ReportWire

Tag: hack

  • NY sues crypto firms, FTX’s Nishad faces 75 years in jail, and Grayscale’s new BTC filing: Hodler’s Digest, Oct. 15-21

    NY sues crypto firms, FTX’s Nishad faces 75 years in jail, and Grayscale’s new BTC filing: Hodler’s Digest, Oct. 15-21

    Top Stories This Week

    Grayscale files for new spot Bitcoin ETF on NYSE Arca

    Major cryptocurrency investment firm Grayscale Investments has filed a new application with the U.S. Securities and Exchange Commission for a new spot Bitcoin exchange-traded fund (ETF). The new filing aligns with Grayscale’s ongoing effort to convert its Grayscale Bitcoin Trust into a spot Bitcoin ETF, according to a statement from the firm. The news comes weeks after Grayscale won an SEC lawsuit for its spot Bitcoin ETF review, with a court of appeals ordering the SEC to explain why it rejected Grayscale’s application in June 2023. The company also filed with the SEC to list an Ether futures ETF in September.

    New York Attorney General sues Gemini, Genesis, DGC for allegedly defrauding investors

    New York’s attorney general has filed a lawsuit against cryptocurrency firms Gemini, Genesis and Digital Currency Group (DCG) for allegedly defrauding more than 23,000 investors through the Gemini Earn investment program. The suit claims that Gemini assured investors that the program was a low-risk investment, while investigations carried out by the office of New York State Attorney General Letitia James found that Genesis’ financials “were risky.” The lawsuit also charges Genesis’ former CEO, Soichiro Moro, and its parent company’s CEO, Barry Silbert, with defrauding investors by attempting to conceal more than $1.1 billion in losses. In addition, the court case looks to ban Gemini, Genesis and DCG from operating in the financial investment industry in New York.

    Former FTX engineering director faces up to 75 years in prison following guilty plea

    Nishad Singh, the former engineering director at now-defunct crypto exchange FTX, faces up to 75 years in prison for charges related to defrauding users of the crypto exchange. He pleaded guilty to fraud charges as part of his cooperation agreement with the U.S. prosecutors. During his testimony this week, Singh said that when liquidity issues at FTX began in November 2022, he felt “suicidal for some days” while dealing with alleged inconsistencies between the exchange’s public statements and its activities behind the scenes. Singh also claimed that Bankman-Fried had the habit of deciding on purchases through Alameda Research by himself.



    Binance shutting down European Visa debit card in December

    Binance Visa debit card services will close down in the European Economic Area in December, marking the latest setback for Binance. The termination of the card services was announced a day after the exchange restored euro deposits and withdrawals, which had been unavailable for a month after payments processor Paysafe dropped the exchange. Binance is still not onboarding new users in the United Kingdom due to the loss of a third-party service provider.

    Elon Musk, Mark Cuban team up to contest SEC trial strategies

    Elon Musk, Mark Cuban and others have collaboratively submitted a shared amicus brief to the Supreme Court of the United States to raise concerns about the U.S. Securities and Exchange Commission’s (SEC) approach to conducting internal proceedings without the inclusion of juries. The context of this legal challenge centers around the SEC vs. Jarkesy case. George Jarkesy argues that the SEC’s internal adjudication process, which lacks a jury and is overseen by an administrative law judge appointed by the commission, contradicts his Seventh Amendment rights. Effectively resulting in a single entity fulfilling the roles of judge, jury and enforcer.

    Winners and Losers

    At the end of the week, Bitcoin (BTC) is at $29,590, Ether (ETH) at $1,607 and XRP at $0.52. The total market cap is at $1.12 trillion, according to CoinMarketCap.

    Among the biggest 100 cryptocurrencies, the top three altcoin gainers of the week are Bitcoin SV (BSV) at 59.00%, Stacks (STX) at 25.91% and MX TOKEN (MX) at 25.26%. 

    The top three altcoin losers of the week are Conflux (CFX) at -8.03%, Frax Share (FXS) and Sui (SUI) at -6.35%.

    For more info on crypto prices, make sure to read Cointelegraph’s market analysis.

    Read also


    Features

    Unforgettable: How Blockchain Will Fundamentally Change the Human Experience


    Features

    The Metaverse is awful today… but we can make it great: Yat Siu, Big Ideas

    Most Memorable Quotations

    “We are all part of a bigger game, and Bitcoin is one of the strongest levers in that.”

