Save These 17 Predictions! a16z's Latest Report Reveals the 2026 Crypto Wealth Code

marsbitPubblicato 2025-12-12Pubblicato ultima volta 2025-12-12

Introduzione

a16z's latest crypto report outlines 17 key predictions for 2026, focusing on major trends across stablecoins, AI, privacy, and industry infrastructure. Key insights include: stablecoin on/off ramps will mature, enabling seamless integration with traditional finance and daily payments; RWA tokenization will shift towards crypto-native models like perpetual futures rather than simple asset replication; and legacy banking systems will increasingly adopt stablecoins for innovation without core overhauls. AI agents will require new identity frameworks (KYA - Know Your Agent) and will transform research through nested, multi-agent workflows. Privacy will become a critical competitive moat for blockchains, creating strong network effects. The report also highlights the rise of prediction markets, staked media (where credibility is backed by on-chain commitments), and SNARKs becoming efficient enough for broad use beyond blockchain. Finally, it calls for clearer crypto regulations to unlock blockchain's full potential by aligning legal and technical structures.

This week, a16z released its annual "Big Ideas" report, featuring insights from partners across its Apps, American Dynamism, Bio, Crypto, Growth, Infra, and Speedrun teams. Below are 17 observations on 2026 industry trends from multiple a16z crypto partners (including several guest contributors) — covering agents and AI, stablecoins, tokenization and finance, privacy and security, extending to prediction markets, SNARKs, and other applications, and finally discussing the direction of industry building.

On Stablecoins, RWA Tokenization, Payments, and Finance

1. Better, More Flexible Stablecoin On/Off Ramps

Last year, stablecoin transaction volume was estimated at $46 trillion, continuing to hit new historical peaks. To put this in perspective, this scale is more than 20 times the transaction volume of PayPal, nearly 3 times that of Visa, one of the world's largest payment networks, and is quickly approaching the transaction volume of the US Automated Clearing House (ACH) (the electronic network that processes financial transactions like direct deposits in the US).

Today, sending a stablecoin takes less than a second, with a fee of less than one cent. But the core problem that remains unsolved is: how to connect these "digital dollars" to the financial system people use every day — the stablecoin on/off ramps.

A new generation of startups is filling this gap, promoting the integration of stablecoins with more widespread payment systems and local currencies: some use cryptographic proof technology to allow users to privately convert local currency balances into digital dollars; some integrate regional networks, leveraging features like QR codes and real-time payment channels for inter-bank transfers; others are building a truly interoperable global wallet layer and card issuance platform, allowing users to spend stablecoins directly at everyday merchants. These solutions collectively expand participation in the digital dollar economy and may accelerate stablecoins becoming a mainstream payment tool.

As on/off ramps mature and digital dollars directly integrate with local payment systems and merchant tools, new application scenarios will emerge: cross-border workers can receive payments in real-time, merchants can receive global dollars without a bank account, and applications can settle value instantly with global users. At that point, stablecoins will completely transform from a "niche financial tool" to an "internet-native settlement layer."

— Jeremy Zhang, a16z Crypto Engineering Team

2. Reimagining RWA Tokenization and Stablecoins with a "Crypto-Native Mindset"

Currently, banks, fintech companies, and asset management institutions show strong interest in "bringing traditional assets on-chain," involving US stocks, commodities, indices, and other traditional assets. But as more traditional assets go on-chain, their tokenization process often falls into the "skeuomorphic trap" — limited to the existing form of the real-world asset, failing to leverage the advantages of crypto-native properties.

Synthetic derivatives like perpetual futures not only provide deeper liquidity but are also easier to implement. Meanwhile, the leverage mechanism of perpetual contracts is easy to understand, which is why I believe it is the crypto-native derivative with the highest "product-market fit." Additionally, emerging market stocks are one of the most suitable asset classes for "perpetualization" (the liquidity of the "zero-day expiry options" market for some stocks already exceeds that of the spot market; perpetualizing them would be a highly valuable experiment).

This is essentially a choice between "fully on-chain vs. tokenization," but regardless, in 2026 we will see more "crypto-native" RWA tokenization solutions.

Similarly, stablecoins entered the mainstream market in 2025, with outstanding issuance continuously growing; in 2026, the stablecoin field will shift from "simple tokenization" to "innovative issuance models." Currently, stablecoins lacking a sound credit infrastructure resemble "narrow banks" — holding only highly secure, specific liquid assets. Although the narrow bank model is reasonable, in the long run, it is difficult to become the core pillar of the on-chain economy.

Currently, several new asset management institutions, asset managers, and protocols are exploring "on-chain asset-backed lending based on off-chain collateral," but these loans are usually initiated off-chain first and then tokenized. I believe the value of tokenization in this model is very limited, only serving users already in the on-chain ecosystem. Therefore, debt assets should be "initiated directly on-chain," not "tokenized after being initiated off-chain" — on-chain initiation can reduce loan servicing costs, back-office architecture costs, and improve accessibility. Although compliance and standardization remain challenges, developers are actively solving these problems.

— Guy Wuollet, a16z Crypto General Partner

3. Stablecoins Drive Bank Ledger Upgrades, Unlocking New Payment Scenarios

The software used by most banks today is almost "unrecognizable" to modern developers: in the 1960s-70s, banks were early adopters of large-scale software systems; in the 1980s-90s, second-generation core banking software emerged (like Temenos' GLOBUS, Infosys' Finacle). But this software has aged, and the pace of updates is extremely slow — today, the banking industry (especially core ledger systems, the critical databases recording deposits, collateral, and other liabilities) still often relies on mainframes running COBOL, using batch file interfaces rather than APIs.

The vast majority of global assets reside in these "decades-old core ledgers." Although these systems are time-tested, regulator-approved, and deeply integrated into complex banking scenarios, they also severely hinder innovation: adding key functions like real-time payments (RTP) can take months or even years, while dealing with layers of technical debt and regulatory complexity.

This is where the value of stablecoins lies: in the past few years, stablecoins not only achieved "product-market fit" and entered the mainstream, but in 2025 traditional finance (TradFi) institutions "fully embraced" stablecoins. Stablecoins, tokenized deposits, tokenized treasury bonds, and on-chain bonds allow banks, fintech companies, and financial institutions to develop new products and serve new customers — more importantly, without forcing these institutions to refactor "aging but decades-stable" legacy systems. Stablecoins provide financial institutions with a "low-risk innovation path."

