Brought to you by Identity Woman and Infominer.
Support this collaboration on Patreon!!!
当 Horizen 准备迁移到Base 上的新应用链时,我们邀请社区参与测试网试运行。
此次试运行是确保每个人成功且安全地迁移的关键环节。这也是您亲身体验迁移过程的机会,包括在实际资产投入使用之前,从 Horizen 主链测试网和 EON Gobi 测试网领取测试版 ZEN。
熟悉流程——在涉及真实资产之前,了解如何在 Horizen 和 EON 链上领取 ZEN
测试你的设置——验证你的钱包(Sphere、MetaMask、CLI、Ledger)是否正常工作并连接到正确的网络
尽早发现问题——在主网迁移之前识别需要修复的任何错误或边缘情况
压力测试基础设施——帮助确保一切在实际用户负载下顺利扩展
避免最后一刻的意外——确切地知道什么时候做什么,这样当主网快照发生时你就可以做好准备
这是 Horizen 最重要的转变之一的一次无风险排练,也是利用您的反馈来塑造它的机会。
预期结果 快照详细信息为了模拟即将到来的迁移,我们将对两个链上的测试网帐户数据进行快照:
日期:2025年6月16日
时间:待公布
区块高度:待公布
此快照将包括两条链上持有 ZEN 的所有测试网账户。
测试网启动如下快照:
测试网版本迁移申领接口即将上线
您将能够模拟领取 ZEN 的过程
这是一个使用 tZEN 的无风险环境 — — 不涉及真实资金
我们鼓励所有用户、开发人员和验证者参与,以帮助我们测试钱包连接、新代币领取流程和基础设施稳定性。
如何准备(6 月 16 日之前)要参与测试网试运行,您需要提前准备好您的测试网账户。请按照以下说明为快照(6 月 16 日)做好准备:
对于 Horizen 主链测试网 (ZEND)下载 Sphere测试网
设置钱包:在 Sphere 内创建一个帐户和钱包。
从Horizen 测试网水龙头获取 tZEN
连接你的钱包
在下拉菜单中选择Horizen Mainchain Testnet
粘贴您的 ZEND 钱包地址
请求 tZEN
对于 EON Gobi 测试网安装 MetaMask
如果您还没有,请下载MetaMask。
添加 Gobi 测试网网络:
打开 MetaMask → 网络选择器 → “添加自定义网络”
使用以下详细信息:
网络名称:Gobi 测试网
RPC URL:https://gobi-rpc.horizenlabs.io/ethv1
链ID:1663
货币符号:tZEN
从Horizen 测试网水龙头获取 tZEN :
连接你的钱包
在下拉菜单中选择Gobi Testnet
请求 tZEN
在哪里以及如何领取您的 ZEN(测试网上线后)新代币领取门户的测试网版本将在快照(6 月 16 日)后不久上线。您将能够使用官方新代币领取页面测试您的迁移。
测试网启动后,将提供新代币领取说明、视频教程和门户链接。
保持更新我们将在我们的官方社区频道上分享准确的时间、区块高度和重要链接。
安全提醒:请仅关注官方渠道获取可靠信息:
Horizen X: https://x.com/horizenglobal
Horizen Discord: https://horizen.io/invite/discord
Horizen 电报群: https://t.me/horizencommunity
Horizen 网站: https://horizen.io
不要点击非官方来源提供的链接或下载应用程序。
有用的迁移资源:
The post 准备好在主网上线前测试您的 ZEN 迁移 appeared first on Horizen Blog.
Apart from incentivising market participants to secure the network through inflationary rewards, many consider staking as an equivalent of stock dividend yield. As a result, although Bitcoin is regarded as digital gold, protocols are looking for ways to increase its utilisation in DeFi and, ultimately, generate yield. Nowadays, while newer networks are struggling to attract investors and sustain a healthy, decentralised validator set, more established blockchains capture the lion’s share of PoS actors. However, in a constant race for profit basis points, centralised consolidation of stakers seems inevitable. Join us for a fascinating discussion on the staking landscape and the challenges it may present to decentralisation.
Topics covered in this episode:
Increasing BTC utilization through BTC yield Looping yield products The maturation of the staking market Chorus One staking portfolio How to prevent staking consolidation Retail vs. institutional-grade operators Symbiotic, Eigenlayer & restaking yieldEpisode links:
Mirko Schmiedl on X Tobias Jung on X Staking Rewards on XSponsors:
Gnosis: Gnosis builds decentralized infrastructure for the Ethereum ecosystem, since 2015. This year marks the launch of Gnosis Pay— the world's first Decentralized Payment Network. Get started today at - gnosis.io Chorus One: one of the largest node operators worldwide, trusted by 175,000+ accounts across more than 60 networks, Chorus One combines institutional-grade security with the highest yields at - chorus.oneThis episode is hosted by Brian Fabian Crain & Sebastien Couture.
Join us for your weekly PIVX catch-up! Your weekly update on market trends and upcoming community news.
Market Pulse Masternode Count: The number of active PIVX masternodes currently stands at 2,107. This represents a net increase of 19 masternodes relative to the previous week. Price Check: The Daily USD Value of PIV saw a further decline this week, with prices ranging between $0.13 and $0.14. The weekly average settled at $0.1368, down from last week’s value of $0.15. Trading Buzz: This week, PIVX’s trading volume showed an inverse relationship to daily price movements. Despite a decline in the weekly average price, the total weekly volume increased from $12.9 million to approximately $14.2 million. Daily trading activity continued to be robust, consistently exceeding $1.5 million. New Listings: PIVX has been newly listed on the following platforms and exchanges: BaltEX, Houdini Swap, and SecureShift.PIVX. Your Rights. Your Privacy. Your Choice.
To stay on top of PIVX news please visit PIVX.org and Discord.PIVX.org.
PIVX Weekly Pulse (May 30th, 2025 — June 5th, 2025) was originally published in PIVX on Medium, where people are continuing the conversation by highlighting and responding to this story.
In this episode, a16z General Partner Erik Torenberg is joined by the a16z Consumer team—General Partner Anish Acharya and Partners Olivia Moore, Justine Moore, and Bryan Kim—for a conversation on the current state (and future) of consumer tech.
They unpack why it feels like breakout consumer apps have slowed down, how AI is changing the game, and what might define the next era of products. Topics include:
The rise of AI-native consumer tools and companion apps Why users are now spending $200+/month on AI products The missing AI-powered social graph Why speed and iteration may matter more than traditional moats And what it means to build for a world where software touches everythingFrom shifting business models to new behavior patterns, this is your pulse check on where we are—and where consumer is heading next.
Timecodes:
00:00:00 – Introduction to Consumer AI
00:01:00 – The Evolution of Consumer Breakouts
00:03:18 – The Shift in Consumer Spending
00:08:00 – The Future of Social Networks with AI
00:13:00 – Enterprise Adoption of AI
00:20:42 – The Rise of Voice Technology
00:23:06 – AI's Role in Enterprise Conversations
00:25:25 – AI in Education and Personal Development
00:26:34 – AI Companions: The New Norm
00:31:52 – The Future of AI Companions
00:38:50 – Speculating on New AI Platforms
00:42:07 – The Social Norms of AI Integration
Resources:
Find Anish on X: https://x.com/illscience
Find Olivia on X: https://x.com/omooretweets
Find Justine on X: https://x.com/venturetwins
Find Bryan on X: https://x.com/kirbyman01
Stay Updated:
Let us know what you think: https://ratethispodcast.com/a16z
Find a16z on Twitter: https://twitter.com/a16z
Find a16z on LinkedIn: https://www.linkedin.com/company/a16z
Subscribe on your favorite podcast app: https://a16z.simplecast.com/
Follow our host: https://x.com/eriktorenberg
Please note that the content here is for informational purposes only; should NOT be taken as legal, business, tax, or investment advice or be used to evaluate any investment or security; and is not directed at any investors or potential investors in any a16z fund. a16z and its affiliates may maintain investments in the companies discussed. For more details please see a16z.com/disclosures.
Following legislation enacted last Friday, Australian victims of ransomware attacks are now legally required to declare any payments made to cyber criminals.
The new mandate is not universal but targets organizations with an annual turnover of over AUS $3 million and a select group of entities operating within vital critical infrastructure sectors. Notably, the threshold is expected to encompass approximately 6.5% of all registered businesses in Australia, collectively representing roughly half of the nation’s economic activity.
These designated entities are now obligated to report any ransomware payments to the Australian Signals Directorate (ASD) within a tight 72-hour window. Failure to comply could result in substantial penalties.
However, the government will focus on extreme cases for a start and engage with other victims until next year when a stricter regulatory stance will be adopted.
The primary driver behind the legislation is the need for enhanced visibility into the ransomware threat landscape. Until now, reporting such incidents and payments has largely been voluntary, leading to a significant underestimation of the true scale and financial impact of these cyberattacks. “Current voluntary reporting mechanisms are underutilised and consequently, ransomware and cyber extortion attacks remain significantly underreported,” the Australian government highlighted when the bill was first proposed last year.
Data from the Australian Institute of Criminology suggests that only one in five victims of a ransomware attack report the incident.
The rule follows a series of high-profile cyberattacks that have plagued Australian private businesses, including major breaches affecting Optus, Medibank, and MediSecure, pushing cybersecurity to the forefront of the national political agenda.
PIVX. Your Rights. Your Privacy. Your Choice.
To stay on top of PIVX news please visit PIVX.org and Discord.PIVX.org.
Aussie Ransomware Victims Now Forced to Confess Payments was originally published in PIVX on Medium, where people are continuing the conversation by highlighting and responding to this story.
What if the next leap in artificial intelligence isn’t about better language—but better understanding of space?
In this episode, a16z General Partner Erik Torenberg moderates a conversation with Fei-Fei Li, cofounder and CEO of World Labs, and a16z General Partner Martin Casado, an early investor in the company. Together, they dive into the concept of world models—AI systems that can understand and reason about the 3D, physical world, not just generate text.
Often called the “godmother of AI,” Fei-Fei explains why spatial intelligence is a fundamental and still-missing piece of today’s AI—and why she’s building an entire company to solve it. Martin shares how he and Fei-Fei aligned on this vision long before it became fashionable, and why it could reshape the future of robotics, creativity, and computational interfaces.
From the limits of LLMs to the promise of embodied intelligence, this conversation blends personal stories with deep technical insights—exploring what it really means to build AI that understands the real (and virtual) world.
Resources:
Find Fei-Fei on X: https://x.com/drfeifei
Find Martin on X: https://x.com/martin_casado
Learn more about World Labs: https://www.worldlabs.ai/
Stay Updated:
Let us know what you think: https://ratethispodcast.com/a16z
Find a16z on Twitter: https://twitter.com/a16z
Find a16z on LinkedIn: https://www.linkedin.com/company/a16z
Subscribe on your favorite podcast app: https://a16z.simplecast.com/
Follow our host: https://x.com/eriktorenberg
Please note that the content here is for informational purposes only; should NOT be taken as legal, business, tax, or investment advice or be used to evaluate any investment or security; and is not directed at any investors or potential investors in any a16z fund. a16z and its affiliates may maintain investments in the companies discussed. For more details please see a16z.com/disclosures.
“The future of manufacturing is autonomous, powered by AI-based factory operating systems” is hardly a controversial statement. In fact, a glimpse into today’s most advanced factories already reveals a world where robots, not humans, perform many core manufacturing processes. So, one might think this is easy terrain for AI. Think again.
The reality is that the complexity and uniqueness of industrial use cases, coupled with diverse systems and machinery, legacy software, and entrenched data silos — all within high-stakes production environments — make impactful AI adoption a formidable challenge. Yet the imperative for AI in manufacturing continues to grow. Labour shortages, intense global competition, geopolitical pressures, and the relentless pace of technological advancement have left many industrials struggling to keep up.
What if there were a way to integrate AI into high-value manufacturing processes in a step-by-step manner, with immediate ROI? And what if these AI agents could be composed together to enable fully autonomous manufacturing?
Enter Manex AI (formerly Datagon AI)
Manex AI is currently deploying AI agents into the end-of-line quality assurance processes of Tier 1 manufacturers — including BMW, Stellantis, Rehau Automotive, TDK Electronics, Still, BSH, and Henkel — via its flagship product, Qualitatio. This solution helps reduce warranty costs and boost customer satisfaction by integrating directly with plant systems, including robots, human workflow tools, data sources, and sensor stacks.
Once embedded, Manex AI begins mapping and learning production processes, gradually expanding the range of use cases and value it delivers. This ease of adoption, combined with high impact, is what truly sets Manex AI apart.
Our ThesisIndustrial manufacturers are under growing margin pressure and are eager, yet slow, to adopt AI to optimize their operations. Rather than tackling deeply entrenched Manufacturing Execution Systems (MES) head-on, Manex AI begins with nimble, high-ROI use cases that encourage quick adoption and build trust. From this entry point, the company can scale horizontally and vertically within each plant — expanding its footprint and progressively taking on more control over the production environment. In doing so, Manex AI becomes a critical enabler of AI adoption in industry.
Although only 18 months old, the company is already demonstrating strong growth and traction — a testament to the execution capabilities of Nathan Gruber, Andreas Schoch, Fabian Gruber, Philipp Becker, and the entire Manex AI team.
We are thrilled to support Manex AI in building the fabric layer technology for autonomous manufacturing, alongside Lightspeed, Capmont Technology, and the CDTM Venture Fund. Learn more about their €8M financing here.
