ZK logo

ZK
zkSync

246
Mkt Cap
$317.22M
24H Volume
$46.31M
FDV
$777.52M
Circ Supply
8.57B
Total Supply
21B
ZK Fundamentals
Max Supply
21B
7D High
$0.0411
7D Low
$0.0332
24H High
$0.0389
24H Low
$0.0349
All-Time High
$0.321
All-Time Low
$0.0245
ZK Prices
ZK / USD
$0.037
ZK / EUR
€0.0317
ZK / GBP
£0.0278
ZK / CAD
CA$0.0517
ZK / AUD
A$0.056
ZK / INR
₹3.33
ZK / NGN
NGN 53.60
ZK / NZD
NZ$0.0642
ZK / PHP
₱2.19
ZK / SGD
SGD 0.048
ZK / ZAR
ZAR 0.63
Loading...
Loading...
News
all
press releases
Ethereum developers working on a ZK protocol for on-chain interactions privacy
Ethereum developers are advancing a new zero-knowledge protocol that aims to bring stronger privacy to on-chain interactions, beginning with a cryptographically verified Secret Santa–style matching system. Though playful in theme, the work reflects a growing push within the Ethereum ecosystem to design practical privacy frameworks that can be deployed across a range of real-world applications. A push for private coordination in Ethereum The idea resurfaced recently after Solidity engineer Artem Chystiakov highlighted research he and collaborators first published earlier this year. Their proposal, known as the ZK Secret Santa (ZKSS) protocol , describes a method for matching participants on-chain without exposing who is assigned to whom. The challenge is heightened by Ethereum’s fully transparent state, lack of native randomness and the long-standing problem of Sybil resistance. To address these constraints, the ZKSS design leans heavily on zero-knowledge proofs, transaction relayers and cryptographic nullifiers. Together, these tools allow participants to prove their place in the game, contribute randomness and receive assignments without revealing the underlying identity linkages that would otherwise be visible on-chain. The use of a relayer is central to the privacy guarantee. During the matching phase, participants submit their randomness through the relayer, which broadcasts the transactions on their behalf. Because the relayer masks the origin of each submission, no observer can infer which address contributed which value. The protocol’s zero-knowledge proofs then verify that each randomness submission is valid, tied to a legitimate participant and not duplicated. Inside the three-step protocol The ZKSS system unfolds in three coordinated steps. First, all participants are registered in a smart contract, which stores their addresses in a sparse Merkle tree. This setup needs to be done only once, allowing for repeated Secret Santa rounds without rebuilding the participant list. The registration tree later enables proof-based membership checks without exposing wallet relationships. The second stage, called signature commitment, requires each participant to commit to a deterministic ECDSA signature. This commitment prevents them from using signature variability to bypass anti-Sybil protections. Each signature hash is stored in a separate Merkle tree, with the contract verifying that the sender belongs to the initial participant set. After committing, players generate and publish a unique randomness value. They do this privately, but their proof shows that the randomness belongs to a legitimate participant and hasn’t been reused. Players are encouraged to use RSA public keys as their randomness so they can later receive encrypted delivery details from their assigned counterpart. The final step is the receiver disclosure phase. Here, each participant reveals themselves to the person who drew their randomness. They provide a proof showing they are not claiming their own slot and that their nullifier does not conflict with the randomness they selected. With this final verification step, the protocol completes the matching without leaking any sender-receiver mappings to the public chain. A framework with broader uses Although framed as a Secret Santa algorithm, the implications reach far beyond seasonal gift exchanges. Ethereum’s growing intersection with regulated finance, governance, and organisational coordination has amplified the need for permissionless privacy systems. The same framework can support anonymous voting in DAOs, whistleblower channels where members must prove eligibility without exposing identity, and private airdrops that avoid revealing recipient lists. Its structure, Merkle trees for membership checking, deterministic signatures for Sybil resistance, and zero-knowledge proofs for correctness, mirrors the backbone of many emerging privacy-first protocols. Developers expect continued refinement as the community tests the ZKSS design and explores interoperability with existing Ethereum tooling. The early research suggests that privacy-preserving, verifiable coordination can be achieved without trusted intermediaries, marking a notable step toward more confidential activity on public blockchains. The post Ethereum developers working on a ZK protocol for on-chain interactions privacy appeared first on Invezz
invezz·2d ago
News Placeholder
More News
News Placeholder
Ethereum Devs Push ZK ‘Secret Santa’ System Toward Deployment
The proposed protocol uses zero-knowledge proofs to verify sender–receiver relationships without revealing identities.
coindesk·2d ago
News Placeholder
Buterin Warns X Country Feature Could Put Users in Real Danger
