Feel the Blockchain waves in the entertainment industry

Feel the Blockchain waves in the entertainment industry

Fidelity goes into crypto, Blockchain in the adult industry, How to earn $120,000 on crypto, Thailand wants to trial CBDC, Blockchain in Russian filmmaking industry

  • Fidelity, a household name in American investing, is planning its move in cryptocurrency trading.
  • Now nobody is surprised about the rise of blockchain in the adult industry, while PornHub may have only gotten into the crypto game in April, cryptocurrency has played an important role in the adult entertainment and sex work industries for quite a long time.
  • Guido Vranken, a software security auditor from the Netherlands, has earned $120,000 in just one week of hunting for bugs on the EOS code reporting 12 vulnerabilities, for $10,000 each.
  • The long-awaited launch of EOS’ mainnet has been further delayed after a Block Producer’s (BP) vote held on June 6th.
  • Blockchain platform Maecenas has announced that it will hold the 'world’s first cryptocurrency art auction' and its first lot will become a fractional ownership of Andy Warhol’s 14 Small Electric Chairs – worth $5.6 mln.
  • Thailand is on track to trial a wholesale central bank digital currency (CBDC).
  • Russian filmmaker Fyodor Bondarchuk plans to launch Cinemico blockchain platform and Russian actor and director Konstantin Khabensky announced the release of the Cinematix blockchain platform, both designed for raising funds for film production.


0.01067 USD 4.24%
0.00000122 BTC -2.40%
Volume, 24h
4,743,770 USD
169,907,756 USD

Related news

Wars of Cutieland: deciding the fate of the blockchain world

Blockchain Cuties Universe has declared that they have created a real universe with different types of lands placed on the giant geographical map. Up until now, the idea of Cutieland was more avant-garde, supported by adorable characters, all of which were shaped like real and fantasy creatures. The upcoming update promises a whole new point of view where Cutieland is transformed into a fully developed and functioning world, complete with continents, forests, mountains, rivers, and oceans. Players can immerse themselves in a highly interactive world, taking control of the lands and their natural resources. Vladimir Tomko, CEO at Blockchain Cuties Universe, assured: “Our players will soon be the first to explore the biggest world built in any blockchain game yet”.Wars with 3D elementsBlockchain Cuties Universe is the first multi-blockchain game which has implemented Ethereum, EOS and TRON blockchains while having NEO on the way. These aforementioned blockchains are also represented in the game as 4 major playable factions (kingdoms). Players will have the choice of siding with one of them and helping it to obtain economic and military dominance. Users will be able to gather resources and armies, unite into clans, wage wars against opposite factions or even individual foes from their own kingdom. Those who wage wars will have an opportunity to become the Ruler of Cutieland. What do these impossibly cute characters fight for, you may ask? Well, the answer is rich lands with natural resources and a considerable amount of power to influence the history of Cutieland or even blockchain gaming itself! Nobody said it’s going to be easy, especially when the amount of things each Cutie can do in the game increases so drastically. Cuties are capable of many things like spying on their neighbors, scouting the area and gathering vital information in order to secure their victories. This update is going to be purely concentrated on strategic elements which blockchain gaming has never seen before.Technology tree is new to blockchain gamingIn order to start conquering Cutieland and fight for their favourite factions, players will have to get a piece of land for their hometowns. Hometowns, or “player Capitals” can be placed either on various scattered islands or close to the faction Capitals (also known as Founder Lands, which are available in limited quantities). While building and developing their hometowns, players will have to advance through “technology tree”, researching new buildings, rare resource deposits, units, upgrades and even ages. Besides hometowns, players will be able to build new cities, forts, walls, watchtowers, etc. And what’s more important, all this, except hometowns will be available for conquest