After a decade of existence, Ethereum has gone a long way from its initial whitepaper, yet many efforts in scaling and finding product-market-fit have been severely criticized for falling short of their promise. However, despite numerous other ‘Ethereum killers’ being launched over the years, none has managed to attract so many developers and liquidity while sticking true to ethos that (once) powered and united this industry. This year’s ETHPrague plans to confront exactly these existential challenges and steward community culture towards addressing outside criticism and external reality checks. Ethereum’s development, while adapting to market pressures, it always aimed to stick true to its core values in order to remain a technological bedrock for the future of humanity.
Topics covered in this episode:
The vision for ETH Prague Takeaways from main sessions High-level overview of ETH Prague The resurgence of Polkadot European crypto summer events The general state of the Ethereum ecosystem Celo’s transition to L2 L2 liquidity fragmentation Choosing the right L2 to build Improving hackathons Lightning round Final wordsEpisode links:
Austin Griffith on X Marek Olszewski on X Brenda Loya on X Joseph Schweitzer on X BuidlGuidl DAO on X Celo on X Tellor on XSponsors:
Gnosis: Gnosis builds decentralized infrastructure for the Ethereum ecosystem, since 2015. This year marks the launch of Gnosis Pay— the world's first Decentralized Payment Network. Get started today at - gnosis.io Chorus One: one of the largest node operators worldwide, trusted by 175,000+ accounts across more than 60 networks, Chorus One combines institutional-grade security with the highest yields at - chorus.oneThis episode is hosted by Friederike Ernst.
Compared to 10–15 years ago, cybercriminals have gotten pretty crafty. Gone are the days when hackers only tried to break through firewalls with brute force attacks. Today’s cybercriminals are exploiting the human element. And that’s where phishing and social engineering come into play, and honestly, they’re becoming the go-to methods for digital bad actors worldwide.
Do you know that nearly 60% of organizations globally experienced a ransomware attack in 2024, with over 90% of businesses experiencing a phishing attack in the same year?
Social Engineering: The Art of Human ManipulationSocial engineering is psychological manipulation designed to trick people into giving away confidential information or performing actions that compromise security. It is actually a broad term that includes things like ransomware attacks, phishing, whaling, smishing, and scareware, among others.
These attacks work because they exploit fundamental human traits — our desire to be helpful, our tendency to trust authority figures, and our fear of getting in trouble. Social engineers are like digital con artists who study human psychology to make their scams more effective.
Phishing: The Digital Bait and SwitchThink of phishing as the online equivalent of a con artist pretending to be someone they’re not. These attacks typically involve sending fake emails, texts, or creating bogus websites that look legitimate — like they’re from your bank, favorite shopping site, or even your workplace.
The goal is to get you to hand over sensitive information like passwords, credit card numbers, or personal details.
The name “phishing” is a play on “fishing” — because these attackers are essentially casting a wide net hoping to catch unsuspecting victims. Pretty clever wordplay for criminals, right?
The Many Faces of Digital Deception Email Phishing: The Classic ApproachThis is probably what most people think of when they hear “phishing.” You get an email that looks like it’s from a legitimate source — maybe your bank saying there’s a problem with your account, or a shipping company claiming they couldn’t deliver a package. The email usually contains a link to a fake website designed to steal your login credentials.
What makes these particularly tricky is how authentic they can look. Modern phishing emails often use official logos, proper formatting, and even mimic the writing style of legitimate companies.
Phishing emails are alarmingly effective. You may be surprised to learn that the median time for users to be compromised is under one minute.
Spear Phishing: The Targeted StrikeWhile regular phishing casts a wide net, spear phishing is more like using a sniper rifle. These attacks target specific individuals or organizations and are highly personalized. The attacker might spend weeks researching their target, gathering information from social media, company websites, and public records to craft a convincing message.
For example, they might send an email to a company’s CFO that appears to be from the CEO, requesting an urgent wire transfer. Because the email includes personal details and company-specific information, it seems legitimate.
Whaling: Going After the Big FishWhaling is spear phishing aimed at high-profile targets such as CEOs, politicians, or celebrities. The attacks are often extremely sophisticated because the potential payoff is huge. A successful whaling attack might give criminals access to an entire company’s financial systems or sensitive government information.
In the fall of 2014, Sony Pictures Entertainment suffered a devastating phishing attack initiated the previous year. Hackers, impersonating Apple, sent emails to top executives containing a malicious link that prompted them to enter their Apple ID credentials. These stolen credentials were then used to gain employee login information and deploy “Wiper” malware, ultimately crippling Sony’s network, leading to the theft of over 100 terabytes of sensitive data, and costing the company over $100 million.
Vishing: Phishing Over the PhoneVoice phishing, or “vishing,” involves phone calls instead of emails. The caller might pretend to be from your bank’s fraud department, claiming they’ve detected suspicious activity on your account. They’ll then ask you to “verify” your account information, including passwords or PINs.
These calls can be particularly convincing because the caller might already have some of your personal information (obtained from data breaches or public records), making their story seem credible.
Smishing: SMS-Based AttacksWith smishing (SMS phishing), attackers send text messages containing malicious links or requesting personal information. These might look like package delivery notifications, bank alerts, or even COVID-related health updates. Since people tend to trust text messages more than emails, smishing can be surprisingly effective.
Pretexting: Creating False ScenariosPretexting involves creating a fabricated scenario to engage with victims and steal their information. The attacker might pose as a coworker, IT support person, or customer service representative. They’ll create a believable story about why they need your information — maybe they’re “updating the system” or “verifying your account for security purposes.”
Baiting: Offering Something Too Good to RefuseBaiting attacks offer something enticing to spark curiosity or greed. This could be a free USB drive in a parking lot (loaded with malware), a too-good-to-be-true online deal, or a “free” software download. The bait hooks victims into taking actions that compromise their security.
Why Do Social Engineering Attacks Work So Well? We’re Wired to TrustHumans are generally trusting creatures — it’s how we function in society. We assume that the person calling from “the bank” actually works there, or that the urgent email from our “boss” is legitimate. Attackers exploit this natural tendency to trust authority figures and familiar brands.
Information OverloadIn our fast-paced digital world, we are constantly bombarded with emails, messages, and notifications. When rushing through our inbox, it’s easy to miss the subtle signs that something might be a scam. Attackers count on this — they know that busy people are more likely to click first and think later.
Fear and UrgencyMany successful attacks create a sense of urgency or fear. “Your account will be closed in 24 hours!” or “Suspicious activity detected — act now!” They pressure people into making quick decisions without thinking things through.
Social Media IntelligenceSocial engineering attacks have become more sophisticated partly because there’s so much personal information available online. A quick scan of your social media profiles can reveal your employer, family members, hobbies, and recent activities — all valuable information for crafting a convincing attack.
Red Flags: Spotting the Scams Email Warning SignsKeep an eye out for generic greetings like “Dear Customer” instead of your actual name. Legitimate companies usually personalize their communications. Also, watch for urgent language, threatening consequences, and requests for sensitive information via email — real companies rarely ask for passwords or account numbers through email.
Check the sender’s email address carefully. Scammers often use addresses that look similar to legitimate ones but have subtle differences — like using “arnazon.com” instead of “amazon.com” or adding extra characters.
Too Good to Be True OffersIf someone is offering you something that seems too good to be true, it probably is. Whether it’s a “Nigerian prince” wanting to share his fortune or a “limited time offer” for a luxury item at 90% off, extreme offers should trigger your skepticism.
Pressure TacticsLegitimate businesses don’t typically pressure you into immediate action with threats. If someone is insisting that you must act “right now” or face dire consequences, take a step back and verify their claims through official channels.
Be also wary of any unsolicited request for personal information, especially passwords, Social Security numbers, or financial details. Legitimate organizations have secure ways of handling this information and won’t ask for it through email or unsolicited phone calls.
Building Your Defense Strategy Email Security Best PracticesFirst, enable two-factor authentication (2FA) on all your important accounts. Even if someone gets your password, they’ll still need access to your phone or authentication app to get in. It’s like having a deadbolt in addition to your regular door lock.
Use strong, unique passwords for each account, and consider using a password manager to keep track of them all. I know it seems like a hassle, but it’s much less hassle than dealing with a compromised account.
Be cautious with email attachments and links. If you receive an unexpected attachment, even from someone you know, verify it’s legitimate before opening it. When in doubt, contact the sender through a different communication method to confirm they actually sent it.
Verification ProceduresDevelop a habit of verifying suspicious communications through independent channels. If you get an email claiming to be from your bank, don’t click the links in the email. Instead, go directly to your bank’s website or call the number on your credit card to verify the communication.
This independent verification is crucial for phone calls too. If someone calls claiming to be from a company and asks for personal information, hang up and call the company’s official number to verify the request.
Technical SafeguardsKeep your software updated. Those annoying update notifications exist for a reason — they often include security patches that protect against newly discovered vulnerabilities. Enable automatic updates when possible.
Use reputable antivirus software and email filters. These tools can catch many phishing attempts before they reach your inbox. However, don’t rely on them completely — human judgment is still your best defense.
Creating a Security-Conscious CultureWhether at work or at home, foster an environment where it’s okay to be cautious and ask questions. Create a culture where “better safe than sorry” is the norm, not the exception. Encourage family members or colleagues to double-check suspicious communications rather than risking it.
PIVX. Your Rights. Your Privacy. Your Choice.
To stay on top of PIVX news please visit PIVX.org and Discord.PIVX.org
Understanding and Mitigating Phishing and Social Engineering Attacks was originally published in PIVX on Medium, where people are continuing the conversation by highlighting and responding to this story.
The post Introducing Netic: The AI Revenue Engine For America’s Essential Services appeared first on Greylock.
What does it take to build a venture firm from scratch—and scale it across multiple waves of technological and cultural change?
In this special episode recorded at the a16z LP Summit, Marc Andreessen joins Erik Torenberg for a conversation on the origins and evolution of Andreessen Horowitz. From raising Fund I during the depths of the 2008 financial crisis to shaping the firm’s multistage, multi-sector strategy, Marc reflects on how the firm was built—and rebuilt—as the tech landscape shifted.
They discuss the rise of “Little Tech,” why policy now matters to startups, how scale became a strategic advantage in venture capital, and why the move from generalists to vertical specialists was inevitable.
Along the way, Marc shares behind-the-scenes stories on Facebook’s near-sale to Yahoo, the evolution of founder archetypes, the global talent arbitrage, and what too many people still misunderstand about tech’s role in society.
Resources:
Find Marc on X: https://x.com/pmarca
Find Erik on X: https://x.com/eriktorenberg
Stay Updated:
Let us know what you think: https://ratethispodcast.com/a16z
Find a16z on Twitter: https://twitter.com/a16z
Find a16z on LinkedIn: https://www.linkedin.com/company/a16z
Subscribe on your favorite podcast app: https://a16z.simplecast.com/
Follow our host: https://x.com/eriktorenberg
Please note that the content here is for informational purposes only; should NOT be taken as legal, business, tax, or investment advice or be used to evaluate any investment or security; and is not directed at any investors or potential investors in any a16z fund. a16z and its affiliates may maintain investments in the companies discussed. For more details please see a16z.com/disclosures.
June 12th is the Day!
PIVX, Firo: Private cryptocurrency infrastructure, The Particl Project and BasicSwapDEX host the Private Roundtable with special guest Edge.
Topics:
Edge Wallet, and AI vs. scammers, social tricks, and attacks; local AI boosts privacy
Time:
June 12th, 09:00 am EDT
Xspace link:
https://x.com/i/spaces/1PlKQMXVmqdKE
We are so excited! Can’t wait to see you there.
PIVX. Your Rights. Your Privacy. Your Choice.
To stay on top of PIVX news please visit PIVX.org and Discord.PIVX.org
Join our next Privacy Roundtable Event! was originally published in PIVX on Medium, where people are continuing the conversation by highlighting and responding to this story.
What happens when two of the biggest tech waves—AI and crypto—start to converge?
In this LP Summit conversation, a16z General Partners Chris Dixon and David George explore how stablecoins are creating a new global financial layer, why generative AI is reshaping market structures, and how the next tech giants will be built.
From network effects to native AI business models, this is a sharp look at the future of innovation and investing.
Resources:
Find Chris on X: https://x.com/cdixon
Find David on X: https://x.com/DavidGeorge83
Watch ‘What is an AI Agent?’: https://youtu.be/xGEUPLLuEIo?si=RM-tD-R8H9XfbIP
Stay Updated:
Let us know what you think: https://ratethispodcast.com/a16z
Find a16z on Twitter: https://twitter.com/a16z
Find a16z on LinkedIn: https://www.linkedin.com/company/a16z
Subscribe on your favorite podcast app: https://a16z.simplecast.com/
Follow our host: https://x.com/eriktorenberg
Please note that the content here is for informational purposes only; should NOT be taken as legal, business, tax, or investment advice or be used to evaluate any investment or security; and is not directed at any investors or potential investors in any a16z fund. a16z and its affiliates may maintain investments in the companies discussed. For more details please see a16z.com/disclosures.
Stay in the loop with your weekly PIVX update! Get insights into market trends and discover what’s new with the community.
