BTC: Short-Term Holder Cost Basis Distribution Heatmap
- This chart helps to clearly see where short-term holders bought in the most.
- Most STH are underwater, with a tendency to panic sell. This is a typical phase to purge weak hands.
Key support lies around 62-72k. If it holds and shows signs of on-chain accumulation, this could be the foundation for the next recovery. A deeper break will continue the washout.
Closely monitor STH Realized Price ~85k.
In addition, inflation remains persistent (PPI has surged recently), reducing expectations for monetary easing.
BTC's correlation with risk assets (S&P500) remains high → any hawkish signs from the Fed will also pressure prices. #bitcoin #BTC #OnChain
- The oscillator just touched a record low range of ~0–5% after a sharp decline since the peak in 2025
- The range of 0–20% historically often coincides with capitulation / early accumulation phases – where momentum, volume,... weakens significantly, prices test support but also mark the starting point for the next major recovery.
- Currently, the oscillator is at an extremely low level similar to previous cycle lows while the Fear & Greed Index is also deep in Extreme Fear ~10
- The market is in a state of fear + low momentum typical of the washout phase, usually when weak positions are eliminated, laying the groundwork for new momentum
- This is the time to calmly observe on-chain and volume. Low oscillator + Extreme Fear often create the best asymmetric opportunities in the cycle
- The Economic Police and Mobile Police simultaneously appeared at major facilities to seize many related documents.
- Numerous large facilities on Tran Nhan Tong and Cau Giay (Hanoi) unexpectedly rolled down their shutters, temporarily halting transactions from around 15:00.
- Notably, in 2024, net revenue reached over 6,952 billion VND (a surge of 396% compared to 2023).
- Profit is too small: Despite high revenue, net profit after tax in 2024 only reached 49.1 billion VND. Although it has increased tenfold from the previous year, the net profit margin remains extremely low, at only about 0.7%.
- As of early 2026, the company has increased its capital to 400 billion VND.
Cleaning up at Gold to welcome a few businesses to work here together.
The trading volume of ETF funds accounts for 37% of the total trading volume in the US market (the Tape) This is the second highest level in history
- Much higher than the period of 2018–2021 - Higher than the record of 2020, 2019 - Individual and institutional investors are trading very actively through ETFs, especially equity ETFs and #Bitcoin - The current US market is being significantly influenced by ETFs. - We should remember that the previous rise of BTC was due to ETFs and halving. Will this happen again?
🚨 Coinbase Premium Index just flipped to -0.01* – a sign that US demand is slightly recovering after a long negative streak!
Coinbase Premium measures the price difference of BTC on Coinbase vs global exchanges:
- Positive (>0): US/institutional buying heavily → usually leads to an uptrend (US whales accumulating). - Negative (<0): Selling pressure from the US → retail/investor US panic selling or weak demand.
Historically, when the premium flips from negative to positive/near-zero → a relief rally or bottom formation is often observed.
BTC is consolidating around $70K – is this the bottom before a new pump thanks to recovering institutional demand? Or is there still selling pressure?
What do you think? Upcoming pump or continued dump? Drop a comment + chart your opinions!
Onchain Signal #2: Bitcoin: What is the Exchange Whale Ratio saying?
🚨 The BTC Exchange Whale Ratio just spiked to 0.66* – the highest level since early 2026!
Crypto history shows: - When the ratio increases sharply → it often marks a short-term bottom (local bottom) - Peak ratio → signals the start of an uptrend (whales accumulating)
BTC is testing the $69K area – is this the bottom before a new pump? Or are whales still distributing?
What do you think? Further pump or deeper dump? Comment below! 📊🐳
Bitcoin Unrealised Profit/Loss is surging (On-chain signal to watch) This chart tracks Unrealised Profit/Loss — how much profit (or loss) investors are holding on paper without selling.
Right now, unrealised profit is very high, which often means:
- Many holders are sitting on large gains - The market can become more sensitive to pullbacks - Profit-taking risk increases if price loses key support
What I’m watching next
- If unrealised profit stays elevated while price holds → bullish continuation is possible - If it drops sharply with price → likely profit-taking / distribution phase - Not financial advice — just an on-chain perspective. #bitcoin $BTC
This chart illustrates that "the lowest risk is often where people are most afraid" (when the Sharpe Ratio is negative) and vice versa. 💡 In the long term: $BTC is still in a major uptrend structure, but is currently entering a healthy re-accumulation or correction phase.
