Connect with us

Blockchain

Tails OS – An Actionable Guide for Regular Folks

Tails OS Guide

When whistleblower Edward Snowden was communicating with Glenn Greenwald back in 2013 about the goings-on at the NSA, one of the tools he used to protect himself was Tails. But that was a long time ago. Does Snowden still like Tails? Here’s what he had to say on the subject in this December 13, 2017 […]

Tails OS – An Actionable Guide for Regular Folks was originally found on Blokt – Privacy, Tech, Bitcoin, Blockchain & Cryptocurrency.

Republished by Plato

Published

on

Tails OS Guide
Tails OS Guide

When whistleblower Edward Snowden was communicating with Glenn Greenwald back in 2013 about the goings-on at the NSA, one of the tools he used to protect himself was Tails. But that was a long time ago. Does Snowden still like Tails? Here’s what he had to say on the subject in this December 13, 2017 tweet:

Even if you don’t understand exactly what he’s talking about (yet), this Tails thing is important. Keep reading to learn what it is and why it has become so popular.

What is Tails, and why do privacy fans love it?

Tails is a unique computer operating system. It is designed to help you use the Internet anonymously and get around censorship. Tails is a live system (live operating system) that runs from a USB stick or DVD. It lets you connect to the Internet using virtually any computer while leaving no trace of your activities after you are done.

Even better, Tails is free software that anyone can install and use whenever and wherever privacy and anonymity are important.

What makes Tails safer than other operating systems?

Because Tails was designed from the beginning to provide privacy and anonymity, it differs from other operating systems in several areas:

  • Tails forces all Internet connections to go through the Tor network. Tor is a worldwide distributed network that prevents people from watching your network connection from knowing what websites you visit while keeping those websites from knowing your physical location. For more details on how this works, visit the official About Tor page.
  • Tails connects to the hardware of a computer but doesn’t use the operating system or disk drives. That means there is no permanent record of your activities on that computer. Once you remove the Tails USB Stick or DVD and restart the computer, there will be no way to tell Tails was used there.
  • Tails comes with state of the art encryption technology. From PGP and OTR support for secure communications to the automatic use of HTTPS when visiting websites, to the ability to encrypt the files on your USB stick or DVD, Tails has you covered.

With all these privacy and anonymity features together in a package that you can literally carry in your pocket, it is easy to see why privacy fans love Tails.

This all sounds great, but you may still be wondering, “Is Tails safe to use?” Tails is far safer than the typical operating system, but it is not foolproof. There are various ways bad guys can get around the protections built into Tails. Here is a detailed explanation of Tails’ security limitations.

Watch the following video for a more detailed introduction to Tails:

One of the great things about Tails is that you can create your own Tails USB Stick or DVD and try it for yourself. And since it is free software, all it will cost you is the USB Stick or DVD you install it on.

In the next few sections, we’ll talk about the process of creating and configuring a Tails System using a USB Stick. We won’t walk you through the process step by step, as the details depend on the type of computer you install from and the media you are going to install to.

We do encourage you to create your own Tails System by following the instructions on the Download and Install Tails page that applies to your situation.

Once we’re done, you’ll be able to see for yourself how Tails and its included software work.

We’re going to:

  1. Download and verify Tails
  2. Install Tails on a USB Stick
  3. Configure Tails & Tor

Downloading and Verifying Tails

We used a computer running Linux to create our Tails System. Clicking through the options on the Download and Install Tails page led us here:

Tails Install
Tails Install

Once we were ready, we clicked the big green “Let’s Go” button, which led us to the detailed instructions. From here on out, it was just a process of following the detailed instructions provided by the Tails team.

We downloaded the Tails USB image then verified it using the Tails Verification browser extension. Verifying your download is vitally important. This will tell you if your download is somehow corrupted.

Downloads are sometimes incomplete, or part of the download might not be 100% identical to the original. And sometimes, hackers break through the security on a website and replace the original with a hacked version. Verifying your download will spot any of these problems for you.

Once we had a verified version of the Tails USB image on our computer, we followed the instructions for installing it on the USB stick.

Installing and Running Tails on a USB Stick

Installing Tails might be overstating things a bit here. All that we really need to do is copy the verified Tails USB image onto your USB Stick. The instructions will tell you exactly how to do this for the computer you are using to install Tails.

