ETH logo

ETH
Ethereum

331,389
Mkt Cap
$224.92B
24H Volume
$22.52B
FDV
$224.92B
Circ Supply
120.69M
Total Supply
120.69M
ETH Fundamentals
Max Supply
0.00
7D High
$2,019.43
7D Low
$1,856.09
24H High
$1,930.83
24H Low
$1,845.98
All-Time High
$4,946.05
All-Time Low
$0.433
ETH Prices
ETH / USD
$1,847.67
ETH / EUR
€1,567.78
ETH / GBP
£1,369.57
ETH / CAD
CA$2,531.83
ETH / AUD
A$2,616.80
ETH / INR
₹168,109.00
ETH / NGN
NGN 2,482,915.00
ETH / NZD
NZ$3,100.61
ETH / PHP
₱106,546.00
ETH / SGD
SGD 2,340.45
ETH / ZAR
ZAR 29,574.00
Loading...
Loading...
News
all
press releases
Crypto Market Review: Ethereum (ETH) Must Protect $1,885, Is XRP Close to Losing $1? Shiba Inu: Why the Outlook is Shifting
Challenging times on the market are back as most assets tumble back to guarding themselves from bearish attacks.
utoday·1h ago
News Placeholder
More News
News Placeholder
Saylor Denied the Quantum Threat: BTC is Safe
Michael Saylor debunked quantum computing threats, emphasized BTC's upgradable structure. MicroStrategy bought 592 BTC, reached a total of 717K BTC. Vitalik Buterin is preparing for ETH. Net Holdin...
coinotag·2h ago
News Placeholder
IoTeX Hack: Urgent $440K Bounty Offer Reveals Critical Cross-Chain Bridge Vulnerability
BitcoinWorld IoTeX Hack: Urgent $440K Bounty Offer Reveals Critical Cross-Chain Bridge Vulnerability In a dramatic move underscoring the persistent vulnerabilities within decentralized finance, the IoTeX blockchain network has publicly offered a 10% bounty, valued at $440,000, to the anonymous hacker responsible for a $4.4 million exploit. The project issued this stark ultimatum on the social platform X, demanding the return of stolen assets within a critical 48-hour window. This incident, centered on the unauthorized minting of 410 million CIOTX tokens via the ioTube cross-chain bridge, immediately sent shockwaves through the crypto security community and raised urgent questions about bridge infrastructure safeguards. Anatomy of the IoTeX Cross-Chain Bridge Exploit The IoTeX security breach represents a sophisticated attack vector targeting cross-chain interoperability. Fundamentally, the hacker discovered and exploited a vulnerability within the ioTube bridge’s smart contract logic. This flaw permitted the unauthorized creation, or minting, of 410 million CIOTX tokens. CIOTX is a cross-chain representation of the native IOTX token, designed to facilitate asset movement between the IoTeX network and other blockchains like Ethereum and Binance Smart Chain. Subsequently, the attacker swiftly converted these illicitly minted tokens into other high-liquidity cryptocurrencies. The primary targets were Bitcoin (BTC) and Ethereum (ETH), which are significantly harder to trace and freeze compared to tokens on their native chain. The total value of the drained assets reached approximately $4.4 million before the exploit was identified and the relevant bridge functions were paused. This sequence highlights a critical two-stage threat: first, the exploitation of minting authority, and second, the rapid obfuscation of funds through cross-chain conversion. Attack Vector: Smart contract vulnerability on the ioTube bridge. Action: Unauthorized minting of 410 million CIOTX. Monetization: Conversion to $4.4M in BTC and ETH. Response: Bridge pause and public bounty offer. The Strategic Calculus Behind the Crypto Bounty Offer IoTeX’s decision to offer a 10% bounty, or “white hat” reward, follows a precedent set by other major DeFi protocols like Poly Network and Cream Finance. This strategy is a pragmatic risk-management calculation rather than an admission of defeat. By offering $440,000 for the return of the remaining $4 million, the project aims to recover a majority of user funds while treating the incident as a costly security audit. The strict 48-hour deadline applies pressure, suggesting the team may be pursuing alternative tracking methods or legal avenues that could become viable after that period. From a cybersecurity perspective, bounty offers serve multiple purposes. Firstly, they create a direct financial incentive for the attacker to cooperate, transforming a purely adversarial relationship into a potentially negotiable one. Secondly, such