I stayed up to teach and lost everything $trump For the first time, I dared to bet on future x3. I really didn't expect it, even if it was x2 like usual. I lost everything anyway.
Oasis Network’s Bold Security Challenge: 1 Bitcoin to Anyone Who Can Break the TEE
A live, high-stakes test proving Sapphire’s defense-in-depth architecture in the real world
🚀 A Challenge Like No Other: “If You Hack It, You Keep It.” In the world of Web3, most security programs follow a predictable pattern — report a bug, wait for triage, then maybe earn a reward.
#OasisNetwork decided to do things differently. They launched a radical, open security challenge that flips the traditional bug bounty model upside down:
1 Bitcoin (wBTC) is locked inside a Sapphire smart contract. Whoever can hack it, keeps it. No forms to fill out. No approval process. No private disclosures.
Just one rule: you only win if you break the Trusted Execution Environment (TEE) and extract the private key inside. This is not a simulation or controlled experiment. It’s a live test on Sapphire Mainnet, with real money on the line, running under the same protections used by Oasis’s production network. The challenge will remain open until December 31, 2025 — giving the global security community a full year to try their luck, test their tools, and push the boundaries of confidential computing.
🧠 Why This Matters: From Words to Proof TEE-based systems are designed to execute sensitive code and manage private data in isolated hardware environments. They promise confidentiality even when the host system is compromised.
But as recent research has shown, that promise isn’t always unbreakable. In 2025, two high-profile vulnerabilities — Battering RAM and Wiretap — exposed weaknesses in the deterministic memory encryption of Intel SGX and AMD SEV-SNP.
Those attacks allowed researchers to extract attestation keys and decrypt private data on multiple blockchain networks built around TEEs. Projects like Phala, Secret, Crust, and IntegriTEE had to deploy emergency patches and temporarily suspend services.
But Oasis remained completely unaffected, thanks to years of proactive engineering and a strong defense-in-depth philosophy. That’s why Oasis launched this challenge — not to boast, but to demonstrate confidence through evidence. “We don’t just claim security. We prove it, in public, under real-world conditions.”
🔒 Built for Adversity: Why Sapphire Is Different Sapphire, the confidential EVM built on Oasis, runs on Intel SGX v1, which uses a different memory encryption model from the affected SGX/SEV-SNP generations.
This makes Sapphire inherently resilient to the deterministic encryption attacks that compromised other networks. But the real strength lies in Oasis’s layered security architecture — multiple barriers that work together to contain risk even if one layer is compromised.
These include: On-chain governance and validator staking: Only approved validators with at least 5 million staked $ROSE can operate Sapphire’s key infrastructure.Ephemeral encryption keys that rotate every epoch, preventing any compromise from affecting past transactions.Dynamic CPU blacklisting that can instantly exclude vulnerable hardware from participating in the network.Strict node membership requirements and hardware attestation for all key manager nodes.
This holistic “defense-in-depth” model means that Sapphire isn’t just secure because of the TEE — it’s secure because every layer, from protocol to hardware, reinforces the next. 🧩 Inside the Challenge: The Unbreakable Smart Contract The challenge centers on a Sapphire smart contract deployed at:
0xc1303edbFf5C7B9d2cb61e00Ff3a8899fAA762B8 Within the enclave, the contract generates a cryptographic keypair using Sapphire’s secure random number generation.
The private key is created and stored entirely within the TEE — it never touches disk or memory outside the enclave. The public key is used to derive an Ethereum address that holds 1 wrapped Bitcoin (wBTC): 0xCEAf9abFdCabb04410E33B63B942b188B16dd497 From there, the contract functions as a custodial wallet, capable of signing transactions only when the authorized owner initiates a verified withdrawal. To eliminate common attack vectors, Oasis implemented the following constraints: No off-chain key generation — everything happens inside the enclave. Hardcoded withdrawal addresses — even if an attacker compromised the owner’s account, they could only send funds back to Oasis’s multi-sig vault. SIWE (Sign-In with Ethereum) for identity verification and transaction authorization.
