Bytecoin team has churned out full release of Amethyst that brings a slew of updates to retool the Bytecoin platform.

Bytecoin team has churned out full release of Amethyst that brings a slew of updates to retool the Bytecoin platform.

NavCoin already offers some basic privacy but recently, a new request for Zerocoin support (ZeroCT) has been added as pull request on Github. To send a ZeroCT transaction, user will have to pay 1 NAV per transaction and it can also be spent in these denominations – 1, 5, 10, 50, 100, 500, 1000, 5000.


Vertcoin One Click Miner has entered open BETA which means anyone with a powerful processor or graphics card can mine Vertcoin. It is currently available for download from their slack channel but one of our readers shared its mega address which is more convenient to download. Updated – Feb 7th 2019
Some users on reddit are reporting that they received few Nano coins in their wallet. One user who sent 80 Nano coins back in November 2018 received another 80 today.


If you are new to this cryptocurrency world or you are already an OG, it is very important to safely store your coins and tokens. You see, if you own multiple coins, you will have to install an app for each type of cryptocurrency. For example, if you want to manage your bitcoin wallet, you need to install official bitcoin app and so on.
Few days back, Bittorrent ICO was done and it raised 7.2 million dollars in matter of few minutes. For the ICO, only TRX and BNB tokens were accepted.
Thanks to new features added to the Bytecoin platform, users will now be able to launch their own BCN based gateways to their blockchains. The foundation of this initiative was laid out by the launch of the“Amethyst” v.3.4.0 Beta in December 2018, in which users were given the option of using auditable wallets.

Anyone that held 1 BCH *before* the fork will have 2 tokens after the fork – 1 BCH (ABC) and 1 BSV, aka Bitcoin SV.

Students from Decentralized Systems Lab have identified more than 26 cryptocurrencies that are vulnerable to “Fake Stake” attack. In this, an attack with small amount of stake could crash any of the network nodes running the corresponding software.