public offers demonstrate proactive governance to the project’s community and token holders, which can help maintain trust during a crisis. However, experts consistently warn that this approach can also incentivize future attacks if hackers perceive a reliable “profit-sharing” escape route. Expert Insight: Bridge Security as DeFi’s Achilles’ Heel Blockchain security analysts have long identified cross-chain bridges as a primary attack surface. These protocols hold immense value locked in smart contracts to facilitate asset transfers, making them high-value targets. The complexity of verifying transactions and states across two distinct, asynchronous blockchains inherently expands the potential for logical flaws. According to annual reports from major security firms like CertiK and Halborn, bridge exploits accounted for nearly 70% of all major crypto thefts in 2024, with losses exceeding $2 billion. The IoTeX incident fits a familiar pattern where economic incentives for interoperability outpace security validation. Each bridge employs unique trust assumptions—ranging from multi-party signatures to light clients—and a vulnerability in any component can lead to catastrophic failure. This event will likely accelerate ongoing industry efforts toward standardizing bridge security frameworks and implementing more robust, time-locked upgrade mechanisms to prevent instant exploitation. Broader Impact and the Evolving DeFi Security Landscape The immediate aftermath of the hack saw a predictable yet contained market reaction. The IOTX token price experienced volatility but did not collapse, indicating that market participants may have priced in both the exploit and the potential for partial recovery via the bounty. Nevertheless, the event triggers a renewed evaluation of risk for all cross-chain assets. Investors and liquidity providers are now compelled to scrutinize the specific security models and audit histories of the bridges they use, beyond just the underlying blockchain’s security. Furthermore, this incident places regulatory scrutiny squarely on cross-chain activities. Global financial watchdogs, including the U.S. Securities and Exchange Commission and the Financial Action Task Force (FATF), have increasingly focused on how cross-chain transactions complicate anti-money laundering (AML) and capital controls. The hacker’s conversion to BTC and ETH exemplifies the tracing challenges regulators aim to address. Consequently, future bridge designs may need to incorporate more sophisticated on-chain monitoring and compliance tools by default. Recent Major Cross-Chain Bridge Exploits (2023-2025) Protocol Date Approx. Loss Primary Cause Resolution Poly Network 2023 $10M Smart Contract Logic Full bounty return Wormhole 2024 $325M Signature Verification VC-backed replenishment Ronin Bridge 2023 $625M Compromised Validator Keys Government investigation IoTeX (ioTube) 2025 $4.4M Unauthorized Minting 10% Bounty Offered Conclusion The IoTeX hack and the subsequent $440,000 bounty offer illuminate the ongoing tension between innovation and security in the decentralized finance sector. This incident serves as a potent reminder that cross-chain bridge technology, while essential for a multi-chain ecosystem, remains a work in progress with significant associated risks. The outcome of this bounty negotiation will set an important precedent for how DeFi projects manage post-exploit crises. Ultimately, the security of the entire interconnected blockchain landscape depends on learning from each breach, rigorously stress-testing bridge assumptions, and developing more resilient, transparent, and accountable interoperability solutions. FAQs Q1: What exactly was hacked in the IoTeX incident? The exploit targeted the ioTube cross-chain bridge, a protocol that allows assets to move between the IoTeX blockchain and others. A vulnerability allowed the hacker to mint 410 million CIOTX tokens without proper authorization or collateral. Q2: Why would IoTeX offer the hacker a bounty instead of just pursuing them? Offering a bounty is a pragmatic strategy to recover user funds. Tracking and legally prosecuting anonymous blockchain hackers is often slow, difficult, and