There is no backdoor, no debug function, and no administrative override. In short: The only way to move the funds is to extract the private key from inside the TEE — something that would prove a full hardware compromise. 🔧 Real Security, Not a Simulation Many blockchain security tests are run in isolated conditions, using modified hardware or experimental builds.
The Oasis Security Challenge takes the opposite approach: it operates under exactly the same parameters as the live Sapphire network. That means all of Sapphire’s standard protections are active: 🔄 Ephemeral key rotation every epoch 🧱 Restricted compute committee membership limited to trusted validators 🔐 Enhanced key manager safeguards ⚙️ Dynamic CPU blacklist enforcement to remove compromised processors This ensures the test reflects real operational security — not a lab demo or proof-of-concept. 🌍 A Community-Wide Experiment Since its launch, the challenge has already gained over 250,000 views and drawn attention from Ethereum security researchers, hardware hacking groups, and academic institutions studying confidential computing. The contract code is fully verified and publicly visible on the Oasis Explorer, ensuring total transparency. Participants are encouraged to discuss techniques, share insights, and collaborate within the community — especially in the official Oasis Discord. The message is simple: “If you think Sapphire’s TEE security can be broken, here’s your chance to prove it.” And if no one succeeds by the end of 2025, it will be a powerful validation of the robustness of Sapphire’s architecture — real proof that confidential computing can work safely on a global blockchain. 🕒 Challenge Parameters Duration: Now through December 31, 2025
Reward: 1 wBTC (one full Bitcoin)
Network: Sapphire Mainnet (Oasis Network) 🧭 Beyond the Bounty: A Philosophy of Proactive Security This experiment reflects a broader truth about Oasis’s design philosophy.
Security isn’t something that happens after a problem — it’s something you design for from the start. Oasis engineers anticipated hardware-level threats years before they became mainstream. That foresight led to architectural decisions — like key separation, ephemeral encryption, and governance-enforced trust — that now protect Sapphire users today. The security challenge embodies this philosophy: open, transparent, and fearless. Instead of hiding behind marketing claims, Oasis invites the world to test its assumptions. In an industry built on trust, Oasis proves that trust is earned through verification — not just belief. 🔒 Conclusion: Actions Speak Louder Than Words The Oasis Security Challenge is more than a bounty — it’s a real-world experiment in trustless security. It’s an open invitation to every researcher, hacker, and engineer to test the boundaries of TEE-based confidentiality. If someone manages to steal the Bitcoin, it will mark a significant moment in security research.
If not, it will serve as undeniable proof that Oasis’s defense-in-depth architecture stands strong — even under the harshest scrutiny. Either way, the blockchain community wins — with clearer insights, stronger technology, and a deeper understanding of what true security looks like. So the challenge stands: Can you break Sapphire’s TEE?
If you can, the Bitcoin is yours.
If you can’t, you’ll have witnessed one of the most resilient confidential computing platforms in action. 🧭 Learn more: Sapphire – Confidential EVM by Oasis Network
Oasis Network and ROFL: Building a Secure and Decentralized Future for Web3
As the digital world continues to evolve, Web3 emerges as a transformative vision for a decentralized, transparent, and user-empowering internet. This new paradigm promises to shift control from centralized corporations to individual users. However, to fully realize this vision, the Web3 ecosystem must overcome a fundamental challenge: ensuring robust safety and security for decentralized applications (dApps). Oasis Network, a leading privacy-focused blockchain project, has brought forth a powerful and promising answer to this challenge with an integrated solution called ROFL. This article delves into the content presented in the video, exploring the inherent limitations of current security technologies and detailing how Oasis Network is meticulously engineering a more secure and reliable foundation for the future of Web3.