Ethereum co-founder Vitalik Buterin caused debate this week by criticizing X’s new feature that automatically reveals a user’s country, calling it a dangerous form of forced doxing that puts crypto users at risk. His concerns were echoed by other people in the crypto industry like Uniswap’s Hayden Adams and Summer.fi CTO Andrei David. Meanwhile, a separate technical debate unfolded inside the Ethereum ecosystem when Offchain Labs pushed back on Buterin’s proposal to move Ethereum’s execution layer to the RISC-V instruction set. The Arbitrum team argued that WebAssembly (WASM) is a more flexible, secure, and future-proof choice, and warned that hardwiring RISC-V into Ethereum could lock the network into a rapidly evolving proving technology. Buterin Slams X for Exposing User Locations Ethereum co-founder Vitalik Buterin joined a growing chorus of people in the crypto industry criticizing X’s newly introduced feature that automatically displays a user’s country of origin. The update was rolled out quietly over the weekend, and was presented by X’s director of product Nikita Bier as a tool to strengthen platform integrity and help users contextualize posts by knowing where they come from. However, it instead caused major backlash over what many describe as forced doxing and a serious erosion of user privacy. Buterin initially suggested the change might provide valuable insight into how people from different regions think about global issues, but he quickly reversed course after reflecting on user concerns. He warned that even a small amount of location data could expose high-risk users to real-world harm, especially high-worth crypto holders or individuals living under restrictive governments. Buterin said the feature was being applied without user consent and without offering an opt-out option at launch, and called the approach “wrong” as people should not have their privacy “retroactively rugpulled with no recourse.” He also predicted that some users will inevitably find ways to fake their country of origin to avoid unwanted exposure. Several well known people in the crypto industry have similar concerns. Uniswap founder Hayden Adams condemned the update as “psychotic,” and said that while opt-in identity disclosure is reasonable, forcing location data on millions of users crosses a line. Andrei David, CTO of DeFi platform Summer.fi, agreed, and argued that any feature related to sensitive personal information should default to the least revealing option. Critics believe that the sudden visibility of country-level data could help malicious actors identify wealthy individuals more easily, which could potentially increase the risk of stalking, physical extortion, or targeted attacks. Some in the community shared practical advice for those who want to disable the feature. According to Web3 leader “Langerius,” users can navigate to settings and turn off country visibility entirely or switch from a specific country to a broader region like a continent. Not everyone opposes the change. Supporters argue that country-level identification in large nations like the United States does little to compromise anonymity. Others, like crypto venture capitalist Nic Carter , believe the feature is important for combating political manipulation by revealing accounts that falsely claim to represent local viewpoints while operating from abroad. Offchain Labs Pushes Back on Vitalik’s RISC-V Plan Meanwhile, Offchain Labs, the team behind Ethereum Layer 2 network Arbitrum, has pushed back against Vitalik Buterin’s proposal to shift Ethereum’s execution layer to the RISC-V instruction set architecture, arguing that WebAssembly (WASM) is a more resilient and future-proof foundation for the network. In a detailed Nov. 20 post on Ethereum Research , four Offchain Labs researchers said that although RISC-V currently excels at generating zero-knowledge proofs, this advantage alone does not make it the best choice for long-term smart contract execution or storage on Ethereum. Buterin originally suggested the move in April, claiming that swapping out Ethereum’s current virtual machine bytecode for RISC-V could reduce ZK proving costs by as much as 100x in certain cases. While Offchain Labs agrees that reducing proving costs is a valuable goal, the team disputed what they described as Buterin’s “implicit assumption” that a single instruction set should serve both the purpose of delivering smart contracts to the blockchain and generating proofs for ZK virtual machines. They instead argue for a separation between what they call a “delivery ISA” (dISA) and a “proving ISA” (pISA), saying the two do not need to be unified. Offchain Labs’ post on Ethereum Research To back their position, the researchers revealed they are already testing a prototype that demonstrates this division. In Arbitrum’s design, WASM-based Stylus smart contracts can be ZK-proven by first compiling WASM into RISC-V and then proving the resulting RISC-V execution. This approach, they said, shows that Ethereum does not need to embed RISC-V directly into its base layer to benefit from RISC-V-based ZK proving systems. They also questioned whether RISC-V will remain at the forefront of proving efficiency as the ZK landscape grows. Recent shifts from 32-bit to 64-bit RISC-V implementations prove just how quickly proving technology is changing, which raises concerns that enshrining RISC-V on Ethereum Layer 1 could lock the