DeFi

DeFi eliminates intermediaries by using smart contracts on blockchains to provide financial services like lending, borrowing, and trading. In 2026, the "DeFi 3.0" era is defined by Institutional DeFi and the integration of Real-World Assets (RWA). From liquidity provisioning on Uniswap to advanced lending on Aave, this tag tracks the evolution of autonomous financial systems, yield optimization, and the rise of AI-driven portfolio management in the decentralized economy.

67541 Articles
Created: 2026/02/02 18:52
Updated: 2026/02/02 18:52
BNB Chain Maxwell Upgrade Goes Live Today, Slashes Block Times to 0.75 Seconds

BNB Chain Maxwell Upgrade Goes Live Today, Slashes Block Times to 0.75 Seconds

BNB Chain’s Maxwell upgrade has activated today, dramatically reducing block times from 1.5 seconds to 0.75 seconds in the network’s most aggressive speed optimization yet. The upgrade positions BNB Smart Chain as the fastest major blockchain, achieving sub-second finality while maintaining the $0.04 average transaction fees that helped capture the #1 ranking in daily DEX volume. Less than 5 days until Maxwell. Sub-second blocks, smarter networking, and a faster BNB Smart Chain. Here’s what you need to know before mainnet 👇 https://t.co/Qjnh6pp9E9 pic.twitter.com/dS0EoqopEE — BNB Chain Developers (@BNBChainDevs) June 25, 2025 The Maxwell upgrade implements three critical proposals. First is the BEP-524, which establishes 0.75-second block intervals, BEP-563 enhances validator network communication, and BEP-564 introduces smarter block fetching protocols. These technical improvements build upon the successful Lorentz hardfork that previously reduced block times from 3 seconds to 1.5 seconds, while also decreasing network reorganizations from five daily to two. This timing coincides with BNB Chain’s explosive growth trajectory, with Q1 2025 revenue surging 58.1% to $70.8 million , despite the BNB token facing a 14.8% decline in market cap. The network processed 4.9 million daily transactions, representing 20.9% quarterly growth, while daily active addresses increased 26.4% to 1.2 million users. Technical Revolution Transforms Network Performance Standards The Maxwell upgrade represents BNB Chain’s most ambitious performance enhancement, implementing consensus mechanisms that enable block production in 0.75 seconds without compromising network stability. BEP-524 serves as the foundation, halving previous block intervals while maintaining validator coordination through enhanced peer-to-peer messaging protocols established in BEP-563. Source: GitHub / bnb-chain Advanced block synchronization is also enabled through BEP-564’s introduction of the GetBlocksByRangeMsg and RangeBlocksMsg protocols, allowing validators to request and receive multiple blocks simultaneously. This innovation significantly accelerates sync speeds across the network, enabling faster validator consensus despite reduced time windows. The speed is reflected in DEX volume BNB processes compared to other chains. Source: Dune Consensus parameter adjustments support the acceleration, with the epoch length increasing from 500 to 1000 blocks while the TurnLength doubles from 8 to 16 blocks. Fast Finality achieves confirmation in approximately 1.875 seconds, significantly improving transaction certainty for DeFi applications that require rapid settlement. Notably, the upgrade also creates challenges for MEV searchers who must adapt strategies to sub-second block windows. MEV builders face compressed bidding timeframes under one second per block, potentially eliminating specific arbitrage strategies while creating opportunities for more sophisticated algorithms. Testnet validation required meeting strict exit criteria, including stable 0.75-second block production, maintained reorganization frequencies, validator consensus without sync delays, and confirmed compatibility across explorers, RPCs, and indexers. These requirements ensure that mainnet deployment maintains the network’s reputation for reliability. Ecosystem Momentum Accelerates Amid Performance Gains BNB Chain’s technical achievements coincide with a remarkable ecosystem expansion, with stablecoin transfers and wallet-to-wallet transactions comprising 74.4% of network activity during the Q1 growth surge . Stablecoin usage alone rose 28% to 1.2 million daily transactions while wallet transfers surged 50.9% to 835,000 per day. Source: Messari DeFi engagement remains robust despite broader market volatility, with Total Value Locked growing 14.7% in BNB terms to claim fourth position in TVL rankings. Notably, PancakeSwap maintains its dominance with 91.8% of DEX activity, supported by a 95.2% increase in trading volume, which contributed to an average daily DEX volume of $2.3 billion. Revenue diversification also grows as wallet-to-wallet transaction fees surge 122.6%, overtaking DeFi as the primary revenue contributor. Source: Messari This shift shows BNB is maturing beyond speculative trading toward genuine utility adoption, supported by ecosystem developments, including Venus Finance’s stability and Kernel’s 655.6% TVL increase to over $500 million. Furthermore, strategic initiatives, including the $100 million liquidity program, extended zero-gas-fee campaigns, and AI HACK hackathons, drive developer engagement. Security-wise, the BNB Good Will Alliance also achieved over 90% reduction in sandwich attacks. Meanwhile, the Pascal hardfork introduced Ethereum-compatible features, including EIP-7702 smart contract wallets and BLS12-381 cryptography. Security improvements contributed to a 67% reduction in financial losses, from $162 million in 2023 to $53 million in 2024, while the number of security incidents decreased by 66%. These factors have propelled BNB past $650, surpassing Solana’s market position, with analysts even targeting breakout levels of $800 .

