Messageboard

The latest news from our blog

Bitcoin Exchange Control Plan South Africa

South Africa Planning Bitcoin Exchange Control Regime

It wasn’t that long ago, during the strategic Bitcoin reserve hype, that the South African Reserve Bank saw the asset as mampara money, and compared its importance to holding a reserve of boerwors. South Africans were free to purchase magic internet money from the growing market of local exchanges, and you could hold as much as you like, either custodially or non-custodially. It was the one asset where you could find some kind of “offshore” exposure without being limited by the government. Yes, the market has grown, and South Africa has a higher per capita Bitcoin exposure rate than most

Read More ยป
Parasite pool first blocks

Parasite Pool Preys On Its First Blocks

On April 18, 2026, Parasite Pool achieved something remarkable and now forms part of Bitcoin history and it’s expanding lore. The little mining pool that could has mined its second Bitcoin block in just 14 months of operation. That block, #945,601, arrived approximately 48 days after the pool’s first block in late February 2026. Two blocks might not sound like much. For a home-miner-focused pool with just 52 petahashes per second (PH/s) pointing at itโ€”roughly 0.005% of Bitcoin’s estimated 1-zetahash networkโ€”two blocks is proof of concept, against a considerable odds. Two Lottery Winners. One Pool. A Model That Works. Those

Read More ยป
Fake Ledger App

Fake Ledger App For Mac Steals Millions

In mid-April 2026, a well-crafted scam launched a fake Ledger Live application that made its way onto Apple’s Mac App Store, bypassing the company’s vaunted review process and resulting in nearly $9.5 million in losses from over 50 victims. The scam targeted semi-conscious cryptocurrency usersโ€”people who specifically use self-custody wallets precisely because they don’t trust their custodians. While removing the need for trust in a custodian is indeed an improvement in safety, migrating your trust from banks towards brands like Apple and Ledger has proven to leave you exposed. The attackers didn’t need to breach Ledger’s hardware devices. They needed

Read More ยป
Cookie policy
We use our own and third party cookies to allow us to understand how the site is used and to support our marketing campaigns.