"BSP"

Search result of

Courses (0)

Articles (6)

Glossary (0)

Global Regulatory Case Study: Pi Network's Compliance Path and Risks in Southeast Asia
Beginner

Global Regulatory Case Study: Pi Network's Compliance Path and Risks in Southeast Asia

Pi Network (PI) as the first cryptocurrency that supports mobile mining, the Southeast Asian market is the core area of its user growth. Offline payment scenes have appeared in Vietnam, the Philippines, and other places, but regulatory uncertainty and controversies over token economic models remain the main risks.
3/4/2025, 2:20:21 AM
Philippines Web3 Market Overview
Intermediate

Philippines Web3 Market Overview

The blockchain market has grown rapidly during the COVID-19 pandemic driven by P2E gaming.
3/28/2024, 10:58:33 AM
 Covalent Network: A hidden gem on the decentralized infrastructure track
Beginner

Covalent Network: A hidden gem on the decentralized infrastructure track

This article provides a detailed introduction to the basic situation of Covalent Network, the tokenomics, market and competitors, and valuation.
2/1/2024, 1:26:49 PM
After The Upgrade To Dencun, How Will The Long-Term Storage And Access Issues Of Ethereum Historical Data Be Addressed?
Advanced

After The Upgrade To Dencun, How Will The Long-Term Storage And Access Issues Of Ethereum Historical Data Be Addressed?

As artificial intelligence becomes the mainstream trend in global technological development, its integration with blockchain technology is also seen as a future direction. This trend has led to a growing demand for access to and analysis of historical data. In this context, EWM demonstrates its unique advantages. ChainFeeds researcher 0xNatalie elaborates on the concept, data processing workflow, and use cases of EWM in her article.
6/25/2024, 2:00:31 AM
Understanding Ronin: A Comprehensive Overview
Intermediate

Understanding Ronin: A Comprehensive Overview

This article delves into the Ronin chain, an EVM-compatible Layer-1 blockchain optimized for NFTs and gaming. By building a community-driven Play-to-Earn gaming ecosystem, it has attracted significant attention from both Web2 and Web3 gamers. The article analyzes how Ronin has enhanced its security by migrating to a DPoS consensus mechanism and expanding its validator network following a bridge hack. It also discusses how Sky Mavis is fostering innovation in the Ronin ecosystem through partnerships with popular game IPs and plans to integrate zkEVM (Zero-Knowledge Ethereum Virtual Machine) to enable games to launch and operate their own Layer-2 chains on the Ronin network without permission, driving the ecosystem's growth and development.
8/29/2024, 7:34:36 AM
Analyzing the Bybit Hack Using the Radiant Multi-Signature Attack as an Example
Beginner

Analyzing the Bybit Hack Using the Radiant Multi-Signature Attack as an Example

On February 21, 2025, a serious security incident occurred at the cryptocurrency exchange Bybit, where over $1.5 billion in assets were stolen. This incident is similar to the attack on the Radiant Capital cross-chain lending protocol in October 2025, where attackers stole funds by controlling multi-signature private keys and exploiting contract vulnerabilities. Both incidents highlight the increasing complexity of hacker attacks and expose security vulnerabilities in the crypto industry. This article provides an in-depth analysis of the technical details of the Radiant incident, focusing on the abuse of malicious contracts and multi-signature wallets. The article concludes by emphasizing the urgent need to strengthen industry security measures to protect user assets.
2/22/2025, 4:21:23 AM

Your Gateway to Crypto World, Subscribe to Gate for A New Perspective

Your Gateway to Crypto World, Subscribe to Gate for A New Perspective