{"id":254710,"date":"2022-08-12T13:15:21","date_gmt":"2022-08-12T12:15:21","guid":{"rendered":"https:\/\/cryptoslate.com\/?p=254710"},"modified":"2023-05-25T02:13:49","modified_gmt":"2023-05-25T01:13:49","slug":"researchers-discover-vulnerabilities-in-bitcoin-layer-2-lightning-network","status":"publish","type":"post","link":"https:\/\/cryptoslate.com\/researchers-discover-vulnerabilities-in-bitcoin-layer-2-lightning-network\/","title":{"rendered":"Researchers discover vulnerabilities in Bitcoin layer-2 Lightning Network"},"content":{"rendered":"<p>Researchers at the University of Illinois have discovered vulnerabilities in the Bitcoin (<a href=\"https:\/\/cryptoslate.com\/news\/bitcoin\/\">BTC<\/a>) <a href=\"https:\/\/cryptoslate.com\/glossary\/lightning-network\/\">Lightning Network<\/a> that could result in the theft of 750 BTCs (roughly $18 million).<\/p>\n<p>The two researchers, Cosimo Sguanci and Anastasios Sidiropoulos, published a <a href=\"https:\/\/arxiv.org\/pdf\/2208.01908.pdf\"><span class=\"s4\">paper<\/span><\/a> where they explained the vulnerability in the Layer 2 network using a hypothetical case where malicious nodes can collude for an attack.<\/p>\n<blockquote><p>&#8220;A coalition of just 30 nodes could lock the funds of 31% of the channels for about 2 months via a zombie attack, and could steal more than 750 BTC via a mass double-spend attack.&#8221;<\/p><\/blockquote>\n<h2>Zombie attack<\/h2>\n<p>According to the paper, a zombie attack is a form of vandalism that congests the network and make the lightning network unusable.<\/p>\n<p>A zombie attack is a scenario where some nodes are unresponsive, thereby locking funds connected to these nodes.<\/p>\n<p>The paper stated that the only way to defend against this attack would be for the honest nodes to close their channel and return to the Bitcoin Layer 1 network. But that will cost a lot in transaction fees.<\/p>\n<h2>Double spend attack<\/h2>\n<p>Another type of mass exit attack discovered by the researchers is the double-spend attack. The attack would require the cooperation of several malicious nodes to overload the Bitcoin Layer 1 blockchain with fraudulent closing transactions.<\/p>\n<p>If the attackers can pay the high fees resulting from the network congestion, they will be able to skip the queue and double spend Bitcoin.<\/p>\n<p>But this attack is only possible when there is a flaw in the configuration of one of the Lightning Networks watchtowers.<\/p>\n<h2>Watchtowers role<\/h2>\n<p>The watchtowers keep track of the state of the Lightning Network and store all data used for regular transactions, also called justice transactions.<\/p>\n<p>Honest nodes will have to submit justice transactions to dispute the fraudulent requests, so if all watchtowers are working effectively, it is easy to ascertain fraudulent channel closing requests.<\/p>\n<p>A poorly maintained watchtower can provide the perfect entry point for a mass double-spend attack, which could significantly affect the victims.<\/p>\n<h2>A double spend attack would be disastrous for the network<\/h2>\n<p>The researchers wrote that a double-spend attack could be the most catastrophic if it happens.<\/p>\n<p>They added that the severity would only increase as the <a href=\"https:\/\/cryptoslate.com\/bitcoin-lightning-payment-volume-increased-400-in-a-year-heres-why\/\">network continues to develop<\/a>, hence the need to deal with the vulnerabilities effectively and immediately.<\/p>\n<p>They concluded by recommending the careful configuration of watchtowers. \u201cIdeally, they should monitor layer-1 congestion and respond aggressively in the case of high congestion,\u201d the paper noted.<\/p>\n<p>The new revelation further adds to the list of <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/lightning-network-discloses-concerning-crypto-vulnerabilities\/\">other <\/a><span class=\"s4\">vulnerabilities on the network, <\/span>such as a Griefing attack, Flood and loot, time dilation eclipse, and pinning.<\/p>\n<p>Meanwhile, despite these vulnerabilities, malicious players have been unable to exploit the network.