“Solo is building a “trusted anonymous” on-chain identity system based on its original zkHE architecture, which is expected to break the “impossible triangle” that has long plagued Web3, that is,“Solo is building a “trusted anonymous” on-chain identity system based on its original zkHE architecture, which is expected to break the “impossible triangle” that has long plagued Web3, that is,

Solo: zkHE-based authentication protocol to build a trusted anonymous identity layer for Web3

2025/07/24 12:00

Not long ago, the Web3 identity layer project Solo announced the completion of a $1.2 million Pre-Seed round of financing, led by Draper Associates, followed by Velocity Capital, and RISC Zero founder Brian Retford and Caldera founder Matt Katz also participated as strategic angel investors. After this round of financing, Solo has further become a focus project in the Web3 identity track.

Focusing on the fundamentals of the project, on the one hand, the core team behind it is quite strong. CEO Edison studied at Yale Business School, where he co-founded the Yale Business School Blockchain Society and led the first Yale Blockchain Summit. In order to focus on promoting the Solo project, Edison chose to drop out of school and devote himself to research and development full-time. The other two co-founders, Stephen and Sissi, are both professors at Shenzhen University, with deep accumulation in the fields of blockchain and artificial intelligence respectively - Stephen is one of the early contributors to the Ethereum Foundation, and Sissi has achieved remarkable results in AI research and practical applications.

In terms of technology, Solo uses its unique zkHE (zero-knowledge homomorphic encryption) solution as the core to build an identity architecture that achieves a dynamic balance between privacy protection, identity uniqueness, and decentralized verifiability. In the context of the current Web3 ecosystem facing systemic problems such as frequent witch attacks, lack of user reputation system, and difficulty in compliant access, the solution proposed by Solo may have important reference and leading significance.

This article will deeply analyze the new paradigm of identity represented by Solo from multiple dimensions such as market structure, technological path and narrative positioning.

01 The Web3 world where the identity layer is long absent

Although the infrastructure in the Web3 field is continuing to improve at a relatively fast pace, the "identity layer", as a key module supporting trust and participation, has been absent for a long time.

In fact, from data labeling, behavior scoring to protocol interaction and community governance, a large number of key tasks in Web3 rely on "human input" as an effective data source. However, from the perspective of the on-chain system, a user is usually just a wallet address consisting of letters and numbers, lacking structured individual characteristics and behavior labels. Without the support of an additional identity layer mechanism, the crypto-native world can hardly establish a credible user portrait, let alone achieve reputation accumulation and credit assessment.

The absence of an identity layer directly gave rise to one of the most common and difficult problems in Web3, namely the Sybil attack. In various incentive activities that rely on user participation, malicious users can easily forge multiple identities, thereby repeatedly receiving rewards, manipulating votes, and polluting data, making the mechanism that should have been driven by "real people participating" completely ineffective. Take Celestia as an example. In its 2023 airdrop, as much as 65% of the 60 million $TIA was obtained by robots or Sybil accounts. Similar phenomena also widely appeared in the distribution process of projects such as Arbitrum and Optimism.

Although some projects have tried to introduce "anti-Sybil" mechanisms to screen abnormal behaviors, the reality is that such methods often cause accidental harm to real users, while real brushes can easily bypass the rules. For example, EigenLayer's airdrop anti-sybil rules have caused some controversy. Some normal users were misjudged as sybil attackers and were excluded from the airdrop, which caused controversy. So we see that in the absence of a strong identity foundation, on-chain incentive distribution is actually always difficult to be fair, efficient and sustainable.

In other vertical scenarios of Web3, the problems caused by lack of identity are equally significant.

For example, in the DePIN field, it is common to submit fake addresses and forged data to defraud incentives, which disrupts the authenticity of the data and directly affects the practicality and trust foundation of the network. Similarly, in GameFi, the behavior of multiple accounts brushing tasks and batch receiving rewards seriously disrupts the balance of the in-game economic system, resulting in the loss of real players and the failure of the project incentive mechanism.

