, two of which involve setting up the server on your own hardware.

This table summarizes the pros and cons of each of the three approaches, as well as those of using a commercial VPN Service.

Pros and Cons for Setting Up Your Own VPN

VPN Server on Your Own Router VPN Server on Your Own Computer VPN Server on Cloud Service Using a Commercial VPN Service
Protects Entire Network Specific Devices Specific Devices Specific Devices or entire network depending on service selected
Privacy No need to trust third-parties No need to trust third-parties Cloud Service could log activities VPN Service could log activities
Security Good Good Low Best
Speed Medium Slow Slowest Fastest
Ease of Setup Medium Low Low High
Ease of Maintenance Medium Low Low High

As we’ve seen, while setting up a VPN Server for your own use is doable, it can be a lot of work and requires much more technical expertise than simply subscribing to a commercial VPN Service.

If you do decide to go this route, remember that you’ll also need to set up VPN Clients for each device you want to connect to your server. If the VPN Server documentation doesn’t have instructions you need, you should be able to find them with a quick web search.

If setting up your own VPN isn’t for you, we suggest you check out our review of the Best VPN Services for 2019. To help you decide between them, we organized them by use case, best VPNs for beginners, best for streaming, best for use on mobile devices, and so on.

References

What is a VPN Server?
What is Internet Protocol?
What is Network Encapsulation?

Note: This article was last updated In April 2020.

Blokt is a leading independent privacy resource that maintains the highest possible professional and ethical journalistic standards.

Source: https://blokt.com/guides/how-to-make-a-vpn-server

Blockchain

Robinhood Testing New Cryptocurrency Wallet as Demand Rises

Published

on

The millennial-focused trading portal is edging closer to launching a long-awaited app that will enable its growing user-base to send and receive cryptocurrencies.

A beta version of Robinhood’s iPhone app showed the company’s latest upgrades on the new digital asset features, according to Bloomberg.

There is a hidden image showing a waiting list for users eager to get their hands on the app and code referring to crypto transfers, it added.

Delving Deeper into Crypto

Robinhood users can already buy and sell cryptocurrencies on the platform but they need to convert them to and from USD. With a native app, users will be able to send crypto assets to each other directly and set up two-factor authentication for additional security.

Robinhood Chief Executive Officer Vlad Tenev stated that adding crypto wallets is a priority for the company’s developers and they are actively working on such.


ADVERTISEMENT

“The ability to deposit and withdraw cryptocurrencies is tricky to do with scale, and we want to make sure it’s done correctly and properly.”

He did not specify a launch date, but the beta app leak suggests it is not too far away. Users of the new functions will need to activate crypto sending and receiving and the registration page will require an identity check, the report added.

On Sept. 11, CryptoPotato reported that Robinhood had launched incentives to promote longer-term cryptocurrency investing. The zero-fee recurring purchase feature enables users to schedule digital asset purchases for regular intervals with buys as low as a dollar.

This will encourage customers to build their cryptocurrency portfolios over time and “become a whole coiner,” stated Robinhood.

Robinhood Users Hungry For Crypto

Cryptocurrency trading has been one of the biggest drivers of revenue for Robinhood this year. Dogecoin has been the crown jewel, according to the company. It reported that 62% of its $233 million in second-quarter crypto income came from DOGE trading.

It added that more than half of all transaction-based revenue on the platform came from digital asset trading. The firm did warn that Q3 would not be as prosperous due to “seasonal headwinds and lower trading activity across the industry.”

Robinhood share prices have already fallen 43% since their all-time high of a little over $70 in early August. They are currently trading down 1.68% since Monday’s open at $40.70 according to Yahoo! Finance.

SPECIAL OFFER (Sponsored)

Binance Futures 50 USDT FREE Voucher: Use this link to register & get 10% off fees and 50 USDT when trading 500 USDT (limited offer).

PrimeXBT Special Offer: Use this link to register & enter POTATO50 code to get 50% free bonus on any deposit up to 1 BTC.

You Might Also Like:


PlatoAi. Web3 Reimagined. Data Intelligence Amplified.

Click here to access.