— Sam Broner

4. The Internet Will Become the "New Generation Bank"

As AI agents (AI Agent) become widely adopted, more business activities will be completed "automatically in the background" (rather than relying on user clicks), which means the "way value (money) flows" must change accordingly.

In a world where "systems act on intent" (rather than step-by-step instructions) — for example, an AI agent identifies a need, fulfills an obligation, or triggers an outcome and automatically transfers value — the flow of value needs to have "the same speed and freedom as the current flow of information." And blockchain, smart contracts, and new protocols are key to achieving this goal.

Today, smart contracts can complete global dollar payments in seconds; in 2026, emerging foundational protocols like x402 will make "settlement programmable and responsive": agents can pay for data, GPU computing power, or API calls instantly and permissionlessly, without invoicing, reconciliation, or batch processing; developers can release software updates with built-in payment rules, limits, and audit trails, without fiat integration, merchant onboarding, or reliance on banks; prediction markets can "settle automatically in real-time" as events develop — odds updating, agent trading, global payout in seconds, without custodians or exchanges.

When value can flow in this way, the "payment process" will no longer be a separate operational layer, but will become a "network behavior": banks will integrate into the internet infrastructure, assets will become infrastructure. If money can flow like "internet-routable data packets," the internet will no longer "support the financial system," but will "itself become the financial system."

— Christian Crowley, Pyrs Carvolth, a16z Crypto Go-to-Market Team

5. Wealth Management Services Accessible to All

Traditionally, personalized wealth management services were only available to a bank's "high-net-worth clients": customized advice and portfolio adjustments across asset classes were costly and operationally complex. But as more asset classes are tokenized, crypto channels enable personalized strategies with "AI recommendation + assisted decision-making" to be "executed instantly and rebalanced at low cost."

This is far more than "robo-advisors": everyone can get "active portfolio management" (not just passive management). In 2025, traditional financial institutions already increased their allocation to crypto assets in investment portfolios (banks suggested allocating 2%-5% directly or through exchange-traded products (ETP)), but this is just the beginning; in 2026, we will see the rise of platforms "aimed at wealth accumulation" (not just wealth preservation) — fintech companies like Revolut, Robinhood, and centralized exchanges like Coinbase will capture this market with their tech stack advantages.

Meanwhile, DeFi tools like Morpho Vaults can automatically allocate assets to the lending market with the "optimal risk-adjusted return," providing a "core yield allocation" for the portfolio. Holding idle working capital in stablecoins (not fiat) and in tokenized money market funds (not traditional money funds) can further expand the yield space.

Finally, tokenization, while meeting compliance and reporting requirements, also makes it easier for retail investors to access "illiquid private market assets" (like private credit, Pre-IPO company equity, private equity). When all types of assets in a balanced portfolio (from bonds to stocks, to private and alternative assets) are tokenized, rebalancing can be done automatically without wire transfers.

— Maggie Hsu, a16z Crypto Go-to-Market Team

On Agents and AI

6. From KYC to KYA

Currently, the bottleneck of the "agent economy" is shifting from "intelligence level" to "identity recognition."

In financial services, the number of "non-human identities" (like AI agents) has reached 96 times that of human employees, but these identities are still "ghosts unable to access the banking system" — the core missing foundational capability is KYA (Know Your Agent).

Just as humans need credit scores to get loans, agents need "cryptographic signed credentials" to complete transactions — credentials need to be linked to the agent's "principal," "constraints," and "liability attribution." If this issue is not resolved, merchants will continue to block agents at the firewall level. The industry that built KYC infrastructure over decades now needs to solve the KYA challenge within months.

— Sean Neville, Co-founder of Circle, Architect of USDC, CEO of Catena Labs

7. AI Will Empower "Substantive Research Tasks"

As a mathematical economist, in January 2025, I could hardly get consumer-grade AI models to understand my workflow; but by November, I could send abstract tasks to AI models like instructing a PhD student — sometimes they even return "innovative and correctly executed" results. Beyond my personal experience, AI applications in research are gradually becoming popular, especially in the "reasoning field": AI not only directly assists discovery but can also "autonomously solve Putnam Mathematical Competition problems" (Putnam problems, considered the world's most difficult university-level math exam).

What still needs exploration is: in which fields are these research assistance functions most valuable, and how are they specifically applied. But I predict AI will spawn and reward a "new polymath research mode" — one that focuses more on the ability to "speculate on connections between ideas" and "quickly derive from highly speculative answers." These answers may not be accurate but can point in the right direction (at least within a specific logical framework). Ironically, this is equivalent to "harnessing the power of model hallucination": when models are smart enough, giving them abstract exploration space may produce meaningless content, but it may also lead to key breakthroughs — just as humans are most creative in a "non-linear, non-explicit goal-oriented" state.

To achieve this reasoning mode, we need to build "new AI workflows" — not just "interaction between agents," but "agents nested within agents": multi-layer models assist researchers in evaluating "the methods of previous models," gradually filtering effective information and eliminating invalid content. I have used this method to write papers; others use it for patent searches, creating new art, and even (regrettably) discovering new attack vectors for smart contracts.

But note: to run "nested reasoning agent clusters" to support research, two key issues need to be solved — "interoperability" between models, and "identifying and fairly compensating the contributions of each model" — and crypto technology can provide solutions for this.

— Scott Duke Kominers, a16z Crypto Research Team, Professor at Harvard Business School

8. The "Invisible Tax" on the Open Web

The rise of AI agents is imposing an "invisible tax" on the open web, fundamentally undermining its economic foundation. This destruction stems from the increasing misalignment between the internet's "context layer" and "execution layer": currently, AI agents extract data from "ad-supported websites" (context layer), providing convenience to users while systematically bypassing the "revenue sources that support content creation" (like ads, subscriptions).

To prevent the decline of the open web (while protecting the diverse content that "fuels AI"), large-scale deployment of "technology + economic" solutions is needed, such as "next-generation sponsored content," "micro-attribution systems," or other new funding models. Existing AI licensing agreements are essentially "financially unsustainable stopgaps" — compensation for content providers is often only a fraction of the revenue they lose due to AI diverting traffic.

The open web needs a "new techno-economic model for automatic value flow." The key shift in 2026 is: from "static licensing" to "real-time, pay-per-use." This means testing and scaling systems based on "blockchain-based micropayments + precise attribution standards" — automatically rewarding "all entities that contribute to the agent completing a task."

