HYBE’s Weverse superfan platform is growing – and going big in China

HYBE’s superfan platform Weverse is making significant inroads into China through strategic partnerships with two of the market’s digital giants: Tencent Music Entertainment and Alibaba. These moves mark a pivotal moment in HYBE’s international expansion strategy, as the company confirmed that Weverse reached a record high of 11.6 million monthly active users (MAUs) globally in Q3 2025. This represented 20% year-over-year growth for Weverse, which received an undisclosed investment from Universal Music Group last year.

Last Thursday (November 6), Weverse announced its new collaboration with QQ Music, China’s largest music streaming platform owned by Tencent Music Entertainment. This partnership enables Chinese users to seamlessly access Weverse content and engage with their favorite artists. The tie-up eliminates barriers that previously complicated access for Chinese fans, creating a more integrated and user-friendly experience.

The second part of Weverse’s China expansion is the launch of a flagship Weverse Shop on Tmall, the e-commerce platform operated by digital giant Alibaba, earlier this year. The Tmall Weverse store, launched in June, sells official merchandise and light sticks for 17 Weverse artists. This provides Chinese consumers with authenticated products through one of the country’s most trusted retail channels.

The Tmall venture has already proven successful. In just five months of operation, the Weverse Shop earned Tmall’s “2025 Supernova Brand” award, a recognition given to overseas brands demonstrating strong sales performance, rapid growth, high search volume, and positive customer reviews.

HYBE CEO Jason Jae-sang Lee explained the company’s measured approach to the Chinese market during an earnings call with investors on November 10. The company’s strategy in China minimizes direct investment and operational challenges by leveraging the established infrastructure and user bases of Tencent and Alibaba.

“Rather than putting in our resources directly, we have been utilizing corporate partnerships. And so we have not been trying to maximize profits coming from China, but we understand that there are so many Chinese fans who love and support our artists,” Lee said.

He added, “We decided to partner with QQ Music, the strongest streaming platform in China, as well as Tmall, so that more Chinese fans can engage with our artists more actively. So it was more of a company-to-company partnership. And such partnerships are already receiving very positive responses.”

Lee also revealed that “in addition to the currently available Weverse DM,” HYBE is “discussing additional services to be available on these platforms.” He emphasized, “So in China, we’re not aggressive yet, but we are continuing to look for and implement solutions that can best serve our fans in China.”

Weverse’s expansion into China comes as the platform continues to experience strong growth globally. HYBE CEO Lee attributed the recent uplift in MAUs primarily to BTS members actively returning to the platform following their military service obligations, combined with diverse global activities by artists on Weverse.

China represents a crucial market for HYBE’s expansion ambitions, and the statistics reveal why. China’s two biggest music streaming providers, Tencent Music Entertainment (TME) and NetEase Cloud Music (NCM), accounted for around 171 million paying users combined at the end of 2024. Over 25 million paying music subscribers were added in China in 2024 alone, according to senior industry sources—compared to just 3.2 million added in the USA.

China is also rapidly gaining global market share in music streaming subscription revenues. According to IFPI data, China’s annual streaming subscription revenues surpassed USD $1 billion in 2024, up 18.9% year-over-year. In doing so, China surpassed Germany to become the world’s third-largest music streaming subscription market. MBW has previously predicted that China may leapfrog the world’s second-largest subscription market, the UK, by 2026.

Earlier this year, HYBE officially launched HYBE China, a subsidiary based in Beijing to support artist activities in the country, further underscoring the company’s commitment to strengthening its presence in this vital market.
https://www.musicbusinessworldwide.com/hybes-weverse-superfan-platform-is-growing-and-going-big-in-china/

Tangem Launches Virtual Visa Card for Stablecoin Payments – Is Best Wallet Next?

**Tangem Launches Tangem Pay: A Self-Custodial Virtual Visa Card for Spending USDC**

Cryptocurrency wallet provider Tangem has announced the launch of **Tangem Pay**, a self-custodial virtual Visa card that allows users to spend USDC anywhere. Developed in collaboration with US payment infrastructure company Paera, Tangem Pay will be compatible with millions of merchants worldwide and will directly connect to Tangem’s hardware wallet. Additionally, it will support payments through Apple Pay and Google Pay.

The initial rollout is scheduled for late November in the US, followed by expansions into Latin America, Asia-Pacific, Europe, the Middle East, and Africa.

Tangem has long been committed to delivering a fully self-custodial experience by eliminating shady third parties and cumbersome KYC procedures. However, Tangem Pay will require KYC compliance. The company has stressed that stablecoin infrastructure provider Rain will handle all compliance and settlement aspects of Tangem Pay.

“If a user is sanctioned or engaged in illegal activity, our regulatory partner — not Tangem — can disconnect the payment card from the payment network. Again, no one has access to the Tangem wallet itself, and Tangem Pay’s KYC has no effect on this,” explains Tangem Pay CEO Marcos Nunes.

This development has sparked concerns among users seeking true anonymity, leading to increased interest in alternatives like **Best Wallet**.

### Best Wallet Emerges as a Privacy-Focused Alternative

**Best Wallet** is a new mobile crypto wallet promising **no KYC**, complete self-custody, and an intuitive user experience. It is currently gaining traction thanks to its viral token presale, which invites users to share in its growth.

#### Launching a Crypto Payment Card

Best Wallet is a feature-rich, non-custodial wallet providing users full control over their private keys. Secured with Fireblocks’ MPC technology, this wallet revolutionizes how users interact with cryptocurrencies by offering more than simple storage.

Features include:
– Reduced transaction fees
– Cross-chain swaps
– Exclusive presale access

One of the most anticipated features is the **Best Card** — an everyday crypto shopping card similar to Tangem Pay. Best Card offers a seamless payment experience at merchants worldwide that accept Mastercard. Unlike Tangem Pay, Best Card will support payments in a wide range of cryptocurrencies, not just stablecoins.

