Protocol Village: IoTeX Blockchain to Integrate With Solana for ‘IoT-Connected Projects’
Oct. 26: IoTeX, a blockchain compatible with Ethereum’s Ethereum Virtual Machine (EVM) standard, announced its integration with Solana, “providing real time analytics on Solana-connected hardware devices,” according to a message from the team. “The integration with Solana enables verifiable off-chain data via IoT-connected projects built on Solana like Helium, Render and Hivemapper, into its transparent data analytics platform. By bringing Solana into the IoTeX platform, any Solana-connected project and related devices will now be visible on DePINscan, a visibility platform that empowers investors and decision-makers with public data on DePIN projects.” $SOL
Protocol Village is a regular feature of The Protocol, our weekly newsletter exploring the tech behind crypto, one block at a time. Sign up here to get it in your inbox every Wednesday. Project teams can submit updates here. For previous versions of Protocol Village, please go here.
Chainstack Lauches DeFi API for Real-Time Data
Oct. 26: Chainstack, a leading Web3 infrastructure provider, announces the launch of the DeFi API, its “solution to streamline access to real-time decentralized finance data,” according to a message from the team. “Chainstack’s DeFi API enables seamless access to real-time data from every major decentralized finance protocol, including Uniswap, Lido, Avee, Compound, PancakeSwap, SushiSwap and many others. The DeFi API eliminates the need for developers to write custom indexers, manage databases, pay for archival node requests, or handle chain reorganizations. Instead, developers can access a simple, ready-to-use API through GraphQL.” $UNI $SUSHI $LDO $COMP $CAKE
Hacken Says Crypto Hacks Doubled in Q3 to $720M
Oct. 26: The blockchain security firm Hacken released a report showing that the crypto sector witnessed 117 security breaches, causing losses of $720 million during the third quarter. That compares with 131 hacks for losses of $327 million during the second quarter. According to a message from the team: “Access control attacks were the most damaging, while rug pulls were the most frequent. Over 90% of the breaches involved projects without verified audits. In two more cases, exploited files were out of audit scope. Hacken’s report exposes ‘token factories,’ calls out flawed audits, and urges renewed vigilance.”
Edited by Bradley Keoun.