In the field of AI, the lack of an identity layer also has far-reaching consequences. Currently, large-scale AI model training increasingly relies on "human feedback" (such as RLHF) and data annotation platforms, and these tasks are usually outsourced to open communities or on-chain platforms. In the absence of "human uniqueness" guarantees, the phenomenon of script batch simulation behavior and robot forgery input has become increasingly serious, which not only pollutes the training data, but also greatly weakens the expressiveness and generalization ability of the model.

In a previous study called Best-of-Venom, researchers successfully induced the RLHF model to shift during training and output significantly manipulated results by injecting only 1–5% of "malicious feedback comparison data." Even if these forged human preference data account for a very small proportion, they are enough to undermine the robustness of the model and affect the final generation quality. More importantly, since the identity of the participants cannot be effectively constrained, the system is almost unable to identify or block this sophisticated disguised manipulation behavior from the source.

In addition, in the absence of an effective identity layer, the KYC mechanism, credit scoring system, and behavioral profiling widely used in the Web2 world can hardly be mapped to the chain in a native and credible way. This not only limits institutions from participating in Web3 under the premise of protecting user privacy, but also the financial system on the chain is always in an identity vacuum. A most representative example is that the DeFi lending model has long relied on the over-collateralization mechanism, and has always been difficult to reach a wider range of uncollateralized credit lending scenarios, severely limiting user coverage and capital efficiency.

The same problem also occurs in Web3 advertising, social networking and other fields. Due to the lack of verifiable user identity and behavioral preferences, mechanisms such as accurate recommendations and personalized incentives are difficult to establish, further limiting the deep operational capabilities and commercialization space of on-chain applications.

02 Exploration of Web3 Identity Layer

In fact, there are dozens of Web3 identity layer solutions on the market, such as Worldcoin, Humanode, Proof of Humanity, Circles, idOS, ReputeX, Krebit, etc. These solutions are actually trying to fill the gap in the Web3 identity layer. We can roughly divide them into four categories:

  • Biometrics

Biometrics are usually characterized by biometrics (such as iris, facial recognition, fingerprint) technology to ensure identity uniqueness. This type of solution usually has strong anti-Sybil attack capabilities. Representative projects include Worldcoin, Humanode, Humanity Protocol, ZeroBiometrics, KEYLESS, HumanCode, etc.

We have seen that such solutions often infringe on user privacy by collecting biometric data, generating hashes, and so on, resulting in relative weakness in terms of privacy protection and compliance. For example, Worldcoin has come under regulatory scrutiny in multiple countries due to iris data privacy issues, including EU GDPR compliance issues.

  • Social Trust

Social trust solutions usually pay more attention to "user sovereignty", emphasize social trust networks and open verification, and usually use Web of Trust, reputation scoring, etc. as core elements to establish a trusted identity network through social relationship graphs, community mutual authentication, human recommendations, etc. Representative projects include Proof of Humanity, Circles, Humanbound, BrightID, Idena, Terminal 3, ANIMA, etc.

Such schemes are usually highly decentralized in theory, and are expected to expand the trust network based on community consensus and overlay reputation governance mechanisms. However, we have seen that such schemes are usually difficult to guarantee identity uniqueness, are easily vulnerable to Sybil attacks, have poor scalability in acquaintance networks, and are therefore susceptible to identity forgery or community cold start issues. Proof of Humanity once adjusted its verification mechanism due to bot issues.

  • DID Aggregation

DID aggregation solutions can usually further build a composable on-chain identity structure by integrating external credentials such as Web2 identity/KYC data and Verifiable Credentials (VCs). This type of solution is actually highly compatible with the existing compliance system, and most solutions can also support users to control data sovereignty, making it easier for some institutions to adopt. Some representative projects include Civic, SpruceID, idOS, SelfKey, Fractal ID, etc.

