

In today's online world, Cybercriminals are becoming more sophisticated and daring. There is a need for more secure authentication systems to safeguard users' online accounts. The Multi-factor authentication (MFA) system provides a high level of data security and is vital for all to adopt.
Introduction to Crypto Security
A massive chunk of our day to day lives passes through gadgets such as laptops, smartphones etc. These devices ultimately end up containing valuable digital information about us. It is therefore not surprising how our online accounts have become attractive to criminals. Presently, cyber attacks against the government, companies, and even individuals are rampant because these criminals need access to private/personal information for their nefarious activities. From the look of things, these criminals will not relent any time soon.
However, it is very easy for individuals and organizations to improve the security of their private information using multi-factor authentication, commonly called MFA.
What Is Multi-Factor Authentication?
MFA is a security system that needs several authentication methods from independent categories of credentials to verify a user's identity for a login or any form of transaction. The technique combines at least two of these types of credentials: the user's knowledge (password), the user's possession (security token), and who the user is (biometric verification).

MFA aims at creating multiple layers of defence against any form of attack. It means that multi-factor authentication will make it hard for any unauthorised person to access a valid user's data like location, device, network, or database. With the MFA, when the attacker bypasses one layer, he/she still has other layers of defence to breach before obtaining full access to the user's asset. One popular form of MFA is "two-factor authentication", also known as 2FA. Let us now describe it in detail.
2FA Explained
Two-factor authentication, also called 2FA, adds an extra layer of security to verify whether a person who tries to access an online account is the rightful owner. The aim is to complicate access for a cyber-criminal. Any person who wants to gain access must provide another piece of information: the second factor. The information can be any of the following,
- A user's knowledge: This may be in the form of a PIN (Personal identification number), a password, an answer(s) to secret question(s), or a drafted pattern.
- A user's possession: This is something only the user has. It can be a credit card, a small hardware token, or a smartphone.
- Who a user is: This involves more advanced forms such as a fingerprint's biometric pattern, voice print, or even an iris scan.

2FA is a form of insurance for a user in the sense that if the user's phone is faulty, gets stolen, or the user's password is compromised, another party's chances of knowing the second-factor information are slim.
What Are The Common Types Of 2FA?
Any website that doesn't offer 2FA has the tendency to be hacked easily. In other words, there is no insurance for your account once someone else knows your password. Some websites, however, offer different kinds of 2FA; some may be complex, others easy to understand by the user. The bottom line is, they offer protection other than just passwords. The following are common types of 2FA,
- Hardware Tokens
This is the oldest form of 2FA. They are small hardware devices that generate a temporary numeric code every 30 seconds. When users want to access their accounts, they glimpse their device and enter the numeric code into the website or application.
One major disadvantage of this is the cost. Businesses, for example, find it costly to provide a large number of employees with hardware tokens. The small size of the device makes it prone to easy misplacement. It is also worthy to note that hardware tokens are not entirely safe from getting hacked.
Text-Message And Voice Verification
This type works directly with a user's mobile device. Upon the successful input of the username and password, a user gets a one-time password (OTP) in the form of a text message. When the user receives the OTP, s/he inputs it into the website or application.

Voice verification works similarly: the user's number is automatically dialled, and the password disclosed verbally. Voice verification is uncommon. It is mainly used in countries with poor cell service or where smartphones are expensive.
It is unwise to use this security form on a website that stores your personal information because it is the lowest security form. Private information like bank account details, email accounts, etc., need a more secure form of authentication. Therefore, this type of 2FA is predominantly for low-risk online activities.
Software Tokens
This is the most widely used type of 2FA. For many, it is a better alternative to text message and voice verification. It makes use of a software-generated, time-based one-time password, commonly referred to as TOTP, or soft token.
To use this method, users have to download and install a free 2FA application on their mobile or PC. The application can be used on any website that supports this authentication type. When users log onto the website with their respective username and password, they receive a code on the application and subsequently input it. Similar to the hardware tokens, software tokens are temporary and last for less than a minute.