Source: https://cryptopotato.com/robinhood-testing-new-cryptocurrency-wallet-as-demand-rises/

Continue Reading

Blockchain

Snoop Dogg Reveals His Connection With Twitter Account on NFTs

Snoop Dogg Twitter

Rate this post American rapper Snoop Dogg tweeted on Monday that he’s the owner of a Twitter account that talks about nonfungible tokens (NFTs). The account, named @CozomoMedici, shares “insights and tales from the wild world of NFTs” and has 27.7K followers at the moment. Snoop Dog Claims to Be Popular NFT Advocate on Twitter Snoop Dogg left the crypto community stunned this week after he revealed himself as the owner of a Twitter account dedicated to NFTs.  The account Cozomo de’ Medici, named after an Italian banker, is only a month old. However, it has already garnered attention from industry watchers and even a mention from crypto-focused news outlet The Block.   According to The Verge, the person behind the Medici account had been creating hype around their real identity for “at least a few days” and even conducted a poll for their followers to take a guess. The poll featured Democratic congresswoman Alexandria Ocasio-Cortez and Matt Bellamy, the lead singer of the rock band Muse. Snoop, however, was not mentioned in the poll. On September 20, @CozomoMedici tweeted that they were about to reveal their identity from their account. Shortly after, Snoop Dogg tweeted “I am @CozomoMedici.”   Interestingly, after making this revelation, the Medici account bought two weed-themed collectibles from an artist named NyanDogg, The Verge reported. Additionally, Snoop’s alleged OpenSea account has been sent  “a cloud of blunt and Snoop-themed NFTs” following the reveal. Is Medici Account an Elaborate Prank? The Medici account could likely turn out to be an elaborate prank, one that Snoop might have engineered himself or just participated in. Many reactions to Medici’s reveal have also expressed skepticism about Snoop’s involvement. “I have a hard time accepting that this account is Snoop Dogg. Like seriously Snoop Dogg muted his live stream for a week (?) by accident. And he is that deep into NFTs out here owning crypto punks… Owning Eth using OpenSea. Would love that to be true but I can’t believe it,” Twitter user @Brandolf485 wrote in the comments. Nonetheless, the crypto community will have to continue looking for concrete proof till Snoop’s involvement with the account is confirmed. 

The post Snoop Dogg Reveals His Connection With Twitter Account on NFTs appeared first on Cryptoknowmics-Crypto News and Media Platform.

Published

on

American rapper Snoop Dogg tweeted on Monday that he’s the owner of a Twitter account that talks about nonfungible tokens (NFTs). The account, named @CozomoMedici, shares “insights and tales from the wild world of NFTs” and has 27.7K followers at the moment.

Snoop Dog Claims to Be Popular NFT Advocate on Twitter

Snoop Dogg left the crypto community stunned this week after he revealed himself as the owner of a Twitter account dedicated to NFTs. 

The account Cozomo de’ Medici, named after an Italian banker, is only a month old. However, it has already garnered attention from industry watchers and even a mention from crypto-focused news outlet The Block.  

According to The Verge, the person behind the Medici account had been creating hype around their real identity for “at least a few days” and even conducted a poll for their followers to take a guess. The poll featured Democratic congresswoman Alexandria Ocasio-Cortez and Matt Bellamy, the lead singer of the rock band Muse. Snoop, however, was not mentioned in the poll.

On September 20, @CozomoMedici tweeted that they were about to reveal their identity from their account. Shortly after, Snoop Dogg tweeted “I am @CozomoMedici.”

Interestingly, after making this revelation, the Medici account bought two weed-themed collectibles from an artist named NyanDogg, The Verge reported. Additionally, Snoop’s alleged OpenSea account has been sent  “a cloud of blunt and Snoop-themed NFTs” following the reveal.

Is Medici Account an Elaborate Prank?

The Medici account could likely turn out to be an elaborate prank, one that Snoop might have engineered himself or just participated in. Many reactions to Medici’s reveal have also expressed skepticism about Snoop’s involvement.

“I have a hard time accepting that this account is Snoop Dogg. Like seriously Snoop Dogg muted his live stream for a week (?) by accident. And he is that deep into NFTs out here owning crypto punks… Owning Eth using OpenSea. Would love that to be true but I can’t believe it,” Twitter user @Brandolf485 wrote in the comments.

Nonetheless, the crypto community will have to continue looking for concrete proof till Snoop’s involvement with the account is confirmed. 

PlatoAi. Web3 Reimagined. Data Inteligence Amplifed.
Click here for Free Trial.

Source: https://www.cryptoknowmics.com/news/snoop-dogg-reveals-his-connection-with-twitter-account-on-nfts/

Continue Reading

Blockchain

TA: Ethereum Breaking This Confluence Resistance Could Spark a Recovery

Published

on

Ethereum started a major decline below the $3,200 support zone against the US Dollar. ETH price traded as low as $2,807 and it is now attempting a recovery wave.