— Elizabeth Harkavy, a16z Crypto Investment Team

On Privacy and Security

9. Privacy Will Become Crypto's "Most Important Moat"

Privacy is a key prerequisite for "global finance going on-chain," but currently almost all blockchains lack this functionality — for most chains, privacy is only an "afterthought."

Today, "privacy capability" is enough to make one chain stand out from the competition; more importantly, privacy can "create chain lock-in effects," which can be called "privacy network effects" — especially when "competing on performance alone is no longer enough."

Thanks to cross-chain bridge protocols, migrating between different chains is very easy as long as the data is public; but once privacy is involved, the situation is completely different: "It's easy to transfer tokens cross-chain, but hard to transfer secrets cross-chain." When entering or exiting a "privacy zone," observers of the chain, mempool, or network traffic may identify the user; transferring assets between a "privacy chain and a public chain" or even "between two privacy chains" leaks metadata like transaction timing and amount correlation, increasing the risk of user tracking.

Currently, many "undifferentiated new chains" see fees approach zero due to competition (on-chain space is essentially homogeneous); whereas blockchains with privacy capabilities can build stronger "network effects." The reality is: if a "general-purpose chain" lacks a thriving ecosystem, killer apps, or unique distribution advantages, users and developers have no reason to choose it, build on it, let alone loyalty.

On public chains, users can easily trade with users on other chains, and the choice of chain is irrelevant; but on privacy chains, "which chain you choose" is crucial — once you join a privacy chain, users are reluctant to migrate for fear of exposure, creating a "winner-take-all" pattern. Since privacy is a rigid demand in most real-world scenarios, a few privacy chains may dominate the crypto space.

— Ali Yahya, a16z Crypto General Partner

10. The (Near) Future of Messaging: Not Just Post-Quantum, But Decentralized

As the world prepares for the "quantum computing era," encryption-based instant messaging applications like Apple's, Signal, and WhatsApp have taken the lead, with significant results. But the problem is: all mainstream communication tools rely on "privately operated servers by a single organization" — these servers are easy targets for governments to "shut down, implant backdoors, or forcibly obtain private data."

If a country can shut down servers, companies hold private server keys, or even companies themselves own private servers, then what's the point of "post-quantum encryption"? Private servers require users to "trust me," while "no private servers" means "you don't need to trust me." Communication doesn't need an intermediary (a single company), it needs "open protocols that don't require trusting any entity."

The path to achieve this is "decentralization of the network": no private servers, no single application, fully open-source code, using "top-tier cryptography" (including post-quantum threats). In an open network, no individual, company, non-profit, or country can deprive people of the right to communicate — even if a country or company shuts down one application, 500 new versions will appear the next day; even if a node is shut down, the economic incentives brought by technologies like blockchain will have new nodes immediately take its place.

When people "control messages with keys" (just like controlling money), everything changes: applications may iterate, but users always control their messages and identity — even if they stop using a certain application, message ownership still belongs to the user.

This is not just "post-quantum" and "encryption," but also "ownership" and "decentralization." Without these two, what we build is merely "unbreakable encryption that can be shut down at any time."

— Shane Mac, Co-founder & CEO, XMTP Labs

11. "Secrets-as-a-Service"

Behind every model, agent, and automated system lies a simple foundation: data. But most data transmission channels today — whether data input into models or output from models — are opaque, tamperable, and unauditable. This might not matter much for some consumer applications, but many industries and users, like finance and healthcare, require companies to protect sensitive data privately; simultaneously, this is a major obstacle in the current institutional push for real-world asset tokenization.

So, how to achieve secure, compliant, autonomous, and globally interoperable innovation while ensuring privacy? There are many solutions, here I focus on "data access control": who controls sensitive data? How does data flow? Who (or what entity) has the right to access data?

Without a data access control mechanism, any entity wanting to protect data confidentiality today must either rely on centralized services or build custom systems — an approach that is time-consuming, costly, and hinders traditional financial institutions and other entities from fully utilizing the functions and advantages of on-chain data management. Furthermore, as agent systems begin to autonomously browse information, complete transactions, and make decisions, users and institutions across industries need "crypto-grade guarantees," not "best-effort trust promises."

That's why I believe we need "Secrets-as-a-Service": using new technologies to achieve programmable native data access rules, client-side encryption, and decentralized key management — clearly specifying who can decrypt what data, under what conditions, for how long, with all rules enforced on-chain. Combined with verifiable data systems, "data confidentiality protection" will become part of the internet's basic public infrastructure, not a patch applied after the fact at the application layer, truly making privacy core infrastructure.

— Adeniyi Abiodun, Chief Product Officer & Co-founder, Mysten Labs

12. From "Code is Law" to "Specification is Law"

Recent DeFi hacking incidents affected protocols that were long-tested, had strong teams, rigorous audit processes, and had been running stably for years. These events reveal an unsettling reality: current mainstream security practices largely remain at the level of "empirical judgment" and "case-by-case handling."

To mature DeFi security, two major shifts are needed: from "patching vulnerability patterns" to "guaranteeing design-level properties," from "best-effort protection" to "principled systematic protection." This can be approached from two aspects:

Static / Pre-deployment phase (testing, auditing, formal verification): Systematically prove "global invariants" (the core rules the entire system always follows), not just verify "manually selected local rules." Several teams are developing AI-assisted proof tools that can help write specifications, propose invariant hypotheses, and significantly reduce the proof engineering work previously done manually — work that was extremely costly and difficult to scale in the past.

Dynamic / Post-deployment phase (runtime monitoring, runtime enforcement, etc.): The above "invariant rules" can be transformed into real-time protection barriers, serving as the last line of defense. These barriers are directly encoded as "runtime assertions," and all transactions must satisfy the assertion conditions to execute.

This way, we no longer need to assume "all vulnerabilities have been fixed," but instead use the code itself to enforce critical security properties — any transaction violating these properties is automatically rejected.

This is not theoretical. In fact, almost all hacking attacks to date would have triggered such security checks during execution, potentially stopping the attack. Therefore, the once-popular "code is law" concept is gradually evolving into "specification is law": even when facing new attacks, attackers must abide by the core security properties that maintain system integrity, leaving only attack vectors with minimal impact or extremely high implementation difficulty.

— Daejun Park, a16z Crypto Engineering Team

On Other Industries and Applications

13. Prediction Markets: Larger Scale, Broader Coverage, Higher Intelligence

Prediction markets have entered the mainstream. In 2026, with deeper integration with crypto technology and AI, they will further expand in scale, coverage, and intelligence — but will also bring new important challenges for developers that need urgent resolution.

