Author: AI Publisher

  • NEAR Protocol: From Sharding Pioneer to Chain Abstraction

    NEAR Protocol launched in 2020, founded by Illia Polosukhin (who co-authored the foundational “Attention Is All You Need” AI paper) and Alexander Skidanov. NEAR used a sharding approach called Nightshade to achieve high throughput, and its account model was designed to be human-friendly — users could have readable account names (like alice.near) instead of hexadecimal addresses. The UX-first philosophy set NEAR apart from more technically focused L1s.

    NEAR’s ecosystem grew modestly through 2021-2023, attracting projects like Ref Finance (DEX), Burrow (lending), and several gaming applications. But NEAR never achieved the explosive growth of Solana or the institutional gravity of Ethereum. The chain occupied an awkward middle ground: technically competent but lacking the killer app or narrative that would attract mass attention.

    The pivot to chain abstraction in 2024 gave NEAR a new identity. NEAR’s chain signatures technology let users interact with any blockchain (Ethereum, Bitcoin, Solana) through their NEAR account, without needing wallets on each chain. The vision: a single NEAR account that could sign transactions on every chain, making the multi-chain experience invisible to users. This positioning aligned NEAR with the chain abstraction narrative and gave it a differentiated role in the ecosystem.

    Polosukhin’s AI background also positioned NEAR uniquely at the intersection of AI and crypto. NEAR.AI, the protocol’s AI research arm, worked on AI agent infrastructure and privacy-preserving AI computation. Whether NEAR can leverage its founder’s credibility in AI to capture value at the AI-crypto intersection — while also winning the chain abstraction race — depends on execution across two ambitious bets simultaneously. It’s a lot of plates to spin, but the intellectual firepower behind the project is genuine.


    Trade memecoins safely on Memeshot — iOS / Android

  • Smart Contract Audits: The Security Theater Problem

    Smart contract auditing has become a multi-hundred-million-dollar industry, with firms like Trail of Bits, OpenZeppelin, Spearbit, Cyfrin, and Consensys Diligence reviewing protocol code before launch. A typical audit costs $50,000 to $500,000 depending on complexity and takes 2-8 weeks. Major DeFi protocols often commission multiple audits from different firms. The industry has created real value by catching thousands of bugs before they could be exploited.

    But audits have a dirty secret: they don’t guarantee security. Audited protocols get hacked regularly. Euler Finance was audited by six firms and still lost $197 million to an exploit in March 2023. Ronin was audited and lost $625 million. The Curve pool that was drained for $70 million had been running audited code for years. Audits catch many bugs but can’t catch all of them — especially bugs that emerge from complex interactions between multiple protocols that were each audited independently.

    The “audited” label has become a form of security theater. Projects display audit badges prominently on their websites, and users treat “audited” as equivalent to “safe.” But auditors themselves explicitly disclaim this: audit reports typically state that “this review does not guarantee the absence of vulnerabilities.” The gap between what audits promise (a thorough code review) and what users believe they promise (guaranteed safety) is a systemic communication failure.

    The industry is evolving toward better approaches: formal verification (mathematically proving code properties), real-time monitoring (detecting exploits as they happen), bug bounties (incentivizing continuous community review), and insurance protocols (Nexus Mutual, InsurAce) that provide financial backstops when security fails. No single solution is sufficient. Defense in depth — multiple overlapping security layers — is the only responsible approach. But the first step is educating users that “audited” means “reviewed by professionals” not “impossible to hack.”


    Trade memecoins safely on Memeshot — iOS / Android

  • Self-Custody: Why “Not Your Keys, Not Your Coins” Matters

    The phrase “not your keys, not your coins” has been crypto’s most important security mantra since the Mt. Gox collapse in 2014. It means that if you don’t hold the private keys to your crypto — if your assets sit on an exchange or in someone else’s wallet — you don’t truly own them. The exchange can freeze your account, go bankrupt, get hacked, or simply disappear. Mt. Gox, FTX, Celsius, BlockFi, and Voyager all proved this point by losing billions in customer funds.

    Self-custody means holding your own private keys, typically through a hardware wallet (Ledger, Trezor), a software wallet (MetaMask, Phantom), or a multi-sig setup. The user is solely responsible for security: protecting the seed phrase, avoiding phishing attacks, and managing access. This responsibility is both the advantage and the disadvantage of self-custody — nobody can freeze your funds, but nobody can recover them if you lose your keys either.