Author: CryptoNews
AI is being built behind closed doors, and that’s a dangerous mistake | Opinion

AI is being built behind closed doors, and that’s a dangerous mistake | Opinion

We’ve already surrendered our digital agency to centralized platforms, and with AI, the consequences will be even less reversible.

Author: Crypto.news
BNB Chain’s Maxwell upgrade helps push its DEX monthly trading volume to a new high

BNB Chain’s Maxwell upgrade helps push its DEX monthly trading volume to a new high

PANews reported on June 30 that according to Cryptoslate, BNB Chain's Maxwell network improvement was launched on June 30, which is expected to significantly increase transaction speed (block time from

Author: PANews
Israel’s $90M Nobitex Exploit Tied to Crypto-Funded Espionage

Israel’s $90M Nobitex Exploit Tied to Crypto-Funded Espionage

$90 million vanished from Iran’s Nobitex exchange, now, TRM Labs suggests pro-Israel hackers allegedly siphoned funds and possibly seized sensitive data to uncover Iranian spies paid in crypto Days after the hack, three Israeli citizens were arrested for allegedly carrying out espionage activities, such as performing surveillance, propaganda, and intelligence-gathering tasks in exchange for cryptocurrency payments on behalf of Iranian intelligence. Israeli Espionage Case Highlights Use of Crypto for State-Backed Operations In its report, TRM Labs noted “the arrests represent a rare public case of state-sponsored espionage in which operatives were compensated using digital assets.” The investigation alleges that each suspect received crypto payouts upon completing specific assignments, with funds delivered via anonymized blockchain channels. One of the accused, Dmitri Cohen, 28, from Haifa, reportedly tracked and photographed members of Prime Minister Benjamin Netanyahu’s family. He is accused of spying on Amit Yardeni, Netanyahu’s future daughter-in-law, ahead of her wedding. Investigators say Cohen used a dedicated device to maintain encrypted contact with his Iranian handler and received thousands of dollars in crypto, about $500 per task. A second suspect, aged 27 from Tel Aviv, was detained for allegedly photographing military sites, government buildings, and tagging graffiti. Authorities seized several devices from his home during the investigation. ⚠️ Israel arrests 27-year-old Tel Aviv man for allegedly spying for Iran in exchange for crypto, spotlighting the growing role of digital assets in espionage. #Israel #Iran https://t.co/XC9ZKyJS9i — Cryptonews.com (@cryptonews) June 24, 2025 A third suspect, aged 19 from the Sharon region, reportedly passed classified information to Iranian contacts. He was allegedly recruited online and maintained prolonged communication with Iranian operatives during recent tensions between the two countries. While Israeli officials have not publicly connected the arrests to any specific cyber incident, TRM Labs suggests the timeline may point to a broader intelligence operation. TRM Labs Flags Possible Intelligence Overlap in Espionage Case Involving Nobitex Hack “Although Israeli authorities have not confirmed any connection between the hack and the arrests, the timing and tactical profile suggest potential intelligence overlaps,” TRM Labs noted. The firm noted that Israeli airstrikes occurred on June 13, followed by the hack of Iran-based crypto exchange Nobitex on June 18, and then the arrests on June 24. However, till now, there hasn’t been a solid evidence linking Israel to the June 18 cyberattack on Nobitex, Iran’s largest cryptocurrency exchange , although a pro-Israel hacking group Predatory Sparrow also know as “ Gonjeshke Darande” claimed responsibility for the breach. 👨🏻‍💻 The fallout from the $100 million @nobitexmarket exchange hack continues to deepen as hackers release the platform’s full source code. #Hack #Nobitex https://t.co/1pAhbG3TAv — Cryptonews.com (@cryptonews) June 19, 2025 Additionally, the pro-Israel hacker group Gonjeshke Darande claimed to not only wipe $90 million of the exchange but also released the Iranian exchange’s full source code , including server lists, cold wallet scripts, and privacy settings. Notably, the group has previously targeted Iranian infrastructure for intelligence-gathering. TRM Labs suggests the breach could have granted access to KYC records, potentially aiding Israeli cyber units in identifying Iranian handlers or mapping crypto payments to local operatives. Iran’s use of cryptocurrency in covert operations is not new. Reports revealed that Iran routinely uses crypto to fund proxies, evade sanctions, and support cyber operations. 📈 In 2024, Russia and Iran increasingly turned to cryptocurrency to bypass Western sanctions, leveraging DeFi, no-KYC exchanges, and crypto for financial operations, according to @chainalysis #Russia #Iran #Sanctions https://t.co/ep1f3tLNms — Cryptonews.com (@cryptonews) February 17, 2025 Similar patterns have emerged in other countries. In the same year, South Korea arrested individuals linked to North Korean intelligence for passing military secrets in exchange for crypto.