Being a multi-chain, multi-wallet app, Best Wallet allows users to transfer assets across top blockchains and between several wallets. Its built-in cross-chain swaps enable smooth conversions between cryptocurrencies without relying on third-party intermediaries such as centralized exchanges.

Most importantly, Best Wallet is fully **No-KYC**, appealing to users who prioritize privacy and the original vision behind self-custody wallets.

With these standout features, Best Wallet aims to capture 40% of the crypto wallet market share by 2026 — a goal that appears well within reach. Interested users are encouraged to learn more in our complete [Best Wallet review].

### Best Wallet Token (EST) Presale Nears $17M: A Potential Crypto Breakout?

As cryptocurrency adoption grows in retail settings, platforms like Tangem Pay and Best Wallet stand to benefit the most. From an investor’s perspective, these projects unlock a broad range of opportunities.

The **EST token**, Best Wallet’s native cryptocurrency, is currently available at early-bird prices during an ongoing presale. EST fuels the Best Wallet ecosystem and unlocks benefits such as:
– Early access to vetted presales
– Reduced fees
– Higher staking rewards
– Voting rights within the ecosystem

Experts predict that EST could climb to $0.072 by the end of this year and potentially reach $0.62 by 2026, driven by organic demand from its growing user base, which already numbers in the hundreds of thousands.

Currently, you can purchase EST for just $0.025905 and earn a staking APY of 78%. For detailed instructions, check out our [How to Buy EST] guide.

**Note:** The next presale price increase is only a few hours away, and the staking APY will decrease as more investors participate. Early joiners can lock in the best deal.

As always, we remind our readers to perform their own research before investing. This is not financial advice.

Stay tuned for more updates on the evolving landscape of crypto wallets and payment solutions.
https://bitcoinist.com/tangem-launches-stablecoin-visa-card-is-best-wallet-token-next/

XRP Analyst Maps $10 Spike, $50 Extreme Wick

**XRP Holds Bullish Structure Despite 15% Weekly Drop, Analyst Eyes $10–$50 Targets**

XRP is trading near $2.24 after a 15% weekly decline, but top crypto analyst Egrag Crypto maintains that the price is still within a bullish structure—as long as $1.94 holds as support.

### Elliott Wave Analysis Points to Significant Upside

Using the Elliott Wave Theory, Egrag Crypto has outlined potential price targets for XRP, projecting a possible “micro wick” spike toward $10 and an extreme “macro wick” toward $50 if the next impulse wave (Wave 3) becomes the cycle’s largest leg. According to his analysis, these bullish targets hinge on XRP staying above the critical $1.94 support zone on high timeframes.

> “As long as XRP remains above $1.94, the bull structure is intact,” Egrag stated. He suggests that XRP might currently be at a level where major investors and institutions are quietly accumulating.

Elliott Wave Theory indicates that if XRP is currently finishing Macro Wave 2, an explosive Wave 3—often 1.6 times the size of Wave 1—could be ahead, forming the basis for these higher potential targets.

### Exchange Spike to $50: Just a Glitch?

Egrag Crypto also references a past incident on the Gemini exchange where XRP briefly spiked to around $50. While he notes it’s possible for history to repeat, he cautions that such sudden surges are typically the result of low liquidity, rather than reflecting XRP’s true market value. Price glitches like these are common during thin trading periods and should be viewed with skepticism.

### XRP Under Pressure, But Institutional Infrastructure Is Growing

XRP has faced significant selling pressure, especially after Bitcoin fell below $110,000 several days ago. As of now, XRP is trading at approximately $2.24—a 1% decrease in the past 24 hours and a notable 15% slide over the past week.

Despite this, there are positive signs beneath the surface. Ripple is making moves to bolster XRP’s institutional appeal:

– **Prime Rollout:** Institutions can now trade XRP directly over-the-counter (OTC), as well as access futures and options contracts based on XRP. This development aims to make Ripple’s technology—and XRP—more accessible for large financial firms, hedge funds, and asset managers.

– **Palisade Acquisition:** Ripple recently acquired Palisade, a digital asset wallet and custody service provider. The acquisition strengthens Ripple’s ability to offer secure services to institutional clients holding substantial amounts of cryptocurrency.

### Ongoing Institutional Activity

Additionally, on-chain data shows that Ripple unlocked 500 million XRP from escrow, a move prompted by recent market weakness, according to Whale Alert.

**Conclusion**

While XRP’s price action remains under pressure in the short term, analysts like Egrag Crypto remain optimistic on the long-term trend, pointing to robust institutional infrastructure developments and bullish chart structures as reasons to watch XRP closely in coming months.
https://bitcoinethereumnews.com/tech/xrp-analyst-maps-10-spike-50-extreme-wick/

A New Frontline: How Digital Identity Fraud Redefines National Security Threats

Identity Verification in the Age of AI: A Growing National Security Concern

“Identity verification is the foundation of virtually all security systems, digital and physical, and AI is making it easier than ever to undermine this process,” Mike Sexton, Senior Policy Advisor for AI & Digital Technology at the national think tank Third Way, tells The Cipher Brief.

“AI makes it easier for attackers to simulate real voices or hack and steal private credentials at unprecedented scale. This is poised to exacerbate the cyberthreats the United States faces broadly, especially civilians, underscoring the danger of Donald Trump’s sweeping job cuts at the Cybersecurity and Infrastructure Security Agency.”

The Trump administration’s proposed Fiscal Year 2026 budget would eliminate 1,083 positions at CISA, reducing staffing by nearly 30 percent—from roughly 3,732 roles to around 2,649.

Save your virtual seat now for The Cyber Initiatives Group Winter Summit on December 10 from 12 p.m. to 3 p.m. ET for more conversations on cyber, AI, and the future of national security.

### The Industrialization of Identity Theft

A recent Constella report, based on analysis of 80 billion breached records from 2016 to 2024, highlights a growing reliance on synthetic identities—fake personas created from both real and fabricated data. Originally limited to financial scams, these identities are now being exploited for far more dangerous purposes, including espionage, infrastructure sabotage, and disinformation campaigns.