network into a moving target. The researchers pointed to emerging WASM-based ZK virtual machines, like Ligero’s Ligetron, as examples of alternative architectures that may outperform RISC-V in the future. Offchain Labs further pointed out that ZK proving costs have already fallen dramatically—dropping to around $0.025 per Ethereum block—reducing the urgency to optimize Ethereum around proving efficiency alone. They argued that these costs are minor compared to the gas fees and MEV earned by block builders, making the choice of ISA more about long-term flexibility than short-term savings. Finally, they explained the practical strengths of WASM, including strong type safety, mature tooling, broad hardware compatibility, and structured code that is easy to optimize without breaking contracts. Because most Ethereum nodes do not run RISC-V hardware, adopting RISC-V at the base layer would require costly emulation. The researchers ultimately framed WASM as a universal intermediate layer—similar to an “Internet Protocol” for smart contracts—capable of bridging the diverse languages and backend systems used across the Ethereum ecosystem.
coinpaper·10d ago
News Placeholder
Telos Begins Trusted Setup Ceremony for Telos Privacy Layer
San Francisco, United States, November 21st, 2025, Chainwire Telos today announced the official beginning of the Trusted Setup Ceremony for the Telos Privacy Layer , a key milestone for the network and for privacy-preserving blockchain infrastructure. The ceremony is the cryptographic process required before activating private, multi-asset accounts and shielded transactions on Telos. It is designed so that no single party, organization, or developer, including Telos itself, can ever compromise the privacy guarantees of the system. Once complete, the resulting parameters will underpin the zero-knowledge (ZK) circuits that enable private transfers, delegated deposits, and privacy-preserving interactions across the Telos network. Built on One of the Most Secure Setups in the Industry Telos is not starting from scratch. The Telos Privacy Layer inherits the security of the well-known Ethereum Perpetual Powers of Tau ceremony, one of the most closely examined and community-driven multi-party computation (MPC) ceremonies ever completed, with 86 independent contributors. This same setup has already been trusted by established ZK privacy ecosystems, including Railgun. Under MPC rules, only one honest contributor is required for the final output to be secure, giving the Telos Privacy Layer an exceptionally strong starting point. The Telos ceremony extends that security with new contributions from trusted members of the Telos community, engineers, researchers, and independent privacy advocates. How the Ceremony Works The Trusted Setup Ceremony follows a strict, sequential process: A participant performs a computation and adds their own entropy. Their output becomes the input for the next participant. Each new contribution increases the overall security of the final parameters. This design ensures the parameters cannot be reconstructed or exploited by any single entity, now or in the future. Two-Phase Ceremony Structure The Telos Privacy Layer ceremony is organized into two main phases: Phase 1: Powers of Tau Telos extends the security of the previous Ethereum Perpetual Powers of Tau ceremony by adding additional contributors from the Telos ecosystem. Phase 2: Circuit Parameter Generation Participants inject entropy into each of the ZK circuits that will power private accounts, shielded transfers, and delegated deposits on the Telos Privacy Layer. Both phases must be completed before the final verification keys are generated and the privacy system is activated on mainnet. Participation and Requirements Trusted members of the Telos Foundation and Protofire are already contributing. Telos is also inviting reliable and technically capable participants such as active block producers and long-term community members, along with researchers and privacy advocates. To participate, contributors should have access to: A Linux machine with at least 8 CPU cores 8 GB or more RAM 150 GB of available storage for ceremony data A clean, isolated environment free from unnecessary background software The ability to follow basic operational security best practices Researchers, engineers, privacy advocates, or security-focused community members who would like to contribute can reach out via Telegram or email contact@telos.net. What Comes Next Once the Trusted Setup Ceremony is complete, Telos plans to activate: Private multi-asset accounts offering users quantum hardened security Shielded value transfers High-performance, L1-integrated private computation A best-in-class privacy wallet experience Together, these capabilities are intended to position Telos as one of the most capable and forward-looking networks in the industry, designed for mass adoption, developer accessibility, and long-term security. The ceremony is now underway. Telos thanks all contributors helping to secure the future of private crypto on the network. About Telos Telos is an EVM-compatible Layer 1 blockchain built for privacy, performance, scalability, and real-world usability. With sub-second finality, MEV resistance, and a deflationary token model, Telos powers applications across DeFi, gaming, and enterprise. ContactJustin Giudicicontact@telos.net Disclaimer: This is a sponsored press release and is for informational purposes only. It does not reflect the views of Crypto Daily, nor is it intended to be used as legal, tax, investment, or financial advice.