Author: CryptoNews
Vanadi Coffee stock surges 242% in a month, shareholders approve plan to establish $1.1b Bitcoin treasury

Vanadi Coffee stock surges 242% in a month, shareholders approve plan to establish $1.1b Bitcoin treasury

Struggling Spanish cafe Vanadi Coffee stock skyrocketed more than triple its initial value after shareholders of the firm approved a plan to invest up to 1 billion euros into its Bitcoin treasury. According to a translated press release, on June…

Author: Crypto.news
The crypto market rose across the board, with the Layer2 sector leading the gains by more than 5%, and BTC breaking through $108,000

The crypto market rose across the board, with the Layer2 sector leading the gains by more than 5%, and BTC breaking through $108,000

PANews reported on June 30 that according to SoSoValue data, as external disturbances eased and short-term uncertainties decreased, market sentiment recovered and all sectors of the crypto market generally rose.

Author: PANews
The Ethereum Foundation recently transferred 1,000 ETH to a multi-signature wallet every day, and there was no further action on the 11,000 ETH transferred

The Ethereum Foundation recently transferred 1,000 ETH to a multi-signature wallet every day, and there was no further action on the 11,000 ETH transferred

PANews reported on June 30 that according to on-chain analyst Ember’s monitoring, the Ethereum Foundation has recently transferred 1,000 ETH to another multi-signature wallet every day. A total of 11,000

Author: PANews
Quantum Black Swan: How a 2026 Quantum-Computing Breakthrough Could Upend Crypto (and Which Coins Might Survive)

Quantum Black Swan: How a 2026 Quantum-Computing Breakthrough Could Upend Crypto (and Which Coins Might Survive)