    Edward Snowden, technologist and whistleblower

    “Using publicly available information to learn is not stealing. Nor is it an invasion of privacy, conversion, negligence, unfair competition, or copyright infringement.”

    Google

    “I felt betrayed, something I’d put in blood, sweat and tears for five years turning out so horrible.”

    Nishad Singh, former engineering director of FTX

    “The games funded 2 years ago are going live over the next 12 months. We will see hits.”

    Robbie Ferguson, co-founder and president of Immutable

    “After extensive DAO forum discussion followed by community vote, the sunsetting of the Lido on Solana protocol was approved by Lido token holders and the process will begin shortly.”

    Lido Finance

    “Any innovation — especially this one with financial impact, cultural value and status — will attract questioning during its downs.”

    Anjali Young, co-founder of Collab.Land

    Prediction of the Week 

    BTC price hits 2-month high amid bet Bitcoin will break $32K ‘soon’

    On Oct. 20, data from Cointelegraph Markets Pro and TradingView captured new two-month Bitcoin highs of $30,233 on Bitstamp. BTC price showed continued strength during the Asia trading session on the same day, with a slight comedown taking the spot price back below $29,500.

    With volatility still evident, market participants argued that a weekly candle close was needed in order to establish the rally’s true staying power. For Keith Alan, co-founder of monitoring resource Material Indicators, the 100-week moving average (MA) at $28,627 was of particular importance.

    “This move is one to watch, but what I’m watching for right now is to see if this Weekly candle closes above the 100-Week MA and if next week’s candle can stay above it with no wicks below,” Alan wrote in part of an X post on the day. “Some might consider that a confirmation of a bull breakout, but this market is known for squeezes and fake outs so I’m looking for more confirmations. For me BTC will also need to take out prior resistance at $30.5k, $31.5k and ultimately $33k to call a bull breakout confirmed and validated.”

    FUD of the Week 

    Fantom Foundation hot wallet hacked for $550K

    The Fantom Foundation, the developer of the Fantom network, has been hacked for over $550,000 worth of cryptocurrency. The foundation confirmed the attack on X, claiming that most of the funds stolen belonged to other users and that 99% of the foundation’s funds remain safe. Blockchain security researchers initially reported that the attacker stole approximately $7 million in crypto. The Fantom Foundation later released an official statement saying that some of the wallets labeled “Fantom: Foundation wallet” were mislabeled by block explorers and that not all the stolen funds were from the foundation.

    TrueCoin’s third-party vendor breach potentially leaks TUSD user data

    TrueUSD (TUSD) announced a potential leak of certain Know Your Customer (KYC) and transaction history data after one of TrueCoin’s third-party vendors was compromised. The company was the operator of the TUSD stablecoin until July 13, 2023. The impact of the attack and the resultant data leak is yet to be identified, as the total number of users’ data was not revealed during the announcement. Data collected from such breaches — names, email addresses and phone numbers, among others — are typically used for phishing attacks. Attackers reach out to unwary investors by mimicking various crypto services, often promising high profits in short amounts of time.

    Web3 game project allegedly hired actors to pose as executives in $1.6M exit scam

    The development team for gaming project FinSoul carried out an alleged exit scam, siphoning away $1.6 million from investors through market manipulation, according to a recent report from blockchain security platform CertiK shared with Cointelegraph. The FinSoul team allegedly hired paid actors to pretend to be its executives, then raised funds for the sole purpose of developing a gaming platform. However, instead of actually creating the platform, the FinSoul team allegedly transferred $1.6 million in bridged Tether from investors to itself. Blockchain data indicates developers then laundered the funds through cryptocurrency mixer Tornado Cash.

    Big Questions: What did Satoshi Nakamoto think about ZK-proofs?

    What was once a passing interest of Bitcoin inventor Satoshi Nakamoto, zero-knowledge-proof technology is now a major part of the crypto world.

    Ethereum restaking: Blockchain innovation or dangerous house of cards?

    “Restaking” involves reusing staked Ether to earn fees and rewards. The restaked tokens can then help secure and validate other protocols. But many fear restaking could disrupt Ethereum’s chain itself.

    Bitmain’s revenge, Hong Kong’s crypto rollercoaster: Asia Express

    Bitmain allegedly fires staff for speaking out against salary cuts, Hong Kong investors lose faith in crypto after JPEX scandal, Bitget gets a new crypto credit card and more.

    Editorial Staff

    Cointelegraph Magazine writers and reporters contributed to this article.

    Cointelegraph By Editorial Staff

    Source link

  • Cara Delevingne Promises To Delete X Account After Hack: ‘So Many People Got Scammed And I Am Furious!’