cryptodaily·13d ago
News Placeholder
Perché Bitcoin Hyper è uno dei presale crypto più discussi del 2025
Bitcoinist descrive Bitcoin Hyper (token HYPER) come una delle presale più rilevanti nel panorama crypto del 2025, grazie al suo progetto di Layer 2 su Bitcoin. L’idea alla base è offrire una rete più veloce e programmabile (dApps, staking, trasferimenti) pur continuando a usare Bitcoin come livello di “settlement”, combinando sicurezza e scalabilità. L’architettura tecnica di Bitcoin Hyper Secondo le specifiche, Bitcoin Hyper permette di depositare BTC in un indirizzo osservato, dopodiché un contratto su Solana Virtual Machine (SVM) verifica i relativi header o proof. Questo processo porta alla creazione dell’equivalente tokenizzato su Hyper, che può essere usato nella rete L2 per transazioni rapide, staking, scambi e applicazioni decentrate. Periodicamente, le transazioni vengono “ancorate” indietro su Bitcoin usando prove ZK (zero-knowledge), per garantire che il token L2 resti collegato al valore reale di BTC su L1. Grazie a questo modello, il progetto punta a combinare l’ affidabilità di Bitcoin con la velocità di altre blockchain più moderne, rendendo la rete adatta anche a pagamenti quotidiani e casi d’uso DeFi. Raccolta fondi e struttura della prevendita Durante la presale, Bitcoin Hyper ha raccolto cifre significative , con investitori che sembrano credere nella visione del progetto. I token HYPER sono offerti a un prezzo base, e chi partecipa può anche scegliere di mettere in staking parte dei suoi token durante la fase di presale. Questo staking offre rendimenti relativamente elevati, il che può risultare attraente per chi è disposto a bloccare risorse in vista del lancio. Secondo l’analisi originale, l’operazione di presale non è guidata solo da hype: la domanda deriva anche da un interesse concreto per infrastrutture che migliorino l’esperienza d’uso di BTC e ne espandano le funzionalità. Questo mix di visione tecnica e appello retail spiega, secondo l’articolo, perché molti osservatori considerino Hyper una scommessa “infrastrutturale” piuttosto che una semplice altcoin speculativa. Opportunità e punti di forza Uno dei principali vantaggi di Bitcoin Hyper è la possibilità di utilizzare Bitcoin in modo più versatile: non solo come riserva di valore, ma per costruire applicazioni, movimentare fondi rapidamente e partecipare alla finanza decentralizzata. Se il progetto dovesse effettivamente realizzare bridge sicuri, esecuzione rapida su L2 e un ecosistema funzionante, potrebbe attirare sviluppatori interessati a creare dApp “Bitcoin-native” e utenti che vogliono trasferire o usare BTC più agilmente. Inoltre, il fatto che parte del capitale arrivi da investitori retail e istituzionali suggerisce che il progetto non è visto solo come un gioco speculativo, ma come qualcosa con potenziale a lungo termine. Rischi da considerare Tuttavia, non mancano le incognite. Il successo di Bitcoin Hyper dipende fortemente dall’esecuzione tecnica: è necessario che il bridge funzioni in modo sicuro, che le validazioni ZK siano affidabili e che la rete L2 sia stabile e performante. Se qualcosa dovesse andare storto (bug, costi elevati, problemi di sicurezza), la proposta perderebbe molto del suo valore “pratico”. Inoltre, il modello di staking e yield alto può nascondere rischi: rendimenti elevati nei progetti in presale non sono mai garantiti dopo il lancio, e possono diminuire man mano che la piattaforma matura o se non viene sostenuta da reale utilizzo o liquidità. Infine, il fatto che si tratti ancora di un progetto L2 su Bitcoin implica una forte dipendenza dallo sviluppo futuro di entrambi gli strati: il fallimento su uno dei due fronti potrebbe compromettere l’intera proposta. Vai a Bitcoin Hyper Conclusione Bitcoin Hyper è presentato come un progetto ambizioso che cerca di risolvere alcune delle limitazioni storiche di Bitcoin: lentezza, costi alti e mancanza di programmabilità. La sua prevendita ha attirato interesse grazie a un modello che combina tecnologia avanzata con un’idea di lungo periodo, non solo speculazione. Detto questo, è importante guardare al progetto con realismo: se la rete funziona come descritto, potrebbe avere un impatto significativo; ma gli ostacoli tecnici e i rischi restano. Chi è interessato dovrebbe fare la propria due diligence , valutare sia il potenziale che i rischi, e non considerarlo un “colpo sicuro”.
bitcoinist·20d ago
News Placeholder
Revolutionary Continuous Clearing Auction Protocol Transforms Uniswap with Secure Token Launches