Running Tails for the first time may actually be harder than downloading and installing it. That’s because most computers are not configured to run from a USB Stick.

We had this problem and had to spend some time figuring out how to get our computer set up properly. The Tails does not start at all troubleshooting guide helped us deal with this.

Configuring Tails

There isn’t a lot of configuring to do with Tails initially. When you start Tails, you see a screen that looks like this one:

Configuring Tails
Configuring Tails

After you press Enter (or several seconds with no input) the Tails Greeter screen appears:

Welcome to Tails
Welcome to Tails

Here you tell Tails the Language you want to use, the Keyboard Layout, and the Formats to use for things like the date and time.

In addition, you can activate a full range of Accessibility options from the Universal Access menu:

Tails Accessibility
Tails Accessibility

NOTE: The Tails team configured Tails to be as safe as possible by default. If you need to deviate from the defaults, the Additional Settings section of the Greeter is where you make those changes. We recommend you avoid making any changes here, if at all possible.

Once you are done setting things up in Greeter, you click the Start Tails button.

A Quick Intro to the Tails Desktop

Tails uses the GNOME graphical user interface. GNOME is used in several versions of Linux and is one of the more popular user interfaces. In Tails, the GNOME desktop looks like this:

Tails Desktop
Tails Desktop

The Top Navigation Bar contains the two main Tails menus, along with a group of icons with various functions. Here is a quick summary of what you’ll find in this navigation bar, from left to right:

  • The Applications menu gives you shortcuts to the software that comes pre-installed on Tails, along with some utilities for configuring the desktop. You’ll find all the basic applications you need to get things done here, along with some specialized stuff related to the privacy and anonymity features of Tails.
  • The Places menu has shortcuts to folders on the system, as well as any storage media like disk drives that might be connected.
  • The Calendar and Notifications appear together in the top center of the window.
  • The OpenPGP Applet comes next. You’ll use this to encrypt and decrypt text for greater privacy.
  • The Tor Status icon looks like an Onion, and you can click it to see the Open Onion Circuits Tails knows about.
  • We talked about the Universal Access icon and menu back in the Configuring Tails section.
  • The System menu contains information on your network connection, the status of the computer’s battery, and other settings.

Connecting Tails to Your Network and the Internet

Tails is of little use unless it is connected to the Internet. But before it can connect to the Internet, Tails needs to connect to your network. You can see the status of your connection to the local network in the System menu:

Tails Networking
Tails Desktop

We had no problem connecting Tails to our local network. Once we did, it automatically connected itself to the Tor network and through that to the Internet.

You can quickly see if you are connected to the Tor network by looking at the Tor Status icon in the top Navigation Bar.

If Tails is connected to the Tor network, the Tor Status icon looks like this:

If Tails is not connected to the Tor network, the Tor Status icon looks like this:

While we had no problems, connecting Tails to the Internet doesn’t always go so smoothly. If you have problems, the Tails documentation has detailed instructions on how to connect to the Internet anonymously.

The Tor Browser

The Tor Browser is based on the popular Firefox browser. But it has been heavily modified, with your privacy and anonymity in mind. The developers stripped out services like JavaScript and cookies that can be used to defeat the anonymity provided by the Tor network. This makes the Tor Browser safer for you to use, but you may find that some websites don’t work right without these services. You can learn more about the differences at the Tor Browser page.

Tails Tools for Privacy

The Tor network and browser provide you with anonymity when using the Internet. But anonymity doesn’t guarantee privacy. Let’s take a quick look at a few of the most useful encryption tools that Tails gives you to boost your privacy.

Why You Need Encryption Too

This can be confusing, so let’s look at an example. Let’s say I want to send a message to my wife, Ruth. I don’t use an encrypted application to create it, so the message starts out in plain text. Before the message leaves my computer, Tor wraps it up in three layers of encryption. That’s an essential part of how Tor works.

As my message passes through the network, Tor strips off layers of encryption. When my message leaves the Tor exit mode and goes to its destination, all the layers of encryption that Tor added are gone. What Tor has done is make it impossible to trace my message back to the computer it came from. This provides anonymity.

But what about the contents of my message? The contents are now in the same state that it went into the Tor network. Since I sent a plain text message into the network, a plain text message comes out of the network.

This might be fine, but it might be disastrous. When in doubt, it is best to be safe and use the encryption tools provided by Tails. That way, your messages, and data can only be read by the people who are supposed to read them. Even if they were somehow able to intercept your messages en route, all any snoop would see would be incomprehensible gibberish.