State-backed actors and criminal groups increasingly use identity fraud to bypass traditional cybersecurity defenses. In one case, hackers leveraged stolen administrator credentials at an energy sector company to silently monitor internal communications for over a year, mapping both its digital and physical operations.

“In 2024, identity moved further into the crosshairs of cybercriminal operations,” the report states. “From mass-scale infostealer infections to the recycling of decade-old credentials, attackers are industrializing identity compromise with unprecedented efficiency and reach. This year’s data exposes a machine-scale identity threat economy, where automation and near-zero cost tactics turn identities into the enterprise’s most targeted assets.”

Dave Chronister, CEO of Parameter Security and a prominent ethical hacker, links this rise in identity-based threats to broader social changes.

“Many companies operate with teams that have never met face-to-face. This has created an environment where identities are increasingly accepted at face value, and that’s exactly what adversaries are exploiting.”

### When Identities Become Weapons

This threat isn’t hypothetical. In early July, a breach by the China-linked hacking group Volt Typhoon exposed Army National Guard network diagrams and administrative credentials.

U.S. officials confirmed the hackers used stolen credentials and “living off the land” techniques—relying on legitimate administrative tools to avoid detection.

In cybersecurity terms, “living off the land” means attackers don’t bring their own malicious software or tools into a compromised network. Instead, they exploit the legitimate software and functionalities already present within the victim’s systems.

“It’s far more difficult to detect a fake worker or the misuse of legitimate credentials than to flag malware on a network,” Chronister explained.

Unlike traditional identity theft—which hijacks existing identities—synthetic identity fraud creates entirely new ones using a blend of real and fake data, such as Social Security numbers from minors or the deceased. These synthetic identities can be used to obtain official documents, government benefits, or even access secure networks while posing as real people.

“Insider threats, whether fully synthetic or stolen identities, are among the most dangerous types of attacks an organization can face, because they grant adversaries unfettered access to sensitive information and systems,” Chronister said.

Insider threats involve attacks from individuals with legitimate access—whether actual employees or fake identities posing as trusted users—making them harder to detect and often more damaging.

Constella reports that synthetic identities are 20 times harder to detect than traditional fraud. Once established with a digital history, a synthetic identity can appear even more trustworthy than a real person with limited online presence.

“GenAI tools now enable foreign actors to communicate in pitch-perfect English while adopting realistic personas. Deepfake technology makes it possible to create convincing visual identities from just a single photo,” Chronister added.

“When used together, these technologies blur the line between real and fake in ways that legacy security models were never designed to address.”

### Washington Lags Behind

U.S. officials acknowledge that the country remains underprepared.

Multiple recent hearings and reports from the Department of Homeland Security and the House Homeland Security Committee have flagged digital identity as a growing national security vulnerability. This threat is driven by actors such as China, transnational cybercrime groups, and the rise of synthetic identities.

The committee has urged urgent reforms, including mandatory quarterly “identity hygiene” audits for organizations managing critical infrastructure, modernized authentication protocols, and stronger public-private intelligence sharing.

Meanwhile, the Defense Intelligence Agency’s 2025 Global Threat Assessment warns:

> “Advanced technology is also enabling foreign intelligence services to target our personnel and activities in new ways. The rapid pace of innovation will only accelerate in the coming years, continually generating means for our adversaries to threaten U.S. interests.”

An intelligence official, not authorized to speak publicly, told The Cipher Brief that identity manipulation will increasingly serve as a primary attack vector to exploit political divisions, hijack supply chains, or infiltrate democratic processes.

Need a daily dose of reality on national and global security issues? Subscribe to The Cipher Brief’s Nightcap newsletter, delivering expert insights on today’s events right to your inbox. Sign up for free today.

### Private Sector on the Frontline

For now, much of the responsibility falls on private companies—especially those in banking, healthcare, and energy.

According to Constella, nearly one in three breaches last year targeted sectors classified as critical infrastructure.

“It’s never easy to replace a core technology, particularly in critical infrastructure sectors. That’s why these systems often stay in place for many years, if not decades,” said Chronister.

Experts warn that reacting to threats after they’ve occurred is no longer sufficient. Companies must adopt proactive defenses, including constant identity verification, behavioral analytics, and zero-trust models that treat every user as untrusted by default.

However, technical upgrades alone aren’t enough.

Sexton argues the United States needs a national digital identity framework that moves beyond outdated systems like Social Security numbers and weak passwords.

“The adherence to best-in-class identity management solutions is critical. In practice for the private sector, this means relying on trusted third parties like Google, Meta, Apple, and others for identity verification,” he explained.

“For the U.S. government, these are systems like REAL ID, ID.me, and Login.gov. We must also be mindful that heavy reliance on these identity hubs creates concentration risk, making their security a critical national security chokepoint.”

### Building a National Identity Defense

Some progress is underway.

The federal Login.gov platform is expanding its fraud prevention capabilities, with plans to incorporate Mobile Driver’s Licenses and biometric logins by early 2026.

But implementation remains limited in scale, and many agencies still rely on outdated systems that don’t support basic protections like multi-factor authentication.

“I would like to see the U.S. government further develop and scale solutions like Login.gov and ID.me and then interoperate with credit agencies and law enforcement to respond to identity theft in real time,” Sexton said.

“While securing those systems will always be a moving target, users’ data is ultimately safer in the hands of a well-resourced public entity than in those of private firms already struggling to defend their infrastructure.”

John Dwyer, Deputy CTO of Binary Defense and former Head of Research at IBM X-Force, agreed that a unified national system is needed.

“The United States needs a national digital identity framework—but one built with a balance of security, privacy, and interoperability,” Dwyer told The Cipher Brief.

“As threat actors increasingly target digital identities to compromise critical infrastructure, the stakes for getting identity right have never been higher.”

He emphasized that any framework must incorporate multi-factor authentication, phishing resistance, cryptographic proofs, and decentralized systems—not centralized databases.

“Public-private collaboration is crucial: government agencies can serve as trusted identity verification sources (e.g., DMV, passport authorities), while the private sector can drive innovation in delivery and authentication,” Dwyer added.