    Cara Delevingne Promises To Delete X Account After Hack: ‘So Many People Got Scammed And I Am Furious!’

    By ETCanada.com Staff.

    Cara Delevinge is “furious” after her X (formerly Twitter) account was hacked, and says she’s ready to ditch it entirely.

    On Monday, the model/actress posted a tweet, reading, “I was hacked a week ago and it took so long to be able to get back into my account.”

    “I am going to delete my account so this never happens again.”

    She continued, “If you ever see anything about Mac books or trying to sell anything from this twitter, it is NOT REAL!!! Sorry guys! I sincerely apologize.”

    She followed up with another tweet, slamming the Elon Musk-owned social media platform for taking its sweet time in addressing her hack.

    “I am so angry at twitter or whatever the f*ck it’s called now for taking so long to get my account back!!” she wrote.


    READ MORE:
    Reneé Rapp Drops Debut Album ‘Snow Angel’ & New Music Video Directed By Cara Delevingne

    “So many people got scammed and I am furious,” she added, noting that she will continue to maintain her other accounts on different social media outlets.

    “I am going to delete my account so this never happens again,” she wrote. “Still on instagram, threads and tik tok. Again, I am so sorry for this.”

    As of Wednesday evening, Delevingne’s X account remained active.

    Etcanadadigital

    Source link

  • Exclusive: Chinese hackers attacked Kenyan government as debt strains grew

    Exclusive: Chinese hackers attacked Kenyan government as debt strains grew

    • Cyber spies infiltrated Kenyan networks from 2019
    • Hit finance ministry, president’s office, spy agency and others
    • Sources believe Beijing was seeking info on debt

    NAIROBI, May 24 (Reuters) – Chinese hackers targeted Kenya’s government in a widespread, years-long series of digital intrusions against key ministries and state institutions, according to three sources, cybersecurity research reports and Reuters’ own analysis of technical data related to the hackings.

    Two of the sources assessed the hacks to be aimed, at least in part, at gaining information on debt owed to Beijing by the East African nation: Kenya is a strategic link in the Belt and Road Initiative – President Xi Jinping’s plan for a global infrastructure network.

    “Further compromises may occur as the requirement for understanding upcoming repayment strategies becomes needed,” a July 2021 research report written by a defence contractor for private clients stated.

    China’s foreign ministry said it was “not aware” of any such hacking, while China’s embassy in Britain called the accusations “baseless”, adding that Beijing opposes and combats “cyberattacks and theft in all their forms.”

    China’s influence in Africa has grown rapidly over the past two decades. But, like several African nations, Kenya’s finances are being strained by the growing cost of servicing external debt – much of it owed to China.

    The hacking campaign demonstrates China’s willingness to leverage its espionage capabilities to monitor and protect economic and strategic interests abroad, two of the sources said.

    The hacks constitute a three-year campaign that targeted eight of Kenya’s ministries and government departments, including the presidential office, according to an intelligence analyst in the region. The analyst also shared with Reuters research documents that included the timeline of attacks, the targets, and provided some technical data relating to the compromise of a server used exclusively by Kenya’s main spy agency.

    A Kenyan cybersecurity expert described similar hacking activity against the foreign and finance ministries. All three of the sources asked not to be named due to the sensitive nature of their work.

    “Your allegation of hacking attempts by Chinese Government entities is not unique,” Kenya’s presidential office said, adding the government had been targeted by “frequent infiltration attempts” from Chinese, American and European hackers.

    “As far as we are concerned, none of the attempts were successful,” it said.

    It did not provide further details nor respond to follow-up questions.

    A spokesperson for the Chinese embassy in Britain said China is against “irresponsible moves that use topics like cybersecurity to sow discord in the relations between China and other developing countries”.

    “China attaches great importance to Africa’s debt issue and works intensively to help Africa cope with it,” the spokesperson added.

    THE HACKS

    Between 2000 and 2020, China committed nearly $160 billion in loans to African countries, according to a comprehensive database on Chinese lending hosted by Boston University, much of it for large-scale infrastructure projects.

    Kenya used over $9 billion in Chinese loans to fund an aggressive push to build or upgrade railways, ports and highways.

    Beijing became the country’s largest bilateral creditor and gained a firm foothold in the most important East African consumer market and a vital logistical hub on Africa’s Indian Ocean coast.

