Pi Network (PI) as the first cryptocurrency that supports mobile mining, the Southeast Asian market is the core area of its user growth. Offline payment scenes have appeared in Vietnam, the Philippines, and other places, but regulatory uncertainty and controversies over token economic models remain the main risks.
3/4/2025, 2:20:21 AM
The blockchain market has grown rapidly during the COVID-19 pandemic driven by P2E gaming.
3/28/2024, 10:58:33 AM
This article provides a detailed introduction to the basic situation of Covalent Network, the tokenomics, market and competitors, and valuation.
2/1/2024, 1:26:49 PM
As artificial intelligence becomes the mainstream trend in global technological development, its integration with blockchain technology is also seen as a future direction. This trend has led to a growing demand for access to and analysis of historical data. In this context, EWM demonstrates its unique advantages. ChainFeeds researcher 0xNatalie elaborates on the concept, data processing workflow, and use cases of EWM in her article.
6/25/2024, 2:00:31 AM
This article delves into the Ronin chain, an EVM-compatible Layer-1 blockchain optimized for NFTs and gaming. By building a community-driven Play-to-Earn gaming ecosystem, it has attracted significant attention from both Web2 and Web3 gamers. The article analyzes how Ronin has enhanced its security by migrating to a DPoS consensus mechanism and expanding its validator network following a bridge hack. It also discusses how Sky Mavis is fostering innovation in the Ronin ecosystem through partnerships with popular game IPs and plans to integrate zkEVM (Zero-Knowledge Ethereum Virtual Machine) to enable games to launch and operate their own Layer-2 chains on the Ronin network without permission, driving the ecosystem's growth and development.
8/29/2024, 7:34:36 AM
On February 21, 2025, a serious security incident occurred at the cryptocurrency exchange Bybit, where over $1.5 billion in assets were stolen. This incident is similar to the attack on the Radiant Capital cross-chain lending protocol in October 2025, where attackers stole funds by controlling multi-signature private keys and exploiting contract vulnerabilities. Both incidents highlight the increasing complexity of hacker attacks and expose security vulnerabilities in the crypto industry. This article provides an in-depth analysis of the technical details of the Radiant incident, focusing on the abuse of malicious contracts and multi-signature wallets. The article concludes by emphasizing the urgent need to strengthen industry security measures to protect user assets.
2/22/2025, 4:21:23 AM