Scan with iPhone to joinTestFlight beta
The way to save Ethereum: The community needs to create an organization that's economically aligned with Ethereum and accountable to it. The EF now holds less than 0.1% of all ETH. There is no flow of Ethereum staking or fee revenues to it. If we want to get Ethereum back to winning: - create an organisation with credible funding, minimum $1b as a start. That's very reasonable for an ecosystem with $250b market cap - find a leader who is competent and wants to fight - make it accountable: a board of people who want ETH to go up, and a charter that holds the org accountable to it - fund it permanently: A significant amount of staking revenue needs to go to it. A governance mechanism that can adjust it (also part of accountability). Very hard to imagine now, but I think this is the only way (and it will probably happen, but it might take a long time before it is consensus).
We launched ZERϴ believing users shouldn't pay to transact onchain. We were obsessed with moving onchain mainstream. We still are. But the world didn't need more blockchains - it needs a better way to access them. The fastest path runs through Zerion API that helps 1500+ teams ship onchain products faster. We're winding down ZERϴ to go all-in on our core products.
DO NOT use Telegram in sensitive applications. Telegram does not need to have its message encryption broken for users to be tracked at the network layer. Telegram sends MTProto over unencrypted TCP, exposing auth_key_id - a long-lived identifier tied to the client’s authorisation key. An ISP, hotel WiFi operator, mobile carrier, transit provider, or surveillance system on the network path can see that identifier if they can observe the traffic. It can remain stable across app restarts, IP changes, VPN use, network switches, and location changes. Secret Chats protect message content, but this leak is below that layer. That makes the attack passive. The risk is in retroactive correlation. Think a journalist using Telegram from different networks for months, then joining hotel or corporate WiFi under a real name. That one identity anchor could make old logs searchable for the same auth_key_id. The fix is simple - mandatory transport encryption for all MTProto connections, with no unencrypted fallback. Telegram chose not to do this. Source: @kaepora https://symbolic.software/pdf/gnmx-01.pd…