BitcoinWorld Revolutionary Continuous Clearing Auction Protocol Transforms Uniswap with Secure Token Launches Uniswap just dropped a game-changer in decentralized finance with its Continuous Clearing Auction Protocol. This innovation reshapes how tokens launch and secure liquidity on Uniswap v4, offering a seamless experience for traders and projects alike. If you’re into DeFi, this update matters because it tackles key challenges in token distribution while boosting security and efficiency. What is the Continuous Clearing Auction Protocol? The Continuous Clearing Auction Protocol, or CCA, is a custom system designed by Uniswap to enhance liquidity provision and token launches. Unlike traditional methods, it operates continuously, allowing for real-time adjustments and fair pricing. This protocol integrates directly with Uniswap v4, ensuring that liquidity is locked in securely from the start. Moreover, it introduces a ZK Passport module for private participation, giving users verifiable access without compromising their data. How does the Continuous Clearing Auction Protocol benefit users? This protocol brings multiple advantages to the DeFi space. First, it reduces front-running risks by clearing orders in a continuous manner. Second, it promotes fair token distribution, preventing whale manipulation. Here are some key benefits: Enhanced security through automated liquidity locking Privacy features with ZK Passport for anonymous yet verified involvement Improved efficiency in token launches, cutting down on gas fees and delays Therefore, projects can launch tokens smoothly, while traders gain confidence in a transparent process. What challenges does the Continuous Clearing Auction Protocol address? In DeFi, token launches often face issues like liquidity fragmentation and high volatility. The Continuous Clearing Auction Protocol tackles these by providing a structured auction environment. For example, it ensures that liquidity is aggregated, minimizing slippage and maximizing returns for participants. Additionally, the ZK Passport module addresses privacy concerns, allowing users to join without exposing personal details. This approach not only solves existing problems but also sets a new standard for future protocols. Why is the Continuous Clearing Auction Protocol a big deal for Uniswap v4? Uniswap v4 aims to be more customizable and efficient, and the Continuous Clearing Auction Protocol plays a crucial role. By integrating this protocol, Uniswap enhances its core functionalities, making it a go-to platform for innovative token economies. The focus on continuous clearing means that markets remain active and responsive, adapting to demand in real-time. Consequently, this could attract more developers and users, strengthening Uniswap’s position in the competitive DeFi landscape. How can you get involved with the Continuous Clearing Auction Protocol? To participate, start by exploring Uniswap’s documentation on the Continuous Clearing Auction Protocol. Engage with testnets to understand the mechanics, and join community discussions for insights. Here are actionable steps: Monitor Uniswap announcements for launch details Set up a compatible wallet and acquire necessary tokens Use the ZK Passport module for private testing when available By taking these steps, you’ll be ready to leverage this protocol for better trading and investment opportunities. In summary, the Continuous Clearing Auction Protocol marks a significant leap for Uniswap and DeFi as a whole. It combines security, privacy, and efficiency to create a robust framework for token launches and liquidity management. As this protocol evolves, it could redefine how we interact with decentralized exchanges, making them more accessible and trustworthy for everyone involved. Frequently Asked Questions What is the main purpose of the Continuous Clearing Auction Protocol? The main purpose is to secure liquidity and facilitate fair token launches on Uniswap v4 through a continuous auction system. How does the ZK Passport module work in this protocol? The ZK Passport module allows users to participate privately by verifying their eligibility without revealing personal information, using zero-knowledge proofs. Is the Continuous Clearing Auction Protocol live on Uniswap now? It has been announced and is expected to integrate with Uniswap v4 upon its release; check Uniswap’s official channels for updates. Can small-scale traders benefit from this protocol? Yes, it promotes fair access and reduces manipulation, making it advantageous for traders of all sizes. What makes this protocol different from existing auction systems? Its continuous clearing mechanism and integration with Uniswap v4 provide real-time adjustments and enhanced security compared to batch auctions. Are there any risks associated with using the Continuous Clearing Auction Protocol? As with any DeFi innovation, risks include smart contract vulnerabilities and market volatility, but Uniswap’s design aims to minimize these. If you found this article insightful, share it on social media to spread the word about Uniswap’s latest breakthrough! Engage with your network and join the conversation on the future of DeFi. To learn more about the latest cryptocurrency trends, explore our article on key developments shaping Ethereum institutional adoption. This post Revolutionary Continuous Clearing Auction Protocol Transforms Uniswap with Secure Token Launches first appeared on BitcoinWorld .
bitcoinworld·21d ago
News Placeholder
a16z advocates for decentralized digital identity and ZK proofs in response to Treasury GENIUS requests