The Challenge of Trusted Execution Environments (TEEs) 🛡️
A Trusted Execution Environment (TEE) is a critical hardware-based technology that creates a secure, isolated area inside a computer's main processor. This enclave is designed to execute code and handle sensitive data with strong integrity and confidentiality guarantees. TEEs provide core features such as: Isolated Execution: Code and data are cryptographically protected from the host operating system, hypervisor, and other applications on the system.CPU-Internal Encryption Keys: Data is encrypted and signed with unique keys that are generated within the CPU and are inaccessible to any external software.Remote Attestation: This mechanism allows a remote party to verify that a specific application is running within a genuine and up-to-date TEE, providing a cryptographic proof of its secure status. However, as Yikos from Oasis Network emphasized, deploying TEEs alone is insufficient for building truly secure decentralized systems. They solve one part of the puzzle but leave critical gaps. We still face difficult questions like, "How can we cryptographically verify what constitutes the correct code?" or "Which specific TEE, among many, can be trusted for a given task?". Without a framework for verification, a malicious actor could potentially run harmful code inside a TEE that is itself secure. Furthermore, TEEs have an inherent weakness tied to their physical hardware: if the CPU is physically damaged or destroyed, all its unique internal keys are lost forever, leading to the permanent loss of any data encrypted with them. This is a critical point of failure for any dApp requiring high availability and data persistence.
Oasis's Vision: A Comprehensive Framework for TEEs 💡
To overcome these significant limitations, Oasis Network proposes a comprehensive, multi-layered framework that adds crucial layers of security, resilience, and governance around the core TEE technology. 1. Decentralized Key Management System (KMS) To solve the critical problem of data loss and to manage secrets effectively, a Key Management System (KMS) is essential. Oasis envisions a decentralized KMS that runs on a network of replicated and geographically distributed TEEs. Distributing the KMS in this manner builds resilience against regional outages, targeted attacks, or single-provider failures, ensuring that cryptographic keys can be securely recovered and managed. 🔑 2. On-Chain Policies and Governance Defining what constitutes "correct code" should not be an arbitrary decision. It must be governed by clear, transparent, and enforceable policies. By storing these policies on-chain, they become immutable and publicly auditable. This allows the community to participate in governance, defining crucial rules such as which TEE security versions are acceptable, where the application's source code must originate from, and on which specific providers or servers the application is permitted to run. 3. Reproducible Builds To guarantee that the application running inside a TEE is the exact version that was audited by security experts, the ecosystem needs reproducible builds. This means that anyone can take the publicly available source code and, through a deterministic build process, produce a binary that is bit-for-bit identical to the official one. This provides an independent and trustless way to verify the integrity of the software. 🔍 4. Container Support and Execution Transparency To enhance developer experience and accelerate adoption, the framework must support popular development tools like containers (e.g., Docker) while still ensuring a minimal Trusted Computing Base (TCB). Furthermore, maintaining an immutable, on-chain log of all application execution histories is vital. This transparent record serves as an audit trail, ensuring compliance with all established policies and governance decisions. 5. Decentralized TEE Providers In alignment with the core philosophy of Web3, the framework must be supported by a decentralized ecosystem of TEE providers. This prevents vendor lock-in and the centralization risks associated with relying on a single entity. It also fosters a competitive marketplace, driving innovation, better service, and more accessible pricing for developers. 🌐
Introducing ROFL: The All-in-One Solution 🌟 Based on this holistic vision, Oasis Network developed ROFL (Remote Off-chain Function)—a framework that provides all these necessary components as a default, integrated package. The name itself hints at its purpose: securely executing functions off-chain with on-chain verification. ROFL comes with built-in: A Decentralized Key Management System.Application Policy Management.Execution Transparency.Reproducible Builds.A Decentralized Marketplace for TEE providers. Benefits of ROFL: For Developers: ROFL dramatically simplifies the entire lifecycle of a TEE application, abstracting away much of the underlying complexity. It streamlines creation, management, building, verification, and the handling of secrets.For Providers: ROFL offers a ready-made marketplace for providers of TDX (Intel Trust Domain Extensions) resources, giving them access to a growing ecosystem and the tools needed to deploy TEE applications easily. To further support users, Oasis also provides ROFL.app, an intuitive web frontend for managing ROFL applications, helping with monitoring, deployment, and other advanced tasks.
Practical Applications and Future Potential 💼
What can be built with ROFL? The potential is vast and transformative: Trustless DeFi Agents: Build automated trading bots or yield-farming agents that can execute complex strategies with private logic, all without users having to surrender custody of their funds to a centralized service.Confidential Oracles: Create next-generation oracles that can securely fetch and process sensitive data from private APIs or proprietary databases, bringing valuable real-world data on-chain with verifiable integrity.Private AI Inference: With GPU support from TDX instances, ROFL enables AI models to perform inference on sensitive datasets (e.g., medical records, financial data) while guaranteeing data privacy. This unlocks new possibilities in research and industry where privacy has been a major barrier.
