Search results for "HIDE"
2026-04-01
01:20

ZEC (Zcash) up 10.26% in the last 24 hours

Gate News message. On April 1, according to Gate行情, as of the time of writing, ZEC (Zcash) is trading at $248.68. It is up 10.26% over the past 24 hours, reaching a high of $258.21 and falling to a low of $226.22. The 24-hour trading volume is $3.9798 million. The current market cap is approximately $4.136 billion. Zcash is the first blockchain system to use a zero-knowledge proof mechanism. It can provide complete payment confidentiality while still being able to use a public blockchain to maintain a decentralized network. The total supply of the ZEC token is 21 million. Unlike Bitcoin, Zcash transactions automatically hide the sender, receiver, and amount of every transaction on the blockchain. Only those who have the viewing keys can see the contents of transactions. Users have complete control
More
ZEC-4,29%
03:20

GlassWorm upgrade supply chain attack! A disguised plugin steals cryptocurrency assets, with Solana becoming the C2 channel.

GoPlus warns that GlassWorm has been upgraded into a sophisticated supply-chain attack framework that disguises itself as a Chrome extension to steal user data and encrypted assets. The attack relies on code injection and poisoning, using the Solana blockchain to hide instructions and enhance stealth. Users should be wary of installing unknown software and deploy detection tools to defend against it.
More
05:45

Vitalik: Privacy in encryption is crucial for local AI agents, as it prevents API calls from leaking user behavior.

Vitalik Buterin emphasizes the importance of encryption privacy for local AI agents, which can prevent the leakage of user behavior during API calls. He mentioned that hybrid networks can initially hide behavior, but service providers need to implement anti-DoS mechanisms, and payment processes involve tracking risks. Encryption technology can effectively protect user privacy.
More
02:40

PA Data: Polymarket's Hassan I盘口 with over 500 profit addresses is actually controlled by a very small number of entities

PANews reports that analysis shows that over 500 suspicious addresses profiting from the Polymarket Khamenei market are actually controlled by a few entities. These addresses collaboratively operate across multiple markets to hide fund flows and evade risk controls, with the top 15 suspicious addresses generating a total profit of $900,000.
More
02:16

ASTER (Aster) 24-hour increase of 9.61%

Gate News Bot Message, February 9th, According to CoinMarketCap data, as of press time, ASTER (Aster) is currently trading at $0.62, up 9.61% in the past 24 hours, with a high of $0.65 and a low of $0.42. The 24-hour trading volume reached $267 million. The current market capitalization is approximately $1.542 billion, an increase of $135 million compared to yesterday. Aster is a next-generation perpetual contract decentralized exchange, dedicated to providing non-custodial trading services for all traders. The platform supports cross-chain trading without the need for cross-chain bridges or switching, allowing users to place orders directly on the selected chain. Aster offers advanced tools such as hidden orders, enabling traders to hide the size and direction of limit orders in the public order book, giving users a competitive edge. The platform supports leverage of up to 100x.
More
ASTER-1,37%
08:26

Payy is launching a privacy-focused Ethereum Layer 2 network that supports MetaMask. It allows users to perform stablecoin transfers with enhanced privacy, making transactions "invisible" and confidential.

Privacy Wallet and Crypto Card Service Provider Payy Announce Launch of a Privacy-Focused Ethereum Layer 2 Network, Now Directly Integratable with MetaMask. The network defaults to privacy-preserving ERC-20 token transfers without requiring any modifications to existing smart contracts, aiming to enable on-chain financial activities to remain compliant while minimizing external traceability. Payy states that in the past, privacy often meant complex experiences, fragmented liquidity, or poor compatibility. This network's underlying architecture allows "privacy to run in the background." Its system automatically routes user transactions to private ERC-20 liquidity pools to hide the true flow of funds; when users interact with DeFi protocols, assets are transferred to newly generated addresses, further reducing on-chain linkability. Related private data is stored in an off-chain privacy vault, allowing users to choose different privacy and compliance combinations based on their needs.
More
ETH-3,28%
ZEC-4,29%
11:38

The Ministry of Public Security's draft on Internet Crime Prevention and Control Law includes illegal virtual currency transactions.

ChainCatcher Message: The Ministry of Public Security announced that the Draft Law on the Prevention and Control of Cybercrime (Draft for Comments) has been drafted and is now open for public comments. The contents include: No individual or organization shall knowingly hide, transfer, acquire, sell on behalf of others, or otherwise conceal or disguise funds, data, virtual network property, etc., obtained through illegal online activities. No individual or organization shall knowingly use funds obtained through illegal activities to provide capital flow services for others using virtual currencies or other virtual network assets.
More
09:50

60% of crypto press releases hide risks! Research uncovers the gray propaganda chain—how can investors avoid pitfalls?

A recent study has sounded the alarm for the crypto industry. Blockchain data company Chainstory released a report stating that over 60% of cryptocurrency press releases are related to high-risk or scam projects. These are being disseminated through "press release distribution networks" across numerous websites, creating a false impression of project "legitimacy and compliance." The research team reviewed 2,893 press releases published between June and November 2025 and found that most originated from projects with obvious risk signals, including anonymous teams, exaggerated and unrealistic promises, copied website structures, and marketing language with intimidation tactics. Some projects were also confirmed to have addresses that highly overlap with blacklists and scam alert systems, essentially constituting fraudulent activities.
More