However, DID aggregation solutions also have weak identity uniqueness. We see that most of them are highly dependent on external data sources such as Web2 KYC or intermediary data support, so the degree of decentralization is relatively limited and the architecture is relatively complex. Although some projects such as SpruceID are exploring privacy protection through ZK-SNARKs, most solutions in this sector have not yet solved issues such as privacy verifiability.

  • Behavior Analysis

Behavior analysis solutions are usually based on on-chain address behavior, interaction trajectories, task records and other data, using graph algorithms to build user portraits and reputation systems. Representative projects include ReputeX, Krebit, Nomis, Litentry, WIW, Oamo, Absinthe and Rep3.

The advantage of modeling with addresses as units is good privacy protection. It is naturally compatible with the on-chain ecosystem without the need for additional input and has strong overall adaptability. However, on the other hand, because it is impossible to establish a connection with the user's real identity, the lack of identity uniqueness leads to the prominent phenomenon of multiple addresses for one person. It is also susceptible to interference from witch behavior, and can only establish a partially labeled identity, resulting in distorted data quality.

So in summary, in the current practice of the existing identity layer solutions, we can see that they are generally trapped in an impossible triangle dilemma:

That is, privacy protection, identity uniqueness and decentralized verifiability are often difficult to take into account at the same time. At the same time, we found that except for biometric solutions, identity mechanisms in other sectors generally cannot effectively guarantee "identity uniqueness".

Therefore, biometrics are often regarded as the most deterministic element in the identity layer and have been verified in practice in many projects. However, to build a truly trusted identity system, relying solely on biometrics is indeed not enough to solve the balance between privacy protection and decentralization.

In the context of the above problems, Solo also chose to use biometric recognition as the basic means of user identity uniqueness, and based on cryptography, further proposed a more unique technical path around the difficult problem of balancing "privacy protection" and "decentralized verifiability".

03 Deconstructing Solo’s technical solution

As mentioned above, using biometrics as the identity layer can effectively prove the uniqueness of the user, but the biggest difficulty lies in how to ensure the privacy of the data and its verifiability anytime and anywhere.

Solo's solution is based on the zkHE architecture, which integrates Pedersen commitments, homomorphic encryption (HE) and zero-knowledge proof (ZKP). The user's biometrics can complete multiple encryption processes locally. The system generates a verifiable zero-knowledge proof and submits it to the chain without exposing any original data, thereby achieving the unforgeability of identity and verifiability under privacy protection.

zkHE Architecture

In Solo's zkHE architecture, the authentication process consists of a double encryption defense line: homomorphic encryption (HE) and zero-knowledge proof (ZKP). The entire process is completed locally on the user's mobile device to ensure that sensitive information is not leaked in plain text.

  • Homomorphic encryption

The first line of defense is homomorphic encryption. Homomorphic encryption is a cryptographic scheme that allows calculations to be performed directly while the data remains encrypted. In the end, as long as the decryption result is completely consistent with the plaintext operation, it represents the correctness and availability of the data itself.

In zkHE, the system further inputs the committed biometrics into the circuit in a homomorphically encrypted form and performs logical operations such as matching and comparison, without the need for decryption throughout the process.

The "comparison" here is essentially to calculate the distance between the biometric vectors of the registered and current verification data to determine whether the two sets of data are from the same person. The distance calculation process itself is also completed in an encrypted state. The system then generates a zero-knowledge proof of "whether the distance is less than the threshold" based on the comparison result, thereby completing the judgment of "whether it is the same person" without exposing the original data or distance value.

This approach aims to achieve trusted computing under the premise of privacy protection, ensuring that the authentication process is verifiable, scalable, and always confidential.

  • Zero-knowledge proof

After completing the aforementioned cryptographic calculations, Solo will generate a zero-knowledge proof locally for on-chain submission verification. This ZKP proves that "I am a unique and real human being" but does not reveal any original biological information or intermediate calculation details.