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Researchers at the University of Illinois have discovered vulnerabilities in the Bitcoin (BTC) Lightning Network that could result in the theft of 750 BTCs (roughly $18 million). The two researchers, Cosimo Sguanci and Anastasios Sidiropoulos, published a paper where they explained the vulnerability in the Layer 2 network using a hypothetical case where malicious nodes [&hellip;]<\/p>\n","protected":false},"author":720,"featured_media":254766,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[77968,78564,37],"tags":[77975,77315],"post_folder":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v21.9 (Yoast SEO v21.9.1) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Researchers discover vulnerabilities in Bitcoin layer-2 Lightning Network<\/title>\n<meta name=\"description\" content=\"Researchers have discovered the vulnerabilities on Bitcoin lightning network that could result in the theft of 750 Bitcoin.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cryptoslate.com\/researchers-discover-vulnerabilities-in-bitcoin-layer-2-lightning-network\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Researchers discover vulnerabilities in Bitcoin layer-2 Lightning Network\" \/>\n<meta property=\"og:description\" content=\"Researchers have discovered the vulnerabilities on Bitcoin lightning network that could result in the theft of 750 Bitcoin.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cryptoslate.com\/researchers-discover-vulnerabilities-in-bitcoin-layer-2-lightning-network\/\" \/>\n<meta property=\"og:site_name\" content=\"CryptoSlate\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-12T12:15:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-25T01:13:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cryptoslate.com\/wp-content\/uploads\/2022\/08\/image_2022-08-12_170743519.png\" \/>\n\t<meta property=\"og:image:width\" content=\"720\" \/>\n\t<meta property=\"og:image:height\" content=\"378\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Oluwapelumi Adejumo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cryptoslate\" \/>\n<meta name=\"twitter:site\" content=\"@cryptoslate\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Oluwapelumi Adejumo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\/\/cryptoslate.com\/researchers-discover-vulnerabilities-in-bitcoin-layer-2-lightning-network\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cryptoslate.com\/researchers-discover-vulnerabilities-in-bitcoin-layer-2-lightning-network\/\"},\"author\":{\"@type\":\"Person\",\"@id\":\"https:\/\/cryptoslate.com\/author\/oluwapelumi-adejumo\/#person\",\"name\":\"Oluwapelumi Adejumo\",\"url\":\"https:\/\/cryptoslate.com\/author\/oluwapelumi-adejumo\/\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cryptoslate.com\/author\/oluwapelumi-adejumo\/\"},\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/cryptoslate.com\/author\/oluwapelumi-adejumo\/#authorimage\",\"url\":\"https:\/\/cryptoslate.com\/wp-content\/uploads\/2025\/12\/profile-photo-oluwapelumi-adejumo-300x300.jpg\",\"contentUrl\":\"https:\/\/cryptoslate.com\/wp-content\/uploads\/2025\/12\/profile-photo-oluwapelumi-adejumo-300x300.jpg\",\"caption\":\"Oluwapelumi Adejumo\"},\"jobTitle\":\"Senior Reporter\",\"description\":\"Oluwapelumi values Bitcoin's potential. He imparts insights on a range of topics like DeFi, hacks, mining and culture, underlining transformative power.\",\"worksFor\":{\"@id\":\"https:\/\/cryptoslate.com\/#organization\"},\"sameAs\":[\"https:\/\/x.com\/hardeyjumoh\",\"https:\/\/www.linkedin.com\/in\/oluwapelumi-adejumo\",\"https:\/\/muckrack.com\/oluwapelumi-adejumo\"]},\"headline\":\"Researchers discover vulnerabilities in Bitcoin layer-2 Lightning Network\",\"datePublished\":\"2022-08-12T12:15:21+00:00\",\"dateModified\":\"2023-05-25T01:13:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cryptoslate.com\/researchers-discover-vulnerabilities-in-bitcoin-layer-2-lightning-network\/\"},\"wordCount\":451,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/cryptoslate.com\/#organization\"},\"keywords\":[\"Bitcoin lightning network\",\"Lightning Network\"],\"articleSection\":[\"Featured\",\"Lightning\",\"Technology\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/cryptoslate.com\/researchers-discover-vulnerabilities-in-bitcoin-layer-2-lightning-network\/#respond\"]}],\"copyrightYear\":\"2022\",\"copyrightHolder\":{\"@id\":\"https:\/\/cryptoslate.com\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cryptoslate.com\/researchers-discover-vulnerabilities-in-bitcoin-layer-2-lightning-network\/\",\"url\":\"https:\/\/cryptoslate.com\/researchers-discover-vulnerabilities-in-bitcoin-layer-2-lightning-network\/\",\"name\":\"Researchers discover vulnerabilities in Bitcoin layer-2 Lightning Network\",\"isPartOf\":{\"@id\":\"https:\/\/cryptoslate.com\/#website\"},\"datePublished\":\"2022-08-12T12:15:21+00:00\",\"dateModified\":\"2023-05-25T01:13:49+00:00\",\"description\":\"Researchers have discovered the vulnerabilities on Bitcoin lightning network that could result in the theft of 750 Bitcoin.