uncertain. The bounty creates a direct financial incentive for the return of most of the assets, turning a total loss into a partial recovery. Q3: What are CIOTX tokens? CIOTX is a cross-chain wrapped version of the native IOTX token. It is minted when IOTX is locked on the IoTeX chain to represent that value on another chain (like Ethereum), enabling it to be used in DeFi applications there. The hacker minted these tokens illegitimately. Q4: How does this hack affect the average IOTX holder or user? If you were not directly providing liquidity to the ioTube bridge, your personal wallet funds are safe. However, such exploits can cause short-term price volatility for the IOTX token and may temporarily shake confidence in the ecosystem’s infrastructure. Q5: What makes cross-chain bridges so vulnerable to attacks? Bridges are complex smart contracts that must securely lock assets on one chain and mint representations on another. This process involves managing immense value and verifying information across two separate systems, creating a large “attack surface” with potential for logical flaws, code bugs, or governance failures. This post IoTeX Hack: Urgent $440K Bounty Offer Reveals Critical Cross-Chain Bridge Vulnerability first appeared on BitcoinWorld .
bitcoinworld·3h ago
News Placeholder
Institutional ETH Treasury Companies in Massive Losses
Institutional ETH treasury companies in massive losses: Bitmine gave a buy signal while experiencing 8,8 billion $ unrealized loss. ETH at $1.862, RSI 30,51 oversold. Supports $1.747-$1.826, resist...
coinotag·3h ago
News Placeholder
Curve Founder: DeFi Should Generate Income | ETH Drop
Curve founder Egorov says DeFi cannot remain dependent on inflationary tokens. TVL dropped 38%, ETH declined 60%. Bitmain $8.8B loss. Technical: RSI 30, support $1.747. Revenue-focused models are e...
coinotag·4h ago
News Placeholder
Bitcoin and Ethereum slide together as crypto markets enter risk-off reset
Bitcoin and Ethereum slid together on Monday, dragging the wider crypto market lower.
ambcrypto·5h ago
News Placeholder
Vitalik Buterin Reveals Bitcoin’s Critical Privacy Trade-Off: The Decentralization Dilemma
BitcoinWorld Vitalik Buterin Reveals Bitcoin’s Critical Privacy Trade-Off: The Decentralization Dilemma In a revealing discussion that illuminates fundamental blockchain design choices, Ethereum founder Vitalik Buterin explained during a recent technology event in Chiang Mai, Thailand, how Bitcoin’s foundational architecture prioritized decentralization at the expense of privacy features. This crucial insight, reported by industry source Wu Blockchain in March 2025, highlights the historical constraints that shaped cryptocurrency development and points toward emerging solutions in the evolving digital asset landscape. Bitcoin’s Foundational Design: Decentralization Over Privacy Vitalik Buterin articulated a fundamental reality about Bitcoin’s creation during his Chiang Mai presentation. The Ethereum founder explained that Bitcoin’s designers faced technological limitations that forced difficult choices between competing values. Specifically, Buterin noted that achieving both robust decentralization and strong privacy simultaneously proved practically impossible with the cryptographic tools available during Bitcoin’s inception period around 2008-2009. This historical context reveals why Bitcoin operates as a transparent ledger where all transactions remain publicly visible. The blockchain’s design deliberately sacrificed privacy to achieve its revolutionary decentralized consensus mechanism. Buterin emphasized that early cryptographic systems typically relied on centralized institutions to provide privacy protections, creating an inherent conflict with Bitcoin’s decentralized philosophy. The Technological Evolution of Blockchain Privacy Cryptographic technology has advanced dramatically since Bitcoin’s creation, fundamentally changing what blockchain systems can achieve. Over the past decade, innovations in zero-knowledge proofs and related privacy technologies have created new possibilities for confidential transactions on decentralized networks. These developments represent a significant shift from the constrained