Market Pulse Masternode Count: The number of active PIVX masternodes currently stands at 2,088, a small decrease from last week’s total of 2,121. It looks like a few masternodes have gone offline in the past week. Price Check: The Daily USD Value of PIVX experienced a further decline this week, with daily prices ranging between $0.14 and $0.15. The weekly average settled at $0.15, down from last week’s $0.1609. While the precise reason for this sharper drop isn’t fully clear, it likely reflects the broader volatility in the crypto market, as assets like Bitcoin also saw losses of over 4% in the last seven days. Trading Buzz: Amidst a growing bearish sentiment among traders, PIVX’s total weekly trading volume saw a further dip, decreasing from $13.4 million to approximately $12.9 million. Nevertheless, daily trading activity remained robust, consistently exceeding $1.5 million. New Listings: Despite weakening prices and market action, the PIVX team continues its strong development push. This past week saw PIVX land new listings on both ExPlace and Intercambio. Furthermore, the integration with Edge Wallet is complete, enabling users to seamlessly store, send, and receive PIV coins through the Edge wallet.PIVX. Your Rights. Your Privacy. Your Choice.
To stay on top of PIVX news please visit PIVX.org and Discord.PIVX.org.
PIVX Weekly Pulse (May 23rd, 2025 — May 29th, 2025) was originally published in PIVX on Medium, where people are continuing the conversation by highlighting and responding to this story.
In this episode a16z co-founders Marc Andreessen and Ben Horowitz sit down with legendary music producer and bestselling author Rick Rubin to explore the origin of his unexpected new creation: "The Way of Code"*
Blending ancient philosophy and modern AI, The Way of Code reimagines the 3,000-year-old Tao Te Ching for the age of artificial intelligence, software, and “vibe coding.” What began as a viral tweet quickly evolved into a creative manifesto—part book, part tool, part spiritual operating system for the future. Joined by a16z General Partners Anjney Midha and Erik Torenberg, the group dives deep into:
How Rick became a meme for Vibe Coding —and then quickly wrote "The Way of Code" Why AI is just another artistic tool Remix culture, creativity, and collective consciousness Why great founders and artists need to stay true to themselvesWith shout outs to punk rock, the collective unconscious, and Johnny Cash’s famed acoustic sessions, this conversation is a sprawling, soul-searching journey across music, philosophy, tech, and truth. We hope you enjoy this deeply personal and surprisingly practical conversation on how to live—and create—in the age of AI.
The Way of Code: https://www.thewayofcode.com/
“Tools will come and tools will go. Only the vibe coder remains.” - Rick Rubin
Resources:
Watch the Tetragrammaton podcast: https://www.youtube.com/channel/UC5Gat6FdyiG5ydUUHqPTAEQ
Rick on X: https://x.com/rickrubin
Marc on X: https://x.com/pmarca
Marc’s Substack: https://pmarca.substack.com/
Ben on X: https://x.com/bhorowitz
Erik on X: https://x.com/eriktorenberg
Erik's Substack: https://eriktorenberg.substack.com/
Anjney on X: https://x.com/AnjneyMidha
Stay Updated:
Let us know what you think: https://ratethispodcast.com/a16z
Find a16z on Twitter: https://twitter.com/a16z
Find a16z on LinkedIn: https://www.linkedin.com/company/a16z
Subscribe on your favorite podcast app: https://a16z.simplecast.com/
Follow our host: https://x.com/eriktorenberg
Please note that the content here is for informational purposes only; should NOT be taken as legal, business, tax, or investment advice or be used to evaluate any investment or security; and is not directed at any investors or potential investors in any a16z fund. a16z and its affiliates may maintain investments in the companies discussed. For more details please see a16z.com/disclosures.
Panther Protocol Foundation has received a $1.15 million endowment in liquid assets from Panther Ventures Limited, the development company behind Panther Protocol. This funding marks a key milestone in the Foundation’s mission to foster the long-term success of the Panther ecosystem.
Following the transfer of Panther Protocol’s intellectual property to the newly established Swiss-based Foundation, the grant will be used to advance the protocol’s development and adoption in alignment with its decentralized and community-driven vision.
Limited Mainnet Beta DeploymentIn line with its mandate to support the growth and sustainability of the Panther ecosystem, the Foundation is pleased to report the successful deployment of Panther’s limited mainnet beta last quarter. This release enables web3 users, builders and operators to explore private, compliance-compatible DeFi functionalities.
Over the past few weeks, the Foundation has prioritized incorporating feedback from the community and addressing early technical issues. We extend our thanks to all participants helping to test and refine the beta. So far, more than 2900 zAccounts have been created, with thousands of swaps, deposits, and withdrawals processed on the network.
The Foundation remains committed to ensuring the beta experience is as smooth and secure as possible, laying a strong foundation for the protocol’s full mainnet release.
What’s NextIn the coming weeks, we will share additional updates on Panther’s progress toward mainnet launch. Panther Protocol Foundation will also continue to champion a community-first approach and support developments that enrich the broader ecosystem.
Stay up to date by following Panther on X (Twitter), Discord, and Telegram.
About Panther Protocol FoundationPanther Protocol Foundation is a non-profit organization dedicated to supporting the growth, sustainability, and responsible use of Panther Protocol. While it does not operate the protocol or facilitate digital asset services, the Foundation plays a critical role in promoting adoption, supporting open-source development, advancing research, and raising awareness around the protocol’s core privacy-preserving technologies.
By empowering users, developers, and permissioned actors within DeFi and web3, the Foundation contributes to building a more secure and confidential digital future.
For more information, visit www.panther.org.
To learn more about Panther Protocol, visit www.pantherprotocol.io.
Contact
Panther Protocol Foundation
📧 Email: general@panther.org
🌐 Website: www.panther.org
From the Course to the Console—BAT Utility Hits Its Stride
Brave’s Rewards 3.0 Partner Program is picking up speed. Designed to expand Basic Attention Token (BAT) utility across Web3, the program gives partners premium exposure to Brave’s over 86 million monthly active users. In May, we’re welcoming 6 new partners spanning fitness, sports, gaming, DeFi, and creator tools, each bringing new ways to earn, engage, and build with BAT. This month also introduces new Brave Rewards product updates and Offer Wall enhancements, making it even easier for users to explore and participate.
New in Brave Rewards Implemented ability to add banner images to the Rewards offer wall (1.80.x) New dark mode (1.80.x) Updated Brave Creators dashboard Meet May’s featured partnersThis month’s partners are bringing Web3 into the rhythm of daily life, from movement-based challenges and golf rewards to community tokens, creative tools, and immersive gaming. Each one offers a distinct way for users to earn, play, or participate in the culture using BAT, whether trading on a next-gen DEX, stepping bravely into a dystopian game world, or finding the perfect podcast guest.
New partner offers will roll out across the Brave Rewards Offer Wall, Notification Ads, and New Tab Takeovers throughout the program, giving users fresh ways to explore, engage, and earn with BAT.
Berrie DEXBerrieDex is a multi-chain order book decentralized exchange reimagining DeFi trading with slippage-free limit and market orders. Operating on nine networks, including Ethereum and Solana, Berrie offers a “vortex of liquidity,” enabling frictionless trading and unlimited market creation. Its native token, $BERRIE, rewards stakers with 100% of trading fees, redistributed through open-market buybacks to support token value.
Through the program, Berrie will explore swap discounts for Brave Rewards users and BAT holders, making trading and earning in DeFi more accessible. Berrie has also listed BAT and GUANO are now listed on Berrie’s muti-chain exchange.
GolfNGolfN is a play-to-earn app that rewards golfers for doing what they love. Launching in open beta this spring on iOS and Android, it features scoring, AI-powered on-course tips, performance analytics, and community tools. Players earn points through in-app activity, which can be redeemed for premium golf gear in the GolfN Pro Shop, sweepstakes entries, and soon, even tradable on-chain for cash via $GOLF.
As part of the Rewards 3.0 Partner Program, GolfN will integrate BAT as a payment option, create custom, co-branded merchandise, and offer special bonus points opportunities and Pro Shop perks for BAT holders and Rewards users.
Moonwalk FitnessMoonwalk Fitness is an accountability app that combines daily step goals with financial incentives. Users can join or create games, set daily step targets, and pledge entry funds. Hitting your goals protects your deposit, while missing them forfeits a portion to a prize pool shared by the most consistent players.
Brave first partnered with Moonwalk in 2024 on several step challenges, including Step for Gold, during the Paris Winter Olympics and the Singapore Stroll at Solana Breakpoint. BAT sponsored the bonus prize pools for each, drawing hundreds of signups via Brave’s unique game codes. In May, Brave and Moonwalk teamed up again for Accelerate Impact, a charity challenge benefitting BONK’s Bonk for Paws initiative. The event raised over $32K from Brave and other sponsors, with 1,000 signups in just under a week.
As part of the program, Brave will continue sponsoring Moonwalk challenges with BAT rewards. Moonwalk is also exploring BAT as a buy-in option on its platform, expanding earning and utility opportunities for BAT holders and Brave Rewards users.
Novacast AINovacast is an AI-powered platform that connects podcast hosts with ideal guests instantly, streamlining the entire booking process. Hosts can browse expert profiles, automate scheduling, and earn for publishing episodes. Guests can get matched with relevant shows or use AI tools to discover and pitch active podcasts with the click of a button. Novacast handles the heavy lifting so creators and guests can spark conversations that matter.
Novacast and Brave are combining efforts to amplify creator visibility, unlock new content opportunities, and introduce novel utilities for BAT within the podcasting ecosystem.
UbisoftUbisoft is a leading game publisher known for creating rich, immersive worlds across iconic franchises like Assassin’s Creed®, Brawlhalla®, For Honor®, Far Cry®, Tom Clancy’s Ghost Recon®, Just Dance®, Rabbids®, Tom Clancy’s Rainbow Six®, and more. In 2023, Ubisoft generated nearly $2 billion in net bookings, powered by a global network of studios and a loyal player base.
Through platforms like Ubisoft Connect and Ubisoft+, players can access an expansive catalog of over 100 games and services that enhance play across devices and communities.
As part of the Brave Rewards 3.0 Partner Program, Ubisoft is developing a custom Brave skin for avatars in Captain Laserhawk: The G.A.M.E., a community-driven adventure set in a dystopian future where players shape the narrative through collective decision-making. The Brave skin is a symbol of digital resistance, created for players who reject conformity and challenge the status quo.
Brave and Ubisoft are also teaming up for an experiential activation at EthCC in Cannes (June 30-July 3), inviting fans to step into the world of Captain Laserhawk and explore shared themes of independence and disruption.
Updates from April PartnersIn April, 6 partners joined the Rewards 3.0 Partner Program: Coinage, H3 Entertainment, STEPN, Unfungible, Unstoppable Domains, and Zcash Media. Together, we launched Brave Ads campaigns, co-branded activations, and early BAT integrations designed to boost engagement, drive adoption, and pilot innovative on-chain experiences.
Pudgy Pop, Bandit, and GuanCoin teamed up for a community raffle. BAT and GUANO holders who completed a Web3 quest on bat.bandit.network earned bonus entries for a Pudgy Penguin NFT giveaway hosted by Pudgy Pop, blending on-chain participation with playful incentives.
Brave also launched its own on-chain top-level domain, .brave, in partnership with Unstoppable Domains. Within days, over 3,500 .brave domains were claimed. Fans can still claim a .brave domain here, using BAT, cryptocurrency, or credit card. An upcoming episode of The Brave Technologist podcast will feature a discussion between Unstoppable’s COO Sandy Carter and Brave’s Luke Mulks around decentralized identity and the future of user-owned naming.
Meanwhile, Brave and STEPN teamed up to launch a limited-edition digital collectible: the Brave sneaker. From May 27-30, 200 sneakers (199 OG and 1 Genesis edition) will be raffled off to eligible participants. Holders of BAT x Adam Ape NFT holders receive a 50% boost in their odds of winning. Collectible sneakers enhance both earnings and gameplay, demonstrating a real-world application of crypto in fitness and lifestyle. On May 27, Chonky from STEPN joined the weekly BAT Community Call to share more about the partnership and raffle.
Your browser does not support the video tag.Exciting collaborations with Coinage, H3 Entertainment, Unfungible, and ZCash Media are also in motion, with more to be revealed in the next update.
How interested partners can get involvedWeb3 builders and projects can join the Rewards 3.0 Partner Program to gain access to a highly engaged, privacy-conscious user base, and help shape the next wave of utility for BAT. Get in touch to learn more.
Stay tuned for more partner announcements and ways to engage with BAT.
Brave is a driving force leading the way for Web3 adoption, directly supporting Web3 into the broader Web through its privacy browser, independent search engine, and browser-native, multi-chain crypto wallet. Brave currently has over 85 million monthly active users. Learn more at brave.com and basicattentiontoken.org.
Nicolas, Stelios and their team have rebuilt the foundation of the CFO suite.
By Julien Bek, Roelof Botha, and Cornelius Menke Published May 28, 2025 Rillet Co-Founder Nicolas Kopp.Over the past 10 years, innovations have remade nearly every aspect of fintech—and in the process, unbundled a stack that was once wholly contained within a company’s ERP (enterprise resource planning) system. But the general ledger (GL)—the central record-keeping system that is the beating heart of financial operations—has been static, still dominated by legacy ERP solutions like NetSuite or Sage, launched decades ago.
For businesses trying to scale, the pain is real. They’re forced to graduate from products with limited functionality that no longer meet their needs to arcane, inefficient systems that take 10 or more specialists to run—and 15 to 20 days of manual work to close each month.
