Technology


Finance

A Use Case You Can Eat: California Crabs Tracked by Helium Network

The Helium Network is a crypto-powered network of Internet hotspots, but it has saved one amateur fisherman thousands of dollars on crab pots every year.

Crabs caught using Helium-powered tracking devices. (Jameson Buffmire)

Learn

What Is a Seed Phrase?

Your seed phrase is essentially your crypto wallet recovery password if you lose access to the device where it’s initially stored on.

Seed phrase warning (olieman.eth/Unsplash)

Tech

Ethereum's First Mainnet Shadow Fork Goes Live as Move to PoS Continues

The shadow fork will stress test developers' assumptions on existing testnets and the mainnet.

Founder of Ethereum Vitalik Buterin during TechCrunch Disrupt London 2015 (John Phillips/Creative Commons/CC2.0, modified by CoinDesk)

Layer 2

While You Were Out Partying, I Studied Bitcoin Development

Open-source software discussions were the best-kept secret at Bitcoin 2022 in Miami.

The most underrated part of Bitcoin 2022 (George Kaloudis/CoinDesk)

Learn

Ledger Nano S Plus Review: Good for Beginners

The brand-new Ledger Nano S Plus is an inexpensive, Swiss Army knife-like hardware wallet that does a pretty good job of keeping crypto self-custody simple for new users.

Ledger Nano S Plus (Ledger)

Learn

No Stupid Questions: What’s a Crypto Token, Anyway?

While you might be familiar with cryptocurrencies and how they work, do you know what they actually are?

(MARK GARLICK/SCIENCE PHOTO LIBRA/Getty Images)

Learn

What Is Cryptojacking? How to Protect Yourself Against Crypto Mining Malware

While most crypto hacks involve stealing private keys belonging to a crypto wallet and emptying it, cryptojacking involves infecting a device with malware to gain control over it. Here’s how you can protect yourself.

(Lisa Ann Yount, modified by CoinDesk)

Learn

Quantum Computers vs. Crypto Mining: Separating Facts From Fiction

It has long been a concern that quantum computers could one day undermine Bitcoin and other crypto mining networks, but how realistic is that threat?

Qubit concept representation. Visualization of quantum bit (Getty)

Tech

Now You Can Try 'Teleporting' Bitcoin for Greater Privacy With CoinSwaps

The alpha release of Teleport implements the CoinSwap privacy technique in an effort to improve bitcoin privacy by making transactions "invisible."

Still in alpha, Teleport could help preserve Bitcoin transaction privacy. (BOTCookie/iStock/Getty Images Plus)

Learn

Custodial Wallets vs. Non-Custodial Crypto Wallets

The term “wallet” is used to describe hardware or software that holds cryptocurrencies.

(Getty)