Keeping Your Communications Secure

Tails gives you several ways to keep your communications secure from prying eyes.

Encrypting, Decrypting, and Verifying Messages with the OpenPGP Applet

If you want maximum privacy, you should use the OpenPGP applet. Encrypting and decrypting messages is riskier if you do it in the web browser. To use the applet, you can compose your message in a text editor, then use the applet to encrypt it. Likewise, you can receive an encrypted message and import it into the applet before decrypting it.

Using OpenPGP can be labor-intensive. If you are sending lots of encrypted messages by email, Thunderbird, an email program that comes pre-installed on Tails, might be a better option than OpenPGP. If you want to go this route, you can find more information at the Thunderbird Help page.

Chatting Securely with the Pidgin Instant Messenger and OTR Encryption

Pidgin Instant Messenger is a chat application that can connect to several different chat systems simultaneously. When combined with OTR (Off-the-Record) messaging, you get encryption and more. If you want to be able to chat securely while using Tails, get all the details at the Chatting with Pidgin page.

Keeping Your Data Secure

Normally Tails only stores data until you shut down. But if you are running Tails on a USB Stick with additional space available, you can create a Persistent Storage area on the USB Stick to retain data long term.

There are pros and cons to creating a Persistent Storage area, and the Tails team advises against doing so in most cases. Still, if you need to store data securely, or add additional applications beyond those that come pre-installed, this is your best option.

The Pros and Cons of Using Persistent Storage with Tails

Pros Cons
Allows you to store encrypted data on the Tails USB Stick The Persistent Volume is visible to anyone who has access to the USB Stick.
You can install additional applications Installing non-default applications can break Tails security
You can change the configuration of applications Changing configurations of default applications can weaken anonymity
You can open the Persistent Storage from other operating systems Accessing Persistent Storage from other operating systems can compromise security

To further minimize the risks of using Persistent Storage, you get to specify exactly which types of files Tails can store there.

Tails Persistent Volume
Tails Persistent Volume

If you still want to go ahead after looking at the pros and cons, you’ll want to head to the Encrypted Persistence page for detailed instructions.

Managing Passwords

One of the best uses for Persistent Storage is to keep track of all your passwords. Using a different, strong password for each website and application that needs one is a must, but keeping track of them all without computerized help is almost impossible.

To address this problem, Tails comes with KeePassX, an open quality password manager. You can use it to keep track of all your passwords while only needing to remember the single password that unlocks this application.

Tails and Cryptocurrencies Make a Great Team

If you are interested in cryptocurrencies and are familiar with crypto exchanges, you definitely want to check out Tails. Its privacy and anonymity make it a safer place to keep your cryptocurrency wallets than a standard computer. Tails includes a Bitcoin wallet in its pre-installed software.

Built-in Bitcoin Support with the Electrum Wallet

The Electrum Bitcoin Wallet comes standard with Tails. With only a little work, you can transfer your Bitcoin keys into Electrum. Once you do, your keys will be safer, and your Bitcoin transactions will gain the anonymity of the Tor network. To learn more about the Electrum Bitcoin Wallet, visit the Electrum Home Page.

What about using Monero with Tails?

Monero is a secure, private, and untraceable cryptocurrency. That makes Tails a natural place to store your Monero. If you want to keep your Monero on Tails, you’ll need to set up Persistent Storage on your Tails USB Stick. That’s because Tails does not have a pre-installed wallet for Monero as it does for Bitcoin.

Here are the instructions for setting up Persistent Storage. Once you have that setup, here are the instructions for installing the Monero wallet on Tails.

If you want the ultimate in security for your Monero, you’ll store it in a cold wallet. Tails is an ideal tool for creating such a wallet. Tails leaves nothing behind on a computer that could help a bad guy get access to your cold wallet or even know it exists. And by using Tails, you’ll be creating your cold wallet on a safer system.

Check out this link if you are interested in creating a Monero cold wallet using Tails.

Is Tails always the best solution for privacy and anonymity?

While Tails is a great privacy operating system, it isn’t the only one available, or even the best for every situation. In particular, people interested in online privacy and anonymity often use Whonix or Qubes.

So which is the best? As usual, the answer is, “it depends.” Let’s see how each one stacks up against Tails.