Conclusion
The Web3 world is at a crucial juncture where its future growth hinges on solving the challenges of security and trust. Through ROFL, Oasis Network does more than just patch the weaknesses of TEEs; it delivers a powerful, cohesive, and accessible toolkit for building a new class of dApps. By seamlessly integrating cutting-edge hardware security with decentralized governance, secure key management, and on-chain transparency, ROFL is laying the essential foundation for applications that are not only feature-rich but fundamentally secure. This represents a significant leap forward, positioning Oasis as a key infrastructure provider and promising a future where users can confidently and securely engage with the decentralized digital world. 🌍✨ #OasisNetwork $ROSE
Breaking Blockchain's Ownership Rules: Liquefaction - The Technology That Lets You "Rent" a Private
In the world of blockchain, there is a golden rule, an almost absolute truth: "Not your keys, not your coins." This rule emphasizes a binary principle that has existed since the dawn of crypto: either you possess the private key and have full control of your assets, or you share it and risk losing everything. 😬 This "all or nothing" principle is both a protective fortress and a barrier holding back the evolution of Web3. It makes renting, lending, or sharing access to digital assets extremely risky. How can you lend someone an expensive NFT so they can experience the benefits of an exclusive club without worrying they'll just run off with it? How can Decentralized Autonomous Organizations (DAOs) delegate voting power securely? For years, this has been a difficult puzzle. But now, a groundbreaking solution is emerging, promising to completely shatter this old model. Its name is Liquefaction. This technology isn't just theory. Recently, at the EthDam event, a demo called "Take My Ape" allowed users to "rent" a Bored Ape Yacht Club (BAYC) NFT—one of the world's most valuable collections—along with its full associated benefits, while smart contracts ensured it could never be stolen. In this article, we will go down the rabbit hole 🐇, exploring what Liquefaction is, the magical mechanism behind it, and why it's not just a fun application but an infrastructural leap for the entire blockchain ecosystem.
What is Liquefaction? More Than Just a Smart Wallet 🧠
To understand the uniqueness of Liquefaction, we need to know that it isn't merely a new wallet app. It's a wallet system built on the Sapphire platform, using specialized hardware technology called Trusted Execution Environments (TEEs). The origin of Liquefaction is quite interesting, stemming from a blog post that explored the idea of using private keys to sell DAO votes. Researchers at IC3 and Cornell University took this concept and expanded it into a complete system. 🎓 At its core, Liquefaction does something magical: It adds programmable logic directly on top of a regular blockchain address. Imagine being able to install rules for your wallet address, making it behave as intelligently as a smart contract. Through a process called "encumbering keys," Liquefaction allows multiple users to safely share a single blockchain address. This opens up countless possibilities: Sharing Assets: Co-owning and using a digital asset together.Renting: Providing temporary access to an asset in exchange for a fee.Pooling: Multiple users pool assets into a common wallet to participate in DeFi activities with greater efficiency. The first proof-of-concept (PoC) for Liquefaction involved sharing access to a Bored Ape NFT, but that's just the tip of the iceberg.
Inside the Digital Vault: How Does Liquefaction Work? ⚙️ The magic of Liquefaction lies in how it combines secure hardware with blockchain logic. The mechanism relies on two critical properties of the Sapphire platform: privacy and liveness. Let's break down the process: 1. The Private Key is "Jailed" in a TEE 🔒 The first and most crucial step is that the private key is placed directly inside a TEE. A TEE is an isolated and secure area on a computer's processor. Anything that happens inside the TEE is kept completely confidential, even from the owner of the computer. Once a private key enters a TEE, it never leaves this secure environment. It's like putting gold in a vault that you can't open yourself; you can only request it to perform transactions according to the rules. 2. Transaction Requests and Policy Evaluation 📜 When a user (e.g., the NFT renter) wants to perform an action, they send a signing request to the Liquefaction wallet. This request isn't executed immediately. Instead, it goes through a multi-layered and completely confidential policy evaluation process inside the TEE. These policies are essentially smart contracts. They can be programmed with complex stateful logic, such as: Tracking rental periods and automatically revoking access when the time is up.Enforcing spending limits for a shared wallet.Allowing only certain types of operations while blocking others (e.g., allowing message signing but blocking transfer transactions). 3. Conditional Signing ✅ The TEE will sign the transaction if and only if the request satisfies all the conditions defined in the policy. The Sapphire platform verifies that these policies have not been tampered with. This creates a verification chain where each transaction must pass multiple checkpoints before being authorized. The result is a cryptographic guarantee that no one—not the user, the developer, or the server operator—can extract the private key or manipulate the established policies. 4. Why is a Blockchain-Based TEE Necessary? You might ask: why not just do this off-chain? There are two critically important reasons: Liveness Guarantee: If you only used an off-chain computer, someone could simply "unplug it" and disappear with the assets. By relying on a blockchain, the system ensures it will always be operational and the rules will always be enforced. 🔌❌Attestation Capability: Anyone can cryptographically check and verify what is happening inside the TEE and ensure the system is operating continuously and transparently.