and destruction.LandsBig Islands: Big islands are the larger land masses tied together in long archipelagos located in the Northeast, Southeast, Southwest and Northwest points of Cutieland. These islands are usually abundant with natural resources and are big enough for a large city.Medium Islands: Medium islands are the lands located in the long archipelagos on the far reaches of the world. These islands are big enough to host players’ cities and are usually rich with natural resources.Small Islands: Small isles are the land pieces that can be found in Cutieland’s oceans, especially within the long archipelagos that formed in the Northeast, Southeast, Southwest and Northwest parts of the world. They are suitable for player’s settlements but are usually not as rich in natural resources.New RolesImmortalize your political decisions on blockchain. From now on Cuties have legitimate power in the game. Players are invited to join free elections on blockchain. Simultaneously in Cutieland, there could be a maximum of 4 Kings (same as the number of blockchains/factions existing in the game). It’s also well-known that every wise Ruler should have capable generals to keep his enemies at bay, effective governors to keep his settlements growing and experienced scouts to check on his enemies. So, meet the new noble unique Cutie performers! These Cuties start at level 1 and are available in the game immediately as unique Cuties. When the Wars of Cutieland update rolls out, they will automatically inherit special skills and abilities to wear particular items that affect troops or cities under their command. Let’s take a closer look at these new professionals from this new and exciting update:GeneralsThey are experienced strategists and warriors that lead the armies of Cutieland into battle.Air Force General — seasoned and decorated commander with 15 years of service in the Ethereum’s headquarters. This bear doesn’t do anything himself, people obey his command and are ready to do anything for him.Medieval King — he was once the wise king of a medieval city-state located in the lands of EOS. After a recent massive battle with armies of TRON, his army and kingdom were lost. As a true medieval ruler, this Cutie is a powerful warrior that prefers to lead his troops into battles personally.Space Commander — this Cutie is an experienced space Captain that has over 54 successful engagements and more than a dozen of different decorations, including a Medal of Honor. He’s been commanding a marine company for the last ten years where he developed an extraordinary expertise in hit and run tactics and landing party missions.GovernorsThey are particularly good at efficient management of complex social systems like towns and cities. They bring economic growth to the city they are stationed at.Han Dynasty Official — this Cutie is extremely skilled in politics, manipulation and palace intrigues. He can manage affairs not only of a large city but of the whole factions as well.Nigerian Prince — incredibly intelligent and extremely powerful creature, he knows the ins and outs of politics. During his youth, he used to deceive rich people using different correspondence schemes.Scouts:They are required for every player as they provide vital information. They explore the nearby surroundings, scout for enemy troops and settlements. Scouts can construct watchtowers in a blink of an eye.Jungle Commando — this Cutie scout received its training in Ethereum Army Special Forces and participated in 3 different conflicts across the Cutieland since then. He always works alone and has an incredible skill set to spy on its enemies.Players who plan to gather armies and wage wars against each other need to choose their heroes wisely in order to have an army to be proud of.New economyFrom now on players are able to join one of the four warring blockchain factions to become a leader of a clan and lay claim to the faction’s throne! Establish and develop their city in order to discover, gather and trade its resources. Find brave heroes to fend off foes’ attacks. Explore the revamped Cutieland and get obsessed with furthering all of little Cuties.https://medium.com/media/3c851dac986ab6dbb2d1aaa91205a8eb/hrefWars of Cutieland: deciding the fate of the blockchain world was originally published in Hacker Noon on Medium, where people are continuing the conversation by highlighting and responding to this story.