Solo itself uses the efficient Groth16 zk-SNARK as a proof generation and verification framework to generate a concise and robust ZKP with minimal computational overhead. The verifier only needs to verify this proof to confirm the validity of the identity, and the entire process does not require access to any sensitive data. Finally, this ZKP is submitted to the exclusive Layer2 network SoloChain and verified by the on-chain contract.

In addition to privacy and security protection, Solo also performs particularly well in verification efficiency. Thanks to the streamlined design of the encryption process and the introduction of high-performance primitives, Solo can achieve a low-latency, high-throughput identity authentication experience on mobile devices, providing strong technical support for large-scale user use and on-chain integration.

Solo: zkHE-based authentication protocol to build a trusted anonymous identity layer for Web3

Verification efficiency

The Solo solution itself has extremely high verification efficiency, partly because it highly optimizes and adapts cryptographic algorithms.

In fact, in the Web3 identity layer track, it is not uncommon to introduce cryptography to ensure privacy and data security, especially ZK. However, there are very few solutions that can be truly implemented. In the final analysis, it all depends on

In terms of zero-knowledge proof construction, Solo chose Groth16 zk-SNARK, which has extremely high verification efficiency, as the backbone framework. The system has an extremely small proof size (about 200 bytes) and can achieve millisecond-level verification on the chain, significantly reducing interaction delays and storage overhead.

Not long ago, the Solo team conducted an experiment on its cryptographic model. As shown in the figure below, when facing higher-dimensional biometric data (Biometric Vector Length), the zkHE architecture (HE + ZKP) adopted by Solo is far superior to the traditional ZKP scheme in terms of proof generation time and total authentication time. Under 128-dimensional data conditions, the authentication time of traditional ZKP exceeds 600 seconds, while the Solo scheme is almost unaffected and always remains within a few seconds.

Solo: zkHE-based authentication protocol to build a trusted anonymous identity layer for Web3

In addition, although the proof size of Solo in some vector dimensions is slightly larger than that of traditional solutions, its overall verification time is still controlled within the range of 30-70ms, which is sufficient to meet the latency and performance requirements of most high-frequency interaction scenarios (such as chain games, DeFi login, L2 real-time authentication, etc.).

In terms of client performance, Solo has also made a lot of optimizations.

Its zkHE verification process (including Pedersen commitment generation, homomorphic encryption processing and ZKP construction) can be completed locally on ordinary smartphones. The actual test results show that the overall calculation time on mid-range devices is 2-4 seconds, which is enough to support the smooth interaction of most Web3 applications without relying on any proprietary hardware or trusted execution environment, greatly reducing the threshold for large-scale deployment.

04 A new attempt to break the “impossible triangle” of the Web3 identity layer

From a global perspective, Solo actually provides a new path to break the "impossible triangle" of the Web3 identity layer, that is, to achieve a technical balance and breakthrough between privacy protection, identity uniqueness and usability.

In terms of privacy, the zkHE architecture allows all user biometrics to be homomorphically encrypted and ZKP constructed locally. The entire process does not require the original data to be uploaded or decrypted, thereby completely avoiding the risk of privacy leakage and getting rid of dependence on centralized identity providers.

In terms of identity uniqueness, Solo uses a feature vector distance comparison mechanism in an encrypted state to confirm whether the current validator is the same person as the historical registration record without leaking the data structure, thereby constructing the basic identity constraint of "there is a real and unique human behind each address", which is what Solo emphasizes as one person, one account (1P1A).

In terms of usability, Solo ensures that all computing tasks can be completed on ordinary mobile devices by fine-tuning the zk proof process. Actual tests show that the verification generation time is usually controlled within 2-4 seconds, and the on-chain verification process can be completed within milliseconds and is fully decentralized, which can meet the application scenarios with extremely high real-time requirements including chain games, DeFi, L2 login, etc.