“A governance board with cross-sector representation should oversee policy and trust models.”

Digital identities are no longer just a privacy concern—they’re weapons, vulnerabilities, and battlegrounds in 21st-century conflicts.

As foreign adversaries grow more sophisticated and U.S. defenses lag behind, the question is no longer if, but how fast America can respond.

Will the United States shift fast enough to keep up?
https://www.thecipherbrief.com/digital-identity-fraud

Super Micro (SMCI) Stock Tumbles as Company Misses Earnings

Super Micro Computer Misses Q1 Estimates But Raises Outlook Amid AI Server Boom

Super Micro Computer (NASDAQ: SMCI) reported disappointing first-quarter results, missing analyst estimates on both earnings and revenue. Shares dropped more than 9% in premarket trading Wednesday following the announcement.

**Quarterly Results Fall Short**
The AI server maker posted earnings of $0.35 per share, falling short of the $0.40 per share expected by analysts. Revenue came in at $5.02 billion—significantly below the projected $6 billion. This miss occurred despite Super Micro issuing preliminary results last month to prepare investors.

Year-over-year, revenue declined 15% from $5.94 billion. Net income plunged by more than half to $168.3 million, or $0.26 per share, compared with $424.3 million in the prior year period.

**Revenue Delay Due to Customer Design Changes**
Super Micro attributed the shortfall to configuration changes requested by a high-volume customer. These design adjustments for GPU racks pushed approximately $1.5 billion in expected first-quarter revenue into the second quarter. CEO Charles Liang explained, “The delays were largely caused by the complexity of these new graphics processing unit racks, which require intricate integration, testing, and validation.”

**Challenges in AI Server Margins**
While Super Micro has benefited from the AI infrastructure boom—bolstered by its partnership with Nvidia and access to the new Blackwell Ultra GPU series—margin concerns remain. J.P. Morgan analysts noted that profit opportunities have lagged behind revenue growth in the AI compute space, with server makers sacrificing margins to secure high-value deals. Susquehanna analysts echoed these concerns, pointing out that deep price discounts to secure GB300 orders and an ongoing pursuit of lower-margin business have strained Super Micro’s financial metrics as competition intensifies.

**Raised Guidance Surprises Wall Street**
Despite the Q1 miss, Super Micro raised its outlook for upcoming periods. The company now expects second-quarter revenue of $10 to $11 billion, above the $7.83 billion analyst consensus. Full-year revenue guidance was also increased to at least $36 billion, up from the previous forecast of $33 billion.

**Stock Performance and Valuation**
Super Micro shares have gained nearly 56% year-to-date. The company currently trades at a price-to-earnings ratio of 16.94, compared to 9.75 for Hewlett Packard Enterprise and 14.11 for Dell Technologies.

**Looking Ahead**
The company’s ability to deliver on its raised guidance will be closely watched, particularly as the competitive and margin pressures in the AI server market remain intense. Super Micro’s partnership with Nvidia and its position at the forefront of next-generation GPU infrastructure leave it well-placed for future growth, but investors are watching to see if profitability can catch up with revenue gains.

*Super Micro Computer issued preliminary earnings about two weeks before this report, warning that quarterly revenue would drop to $5 billion—down from an earlier guidance of $6 to $7 billion. With Q1 numbers now out, attention shifts to execution in the coming quarters and whether Super Micro can balance growth with profitability in a rapidly evolving market.*
https://coincentral.com/super-micro-smci-stock-tumbles-as-company-misses-earnings/

Lummis Says ‘Clarity Act’ Is Biggest US Crypto Bill, 23 Days to $BEST Presale Close

Senator Cynthia Lummis recently highlighted the potential impact of the proposed ‘Clarity Act,’ which could establish the first comprehensive legal framework for cryptocurrencies and stablecoins in the United States. Described as the largest crypto bill ever introduced, Senator Lummis is actively working to secure Democratic support before the end of the year.

The legislative push involves ongoing discussions between senators and industry leaders in Washington, aiming to prevent further delays. If passed, this framework could resolve years of regulatory uncertainty that have hindered wallet innovation and restricted mainstream adoption of crypto technologies.

Retail users stand to benefit significantly from the Clarity Act. Clear regulatory structures and disclosure requirements are essential for creating more compliant onramps and enhancing consumer protections. The bill empowers the SEC and CFTC to serve as supervisors, introducing much-needed authority and expertise into an industry long plagued by ambiguity.

According to Senator Lummis, the goal of the bill is to establish a unified legal system rather than rely on fragmented, piecemeal enforcement. This approach has garnered support from CEOs of major crypto companies, who have engaged in recent meetings with lawmakers to advocate for the legislation.

### Industry Clarity and Wallet Infrastructure

The narrative around industry clarity ties directly into crypto wallet infrastructure. Currently, most wallets are either linked to centralized entities or lack ease of use on mobile devices. However, one non-custodial solution, Best Wallet, appears poised to break this mold.

Best Wallet bridges the gap by offering a non-custodial, multi-chain app equipped with features that many typical wallets overlook. These benefits include access to exclusive crypto presales and reduced trading fees for token holders.

More importantly, Best Wallet is positioned to leverage the momentum of the new U.S. crypto regulations. Through its official token, Best Wallet Token (EST), traders gain entry to a continuously evolving DeFi ecosystem featuring MPC security, support for six major blockchains, a curated presales hub, and much more.

### Best Wallet Token (EST): Powering the Wallet and DeFi Ecosystem of the Future

Best Wallet Token (EST) underpins a mobile-first, non-custodial wallet that supports thousands of assets and cross-chain swaps. Within the app, users can seamlessly buy, hold, and swap assets, with an integrated fiat onramp for ease of access.

The upcoming launch of the Best Card aims to transform wallet balances into everyday spending power, complete with cashback rewards—all accessible through a single, user-friendly interface. This unified experience is crucial, especially if forthcoming U.S. regulations attract many first-time crypto users.