What makes software tokens less susceptible to attacks is because the code is generated on the same device, unlike the text message and voice verification — There is every tendency that a user's registered number may be on another device. Most importantly, the 2FA applications are available for mobile, wearables, or PCs and can work offline. Therefore, it is possible to use them anywhere.
Push Notification
This type of authentication doesn't need a 2FA token. All the user needs to do is to verify that a login attempt is about to take place. Whenever an attempt is made to log into an account, the website will send a notification to the account owner's smartphone, and with just a single touch, the account owner can approve or deny access.
This method eradicates any form of attack from a third party. The direct relationship between the user and the website ensures that the user receives a notification upon any login attempt. However, it can only work on an internet-connected device. Hence, it may be difficult to use in an area with a poor network.
Other Forms Of MFA
- Swiping a card and entering a PIN.
- Using a VPN with a valid digital certificate to access a network.
- Scanning a fingerprint and answering security questions before gaining access to a website.
What Does The Future Hold For MFA?

Presently, the United States has adopted the use of MFA. The Federal Financial Institutions Examination Council (FFIEC) has issued a directive that the MFA should be used for internet banking operations. With the world's largest economic and financial superpower declaring its interest in multifactor authentication, there is no doubt it will be used worldwide shortly.
Closing Thoughts on MFA
Reports indicate that stolen, misplaced, and weak passwords are the primary cause of security infringements. Before now, passwords were the only way to keep one's account safe from cybercrime. Thankfully, MFA came on board when the rate of cybercrime was growing fast. With MFA, many companies and individuals can now increase their security level. MFA is vital to keep one's account safe and necessary for everyone in this digital age.
Don’t forget to download the BSC News mobile application on iOS and Android to keep up with all the latest news for Binance Smart Chain and crypto! Check out the DeFi Direct Linktree for all the access links!
For those looking for tools and strategies regarding safety and crypto education, be sure to check out the Tutorials, Cryptonomics Explainers, and Trading Tool Kits from BSC News.
This is a paid press release, BSC.News does not endorse and is not responsible for or liable for any content, accuracy, quality, advertising, products, or other materials on this page. The project team has purchased this advertisement article for $1500. Readers should do their own research before taking any actions related to the company. BSC.News is not responsible, directly or indirectly, for any damage or loss caused or alleged to be caused by or in connection with the use of or reliance on any content, goods, or services mentioned in the press release.
This is a paid press release, BSC.News does not endorse and is not responsible for or liable for any content, accuracy, quality, advertising, products, or other materials on this page. The project team has purchased this advertisement article for $2500. Readers should do their own research before taking any actions related to the company. BSC.News is not responsible, directly or indirectly, for any damage or loss caused or alleged to be caused by or in connection with the use of or reliance on any content, goods, or services mentioned in the press release.
If you need tools and strategies regarding safety and crypto education, be sure to check out the Tutorials, cryptonomics explainers, and Trading Tool Kits from BSC News.
Want the latest DeFi secrets delivered directly to your inbox every week from a leading industry expert? Instantly learn about strategies that could have you earning APYs of up to 69,000% with DeFi Maximizer. Sign up today and enjoy a 25% discount off of your first month!
Looking for a job in crypto? Check out the CryptoJobsNow listings!
Author
Related News