    The data on lost crypto is staggering. Chainalysis estimates that roughly 20% of all Bitcoin — over $100 billion at current prices — is in wallets whose keys have been lost permanently. Stories abound: the Welsh man whose hard drive containing 8,000 BTC sits in a landfill, the early Bitcoin miner who forgot his wallet password and has two guesses remaining before the wallet encrypts permanently, the countless users who lost seed phrases written on paper.

    The industry is working to make self-custody easier without sacrificing security. Account abstraction (ERC-4337) enables social recovery, where trusted contacts can help restore access to a wallet. Multi-party computation (MPC) splits private keys across multiple devices so no single device holds the complete key. Smart contract wallets like Safe (formerly Gnosis Safe) require multiple signatures for transactions. The goal is “self-custody with training wheels” — the security of holding your own keys with the recoverability of a centralized service. Achieving this would be one of the most important UX improvements in crypto history.


    Trade memecoins safely on Memeshot — iOS / Android

  • Phishing in Crypto: The Human Vulnerability

    Phishing is the most common attack vector in crypto — not because blockchains are insecure, but because humans are. A phishing attack in crypto typically involves tricking a user into signing a malicious transaction, entering their seed phrase on a fake website, or approving a token allowance that drains their wallet. No amount of smart contract auditing can protect against a user willingly signing a transaction they didn’t understand.

    The sophistication of crypto phishing has increased dramatically. Attackers create pixel-perfect copies of popular DeFi interfaces. They compromise Discord servers and post fake “airdrop claim” links. They buy Google Ads for search terms like “Uniswap” and direct users to malicious clones. They create fake Twitter accounts impersonating project founders and DM users with “limited time offers.” The attacks work because they exploit trust and urgency — the same psychological levers used in traditional phishing.

    Wallet drainers have become a category of their own. Services like Inferno Drainer (shut down after stealing over $80 million) and its successors provide turnkey phishing toolkits that anyone can deploy. These drainers use sophisticated techniques to extract maximum value from a compromised wallet: first draining the highest-value NFTs, then tokens, then native currency, all in a single transaction the victim approved without understanding its scope.

    Education is the only real defense against phishing. Technical solutions help — wallet simulation (previewing what a transaction will do before signing), allowance revocation tools (revoking permissions you’ve previously granted), and hardware wallet confirmation (physically verifying each transaction) — but ultimately the user must learn to recognize social engineering. In crypto, there is no customer support to call, no charge-back to file, and no insurance to claim. A single phishing click can be financially devastating, and the responsibility sits entirely with the user.


    Trade memecoins safely on Memeshot — iOS / Android

  • Hardware Wallets: The Gold Standard for Crypto Security

    Hardware wallets — physical devices that store private keys offline — are considered the gold standard for crypto security. By keeping keys in a secure element that never connects directly to the internet, hardware wallets protect against the most common attack vectors: malware, phishing, and remote hacking. The two dominant manufacturers, Ledger and Trezor, have collectively sold over 10 million devices.

    Ledger’s Nano S and Nano X became the most popular hardware wallets, supported by a sleek app and wide token compatibility. However, Ledger faced significant controversy in 2023 when it announced Ledger Recover — a service that would split the user’s seed phrase into three encrypted fragments stored by separate custodians, enabling recovery if the device was lost. The crypto community erupted: the entire point of a hardware wallet was that the seed phrase never left the device. Ledger argued the feature was opt-in and addressed the real problem of lost keys. Critics argued it created a backdoor that governments could subpoena.

    Trezor, founded by SatoshiLabs in the Czech Republic, took the opposite approach: fully open-source hardware and firmware, with no recovery service. Trezor’s Model One (2014) was the first commercial hardware wallet ever made. The company positioned itself as the “privacy-first” alternative to Ledger, appealing to users who valued transparency and didn’t trust any form of seed-phrase recovery that involved third parties.

    The hardware wallet market expanded to include newer entrants: Keystone (with QR-code-based air-gapped signing), GridPlus Lattice (with a screen large enough to display full transaction details), and Foundation Passport (Bitcoin-only, open source). The category’s growth reflects a mature understanding within the crypto community that self-custody security requires dedicated hardware — software wallets are convenient but fundamentally less secure because they run on internet-connected devices that malware can compromise.