It is worth mentioning that Solo itself has reserved compliance docking interfaces in the system design, including optional bridge modules that support integration with on-chain DID and KYC systems, as well as the ability to anchor verification status to a specified Layer1 network in specific scenarios. Therefore, when Solo is implemented in the compliance market in the future, it is expected to meet the requirements of various regions for identity authentication, data traceability and regulatory cooperation while maintaining privacy and decentralization.

From a more macro perspective, we mentioned above that the current Web3 identity solutions can actually be roughly divided into several technical paths, including reputation portrait systems based on on-chain behavior, VC/DID architectures based on centralized authentication, zk identity solutions that emphasize anonymity and selective disclosure, and some lightweight PoH protocols based on social networks and group authentication.

In the diversified evolution of the Web3 identity track, the biometric + zkHE-based path adopted by Solo happens to be naturally complementary to other solution paths.

Compared with solutions that focus on upper-level identity tags or behavioral credentials, Solo's advantage lies in building a basic identity network that can complete "human uniqueness confirmation" at the lowest level, and has features such as privacy protection, trustlessness, embeddability, and sustainable verification, providing basic "human entity verification" for higher-level VCs, SBTs, social graphs, etc.

In a sense, Solo is more like the underlying consensus module in the identity stack, focusing on providing a privacy-protected human uniqueness proof infrastructure for Web3. Its zkHE architecture can not only be connected as a plug-in module for various DIDs or application front-ends, but can also form a combination with existing VC, zkID, SBT, etc., to establish a verifiable and composable real identity foundation for the on-chain ecosystem.

Therefore, Solo itself can be seen as the bottom-level "trusted anonymity layer" infrastructure in the identity system, filling the industry's long-missing "1P1A (One Person, One Account)" capability gap to further support higher-level applications and provide a foundation for compliance.

Currently, Solo has reached cooperation with multiple protocols and platforms, including Kiva.ai, Sapien, PublicAI, Synesis One, Hive3, GEODNET, etc., covering multiple vertical tracks such as data annotation, DePIN network and SocialFi games. These collaborations are expected to further verify the feasibility of Solo's identity authentication mechanism, provide a feedback mechanism for its zkHE model to calibrate real-world needs, and help Solo continuously optimize user experience and system performance.

Solo: zkHE-based authentication protocol to build a trusted anonymous identity layer for Web3

Summarize

By building a trusted and anonymous identity layer system for the Web3 world, Solo is laying the foundation for 1P1A capabilities and is expected to become an important underlying infrastructure to promote the evolution of on-chain identity systems and the expansion of compliant applications.

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Trading Moment: Markets Enter a Key Week Ending the Year, Bitcoin Holds Key Level at $86,000

Trading Moment: Markets Enter a Key Week Ending the Year, Bitcoin Holds Key Level at $86,000