The highly anticipated Core airdrop launched on February 8th at 12 PM UTC.
Claim Your Core Airdrop
Core DAO has rewarded users for their patience by launching the highly anticipated airdrop. Eligible users can now claim the airdrop via the Core DAO official website with their mobile or PC.
The protocol announced that the airdrop would be launched on February 8th at 12 PM. After the week-long countdown on Twitter, the Layer one blockchain protocol confirmed the airdrop to the delight of core enthusiasts.
Airdrop is now available! 🚀 Claim your $CORE here --> https://t.co/Mpev8jNAvv#CoreDAO $CORE
— Core DAO (@Coredao_Org) February 8, 2023
Before the airdrop, the Satoshi Plus consensus protocol reminded users that they would need a small amount of CORE in their wallets before claiming the airdrop. Fortunately, the protocol will send 0.1 CORE to all eligible users who linked their Core wallet addresses in the Satoshi application.
Reminder that you need a small amount of $CORE in your wallet to claim your airdrop 👌
— Core DAO (@Coredao_Org) February 8, 2023
Upon launch, the network might be congested due to the large number of users trying to claim $CORE. Increasing the gas price may quicken the transaction. Users can also wait for a less busy time to claim the airdrop with lower gas fees.
Core DAO promises to offer users a decentralized, secure, and scalable ecosystem with the Satoshi Plus consensus mechanism. The airdrop is a step toward unleashing the network’s capabilities in the Decentraized Finance (DeFi) space. After users claim their airdrop, they can proceed to support the protocol’s aspirations via staking.
BSC News wrote an article about staking CORE. You can stake Core and earn rewards as a delegator. In the meantime, eligible users should read our publication on how to claim the Core airdrop HERE.
What is Core DAO:
Core DAO is the official decentralized organization developing the Satoshi Plus ecosystem. It represents an opportunity for miners to access new revenue streams by contributing hash power to the chain. Inspired by the principles of both blockchains, Core displays a deep appreciation for the crypto ecosystem's history and an even greater excitement for Core’s role in its future.
Where to find Core DAO:
Website | Docs | Twitter | Discord
This is a paid press release, BSC.News does not endorse and is not responsible for or liable for any content, accuracy, quality, advertising, products, or other materials on this page. The project team has purchased this advertisement article for $1500. Readers should do their own research before taking any actions related to the company. BSC.News is not responsible, directly or indirectly, for any damage or loss caused or alleged to be caused by or in connection with the use of or reliance on any content, goods, or services mentioned in the press release.
This is a paid press release, BSC.News does not endorse and is not responsible for or liable for any content, accuracy, quality, advertising, products, or other materials on this page. The project team has purchased this advertisement article for $2500. Readers should do their own research before taking any actions related to the company. BSC.News is not responsible, directly or indirectly, for any damage or loss caused or alleged to be caused by or in connection with the use of or reliance on any content, goods, or services mentioned in the press release.
Follow us on Twitter and Instagram!
If you need tools and strategies regarding safety and crypto education, be sure to check out the Tutorials, cryptonomics explainers, and Trading Tool Kits from BSC News.
Looking for a job in crypto? Check out the CryptoJobsNow listings!
Author

Step-by-step guide on claiming your CORE airdrop on mobile or PC.
Easy Steps to Claim Core Airdrop
The Core DAO airdrop will go live on February 8th at 12 PM UTC. Here is a detailed guide, according to Core DAO’s Medium blog, on how to claim your $CORE airdrop on Mobile and PC:
How to Claim CORE on PC
- After adding Core Mainnet to your Metamask wallet extension, open the Core DAO official homepage. You can learn how to add Core to Metamask HERE.
- Check the top right-hand side of the homepage and click on Airdrop.

- A dropdown will display, prompting you to select your country. However, Core DAO will automatically select your country based on IP. Click confirm after selecting your country.

- Next, select Metamask to connect your wallet.

- Once you click the confirm button, you will be directed to your Metamask wallet to link your Core Mainnet network to the website.
- If you are connected to the Ethereum Mainnet, Metamask will ask you to Switch network to Core DAO. Click “Switch Network” to confirm.

- Ensure that the wallet address is the same as the one you linked to the Satoshi application.
- Once connected to the Core DAO website, click on “Claim.”

- Click on confirm to proceed with the transaction.
- Eligible users will be sent 0.1 CORE in their wallets ahead of enabling the Airdrop to cover gas fees.
How to Claim CORE on Mobile
- Open your Metamask wallet and Connect to the Core mainnet.

- Go to the browser in the Metamask wallet and visit the Core DAO homepage.

- Click on Airdrop at the top of the homepage.

