wallet
Securing digital assets against future threats
This content was produced by Insights, the custom content arm of MIT Technology Review. It was not written by MIT Technology Review's editorial staff. AI-enabled fraud and the coming impact of quantum computing are redefining digital-asset security, putting pressure on owners and service providers to act now. Cryptocurrency thieves are getting creative. Taking advantage of the desire to learn more about crypto and banking on the digital assets' reputation as a way to get rich quick, AI-generated video tutorials are touting ways of make money from crypto-trading arbitrage -- purportedly teaching viewers how to create maximal extractable value from trades using smart contracts.
- Information Technology > Security & Privacy (1.00)
- Banking & Finance > Trading (1.00)
Explain First, Trust Later: LLM-Augmented Explanations for Graph-Based Crypto Anomaly Detection
Watson, Adriana, Richards, Grant, Schiff, Daniel
The decentralized finance (DeFi) community has grown rapidly in recent years, pushed forward by cryptocurrency enthusiasts interested in the vast untapped potential of new markets. The surge in popularity of cryptocurrency has ushered in a new era of financial crime. Unfortunately, the novelty of the technology makes the task of catching and prosecuting offenders particularly challenging. Thus, it is necessary to implement automated detection tools related to policies to address the growing criminality in the cryptocurrency realm.
- North America > United States > Indiana > Tippecanoe County > West Lafayette (0.04)
- North America > Canada (0.04)
- Banking & Finance > Trading (1.00)
- Government > Regional Government > North America Government > United States Government (0.93)
- Information Technology > e-Commerce > Financial Technology (1.00)
- Information Technology > Data Science > Data Mining > Anomaly Detection (1.00)
- Information Technology > Artificial Intelligence > Natural Language > Large Language Model (1.00)
- Information Technology > Artificial Intelligence > Machine Learning > Neural Networks > Deep Learning (0.93)
- Asia > China (0.05)
- North America > United States > Texas (0.04)
- Europe > Russia > Central Federal District > Moscow Oblast > Moscow (0.04)
- Media (1.00)
- Leisure & Entertainment > Sports (1.00)
- Banking & Finance (0.99)
- (2 more...)
- Information Technology > Communications > Social Media (0.74)
- Information Technology > Communications > Mobile (0.55)
- Information Technology > Artificial Intelligence > Natural Language > Chatbot (0.47)
The new iPhone feature that could make wallets obsolete
Millions of Apple users can now use their device to replace passports, drivers licenses, state IDs, and credit cards. Breakthroughs, discoveries, and DIY tips sent every weekday. Apple users are one step closer to being able to viably travel around the country with nothing but an iPhone in their pocket. On Wednesday, the company announced "Digital ID," a new feature that lets users store a mobile version of their passport in the Wallet app. Once uploaded, iPhone and Apple Watch users can present their Digital ID to pass through TSA security checkpoints at 250 airports in the US.
- North America > United States > New York (0.05)
- Asia > Middle East > UAE > Dubai Emirate > Dubai (0.05)
- Asia > Japan (0.05)
- Information Technology > Security & Privacy (1.00)
- Information Technology > Communications > Mobile (1.00)
- Information Technology > Artificial Intelligence (1.00)
Melania Trump Used as 'Window-Dressing' in Elaborate Memecoin Fraud, Legal Filing Claims
Melania Trump Used as'Window-Dressing' in Elaborate Memecoin Fraud, Legal Filing Claims The first lady of the United States became a pawn in an intricate memecoin scam that resulted in millions of dollars in losses, crypto investors have alleged. A cryptocurrency promoted in January by US first lady Melania Trump was part of a sophisticated fraud that "leveraged celebrity association and'borrowed fame' to sell legitimacy to unsuspecting investors," a new legal filing has alleged. In April, crypto investors brought a federal class action lawsuit against Benjamin Chow, cofounder of crypto exchange Meteora, and Hayden Davis, cofounder of crypto venture capital firm Kelsier Labs, among other defendants, accusing them of a multimillion-dollar fraud involving a single memecoin, $M3M3. Later, the plaintiffs filed an amended complaint, expanding the allegations to include racketeering activity. They claimed the pair had colluded to rig the market for $LIBRA, a coin promoted by Javier Milei, president of Argentina, which collapsed in value shortly after launch.
- South America > Argentina (0.55)
- North America > United States > Utah (0.05)
- North America > United States > New York (0.05)
- (3 more...)