    Trade memecoins safely on Memeshot — iOS / Android

  • The Biggest Crypto Hacks: A Timeline of Billions Lost

    Since Bitcoin’s early days, crypto has lost over $10 billion to hacks, exploits, and thefts. The timeline reads like a horror novel: Mt. Gox ($450M, 2014), Bitfinex ($72M, 2016), Coincheck ($530M, 2018), Ronin ($625M, 2022), Wormhole ($326M, 2022), Nomad ($190M, 2022), Euler ($197M, 2023), and dozens of smaller incidents that each caused millions in losses. The pace of attacks hasn’t slowed — 2024 alone saw over $1 billion in losses from hacks and exploits.

    The attack vectors have evolved. Early hacks were crude — stealing private keys from poorly secured hot wallets. By 2022-2024, attacks became sophisticated: exploiting complex DeFi protocol interactions, finding reentrancy bugs in audited code, social engineering multi-sig signers, compromising front-end interfaces, and manipulating oracle prices. The attackers include nation-state actors (North Korea’s Lazarus Group is estimated to have stolen over $3 billion from crypto), sophisticated criminal organizations, and lone wolf hackers.

    The industry’s security posture has improved significantly. Bug bounty programs (Immunefi manages over $150M in active bounties), professional audit firms (Trail of Bits, OpenZeppelin, Spearbit), formal verification tools, and security-focused monitoring services (Forta, Hypernative) have raised the baseline. Major protocols now spend millions on security before launching. But the attack surface keeps expanding as DeFi complexity grows.

    The uncomfortable truth is that crypto security is a permanent arms race. Every new protocol creates new attack surfaces. Every composability improvement creates new interaction risks. And the financial incentives for attackers are enormous — a single successful exploit can net hundreds of millions. The industry has gotten better at defense, but offense will always have the advantage in a system where code is law and transactions are irreversible. Insurance, circuit breakers, and time-locked governance are partial solutions. Perfect security is not achievable.


    Trade memecoins safely on Memeshot — iOS / Android

  • North Korea and the Lazarus Group: The State-Sponsored Crypto Thieves

    North Korea’s Lazarus Group is the most prolific crypto thief in history, estimated to have stolen over $3 billion from crypto protocols and exchanges since 2017. The group — a unit of North Korea’s military intelligence agency — has been linked to the Ronin bridge hack ($625M), the Harmony Horizon bridge hack ($100M), numerous smaller DeFi exploits, and sophisticated social engineering campaigns targeting crypto developers and employees.

    The attack methods are sophisticated and evolving. Lazarus operatives have posed as recruiters offering job opportunities to crypto developers, sending malicious code disguised as coding tests. They’ve compromised supply chain dependencies used by crypto projects. They’ve deployed fake trading bots and DeFi tools containing backdoors. In some cases, North Korean IT workers have been hired directly by crypto companies under false identities, gaining access to internal systems from the inside.

    Laundering the stolen funds is a challenge that Lazarus has partially solved. The group uses chain-hopping (moving funds across multiple blockchains), mixing services (Tornado Cash, Sinbad), peer-to-peer exchanges, and over-the-counter brokers in jurisdictions with weak AML enforcement. Despite aggressive tracking by firms like Chainalysis and Elliptic, North Korea has successfully laundered billions — funds that the US government believes finance the country’s nuclear weapons and ballistic missile programs.

    The implications for the crypto industry are sobering. State-sponsored actors with unlimited resources and no legal constraints are actively targeting every significant crypto protocol. The Lazarus Group alone may be responsible for more crypto losses than all other hackers combined. Defending against nation-state attackers requires security practices far beyond what most crypto teams implement — and the gap between required security and actual security is a systemic risk that the entire industry shares.


    Trade memecoins safely on Memeshot — iOS / Android

  • Arbitrum DAO: Managing a $3 Billion Treasury

    When the ARB token launched in March 2023, it created one of the largest DAO treasuries in crypto history — over $3 billion at peak token prices. The Arbitrum DAO was responsible for governing the most successful Ethereum L2, making decisions about protocol upgrades, incentive programs, treasury allocation, and ecosystem development. The stakes were enormous: billions of dollars in DeFi TVL depended on the DAO’s governance decisions.

    The governance challenges were immediate. A proposal to allocate 750 million ARB (~$1 billion at the time) to a foundation-controlled entity passed controversially in April 2023, with critics arguing the DAO was giving up control of a massive portion of its treasury too quickly. The episode highlighted the tension between efficient execution (foundations can move faster) and decentralized governance (token holders should decide).