- Select your country of residence. Core DAO will automatically country with your connected IP. Click “Confirm.”

- After selecting the country, connect your Metamask wallet in the next page by clicking the “Connect” button.

- Confirm the interaction with your Metamask wallet.

- Click on the “Claim” button in the homepage. Ensure that your wallet address is the same with what you linked in the Satoshi application.

- Click on confirm in your Metamask to claim your tokens.
BSC News recommends visiting the Core DAO blog for more information about claiming the $CORE airdrop.
What is Core DAO:
Core DAO is the official decentralized organization developing the Satoshi Plus ecosystem. It represents an opportunity for miners to access new revenue streams by contributing hash power to the chain. Inspired by the principles of both blockchains, Core displays a deep appreciation for the crypto ecosystem's history and an even greater excitement for Core’s role in its future.
Where to find Core DAO:
Website | Docs | Twitter | Discord
This is a paid press release, BSC.News does not endorse and is not responsible for or liable for any content, accuracy, quality, advertising, products, or other materials on this page. The project team has purchased this advertisement article for $1500. Readers should do their own research before taking any actions related to the company. BSC.News is not responsible, directly or indirectly, for any damage or loss caused or alleged to be caused by or in connection with the use of or reliance on any content, goods, or services mentioned in the press release.
This is a paid press release, BSC.News does not endorse and is not responsible for or liable for any content, accuracy, quality, advertising, products, or other materials on this page. The project team has purchased this advertisement article for $2500. Readers should do their own research before taking any actions related to the company. BSC.News is not responsible, directly or indirectly, for any damage or loss caused or alleged to be caused by or in connection with the use of or reliance on any content, goods, or services mentioned in the press release.
Follow us on Twitter and Instagram!
If you need tools and strategies regarding safety and crypto education, be sure to check out the Tutorials, cryptonomics explainers, and Trading Tool Kits from BSC News.
Looking for a job in crypto? Check out the CryptoJobsNow listings!
Author

ConsenSys gives a breakdown of Layer 2 roll-ups, particularly ZK-rolls-ups and where the space is headed in the third Build section of the 2023 CMC Crypto Playbook

An Overview of Layer 2 Roll-ups
Over the past few years, Layer 2 (L2) rollup solutions have come to the forefront as activity on the Ethereum network has grown. Activity and engagement with non-fungible tokens (NFTs) and Decentralized Finance (DeFi) have caused a surge in Layer 1 (L1) blockchain activity. In turn, the demand for blockspace, represented by gas costs, has increased. And the time for transaction finality has risen due to the increased network load. Whilst the Ethereum Merge set the groundwork for future gas fee optimizations; it did not directly reduce transaction gas fees.
In the year between the summer of 2020 and the peak demand in the summer of 2021 gas cost in Gwei on the Ethereum network increased by up to 1300%. The need to make transactions fast and affordable spurred the creation of two primary forms of rollup: Optimistic and Zero-Knowledge (ZK).
Rollups help remove the computational demands on the Ethereum network by moving transaction processing off-chain, converting them into a single piece of data and then submitting back on Ethereum as a batch to reduce the associated cost and time. The big difference between the two is that Optimistic roll-ups utilize fraud proofs, whereas ZK-rollups rely on zero-knowledge proofs to verify changes to the main chain.
Optimistic and ZK-rollups: Fraud Proofs vs Validity Proofs
Fraud proofs bundle transactions off-chain and then repost them to the L1. After a bundle has been submitted on the L1 there is a challenge period, during which anyone can challenge the result of the roll-up by computing a fraud proof. Similarly, zero-knowledge proofs batch transactions off-chain and submit them as a single transaction. Where they differ is rather than assuming the transactions are correct initially, they use a validity proof to instantly prove whether the transactions are valid. Once the transactions have been confirmed as valid they are then submitted to the L1. This is how they derive their respective names - fraud proofs are where the transactions are checked retrospectively to see if there are any fraudulent transactions, whereas validity proofs are completed before the transactions are submitted to the L1.
Whilst there are prominent projects for both, they each come with their own respective benefits and drawbacks. Optimistic roll-ups have the advantage that fraud proofs are only required when there is an issue. This means they require less computational resources and are able to scale well. The trouble lies with the challenge period. A longer challenge period increases the likelihood that any fraudulent transactions are identified, however, it also means that users have to wait longer to withdraw their funds. For leading optimistic rollup solutions, such as Arbitrum and Optimism, this waiting period can last up to a week. Alternatively, ZK-rollups have the advantage of always reflecting a correct L2 state. Their drawback is that proofs are required for all state transitions, rather than solely when they are contested, which limits scalability. This is further compounded by the complex nature and early stage of the technology.
Despite their respective challenges, ZK-rollups are being heralded as the future for roll-ups. This is primarily due to the automatic generation of validity proofs increasing the security of the protocol, the significantly reduced time to withdraw due to there being no challenge period, and that ZK-rollups boast better data compression. For these reasons, we will hone in on the current state of the ZK-rollup space, the latest innovations, and what lies ahead in the future.