Best Wallet is among the first wallets to integrate Fireblocks’ MPC CMP for enhanced key management. This enables customizable multi-wallet portfolios alongside simplified usability. The app also supports in-app swaps across six major blockchains and includes mobile integration with PancakeSwap, reducing the need to switch between multiple apps.

For users, fewer app “hops” mean fewer approvals and reduced risk of signing malicious transactions. EST stands at the center of this wallet ecosystem, eliminating third-party risks by routing purchases directly through the wallet.

Should the Clarity Act progress and exchange listings become more stringent, the ability to access vetted tokens through a trusted wallet interface will become a key differentiator.

### Security and Roadmap

EST is an Ethereum-based token with a smart contract audited by Coinsult, providing added security assurances. The roadmap features plans for a staking aggregator, browser extension, rewards hub, and gas token-free transactions—all designed to enhance the experience for active day traders.

The project aims to capture 40% of the wallet market by 2026, an ambitious target that aligns with current industry trends.

### Presale Details and Future Potential

With only 23 days left in its presale, Best Wallet Token has already raised over $16.8 million. The current token price stands at approximately $0.0259. Staking rewards are estimated at 78% per annum, though these are dynamic and expected to decrease as more participants stake their tokens.

Interested investors can learn more about purchasing Best Wallet Token [here].

Looking ahead, EST projects a potential price of $0.62 by the end of 2026—a remarkable increase of 2,300% from the current price. For a comprehensive analysis, you can read our EST price prediction.

### Why Consider Best Wallet Token Now?

As the U.S. moves toward clearer crypto regulation and bullish market momentum continues, Best Wallet Token represents a project well-positioned to capitalize on these trends. Notably, large investors are already taking notice: two months ago, one whale purchased over $70,000 worth of EST, and just last week, another acquired $33,000.

The presale is heating up quickly. Don’t miss the opportunity to join the official EST presale before the next price increase.

*Authored by Bogdan Patru, Bitcoinist*

**Disclaimer:** This article is for informational purposes only and does not constitute financial advice. Presales carry inherent risks, and the cryptocurrency market is highly volatile. Please conduct your own research before investing.
https://bitcoinist.com/sen-lummis-calls-clarity-biggest-crypto-act-in-history-best-presale-soars/

BNB Strengthens Above $1,120, Ethereum Targets $4,200, While BlockDAG’s $435M Presale Defines 2025’s Bullish Crypto Trend

Crypto Presales: Ethereum Holds Key Levels, Binance Coin Builds Strength, and BlockDAG’s Near $435M Presale Positions It Among 2025’s Most Bullish Crypto Coins

The 2025 crypto cycle is shifting from hype to evidence-based conviction. Ethereum (ETH) continues to anchor institutional confidence, holding near $3,950 while traders monitor liquidity inflows and potential resistance around $4,200. Binance Coin (BNB) shows disciplined recovery momentum, maintaining strength above $1,120 as its trading outlook improves with renewed market participation.

But the true story redefining the market belongs to BlockDAG (BDAG), a Layer-1 project merging academic precision with real adoption. With nearly $435 million raised, a remaining supply of 4.5 billion coins, and guidance from Dr. Maurice Herlihy, the MIT and Harvard computer scientist known for inventing modern distributed computing principles, BlockDAG is setting a new standard for 2025’s bullish crypto coins.

BNB Holds Steady as Buyers Defend Key Levels

Binance Coin (BNB) continues to show resilience despite global volatility. The asset recovered from an intraday low of $1,079 to retest the $1,151 zone before stabilizing near $1,128, marking a steady gain of 2.4%. The Fear and Greed Index remains at 32, indicating cautious optimism as traders wait for confirmation of a broader reversal.

BNB’s short-term metrics show bullish tendencies. The MACD sits in positive territory, and the RSI is near 54 points indicating balanced accumulation. If BNB sustains a breakout above $1,135, targets at $1,142 and $1,150 could follow. A breakdown below $1,114, however, might invite temporary consolidation.

Market analysts suggest that BNB’s ability to attract liquidity during uncertain periods makes it a reliable base asset for 2025. Its strong ecosystem, consistent usage, and expanding utility within Binance’s infrastructure all contribute to its improving trading outlook.

Ethereum Holds $3,900 Support as Bulls Target $4,200

Ethereum (ETH) remains steady near $3,946, holding critical support around $3,850, a trendline that has supported multiple rebounds since mid-2024. Despite resistance near $4,032 and $4,134, ETH’s structural uptrend remains intact, supported by strong liquidity and balanced futures positioning.

Exchange flow data suggests selling pressure is easing, with moderate inflows signaling potential accumulation by long-term holders. A confirmed breakout above $4,134 could set the stage for a rally toward $4,200, while failure to hold above $3,850 might lead to a retest of the 200-day EMA near $3,576.

Ethereum’s institutional dominance remains a key theme. With ETF inflows climbing and network activity stabilizing, ETH continues to attract capital seeking exposure to a proven smart contract ecosystem. If macro conditions align, ETH could enter a new cycle led by strong fundamental growth and liquidity depth.

Dr. Maurice Herlihy’s MIT Legacy Elevates BlockDAG’s Credibility

Where other projects chase attention, BlockDAG (BDAG) is driven by structure and scholarship. At its core is Dr. Maurice Herlihy, one of the world’s most decorated computer scientists and a Harvard-MIT scholar whose work underpins much of today’s blockchain consensus theory.

His accolades, including the Gödel Prize, Dijkstra Prize, Fulbright Fellowship, Lafferty Award, and IEEE Piore Award, reflect decades of leadership in distributed systems and synchronization theory. These principles directly influence BlockDAG’s hybrid Proof-of-Work (PoW) + Directed Acyclic Graph (DAG) architecture, enabling superior scalability and fault tolerance.

BlockDAG’s performance metrics mirror its credibility. With nearly $435 million raised, 4.5 billion coins still available, and 3.5 million X1 app miners already active before launch, the project is establishing a working ecosystem even before its mainnet release.