Why has this ERP foundation, so ripe for disruption, remained virtually untouched? In part because replacing the general ledger is a high-stakes proposition in a risk-averse field—and in part because it’s very hard to build.
Thankfully, Rillet co-founders Nicolas Kopp and Stelios Modes decided to take on that challenge, and rebuild an AI-native ERP from the ground up. The mission is to enable CFOs to achieve a zero-day close, and lay the foundation for a “one-person Finance function.” With a robust GL and features such as multi-entity support and advanced revenue recognition, Rillet becomes the go-to solution for businesses that are scaling past QuickBooks, as well as those that are slowed down by their NetSuite setup and want to modernize their CFO stack.
Prior to starting Rillet, Nicolas and Stelios experienced firsthand the challenges of working with traditional GL solutions while scaling the neobank N26. They recognized the sharp contrast between the hollowed-out legacy ERPs and the consumer-grade UI of newer solutions, and they understood that AI’s massive savings potential was pushing CFOs to innovate.
Over the past year, those insights have paid off, and Rillet has experienced strong pull from the market, attracting customers such as Windsurf and Decagon and collecting glowing reviews across the board, with an NPS of more than 70 and a perfect score on G2. Companies that once slogged through six-month deployments of legacy solutions can get up and running on Rillet in just weeks. Consulting-heavy customizations are replaced by simple user-friendly workflows and real-time reporting with pre-built investor metrics. Zero-day closes will soon be not the exception, but the expectation.
We at Sequoia are excited to lead Rillet’s Series A and support their growth, as their team—split across New York, Barcelona and now Menlo Park—continues to expand. What they’ve already accomplished is impressive, but it is just the start. We believe Rillet’s next chapter, around agentic automation of the Finance function (including auditing, accrual and reconciliation) will take the CFO experience to a whole new level. Thanks to Nicolas, Stelios and their team, CFOs finally have a fully modern foundation—that they can build on for years to come.
Share Share this on Facebook Share this on Twitter Share this on LinkedIn Share this via email Related Topics #AI #Fintech #Funding announcement Partnering with Robco: Accessible Automation for the Physical World News Read Partnering with Tacto: Future-Proof Supply Chains News Read Block IPO: Founding Moments News Read JOIN OUR MAILING LIST Get the best stories from the Sequoia community. Email address Leave this field empty if you’re human:The post Partnering with Rillet: The Financial ERP for the AI Age appeared first on Sequoia Capital.
The post Gen AI Present and Future: A Conversation with Chris Bedi, CCO and AI Enterprise Advisor at ServiceNow appeared first on Greylock.
The post Welcome, Howard Ting! appeared first on Greylock.
Imagine waking up to a message from your bank asking you to explain the source of your wealth and why you held cash at home. You’d probably shove this off as one of those phishing emails but this wasn’t the case for Louis Christopher, a respected property researcher.
Back in April, SQM Research managing director Christopher received an email from the Commonwealth Bank of Australia (CBA) threatening to close his long-term account unless he updated his personal information. While this may be considered a routine KYC procedure, the bank demanded extensive personal information, including details about his source of wealth and the reason for holding cash outside the financial institution.
The email reportedly warned of account restrictions or closure if he failed to comply. Initially fearing a scam, Christopher confirmed the authenticity of the request directly with the bank, only to find the questions genuine and far-reaching. The case has brought to light the increasing intrusiveness of “Know Your Customer” (KYC) requirements and raised serious questions about privacy, financial autonomy, and the evolving relationship between Australians and their banks.
Although Australian banks are legally bound by the Anti-Money Laundering and Counter-Terrorism Financing (AML/CTF) Act 2006, enforced by AUSTRAC, to collect and verify customer information, the depth and nature of CBA’s inquiry have been met with widespread public backlash. Many view the demand to explain personal cash holdings as an overreach, blurring the lines between legitimate financial oversight and an invasion of privacy.
A CBA spokesperson stated that these measures are designed to deter fraud, money laundering, and terrorism financing, and that having up-to-date customer details helps protect them. However, critics, including Christopher, argue that such aggressive interpretations of AML/CTF obligations can feel disproportionate and lack common sense, especially for customers with long and unremarkable banking histories. Christopher reportedly asserted that how he generates his wealth is his business unless there is a genuine suspicion of wrongdoing, which should warrant a court order.
This incident is not isolated. Social media has been abuzz with similar experiences from other customers reporting comparable demands from various Australian banks, with some even having accounts frozen after providing what were deemed “ambiguous” answers or missing emails. The consequences of non-compliance can be severe, ranging from restricted access to accounts to outright closure, which can significantly disrupt daily life for individuals relying on their banking services.
PIVX. Your Rights. Your Privacy. Your Choice.
To stay on top of PIVX news please visit PIVX.org and Discord.PIVX.org.
Beyond KYC: Is Your Bank Spying on Your Couch Cushions? was originally published in PIVX on Medium, where people are continuing the conversation by highlighting and responding to this story.
AI’s breakout moment is here - but where is the real value accruing, and what’s just hype?
Recorded live at a16z’s annual LP Summit, General Partners Erik Torenberg, Martin Casado, and Sarah Wang unpack the current state of play in AI. From the myth of the GPT wrapper to the rapid rise of apps like Cursor, the conversation explores where defensibility is emerging, how platform shifts mirror (and diverge from) past tech cycles, and why the zero-sum mindset falls short in today’s AI landscape.
They also dig into the innovator’s dilemma facing SaaS incumbents, the rise of brand moats, the surprising role of prosumer adoption, and what it takes to pick true category leaders in a market defined by both exponential growth - and accelerated wipeouts.
Resources:
Find Martin on X: https://x.com/martin_casado
Find Sarah on X: https://x.com/sarahdingwang
Stay Updated:
Let us know what you think: https://ratethispodcast.com/a16z
Find a16z on Twitter: https://twitter.com/a16z
Find a16z on LinkedIn: https://www.linkedin.com/company/a16z
Subscribe on your favorite podcast app: https://a16z.simplecast.com/
Follow our host: https://x.com/eriktorenberg
Please note that the content here is for informational purposes only; should NOT be taken as legal, business, tax, or investment advice or be used to evaluate any investment or security; and is not directed at any investors or potential investors in any a16z fund. a16z and its affiliates may maintain investments in the companies discussed. For more details please see a16z.com/disclosures.
We couldn’t miss the Avalanche Summit where we sat down with Emin Gün Sirer, co-founder & CEO of Ava Labs, to discuss the evolution of Avalanche’s ecosystem and how HyperSDK ushers in a scalable, interoperable, multi-chain future. Join us for a fascinating discussion on Avalanche’s approach to decentralisation, scalability & interoperability, and learn why real-world applicability relies heavily on bespoke blockchain solutions.
Topics covered in this episode:
Gün x Epicenter bromance How the Avalanche ecosystem & community evolved The future vision for Avalanche Scaling Avalanche and the HyperSDK Interoperability and the multi-chain future Decentralising Avalanche L1s Use cases and institutional adoption On-chain privacy AvaCloud The impact of AI in crypto Gün’s focus in the near futureEpisode links:
Emin Gun Sirer on X Avalanche on X Ava Labs on XSponsors:
Gnosis: Gnosis builds decentralized infrastructure for the Ethereum ecosystem, since 2015. This year marks the launch of Gnosis Pay— the world's first Decentralized Payment Network. Get started today at - gnosis.io Chorus One: one of the largest node operators worldwide, trusted by 175,000+ accounts across more than 60 networks, Chorus One combines institutional-grade security with the highest yields at - chorus.oneThis episode is hosted by Brian Fabian Crain.
Ever tried to access a website, only to be blocked by a message saying it’s unavailable in your region? While a VPN can help you bypass those digital “brick walls,” its benefits stretch far beyond just accessing restricted content. It’s a powerful tool offering significant protection and flexibility for all your online activities. So, the real question is: Do you really need a VPN?
Read on to discover what a VPN is, its pros and cons, and when one is needed.
What Is a VPN?A Virtual Private Network (VPN) is a tool that protects your online privacy. It creates a secure encrypted tunnel between your device and the internet. When you connect to a VPN, all your internet traffic is routed through this encrypted tunnel before reaching its destination.
To keep things simple, there is a four-step process whenever you use a VPN — encryption, tunnelling, IP masking, and decryption.
Encryption: When you connect to a VPN, all data leaving your device is immediately encrypted. This scrambles your information into an unreadable code, making it indecipherable to anyone who might intercept it. Tunneling: Your encrypted data then travels through a “tunnel” (the virtual private network) to the VPN server. IP Masking: The VPN server acts as an intermediary. Your original IP address is hidden, and your online activity appears to originate from the VPN server’s IP address. This effectively masks your real location and identity. Decryption: The VPN server decrypts your data and sends it to its intended destination (e.g., a website). When the website sends data back, it goes to the VPN server, which encrypts it again and sends it back through the tunnel to your device for decryption. Pros of Using a VPN Enhanced Security, Especially on Public Wi-FiPublic Wi-Fi networks in cafes, airports, hotels, or libraries are notoriously insecure. They are often unencrypted, making it easy for cybercriminals to intercept your data through “man-in-the-middle” attacks or by setting up “evil twin” networks. A VPN encrypts your connection, making your data unreadable to anyone else on the same network.
Protecting Your Online PrivacyYour Internet Service Provider (ISP) can typically see and log your browsing history, online activities, and even sell this data to third parties. A VPN encrypts your traffic and masks your IP address, preventing your ISP from monitoring your online behavior. This also shields you from targeted advertising based on your browsing habits and makes it significantly harder for websites and other entities to track your online footprint.
Bypassing Geo-Restrictions and CensorshipOne of the main reasons why people use VPNs is to circumvent geographic restrictions. It’s no news that many streaming services and online content are geo-restricted, meaning they are only accessible from specific geographic locations. By connecting to a VPN server in a different country, you can effectively “spoof” your location and gain access to content that would otherwise be unavailable. This is crucial for individuals living in countries with strict internet censorship, allowing them to bypass government firewalls and access a free and open internet.
Avoiding Censorship and Content BlockingSpeaking of internet censorship, in countries or organizations with restrictive network policies, VPNs can help bypass these limitations. By routing your traffic through servers in different locations, you may be able to access blocked websites and services. However, it’s important to note that using VPNs to circumvent restrictions may violate local laws or organizational policies.
Cons of Using a VPN Reduced Internet SpeedThe encryption process and the routing of your traffic through a remote server can introduce some latency and reduce your internet speed. The extent of this slowdown depends on the VPN provider’s server quality, the distance to the server, and the encryption protocols used.
High CostI’ll tell you for free, quality VPN services typically come with a subscription fee. While free VPNs exist, they often come with limitations such as data caps, slower speeds, intrusive ads, and, most critically, may compromise your privacy by logging and selling your data. The saying “if you’re not paying for the product, you are the product” often applies to free VPN services.
Not a Catch-All Security SolutionA VPN enhances your privacy and security online, but it’s not a silver bullet. It won’t protect you from malware, phishing scams, or viruses. Good cybersecurity practices, including strong passwords, antivirus software, and cautious clicking, remain essential.
Security BreachesVPNs are not infallible. Research from Specops claimed that over 2 million VPN passwords were stolen in 2024. You are essentially routing all your internet traffic through the VPN provider’s servers. That said, choosing a reputable VPN provider with a strong “no-logs” policy and a proven track record of security and transparency is crucial.
Do I Need a VPN?Given the pros and cons, there are specific scenarios where VPNs are highly recommended. For instance, a VPN is a must if you regularly work from coffee shops, airports, hotels, or other locations with public Wi-Fi. The security risks of unsecured public networks are significant, and a VPN provides essential protection for your sensitive data.
Similarly, if you live in or frequently visit countries with strict internet censorship, government surveillance, or limited access to global content, a VPN can be an essential tool for maintaining internet freedom and accessing information. Other instances where you may need a VPN include access to sensitive information such as confidential work documents or banking details, anonymity during p2p file sharing, and access to greater online privacy.
Ultimately, the decision to use a VPN rests on your personal risk assessment and how much you value your digital footprint and freedom.
PIVX. Your Rights. Your Privacy. Your Choice.
To stay on top of PIVX news please visit PIVX.org and Discord.PIVX.org.
Do I need a VPN? was originally published in PIVX on Medium, where people are continuing the conversation by highlighting and responding to this story.
What happens when AI stops being just infrastructure—and becomes a matter of national identity and global power?
In this episode, a16z’s Anjney Midha and Guido Appenzeller explore the rise of sovereign AI—the idea that countries must own their own AI models, data centers, and value systems.
From Saudi Arabia’s $100B+ AI ambitions to the cultural stakes of model alignment, we examine:
Why nations are building local “AI factories” instead of relying on U.S. cloud providers How foundation models are becoming instruments of soft power What the DeepSeek release tells us about China’s AI strategy Whether the world needs a “Marshall Plan for AI” And how open-source models could reshape the balance of powerAI isn’t just a technology anymore - it’s geopolitical infrastructure. This conversation maps the new battleground.