Daily market data review and trend analysis, produced by PANews. 1. Market Observation Markets are holding their breath for this week's Federal Reserve meeting, with a 25-basis-point rate cut widely expected. However, contrary to conventional wisdom, since the rate-cutting cycle began in September, the yield on long-term US Treasury bonds, the anchor for global asset pricing, has risen instead of falling, triggering intense debate about the future economic path. Optimists see this as a signal of a "soft landing," while pessimists worry it's a vote of no confidence from the "bond vigilantes" regarding the high national debt and inflation risks in the US. Against this backdrop, Wall Street veteran strategists like Mark Cabana of Bank of America predict that, in addition to rate cuts, the Fed may announce a major balance sheet expansion plan of up to $45 billion per month to address potential liquidity shortages. Meanwhile, China will also usher in a super week of policy announcements, with important meetings and the release of key economic data such as inflation and social financing providing new guidance for the market. Furthermore, competition in the field of artificial intelligence is becoming increasingly fierce, with OpenAI planning to release GPT-5.2 ahead of schedule to address this competition. The financial reports of Broadcom, a chip designer and Oracle, both core players in the AI industry chain, as well as the visit of Microsoft's CEO to India, will all serve as key indicators for assessing the investment climate in AI infrastructure and the future direction of the industry. In the Bitcoin market, short-term sentiment is cautious, but long-term indicators remain resilient. Analyst Murphy, based on the MVRV indicator, predicts that Bitcoin's price may reach $85,000 to $94,000 by December 31st, and then touch the $71,000 to $104,000 range in early 2026, considering $104,000 as a key bull-bear dividing line. Several analysts consider the $86,000 to $88,000 area as key support. For example, Daan Crypto Trades points out that a break below this key Fibonacci level could lead to a price pullback to a low of $76,000, while Michaël van de Poppe believes that holding $86,000 is a prerequisite for his bullish scenario (i.e., a price break above $92,000 and head towards $100,000). On-chain data presents a mixed picture: on the one hand, Glassnode points out that ETF demand continues to weaken, and market risk appetite is declining; on the other hand, analyst @TXMCtrades emphasizes the continued rise in the "activity" indicator, and CryptoQuant data also shows that selling pressure from long-term holders has been "completely reset," which may indicate potential spot demand and the formation of a market bottom. Bloomberg ETF expert Eric Balchunas, however, offers a more macro-level reassurance to the market, believing that Bitcoin's correction this year is merely a normal cooling down of last year's extreme 122% surge. Its resilience in reaching new highs after multiple significant pullbacks makes it no longer suitable for comparison to the "tulip bubble." Regarding Ethereum, short-term market sentiment leans towards pessimism, but long-term technical patterns are showing optimistic signals. According to Nansen data, "smart money" traders are still adding to their short positions in Ethereum on the derivatives platform Hyperliquid, with net short positions accumulating to over $21 million. However, analyst Sykodelic sees a positive side in the technical charts, pointing out that Ethereum's 5-day MACD and RSI indicators, after a thorough reset, are exhibiting patterns that have historically led to significant rallies, suggesting that a market bottom is forming. In the altcoin market, the AI project Bittensor (TAO) became the focus of attention. The project will undergo its first halving on December 14th, reducing the daily token issuance by half. Grayscale analyst Will Ogden Moore commented positively, believing it marks a significant milestone in the network's maturation. He pointed out that its strong adoption momentum, rising institutional interest, and the success of the dTAO mechanism could all be catalysts for price increases. TAO rose nearly 10% intraday. The weekend saw numerous market developments, with several events and figures attracting widespread attention. Terraform Labs co-founder Do Kwon's legal case saw new developments. US prosecutors recommended a 12-year prison sentence for his "massive" fraudulent activities, and US District Judge Paul Engelmayer will deliver sentencing on December 11th. This news initially caused USTC and LUNA tokens to surge by over 100% over the weekend before falling sharply, down nearly 20% in the past 24 hours. Additionally, Binance founder CZ's joke about executive He Yi's misspelling of "DOYR" in a tweet unexpectedly spawned a meme coin with the same name. Meanwhile, Binance responded directly to community