Its Batch 32 presale at $0.005 represents one of the final opportunities to participate before listings on major exchanges, rumored to include Coinbase and Kraken. For traders and builders, BlockDAG stands out not just for its scale, but for its academic foundation.

It’s a project where the architecture has been validated by one of the very people who shaped the science behind decentralized systems, giving it a level of credibility few competitors can claim.

Closing Thoughts: Intellect Meets Execution

Ethereum and Binance Coin continue to define structural reliability in the market. ETH’s stable uptrend and BNB’s growing trading activity affirm their place among blue-chip assets heading into 2025.

However, BlockDAG’s fusion of institutional-scale fundraising and academic design creates a distinct category of its own. Guided by an MIT professor whose theories form the backbone of blockchain logic, BDAG isn’t chasing trends; it’s engineering permanence.

With 3.5 million miners, a $0.005 presale, and nearly $435 million raised, BlockDAG has already built what many projects only promise: participation before listing, and proof before speculation.

In the race for bullish crypto coins of 2025, BDAG represents more than momentum; it’s the intersection of intellect, infrastructure, and impact.

Presale Details

Website: [Insert Website Link]

Telegram: [Insert Telegram Link]

Discord: [Insert Discord Link]

This publication is sponsored. Coindoo does not endorse or assume responsibility for the content, accuracy, quality, advertising, products, or any other materials on this page. Readers are encouraged to conduct their own research before engaging in any cryptocurrency-related actions.

Coindoo will not be liable, directly or indirectly, for any damages or losses resulting from the use of or reliance on any content, goods, or services mentioned. Always do your own research.

About the Author

Alex is an experienced financial journalist and cryptocurrency enthusiast. With over 8 years of experience covering the crypto, blockchain, and fintech industries, he is well-versed in the complex and ever-evolving world of digital assets.

His insightful and thought-provoking articles provide readers with a clear picture of the latest developments and trends in the market. His approach allows him to break down complex ideas into accessible and in-depth content. Follow his publications to stay up to date with the most important trends and topics.


Related Stories

[Insert links to related stories]

https://bitcoinethereumnews.com/ethereum/bnb-strengthens-above-1120-ethereum-targets-4200-while-blockdags-435m-presale-defines-2025s-bullish-crypto-trend/

XRP Price in Limbo Despite Grayscale’s Bullish S-1 Amendment

Grayscale Files Amendment No. 2 for XRP Trust ETF as Regulated Demand Returns

Grayscale Investments has renewed its push to bring XRP into the regulated investment space by submitting Amendment No. 2 to its Form S-1 for an XRP Trust ETF with the U.S. Securities and Exchange Commission (SEC) on November 3. This updated filing names Grayscale Investments Sponsors, LLC as the sponsor and Davis Polk & Wardwell LLP as counsel, signaling a serious commitment to align XRP with the same regulated framework already used for Bitcoin and Ethereum.

If approved by the SEC, U.S. investors would gain the ability to access XRP exposure through trusted market structures. Such regulatory endorsement typically enhances market depth and improves two-way liquidity, which can contribute to a more robust trading environment.

XRP Ecosystem Developments Boost Institutional Interest

This filing arrives at a time when the XRP ecosystem is gaining momentum by developing real-world use cases. Ripple’s Swell conference in New York, scheduled for November 12 to 14, is anticipated to showcase key announcements related to tokenization, treasury solutions, and regional settlement initiatives. Grayscale’s timing strategically keeps XRP in the institutional spotlight as these significant updates emerge.

Moreover, corporate projects such as VivoPower’s $5 million XRP-linked initiative in South Korea demonstrate growing enterprise experimentation with the XRP Ledger (XRPL) beyond trading, exploring its potential for payments and asset management. These developments reinforce the narrative of XRP as critical infrastructure, further attracting ETF issuers and institutional participants.

Technical Perspective: Liquidity Zones and Symmetrical Patterns

From a technical standpoint, market analysts monitoring XRP’s intraday price action highlight that liquidity remains a central theme. Recent analysis from Egrag Crypto observes liquidity sweeps and order-block formations within the current trading range. This suggests that institutional players may be targeting liquidity zones above resistance levels before reversing prices lower, a pattern consistent with the Smart Money Concept (SMC). Such liquidity manipulation often precedes significant directional market moves.

Symmetrical 89-Day Cycles Indicate One More Reaction Before Breakout

Egrag’s “As Above, So Below” chart analysis compares two symmetrical 89-day market cycles and reveals repeating price behavior within Fibonacci retracement zones between the 0.618 and 1.414 levels. The current market phase appears to replicate a prior accumulation pattern, with approximately an 80% probability of experiencing a rejection at a critical resistance point before a potential breakout on the fifth touch.

Technical models therefore suggest that XRP will remain range-bound in the near term as it approaches the completion of this structural pattern. Analysts also note that achieving equilibrium between buy-side and sell-side liquidity could set the foundation for a more significant price movement once the pattern resolves.

Conclusion

Grayscale’s Amendment No. 2 filing repositions XRP prominently in the regulated institutional landscape just as the token’s ecosystem gains real-world traction. Combined with technical indicators pointing to imminent market shifts, XRP could be gearing up for notable developments both on the regulatory front and in price action. Investors and market watchers will want to monitor these evolving dynamics closely in the coming weeks.
https://bitcoinethereumnews.com/tech/xrp-price-in-limbo-despite-grayscales-bullish-s-1-amendment/

To write secure code, be less gullible than your AI

Graphite is an AI code review platform that helps you get context on code changes, fix CI failures, and improve your PRs right from your PR page. Connect with Greg on LinkedIn and keep up with Graphite on their Twitter.

### This Week’s Shoutout

This week’s shoutout goes to user **Xeradd**, who won an Investor badge by dropping a bounty on the question [How to specify x64 emulation flag (EC_CODE) for shared memory sections for ARM64 Windows?](https://stackoverflow.com/questions/). If you’re curious about that, we’ll have an answer linked in the show notes.