The ZK-Rollup Space
As we’ve discussed, ZK-rollups are predominantly in the focal point with players like zkSync, Starknet, Polygon zkEVM, and Scroll all raising large amounts of capital to develop their solutions despite only StarkNet having launched on mainnet ($780MM in total). Each of these projects has taken its own angle, differing primarily across their rollups data availability strategy and their proving algorithm. The data availability strategy determines where the state data of a roll-up is stored, on-chain storage has increased security but it uses up block space on the Ethereum network which reduces transaction throughput.
The proving algorithm is the means of generating a validity proof, which can either be STARK or SNARK. Both of these algorithms help developers to relocate computation and storage off-chain, in turn increasing scalability. They are also able to verify whether a user has sufficient funds and the correct private key without having to access the information itself, thus improving the security. You can read more about the technical differences here. STARKs have the advantage of offering more scalability, security, and transparency compared to SNARKs. But the drawback STARKS have is a larger proof size, which takes longer to verify, and that SNARKs comparatively only use 24% of the gas. Therein for both SNARKS and STARKS we have the tradeoff between speed and cost vs. scalability, security, and transparency. Whilst many different methods are being explored there is not yet a definitive answer as to the best way to set up a ZK-rollup. Each configuration brings respective benefits and many developers are still exploring the optimal choice or combination for their roll-up designs.
The Hurdles To Overcome
As we’ve discussed, ZK-rollups are still in development and there are various challenges that need to be overcome before blockchain users are able to reap their full benefits. Language compatibility is one such challenge; translating Ethereum Virtual Machine (EVM)-friendly programming languages, such as Solidity, into a custom-built language specifically optimized for ZKP can help boost their efficiency, but it brings with it adoption challenges for developers. For example, StarkNet is looking to solve this with Warp, a Solidity to Cairo (the language of StarkNet’s ZKP) language compiler that looks to automatically convert Solidity into Cairo. Using Warp removes the need for developers to rewrite their code in Cairo, making it a much smoother process.
Other challenges include the secretive nature of projects, with many going against the open-source ethos of crypto due to concerns over first-mover advantage and capturing a sticky userbase. Most ZK-rollups were first launched this year, highlighting the amount of work that is yet to be done in the space.
Lastly, whilst rollups (both optimistic and zero-knowledge) have the benefits of improved speed and cost, it tends to be at the expense of decentralization. This is due to the inherent need for sequencers, the actors batching transactions and committing proofs to the L1. All rollups currently need a centralized sequencer and use upgradeable smart contracts that are managed by a single entity. Because the space is still so early, a central focal point is typically required for quick fixes to bugs in the code. Add to that the projects aren’t open-sourced, creating another hurdle for community members to act as sequencers. Many projects have indicated that they plan to decentralize their sequencer functions in the future, but this will undoubtedly take additional resources and time.
Decentralization Plans
Launching a token and open-sourcing code will be the next steps for many of the projects seeking decentralization. Tokenization of these services to generate activity and decentralize the product is another area where we expect to see a myriad of different solutions cropping up as projects look to create the most scalable, decentralized and active L2 on the market. StarkWare and zkSync are both planning to launch a token and Polygon could potentially use MATIC to support Polygon’s zkEVM initiative. Token engineering on ZK-rollups is an even more nascent space than the optimistic roll-up technology and finding an effective and sustainable model can differentiate and boost adoption.