Yes! You can Hack a Blockchain!

Blockchains might be immutable, but they are not unhackable! Why is this? Human beings! For as long as human beings write and code blockchains, they are hackable. While the code might be up to par, the same can’t be said about all human beings, for in the end, as Russian playwright, Anton Chekhov once wrote that “You must trust and believe in people, or life becomes impossible.”While trust is essential to people’s interpersonal relationships, the possibility of abusing this trust is always present. Thus, as former President, Ronald Reagan said, we must “trust but verify.” When examining the world of hackers and those who have been hacked, it is my opinion that the reason most hackers can hack, and individuals can be hacked begins with the realm of “trust.” Thus, trusting in the immutablity and safety of the blockchain are two different things. It is my belief that eventually, the blockchain in terms of hacking will be no different then any other hackable entity.According to Kaspersky Lab’s in Q1 of 2018;Kaspersky Lab solutions blocked 796,806,112 attacks launched from online resources located in 194 countries across the globe.282,807,433 unique URLs were recognized as malicious by Web Anti-Virus components.Attempted infections by malware designed to steal money via online access to bank accounts were logged on the computers of 204,448 users.Ransomware attacks were registered on the computers of 179,934 unique users.Our File Anti-Virus logged 187,597,494 unique malicious and potentially unwanted objects.Kaspersky Lab products for mobile devices detected:1,322,578 malicious installation packages18,912 installation packages for mobile banking Trojans8,787 installation packages for mobile ransomware TrojansIn this article, I will examine the psychology of “trust” but not “verifying” on the side of the person who has been hacked. It is my contention that there are 4 main reasons that a person is open to being hacked.Reasons people are hacked:They trust too muchAccording to Statista, 262.68 million computers were shipped in 2017 with another 259.39 in 2018. Furthermore, there are approximately 2 billion computers in use around the world, and these computers are bought by millions of people who just want to plug their computers into the outlet and start working on them. From my own experience, I have noticed that most people come into stores like Best Buy and have no idea what they are looking for or even what a computer can do. This is also true when people emotionally buy on Amazon without first figuring out what they want or need. Once plugged in, these same individuals trust that whatever they purchased is up to date and thereby they aren’t aware of the hacker atmosphere that is all around them, both within programs they download and online as evidenced above. The combination of trusting in what the “salesman” told them and being guided by their inner cognitive trust in what they have been told is a recipe for computer disaster.The Psychologist, Eric Erickson in his 8 stages of development wrote that trust is part of our psyches from the time of infancy and this continues with us during our adult lives as well. Thus, we trust in what we are being told, thereby opening ourselves to being deceived. Without doubt, our trusting nature is a large reason for hackers being so successful in attacking our personal information and online lives.They don’t verifyIt is easy to verify information that one receives, yet all too many people don’t do it. We receive emails that look legitimate and we open them, we receive phone calls from the “IRS” and think they are real, and through these methods and many more, identities are stolen, and financial loss is close to follow. Once again, it is our trust that gets in the way of our safety. There are numerous online tools that can help a person verify the information they are receiving is real and legitimate. However, we trust our computers to do this for us, often without even knowing if we have a program that can remotely offer us assistance.I believe that in this specific case, Blockchain Technology can offer solutions. For it would allow individuals to build identity profiles that are verifiable and immutable. Presently, there are companies such as Evemym out of Utah City and the Illinois Blockchain Initiative that are already working within the field of blockchain identification. Undoubtedly, this trend will continue, however the outcome of these projects will not come to fruition or help against hacking until the individual user starts to verify the information that they receive. It is beyond my comprehension how individuals can spend time making sure a supermarket coupon is still in date, but they can’t check if their own personal security is up to date.Lack of KnowledgeAccording to McAfee and the Center for Strategic and International Studies (CSIS) the likely annual cost to the global economy from cybercrime is $445 billion a year. A large part of that is due to a lack of education when it comes to hacking, cybercrime and identity theft. There is a quote about education that says, “education is not preparation for life, education is life.” (John Dewey) If this is true, and I believe it is, the average computer user is not “living” well, rather they are “living on the edge” of being hacked. Computer education is available at the fingertips of millions through the internet, however all too many people don’t take advantage of this. Thus, instead of using this information to protect themselves, they are opening themselves to being hacked. Once again, it boils down to trusting their environment instead of educating themselves.LazinessThe fourth reason why people leave themselves open to being hacked is pure laziness. It is much more interesting to play a game on the computer, watch Netflix or just surf the net, then it is to take time out and learn a new skill. Society has become one where reality television has drawn us into living in a false reality. Thus, the problems of the world and its answers lay within the boundaries of our screens. It takes much less energy to watch the Real Housewives of Atlanta then it does to ensure that one’s own life is safe and protected. There is a French Saying, “Lazy people are always eager to be doing something,” the only problem is that “something” is nothing. This “nothingness” allows hackers to enter an individual’s domain without people even realizing it. Why? Because they are to lazy to care. For they trust that someone else will take care of the problem for them. Often, those who are lazy trusted the computer out of the box and never thought about it again, and thus are often the victims of hackers.RandomnessWhile, it is my contention that human behavior plays a large part in hacking, we must admit that there is also a randomness to being hacked as well. For there are times, when a person has taken all the steps to protect themselves and they are just bystanders in a larger hack. For example, their passwords are stolen on a e-commerce website or a vendor that they have done business with is hacked and they become a third party to that hack. 0Days, or previously undiscovered flaws can also occur, however these sorts of hacks are not what this article is narrowing in on, for issues like those are beyond a persons individual control while the 4 categories above can be fixed through education. Once this occurs, a significant amount of human cause and effect within the hacking hemisphere will disappear.ConclusionThe above explanations of why people are hacked, is true not only in the private realm. For these same people work in businesses and industries, and when they are lazy with their own security, they are even more so when they are working for someone else. In the end, cyber security companies must learn the psychology of the human being, if they ever want to truly defeat the hackers of the world. For without understanding the human psyche, any security program or “immutable” blockchain, will always be missing a key component in its arsenal of defense.https://medium.com/media/3c851dac986ab6dbb2d1aaa91205a8eb/hrefYes! You can Hack a Blockchain! was originally published in Hacker Noon on Medium, where people are continuing the conversation by highlighting and responding to this story.

Hot news

By continuing to browse, you agree to the use of cookies. Read Privacy Policy to know more or withdraw your consent.