First, prediction markets will list more contracts. This means we can get real-time odds not only for "major elections, geopolitical events" but also for various niche outcomes and complex cross-event scenarios. As these new contracts continuously release information and integrate into the news ecosystem (a trend already visible), society will face important issues: how to balance the value of this information? How to improve the transparency, auditability, etc., of prediction markets through optimized design (crypto technology can achieve this)?

To handle the significant increase in the number of contracts, new "consensus mechanisms" are needed to settle contracts. Centralized platform settlement (confirming whether an event actually happened, how to verify) is important, but controversial cases like the "Zelensky lawsuit market" and "Venezuela election market" expose its limitations. To solve these edge cases and expand prediction markets into more practical scenarios, new decentralized governance mechanisms and large language model (LLM) oracles can assist in determining the truth of disputed outcomes.

Beyond LLM oracles, AI brings more possibilities for prediction markets. For example, AI agents trading on prediction platforms can widely gather various signals to gain short-term trading advantages, thereby providing new ideas for understanding the world and predicting future trends (projects like Prophet Arena have shown potential in this area). These agents can not only serve as "senior political analysts" for people to consult for insights, but by analyzing their autonomously formed strategies, we can also help discover the core factors influencing complex social events.

Will prediction markets replace polls? The answer is no. Instead, they can improve the quality of polls (polling information can also be fed into prediction markets). As a political scientist, what I most look forward to is the synergistic development of prediction markets and a "rich and active polling ecosystem" — but this requires new technology: AI can optimize the survey experience; crypto technology can provide new ways to prove that poll respondents are real humans, not bots, etc.

— Andrew Hall, a16z Crypto Research Advisor, Professor of Political Economy, Stanford University

14. The Rise of Staked Media

The traditional media model touted "objectivity," but its drawbacks have long been apparent. The internet gave everyone a voice, and now more practitioners, practitioners, and builders are communicating directly with the public — their perspective reflects their "stake" in the world. Ironically, the audience respects them, often not "despite their having a stake," but "precisely because they have a stake."

The new change in this trend is not the rise of social media, but the "emergence of crypto tools" — tools that allow people to make "publicly verifiable commitments." As AI makes generating vast amounts of content cheaper and easier (generating content from any perspective, any identity — real or not), relying solely on the words of humans (or bots) is no longer sufficient for credibility. Tokenized assets, programmable locking, prediction markets, and on-chain history provide a firmer foundation for trust: commentators can prove they "practice what they preach" (backing their views with capital); podcast hosts can lock tokens, proving they won't opportunistically change their stance or "pump and dump"; analysts can tie predictions to "publicly settled markets," forming an auditable track record.

This is the early form of what I call "staked media": media that not only embraces the idea of "having skin in the game" but also provides tangible evidence. In this model, credibility comes neither from "pretending to be neutral" nor from "unfounded claims," but from "publicly transparent, verifiable commitment of interest." Staked media won't replace other forms of media but will complement the existing media ecosystem. It sends a new signal: no longer "trust me, I'm neutral," but "this is the risk I'm willing to take, this is how you can verify I'm telling the truth."

— Robert Hackett, a16z Crypto Editorial Team

15. Crypto Provides "New Foundational Components Beyond Blockchain"

For years, SNARKs — a cryptographic proof technology that verifies computation results without re-executing the calculation — were largely confined to blockchain applications. The main reason was "prohibitively high cost": the workload required to generate a proof of computation could be 1 million times that of directly performing the calculation. This technology only made sense in scenarios where the "cost could be amortized across thousands of verification nodes" (like blockchain); in other scenarios, it was impractical.

But this is about to change. In 2026, the cost of zero-knowledge virtual machine (zkVM) provers will drop to about 10,000x (i.e., the workload to generate a proof is 10,000 times that of direct computation), with memory footprint of only a few hundred megabytes — fast enough to run on mobile phones, and cheap enough for widespread application. The reason 10,000x might be the "critical threshold" is partly because: the parallel processing power of a high-end GPU is about 10,000 times that of a laptop CPU. By the end of 2026, a single GPU will be able to "generate proofs of CPU execution in real-time."

This will realize the vision proposed in old research papers: "verifiable cloud computing." If you need to run CPU workloads in the cloud due to "insufficient compute for GPU processing," "lack of technical capability," "legacy system limitations," etc., in the future you can just pay a reasonable extra cost to get a "cryptographic proof of computational correctness." Provers are already optimized for GPUs, your code can be used without additional adaptation.

— Justin Thaler, a16z Crypto Research Team, Associate Professor of Computer Science, Georgetown University

On Industry Building

16. Trading Business: A "Pit Stop" for Crypto Companies, Not the "Finish Line"

Today, apart from the stablecoin field and some core infrastructure companies, almost all performing crypto companies have either pivoted to trading business or are in the process of pivoting. But if "all crypto companies become trading platforms," where does it end? A large number of companies crowding into the same track will not only distract users but also lead to a result of "a few giants monopolizing, most companies eliminated." This means that companies that pivot to trading business too quickly will miss the opportunity to build "more competitive, more sustainable business models."

I fully understand the founders'初衷 to achieve business profitability, but "pursuing short-term product-market fit" also comes at a cost. This problem is particularly acute in crypto: the unique dynamics related to token characteristics and speculative attributes make it easy for founders to choose the "instant gratification" path in the process of "finding product-market fit" — this is essentially similar to the "marshmallow test" (testing delayed gratification ability).

There's nothing wrong with the trading business itself; it's an important market function, but it shouldn't be the "ultimate goal" of a company. Founders who focus on the "product essence of product-market fit" are ultimately more likely to become industry winners.

— Arianna Simpson, a16z Crypto General Partner

17. Unleashing Blockchain's Full Potential: When Legal Architecture Finally Matches Technical Architecture

Over the past decade, one of the biggest obstacles to building blockchain networks in the US has been "legal uncertainty." The expanded scope and uneven enforcement of securities laws forced founders into regulatory frameworks designed for "companies, not networks." For years, "avoiding legal risk" replaced "product strategy," and the importance of engineers gave way to lawyers.

This situation led to many distortions: founders were advised to avoid transparency; token distribution became arbitrary from a legal perspective; governance became a formality; organizational structures were "primarily aimed at avoiding legal risk"; token designs deliberately "avoided carrying economic value" or "had no business model." Worse, those crypto projects that "disregarded the rules and operated in gray areas" often developed faster than "honest and compliant" builders.