Andreessen Horowitz (a16z) Crypto has submitted feedback to the Treasury regarding the first post-GENIUS requests. The Treasury had initially sought input in August on “Innovative Methods to Detect Illicit Activity Involving Digital Assets” and followed up in September with an advance notice of proposed rulemaking to implement the Act. In its response, the VC firm characterized its portfolio companies’ digital identity tech as “privacy-preserving” and showed support for zero-knowledge proofs to safeguard against surveillance. It added, “We particularly believe that the use of decentralised digital identity can dramatically change how individuals go about their everyday lives; how businesses can fulfil their regulatory obligations; and how law enforcement and the intelligence community can fulfil their important missions.” Meanwhile, Coinbase Global has urged the U.S. Treasury Department to maintain its forthcoming rules for the GENIUS Act tightly aligned with congressional intent. In a detailed response to the Treasury, Coinbase stated that the Treasury should avoid imposing requirements beyond what the statute explicitly mandates, warning that overreach could stifle innovation and jeopardize the law’s goal of making the U.S. the “crypto capital of the world.” Faryar Shirzad, Coinbase’s Chief Policy Officer, in a post on X, said that implementing should adhere to the clear intent of the bill text and must ensure that U.S.-issued stablecoins have the versatility and competitiveness needed to become the world’s dominant payment and settlement instrument a16z advocated for an update in AML/KYC frameworks Michele Korver, a former federal prosecutor and regulator, noted that a16z explained that decentralized digital identity, built with privacy-preserving cryptography, can help fight illicit finance while preserving citizens’ privacy. It called for the revamp of AML/KYC frameworks, claiming outdated rules only block progress. Thus, it requested that FinCEN grant exceptions to facilitate the adoption of digital identity tools. It also holds that decentralized digital identity can enable people to gain control over their data, boost cybersecurity, and shield against surveillance. Likewise, technologies such as zero-knowledge proofs (ZKPs) and multi-party computation (MPC) enable verifiably true identity verification without disclosing more information than necessary to each person involved. Moreover, it insisted that FinCEN should explicitly recognize digital identity as compliant with the “non-documentary methods” allowed under the Customer Identification Program (CIP) regulations and broaden these exemptions to include money service businesses (MSBs), where most cryptocurrency exchanges fall. Responding to the Treasury’s Advance Notice of Proposed Rulemaking on implementing the GENIUS Act, the firm advocated for stablecoin rules that encourage innovation, uphold dollar stability, and ensure consumer protection. a16z still believes the GENIUS Act will promote innovation In 2023, approximately 0.61% to 0.86% of on-chain crypto volumes were linked to illicit activity, totaling between $46.1 billion and $58.7 billion, according to a report released in August by the White House Working Group on Digital Asset Markets. However, a16z cited a 2011 UN report that the average rate of interception in anti–money laundering activities is approximately 0.2%, indicating how difficult it can be to identify illicit assets correctly. It also emphasized the importance of a clear path for the GENIUS Act to be successful, but cautioned that the ANPRM may overreach into the purview of other regulators. Overall, the company said, “The GENIUS Act is a significant step in a positive direction for the future of digital finance and blockchain systems within traditional markets. We are confident that the Act will encourage responsible innovation and make it easy for blockchain companies around the world to establish themselves, bringing with them their various offerings.” Sign up to Bybit and start trading with $30,050 in welcome gifts
cryptopolitan·22d ago
News Placeholder
Privacy tools are rising behind institutional adoption, says ZKsync dev
Institutions are exploring blockchain settlement, but they cannot move forward without system-level privacy, says ZKsync developer.
cointelegraph·23d ago
News Placeholder
ZKsync, Starknet, Linea Rip Higher as U.S. Shutdown Deal Spins Back Crypto Liquidity
U.S. Senate’s 60–40 vote to end the 41-day shutdown restored risk appetite, pushing crypto cap back to $3.59T Ethereum Layer-2 tokens led the rebound, with Starknet up more than 40% and ZKsync and Linea posting double-digit gains Traders are positioning for Ethereum’s Fusaka upgrade in December 2025, which strengthens the ZK narrative behind these moves The crypto market switched back to risk-on on November 10, rising 4.9% in a day to about $3.59 trillion after the U.S. Senate advanced a bipartisan bill to reopen the government, easing a 41-day liquidity squeeze. The move pulled Bitcoin above $106,000 and sent Ethereum higher with scalability tokens tied to the network’s rollup roadmap. Layer-2 names outpaced large caps, telling traders this rebound is being driven by the Ethereum infrastructure trade rather than meme flow. Shutdown Deal Brings Liquidit… Read The Full Article ZKsync, Starknet, Linea Rip Higher as U.S. Shutdown Deal Spins Back Crypto Liquidity On Coin Edition .
coinquora·24d ago
News Placeholder
Pi Network price set to rally as rare pattern aligns with AI pivot
Pi Network price could be gearing for a major bull run after forming a falling wedge pattern, and as it pivots to the artificial intelligence industry.
crypto.news·28d ago