The Future
zkEVMs are still in their very early stages and the race is on to launch on mainnet. StarkNet has the first-mover advantage but still has challenges with regard to supporting Solidity features due to the use of Cairo, leaving room for competitors to make improvements. The projects that are able to amass significant user bases will attract Decentralized Applications (Dapps) developers, in turn bringing more dapps to their platform and increasing the feature set. ConsenSys’ zkEVM is currently moving to testnet and are focussing specifically on dapp developers for this reason, leveraging tools like MetaMask, Infura and Truffle so that they can deploy and manage applications as if they were directly using Ethereum.
And whilst we have discussed the current players in the zkEVM market, other predominant rollup solutions like Polygon, Optimism, and Arbitrum still command a significant market share. As zkEVM solutions mature, we may see these projects look to transition to validity proofs or hybrid solutions, leveraging their existing user bases to attract dapp development and maintain their market dominance. In the end, the many rollup solutions (and the increased competition between them) will continue to improve the web3 user experience and introduce platforms for applications to onboard the next generation of users.
Given these threats, we’re not surprised at the secrecy of projects in the space, but we believe the true winner will be able to leverage the efficiency of ZK-rollups and combine it with a seamless developer and user experience to come out on top.
This is a guest post from CoinMarketCap with Consensys and has been edited for style. The original article was published here and was also included in the third Build section of the 2023 CMC Crypto Playbook.
What is CoinMarketCap:
CoinMarketCap is the world's most-referenced price-tracking website for digital assets in the rapidly growing cryptocurrency space. Its mission is to make crypto discoverable and efficient globally by empowering retail users with unbiased, high-quality, and accurate information for drawing their own informed conclusions.
Where to find CoinMarketCap:
Website | Twitter | Telegram | LinkedIn |
What is ConsenSys:
ConsenSys is a leading Web3 software company. It enables developers, enterprises, and people worldwide to build next-generation applications, launch modern financial infrastructure, and access the decentralized web. The ConsenSys product suite includes Infura, Quorum, Codefi, MetaMask, Truffle, and Diligence.
Where to find ConsenSys:
Website | Twitter | Discord | LinkedIn |
This is a paid press release, BSC.News does not endorse and is not responsible for or liable for any content, accuracy, quality, advertising, products, or other materials on this page. The project team has purchased this advertisement article for $1500. Readers should do their own research before taking any actions related to the company. BSC.News is not responsible, directly or indirectly, for any damage or loss caused or alleged to be caused by or in connection with the use of or reliance on any content, goods, or services mentioned in the press release.
This is a paid press release, BSC.News does not endorse and is not responsible for or liable for any content, accuracy, quality, advertising, products, or other materials on this page. The project team has purchased this advertisement article for $2500. Readers should do their own research before taking any actions related to the company. BSC.News is not responsible, directly or indirectly, for any damage or loss caused or alleged to be caused by or in connection with the use of or reliance on any content, goods, or services mentioned in the press release.
Follow us on Twitter and Instagram!
If you need tools and strategies regarding safety and crypto education, be sure to check out the Tutorials, cryptonomics explainers, and Trading Tool Kits from BSC News.
Looking for a job in crypto? Check out the CryptoJobsNow listings!
Pi Network Debuts New PiOS Software Licensing Program Together With Hackathon