    By late 2019, however, when the Kenyan cybersecurity expert told Reuters he was brought in by Kenyan authorities to assess a hack of a government-wide network, Chinese lending was drying up. And Kenya’s financial strains were showing.

    The breach reviewed by the Kenyan cybersecurity expert and attributed to China began with a “spearphishing” attack at the end of that same year, when a Kenyan government employee unknowingly downloaded an infected document, allowing hackers to infiltrate the network and access other agencies.

    “A lot of documents from the ministry of foreign affairs were stolen and from the finance department as well. The attacks appeared focused on the debt situation,” the Kenyan cybersecurity expert said.

    Another source – the intelligence analyst working in the region – said Chinese hackers carried out a far-reaching campaign against Kenya that began in late 2019 and continued until at least 2022.

    According to documents provided by the analyst, Chinese cyber spies subjected the office of Kenya’s president, its defence, information, health, land and interior ministries, its counter-terrorism centre and other institutions to persistent and prolonged hacking activity.

    The affected government departments did not respond to requests for comment, declined to be interviewed or were unreachable.

    By 2021, global economic fallout from the COVID-19 pandemic had already helped push one major Chinese borrower – Zambia – to default on its external debt. Kenya managed to secure a temporary debt repayment moratorium from China.

    In early July 2021, the cybersecurity research reports shared by the intelligence analyst in the region detailed how the hackers secretly accessed an email server used by Kenya’s National Intelligence Service (NIS).

    Reuters was able to confirm that the victim’s IP address belonged to the NIS. The incident was also covered in a report from the private defence contractor reviewed by Reuters.

    Reuters could not determine what information was taken during the hacks or conclusively establish the motive for the attacks. But the defence contractor’s report said the NIS breach was possibly aimed at gleaning information on how Kenya planned to manage its debt payments.

    “Kenya is currently feeling the pressure of these debt burdens…as many of the projects financed by Chinese loans are not generating enough income to pay for themselves yet,” the report stated.

    A Reuters review of internet logs delineating the Chinese digital espionage activity showed that a server controlled by the Chinese hackers also accessed a shared Kenyan government webmail service more recently from December 2022 until February this year.

    Chinese officials declined to comment on this recent breach, and the Kenyan authorities did not respond to a question about it.

    ‘BACKDOOR DIPLOMACY’

    The defence contractor, pointing to identical tools and techniques used in other hacking campaigns, identified a Chinese state-linked hacking team as having carried out the attack on Kenya’s intelligence agency.

    The group is known as “BackdoorDiplomacy” in the cybersecurity research community, because of its record of trying to further the objectives of Chinese diplomatic strategy.

    According to Slovakia-based cybersecurity firm ESET, BackdoorDiplomacy re-uses malicious software against its victims to gain access to their networks, making it possible to track their activities.

    Provided by Reuters with the IP address of the NIS hackers, Palo Alto Networks, a U.S. cybersecurity firm that tracks BackdoorDiplomacy’s activities, confirmed that it belongs to the group, adding that its prior analysis shows the group is sponsored by the Chinese state.

    Cybersecurity researchers have documented BackdoorDiplomacy hacks targeting governments and institutions in a number of countries in Asia and Europe.

    Incursions into the Middle East and Africa appear less common, making the focus and scale of its hacking activities in Kenya particularly noteworthy, the defence contractor’s report said.

    “This angle is clearly a priority for the group.”

    China’s embassy in Britain rejected any involvement in the Kenya hackings, and did not directly address questions about the government’s relationship with BackdoorDiplomacy.

    “China is a main victim of cyber theft and attacks and a staunch defender of cybersecurity,” a spokesperson said.

    Reporting by Aaron Ross in Nairobi, James Pearson in London and Christopher Bing in Washington
    Additional reporting by Eduardo Baptista in Beijing
    Editing by Chris Sanders and Joe Bavier

    Our Standards: The Thomson Reuters Trust Principles.

    Aaron Ross

    Thomson Reuters

    West & Central Africa correspondent investigating human rights abuses, conflict and corruption as well as regional commodities production, epidemic diseases and the environment, previously based in Kinshasa, Abidjan and Cairo.

    James Pearson

    Thomson Reuters

    Reports on hacks, leaks and digital espionage in Europe. Ten years at Reuters with previous postings in Hanoi as Bureau Chief and Seoul as Korea Correspondent. Author of ‘North Korea Confidential’, a book about daily life in North Korea. Contact: 447927347451

    Christopher Bing

    Thomson Reuters

    Award-winning reporter covering the intersection between technology and national security with a focus on how the evolving cybersecurity landscape affects government and business.

