
How Uniswap's NFT Involvement Could Supercharge The Industry
Uniswap Labs has been moving into the NFT space with the goal of uniting the fragmented industry and improving NFT trading and lending opportunities.

Is It Worth Using AI Generators To Make Your Own NFTs?
With the rise of content-generating AI, it is tempting to use text-to-image AI to mint and sell NFTs, but will they have any value to buyers?

Why Are NFT Lending/Borrowing Apps So Difficult To Build?
NFT lending/borrowing apps are far more difficult to build than DeFi apps, and even the best designs still place great risk on their lenders.

What Are Decentralized Exchanges, And How Do They Work?
The Decentralized Exchange (DEX) was pioneered by Uniswap, and is a major innovation within the crypto industry, thanks to the genius design.

How Crypto 'Rug Pull' Scams Work, And The Warning Signs
The dreaded "rug pull" scam is the bane of crypto's existence, and spotting one can be tricky. However, there are several red flags to watch out for.

How Bored Ape Yacht Club NFT Liquidations Could Impact The Market
An imminent mass-liquidation event is about to hit the Bored Ape Yacht Club NFT ecosystem, and could result in a death spiral for the NFT collection.

Why Some Stablecoins Collapse And How To Tell The Difference
The collapse of UST in May brought down the cryptocurrency market and people's life savings, but unstable stablecoins are not hard to identify.
.jpg?q=50&fit=crop&w=360&h=240&dpr=1.5)
How A Hardware Crypto Wallet Protects Against Hackers
Hardware wallets are tiny bank vaults for cryptocurrency, and are the most secure way to store crypto. But how do they work, and should you use one?

How NFT Royalties Work In The Real World
NFTs are often pitched to artists due to their alleged ability to automate royalty payments, but in reality NFT marketplaces set the royalty policies.

New Dogechain Network Opens Up Smart Contracts To Dogecoin Holders
The launch of Dogechain brings smart contract capabilities to DOGE holders, but is it a legitimate project or just another Dogecoin-themed scam?

Owning A Fractional NFT Is Not Owning An NFT
F-NFTs were created during the NFT bubble to make elite collectibles affordable to retail investors, but owning them is not like owning an NFT.

Why NFTs Are So Misunderstood (And Why That's An Issue)
Overpriced JPEG images are just a tiny niche within NFTs. But, as a whole, they have many world-changing uses, from value-bearing assets to utility tokens.

Renting NFTs Is About To Become A Thing, And It Could Be Game-Changing
A new NFT token standard is in final development that will allow for NFTs to be rented out, opening enormous opportunities for Web3 businesses.

Stablecoin Exchange Curve Finance Hack Explained
Curve Finance's homepage suffered a DNS hijack, redirecting s to a cloned website that stole 605,000 USDC and 6,700 DAI from its victims.

Cryptocurrency Mining Vs. Staking: What's The Difference?
Blockchains use different designs for processing transactions, the two most common being mining and staking. But what do these mean?

Possible Ethereum Blockchain Civil War, Here’s What’s Happening
The Merge is coming, and with it, ETH miners will lose their income. Miners are threatening to "fork" Ethereum to keep the profits rolling in.

What Are Crypto Mixers And Why Sanctioning Them Is The Right Move
Cryptocurrency mixers have long been used to launder stolen crypto. The United States has now sanctioned both the Tornado Cash and Blender mixers.

Blockchain Smart Contracts And How They Are Used, Explained
Smart contracts are blockchain programs that are different from computer programs. Here's how they work, and why they are important for Web3 apps.

Nomad Blockchain Bridge Looted For $190 Million By Crypto s
The Nomad cross-chain bridge was hacked, but the hack was so simple that hundreds of s copied it and looted the rest of the $190M of assets.

Robinhood Crypto's $30M Fine: What You Need To Know
Robinhood Crypto was hit with a $30 million fine by New York's financial regulator for violating anti-money laundering and cybersecurity regulations.