Resources:
Find Anj on X: https://x.com/AnjneyMidha
Find Guido on X: https://x.com/appenz
Stay Updated:
Let us know what you think: https://ratethispodcast.com/a16z
Find a16z on Twitter: https://twitter.com/a16z
Find a16z on LinkedIn: https://www.linkedin.com/company/a16z
Subscribe on your favorite podcast app: https://a16z.simplecast.com/
Follow our host: Follow our host: https://x.com/eriktorenberg
Please note that the content here is for informational purposes only; should NOT be taken as legal, business, tax, or investment advice or be used to evaluate any investment or security; and is not directed at any investors or potential investors in any a16z fund. a16z and its affiliates may maintain investments in the companies discussed. For more details please see a16z.com/disclosures.
Your weekly PIVX update is here! Get the latest on market activity and all things community.
Market Pulse Masternode Count: The number of active PIVX masternodes is currently 2,121. This represents a slight dip from last week’s total of 2,123. Price Check: The Daily USD Value of PIV saw a decline this week, fluctuating between $0.16 and $0.17. The weekly average price settled at $0.1609, a notable decrease from the previous week’s $0.1758. This downward swing occurred despite the generally bullish cryptocurrency market. However, looking at the broader picture, PIV remains up by over 20% on a month-on-month basis. Trading Buzz: The total weekly trading volume for PIVX saw a pullback this week, dropping from $16.5 million to approximately $13.4 million. While daily trading volume remained healthy, it occasionally dipped below the $2 million benchmark. New Listings: PIVX has continued to consolidate its presence and strengthen listing efforts under the leadership of Jeffrey, Head of Business Development. Over the past week, the leading privacy coin got listed on two new platforms — SecureShift and ChainSwap.PIVX. Your Rights. Your Privacy. Your Choice.
To stay on top of PIVX news please visit PIVX.org and Discord.PIVX.org.
PIVX Weekly Pulse (May 16th, 2025 — May 22nd, 2025) was originally published in PIVX on Medium, where people are continuing the conversation by highlighting and responding to this story.
What exactly is an AI agent — and does anyone actually agree?
In this episode, taken from of AI + a16z, General Partner Guido Appenzeller and partners Matt Bornstein and Yoko Li break down one of the most hyped- and most hotly debated 0 concepts in AI right now: agents.
Are agents just clever wrappers around LLMs? Tools that can reason and act? Or simply a fresh label for familiar tech?
Whether you're building, investing, or just trying to make sense of the buzz, this episode is for you.
Resources:
Find Guido on X: https://x.com/appenz
Find Yoko on X: https://x.com/stuffyokodraws
Find Matt on X: https://x.com/BornsteinMatt
Stay Updated:
Let us know what you think: https://ratethispodcast.com/a16z
Find a16z on Twitter: https://twitter.com/a16z
Find a16z on LinkedIn: https://www.linkedin.com/company/a16z
Subscribe on your favorite podcast app: https://a16z.simplecast.com/
Follow our host: https://x.com/eriktorenberg
Please note that the content here is for informational purposes only; should NOT be taken as legal, business, tax, or investment advice or be used to evaluate any investment or security; and is not directed at any investors or potential investors in any a16z fund. a16z and its affiliates may maintain investments in the companies discussed. For more details please see a16z.com/disclosures.
Throughout the conference, we witnessed something special: moment after moment where visitors to our booth suddenly understood concepts that had previously seemed abstract or unclear. One community member described these as “lightbulb moments” — that instant when someone grasps not just what Verus does, but why it matters.
The phrase that seemed to catalyze these moments? “DeFi is not an app.”
This simple statement opened doors to deeper conversations about what we’ve always known: that DeFi should be a foundational primitive built into blockchain protocols, not bolted on top through vulnerable smart contracts. Marketing professionals and developers alike found themselves nodding along as we explained that smart contracts are essentially stored procedures in a shared global database — useful, but hardly the revolutionary construct they’re often portrayed to be.
Real Conversations About Real ProblemsWhat set this conference apart wasn’t just theoretical discussions. Attendees brought real concerns about security vulnerabilities they’re facing today. When we talked about the recent DNS redirection attacks on platforms like Curve, heads nodded knowingly. When we asked, “How will anyone solve phishing if users have to give smart contracts direct access to their wallets?” — the silence was telling.
These weren’t gotcha moments. They were honest technical discussions about fundamental challenges in blockchain architecture. And we had answers that resonated.
The Presentation That Changed PerspectivesThe recorded presentation “Own or be Owned: How Verus Secures Ownership in a Digital World” at the Protocol Village by Michael J. Toutonghi, lead developer, became a focal point of our conference presence. Following the talk, booth traffic surged with attendees wanting to dive deeper into the concepts presented.
In the presentation we announced Commons Powered Apps. More on that in a future article.
“Wait, This Isn’t a Company?”Perhaps the most gratifying reactions came when visitors learned about Verus’s structure. The disbelief was palpable: How could something this technically sophisticated, this well-organized, this professional, not be backed by venture capital or run by a corporation?
“It’s entirely community-driven,” we’d explain. No ICO. No pre-mine. No company behind it.
The authenticity of that message — backed by the reality of what the community has built — changed conversations immediately. Suddenly, we weren’t just another blockchain project. We were proof that communities can build world-class technology without traditional corporate structures.
Building Bridges to the FutureThe conference generated exactly the kind of connections we hoped for. Our booth became a hub for substantive technical discussions with projects and companies exploring blockchain solutions for their real-world challenges.
These weren’t casual meetups. These were in-depth conversations with organizations that immediately understood the limitations of current blockchain approaches and were actively seeking alternatives. The technical depth of these discussions — and the genuine interest in Verus’s architectural differences — has resulted in a list of follow-ups.
What struck us most was the quality of these interactions. Rather than the typical conference small talk, we found ourselves in detailed technical discussions about specific implementation challenges and use cases.
A Community Effort in Every SenseNone of this would have been possible without the Verus community members who funded the Consensus presence. Every donation, large or small, contributed to putting our best foot forward at this critical industry event. The booth & the ability to have a presentation — all of it came from community support.
For those who couldn’t attend but contributed: you were there in spirit, and your support directly enabled every conversation, every connection, and every breakthrough moment we experienced.
Looking ForwardAs we process the connections made and opportunities identified at Consensus 2025, one thing is clear: the industry is ready for what Verus offers. The questions we’re answering aren’t theoretical anymore — they’re practical, pressing problems that developers and organizations need solved today.
The shift we experienced at this conference wasn’t just about better messaging or a nicer booth. It was about the broader blockchain ecosystem reaching a level of maturity where the foundational questions we’ve been addressing for years are now front and center for everyone.
For the Verus community, Consensus 2025 wasn’t just another conference. It was validation that our patient, principled approach to building better blockchain infrastructure is exactly what the industry needs. And we’re just getting started.
Thank you to every community member who made our Consensus 2025 presence possible. The impact of your support continues to ripple through every new connection and opportunity that emerged from this event.
🛠️ Build dApps with VerusLook up the complete command list here. Go to verus.io to find out about all the possibilities to build. (e.g. launching currencies, tokens & liquidity pools).
Join the community. Learn about the protocol. Use Verus & build dApps.➡️ Join the community on Discord
Consensus 2025: The Conference Where Things Clicked for Verus was originally published in Verus Coin on Medium, where people are continuing the conversation by highlighting and responding to this story.
The Panther Protocol Foundation now owns Panther’s intellectual property, including its core architecture, which has been open-sourced after a successful audit by Veridise.
Panther Protocol’s main codebase is now open-source, following the recent audit completion by industry-leading audit firm Veridise. The Panther Protocol Foundation (PPF) will support the protocol’s continued development and has assumed control of all Panther-related intellectual property previously held by development company Panther Ventures Limited.
Successful Audit and Open SourcingBefore open-sourcing, Panther’s codebase underwent a comprehensive security audit conducted by Veridise. The audit covered the protocol’s Zero-Knowledge circuits, and smart contracts, improving security and reliability. With the audit now complete, Panther’s codebase has been made publicly available under the LGPL3.0 and MIT License.
The open-source code will enable developers, financial market participants, and blockchain innovators to integrate, utilize, and build upon Panther’s privacy-enhancing technology. The full audit report detailing Veridise’s findings is available for public review here. Panther's documentation also provides a comprehensive list of features and functions in the current codebase.
Open-Sourcing and Community EngagementPanther’s codebase can be found on the Panther Protocol’s Foundation GitHub and GitLab, with the additional read-me files in place to support developers. The licensing chosen supports the open-source ethos of the Web3 ecosystem, fostering a community-driven approach to Panther’s evolution.
Governance of the protocol will remain the responsibility of the Panther DAO, ensuring a decentralized model for decision-making and ongoing development. This reinforces Panther’s commitment to a trustless, resilient, and community-first DeFi ecosystem.
Quote from Panther Protocol Co-Founder
"Open-sourcing Panther’s audited code represents a significant milestone in our journey toward transparency and decentralization. By making our technology accessible, we invite the broader Web3 community to contribute, innovate, and verify our security, ensuring Panther’s continued growth as a trusted, privacy-preserving DeFi protocol. The goal of the project was always to build an infrastructure where compliance and confidentiality can coexist, and we would like to invite everyone to try out the solutions that have been built." — Anish Mohammed, Co-Founder
About Panther Protocol FoundationThe Panther Protocol Foundation is dedicated to supporting the adoption and sustainability of the Panther Protocol across the decentralized Web. The Foundation works to anchor the Panther Protocol for DeFi and blockchain ecosystems, thus empowering users, builders, and licensed operators to participate in tomorrow’s internet while remaining confidential. The Foundation also focuses on open-source code, research, and awareness of the Panther Protocol's core technologies.
For more information, visit https://www.panther.org.
For more information about Panther Protocol, please visit www.pantherprotocol.io.
Contact Information
Panther Protocol Foundation
Email: general@panther.org
Website: www.panther.org
In a landmark ruling delivered last Wednesday, the Brussels Court of Appeal ruled that tracking-based online advertising was illegal, directly challenging the pervasive practices of tech giants like Google, Microsoft, Amazon, and X across the European Union.
The decision pivots on the finding that the widely adopted consent mechanisms for this type of advertising fail to meet the rigorous standards set by the EU’s General Data Protection Regulation (GDPR).
The court’s judgment specifically targets the Transparency and Consent Framework (TCF), a ubiquitous standard within the online advertising ecosystem. The TCF is designed to solicit user consent for the processing of their personal data for targeted advertising through a system known as Real-Time Bidding (RTB). In RTB, advertisers engage in lightning-fast auctions to display ads to specific users based on their digital footprint and inferred interests.
The court’s decision echoes the prior conclusions of the Belgian Data Protection Authority (DPA) from 2022, which determined that the technology underpinning tracking-based ads contravenes several core tenets of the GDPR. The fundamental issue, as the court affirmed, lies in the absence of genuine and informed consent from users. The prevalent pop-up consent requests, the court reasoned, fall short of providing adequate transparency or control regarding the collection and dissemination of user data among the myriad companies involved in the RTB process.
Hannah Storey, Amnesty International’s Policy Advisor on Technology and Human Rights, lauded the ruling as “a major win for the right to privacy and a clear message that the tech industry should move away from surveillance-based advertising to a more rights-respecting model.” She asserted that the current practice of amassing and processing personal data via the TCF is incompatible with the fundamental right to privacy.
Dr. Johnny Ryan, Director of Enforce at the Irish Council for Civil Liberties, a key figure in the legal battle against the ad tech industry, asserted that the court’s decision “shows that the consent system used by Google, Amazon, X, Microsoft, deceives hundreds of millions of Europeans.” He contended that the tech industry has sought to mask a “vast data breach behind sham consent popups,” effectively turning the GDPR into an inconvenience rather than a safeguard for individuals.
While the EU court’s ruling marks a crucial victory for privacy advocates, the practical implementation and the response from the tech industry remain to be seen.
PIVX. Your Rights. Your Privacy. Your Choice.
To stay on top of PIVX news please visit PIVX.org and Discord.PIVX.org.
EU Court Declares Tracking-Based Ads Illegal was originally published in PIVX on Medium, where people are continuing the conversation by highlighting and responding to this story.
The post Introducing Greenlite AI: AI Workforce to Fight Financial Crime appeared first on Greylock.
FROST, which stands for Flexible Round-Optimized Schnorr Threshold, is an advanced cryptographic protocol designed to improve threshold signature schemes. Unlike traditional single-party signatures, FROST enables a group of participants to collaboratively generate digital signatures using shares of a private key, so that only a specified threshold of participants is needed to authorize a transaction. This approach boosts both security and resilience against key loss or compromise.
FROST is notable for reducing network overhead during signing operations, supporting efficient two-round (or even single-round, with preprocessing) signing without sacrificing security or concurrency. These features make FROST especially suitable for Zcash.
What is FROST for Zcash?
Our rationale from the onset of this project was that “Zcash transactions should be publicly indistinguishable (i.e. an adversary observing the blockchain should not be able to gain any information about who the payment is for, how much the payment is, or who authorized the payment). Zcash previously did not have a good mechanism to achieve this goal in a multi-party setting, where a group of users want to jointly control funds and authorize transactions. Prior to FROST, the best protocols to perform this signing process required either undesirable implementation complexity, high network overheads to perform signing operations, the inability to support a threshold number of signers, or undesirable privacy leaks such as exposing the number of signers. Consequently, our decision to design a new threshold scheme stemmed from the desire to improve the state of threshold signature research to match the needs of Zcash users today.”
When it comes to advancing privacy and security in digital transactions, the FROST for Zcash implementation we developed stands out with several important features. Notably, it is designed to keep the same security guarantees of RedDSA, in particular unlinkability, which is required by the Zcash protocol. This prevents attackers from linking two FROST-generated signatures to the same person. This makes integration straightforward for developers and organizations without the need for major infrastructure changes.