concerns, stating that it is conducting an internal review of potential corruption related to token listings. Another noteworthy piece of news comes from the intersection of the tech and cryptocurrency worlds: Moore Threads, the "first domestically produced GPU stock," saw its share price surge after listing on the STAR Market. The controversial past of its co-founder, Li Feng, has also resurfaced, including his involvement in the "Mallego Coin" project with Li Xiaolai and others, and a long-standing debt dispute with OKX founder Star involving 1,500 bitcoins (currently worth approximately $135 million). In response, Star recently stated on social media that the debt issue has been handed over to legal action and that the focus should be on the future. 2. Key Data (as of 13:00 HKT, December 8) (Data source: CoinAnk, Upbit, Coingecko, SoSoValue, CoinMarketCap) Bitcoin: $91,596 (down 2.11% year-to-date), daily spot trading volume $40.49 billion. Ethereum: $3,134 (down 6.17% year-to-date), daily spot trading volume $25.27 billion. Fear of Greed Index: 20 (Extreme Fear) Average GAS: BTC: 1.2 sat/vB, ETH: 0.04 Gwei Market share: BTC 58.7%, ETH 12.2% Upbit 24-hour trading volume rankings: XRP, ETH, BTC, MOODENG, SOL 24-hour BTC long/short ratio: 50.54% / 49.46% Sector Performance: Meme and DeFi sectors saw a slight pullback, while SocialFi and AI rose by over 2%. 24-hour liquidation data: A total of 112,699 people worldwide were liquidated, with a total liquidation amount of $416 million. This included $105 million in BTC liquidations, $169 million in ETH liquidations, and $21.92 million in SOL liquidations. 3. ETF Flows (as of December 5) Bitcoin ETFs saw a net outflow of $87.77 million last week, with ARKB experiencing the largest net outflow at $77.86 million. Ethereum ETFs saw net outflows of $65.59 million last week, with BlackRock's ETHA experiencing the largest net outflow at $55.87 million. Solana ETF: Net inflow of $20.3 million last week XRP ETF: Net inflows of $231 million last week, marking the fourth consecutive week of net inflows. 4. Today's Outlook HumidiFi: New token public sale will begin on December 8th at 23:00. The Stable mainnet will launch on December 8th at 21:00. The company formed by the merger of Twenty One Capital and CEP is expected to list on the NYSE on December 9. BounceBit (BB) will unlock approximately 29.93 million tokens at 8:00 AM Beijing time on December 9th, representing 3.42% of the circulating supply, worth approximately $2.7 million. The top 100 cryptocurrencies by market capitalization with the largest gains today are: Ultima up 7%, SPX6900 up 5.8%, Canton Network up 5.5%, Ethena up 5.1%, and Zcash up 4.5%. 5. Hot News Data: APT, LINEA, CHEEL and other tokens will see large-scale unlocking, with APT unlocking value estimated at approximately $19.3 million. This Week's Preview | The Federal Reserve FOMC announces its interest rate decision; the Stable blockchain mainnet will officially launch on December 8th. The largest short position in BTC on Hyperliquid currently has a floating profit of approximately $17 million, having reduced its position by about 20 BTC in 26 minutes. The BEAT team's linked wallet sent $1.2 million worth of tokens to a CEX, seemingly indicating a planned sell-off for profit. Twenty One Capital transferred 43,122 BTC to a new wallet. The U.S. SEC's Cryptocurrency Working Group will hold a roundtable meeting on financial regulation and privacy on December 15. Bittensor will undergo its first halving on December 14th, at which time the daily supply of TAO will decrease to 3600 tokens. ZKsync plans to abandon its early network, ZKsync Lite, in 2026. The long positions held by the "whale that opened short positions after the 1011 flash crash" have reached $164 million, and are currently showing a floating loss of $950,000. A wallet suspected to be Windemute has accumulated approximately $5.2 million worth of SYRUP tokens over the past two weeks. South Korea is considering legislation requiring virtual asset operators to bear "no-fault liability" for hacker attacks, with fines potentially increased to 3% of sales revenue. The average cash cost for public miners mining Bitcoin has reached $74,600, with a total cost of $137,800. Caixin: Last year, 3,032 people were prosecuted for money laundering related to cryptocurrencies; establishing a firewall against virtual currencies is necessary to protect normal economic and trade activities. Farcaster announces strategic shift: from a social-first approach to wallet-driven growth.
Share
PANews2025/12/08 14:48
Robinhood Sets Indonesia Footprint Through Crypto Trader, Brokerage Firms Acquisition

Robinhood Sets Indonesia Footprint Through Crypto Trader, Brokerage Firms Acquisition

Robinhood Markets has announced two key acquisitions, marking its official entry into the Indonesian market. The American financial services firm has
Share
CryptoNews2025/12/08 14:45