But now, the US government is closer than ever to passing "crypto market structure regulatory legislation" — legislation that could eliminate all the above distortions in 2026. If passed, it would incentivize companies to increase transparency, establish clear standards, and replace "random enforcement" with "clear, structured financing, token issuance, and decentralization paths." Previously, after the GENIUS Act passed, stablecoin issuance grew significantly; but crypto market structure-related legislation will bring about more significant change — this change will focus on "blockchain networks."

In other words, this type of regulation will allow blockchain networks to "truly operate as networks": open, autonomous, composable, credibly neutral, and decentralized.

— Miles Jennings, a16z Crypto Policy Team, General Counsel

Domande pertinenti

QAccording to the a16z report, what is the key challenge for stablecoins to become mainstream payment tools?

AThe key challenge is the 'on/off ramp' problem, which is how to connect these 'digital dollars' to the everyday financial systems people use. New startups are working to bridge this gap by integrating stablecoins with popular payment systems and local currencies.

QWhat shift is expected in the Real World Asset (RWA) tokenization space by 2026, as per Guy Wuollet?

AThe shift is from 'simply tokenizing' real-world assets to 'innovative issuance models.' The focus will move away from 'paleo-imitation' (mimicking existing asset forms) towards more 'crypto-native' tokenization schemes, such as synthetic derivatives like perpetual futures, which offer deeper liquidity and are easier to implement.

QHow does the report suggest AI agents will change the nature of value transfer on the internet?

AThe report suggests that with the rise of AI agents, value (money) will need to flow with the same speed and freedom as information. Blockchain, smart contracts, and new protocols will enable this, allowing the internet to become the financial system itself, where payments are not a separate operational layer but a 'network behavior.'

QWhy does Ali Yahya believe privacy will become the 'most important moat' in crypto?

AHe believes privacy creates a 'privacy network effect' and strong lock-in. Unlike public chains where assets are easily movable, moving between privacy chains or from a privacy chain to a public one risks exposing user identity and transaction metadata. This makes users less likely to migrate once they choose a privacy-focused chain, leading to a potential 'winner-take-all' dynamic.

QWhat major regulatory change does Miles Jennings anticipate for 2026 that could unlock blockchain's full potential?

AHe anticipates the passage of a 'crypto market structure bill' in the U.S. This legislation would eliminate legal uncertainties, replace 'regulation by enforcement' with clear standards, and incentivize transparency. It would allow blockchain networks to finally operate as they were designed: open, autonomous, composable, credibly neutral, and decentralized.

Letture associate

North Korean Hackers Loot $500 Million in a Single Month, Becoming the Top Threat to Crypto Security

North Korean hackers, particularly the notorious Lazarus Group and its subgroup TraderTraitor, have stolen over $500 million from cryptocurrency DeFi platforms in less than three weeks, bringing their total theft for the year to over $700 million. Recent major attacks on Drift Protocol and KelpDAO, resulting in losses of approximately $286 million and $290 million respectively, highlight a strategic shift: instead of targeting core smart contracts, attackers are now exploiting vulnerabilities in peripheral infrastructure. For instance, the KelpDAO attack involved compromising downstream RPC infrastructure used by LayerZero's decentralized validation network (DVN), allowing manipulation without breaching core cryptography. This sophisticated approach mirrors advanced corporate cyber-espionage. Additionally, North Korea has systematically infiltrated the global crypto workforce, with an estimated 100 operatives using fake identities to gain employment at blockchain companies, enabling long-term access to sensitive systems and facilitating large-scale thefts. According to Chainalysis, North Korean-linked hackers stole a record $2 billion in 2025, accounting for 60% of all global crypto theft that year. Their total historical crypto theft has reached $6.75 billion. Post-theft, they employ specialized money laundering methods, heavily relying on Chinese OTC brokers and cross-chain mixing services rather than standard decentralized exchanges. Security experts, while acknowledging the increased sophistication, emphasize that many attacks still exploit fundamental weaknesses like poor access controls and centralized operational risks. Strengthening private key management, limiting privileged access, and enhancing coordination among exchanges, analysts, and law enforcement immediately after an attack are critical to improving defense and fund recovery chances. The industry's challenge now extends beyond secure smart contracts to safeguarding operational security at the infrastructure level.

marsbit15 min fa

North Korean Hackers Loot $500 Million in a Single Month, Becoming the Top Threat to Crypto Security

marsbit15 min fa

Circle CEO's Seoul Visit: No Korean Won Stablecoin Issuance, But Met All Major Korean Banks

Circle CEO Jeremy Allaire's recent activities in Seoul indicate a strategic shift for the company, moving away from issuing a Korean won-backed stablecoin and instead focusing on embedding itself as a key infrastructure provider within Korea’s financial and crypto ecosystem. Despite Korea accounting for nearly 30% of global crypto trading volume—with a market characterized by high retail participation and altcoin dominance—Circle has chosen not to compete for the role of stablecoin issuer. Instead, Allaire met with major Korean banks (including Shinhan, KB, and Woori), financial groups, leading exchanges (Upbit, Bithumb, Coinone), and tech firms like Kakao. This approach reflects a broader industry transition: the core of stablecoin competition is shifting from issuance rights to systemic positioning. With Korean regulators still debating whether banks or tech companies should issue stablecoins, Circle is avoiding regulatory uncertainty by strengthening its role as a service and technology partner. The company is deepening integration with trading platforms, building connections, and promoting stablecoin infrastructure. This positions Circle to benefit regardless of which entity eventually issues a won stablecoin. Allaire also noted the potential for a Chinese yuan stablecoin in the next 3–5 years, underscoring a regional trend of stablecoins becoming more regulated and integrated with traditional finance. Ultimately, Circle’s strategy highlights that future influence in the stablecoin market will belong not necessarily to the issuers, but to the foundational infrastructure layers that enable cross-system transactions.

marsbit43 min fa

Circle CEO's Seoul Visit: No Korean Won Stablecoin Issuance, But Met All Major Korean Banks

marsbit43 min fa

SpaceX Ties Up with Cursor: A High-Stakes AI Gambit of 'Lock First, Acquire Later'