To support adoption, Zcash Foundation (ZF) provides user-friendly libraries, demo applications and tutorials, making it easy for anyone to incorporate FROST for Zcash into their projects.
Why did we develop FROST for Zcash?
ZF committed to building FROST for Zcash to address several important needs within the Zcash ecosystem. One of these primary motivations was to develop a secure, privacy-preserving multisignature implementation for shielded transactions, a functionality that was previously missing. The goal from the onset was to ensure seamless compatibility with existing Zcash standards and protocols, like RedDSA. This allows developers and projects to integrate FROST for Zcash into their systems without having to overhaul their infrastructure.
ZF also wanted to make advanced cryptographic tools more accessible through user-friendly libraries, demo applications, and tutorials to help developers adopt FROST quickly and easily.
What is the current state of FROST for Zcash?
We have now concluded our development work on the FROST reference implementation, frost-core
, along with the ciphersuite crates. To help with deployment, we have also developed tools to help participants communicate with each other: a frost server, frostd
, and the command line tool frost-client
whose purpose is to work as a standalone tool but also as reference for wallets to integrate FROST.
What Happens Next?
The next step is for wallets to integrate FROST using those tools directly or as reference, knowing that ZF is willing to provide guidance as needed. If wallet developers are hesitant to run their own frostd
servers, the team is open to deploying a production version. Importantly, the frostd server doesn’t need to be trusted, as all messages are end-to-end encrypted; it only relays information, similar to lightwalletd, and leaks minimal metadata that can be further protected with tools like Tor.
There are some existing concerns about the lack of a standardized key generation specification for FROST, which currently limits interoperability; progress on this front is ongoing, and we hope to complete that soon with guidance from ECC engineers.
FAQs
Why does Zcash require its own implementation? Why isn’t there one FROST implementation for all protocols?
Zcash requires a custom FROST implementation to maintain its privacy guarantees and protocol-specific needs, as generic FROST variants lack critical features like rerandomized signatures (ensuring threshold-signed transactions mirror single-party ones for anonymity) and compatibility with Zcash’s shielded transaction systems (Sapling/Orchard). Additionally, Zcash integrates share recovery mechanisms, identifiable aborts, and safeguards against concurrency attacks-adaptations unnecessary for non-privacy chains. Since blockchain protocols prioritize divergent tradeoffs (e.g., Bitcoin’s simplicity vs. Zcash’s unlinkability), a universal FROST standard is impractical due to cryptographic nuances (curves, serialization) and ecosystem-specific security requirements.
Does FROST for Zcash have commercial applications outside of Zcash?
No, this reference implementation was created specifically for the Zcash ecosystem.
Has FROST for Zcash been audited?
Yes, there have been two audits: the first one by NCC audited the core crates which implement the cryptographic part of FROST; check the complete report. The second audit covered the frostd
and frost-client
helper tools and was done by Least Authority; the complete report is available here.
Why is a FROST server needed? What is the risk of using it?
The FROST server simply helps participants to communicate with each other; most devices today are behind firewalls or routers which make direct peer-to-peer communication difficult. Technically the server is not even aware that it is being used for FROST!
Additionally, the frost-client
tool we have developed (which also serves as reference for other implementations and also works as a library) does end-to-end encryption of all messages. This means that the server does not need to be trusted and won’t be able to see the content of the messages. The server is able to gather metadata though (e.g. who is talking to who at what times), but that risk can be mitigated by using e.g. Tor. The risk is very similar to the risk that wallets take by using lightwallet servers.
Also note that using the FROST server is optional. We believe that it’s the easiest path forward until a better solution is developed, but wallets are free to handle user communication as they wish.
What is missing for a regular Zcash user to be able to use FROST?
The missing piece is for wallets to integrate FROST. The required tooling to make that happen has already been completed by ZF (though of course wallets are free to use the implementation and design they wish to). Technical-inclined users can use FROST with Zcash today using our frost-client command line tool.
Is this reference implementation of FROST capable of being included in NU 6.1?
Due to the way FROST works, it’s not required to change the protocol in order to use FROST with Zcash. Therefore, yes, FROST can be used in NU 6.1, or even now with NU 6.
What is the best way for wallet developers to contact ZF with questions?
Open an issue or discussion in the repo and reach out on the #frost channel of the R&D Discord.
The post The State of FROST for Zcash appeared first on Zcash Foundation.
Recorded live at the 2025 a16z LP Summit, this episode is a candid conversation between a16z cofounders Marc Andreessen and Ben Horowitz—hosted by general partner Erik Torenberg.
They cover the evolution of a16z from startup firm to multi-practice platform, how the media landscape is shaped by meme-speed narratives, why reorgs—not just returns—determine who wins, and what it takes to build an enduring venture franchise.
They also share thoughts on the changing policy landscape for AI and crypto, the firm’s bipartisan approach to Washington—and why Marc personally screens social media profiles before anyone joins the team.
Resources:
Find Marc on X: https://x.com/pmarca
Find Ben on X: https://x.com/bhorowitz
Stay Updated:
Let us know what you think: https://ratethispodcast.com/a16z
Find a16z on Twitter: https://twitter.com/a16z
Find a16z on LinkedIn: https://www.linkedin.com/company/a16z
Subscribe on your favorite podcast app: https://a16z.simplecast.com/
Follow our host: Follow our host: https://x.com/eriktorenberg
Please note that the content here is for informational purposes only; should NOT be taken as legal, business, tax, or investment advice or be used to evaluate any investment or security; and is not directed at any investors or potential investors in any a16z fund. a16z and its affiliates may maintain investments in the companies discussed. For more details please see a16z.com/disclosures.
SAN FRANCISCO–May 20th, 2025: In a major step forward for digital identity and internet decentralization, Brave has become the first browser to launch its own on-chain top-level domain. In partnership with Unstoppable Domains, the new .brave domain is now available to Brave’s over 85 million monthly active users—offering a seamless way to own digital identity, send crypto, and navigate Web3. Minted on the Polygon blockchain, .brave domains will resolve across multiple networks—including Base, Bitcoin, Ethereum, Solana, Sonic, and more—making them widely compatible in the Web3 ecosystem.
The launch of .brave marks a defining moment in the evolution of the internet, bridging the mainstream browser experience with the permissionless power of Web3.
“Our mission is to put privacy, ownership, and control back in the hands of users,” said Brian Bondy, CTO and co-founder of Brave. “.brave is more than a domain—it’s a user-owned identity layer, native to the Brave ecosystem.”
Through Unstoppable Domains, Brave users can now claim personalized .brave domains that unlock a full suite of decentralized tools. .brave domains can be used in the Brave Wallet, allowing for crypto payment in a simplified way. They can host censorship-resistant websites on IPFS, which are directly accessible within the Brave browser without traditional hosting fees. .brave domains will be directly resolvable within the Brave browser and the Brave Wallet starting in version 1.81 which will be available in Nightly, and targeted to Release on August 5th, 2025.
Cryptocurrency payments become simpler and more human with .brave names replacing long wallet addresses. Users can also build a verifiable on-chain identity through UD.me, showcasing their digital assets, wallet connections, and public credentials within the broader Brave community.
The .brave domain integrates with Unstoppable’s broader ecosystem, offering secure, badge-gated messaging, domain trading through the Unstoppable Marketplace, and frictionless access to dApps, games, and metaverses via Login with Unstoppable.
“This is a bold leap toward an open internet,” said Sandy Carter, COO of Unstoppable Domains. “.brave puts digital identity in the hands of everyday users, not platforms.”
As part of the rollout, Unstoppable Domains will join Brave’s Rewards 3.0 Partner Program, further expanding the reach of the Basic Attention Token (BAT). With over 99% of BAT’s 1.5 billion supply in circulation, BAT now ranks as the 14th most held token on Ethereum and is accepted by 1.5 million verified creators worldwide.
Brave and Unstoppable are taking the next step in expanding the reach of the .brave domain by exploring the process for ICANN gTLD registration. While still in the early stages and subject to regulatory review, this move could pave the way for .brave to function across both the traditional Web2 internet and decentralized Web3 environments.
The potential ICANN accreditation would mark a significant milestone in the shared mission to empower users with greater control over their digital identities—no matter which corner of the internet they call home. This effort reflects a broader vision of a more open, interoperable web where innovation and ownership go hand in hand.
To claim a .brave domain and join the movement, visit https://get.unstoppabledomains.com/brave/
About Unstoppable DomainsLaunched in 2018, Unstoppable Domains is an ICANN-accredited registrar and leading digital identity platform dedicated to onboarding the world onto DNS and Web3. Unstoppable Domains provides Web3 domains minted on the blockchain, empowering individuals with full ownership and complete control over their digital identities, with no renewal fees. Users can replace lengthy alphanumeric crypto wallet addresses with easy-to-remember human-readable domain names, streamlining their interactions with apps, wallets, exchanges, and marketplaces. Recognized by Forbes as one of America’s Best Startup Employers for four consecutive years—2022, 2023, 2024, and 2025—Unstoppable Domains has rapidly grown, boasting over 4.2 million registered domains.
For more information, please visit unstoppabledomains.com.
About Brave and Brave WalletBrave is a driving force leading the way for Web3 adoption, directly supporting Web3 into the broader Web through its privacy browser, independent search engine, and browser-native, multi-chain crypto wallet. Brave currently has over 85 million monthly active users. Learn more at brave.com.
Brave Wallet is the secure, multi-chain crypto wallet built directly into the Brave privacy browser—no extensions required. With Brave Wallet, users can manage tokens and NFTs; connect to DApps and onramp to Web3; and explore decentralized finance, social media, gaming, and more. Brave Wallet users can connect other “cold” wallets like Ledger & Trezor. They can buy, store, send, and connect to DApps on Solana, Ethereum and EVM chains, Zcash, and Filecoin.
Brave Wallet is available on desktop, Android, and iOS, and is free to use. To get started on desktop, Brave browser users can click the wallet icon near the address bar. On mobile, users can tap “⋮” (Android) or “…” (iOS), then tap the wallet icon.
With major shifts in regulatory landscapes and a growing awareness of digital privacy, the privacy coin market is poised for significant expansion. We speak with Jeffrey, the Head of Business Development at PIVX, to gain insights into their strategic vision, the key trends they anticipate, and how PIVX is positioning itself for robust growth in this evolving sector.
How do you see the privacy coin market evolving in the next 3–5 years? What key trends and challenges do you anticipate?I believe we are now entering the stage of adoption in the privacy coin market. Major security breaches and recent crackdowns on privacy have sparked an interest in privacy and privacy coins.
Recently, Tornado Cash won a major legal battle for privacy in the USA, making people more comfortable with the idea of using obfuscation for funds. It is no longer perceived as a tool for criminals but as a tool to protect oneself from prying eyes. Privacy is a human right, and coins such as PIVX simply provide the tools to protect this right.
The biggest challenge to this is regulation at the moment. PIVX has overcome this by introducing exchange addresses to allow those who operate a business that requires transparency to only engage with transparent PIVX transactions.
There are also discussions with a few major cryptocurrencies to integrate privacy. I truly believe it will become the norm soon, as it’s simply the safest option for anyone. PIVX, being one of the first, has set a standard, and this is going to make PIVX shine especially with the optional privacy, which resolves many issues around regulation.
Ultimately, I believe the future for privacy projects is bright. Many of our new and upcoming partnerships have all embraced us and our privacy protocol. In the past, we faced scrutiny, but this is mostly not the case now, a clear indicator of privacy becoming a standard. I am excited for the future of PIVX in this sector.
Where do you believe PIVX currently stands in the market, and what are its biggest opportunities for growth?PIVX dimmed out in recent years, largely due to the influx of memecoins. We also had a lack of funding and no dedicated business development activities. This has completely changed since the introduction of our new budget, which introduced new team members and roles.
Since taking on the role of business development head, we have successfully established major partnerships, such as NowPayments, Travala, Coinomi, as well as new exchange listings on top exchanges such as MEXC, Binance (USDT), BitMart, Lbank, and more. This shows major strength in a coin that was created at the beginning of the cryptocurrency cycle and will allow us to slowly but surely overcome all future challenges and to secure PIVX as a top privacy cryptocurrency.
Regarding our position from a technical standpoint, PIVX became the first-ever proof-of-stake cryptocurrency to incorporate ZK-Snarks and is currently working on becoming the first to allow private staking and masternodes. I believe we blaze the trail by providing sound security, fast transactions, functionality, and ease of use, with an expanding team that is going to introduce PIVX to many more. The future for PIVX is bright.
What are your thoughts on the role of regulatory compliance in PIVX’s business development strategy, and how would you navigate potential challenges?It is key that we pay attention to regulatory demands so that we can provide PIVX globally without issues in terms of exchanges. However, as a decentralised project, our blockchain will go on regardless.
Because we care about following regulations, we keep in touch with our exchange partners. Binance recently asked for “Exchange Addresses,” a feature that limits them to receiving only the basic, transparent PIVX. This would make PIVX completely compliant due to a lack of privacy on said exchanges. This doesn’t remove privacy on our blockchain. Users who value protecting their financial data can always withdraw and send it to a SHIELD address.
Our team is active and willing to work with all of our partners and regulatory environments to deliver our project globally without issues, and most of all, to give our users a secure and sound blockchain that protects their financial data.