PiOS is a new open source software program that encourages developers to create and use open-source applications and tools within the Pi ecosystem. The software also allows developers to apply and work on other developers' contributions.
Pi Network Open Source Software License Program
Pi Network debuted its Pi Open Source (PiOS) License program at the hackathon launch to encourage developer collaboration and build its large ecosystem. The initiative enables developers to share their code while building valuable applications on the blockchain.
The protocol’s PiOS license ensures that developers create and utilize open-source applications and tools within the Pi ecosystem. In a press release shared with BSC News, the team stated that the licensing framework would ensure developers collaborate to develop unique applications on Pi Network.
“This unique licensing framework allows community developers to build on the contributions of one another, leveraging crowd wisdom of the large community. By consolidating community developers’ collective knowledge and building efforts, Pi Network aims to facilitate diverse ideations and executions to create a robust ecosystem of apps and utilities for the Pi community members,” the statement read.
The initiative enables developers to build on works created by others. Through the collective effort of developers, Pi Network aims to combine unique ideas to generate a robust ecosystem of valuable applications. One of the founders of Pi Network, Dr. Nicolas Kokkalis, also shared his thoughts about the initiative.
“Since Pi’s inception, we have always encouraged cross-collaboration. Through PiOS we hope to enable developers who wish to share their codebase with the community to do so, and also invite contributions to their code from other community developers,” said Dr. Nicolas Kokkalis. “Our hope is that by allowing Pi Community Developers to create open source applications and tools for the Pi Ecosystem, the community will continue to flourish and encourage others to build as well.”
Developers have access to the code repository licensed by other Pi community developers under the PiOS license. Further, developers receive Pi rewards as encouragement for contributing their code to the repository and making their work available to one another.
The Pi hackathon commenced on January 9th and will end on February 28th. The event invites participants to build apps across three themes: Social Media, GameFi/Entertainment, and Consumer Utilities. As of publication, over 4200 participants have registered for the event. BSC News has an article HERE for users interested in building on the blockchain. You can also visit the Pi hackathon page for more information.
What is Pi Network:
Pi Network is a novel cryptocurrency and developer platform that allows mobile users to mine Pi coins without draining the device’s battery. Pi’s blockchain secures economic transactions via a mobile meritocracy system and a full Web 3.0 experience where community developers can build decentralized applications (dApps) for millions of users.
Where to find Pi Network:
Website | Twitter | LinkedIn | Facebook | Instagram |
This is a paid press release, BSC.News does not endorse and is not responsible for or liable for any content, accuracy, quality, advertising, products, or other materials on this page. The project team has purchased this advertisement article for $1500. Readers should do their own research before taking any actions related to the company. BSC.News is not responsible, directly or indirectly, for any damage or loss caused or alleged to be caused by or in connection with the use of or reliance on any content, goods, or services mentioned in the press release.
This is a paid press release, BSC.News does not endorse and is not responsible for or liable for any content, accuracy, quality, advertising, products, or other materials on this page. The project team has purchased this advertisement article for $2500. Readers should do their own research before taking any actions related to the company. BSC.News is not responsible, directly or indirectly, for any damage or loss caused or alleged to be caused by or in connection with the use of or reliance on any content, goods, or services mentioned in the press release.
Follow us on Twitter and Instagram!
If you need tools and strategies regarding safety and crypto education, be sure to check out the Tutorials, cryptonomics explainers, and Trading Tool Kits from BSC News.
Looking for a job in crypto? Check out the CryptoJobsNow listings!
Author
BNB Chain Partners with CyberConnect for Global Hackathon: Connected 2023