    Source link

  • Twitter Sued Over Data Breach After Hack Site Claims 200 Million Compromised Accounts

    Twitter Sued Over Data Breach After Hack Site Claims 200 Million Compromised Accounts

    A Twitter user has sued the company over a data breach, days after an internet hacker site posted information allegedly gleaned from more than 200 million accounts.

    New York state resident Stephen Gerber claims in his lawsuit, filed Friday in federal court in San Francisco, that his personal information was among data collected by Twitter hackers from July 2021 to January 2022. He seeks class-action status for all those whose information may have been hacked, and asked the court for unspecified monetary damages as well as an order requiring Twitter to hire third-party security auditors.

    Gerber’s lawsuit blames a “defect” in Twitter’s application programming interface that allowed “cybercriminals to ‘scrape’ data from Twitter.”

    The “compromised information” included user names, emails and phone numbers that could be used in phishing scams, the lawsuit says.

    Twitter admitted in August that some 5.4 million accounts had been breached when a “bad actor” obtained personal information through an unspecified “vulnerability in Twitter’s systems.”

    “Affected users” and authorities were “promptly notified,” and the “vulnerability” was fixed, said Twitter.

    Twitter insisted in a blog post last week that there was “no evidence that the data now being sold online was obtained by exploiting a vulnerability of Twitter systems.” The data is “likely a collection of data already publicly available online through different sources,” the company said. Twitter didn’t immediately respond to Gerber’s lawsuit.

    An anonymous poster on the hacker site BreachForums early this month published a database claiming to contain basic information about hundreds of millions of Twitter users.

    Gerber’s lawsuit says Twitter has “seemingly buried its head in the sand about the magnitude” of the hack.

    Twitter is grappling with a number of other lawsuits. It was recently sued by one of its San Francisco landlords claiming nonpayment of rent, and by Canary Marketing and Imply Data Inc. for allegedly failing to pay for services.

    Twitter workers fired by owner Elon Musk as part of a massive staff reduction after he bought the company for $44 billion last year failed to win class-action status in a San Francisco court Friday.

    U.S. District Judge James Donato ruled that five former Twitter employees accusing the company of failing to give adequate notice before their firing must press their claims in private arbitration because of employment agreements they signed with the company, CNN reported.

    Source link

  • Exploiting The Lightning Bug Was The Ethical Choice

    Exploiting The Lightning Bug Was The Ethical Choice

    This is an opinion editorial by Shinobi, a self-taught educator in the Bitcoin space and tech-oriented Bitcoin podcast host.

    For the second time in roughly a month, btcd/LND have had a bug exploited which caused them to deviate in consensus from Bitcoin Core. Once again, Burak was the developer who triggered this vulnerability — this time it was clearly intentional — and once again, it was an issue with code for parsing Bitcoin transactions above the consensus layer. As I discussed in my piece on the prior bug that Burak triggered, before Taproot there were limits on how large the script and witness data in a transaction could be. With the activation of Taproot, those limits were removed leaving only the limitations on the block size limit itself to limit these parts of individual transactions. The problem with the last bug was that despite the fact that the consensus code in btcd was properly upgraded to reflect this change, the code handling peer-to-peer transmission — including parsing data before sending or when receiving — did not properly upgrade. So the code processing blocks and transactions before it actually got passed off to be validated for consensus failed the data, never passed it to the consensus validation logic and the block in question failed to ever be validated.

    Shinobi

    Source link

  • Another Bug Briefly Took Down Part Of The Lightning Network

    Another Bug Briefly Took Down Part Of The Lightning Network

    The below is a direct excerpt of Marty’s Bent Issue #1278: “Another LND/btcd bug emerges.” Sign up for the newsletter here.

    via GitHub

    For the second time in less than a month, btcd (an alternative implementation of Bitcoin) and, by extension, LND (one of the Lightning implementations) became incompatible with the rest of the Bitcoin network due to some meddling from a developer named Burak.

    Marty Bent

    Source link

  • Crypto.com Admits $35 Million Hack

    Crypto.com Admits $35 Million Hack

    Crypto.com, one of the biggest and best known cryptocurrency exchanges in the world now backed by superstar actor Matt Damon, has admitted that 483 of its users were hit in a hack earlier this month, leading to unauthorized withdrawals of bitcoin and Ether worth $35 million. The company had initially said $15 million was taken in the heist.