What are your thoughts on the integration of privacy features into other blockchain ecosystems and the potential for interoperability?I believe it is very transformative and in the right direction for projects to integrate privacy features. It would also be a great introduction for PIVX as it is one of the earliest projects to incorporate privacy and the first-ever Proof of Stake blockchain to integrate ZK-Snarks (SHIELD) as a privacy protocol. I also believe PIVX, with its optional privacy integration, would be an inspiration for many existing and new projects that want to integrate privacy.
Having the freedom of choice makes things easier for those who require a transparent ledger, versus having some transactions that need to remain out of public sight, such as retail or savings. Having this model also makes PIVX regulatory compliant and a great example to replicate.
Allowing for interoperability would be a great way to incorporate seamless value transfer across other blockchains, whilst preserving privacy through PIVX. I am all for it since it would introduce PIVX to a much wider audience and grow the use of the network. Perhaps it is something that we as a PIVX team can look at and discuss once we achieve our milestone v6.0 release.
The most common I’ve seen is the narrative that those who engage with privacy coins have something illicit to hide. I usually combat this with a simple question, “If a stranger were to ask to see your bank statement, would you let them?” This usually results in an immediate no; I then proceed with: “Well are you okay with the entire world seeing your cryptocurrency transactions without your permission?”
Most people fail to realise that relying on a transparent ledger can compromise one’s security and potentially lead to being harmed.
Using private blockchains such as SHIELD by PIVX helps you separate your crypto to prevent malicious parties from tracking your portfolio. I’ll end by saying that privacy coins do not facilitate crime, criminals facilitate crime, and privacy protects you from criminals.
What are some of the key lessons you’ve learned during your time leading business development at PIVX?Even for a project with a minimal budget, big dreams can be achieved. I have worked alongside many amazing new partners for PIVX, such as Travala, MEXC, NOW Group, and many more, and each has provided a new use case for PIVX.
It is hard, but having a community that unites behind my thinking process and choices makes everything much smoother. I have also learnt that everything in this industry has a ripple effect. What I mean by that is that one small listing or integration for PIVX can lead to another quite easily, as they may work together or use each other’s services.
It has also given me the time to reflect on PIVX and to identify weaknesses and to see that the biggest factor to growth is liquidity. This is now a key focus point for me. I am working alongside major exchanges that support PIVX to identify their liquidity needs so that we may attain other listings on their platform, such as Perpetual contracts, and thus far it has succeeded.
There is a lot to learn, however, I feel that the knowledge that I have gained through numerous conversations with like-minded people will be the driving factor for me to bring PIVX to new audiences, heights, and more use cases.
Beyond privacy, what other unique technological or community-driven advantages does PIVX offer potential partners and users?A strong selling point I always highlight to our partners is the DAO and self-funded treasury that PIVX has. This mechanism allows for partners to submit their own proposals and to seek funding for work they may want to collaborate on with PIVX. This self-funded treasury guarantees constant development and funding for proposals that pass.
An example of this would be a recent partnership with Coinomi, which has now submitted a proposal for funding through our DAO. Participation in the DAO through such proposals, whether by submitting them or voting on them, is a key strength of the PIVX project. This also helps with our next advantage which is the community. Because PIVX is a DAO, our community has grown used to the fact that they do indeed have a voice when it comes to the decisions made for PIVX and are therefore active and do support us and our partners.
PIVX. Your Rights. Your Privacy. Your Choice.
To stay on top of PIVX news please visit PIVX.org and Discord.PIVX.org.
“The Future for Privacy Projects is Bright,” PIVX’s Business Dev Lead Asserts was originally published in PIVX on Medium, where people are continuing the conversation by highlighting and responding to this story.
Business Process Outsourcing (BPO) is a $300 billion industry powering the back- and front-office operations of the world’s largest companies.
In her article, "Unbundling the BPO: How AI Will Disrupt Outsourced Work," Kimberly Tan (Partner, a16z) explores how the rise of AI is challenging the status quo.
In this episode, Kimberly unpacks the shift—from call centers and invoice processing to cross-system automation and coding agents. They explore how AI is redefining the economics of scale, unlocking new markets, and expanding the reach of automation beyond the Fortune 500. For founders and operators alike, this conversation offers a clear-eyed look at the playbook for building in this newly addressable space.
Resources:
Read the article: https://a16z.com/unbundling-the-bpo-how-ai-will-disrupt-outsourced-work/
Find Kimberly on X: https://x.com/kimberlywtan
Stay Updated:
Let us know what you think: https://ratethispodcast.com/a16z
Find a16z on Twitter: https://twitter.com/a16z
Find a16z on LinkedIn: https://www.linkedin.com/company/a16z
Subscribe on your favorite podcast app: https://a16z.simplecast.com/
Follow our host: https://x.com/eriktorenberg
Please note that the content here is for informational purposes only; should NOT be taken as legal, business, tax, or investment advice or be used to evaluate any investment or security; and is not directed at any investors or potential investors in any a16z fund. a16z and its affiliates may maintain investments in the companies discussed. For more details please see a16z.com/disclosures.
Blockchain architecture is constantly being forced to adapt to new technologies, as well as to meet new demands from users and builders. While the idea of apps building their own chains was first explored by Cosmos, it lacked the support and tooling to see it succeed. Later on, rollups also took the centerstage of Ethereum’s scaling roadmap, but due to their general purpose design, it led to a cannibalistic ecosystem. Initia learned from these 2 models and combined the best of both worlds: it built a full-stack framework for a seamless DevEx from the get-go and, more importantly, it designed its tokenomics in order to ensure maximum incentive alignment for its appchains. While the former decision removed the need for each separate chain to reinvent the wheel and risk ending up ‘a jack of all trades, master of none’, the latter ensured that appchains would not extract value away from the L1.
Topics covered in this episode:
Ezaan’s background From building on Terra to Initia How Initia is rewriting the appchain thesis Initia’s enshrined liquidity & vested interest program (VIP) Metrics & Initia’s bet on crypto innovation Solving liquidity fragmentation Delphi’s involvement in Initia Future roadmapEpisode links:
Ezaan Mangalji on X Jose Maria Macedo on X Anil Lulla on X Initia on X Delphi Digital on X Delphi report on InitiaSponsors:
Gnosis: Gnosis builds decentralized infrastructure for the Ethereum ecosystem, since 2015. This year marks the launch of Gnosis Pay— the world's first Decentralized Payment Network. Get started today at - gnosis.io Chorus One: one of the largest node operators worldwide, trusted by 175,000+ accounts across more than 60 networks, Chorus One combines institutional-grade security with the highest yields at - chorus.oneThis episode is hosted by Brian Fabian Crain.
Some people might call Jonathon Keats an artist, but he calls himself an experimental philosopher. His body of work explores the way that human life intersects with political and economic systems. His first major work, in the year 2000, involved sitting in a chair thinking for hours, and then selling his thoughts to patrons at prices calculated on the basis of their income. He once copyrighted his own mind as a sculpture. He created a ringtone based on John Cage’s famous piece, 4’33”, which is four minutes and thirty-three seconds of complete silence. He built a pinhole camera that takes photographic exposures lasting 100 years. In Berkeley, California, he built a temple for the worship of science. Recently, he has been involved in efforts to formalize rights of nature.
Jonathon challenges us to look carefully at the assumptions built into our markets, our democracies and our technologies, and constantly seems to do it in ways that seem abstract at the time, but end up prefiguring political or cultural issues years or decades before they erupt. He’s a wonderful guide to this territory, and to the big questions it involves.
In this conversation Matt and Jonathon discuss the philosophy of timekeeping. They consider the connectedness and the alienation of being on universal atomic time, the promise of alternative systems such as the river clock, and how different notions of timekeeping influence our understanding of democracy and nature.
Jonathon Keats is an experimental philosopher, artist and writer. He is currently a fellow at the Berggruen Institute, a research fellow at the Long Now Foundation, a research associate at the University of Arizona, principal philosopher at Earth Law Center and an artist-in-residence at Hyundai, the SETI Institute and Flux Projects. His most recent book is “You Belong to the Universe: Buckminster Fuller and the Future” (Oxford University Press).
Mentioned:
Alaska RiverTimeIf you have feedback or ideas for future episodes, email us at info@radicalxchange.org.
Host: Matt Prewitt
Guest: Jonathan Keats
Producer: Jack Henderson
Connect with RadicalxChange Foundation:
Website X BlueSky YouTube LinkedIn DiscordToday on the a16z Podcast, we’re sharing Marc Andreessen’s recent appearance on TBPN.
Marc—cofounder and general partner at a16z—joins hosts John Coogan and Jordi Hays for a wide-ranging conversation, recorded live at the a16z’s 2025 LP Conference in Las Vegas.
They cover the rise of AI, the future of open source models, and how tech is transforming every corner of the economy—from education and defense to healthcare and housing.
Marc also shares his thoughts on the evolution of venture capital, the firm’s new branding, and what it takes to build enduring companies in a rapidly changing world.
Resources:
Watch more from TBPN: https://www.tbpn.com/
Find TBPN on X: https://x.com/tbpn
Find Marc on X: https://x.com/pmarca
Stay Updated:
Let us know what you think: https://ratethispodcast.com/a16z
Find a16z on Twitter: https://twitter.com/a16z
Find a16z on LinkedIn: https://www.linkedin.com/company/a16z
Subscribe on your favorite podcast app: https://a16z.simplecast.com/
Follow our host: https://x.com/eriktorenberg
Please note that the content here is for informational purposes only; should NOT be taken as legal, business, tax, or investment advice or be used to evaluate any investment or security; and is not directed at any investors or potential investors in any a16z fund. a16z and its affiliates may maintain investments in the companies discussed. For more details please see a16z.com/disclosures.
American healthcare is in crisis—but what if we could change the system by preventing disease before it starts?
In this episode of the a16z Podcast, general partner Vijay Pande sits down with Dr. Eric Topol, founder and director of the Scripps Research Translational Institute and one of the most cited researchers in medicine, to explore the cutting edge of preventive healthcare and longevity science.
Drawing from his new book Super Agers: An Evidence-Based Path to Longevity, Topol breaks down why understanding the biology of aging—not reversing it—is the key to preventing the “Big Three” age-related diseases: cancer, cardiovascular disease, and neurodegenerative conditions. The conversation spans AI-powered risk prediction, organ clocks, polygenic risk scores, GLP-1s, and the cultural and economic shifts required to move from a “sick care” system to one rooted in precision prevention and extended healthspan.
If you’ve ever wondered how data, personalized medicine, and AI can add seven healthy years to your life—and what it will take to bring those benefits to everyone—this episode is for you.
Resources:
Find Eric on X: https://x.com/erictopol
Find Vijay on X: https://x.com/vijaypande
Stay Updated:
Let us know what you think: https://ratethispodcast.com/a16z
Find a16z on Twitter: https://twitter.com/a16z
Find a16z on LinkedIn: https://www.linkedin.com/company/a16z
Subscribe on your favorite podcast app: https://a16z.simplecast.com/
Follow our host: https://twitter.com/stephsmithio
Please note that the content here is for informational purposes only; should NOT be taken as legal, business, tax, or investment advice or be used to evaluate any investment or security; and is not directed at any investors or potential investors in any a16z fund. a16z and its affiliates may maintain investments in the companies discussed. For more details please see a16z.com/disclosures.
Welcome to the Empeiria’s development update from April 2025
Over the past weeks our team focused on reliability, identity‑centric functionality, and polishing the end‑user experience.
Take a look at some of the key milestones that move our Self‑Sovereign Identity (SSI) stack closer to a public launch — and what they mean for builders and the wider community.
1. Test Infrastructure: From Unit to Full‑Stack ConfidenceTesting is mission‑critical for an identity network, so we invested heavily in new automation.
Core libraries now sit at nearly 100 % unit‑test coverage, giving us early warning when edge‑cases creep in.
On top of that, we built a Docker‑orchestrated end‑to‑end (E2E) framework that spins up the complete stack — blockchain nodes, agents, and auxiliary services — in a disposable network.
Every pull request now runs the same interactions a production system would perform, catching integration bugs before they leave the branch.
2. Linked Resources Module: On‑Chain Proof for Any AssetOur new linked‑resources Cosmos‑SDK module lets a DID owner anchor versioned resources -revocation lists, credential schemas, media, or arbitrary JSON directly on‑chain.
Each upload is signed by the DID controller, timestamped, and assigned a monotonic version so consumers can verify both authenticity and freshness.
This unlocks lightweight, verifiable registries without a separate storage service and paves the way for richer ecosystem integrations.
3. MCP Server: Faster QR Flows & Cloud‑Native DeploymentWe released a brand‑new Model Context Protocol (MCP) Server, now hosted in its own repository at https://github.com/empe-io/mcp-server
The server exposes the complete set of SSI operations through a streamlined API and ships with plug‑and‑play Issuer and Verifier services you can deploy in a single click.
Test API keys and sandbox addresses are pre‑configured in the .env.test.example file, letting developers issue and verify credentials in minutes. A convenient /qr endpoint can also return wallet‑ready QR codes on demand, smoothing agent‑to‑wallet hand‑offs without extra libraries.
Learn more about MCP Empe Server: https://x.com/empe_io/status/1920826190756995091
4. EMPE DID Wallet: Fresh Look, Secure Backups, Biometric LoginThe wallet received its first full design overhaul since alpha.