A Tangible Proof: "Take My Ape" - When You Can Rent a Bored Ape 🐒
That's the theory, but the true value of Liquefaction is demonstrated through the "Take My Ape" demo. It turns an abstract concept into a tangible experience. Through a simple auction, users can bid ROSE tokens to win ownership of a BAYC NFT for a minimum of 15 minutes at an extremely low cost. The winner enjoys benefits that were previously reserved for those with hundreds of thousands of dollars: Control the ape's image: Use it as a Profile Picture (PFP).Play with the ape in the BAYC Studio.Prove ownership via a digital signature to access exclusive platforms or events.Access the BAYC member-only area. The only real limitation? The inability to transfer the NFT to another address. This is the smart policy in action, a necessary step to prevent theft. Since its launch, the BAYC #8180 NFT has been "rented" dozens of times, becoming one of the most traded NFTs in history. This proves a real market demand for flexible access to high-value digital assets. 🏆
A "Liquefied" Future: Beyond JPEGs 🚀
Liquefaction is more than just a tool for renting NFTs. It's a paradigm shift for blockchain, with an importance similar to breakthroughs like oracles (providing off-chain data) or rollups (scaling solutions). By securing private keys inside TEEs while offering conditional access through confidential policies, Liquefaction shatters the assumption that one address must belong to a single entity. Think about the broader potential: Unlocking Liquidity: Billions of dollars are locked in vesting or staking tokens. Liquefaction could allow owners to "rent out" the voting rights or other utilities of these tokens without having to sell them.Gaming Guilds: Gaming guilds can securely and automatically manage and rent out in-game items (NFTs) to players.Decentralized Finance (DeFi): Create more complex financial products where multiple users can contribute to a joint position with predefined rules for risk and reward. For developers, simplified implementations are on the way. Whether it's temporarily owning a Bored Ape or unlocking liquidity for locked assets, Liquefaction points toward a future where ownership, privacy, and flexibility converge in ways we previously thought impossible. ✨ #OasisNetwork #ROSE
🔥 Acala's Game-Changing EVM+: 🔥 It's not just regular EVM! Acala delivers EVM+, an optimized Ethereum-compatible environment built on Polkadot's Substrate. This means:
Superior Performance: Leveraging Substrate's speed and scalability. 🚀 Deep Interoperability: Seamlessly connecting with the Polkadot ecosystem. 🔗 High Flexibility: Easy customization and upgrades. ⚙️ Limitless dApp Potential: Unlocking powerful and innovative DeFi applications, inheriting Ethereum's familiarity with significant enhancements. 💡
Acala EVM+ isn't just compatible; it elevates the dApp development and user experience! 🌟 #EVM #Acala #Polkadot #DeFi
📈 Acala (ACA) Price Action Alert! 🚨 Looking at the chart, ACA is showing some interesting price movements! After a period of consolidation around $0.030, we're seeing a strong push upwards towards the $0.034 level. 🔍 Key points to watch: Trading Volume: Keep an eye on whether the volume supports this upward momentum.Resistance Level: The $0.034 area could act as potential resistance.Overall Trend: It's still important to assess the longer-term trend for a broader perspective. Exciting times to watch ACA's next moves! 🤔 #Acala #ACA #DeFi #Trading