Sui, Franklin Templeton synch ecosystem partnership
The asset manager will support builders on Sui and pilot emerging blockchain technologies on the network.
Related Posts


REX Shares, Tuttle launch 2x long, short Microstrategy ETFs
They follow Defiance ETF’s launch of a 1.75x leveraged MSTR ETF in August.

Whale transfers $50M in ETH amid ETF anticipation
With the approval of the spot Ether ETF in the US approaching, attention turns to its potential impact on Ethereum’s trajectory in the coming weeks.

MicroStrategy to raise $1.75B with 0% interest notes to buy Bitcoin
MicroStrategy’s 0% senior convertible note means it will not need to pay regular interest to bondholders.

Crypto short liquidations breach $100M as Bitcoin reclaims $64K
Bitcoin reached its highest price so far in October, surging above $64,000 early on Oct. 14 and liquidating over $52 million from those betting its price would fall.

Bitcoin price unfazed after $150M hack of major exchange KuCoin
In an official statement, KuCoin Global CEO Johnny Lyu confirmed a major hacking attack on Sep. 26. The breach affected the firm’s Bitcoin (BTC), Ether (ETH), and ERC20 hot wallets, after private keys were leaked. Reports estimate the breach to have affected $150 million in user funds.Following the security breach, the price of Bitcoin barely…

WazirX announces INR withdrawals will resume on Aug. 26
The crypto exchange did not provide a timeline on when crypto withdrawals might resume, citing legal issues.

Digital rights management in the open seas of blockchain systems
To understand the complexity of digital rights management, or DRM, one must first understand the DRM challenges of current systems and then the challenges (and opportunities) presented by blockchain technology that prides itself on transparency, data linkage and immutability as some of the main characteristics that lends itself to the trust systems. With Web 2.0, content…

WBTC address poisoner was exposed through ‘digital evidence’ — Match Systems
Experts discovered personal information about the attacker by investigating IP addresses and device data connected to the attack.