Sentiment

Indicates whether most users posting on a symbol’s stream over the last 24 hours are fearful or greedy.
0
25
50
75
100
Extreme
Fear
Neutral
Greed
Extreme
Fear
Greed
N/A
Last score

N/A

1 day ago

Sign Up / Log In

1 week ago

Sign Up / Log In

1 month ago

Sign Up / Log In

3 months ago

Sign Up / Log In

6 months ago

Sign Up / Log In

1 year ago

Sign Up / Log In

Message Volume

Measures the total amount of chatter on a stream over the last 24 hours.
0
25
50
75
100
Extremely
Low
Normal
High
Extremely
Low
High
N/A
Last score

N/A

1 day ago

Sign Up / Log In

1 week ago

Sign Up / Log In

1 month ago

Sign Up / Log In

3 months ago

Sign Up / Log In

6 months ago

Sign Up / Log In

1 year ago

Sign Up / Log In

Participation Ratio

Measures the number of unique accounts posting on a stream relative to the number of total messages on that stream.
0
25
50
75
100
Extremely
Low
Normal
High
Extremely
Low
High
N/A
Last score

N/A

1 day ago

Sign Up / Log In

1 week ago

Sign Up / Log In

1 month ago

Sign Up / Log In

3 months ago

Sign Up / Log In

6 months ago

Sign Up / Log In

1 year ago

Sign Up / Log In

AboutNo company description
Details
Links
Source
Categories
Blockchain Capital PortfolioConsensys PortfolioEthereum EcosystemLayer 2 (L2)OKX Ventures PortfolioPrivacy BlockchainSmart Contract PlatformZero Knowledge (ZK)ZkSync Ecosystem
Date
Market Cap
Volume
Close
December 04, 2025
$317.22M
$46.3M
---
December 04, 2025
$327.83M
$43.7M
---
December 03, 2025
$297.08M
$32.2M
$0.0353
December 02, 2025
$296.56M
$36.51M
$0.0345
December 01, 2025
$316.65M
$16.88M
$0.0368
November 30, 2025
$326.32M
$18.18M
$0.0379
November 29, 2025
$338.47M
$33.92M
$0.0393
November 28, 2025
$346.45M
$35M
$0.0389
November 27, 2025
$346.45M
$70.93M
$0.0403
November 26, 2025
$307.51M
$48.09M
$0.0425

Latest ZK News

Advertisement|Remove ads.