- Back to menuPrices
- Back to menuResearch
- Back to menuConsensus
- Back to menu
- Back to menu
- Back to menu
- Back to menuWebinars & Events
Opinion
Towards a Web3 Without Wallets
For Web3 to go mainstream, wallets should be as invisible to the users as databases are in Web2, says Ben Turtel, of Kazm.

Has the Bear Market Called Crypto's Bluff?
Despite crypto's problems, there is hope in the industry's capacity to enable more creative and democratic kinds of governance, Nathan Schneider writes.

Why I Don’t Feel Bad for HEX Founder Richard Heart’s Victims
Maybe the Securities and Exchange Commission can finally convince Hex and PulseChain devotees that they’ve been cheated.

Crypto Hedge Funds Will Shake Up the Industry: Crypto Long & Short
There are hundreds of them already in crypto, and that’s likely to go up and catalyze the industry.

Bitcoin Venture Capital Is Anything but Boring: Crypto Long & Short
Bitcoin Core's methodical development fuels the idea that “nothing is happening on Bitcoin,” but innovation is actually robust.

Bitcoin Is 'Big Barbie' Energy
Director Greta Gerwig's reimagined and self-empowered Barbie would love Bitcoin, author and influencer Aubrey Strobel writes.

Why MiCA Is Overly Burdensome Regulation for Ukraine's Crypto Industry
As a European Union's candidate member, Ukraine is set to adopt the EU's landmark Markets in Crypto Assets Regulation (MiCA). But the law's requirements may become too strict for the country’s blockchain future, says Ukraine's deputy minister of digital transformation.

How AI, Web3 and Humans Can Work Together to Solve Complex, Global Problems
Fear abounds about AI, but the technology combined with blockchain can serve as an excellent complement to human ingenuity.

DeFi Died and We Didn’t Even Notice
The behavior of Curve founder Michael Egorov is warning to all, and proof that DeFi isn’t really that different from traditional finance.

How DeFi Protocols Are Building More Granular and Extensible Capabilities
The trend towards "micro-primitives" creates protocols that are more extensible, programmable and composable. But it also creates greater vulnerability at a time when protocols are under increasingly hack-attack.
