Latest from Benjamin Powers
Twetch Launches Encrypted Messaging, In-Chat Payments on BSV Blockchain
Twetch, a social network that runs on the BSV blockchain, has introduced an encrypted messaging feature that lets users send each other money in the chat.

Arca to Gnosis: Show Us a Turnaround Plan or Give Investors' Money Back
In addition to wads of cash and the aura of respectability, institutions are bringing Wall Street’s activist investing strategies to crypto markets.

Prediction Markets' Time Has Come, but They Aren't Ready for It
After the pundits so badly misjudged the 2016 U.S. presidential election, prediction markets should be booming ahead of Nov. 3. Why aren’t they?

Secret Network's Privacy-Focused Smart Contracts Move a Step Closer to Going Live
The Secret Network’s privacy-focused smart contracts will be formally proposed for the mainnet on Sept. 8. If approved, they’ll launch a week later.

New Malware Spotted in the Wild That Puts Cryptocurrency Wallets at Risk
Using forked code from Loki malware, Anubis can steal cryptocurrency wallet IDs, system info, credit card details and other information.

Tor Project Launches Membership Program to Boost Agility, Funds
After laying off a third of its staff in April, the project is looking for ways to increase the “diversity of funds" in its budget.

YouTube's Whac-a-Mole Approach to Crypto Scam Ads Remains a Problem
Despite lawsuits and Google’s own ad policies, cryptocurrency scam ads are still making it through the YouTube gates and circulating for days.

Binance and Oasis Labs Launch Alliance to Combat Crypto Fraud and Hacks
The aim is a comprehensive database of information gleaned from previous hacks and fraud used to proactively fight future ones. The platform supports Bitcoin, Ethereum, TRX and EOS blockchains.

'It's Part and Parcel of Crypto': How Memes Drive Narrative and Value
In 1964, the Canadian media theorist Marshall McLuhan said the "medium is the message." Today, in crypto, the meme is the message.

These Illicit SIM Cards Are Making Hacks Like Twitter's Easier
SIM cards that spoof specific numbers, prevent tracking, and alter users voices are making social engineering attacks like those on Twitter easier.