environment that shaped Bitcoin’s original architecture. Zero-Knowledge Proofs: A Privacy Breakthrough Zero-knowledge proofs, particularly zk-SNARKs (Zero-Knowledge Succinct Non-Interactive Argument of Knowledge), represent the most significant advancement in blockchain privacy technology. These cryptographic methods allow one party to prove to another that a statement is true without revealing any information beyond the validity of the statement itself. The technology enables transactions to be verified without exposing sender, receiver, or amount details. Several key developments have driven this progress: 2013: Zerocoin protocol introduced the concept of anonymous cryptocurrency transactions 2016: Zcash launched as the first cryptocurrency using zk-SNARKs for privacy 2019-2022: Multiple Ethereum scaling solutions integrated zero-knowledge technology 2023-2024: Major improvements in zk-SNARK efficiency and implementation Privacy Technology Comparison: Bitcoin vs. Modern Implementations Feature Bitcoin Modern Privacy Solutions Transaction Visibility Fully transparent Selectively visible Sender/Receiver Privacy Pseudonymous only Fully anonymous options Amount Confidentiality Public amounts Hidden amounts possible Regulatory Compliance Audit-friendly Selective disclosure features Ethereum’s Privacy Exploration and Implementation According to Buterin’s Chiang Mai remarks, parts of the Ethereum ecosystem have actively explored integrating privacy features using advanced cryptographic techniques. This exploration represents a significant evolution from Bitcoin’s initial constraints. Ethereum’s more flexible architecture and later development timeline have allowed it to incorporate privacy technologies that simply weren’t feasible during Bitcoin’s design phase. Several Ethereum-based projects have implemented privacy features: Tornado Cash: A non-custodial privacy solution using zero-knowledge proofs Aztec Protocol: A privacy-focused zk-rollup on Ethereum Zk.money: A privacy layer for Ethereum transactions Multiple Layer 2 solutions: Various scaling implementations with privacy features These implementations demonstrate how blockchain technology has progressed beyond Bitcoin’s initial trade-offs. However, they also face significant challenges including regulatory scrutiny, implementation complexity, and user adoption barriers. The Regulatory and Practical Challenges of Blockchain Privacy Privacy features in blockchain systems encounter substantial regulatory and practical obstacles that Bitcoin’s transparent design largely avoids. Financial regulators worldwide have expressed concerns about privacy-preserving cryptocurrencies potentially facilitating illicit activities. This regulatory environment creates tension between technological capability and legal compliance. Key challenges include: Anti-money laundering (AML) compliance requirements Know-your-customer (KYC) regulations for exchanges International regulatory coordination difficulties Technical complexity for average users Transaction cost increases from privacy features Balancing Innovation and Compliance The blockchain industry continues developing solutions that balance privacy with regulatory requirements. Emerging approaches include: Selective disclosure: Technologies allowing users to reveal transaction details only to authorized parties Auditability features: Systems enabling compliance without sacrificing all privacy Layer 2 privacy: Implementing confidentiality at secondary layers rather than base protocols These approaches attempt to address legitimate regulatory concerns while preserving meaningful privacy protections for users. The evolution reflects maturing understanding within both the blockchain industry and regulatory bodies. The Future of Privacy in Decentralized Systems Technological advancements suggest that future blockchain systems may overcome the decentralization-privacy trade-off that constrained Bitcoin’s design. Multiple research directions show promise for achieving both values simultaneously. These developments could fundamentally reshape how decentralized networks handle confidential information. Promising research areas include: Fully homomorphic encryption: Allows computation on encrypted data Multi-party computation: Enables joint computation while keeping inputs private Improved zk-SNARKs: More efficient zero-knowledge proof systems Trusted execution environments: Hardware-based privacy solutions These technologies remain in various stages of development and implementation. Their eventual maturation could enable blockchain systems that provide both Bitcoin-level decentralization and meaningful transaction privacy. Conclusion Vitalik Buterin’s explanation of Bitcoin’s privacy versus decentralization trade-off illuminates fundamental blockchain design principles and their evolution. Bitcoin’s transparent architecture resulted from legitimate technological constraints during its creation period, not from philosophical opposition to privacy. The subsequent development of zero-knowledge proofs and related technologies has enabled newer blockchain systems like Ethereum to explore privacy implementations that were impossible during Bitcoin’s design phase. This technological progression demonstrates how cryptocurrency architecture continues evolving to address complex competing values including decentralization, privacy, security, and regulatory compliance. The ongoing exploration of these technologies will likely shape the next generation of blockchain systems and their role in the global financial ecosystem. FAQs Q1: What exactly did Vitalik Buterin say about Bitcoin’s privacy? During a technology event in Chiang Mai, Thailand, Buterin explained that Bitcoin’s designers prioritized decentralization in the original architecture because achieving both strong decentralization and robust privacy was technologically impossible at the time of Bitcoin’s creation. Q2: How does Bitcoin’s privacy compare to traditional financial systems? Bitcoin offers pseudonymity rather than true anonymity, with all transactions permanently visible on its public blockchain. Traditional financial systems typically offer more transaction privacy through institutional intermediaries but less transparency about overall system operation. Q3: What are zk-SNARKs and how do they improve privacy? Zk-SNARKs are zero-knowledge proofs that allow verification of information without revealing the information itself. They enable blockchain transactions to be validated without exposing sender, receiver, or amount details, significantly improving privacy compared to transparent systems like Bitcoin. Q4: Are there any Bitcoin projects working on privacy improvements? Yes, several Bitcoin-based projects explore privacy enhancements including the Lightning Network for off-chain transactions, sidechain implementations like Liquid with confidential transactions, and various wallet solutions that improve privacy through coin mixing and other techniques. Q5: What are the main challenges for implementing privacy in blockchain systems? Major challenges include regulatory compliance with anti-money laundering requirements, technical complexity that can limit user adoption, increased computational requirements that raise transaction costs, and potential security vulnerabilities in privacy implementations. This post Vitalik Buterin Reveals Bitcoin’s Critical Privacy Trade-Off: The Decentralization Dilemma first appeared on BitcoinWorld .
bitcoinworld·6h ago
News Placeholder
Austria Freezes KuCoin EU Expansion Months After MiCA Approval
Key Takeaways Austria’s financial regulator has banned KuCoin EU from onboarding new clients or offering new products. The action stems […] The post Austria Freezes KuCoin EU Expansion Months After MiCA Approval appeared first on Coindoo.
Coindoo·6h ago
News Placeholder
Ethereum weighs wallet simulations after Buterin proposal
Buterin's proposal has wallets preview outcomes; analysts cite fewer mistakes and controls; transaction simulation, intent-based security, Ethereum wallets. Read original article on coincu.com
Coincu·6h ago
News Placeholder
Ether in focus as BitMine buys 45,749 ETH amid $9B loss
BitMine expanded ETH holdings despite ~$9B paper losses; analysts cite 45,749 ETH purchase, unrealized losses, Ethereum staking yield to assess NAV risks. Read original article on kanalcoin.com
Kanal Coin·7h ago
<
1
2
...
>

