- REGS update.
- Vault12 guard product update.
- Did you first encounter encryption inheritance? Start here.
The elections are behind the 2024 election, and this year is a pivotal to #Crypto policy and innovation. So I am pleased with the stage DC Block Chain Summit 2025 On March 26, my panel is “the way of thinking of retail investors,” and I will be with etoro and kalshi.com.
Don’t miss the opportunity to be a member of the conversation that drives better tomorrow! https://bit.ly/dcb25Discount code: Vault1220
date: March 26, 2025
hour: 9 am -5 pm
Live Stream: Here 26 days or on the rumble.
Thank you for reading Vault12 encryption inheritance newsletter! Subscribe for free and receive a new post and support my work.
Regs update
Well, I am in Washington, DC this week -very important weekly weekly weeks -this week is the end of the confirmation hearing of Paul Atkins for the chairman of the SEC. Leaving him in place increases the driving force for encryption regulations. His team is not busy.
- SEC encryption task force In accordance with the Federal Securities Act, the first roundtable meeting was held on the classification of password assets. It is available to public opinions and roundtable meetings.
- President Trump He said in the Blockworks Digital Asset Summit in New York: “We are ending the last regulatory war of encryption and Bitcoin, which includes blocking illegal operation chok points 2.0, which was a form of law through government weapons, but from January 20, 2025, 2025, 2025 It’s over. ” (note)
- exchequer Removal Tornado cash In the SDN list, it effectively unleashes the sanctions for the protocol. press release. Torney has not yet removed sanctions from cash producers.
- SEC statement I clarified it Protocol mining is not considered securities sales. (No official disclosure yet -based on the recent disclosure and industrial reports.)
- Hester peirce commissioner I sent a signal for the coming guidance NFT classificationSome suggest that they may be outside the securities law. Full article.
- The SEC CRYPTO TASK Force was first hosted in a series of roundtable meetings on how we arrived here and how to define security status. The public can read the recording of the roundtable live stream and read the opinion (opinion) (COINDESK Video)
Vault12 guard product update
Last month we previewed the update for the Vault12 Guard living in the App Store and included the following features.
- Now in Mac and iPad -fully official support through App Store.
- Drag and drop in the MAC -Immediately add assets to the safe with a simple gesture.
- Search for more password wallets -now compatible with more than 20 wallets.
The following release set can integrate various important updates to integrate health checkups for safes and guardians to check and obtain inheritance demo mode (you can see how the inheritance works without actually transferring assets.
In addition, we are studying VGT rewards and incentives, and we will preview these rewards in discord channels. Rewards have always been part of the Vault12 ecosystem, but have been suspended due to uncertainty about regulations. Now we will bring them back and use the app and enable the whole utilities to allow others to use the app. Sign up for Vault12 Discord here.
Did you first encounter encryption inheritance? Start here.
Are you worried about putting encryption on the exchange?
Perhaps a large -scale ($ 1.4 billion) of February Dubit Exchange Hack attracted attention. Fortunately, customer assets seem to be guaranteed… This never suggests that all the exchange hacking of the future will end too neat. The main lesson of digital asset owners is that even professionals are vulnerable to deceive by sophisticated attackers. It is important to understand the concept of a third -party custody of assets. As described at a high level in the reason why you should be interested in Cryptocurrency Security, there is a general trap to trust others to protect assets.
Digital asset privacy is still controversial.
One of the remaining problems in Digital Assets Space is personal information. Digital privacy is in many ways. What should government agencies, encryption exchange and the general public know what digital asset ownership and transactions? There is a vast illegal interest that can be abused by the balance of “needed” and elaborate bad actors. One aspect of this delicate balance became clear when the US parliament declared that the US Congress was not obliged to report taxpayers’ profits from password sales to internal revenue services. (Of course American citizens still have to!) As a digital asset owner, if you want to review memory on how to protect your personal information, don’t miss the article, “Why is it important for personal information protection?”. This problem explores related issues and provides practical recommendations.
Cats and mouse evolution of encryption fraud and hacking
On March 10, 2025, the California Financial Protection and Innovation Bureau (DFPI) updated the encryption threat catalog, reported on numerous fraudulent websites taken in 2024, and issued a new warning to keep the digital asset owners on all kinds of tricks. Recognizing the evolving threat environment and reducing risks according to the best practices. In the “11 things needed for a safe encryption environment”, reconsider the protection habits with the help of the recommendations that can be executed.