A simulated quantum stress test conducted using OpenAI’s ChatGPT o3 model has raised fresh concerns about the future of digital assets. The simulation explores a hypothetical breakthrough in quantum computing by 2026 that would render many of today’s cryptographic standards obsolete, potentially leading to widespread collapse across the cryptocurrency ecosystem. Quantum computers use qubits, which can exist in multiple states at once due to the principles of superposition and entanglement. This allows them to perform complex calculations at speeds far beyond what is possible with classical machines. According to o3, a sudden leap in quantum capability, such as the development of a 10,000-qubit fault-tolerant machine with sufficiently low error rates, could break the security systems underpinning major blockchains like Bitcoin and Ethereum. ChatGPT o3 Warns of ‘Q-Day’ Extinction Risk for Blockchains o3 raised red flags across the crypto industry, warning that the rise of quantum computing—referred to as “Q-Day”—could pose an extinction-level threat to major blockchains. At the heart of blockchain security lies the asymmetric cryptography model: private keys generate public keys , but not the other way around. This one-way function is what secures digital wallets and signs transactions. Quantum computers might sound like another buzzword in the tech world, yet their threat to #cryptocurrency is very real and approaching fast. Scientists may differ on the timeline, but they all agree: “Q-day” is not a matter of if, but when. #Bitcoin https://t.co/SdH4NiTMoo — Cryptonews.com (@cryptonews) June 13, 2024 Quantum computing breaks this assumption. Using algorithms like Peter Shor’s , proven in theory to efficiently factor large numbers, quantum systems could reverse-engineer private keys from public data. “A chain is only as secure as its signatures,” the model warns. “Once signatures break, the chain breaks.” The o3 model stress-tested major blockchain protocols under a Q-Day scenario in which quantum machines can break cryptographic standards like ECDSA and RSA. The findings are sobering. Bitcoin: Legacy Risk and No Governance Pathway Bitcoin, which still uses the Elliptic Curve Digital Signature Algorithm ( ECDSA ), was flagged as particularly vulnerable. As noted by o3, a significant portion of BTC remains locked in legacy wallets with no quantum-resistant protections. A 2020 Deloitte study further estimated that up to 25% of Bitcoin holdings could be compromised, especially coins stored in exposed or reused addresses. Data from Project Eleven reinforces this concern: over 6.2 million BTC, worth approximately $648 billion, are stored in addresses with exposed public keys. This translates to more than 10 million wallets that could be at risk once quantum computers achieve sufficient decryption power. 🚀 @Tether_to CEO @paoloardoino has warned that quantum computing could eventually pose a threat to inactive Bitcoin wallets. #Bitcoin #Quantum https://t.co/u8DCYrTjYw — Cryptonews.com (@cryptonews) February 9, 2025 The problem is compounded by Bitcoin’s structural rigidity. What has long been praised as Bitcoin’s strength , its conservative dev culture and emphasis on protocol stability, now poses a liability. In a crisis, Bitcoin’s inability to adapt quickly could delay vital countermeasures. As OpenAI’s o3 model puts it, “Bitcoin’s survival isn’t cryptographic—it’s sociopolitical. Without preemptive upgrades, post-Q-Day drains will begin within days of the breakthrough.” While discussions around post-quantum signature schemes like XMSS or Dilithium have occurred within Bitcoin Core, no concrete implementation or accepted BIP exists. The introduction of lattice-based alternatives (e.g., Falcon) remains theoretical, with no set roadmap. According to o3, Bitcoin network survival would likely depend on one of two strategies: A politically contentious fork to a quantum-safe Bitcoin variant A preemptive key rotation or shielding mechanism that avoids exposed legacy keys Ethereum: More Adaptable, But Still At Risk While Ethereum shares Bitcoin’s cryptographic vulnerability, relying on the ECDSA, it ranks significantly higher in adaptability. The o3 model flagged Ethereum’s active developer community, rapid upgrade history, and flexible governance as key assets in navigating a post-quantum scenario. Unlike Bitcoin, Ethereum has demonstrated the capacity to coordinate complex transitions. The DAO fork, Ethereum 2.0 Merge , and the Shapella upgrade all serve as precedent for community-driven protocol evolution. “Ethereum can adapt,” o3 concluded, “but only if it moves quickly.” Still, the shift to post-quantum cryptography would require extensive infrastructure overhauls. These include wallet standards, signature validation rules in smart contracts, Layer-2 rollups, and developer tooling. Many of these components were built on cryptographic assumptions that would not hold after a quantum breakthrough. Account abstraction is only half-done The end goal is non-ECDSA accounts (multisigs, key changes, quantum-resistant, privacy protocols (!!)) being true first class citizens