Is Whonix better than Tails?

Whonix typically runs as two VirtualBox virtual machines. You do your work in one virtual machine(the Workstation). The other (the Gateway) handles all connections between the Workstation and the Internet by passing them through the Tor network.

This design means that any computer that can run VirtualBox should be able to run Whonix. This makes it easy to install Whonix, but there are some big security implications to this design.

When you run Tails from a USB stick or DVD, it is the only operating system running on the computer. To run Whonix, you need to have the host operating system running too. You can easily jump back and forth between the private and anonymous Whonix workstation and the host computer.

While this is convenient, it makes it all too easy to do something in the host when you should be doing it in Whonix and vice versa. Even worse, Whonix can’t force communications between the host and the Internet to go through Tor. If you do slip up and do something in the host that you shouldn’t, you’ve lost your anonymity.

While Whonix has some advantages, we think Tails is a better privacy solution than Whonix.

Is Qubes better than Tails?

In some ways, Qubes is more like Tails than Whonix is. That’s because when you run Qubes, it is the only operating system running on the computer. This is inherently more secure than the Whonix approach since there is no way to accidentally get “outside” the secure Qubes environment.

Qubes contains its own virtual machines with differing levels of trust for running applications. The virtual machines are completely isolated from each other by Qubes. This limits the damage that a bad app (like spyware or a virus) can do by confining that damage to one virtual machine.

Qubes itself doesn’t provide any real anonymity. To address this, people sometimes run Whonix inside of Qubes.

One big drawback of Qubes (with or without Whonix) is that there isn’t a Live USB version of it. This means that when you use Qubes, there will likely be traces of it leftover on the host computer once you end your session.

As with Whonix, while Qubes has some benefits, we think Tails is a better solution overall.

Is Tails right for you?

Whether Tails is the “right” operating system for you depends on what you plan to do with it. You probably don’t want to use it as your main operating system. The features that make it such a good privacy tool can make it clumsy for full-time use. Installing your favorite software can be a hassle and may break the privacy protection that Tails provides. Making all your connections to the Internet go through the Tor network will slow down your browsing.

But there are many situations where Tails is extremely useful for anyone concerned with online privacy and anonymity:

  • Does it bother you that ISPs and websites watch what you do online and sell that information to marketers or hand it over to spy agencies? If so, using Tails can keep them from finding out anything useful about you.
  • Have you ever had your personal data stolen from some poorly protected websites by hackers? Using Tails can minimize the amount of data sites have about you. They can’t lose what they don’t have.
  • Do you need to visit sensitive websites that your government doesn’t want you to see? With Tails, you can anonymously get around the blocks they put up to stop you.
  • Does your government have a system like China, where everything you do online is monitored and used to decide whether you are a good citizen or not? You can use Tails to anonymously do the things the government doesn’t like.
  • Do you want to keep your cryptocurrencies safe? Keeping your cryptocurrency wallets on a Tails USB Stick adds layers of protection to your cryptos.

In short, virtually anyone reading this can think of situations where they could use the privacy and anonymity that Tails can give you. We think it is a great tool, as long as you remember that nothing is 100% safe and secure. Check out the Tails warnings page to be sure you understand the limitations, then give Tails a try.

And in case you were wondering why they call this thing “Tails,” the name is an acronym. It stands for “The Amnesic Incognito Live System.” Now you know.

Blokt is a leading independent privacy resource that maintains the highest possible professional and ethical journalistic standards.

Source: https://blokt.com/guides/tails-os

Blockchain

Grayscale Adds $1 Billion in Bitcoin, Nears $50 Billion in Total AUM

Republished by Plato

Published

on

Investment giant Grayscale recently added another $1 billion worth of Bitcoin in almost 24 hours. Now, the firm nears the $50 billion mark with $46.1 billion in total assets under management (AUM)

AUM Growing

As reported by CryptoPotato recently, the investment firm increased its total AUM by more than $3 billion, shortly after expanding its crypto-trust offerings by adding five new tokens for their eligible accredited investors. 

The Grayscale Bitcoin Trust (GBTC) accounts for $38.1 billion (82.64%) of Grayscale’s total AUM, while the Ethereum Trust (ETHE) accounts for $6.6 billion (14.26%). The remaining trusts, including Bitcoin Cash and Litecoin, account for the rest.