Global hackathon begins immediately with judges and mentors from major Web3 projects assisting in the production.
Connected 2023 Global Web3 Hackathon
BNB Chain has announced a partnership with CyberConnect to launch a social Web3 hackathon.
The hackathon will take place from Feb 7 - March 13, according to a press release shared with BSC News. Applications to participate will remain open until February 20. The hackathon begins with immediate effect featuring over $50,000 in prizes available, project support, and more.
“Connected 2023 aims to empower a new generation of innovators by helping them bring their Web3 social ideas to life and then to market. With this event, BNB Chain and CyberConnect will empower passionate builders to kick start their journey and grow their hacks into fundable protocols," said Wilson Wei from CyberConnect.
The hackathon will have an array of ways for participants to get involved, ranging from individualized workshops, developer info sessions, team-matching sessions, and more.
The event features cosponsors Notifi, Lit, Livepeer, and XMTP plus mentors and judges from major names like Animoca Brands, Multicoin Capital, StepN, and Binance.
Interested projects can apply here.
BNB Chain is also running a concurrent developer competition called Game Jam. Running during the entire month of February, Game Jam is a healthy competition to develop social games where projects can compete for similar incubation support as the CyberConnect 2023, however, it is more specific to BNB Chain.
What is BNB Chain:
Previously known as the Binance Smart Chain (BSC), BNB Chain is a community-driven, decentralized, and censorship-resistant blockchain that is powered by Binance. It consists of BNB Beacon Chain and BNB Smart Chain, EVM compatible and facilitating a multi-chain ecosystem. Through the concept of MetaFI, BNB Chain aims to build the infrastructure to power the world’s parallel virtual ecosystem.
Find more about BNB Chain here:
Website | Twitter | Discord | Telegram | GitHub |
What is CyberConnect:
CyberConnect is a decentralized social graph protocol with identity self-sovereignty and network effects. It enables users to create profiles on BNBChain as the anchor of users’ decentralized identities. Profile owners can travel across dApps seamlessly without worrying about recreating their network on every new platform. With CyberConnect, users own their social graph, content, monetization channels, and more social data. Link3.to for example is built on CyberConnect and has more than 1,100 verified organization clients, 23k users’ all-in-on link profiles, and 200k monthly active users issued more than 1m social-related transactions on BNB Chain.
Where to find CyberConnect:
Website | Twitter | Discord | GitHub |
This is a paid press release, BSC.News does not endorse and is not responsible for or liable for any content, accuracy, quality, advertising, products, or other materials on this page. The project team has purchased this advertisement article for $1500. Readers should do their own research before taking any actions related to the company. BSC.News is not responsible, directly or indirectly, for any damage or loss caused or alleged to be caused by or in connection with the use of or reliance on any content, goods, or services mentioned in the press release.
This is a paid press release, BSC.News does not endorse and is not responsible for or liable for any content, accuracy, quality, advertising, products, or other materials on this page. The project team has purchased this advertisement article for $2500. Readers should do their own research before taking any actions related to the company. BSC.News is not responsible, directly or indirectly, for any damage or loss caused or alleged to be caused by or in connection with the use of or reliance on any content, goods, or services mentioned in the press release.
Follow us on Twitter and Instagram!
If you need tools and strategies regarding safety and crypto education, be sure to check out the Tutorials, cryptonomics explainers, and Trading Tool Kits from BSC News.
Looking for a job in crypto? Check out the CryptoJobsNow listings!

Swap Now

Sign up Now
Coming Soon
Coming Soon
Coming Soon
Coming Soon

Start Mining

Earn Now!

Sign Up Now!

Play Now

Sign Up Now!

Editors Choice
Other Currencies
- nameLTBuyLitecoin
Sponsored
Buy Crypto with Fees as low as 0%
Buy Crypto with a bank transfer, credit or debit card, P2P exchange, and more. Not investment advice. All trading risk. Terms apply.
£0£0+0% - nameLTBuyEOS
Sponsored
Buy Crypto with Fees as low as 0%
Buy Crypto with a bank transfer, credit or debit card, P2P exchange, and more. Not investment advice. All trading risk. Terms apply.
£0£0+0% - nameLTBuyMonero
Sponsored
Buy Crypto with Fees as low as 0%
Buy Crypto with a bank transfer, credit or debit card, P2P exchange, and more. Not investment advice. All trading risk. Terms apply.
£0£0+0% - nameLTBuyBitcoin Cash
Sponsored
Buy Crypto with Fees as low as 0%
Buy Crypto with a bank transfer, credit or debit card, P2P exchange, and more. Not investment advice. All trading risk. Terms apply.
£0£0+0%