A lot of good work recently on aggressively simplifying 7701 to make this happen https://t.co/j66geDAoC8 — vitalik.eth (@VitalikButerin) April 27, 2025 The o3 model simulation emphasized this point, saying, “Ethereum is the only major L1 chain with a plausible fast-track governance protocol for quantum threats. But most dApps on Ethereum aren’t ready.” However, Ethereum’s programmability, a defining strength, also creates a unique risk surface. Millions of deployed smart contracts, including financial primitives on protocols like Uniswap, Aave, and MakerDAO, use static cryptographic calls vulnerable to quantum decryption. Many are immutable and cannot be patched after deployment. That said, proxy patterns and upgradeable architectures like OpenZeppelin’s implementation give some contracts a pathway for modification. But these only apply where foresight was used. Vast portions of Ethereum’s contract base may be impossible to rescue post-Q-Day without chain-wide intervention. For Ethereum to remain viable in a post-Q-Day world, o3 noted the following actions will be necessary: Roll out hybrid cryptographic wallets supporting post-quantum signature layers (e.g., Falcon, Dilithium). Incentivize or mandate critical dApps to adopt quantum-safe signature schemes in proxy contracts. Leverage Layer-2s for isolated asset migration and transaction validation under new cryptographic rules. Coordinate a network-wide “key rotation” event with community buy-in, governance clarity, and tooling support. Other Chains and DeFi: Varying Levels of Readiness Algorand: Purpose-Built for the Quantum Era Among all the Layer-1 chains o3 analyzed, Algorand emerged as one of the most quantum-resilient. Designed with future-proofing in mind, the protocol already incorporates cryptographic innovations such as Verifiable Random Functions (VRFs), and it has actively explored lattice-based encryption methods like NTRU, a class of cryptography believed to be quantum-resistant. “If Q-Day hits in 2026,” the o3 model observed, “Algorand is one of the only chains with a 12-month adaptation head start.” Algorand’s pipelined Byzantine Fault Tolerant (BFT) consensus rotates validator keys regularly, reducing the exposure window of any single cryptographic signature. More on Algorand's post-quantum technology: https://t.co/NIQEnbER0P — Algorand Foundation (@AlgoFoundation) May 27, 2025 According to o3, its structured governance and fast finality also enhance its ability to implement protocol-level upgrades quickly in the face of emerging threats. Polkadot: Modular Agility Meets Cryptographic Risk Polkadot ranked just behind Algorand in terms of readiness. The network’s parachain architecture allows semi-independent blockchains to run in parallel, each potentially adopting its own quantum-resilient cryptography without waiting for a full network-wide consensus. According to o3, this modularity offers developers the freedom to implement post-quantum upgrades on a per-parachain basis. However, Polkadot currently relies on Schnorr-based BLS signatures , which are vulnerable to quantum attacks. Still, its OpenGov system and decentralized treasury could support rapid upgrade cycles when needed. Cardano: Academic Rigor, Operational Drag Cardano presents a paradox. It is one of the few blockchain platforms deeply invested in the academic exploration of post-quantum cryptographic techniques, including both lattice- and hash-based signature schemes. o3 noted that Cardano’s extended UTXO model also provides a more modular smart contract framework, which may ease the migration to new cryptographic primitives. Post-Quantum Cardano https://t.co/MpNWSo8KWm — Charles Hoskinson (@IOHK_Charles) February 20, 2025 However, Cardano still relies on Ed25519 signatures, which are quantum-susceptible, according to o3. And while its Voltaire governance phase is intended to support decentralized decision-making for protocol upgrades, it remains under development. As the o3 model put it, “If crypto were judged on whitepapers alone, Cardano would thrive. But Q-Day doesn’t wait for peer review.” Privacy Coins: From Anonymity to Liability Privacy-focused cryptocurrencies like Monero and Zcash face a uniquely grim outlook. Their core innovations of ring signatures, stealth addresses, and zero-knowledge proofs offer strong protections against classical decryption but may provide little defense against quantum attacks. o3 noted that quantum algorithms capable of breaking elliptic curve cryptography could dismantle the projects’ anonymity features, exposing past transactions and rendering current privacy guarantees moot. Compounding the threat is the pseudonymous governance model, which makes coordinated upgrades or overhauls difficult. “Quantum computing doesn’t just de-anonymize Monero,” the o3 warned, “it breaks its reason to exist. Privacy becomes exposure.” DeFi Protocols: Collateral Damage from Layer-1 Failures Decentralized finance (DeFi) protocols, particularly those built atop Ethereum such as Aave, Compound, and MakerDAO, face second-order vulnerabilities. While these protocols do not directly implement ECDSA at their