SpaceX has secured an option to acquire AI programming company Cursor for $60 billion, with an alternative clause requiring a $10 billion collaboration fee if the acquisition does not proceed. This structure is not merely a potential acquisition but a strategic move to control core access points in the AI era. The deal is designed as a flexible, dual-path arrangement, allowing SpaceX to either fully acquire Cursor or maintain a binding partnership through high-cost collaboration. This "option-style" approach minimizes immediate regulatory and integration risks while ensuring long-term alignment between the two companies. At its core, the transaction exchanges critical AI-era resources: SpaceX provides its Colossus supercomputing cluster—one of the world’s most powerful AI training infrastructures—while Cursor contributes its AI-native developer environment and strong product adoption. This synergy connects compute power, models, and application layers, forming a closed-loop AI capability stack. Cursor, founded in 2022, has achieved rapid growth with over $1 billion in annual revenue and widespread enterprise adoption. Its value lies in transforming software development through AI agents capable of coding, debugging, and system design—positioning it as a gateway to future software production. For SpaceX, this move is part of a broader strategy to evolve from a aerospace company into an AI infrastructure empire, integrating xAI, supercomputing, and chip manufacturing. Controlling Cursor fills a gap in its developer tooling layer, strengthening its AI narrative ahead of a potential IPO. The deal reflects a shift in AI competition from model superiority to ecosystem and entry-point control. With programming tools as a key battleground, securing developer loyalty becomes crucial for dominating the software production landscape. Risks include questions around Cursor’s valuation, technical integration challenges, and potential regulatory scrutiny. Nevertheless, the deal underscores a strategic bet: controlling both compute and software development access may redefine power dynamics in the AI-driven future.

marsbit1 h fa

SpaceX Ties Up with Cursor: A High-Stakes AI Gambit of 'Lock First, Acquire Later'

marsbit1 h fa

Trading

Spot
Futures

Articoli Popolari

Cosa è $S$

Comprendere SPERO: Una Panoramica Completa Introduzione a SPERO Mentre il panorama dell'innovazione continua a evolversi, l'emergere delle tecnologie web3 e dei progetti di criptovaluta gioca un ruolo fondamentale nel plasmare il futuro digitale. Un progetto che ha attirato l'attenzione in questo campo dinamico è SPERO, denotato come SPERO,$$s$. Questo articolo mira a raccogliere e presentare informazioni dettagliate su SPERO, per aiutare gli appassionati e gli investitori a comprendere le sue basi, obiettivi e innovazioni nei domini web3 e crypto. Che cos'è SPERO,$$s$? SPERO,$$s$ è un progetto unico all'interno dello spazio crypto che cerca di sfruttare i principi della decentralizzazione e della tecnologia blockchain per creare un ecosistema che promuove l'impegno, l'utilità e l'inclusione finanziaria. Il progetto è progettato per facilitare interazioni peer-to-peer in modi nuovi, fornendo agli utenti soluzioni e servizi finanziari innovativi. Al suo interno, SPERO,$$s$ mira a responsabilizzare gli individui fornendo strumenti e piattaforme che migliorano l'esperienza dell'utente nello spazio delle criptovalute. Questo include la possibilità di metodi di transazione più flessibili, la promozione di iniziative guidate dalla comunità e la creazione di percorsi per opportunità finanziarie attraverso applicazioni decentralizzate (dApps). La visione sottostante di SPERO,$$s$ ruota attorno all'inclusività, cercando di colmare le lacune all'interno della finanza tradizionale mentre sfrutta i vantaggi della tecnologia blockchain. Chi è il Creatore di SPERO,$$s$? L'identità del creatore di SPERO,$$s$ rimane piuttosto oscura, poiché ci sono risorse pubblicamente disponibili limitate che forniscono informazioni dettagliate sul suo fondatore o fondatori. Questa mancanza di trasparenza può derivare dall'impegno del progetto per la decentralizzazione—un ethos che molti progetti web3 condividono, dando priorità ai contributi collettivi rispetto al riconoscimento individuale. Centrando le discussioni attorno alla comunità e ai suoi obiettivi collettivi, SPERO,$$s$ incarna l'essenza dell'empowerment senza mettere in evidenza individui specifici. Pertanto, comprendere l'etica e la missione di SPERO rimane più importante che identificare un creatore singolo. Chi sono gli Investitori di SPERO,$$s$? SPERO,$$s$ è supportato da una varietà di investitori che vanno dai capitalisti di rischio agli investitori angelici dedicati a promuovere l'innovazione nel settore crypto. Il focus di questi investitori generalmente si allinea con la missione di SPERO—dando priorità a progetti che promettono avanzamenti tecnologici sociali, inclusività finanziaria e governance decentralizzata. Queste fondazioni di investitori sono tipicamente interessate a progetti che non solo offrono prodotti innovativi, ma contribuiscono anche positivamente alla comunità blockchain e ai suoi ecosistemi. Il supporto di questi investitori rafforza SPERO,$$s$ come un concorrente degno di nota nel dominio in rapida evoluzione dei progetti crypto. Come Funziona SPERO,$$s$? SPERO,$$s$ impiega un framework multifunzionale che lo distingue dai progetti di criptovaluta convenzionali. Ecco alcune delle caratteristiche chiave che sottolineano la sua unicità e innovazione: Governance Decentralizzata: SPERO,$$s$ integra modelli di governance decentralizzati, responsabilizzando gli utenti a partecipare attivamente ai processi decisionali riguardanti il futuro del progetto. Questo approccio favorisce un senso di proprietà e responsabilità tra i membri della comunità. Utilità del Token: SPERO,$$s$ utilizza il proprio token di criptovaluta, progettato per servire varie funzioni all'interno dell'ecosistema. Questi token abilitano transazioni, premi e la facilitazione dei servizi offerti sulla piattaforma, migliorando l'impegno e l'utilità complessivi. Architettura Stratificata: L'architettura tecnica di SPERO,$$s$ supporta la modularità e la scalabilità, consentendo un'integrazione fluida di funzionalità e applicazioni aggiuntive man mano che il progetto evolve. Questa adattabilità è fondamentale per mantenere la rilevanza nel panorama crypto in continua evoluzione. Coinvolgimento della Comunità: Il progetto enfatizza iniziative guidate dalla comunità, impiegando meccanismi che incentivano la collaborazione e il feedback. Nutrendo una comunità forte, SPERO,$$s$ può affrontare meglio le esigenze degli utenti e adattarsi alle tendenze di mercato. Focus sull'Inclusione: Offrendo basse commissioni di transazione e interfacce user-friendly, SPERO,$$s$ mira ad attrarre una base utenti diversificata, inclusi individui che potrebbero non aver precedentemente interagito nello spazio crypto. Questo impegno per l'inclusione si allinea con la sua missione generale di empowerment attraverso l'accessibilità. Cronologia di SPERO,$$s$ Comprendere la storia di un progetto fornisce preziose intuizioni sulla sua traiettoria di sviluppo e sui traguardi. Di seguito è riportata una cronologia suggerita che mappa eventi significativi nell'evoluzione di SPERO,$$s$: Fase di Concettualizzazione e Ideazione: Le idee iniziali che formano la base di SPERO,$$s$ sono state concepite, allineandosi strettamente con i principi di decentralizzazione e focus sulla comunità all'interno dell'industria blockchain. Lancio del Whitepaper del Progetto: Dopo la fase concettuale, è stato rilasciato un whitepaper completo che dettaglia la visione, gli obiettivi e l'infrastruttura tecnologica di SPERO,$$s$ per suscitare interesse e feedback dalla comunità. Costruzione della Comunità e Prime Interazioni: Sono stati effettuati sforzi attivi di outreach per costruire una comunità di early adopters e potenziali investitori, facilitando discussioni attorno agli obiettivi del progetto e ottenendo supporto. Evento di Generazione del Token: SPERO,$$s$ ha condotto un evento di generazione del token (TGE) per distribuire i propri token nativi ai primi sostenitori e stabilire una liquidità iniziale all'interno dell'ecosistema. Lancio della Prima dApp: La prima applicazione decentralizzata (dApp) associata a SPERO,$$s$ è stata attivata, consentendo agli utenti di interagire con le funzionalità principali della piattaforma. Sviluppo Continuo e Partnership: Aggiornamenti e miglioramenti continui alle offerte del progetto, inclusi partnership strategiche con altri attori nello spazio blockchain, hanno plasmato SPERO,$$s$ in un concorrente competitivo e in evoluzione nel mercato crypto. Conclusione SPERO,$$s$ rappresenta una testimonianza del potenziale del web3 e delle criptovalute di rivoluzionare i sistemi finanziari e responsabilizzare gli individui. Con un impegno per la governance decentralizzata, il coinvolgimento della comunità e funzionalità progettate in modo innovativo, apre la strada verso un panorama finanziario più inclusivo. Come per qualsiasi investimento nello spazio crypto in rapida evoluzione, si incoraggiano potenziali investitori e utenti a ricercare approfonditamente e a impegnarsi in modo riflessivo con gli sviluppi in corso all'interno di SPERO,$$s$. Il progetto mostra lo spirito innovativo dell'industria crypto, invitando a ulteriori esplorazioni delle sue innumerevoli possibilità. Mentre il percorso di SPERO,$$s$ è ancora in fase di sviluppo, i suoi principi fondamentali potrebbero effettivamente influenzare il futuro di come interagiamo con la tecnologia, la finanza e tra di noi in ecosistemi digitali interconnessi.