Users will notice a cleaner layout, clearer credential previews, and snappier navigation on low‑power devices.
Under the hood we introduced an encrypted backup/export option that lets you download all credentials in a single protected file, while a companion seed‑word export secures your DID keys. Restoration stays a one‑tap operation — ideal for device migrations.
We also enabled biometric authentication and broadened deep‑link support for seamless transitions between any on‑device app and the wallet.
5. EMPE Hub: Credential‑Gated Airdrops & FaucetOn the platform side, the Airdrop section of the Empe Hub now issues an eligibility credential that doubles as anti‑sybil protection.
Holding that credential unlocks a new faucet protected by rate‑limits and on‑chain revocation checks, dramatically reducing the risk of bots draining test funds.
The flow showcases how Verifiable Credentials can safeguard token distribution without sacrificing user experience.
Stay tuned for upcoming details about on-chain airdrop!
6. AI Credential Agent Prototype: Conversational Issuance DemoOur prototype conversational agent now begins each session with a quick KYC validation, confirming the user’s identity before any sensitive data is exchanged.
Once verified, the agent gathers only the necessary details about the user’s tax profile and — when the criteria are met the agent issues a compliant credential via the MCP pipeline.
The entire flow happens in a single chat, concluding with a wallet‑ready QR code, and demonstrates how SSI agents can seamlessly combine identity proofing and document issuance while keeping the user in control.
7. Backend & API: Launch‑Ready Clean‑UpFinally, the API layer underwent a spring clean: we removed deprecated endpoints, unified error codes, and tightened request validation. Container hardening, SBOM generation, and stricter CI gates round out the picture, positioning us for external security audits and the forthcoming mainnet launch.
Looking AheadWith confidence in our test coverage, a powerful new on‑chain resource model, and user‑facing tools ready for prime‑time, we are gearing up for performance tuning under load and a full security review.
May will also bring an external developer preview of the wallet SDK — stay tuned and, as always, thank you for building the future of trust with us!
Once live, the Input | Output (IO) led integration will bring full Cardano support to Brave Wallet, including Cardano native assets, as well as send, receive, swap, and signing capabilities- all natively embedded within Brave’s best-in-class browser wallet. This establishes Brave as a key partner to the Cardano community in the age of Voltaire.
San Francisco, May 12th, 2025: Input | Output (IO), the preeminent Web3 blockchain infrastructure and engineering firm, today announced a strategic partnership with Brave Software, the creator of the leading privacy-first browser and integrated multi-chain Brave Wallet. Together, they will integrate Cardano into the Brave Wallet, enabling Cardano blockchain access and token management from within the Brave wallet.
“Our partnership with IO reflects Brave’s commitment to building a Web3 that maximizes interoperation for user choice, while giving them better tools to engage with decentralized ecosystems,” said Brendan Eich, CEO and co-founder of Brave and the Basic Attention Token (BAT). “Integrating Cardano into Brave Wallet not only expands multi-chain access, but also enhances security, governance participation, and the overall user experience.”
Through this integration, Brave users and the broader Cardano community will gain direct access to Cardano’s blockchain for activities such as governance participation and native asset management, all within the privacy-focused Brave Wallet. Additionally, Brave Wallet will support the execution of swaps with Cardano native tokens and other on-chain transactions. This major milestone enhances Brave’s multi-chain capabilities, adding to its existing support for networks like Ethereum and Solana. Cardano users will now be able to manage native assets like NIGHT, engage in governance, and seamlessly swap tokens—securely and privately—through Brave’s in-browser wallet.
“This collaboration with Brave is a natural fit,” said Charles Hoskinson, CEO of IO. “We share a vision for a more secure, accessible, and user-respecting Web3. By bringing Cardano into Brave Wallet, we are not only expanding functionality for Cardano users in the age of on-chain governance, but also advancing a new standard for how blockchain networks should empower individuals—protecting privacy while enabling active, on-chain participation.”
The partnership also sets the stage for future innovation around engagement with Cardano’s governance and Midnight, a blockchain developed by Shielded Technologies, an Input | Output spinout focused on confidential smart contracts and data protection.
About Input | Output (IO)Input | Output (IO) is a world-leading blockchain infrastructure and research engineering firm dedicated to building a sustainable Web3 ecosystem. IO is committed to advancing the next generation of blockchain innovation, focusing on scalability, security, and real-world adoption through pioneering research and cutting-edge engineering.
About Brave Wallet and BraveBrave Wallet is the secure, multi-chain crypto wallet built directly into the Brave privacy browser—no extensions required. With Brave Wallet, users can manage tokens and NFTs; connect to DApps and onramp to Web3; and explore decentralized finance, social media, gaming, and more. Brave Wallet users can connect other “cold” wallets like Ledger & Trezor. They can buy, store, send, and connect to DApps on Solana, Ethereum and EVM chains, Zcash, and Filecoin.
Brave Wallet is available on desktop, Android, and iOS, and is free to use. To get started on desktop, Brave browser users can click the wallet icon near the address bar. On mobile, users can tap “⋮” (Android) or “…” (iOS), then tap the wallet icon.
Brave is a driving force leading the way for Web3 adoption, directly supporting Web3 into the broader Web through its privacy browser, independent search engine, and browser-native, multi-chain crypto wallet. Brave currently has over 85 million monthly active users. Learn more at brave.com.
As society evolves, so do its values and principles, but is that desirable for technology that seeks to build the most reliable, trustless and censorship resistant global settlement layer? Ever since the rise in popularity of Solana with its inflow of retail capital in a memecoin gold rush, Ethereum became even more criticized for sticking true to its core values despite the completely divergent demands of market participants. Moreover, the rollup centric scaling roadmap seemed to further silo attention and cause liquidity fragmentation, driving away value from Ethereum mainnet. As institutional demand is expected to grow with the introduction of staking ETFs, a new executive leadership took charge of Ethereum foundation to help steer the protocol’s narrative at the intersection between community demands and Ethereum’s ethos.
Topics covered in this episode:
Hsiao-Wei’s & Tomasz’ backgrounds How they became co-executive directors of Ethereum Foundation Ethereum Foundation’s role moving forward Decision making in Ethereum Foundation Shaping Ethereum’s narrative The layer 2 landscape Scaling Ethereum as the global settlement layer Sharding Rollup scalability & their trade-offs What values drive adoption L2 interoperability Future goalsEpisode links:
Hsiao-Wei Wang on X Tomasz Stanczak on X Ethereum Foundation on X Ethereum on XSponsors:
Gnosis: Gnosis builds decentralized infrastructure for the Ethereum ecosystem, since 2015. This year marks the launch of Gnosis Pay— the world's first Decentralized Payment Network. Get started today at - gnosis.io Chorus One: one of the largest node operators worldwide, trusted by 175,000+ accounts across more than 60 networks, Chorus One combines institutional-grade security with the highest yields at - chorus.oneThis episode is hosted by Friederike Ernst.
BlueYard backs founders building fabric layer technologies that will underpin a world yet to come. The world feels full of potential — yet completely off its axis. The band of possible outcomes has widened, and the margin for error is deadly sharp. Within this context, we invest in pivotal technologies such as breakthroughs in computation, engineering, crypto and biology. We are a small and equal partnership based in the US and Europe, founded in 2016, managing $500M in AuM, and deploying our third fund. BlueYard invests $500K — $5M in pre‑seed to Series A rounds as a lead or co‑lead investor.
We are excited to expand our team with a Head of Communications / PR (full-time or part-time) to lead and evolve BlueYard’s communications strategy for our portfolio companies and BlueYard itself. The ideal candidate will be a strategic storyteller who can elevate BlueYard’s voice in the venture capital world while empowering our portfolio companies to shape, communicate, and amplify their key narratives. This person will be responsible for developing and executing an integrated communications and public relations strategy that enhances our brand, strengthens media relationships, and supports the growth of the BlueYard ecosystem. All while staying true to BlueYard’s authentic and genuine style. We are open to starting the relationship in a part-time capacity and evolving to full-time as appropriate.
The role includes:
Owning and developing BlueYard’s communications & public relations strategy, working closely with key stakeholders to position the firm more publicly Cultivating strong relationships with top-tier journalists, media outlets, and influencers across multiple regions to ensure consistent, strategic coverage of BlueYard’s portfolio and people. Ensuring that BlueYard’s values, mission, and vision are consistently reflected across all communications Providing hands-on PR support to portfolio companies in press releases, media outreach, speaking engagements, and thought leadership content. Support portfolio founders in the development of compelling narratives that resonate with target audiences while maintaining their authentic voices. Collaborating with BlueYard’s Head of Platform on building and managing engaging events for founders, LPs, and our broader network Leading communications campaigns around major events, funding rounds, and key announcements within the portfolio.Here’s what we’d like you to bring to the table:
Proven experience in communications or public relations, ideally within the venture capital or startup ecosystem. Ability to craft and tell compelling stories that resonate with different audiences, from investors to founders to the general public. Self-(fire)starters — be able to run on your own, identify opportunities, and prioritize without much guidance Strong interpersonal skills — happy to work extensively within the team and with entrepreneurs Native English language skills, both written and oral Strong media relationships with a proven track record of securing top-tier coverage for clients or companies. Deep understanding of the startup ecosystem, technology trends, and the challenges faced by early-stage companies. Excellent writing, editing, and verbal communication skills. Experience working remotely and across multiple time zones. Strong project management skills with the ability to juggle multiple initiatives and work collaboratively across teams.If you are interested in the position, please send the following to team@blueyard.com:
Your CV A collection of links that best characterize your online presenceOur process will then be as follows:
After the initial screening, we will invite selected candidates for a video interview We will then invite a limited group of candidates for in-person interviews with both the team and our entrepreneurs A decision will be made shortly thereafterAs AI agents increasingly mediate financial transactions, healthcare decisions, and supply chain operations, a $7T verification fraud crisis looms — a figure highlighted by Anthony Scaramucci at ADFW 2024. With 85% of enterprises citing data provenance as their top AI adoption barrier, Empe L1 blockchain and Model Context Protocol (MCP) emerge as Web3’s answer to trusted AI interactions.
Why Trust Matters? AI agents become increasingly autonomous and influential without tools to verify and trust. Traditional systems waste $7T annually on verification costs. 62% of executives distrust AI decisions due to unverifiable data sources. Deepfakes and phishing scams cost businesses $12B+ yearly, demanding cryptographic proof of authenticity. MCP Empe Server: AI Trust SolutionMCP Servers are systems that provide context, tools, and prompts to AI clients. They expose data sources like files, documents, databases, and APIs to make them accessible to AI systems.
Empeiria drops the world’s first MCP Web3 Trust Layer — scalable, private and future-proof. A new era for AI Agents.
MCP (Model Context Protocol) Empe Server provides tools for interacting with Empe’s infrastructure for Self-Sovereign Identity operations.
Key Benefits Scalability: Built to handle the growing ecosystem of AI agents. Privacy: Ensures data integrity while maintaining user privacy. Future-proof: Designed with evolving AI and blockchain technologies in mind. How to Test?Option 1️⃣ — Participate in the MCP Empe Server Test Environment
Example Issuer and Verifier services have been created on the one-click deployment platform for testing purposes: http://oneclick.empe.io
API keys and addresses can be found in the documentation: http://github.com/empe-io/mcp-servers
Option 2️⃣ — Deploy your own MCP Empe Server
1. Sign up: http://oneclick.empe.io
2. Create Discord ticket to claim deployment credits: http://discord.com/invite/BbCzfuJzkv
3. Follow the platform instructions to deploy the required services
4. Note the configuration details provided after deployment
Join the Trust RevolutionFollow @EMPE_io for updates, join Empeiria’s Discord community, and get ready to build the future of trusted AI.
Sequoia convened builders and researchers in AI for another packed day of conversations, talks and demos.
By Team Sequoia Published May 8, 2025On May 2, we hosted our third AI Ascent event in San Francisco, bringing together more than 100 leading founders and researchers in AI to engage with what partner Pat Grady calls, the “tremendous sucking sound in the market” for AI, and his advice to “go at maximum velocity, all of the time.” Partner Sonya Huang talked about the improved retention rate of generative AI applications and pronounced that coding had reached “screaming product-market fit.” And partner Konstantine Buhler looked ahead to how the agent economy will transform how we work, and laid out the technologies we need to get there.
Over the course of the day we talked with AI leaders including Sam Altman of OpenAI, Jensen Huang and Jim Fan of Nvidia, Jeff Dean of Google, Mike Krieger of Anthropic, Bret Taylor of Sierra and many more. The talks ranged from new business models for AI agents, the race to build data centers, the power of vertical applications and the importance of open source.
Below is a selection of videos from the event (some sessions were off the record).
Videos from AI Ascent 2025 Previous Video Next VideoYou can also watch the videos on the AI Ascent 2025 YouTube playlist.
Share Share this on Facebook Share this on Twitter Share this on LinkedIn Share this via email Related Topics #AI Generative AI’s Act o1 by Sonya Huang, Pat Grady, and o1 Perspective Read The Always-On Economy By Konstantine Buhler Perspective Read Steel, Servers and Power: What it Takes to Win the Next Phase of AI By David Cahn Perspective Read AI Ascent 2024 Video highlights from our AI conference. Perspective Read JOIN OUR MAILING LIST Get the best stories from the Sequoia community. Email address Leave this field empty if you’re human:The post AI Ascent 2025 appeared first on Sequoia Capital.