Notably, tokens such as Filecoin, Livepeer, Basic Attention token, MANA, and LINK saw a surge in price after Grayscale announced adding them into the list of offered trusts. The company expanded its total number of trusts to 14 after CEO Michael Sonnenshein explained they see many clients seeking exposure to more crypto assets.


ADVERTISEMENT

Grayscale Confirms Its Intentions to Launch a BTC ETF

Grayscale has confirmed its plans to convert its most popular investment product, the GBTC, into a Bitcoin Exchange-traded fund —after posting several ETF-related job positions on its careers page. Although, the firm does not consider that the current regulation weather in the United States is suitable for such a fund.

Unlike other investment giants that have filed for an ETF using S-1 forms, Grayscale will remain committed to converting GBTC into an ETF as the US’s regulatory environment gets clearer.

Founded in 2013, Grayscale has become the most prominent digital asset manager for accredited investors seeking exposure to bitcoin and other crypto assets. The institutional demand for BTC accelerated at the beginning of this year, according to Sonnenshein, adding that demand is nowhere near decreasing.

SPECIAL OFFER (Sponsored)

Binance Futures 50 USDT FREE Voucher: Use this link to register & get 10% off fees and 50 USDT when trading 500 USDT (limited offer).

PrimeXBT Special Offer: Use this link to register & enter POTATO50 code to get 50% free bonus on any deposit up to 1 BTC.

You Might Also Like:


Coinsmart. Beste Bitcoin-Börse in Europa
Source: https://cryptopotato.com/grayscale-adds-1-billion-in-bitcoin-nears-50-billion-in-total-aum/

Continue Reading

Blockchain

Why ADA could run hotter than Bitcoin and make 10x gains

Republished by Plato

Published

on

After breaking in the crypto top 10 by market cap and with 3.597% gains over the past year, Cardano (ADA) seems to be laying low. At the time of writing, ADA trades at $1,24 with 1.7% profits in the daily chart and 6.4% in the weekly chart.

Cardano ADA ADAUSDT
ADA moving sideways in the 24-hour chart. Source: ADAUSDT Tradingview

Cardano’s native token and its platform are moving towards a major milestone. Targeting a Q3 entry into DeFi with Hard Fork Combinator Alonzo.

Bullish investors are betting on ADA’s further appreciation. Analyst Justin Bennett claims this token next rally will happen by the end of April. Around this time IOG should be stress-testing its smart contracts platform, Plutus.

A day ago, Bennet said to be building a “sizeable” ADA position and set support at $1.10 to $1.30. Over the next month’s, according to the analyst, ADA could go as high as $10.

On the Cardano’s native token recent price action, the analyst said it moving sideways is an indication of a “fair game”, a sign that ADA’s price is not overvalued. Bennet added:

ADA moving sideways for 6 weeks tells me the market doesn’t believe it’s overvalued at all. I don’t buy markets that are going vertical. I buy markets that went vertical recently and have since gone sideways for over a month. That’s a recipe for the next leg higher.

By the end of the month, ADA could target $2, as indicated by the chart below, and then could go for a higher price at $3 in the coming months.

Cardano ADA ADAUSDT
Source: Justin Bennett

In the 2017 bull run, ADA peaked at $1,18 therefore Bennet claims it could a 10x from its current price. Comparing ADA to Bitcoin, the analyst said the latter has “never done less than” a 10x profit in a bullish cycle. He added:

We know alts run hotter than Bitcoin. Translation: $10 $ADA is conservative, and $20 – $30 wouldn’t surprise me.

Smart contracts capabilities closing in on Cardano

Cardano’s next protocol upgrade is set to make it “the leading smart contract platform”, according to Olga Hryniuk from IOG. Outlining Alonzon’s roadmap and launch, Hryniuk wrote:

Throughout March and April, the IO Global team has been gradually combining the Alonzo rules with the Cardano node and ledger code (…). We expect the Alonzo upgrade (hard fork) to happen in late summer, and we will announce a firm date in April’s Cardano360 show.

In the crypto space, many believe Ethereum’s high fees are pushing users towards cheaper options. Cardano’s platform promises this with higher security for its smart contracts and EVM compatibility.

If Ethereum’s competitors, like Binance » Read more

” href=”https://www.newsbtc.com/dictionary/coin/” data-wpel-link=”internal”>Coin (BNB), performance is any indication of where ADA could go, then investors should pay attention to BNB’s rally.