  • Ethereum started a fresh decline below the $3,300 and $3,200 support levels.
  • The price is now trading below $3,200 and the 100 hourly simple moving average.
  • There is a key bearish trend line forming with resistance near $3,020 on the hourly chart of ETH/USD (data feed via Kraken).
  • The pair could a steady recovery wave if there is a close above $3,050 in the near term.

Ethereum Price Corrects Losses

Ethereum started a major decline from the $3,500 resistance zone. ETH traded below many important support zones near $3,300 and the 100 hourly simple moving average, similar to bitcoin.

The bears gained strength below the $3,200 support zone. Finally, ether spiked below $3,000 and extended its decline. A low is formed near $2,807 and the price is now correcting losses. There was a break above the $2,920 and $2,950 resistance levels.

The price recovered above the 23.6% Fib retracement level of the recent decline from the $3,455 swing high to $2,807 low. An immediate resistance on the upside is near the $3,020 level. There is also a key bearish trend line forming with resistance near $3,020 on the hourly chart of ETH/USD.

Ethereum Price

Source: ETHUSD on TradingView.com

A close above the $3,020 and $3,050 levels could start a decent recovery. The next major resistance might be near the $3,130 level. It is near the 50% Fib retracement level of the recent decline from the $3,455 swing high to $2,807 low. A clear break and close above the $3,130 level could start a steady increase. The next major resistance sits near $3,300.

More Losses in ETH?

If ethereum fails to correct higher above the $3,020 and $3,050 resistance levels, it could start another decline. An initial support on the downside is near the $2,960 level.

The next major support seems to be forming near the $2,900 level. A downside break below the $2,900 support zone could lead the price towards the $2,800 zone. The next major support is near the $2,750 level, below which ether price might decline towards the $2,640 support zone.

Technical Indicators

Hourly MACDThe MACD for ETH/USD is slowly losing pace in the bearish zone.

Hourly RSIThe RSI for ETH/USD is still well below the 50 level.

Major Support Level – $2,960

Major Resistance Level – $3,050

PlatoAi. Web3 Reimagined. Data Intelligence Amplified.

Click here to access.

Source: https://www.newsbtc.com/analysis/eth/ethereum-confluence-resistance-3050/

Continue Reading
Uncategorized5 days ago

Swissquote Confirms European Expansion Plan, Focusing on Crypto

Uncategorized5 days ago

Bingbon Launches its Carbon Free and Afforestation Project

Blockchain5 days ago

Massive NFT and Token Giveaway from Polker as Staking is Announced!

Uncategorized5 days ago

Nickelodeon All-Star Brawl will include DLC fighters post-launch

News4 days ago

Gods Unchained and Guild of Guardians Layer 2 Solution Immutable Raises $60 Million

Blockchain3 days ago

Over 40 days after Ethereum’s EIP-1559, here’s where it stands

Blockchain5 days ago

Opensea NFT marketplace Accuses Senior Employee of Insider Trading

Blockchain5 days ago

Grab a spot in Tomi’s presale by bagging an NFT – 260+ ETH raised!

Blockchain5 days ago

Kanga Exchange Partners with Tenset for an Exclusive Public Sale of KNG Token

Blockchain3 days ago

Cardano Sees an Influx in Smart Contracts ! But There’s a Twist

Blockchain5 days ago

If Shiba Inu is a ‘shitcoin,’ why are exchanges still listing it

Blockchain5 days ago

Over $1B Worth of ETH Burned in the Aftermath of Ethereum’s London Upgrade

Blockchain5 days ago

Ethereum, NEO, Dogecoin Price Analysis: 16 September

Uncategorized2 days ago

NBA 2K22 Limitless Spot-Up and Chef Badges Explained

News5 days ago

MicroStrategy Issues a Response to FASB’s 2021 ‘Invitation to Comment’

Uncategorized4 days ago

Laos Green-Lights Cryptocurrency Trials

Blockchain5 days ago

Bitcoin Cash: A 40% hike may be incoming from this setup

Uncategorized4 days ago

DeFi comes to Cardano (ADA) as EMURGO announces ‘Astarter’

Uncategorized5 days ago

Tether Claims to Hold no Commercial Paper From Struggling Evergrande

Blockchain4 days ago

Bitdefender Releases Tool To Decrypt Files Affected by REvil/Sodinokibi Ransomware

Trending