75 Totale visualizzazioniPubblicato il 2024.12.17Aggiornato il 2024.12.17

Cosa è $S$

Cosa è AGENT S

Agent S: Il Futuro dell'Interazione Autonoma in Web3 Introduzione Nel panorama in continua evoluzione di Web3 e criptovalute, le innovazioni stanno costantemente ridefinendo il modo in cui gli individui interagiscono con le piattaforme digitali. Uno di questi progetti pionieristici, Agent S, promette di rivoluzionare l'interazione uomo-computer attraverso il suo framework agentico aperto. Aprendo la strada a interazioni autonome, Agent S mira a semplificare compiti complessi, offrendo applicazioni trasformative nell'intelligenza artificiale (AI). Questa esplorazione dettagliata approfondirà le complessità del progetto, le sue caratteristiche uniche e le implicazioni per il dominio delle criptovalute. Cos'è Agent S? Agent S si presenta come un innovativo framework agentico aperto, progettato specificamente per affrontare tre sfide fondamentali nell'automazione dei compiti informatici: Acquisizione di Conoscenze Specifiche del Dominio: Il framework apprende in modo intelligente da varie fonti di conoscenza esterne ed esperienze interne. Questo approccio duale gli consente di costruire un ricco repository di conoscenze specifiche del dominio, migliorando le sue prestazioni nell'esecuzione dei compiti. Pianificazione su Lungo Orizzonte di Compiti: Agent S impiega una pianificazione gerarchica potenziata dall'esperienza, un approccio strategico che facilita la suddivisione e l'esecuzione efficiente di compiti complessi. Questa caratteristica migliora significativamente la sua capacità di gestire più sottocompiti in modo efficiente ed efficace. Gestione di Interfacce Dinamiche e Non Uniformi: Il progetto introduce l'Interfaccia Agente-Computer (ACI), una soluzione innovativa che migliora l'interazione tra agenti e utenti. Utilizzando Modelli Linguistici Multimodali di Grandi Dimensioni (MLLM), Agent S può navigare e manipolare senza sforzo diverse interfacce grafiche utente. Attraverso queste caratteristiche pionieristiche, Agent S fornisce un framework robusto che affronta le complessità coinvolte nell'automazione dell'interazione umana con le macchine, preparando il terreno per innumerevoli applicazioni nell'AI e oltre. Chi è il Creatore di Agent S? Sebbene il concetto di Agent S sia fondamentalmente innovativo, informazioni specifiche sul suo creatore rimangono elusive. Il creatore è attualmente sconosciuto, il che evidenzia sia la fase embrionale del progetto sia la scelta strategica di mantenere i membri fondatori sotto anonimato. Indipendentemente dall'anonimato, l'attenzione rimane sulle capacità e sul potenziale del framework. Chi sono gli Investitori di Agent S? Poiché Agent S è relativamente nuovo nell'ecosistema crittografico, informazioni dettagliate riguardanti i suoi investitori e sostenitori finanziari non sono documentate esplicitamente. La mancanza di approfondimenti pubblicamente disponibili sulle fondazioni di investimento o sulle organizzazioni che supportano il progetto solleva interrogativi sulla sua struttura di finanziamento e sulla roadmap di sviluppo. Comprendere il supporto è cruciale per valutare la sostenibilità del progetto e il suo potenziale impatto sul mercato. Come Funziona Agent S? Al centro di Agent S si trova una tecnologia all'avanguardia che gli consente di funzionare efficacemente in contesti diversi. Il suo modello operativo è costruito attorno a diverse caratteristiche chiave: Interazione Uomo-Computer Simile a Quella Umana: Il framework offre una pianificazione AI avanzata, cercando di rendere le interazioni con i computer più intuitive. Mimando il comportamento umano nell'esecuzione dei compiti, promette di elevare le esperienze degli utenti. Memoria Narrativa: Utilizzata per sfruttare esperienze di alto livello, Agent S utilizza la memoria narrativa per tenere traccia delle storie dei compiti, migliorando così i suoi processi decisionali. Memoria Episodica: Questa caratteristica fornisce agli utenti una guida passo-passo, consentendo al framework di offrire supporto contestuale mentre i compiti si sviluppano. Supporto per OpenACI: Con la capacità di funzionare localmente, Agent S consente agli utenti di mantenere il controllo sulle proprie interazioni e flussi di lavoro, allineandosi con l'etica decentralizzata di Web3. Facile Integrazione con API Esterne: La sua versatilità e compatibilità con varie piattaforme AI garantiscono che Agent S possa adattarsi senza problemi agli ecosistemi tecnologici esistenti, rendendolo una scelta attraente per sviluppatori e organizzazioni. Queste funzionalità contribuiscono collettivamente alla posizione unica di Agent S all'interno dello spazio crittografico, poiché automatizza compiti complessi e multi-fase con un intervento umano minimo. Man mano che il progetto evolve, le sue potenziali applicazioni in Web3 potrebbero ridefinire il modo in cui si svolgono le interazioni digitali. Cronologia di Agent S Lo sviluppo e le tappe di Agent S possono essere riassunti in una cronologia che evidenzia i suoi eventi significativi: 27 Settembre 2024: Il concetto di Agent S è stato lanciato in un documento di ricerca completo intitolato “Un Framework Agentico Aperto che Usa i Computer Come un Umano”, mostrando le basi per il progetto. 