    Subsequent governance cycles improved. Arbitrum implemented delegate-based governance where token holders could delegate their voting power to informed representatives. Active delegates emerged as a kind of “DAO parliament,” researching proposals and making informed voting recommendations. Incentive programs distributed hundreds of millions in ARB to protocols building on the chain, driving ecosystem growth. Arbitrum STIP (Short-Term Incentive Program) became a template for how L2 DAOs could use treasury funds to attract DeFi TVL.

    Arbitrum DAO’s experience offers the most comprehensive case study in large-scale crypto governance. It demonstrated that DAOs can manage billions of dollars, that delegate-based systems improve decision quality over direct voting, and that treasury-funded incentive programs can drive real ecosystem growth. It also demonstrated that governance participation remains low, whale influence remains high, and most token holders still don’t vote. DAO governance works better than critics claim and worse than advocates promise.


    Trade memecoins safely on Memeshot — iOS / Android

  • Snapshot: How Offchain Voting Became the Standard

    Snapshot launched in 2020 as a free, offchain voting platform for DAOs. The problem it solved was simple but critical: onchain voting on Ethereum was expensive. Each vote cost gas, which meant that governance participation had a financial cost — $5-50 per vote depending on network congestion. This priced out most token holders and made governance a privilege of whales. Snapshot eliminated the cost by moving votes offchain while still using onchain token balances to determine voting power.

    The adoption was immediate and near-universal. By 2024, Snapshot hosted governance for over 20,000 DAOs and had processed millions of proposals and votes. Virtually every major DeFi protocol used Snapshot for at least some of its governance — Uniswap, Aave, ENS, Compound, Lido, and hundreds of others. The platform became so dominant that “putting it on Snapshot” became shorthand for “starting a governance process.”

    Snapshot’s design was deliberately minimal. Users created “spaces” for their DAOs, defined voting strategies (token-weighted, quadratic, etc.), and published proposals. Token holders signed messages (free, no gas) to cast votes. The results were transparent and verifiable but not automatically executed onchain — a multisig or governance contract still needed to implement winning proposals. This “signal voting” approach was less trustless than fully onchain governance but orders of magnitude more accessible.

    The platform revealed a consistent pattern: DAO governance participation is low regardless of cost. Even with free voting, most DAOs see less than 5% of token holders voting on any given proposal. The barrier isn’t financial — it’s informational and motivational. Most token holders don’t have the context to evaluate complex protocol proposals, and the incentive to invest time in governance is weak when individual votes rarely matter. Snapshot solved the cost problem perfectly. The engagement problem remains unsolved.


    Trade memecoins safely on Memeshot — iOS / Android

  • DAO Failures: What We Learned From Things Going Wrong

    For every successful DAO, there are dozens that failed — and the failure modes are instructive. Wonderland DAO collapsed in January 2022 when its treasury manager, 0xSifu, was revealed to be Michael Patryn, co-founder of the fraudulent QuadrigaCX exchange. The revelation that a convicted fraudster was managing hundreds of millions in DAO funds highlighted the anonymous-governance problem: token holders had voted to trust someone they knew nothing about.

    Mango Markets DAO was exploited in October 2022 by Avraham Eisenberg, who manipulated the MNGO token price to drain $115 million from the protocol. Eisenberg then proposed a DAO vote to legitimize the theft as a “bug bounty” — arguing that he had used the protocol as designed. The DAO voted against his proposal, but the episode raised uncomfortable questions about the line between exploitation and legitimate use in permissionless systems. Eisenberg was later arrested and convicted of market manipulation.

    Build Finance DAO experienced a “hostile governance takeover” in February 2022, where an attacker accumulated enough governance tokens to pass a proposal giving themselves control of the treasury. The attack was perfectly legal within the DAO’s governance rules — the attacker simply bought voting power on the open market and used it. The episode demonstrated that token-based governance is fundamentally vulnerable to capital attacks.

    The collective lesson from these failures is that DAOs don’t eliminate trust — they redistribute it. Instead of trusting a CEO, you trust code, governance processes, and anonymous pseudonymous actors. The attack surface changes but doesn’t disappear. The most resilient DAOs are those that acknowledge these risks explicitly and build layered defenses: timelocks on treasury actions, multisig requirements for large transfers, identity requirements for key roles, and clear processes for removing bad actors. Pure trustlessness is a myth. Managed trust is the achievable goal.


    Trade memecoins safely on Memeshot — iOS / Android