core, they depend entirely on Ethereum’s base-layer security. If Ethereum’s signature scheme were compromised and Layer-1 wallets became exposed, the smart contracts securing billions in TVL (Total Value Locked) would be undermined; regardless of whether the dApps themselves were quantum-aware. o3 summarized the cascading risk simply: “If the base layer fails, so does the application.” Compounding the issue is the immutability of many smart contracts. While some DeFi platforms use proxy architectures for upgrades, many early deployments do not, making them inflexible in crisis scenarios. Meme Coins and High-Beta Tokens: Virtually Defenseless At the other end of the spectrum lie meme coins and low-infrastructure tokens, which the o3 model described as “nearly defenseless.” These tokens typically lack development teams, formal governance mechanisms, or upgrade paths, leaving them acutely vulnerable to any sudden shifts in cryptographic assumptions. In the event of Q-Day, such tokens would likely suffer immediate liquidity shocks, with whales offloading positions to avoid permanent loss. The community might attempt to fork the project onto a new chain, but without technical leadership, meaningful migration is unlikely. Who Is Ready for Q-Day? The o3 simulation’s sector-by-sector stress test does not predict which coins will succeed in market terms, but rather which systems have the structural capacity to survive a game-changing leap in computational power. Based on cryptographic architecture, governance agility, and ongoing research, the post-quantum readiness landscape looks like this: Best Positioned Today Apart from Algorand , Polkadot , Ethereum, and Cardano mentioned above, these other coins have been noted to be well positioned in the case of a Q-day. Cosmos Ecosystem (ATOM, Juno, Osmosis) Cosmos shares Polkadot’s modular philosophy. Independent zones (chains) communicate through IBC (Inter-Blockchain Communication), allowing sovereign upgrades. Projects like Juno and Osmosis have agile governance models and could implement PQC locally. Avalanche (AVAX) Employs a DAG-optimized consensus model (Snowball/Snowman), which increases redundancy and communication between subnets. Subnets (custom blockchains) can adopt PQC signatures independently. Governance is emerging, but the tech is flexible. NEAR Protocol (NEAR) A sharded blockchain with scalability and flexibility at its core. It already supports contract-based key rotation and multi-signature accounts, making future cryptographic migration plausible Tezos (XTZ) Tezos was one of the first blockchains to emphasize formal on-chain governance and self-amending protocols. It supports Michelson , a low-level functional language that allows for cryptographic primitives to be upgraded via governance proposals without forks. Radix (XRD) Radix uses a unique consensus model (Cerberus) and is focused on developer experience and modular architecture. While not currently post-quantum, its component-based DeFi engine and structured governance may allow for faster quantum-proof upgrades. Hedera Hashgraph (HBAR) Built on hashgraph consensus (not a blockchain), Hedera offers high throughput and ABFT (asynchronous Byzantine fault tolerance). Its enterprise focus includes forward-looking cryptographic considerations, and the council-led governance can act quickly. Most At Risk Monero , Shiba Inu and ERC-20 tokens, Dogecoin , Bitcoin was noted by o3 to have critical quantum-exposure risks , either due to obsolete cryptographic foundations, rigid governance, or a total dependency on vulnerable Layer-1 infrastructure. Litecoin (LTC), Bitcoin Cash (BCH), and Dash (DASH): All forked from or closely related to Bitcoin, they inherit the same ECDSA vulnerabilities without demonstrating meaningful governance innovation or PQC research. Conclusion The takeaway is not to panic, but to prioritize strategic risk awareness . Quantum computing is not a hypothetical threat; it is an inevitable one . What remains uncertain is when it will become powerful enough to break widely used public-key cryptography. For blockchain projects, the prudent move isn’t to predict Q-Day’s exact date but to build architectures that can flex when it does arrive. That includes investing in research, improving governance, abstracting cryptography, and educating communities on quantum resilience.

Author: CryptoNews
From rent checks to smart contracts: EstateX’s tokenized twist on real estate investing

From rent checks to smart contracts: EstateX’s tokenized twist on real estate investing

As real estate investing moves onto the blockchain, Bart de Bruijn is making sure everyday investors don’t get left behind. De Bruijn is the co-founder and main director of EstateX, a rapidly growing platform that utilizes tokenization and smart contracts…

Author: Crypto.news
Texas is going Bitcoin: 3 tokens to stack as U.S. states embrace BTC reserves

Texas is going Bitcoin: 3 tokens to stack as U.S. states embrace BTC reserves

Texas funds $10m Bitcoin reserve, setting stage for altcoin surge as ETF hopes and investor momentum grow. #partnercontent

Author: Crypto.news