- Law > Litigation (1.00)
- Government > Regional Government > North America Government > United States Government (1.00)
- Banking & Finance > Trading (1.00)
How to build a streaming setup that fits your home – and your wallet
Upgrade your streaming setup with a new TV, mounts, TV stands, soundbars and backlighting. Upgrading your streaming setup may mean replacing your outdated TV, adding a soundbar so you can actually hear what's going on or finally mounting your TV so you can see it better. No matter what your budget is, we've lined up everything you need to give your streaming setup a facelift. There are options less than 300 all the way up to 2,000. And for those who want the latest and greatest tech, no matter how much it costs, we have options for you, too.
- Information Technology > Artificial Intelligence (0.49)
- Information Technology > Communications > Mobile (0.49)
Coral Protocol: Open Infrastructure Connecting The Internet of Agents
Georgio, Roman J., Forder, Caelum, Deb, Suman, Rahimov, Andri, Carroll, Peter, Gürcan, Önder
Coral Protocol is an open and decentralized collaboration infrastructure that enables communication, coordination, trust and payments for The Internet of Agents. It addresses the growing need for interoperability in a world where organizations are deploying multiple specialized AI agents that must work together across domains and vendors. As a foundational platform for multi-agent AI ecosystems, Coral establishes a common language and coordination framework allowing any agent to participate in complex workflows with others. Its design emphasizes broad compatibility, security, and vendor neutrality, ensuring that agent interactions are efficient and trustworthy. In particular, Coral introduces standardized messaging formats for agent communication, a modular coordination mechanism for orchestrating multi-agent tasks, and secure team formation capabilities for dynamically assembling trusted groups of agents. Together, these innovations position Coral Protocol as a cornerstone of the emerging "Internet of Agents," unlocking new levels of automation, collective intelligence, and business value through open agent collaboration.
- North America > United States > New York > New York County > New York City (0.04)
- North America > United States > Massachusetts > Middlesex County > Cambridge (0.04)
- North America > United States > Maryland > Montgomery County > Gaithersburg (0.04)
- Information Technology > Security & Privacy (1.00)
- Banking & Finance (1.00)
Bittensor Protocol: The Bitcoin in Decentralized Artificial Intelligence? A Critical and Empirical Analysis
This paper investigates whether Bittensor can be considered the Bitcoin of decentralized Artificial Intelligence by directly comparing its tokenomics, decentralization properties, consensus mechanism, and incentive structure against those of Bitcoin. Leveraging on-chain data from all 64 active Bittensor subnets, we first document considerable concentration in both stake and rewards. We further show that rewards are overwhelmingly driven by stake, highlighting a clear misalignment between quality and compensation. As a remedy, we put forward a series of two-pronged protocol-level interventions. For incentive realignment, our proposed solutions include performance-weighted emission split, composite scoring, and a trust-bonus multiplier. As for mitigating security vulnerability due to stake concentration, we propose and empirically validate stake cap at the 88th percentile, which elevates the median coalition size required for a 51-percent attack and remains robust across daily, weekly, and monthly snapshots.
- Information Technology > Security & Privacy (1.00)
- Banking & Finance > Trading (1.00)
The Staircase of Ethics: Probing LLM Value Priorities through Multi-Step Induction to Complex Moral Dilemmas
Wu, Ya, Sheng, Qiang, Wang, Danding, Yang, Guang, Sun, Yifan, Wang, Zhengjia, Bu, Yuyan, Cao, Juan
Ethical decision-making is a critical aspect of human judgment, and the growing use of LLMs in decision-support systems necessitates a rigorous evaluation of their moral reasoning capabilities. However, existing assessments primarily rely on single-step evaluations, failing to capture how models adapt to evolving ethical challenges. Addressing this gap, we introduce the Multi-step Moral Dilemmas (MMDs), the first dataset specifically constructed to evaluate the evolving moral judgments of LLMs across 3,302 five-stage dilemmas. This framework enables a fine-grained, dynamic analysis of how LLMs adjust their moral reasoning across escalating dilemmas. Our evaluation of nine widely used LLMs reveals that their value preferences shift significantly as dilemmas progress, indicating that models recalibrate moral judgments based on scenario complexity. Furthermore, pairwise value comparisons demonstrate that while LLMs often prioritize the value of care, this value can sometimes be superseded by fairness in certain contexts, highlighting the dynamic and context-dependent nature of LLM ethical reasoning. Our findings call for a shift toward dynamic, context-aware evaluation paradigms, paving the way for more human-aligned and value-sensitive development of LLMs.
- North America > United States > New York (0.04)
- North America > Mexico > Mexico City > Mexico City (0.04)
- Europe > United Kingdom > England > Oxfordshire > Oxford (0.04)
- (2 more...)