历史上的今天|5 月 5 日
2013 年的今天,F2Pool 正式创立,这是中国最早的一家比特币矿池,巅峰时一度占据比特币全网三分之一的算力。(Foresight News)
2013 年的今天,F2Pool 正式创立,这是中国最早的一家比特币矿池,巅峰时一度占据比特币全网三分之一的算力。(Foresight News)
Odaily Planet Daily News: Matrixport published an article on X platform stating that in the past year, crypto Twitter has been calling for a rebound in altcoins almost every month, but none of them have been successful. But the rebound of altcoins is not driven by chart patterns or some assumed actions that lag behind Bitcoin. On the contrary, they rely on the decline of Bitcoin's dominant position and the increase of the total cryptocurrency market value. As Bitcoin's dominant position climbs, Ethereum performs poorly and few other cryptocurrencies have become trusted competitors in this cycle. Without a strong alternative narrative or leadership, other cryptocurrencies may continue to fall behind. Our other cryptocurrency performance models currently support this view, let's continue to look at things like Bitcoin.
According to BlockBeats news, on May 5th, according to the official announcement of SanShang YuYa Meme Coin, the valid subscription addresses for this pre-sale are 17560, and the total valid subscription amount is 23320.74 SOLs. The team identified over 21000 junk transactions, which attempted to submit SOLs of less than 0.002, totaling approximately 1.158 SOLs. Therefore, addresses with a deposit of ≥ 0.002 SOL will receive Mikami coins proportionally.
According to the official blog announcement of IOTA, the IOTA Rebased mainnet upgrade has officially started today (May 5, 2025) at 9am Central European Summer Time (4pm Beijing/Tokyo Time). This upgrade marks the migration of the network from the original Stardust mainnet to the new IOTA network. The upgrade process is carried out through a "Genesis Ceremony" jointly performed by the IOTA Foundation and 12 initial validators including DLT Green, P2P, Luganodes, KILN, Stakin, etc., involving steps such as shutting down the old network, generating ledger snapshots, verifying data, creating and signing genesis blocks, and launching a new network. For IOTA token holders, this upgrade is seamless, without the need for token migration, and the assets are secure. But users need to prepare the private key, mnemonic words, or Firefly/Bloom Stronghold backup file of the original wallet in order to import and access assets in the new official wallet (browser extension form, which will replace the no longer supported Firefly desktop wallet). Users using the Ledger hardware wallet also need to install a new version of the IOTA Ledger application that is compatible with the new mainnet. During the upgrade period, most exchanges that support IOTA will temporarily suspend the recharge and withdrawal services of IOTA tokens, and are expected to resume normal operations shortly after the upgrade is completed. IOTA EVM is expected to resume operation within 4 to 8 hours after the main network is started.
BlockBeats news, on May 5th, according to CoinDesk, Kyrgyzstan plans to launch a gold backed stablecoin pegged to the US dollar in the third quarter - the USDKG. The stablecoin will be supported by $500 million in gold from the Kyrgyzstan Ministry of Finance and plans to expand its reserves to $2 billion. The report states that USDKG is designed specifically for cross-border and international trade, initially focusing on Central Asia and expanding to Southeast Asia and the Middle East in the future.
Odaily Planet Daily News: In response to the naming tag BattleTested proposed by community member Daniel Wang for Stage 2 of the L2 network, Ethereum co-founder Vitalik posted on the X platform, saying, "This is a good reminder that Stage 2 is not the only factor affecting security, and the quality of the underlying proof system is equally important. This is a simplified mathematical model that shows when to enter Stage 2: Each member of the Security Council has a 10% chance of independent 'breaking'; We consider activity failure (refusal of signature or key access) and security failure (signing the wrong thing or key being hacked) as equally likely; Goal: Minimize the likelihood of protocol collapse under the above assumptions. *Stage 0 Security Council is 4/7, Stage 1 is 6/8; Please note that these assumptions are very incomplete. In fact, members of the Security Council have a "common pattern failure": they may collude, or all be coerced or hacked in the same way, and so on. This makes both Stage 0 and Stage 1 less secure than shown in the model, so entering Stage 2 earlier than implied by the model is the best choice. In addition, please note that by turning the proof system itself into a multi signature of multiple independent systems, the probability of the proof system crashing can be greatly reduced (which is what I advocated in my previous proposal). I suspect that all second phase deployments in previous years will be like this. Considering these factors, this is a chart. The X-axis represents the probability of system failure. The Y-axis represents the probability of protocol collapse. As the quality of the proof system improves, the optimal stage shifts from stage 0 to stage 1, and then from stage 1 to stage 2. Using the quality proof system of Stage 0 for Stage 2 is the worst. In short, @ l2beat should ideally demonstrate proof of system auditing and maturity metrics (preferably proof of system implementation rather than the entire summary so that we can reuse it) as well as stages