10 Ottobre 2024: Il documento di ricerca è stato reso pubblicamente disponibile su arXiv, offrendo un'esplorazione approfondita del framework e della sua valutazione delle prestazioni basata sul benchmark OSWorld. 12 Ottobre 2024: È stata rilasciata una presentazione video, fornendo un'idea visiva delle capacità e delle caratteristiche di Agent S, coinvolgendo ulteriormente potenziali utenti e investitori. Questi indicatori nella cronologia non solo illustrano i progressi di Agent S, ma indicano anche il suo impegno per la trasparenza e il coinvolgimento della comunità. Punti Chiave su Agent S Man mano che il framework Agent S continua a evolversi, diversi attributi chiave si distinguono, sottolineando la sua natura innovativa e il potenziale: Framework Innovativo: Progettato per fornire un uso intuitivo dei computer simile all'interazione umana, Agent S porta un approccio nuovo all'automazione dei compiti. Interazione Autonoma: La capacità di interagire autonomamente con i computer attraverso GUI segna un passo avanti verso soluzioni informatiche più intelligenti ed efficienti. Automazione di Compiti Complessi: Con la sua metodologia robusta, può automatizzare compiti complessi e multi-fase, rendendo i processi più veloci e meno soggetti a errori. Miglioramento Continuo: I meccanismi di apprendimento consentono ad Agent S di migliorare dalle esperienze passate, migliorando continuamente le sue prestazioni e la sua efficacia. Versatilità: La sua adattabilità attraverso diversi ambienti operativi come OSWorld e WindowsAgentArena garantisce che possa servire un'ampia gamma di applicazioni. Man mano che Agent S si posiziona nel panorama di Web3 e delle criptovalute, il suo potenziale per migliorare le capacità di interazione e automatizzare i processi segna un significativo avanzamento nelle tecnologie AI. Attraverso il suo framework innovativo, Agent S esemplifica il futuro delle interazioni digitali, promettendo un'esperienza più fluida ed efficiente per gli utenti in vari settori. Conclusione Agent S rappresenta un audace passo avanti nell'unione tra AI e Web3, con la capacità di ridefinire il modo in cui interagiamo con la tecnologia. Sebbene sia ancora nelle sue fasi iniziali, le possibilità per la sua applicazione sono vaste e coinvolgenti. Attraverso il suo framework completo che affronta sfide critiche, Agent S mira a portare le interazioni autonome al centro dell'esperienza digitale. Man mano che ci addentriamo nei regni delle criptovalute e della decentralizzazione, progetti come Agent S giocheranno senza dubbio un ruolo cruciale nel plasmare il futuro della tecnologia e della collaborazione uomo-computer.

408 Totale visualizzazioniPubblicato il 2025.01.14Aggiornato il 2025.01.14

Cosa è AGENT S

Come comprare S

Benvenuto in HTX.com! Abbiamo reso l'acquisto di Sonic (S) semplice e conveniente. Segui la nostra guida passo passo per intraprendere il tuo viaggio nel mondo delle criptovalute.Step 1: Crea il tuo Account HTXUsa la tua email o numero di telefono per registrarti il tuo account gratuito su HTX. Vivi un'esperienza facile e sblocca tutte le funzionalità,Crea il mio accountStep 2: Vai in Acquista crypto e seleziona il tuo metodo di pagamentoCarta di credito/debito: utilizza la tua Visa o Mastercard per acquistare immediatamente SonicS.Bilancio: Usa i fondi dal bilancio del tuo account HTX per fare trading senza problemi.Terze parti: abbiamo aggiunto metodi di pagamento molto utilizzati come Google Pay e Apple Pay per maggiore comodità.P2P: Fai trading direttamente con altri utenti HTX.Over-the-Counter (OTC): Offriamo servizi su misura e tassi di cambio competitivi per i trader.Step 3: Conserva Sonic (S)Dopo aver acquistato Sonic (S), conserva nel tuo account HTX. In alternativa, puoi inviare tramite trasferimento blockchain o scambiare per altre criptovalute.Step 4: Scambia Sonic (S)Scambia facilmente Sonic (S) nel mercato spot di HTX. Accedi al tuo account, seleziona la tua coppia di trading, esegui le tue operazioni e monitora in tempo reale. Offriamo un'esperienza user-friendly sia per chi ha appena iniziato che per i trader più esperti.

830 Totale visualizzazioniPubblicato il 2025.01.15Aggiornato il 2025.03.21

Come comprare S

Discussioni

Benvenuto nella Community HTX. Qui puoi rimanere informato sugli ultimi sviluppi della piattaforma e accedere ad approfondimenti esperti sul mercato. Le opinioni degli utenti sul prezzo di S S sono presentate come di seguito.

活动图片