Sentiment

Indicates whether most users posting on a symbol’s stream over the last 24 hours are fearful or greedy.
0
25
50
75
100
Extreme
Fear
Neutral
Greed
Extreme
Fear
Greed
N/A
Last score

N/A

1 day ago

Sign Up / Log In

1 week ago

Sign Up / Log In

1 month ago

Sign Up / Log In

3 months ago

Sign Up / Log In

6 months ago

Sign Up / Log In

1 year ago

Sign Up / Log In

Message Volume

Measures the total amount of chatter on a stream over the last 24 hours.
0
25
50
75
100
Extremely
Low
Normal
High
Extremely
Low
High
N/A
Last score

N/A

1 day ago

Sign Up / Log In

1 week ago

Sign Up / Log In

1 month ago

Sign Up / Log In

3 months ago

Sign Up / Log In

6 months ago

Sign Up / Log In

1 year ago

Sign Up / Log In

Participation Ratio

Measures the number of unique accounts posting on a stream relative to the number of total messages on that stream.
0
25
50
75
100
Extremely
Low
Normal
High
Extremely
Low
High
N/A
Last score

N/A

1 day ago

Sign Up / Log In

1 week ago

Sign Up / Log In

1 month ago

Sign Up / Log In

3 months ago

Sign Up / Log In

6 months ago

Sign Up / Log In

1 year ago

Sign Up / Log In

AboutEthereum is a global, open-source platform for decentralized applications. In other words, it is a decentralized blockchain platform that enables developers to build and deploy smart contracts and applications without central authority control. Unlike Bitcoin, which primarily functions as digital currency, Ethereum operates as a programmable global computer where developers can create any type of decentralized service. The platform hosts over $14 billion in DeFi applications with hundreds of thousands of active users across financial protocols, NFT marketplaces, and gaming platforms. Its transition to Proof of Stake in September 2022 reduced energy consumption by over 99%, addressing environmental concerns while strengthening network security. The network operates through thousands of independent validator nodes that process transactions and execute smart contracts on the Ethereum Virtual Machine. Smart contracts are self-executing programs written in Solidity that automatically carry out agreements when conditions are met, eliminating intermediaries like banks or brokers. Validators stake ETH as collateral to propose and validate blocks, earning rewards for honest participation while facing penalties for malicious behavior. The EIP-1559 upgrade introduced a dynamic base fee mechanism that burns ETH with each transaction, creating deflationary pressure during high network activity when more ETH is burned than issued to validators. Vitalik Buterin proposed Ethereum in 2013, but seven co-founders helped build it, including Gavin Wood who created Solidity and the EVM technical specification, and Joseph Lubin who founded ConsenSys. The project launched in July 2015 after raising over $18 million through crowdfunding, quickly becoming the largest blockchain developer community. Major milestones include the 2020 Beacon Chain launch, the 2021 London hard fork implementing fee burning, and the 2022 Merge to Proof of Stake. Ether (ETH) serves multiple functions: paying transaction fees (gas), staking to secure the network and earn 3-5% annual yields, serving as collateral in DeFi protocols, and purchasing NFTs and digital assets. The asset is increasingly adopted by traditional institutions, with publicly traded companies adding ETH to corporate treasuries to generate staking yields while maintaining blockchain exposure, and in 2024, the SEC approved spot Ethereum ETFs, allowing traditional investors to gain exposure through conventional brokerage accounts. Ethereum's roadmap focuses on dramatically increasing transaction capacity to over 100,000 per second, reducing confirmation times, and enhancing decentralization while maintaining security against future threats like quantum computing.
Details
Links
Source
Categories
Alameda Research PortfolioAndreessen Horowitz (a16z) PortfolioCoinbase 50 IndexDelphi Ventures PortfolioEthereum EcosystemFTX HoldingsGMCI 30 IndexGMCI IndexGMCI Layer 1 IndexGalaxy Digital PortfolioLayer 1 (L1)Multicoin Capital PortfolioProof of Stake (PoS)Smart Contract PlatformWorld Liberty Financial Portfolio
Date
Market Cap
Volume
Close
February 24, 2026
$224.92B
$22.52B
---
February 24, 2026
$223.73B
$31.37B
---
February 23, 2026
$235.5B
$10.14B
$1,954.19
February 22, 2026
$238.2B
$10.48B
$1,973.66
February 21, 2026
$237.38B
$21.43B
$1,967.81
February 20, 2026
$235.01B
$19.13B
$1,946.91
February 19, 2026
$235.74B
$19.83B
$1,954.75
February 18, 2026
$240.3B
$21.43B
$1,992.00
February 17, 2026
$241.44B
$19.71B
$2,000.61
February 16, 2026
$237.06B
$31.08B
$1,963.96

Latest ETH News

Top Discussions

Advertisement|Remove ads.