With a 70.6% increase in just one month, BNB seems pegged to smash all resistance and keep scoring all-time highs. It remains to be seen if ADA will follow and take a place amongst DeFi giants.

Coinsmart. Beste Bitcoin-Börse in Europa
Source: https://www.newsbtc.com/news/why-ada-could-run-hotter-than-bitcoin-and-make-a-10x-gains/

Continue Reading

Blockchain

Litecoin Price Analysis: 11 April

Republished by Plato

Published

on

The Litecoin market has been seeing significant growth in price since the beginning of the year. At the time of writing, LTC was returning 93% year-to-date to its investors.

LTC was being traded at $257.39 with a market capitalization of $17.22 billion. The digital asset just saw a bullish breakout, however, will it be able to maintain this high value going forward in the market?

Litecoin 1-day chart

Source: LTCUSD on TradingView

The Litecoin price was building higher within an ascending channel and witnessed a strong surge as the price broke out of the channel. LTC saw the price surge from $163 to $258 within 16 days and turned the prevalent bearishness into a bullish market.

However, LTC has been closely trading to the resistance at $258 and if it rejects this price level, the value may trade lower.

Reasoning

The surge in the value of the digital asset has resulted in increased volatility in the market. The divergence of Bollinger Bands has been an indicator of the rise in volatility, while, the signal line moved under the candlesticks. The signal line will be acting as a support if the price pushes lower.

Meanwhile, the relative strength index was noting that the digital asset was close to becoming overbought as its value hit 68. The market has been witnessing selling pressure evolve at this stage and if it escalates, the RSI will be pushed towards the equilibrium zone.

While the market switches trends, the momentum has remained high owing to the recent surge. The bullish momentum could help the asset to maintain its high value, but the rise in selling pressure could result in a correction.

Crucial level

Entry-level: $240.99
Take Profit: $191.84
Stop-level: $268.88
Risk to Reward: 1.76

Conclusion

The current Litecoin market has been fairly bullish. However, a rising sell-off could push the price of the digital asset lower under $200. With 50 moving average and the signal line extending support close to $200, the price may not drop beyond this point.


Sign Up For Our Newsletter


Coinsmart. Beste Bitcoin-Börse in Europa
Source: https://ambcrypto.com/litecoin-price-analysis-11-april

Continue Reading
Blockchain4 days ago

Decentralized oracle solution Umbrella Network adds Huobi as validator node

Blockchain3 days ago

XRP Price Analysis: 08 April

Blockchain3 days ago

$48B Asset Manager Millennium Management Dabbles With Bitcoin

Blockchain3 days ago

Binance Smart Chain Daily Transactions 200% More Than Ethereum’s

Blockchain3 days ago

America’s Second-Oldest Bank State Street to Enable Crypto Trading on its Platform

Blockchain3 days ago

Digital yuan campaign planned for contested island in the South China Sea

Blockchain3 days ago

Polkadot Price Analysis: 08 April

Blockchain3 days ago

Tesla’s landlord accepts crypto; will Elon Musk pay rent in Bitcoin?

Blockchain3 days ago

Bitcoin exchanges just saw massive Tether stablecoin deposits

Blockchain4 days ago

Why JP Morgan’s CEO calls Bitcoin regulation a “serious issue”

Blockchain3 days ago

Bitcoin Miners Hit Jackpot as Hash Rate Peaks Again

Blockchain3 days ago

Phemex Launches OTC Trading, Enables Crypto Purchase with Bank Transfers

Blockchain4 days ago

Miners are hoarding Bitcoin from record daily earnings

Blockchain3 days ago

Man Gets 12 Years in Prison After Trying to Buy Lethal Chemical Weapon With Bitcoin

Blockchain4 days ago

Crypto sentiment falls even as Bloomberg tips Bitcoin will hit $400K

Blockchain4 days ago

Revolutionizing the crypto-market in India with CryptoBiz exchange

Blockchain3 days ago

Cardano’s Anti-Counterfeit Solution Sees First Successful Implemetation

Blockchain4 days ago

Tendermint acquires B-Harvest, creator of Cosmos-based Gravity DEX

Blockchain4 days ago

Ontology’s cross chain DeFi lending platform Wing is now live on Ethereum

Blockchain3 days ago

Ether price takes on Bitcoin — What’s behind the sharp rise in demand?

Trending