### Transcript: Conversation with Greg Foster of Graphite on AI and Security in Software Engineering

**Ryan Donovan:** Urban air mobility can transform the way engineers envision transporting people and goods within metropolitan areas. Matt Campbell, guest host of *The Tech Between Us*, and Bob Johnson, principal at Johnson Consulting and Advisory, explore the evolving landscape of electric vertical takeoff and lift aircraft and discuss which initial applications are likely to take flight. Listen from your favorite podcast platform or visit mouser.com/empoweringinnovation.

**Ryan Donovan:** Hello, and welcome to the Stack Overflow Podcast, a place to talk all things software and technology. I’m your host, Ryan Donovan, and today we’re delving into some of the security breaches triggered by AI-generated code. While there’s been a lot of noise around this topic, my guest today argues that the problem isn’t the AI itself, but rather a lack of proper tooling when shipping that code.

My guest is Greg Foster, CTO and co-founder at Graphite. Welcome to the show, Greg.

**Greg Foster:** Thanks for having me, Ryan. Excited to talk about this.

**Ryan Donovan:** Before we dive deep, tell us a bit about your background. How did you get into software and technology?

**Greg Foster:** Happy to share! I’ve been coding for over half my life now. It all started in high school—I was 15 and needed a job, and I figured I could either bag groceries or code iOS apps, so I picked the latter. I went on to college, did internships at Airbnb, working on infrastructure and dev tools teams, helping build their release management software. Interestingly, I was hired as an iOS engineer but immediately shifted to dev tools, which I loved. For the last five years, I’ve been in New York working with friends to create Graphite, continuing my passion for dev tools.

**Ryan Donovan:** Everybody’s talking about AI-powered code generation now—some people doing “vibe coding” where they don’t even touch the code themselves and just say, “build me an app.” Then we see the ensuing security laughs on Twitter. You’re saying the AI isn’t purely the problem?

**Greg Foster:** It’s nuanced. Fundamentally, there’s a shifting landscape of trust and volume. Normally, when you do code reviews, you trust your teammates to some degree. You carefully vet code for bugs and architecture, but you don’t scrutinize every line on security—assuming teammates aren’t malicious. AI changes this because a computer writing code holds no accountability, and you might be the first person ever to lay eyes on it. Moreover, the volume of code changes is skyrocketing. Developers, including juniors, push many small PRs rapidly, which overloads the review process. This creates a bottleneck and trust deficit.

**Ryan Donovan:** Interesting. Our survey from a few months ago found people use AI more but trust it less, which seems natural since AI generates code based on statistical models of previous code.

**Greg Foster:** Yes, and AI can be quite gullible. Take recent hacks like the Amazon NX hack—prompts told the AI to scour user file systems deeply to find secrets. A human engineer would never do that blindly, but AI systems might follow those instructions unquestioningly. It’s a real challenge.

**Ryan Donovan:** So it’s really a lack of real-world context that AI code generators have. The speed and volume of PRs make human review difficult. Naturally, that calls for tooling solutions.

**Greg Foster:** Exactly. Graphite is all about tooling that helps make code review better. One timeless best practice remains: keep code changes small. Research from Google showed that longer pull requests get disproportionately fewer review comments—in fact, engagement drops steeply beyond about 100 lines of code.

We’ve seen the same data at Graphite. People tend to skim or blindly approve massive PRs, so small, manageable PRs—around 100-500 lines—hit a sweet spot for deep review.

But this requires tooling to manage stacked, incremental commits so developers can maintain flow without submitting giant PRs.

**Ryan Donovan:** That’s a key point. Many AI-generated chunks of code are enormous, unrefined, and not necessarily human-friendly. How do you see developers breaking that down and improving readability?

**Greg Foster:** Another concern is losing context. When you write code yourself over hours, you internalize the intricacies of that module or system. With AI-generated code, you often don’t fully absorb or understand the details. This means reviewers must pay extra-close attention.

Overall, fast, blind shipping of code reduces deep understanding and increases risk, especially for security.

**Ryan Donovan:** Copy-pasting from Stack Overflow has long been a source of vulnerabilities. AI seems to intensify that issue.

**Greg Foster:** Exactly. We used to shame copy-pasting, but now AI-generated snippets can propagate security flaws just as easily. Though these AI systems are generally well-intentioned, they create false confidence and lower the bar for attackers who now can craft malicious code with minimal skill.

**Ryan Donovan:** How do you guard not just the code, but the prompts themselves? Can prompts be sanitized or secured?

**Greg Foster:** It’s tough—probably impossible to secure prompts completely. You could try meta-prompting where one AI judges the security of another’s prompt output, but this is a cat-and-mouse game.

In some cases, suspicious prompts could trigger extra user verification steps, like password confirmation or biometric checks.

Also, if prompts come from untrusted users, they should be sandboxed or highly restricted, similar to executing untrusted code.

**Ryan Donovan:** Browsers already sandbox JavaScript and WebAssembly to prevent dangerous abuse.

**Greg Foster:** Indeed. Some AI-powered browsers or extensions have been exploited by injecting invisible prompts to perform malicious actions. This gullibility is something we should expect and prepare for.

At the end of the day, best practices—like minimizing exposure of secrets and being cautious about input—are more important than ever.

**Ryan Donovan:** You mentioned using LLMs themselves as judges for security scanning. How do you ensure those AI judges are trustworthy?

**Greg Foster:** Good question—“Who watches the watchman?”

Major LLMs today are reasonably reliable if well-prompted. If compromised at root, that’s a whole different challenge.

But in day-to-day use, you can trust security tools running LLMs to find real issues. You can measure their effectiveness through true positive and false positive rates. LLMs are actually pretty good at detecting security vulnerabilities in code, sometimes surpassing humans, who grow distracted or fatigued.

**Ryan Donovan:** Is there still a role for traditional static analysis and linting alongside LLM-based tools?

**Greg Foster:** Absolutely. Great security practice is layered. Keep your unit tests, linters, human code review, and add LLM scanning as a powerful augmentation layer.

Think of LLM-based scanners as “super linters” that run quickly and flexibly across many languages without much setup.