    “On 17 January 2022, Crypto.com learned that a small number of users had unauthorized crypto withdrawals on their accounts,” Cyrpto.com wrote in a post on Thursday. “Crypto.com promptly suspended withdrawals for all tokens to initiate an investigation and worked around the clock to address the issue. No customers experienced a loss of funds. In the majority of cases we prevented the unauthorized withdrawal, and in all other cases customers were fully reimbursed.”

    The company said that on Monday it saw that for a handful of accounts, transactions were being approved without the second-factor of authentication (the additional one-time code beyond the password allowing access to an account) being entered by a user. As it investigated, all withdrawals across Crypto.com were put on hold, lasting 14 hours. It then required all customers to login again and go through a new two-factor authentication process.

    As an additional measure, Crypto.com introduced a feature that means when a new address is added as a payee on an account, the user will get notifications and have 24 hours to cancel any payment if they didn’t authorize it.

    Finally, it’s announced the Worldwide Account Protection Program (WAPP), promising to restore funds up to $250,000 for users who qualify. To qualify, users have to be using multi-factor authentication and have filed a police report that it can show Crypto.com. “While we are reminded of the existence of bad actors intent on committing fraud, this new Worldwide Account Protection Program, along with our new MFA [multi-factor authentication] infrastructure, gives our users unprecedented protection of their funds, and hopefully, peace of mind,” said Kris Marszalek, cofounder and CEO of Crypto.com.

    There remains little in the way of an explanation of how the attack actually occurred, however. The internal investigation continues.

    The company has been making a name for itself of late with partnerships with Matt Damon and Water.org, as well as its purchase of the naming rights to the Staples Center in Los Angeles.

    The breach at Crypto.com is one of many hacks resulting in multimillion losses in the cryptocurrency industry. Indeed, it pales in comparison to the huge $600 million theft that hit blockchain-based platform Poly Network. That story took a strange turn when the hacker gave back all the funds.

    Thomas Brewster, Forbes Staff

    Source link

  • Nextube – The First Hackable Nixie Clock Inspired Modern Display

    Nextube – The First Hackable Nixie Clock Inspired Modern Display

    Rotrics announces launch of Nextube – a nixie clock inspired modern display on Kickstarter

    Rotrics is excited to announce that they have launched their latest creation: Nextube, the first hackable nixie clock inspired modern display on Kickstarter. It’s a retro-style modern display that revives the beautiful warm glow of the nixie tube and at the same time shows you the key metrics of modern life. 

    “Nixie tubes were introduced in the mid-1950s for numerals display but soon fell out of favor because of new LED display tech. But as time passes, it is becoming a legendary symbol for retro tech lovers like us,” said the inventor of Nextube, James Wong, and he continues, “We use modern IPS screens to revive the beautiful warm orange low of nixie tubes, and this isn’t just some exercise in nostalgia, Nextube can not only give you the time but also tells you the weather, shows you key metrics, changes your space vibe, and even visualize your favorite music. It’s a display limited only by your imagination.”

    Rotrics is designing Nextube as a versatile display for all kinds of needs. Beyond a clock, it is a reliable time manager, a smart weather station, a music spectrum analyzer, a social media tracker, and a full-RGB ambient backlight. For retro-tech enthusiasts, it’s a time machine that brings you back to the 60s. For up-to-minute technophiles, it keeps tracking important information for your work and life. With the accompanying software, it provides tons of built-in display interfaces to choose from, and it’s easy for users to customize their own display. And best of all, open-source firmware is provided for higher-level customization.

    “Love the design and functionality; a perfect bridge between ‘old’ & new.” “Like the aesthetic + the variety of display options and further customization with the use of customized firmware.” Comments from Nextube backers. 

    After the success of the first crowdfunding campaign, the Rotrics team hopes to bring Nextube to life through Kickstarter, with the campaign launching on August 17, 2021. In the first week, they have already raised over $270,000 with support from over 1,900 backers, and are featured on Kickstarter’s “Project We Love”.

    For more information on the details, please visit their campaign page: https://bit.ly/388EEKm

    About Rotrics: 

    Rotrics is formed by a group of experienced engineers and designers who have a passion for innovative electronics, robotics, and gadgets. Back in 2019, their first creation, DexArm, the all-in-one modular desktop robot arm, was brought to life on Kickstarter by over 1,613 backers. Since then, the company has been focusing on creating innovative tech gadgets for creative purposes. 

    [Contact]: Jemma Su
    [Company]: Rotrics
    [URL]: www.rotrics.com
    [Email]: info@rotrics.com

    Source: Rotrics

    Source link