But don’t replace deterministic tests and human judgment—they catch problems LLMs can’t.

**Ryan Donovan:** That sounds like a healthy, balanced approach.

**Greg Foster:** For sure. The combination is greater than its parts. For example, LLMs can even help generate missing unit tests, reducing the barrier for engineers to write more tests.

**Ryan Donovan:** Do you worry developers will start outsourcing their security expertise entirely to AI?

**Greg Foster:** Not really. Much of security engineering involves manual processes, audits, policies, and incident response that AI can only assist, not replace.

For example, at Graphite, our security team implements network proxies, audit logging, and SOC2 compliance—all human-driven.

AI can help surface information faster during incidents, or assist with paperwork, but it won’t replace deep human expertise anytime soon.

**Ryan Donovan:** Every new abstraction layer in software adds complexity that engineers need to manage. AI seems to be another one in that lineage.

**Greg Foster:** Exactly. Engineering isn’t about typing lots of code; it’s about problem-solving, decision-making, and communication. AI just changes the tools we use.

Just like 3D printing shifted manufacturing but didn’t replace craftsmen, AI will change software engineering but not eliminate great engineers.

**Ryan Donovan:** We’re entering a new era of productivity and tooling with AI. How do you see AI tooling evolving?

**Greg Foster:** I see three main areas:

1. **Code Generation:** From simple tab completion to complex agent-driven creation that can even submit PRs directly.

2. **Code Review:** LLMs scanning diffs to find bugs, architectural issues, or security risks.

3. **Background Agents:** Autonomous tools that trigger off existing PRs to enhance them—splitting PRs, adding tests, or suggesting improvements proactively.

On the other hand, core infrastructure like CI, builds, and deployments remain largely unchanged.

This evolution highlights the importance of fundamentals—clean, small, incremental code changes, robust testing, rollbacks, and feature flags. Senior engineers who combine these classic best practices with AI tooling get the most value.

**Ryan Donovan:** Wise words. Thanks so much, Greg, for sharing your insights.

**Greg Foster:** Thank you, Ryan. If folks want to learn more about modern code review, stacking code changes, or applying AI in their workflows, check out [graphite.dev](https://graphite.dev) or follow us on Twitter.

**Ryan Donovan:** And that’s a wrap! Remember, good coding and good security both come from solid fundamentals enhanced by smart tools. For questions or feedback on the podcast, reach out at podcast@stackoverflow.com or find me on LinkedIn.

Thanks for listening!

*This transcript has been edited for clarity and readability.*
https://stackoverflow.blog/2025/11/04/to-write-secure-code-be-less-gullible-than-your-ai/

Evergy Selects Kigen To Strengthen Grid Resilience Across Private and Public Networks

**Evergy Selects Kigen’s Secure eSIM OS and eIM to Maximize Grid Reliability with Automated Failover Across Private and Public Networks**

Evergy, one of the largest investor-owned utilities in the Midwest United States serving 1.7 million customers across Kansas and Missouri, has selected Kigen, the global leader in eSIM and iSIM technology, to strengthen grid resiliency.

By adopting Kigen’s secure eSIM OS and eIM solution, Evergy is unifying private LTE and public networks into an automated connectivity layer. This creates a foundation for more reliable operations in the face of severe weather, growing energy demand, and the complexity of distributed energy resources (DERs).

Reliability is central to Evergy’s strategy, alongside affordability and sustainability. As utilities integrate distributed energy resources, advanced metering infrastructure (AMI), and dynamic billing, ensuring uninterrupted connectivity becomes critical.

Severe thunderstorms, storm-related outages, and routine network upgrades can all disrupt real-time telemetry that forms the “heartbeat” of a modern grid. Without automation, managing tens of thousands of IoT devices at scale would create unacceptable risks to both service continuity and cost efficiency.

Evergy’s LTE network already spans 100 sites, supporting thousands of IoT sensors, AMI, and operational technology devices. With an expansion expected to reach tens of thousands of devices, failover between private and public networks must be seamless. Manual approaches cannot keep pace at this scale.

“As we modernize our grids, uninterrupted device data means visibility and preparation against outages from both the fast-changing energy transition and unpredictable severe weather. Taking control of our infrastructure requires network availability, and automation is the foundation on which dynamic billing and AI can build. Kigen eSIMs and the eIM, configured to Evergy’s needs, enable us to set a new benchmark in grid resiliency—what has long been the holy grail of resilient, intelligent grids,” said Bill Franzen, Evergy lead radio engineer.

Kigen’s secure eSIM OS and SGP.32-compliant eIM solution give Evergy the flexibility to manage connectivity dynamically through eSIMs provisioned with multiple operator profiles. Kigen eSIM OS for IoT and consumer devices includes configurable features such as its network rescue and recovery applet, which enables dynamic, automated failover between private LTE and preferred public networks based on business rules.

These operations are centrally managed through Kigen Pulse, allowing control at fleet scale—by geography, asset type, or site—ensuring continuity of operations, reducing lifecycle costs, and supporting broader goals of capital efficiency, safety, and sustainability.

Cybersecurity is paramount in critical infrastructure. Evergy’s deployment relies on the Kigen eIM hosted at its Dublin site, which is fully certified under the GSMA Security Accreditation Scheme for Subscription Management (SAS-SM). This site operates the Kigen eIM solution to the latest GSMA SGP.32 IoT eSIM specification, providing both assurance of compliance and the trusted foundation required for secure, grid-ready operations.

“Building in dynamic automation for scaled failover and recovery, we enable Evergy’s vision to design for improved reliability, resilience, and operational intelligence. As utilities navigate the energy transition, uninterrupted connectivity is the foundation for AI, dynamic billing, and DER integration. With Kigen’s configurable eSIM OS and SGP.32-compliant eIM, utilities can take control of their connectivity and create the intelligent grids the future demands,” said Vincent Korstanje, CEO at Kigen.
https://iotbusinessnews.com/2025/11/03/evergy-selects-kigen-to-strengthen-grid-resilience-across-private-and-public-networks/