\",\"breadcrumb\":{\"@id\":\"https:\/\/cryptoslate.com\/researchers-discover-vulnerabilities-in-bitcoin-layer-2-lightning-network\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cryptoslate.com\/researchers-discover-vulnerabilities-in-bitcoin-layer-2-lightning-network\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cryptoslate.com\/researchers-discover-vulnerabilities-in-bitcoin-layer-2-lightning-network\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cryptoslate.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Researchers discover vulnerabilities in Bitcoin layer-2 Lightning Network\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cryptoslate.com\/#website\",\"url\":\"https:\/\/cryptoslate.com\/\",\"name\":\"CryptoSlate\",\"description\":\"Cryptocurrency News and Real-time Coin Data\",\"publisher\":{\"@id\":\"https:\/\/cryptoslate.com\/#organization\"},\"inLanguage\":\"en-US\"},{\"@type\":\"NewsMediaOrganization\",\"@id\":\"https:\/\/cryptoslate.com\/#organization\",\"name\":\"CryptoSlate\",\"url\":\"https:\/\/cryptoslate.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cryptoslate.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cryptoslate.com\/wp-content\/uploads\/2018\/05\/c-logo.jpg\",\"contentUrl\":\"https:\/\/cryptoslate.com\/wp-content\/uploads\/2018\/05\/c-logo.jpg\",\"width\":1000,\"height\":1000,\"caption\":\"CryptoSlate\"},\"image\":{\"@id\":\"https:\/\/cryptoslate.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/twitter.com\/cryptoslate\",\"https:\/\/www.instagram.com\/cryptoslate\",\"https:\/\/www.linkedin.com\/company\/cryptoslate\",\"https:\/\/www.youtube.com\/c\/cryptoslate\",\"https:\/\/cryptoslate.substack.com\",\"https:\/\/t.me\/cryptoslatenews\",\"https:\/\/www.crunchbase.com\/organization\/cryptoslate\",\"https:\/\/iq.wiki\/wiki\/cryptoslate\",\"https:\/\/news.google.com\/publications\/CAAqKggKIiRDQklTRlFnTWFoRUtEMk55ZVhCMGIzTnNZWFJsTG1OdmJTZ0FQAQ\",\"https:\/\/muckrack.com\/media-outlet\/cryptoslate\",\"https:\/\/www.tiktok.com\/@cryptoslatenews\"],\"publishingPrinciples\":\"https:\/\/cryptoslate.com\/editorial-policy\/#editorial-principles\",\"ownershipFundingInfo\":\"https:\/\/cryptoslate.com\/disclaimers\/how-cryptoslate-makes-and-spends-money\/\",\"correctionsPolicy\":\"https:\/\/cryptoslate.com\/editorial-policy\/#corrections-feedback\",\"ethicsPolicy\":\"https:\/\/cryptoslate.com\/editorial-policy\/#editorial-principles\",\"foundingDate\":\"2017-08-04\",\"founder\":[{\"@type\":\"Person\",\"name\":\"Nate Whitehill\"},{\"@type\":\"Person\",\"name\":\"Matthew Blancarte\"}],\"contactPoint\":[{\"@type\":\"ContactPoint\",\"contactType\":\"customer support\",\"url\":\"https:\/\/cryptoslate.com\/contact\/\",\"availableLanguage\":\"en-US\"},{\"@type\":\"ContactPoint\",\"contactType\":\"sales\",\"url\":\"https:\/\/cryptoslate.com\/advertising\/\",\"availableLanguage\":\"en-US\"},{\"@type\":\"ContactPoint\",\"contactType\":\"newsroom\",\"url\":\"https:\/\/cryptoslate.com\/editorial-policy\/#corrections-feedback\",\"email\":\"tips@cryptoslate.com\",\"availableLanguage\":\"en-US\"}],\"masthead\":\"https:\/\/cryptoslate.com\/about\/#masthead\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/cryptoslate.com\/#\/schema\/person\/b333928a322ba4c082e8bb2ad0f14eb6\",\"name\":\"Oluwapelumi Adejumo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cryptoslate.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/cryptoslate.com\/wp-content\/uploads\/2025\/12\/profile-photo-oluwapelumi-adejumo-150x150.jpg\",\"contentUrl\":\"https:\/\/cryptoslate.com\/wp-content\/uploads\/2025\/12\/profile-photo-oluwapelumi-adejumo-150x150.jpg\",\"caption\":\"Oluwapelumi Adejumo\"},\"description\":\"Oluwapelumi values Bitcoin's potential. He imparts insights on a range of topics like DeFi, hacks, mining and culture, underlining transformative power.\",\"jobTitle\":\"Reporter\",\"worksFor\":\"CryptoSlate\",\"url\":\"https:\/\/cryptoslate.com\/author\/oluwapelumi-adejumo\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Researchers discover vulnerabilities in Bitcoin layer-2 Lightning Network","description":"Researchers have discovered the vulnerabilities on Bitcoin lightning network that could result in the theft of 750 Bitcoin.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cryptoslate.com\/researchers-discover-vulnerabilities-in-bitcoin-layer-2-lightning-network\/","og_locale":"en_US","og_type":"article","og_title":"Researchers discover vulnerabilities in Bitcoin layer-2 Lightning Network","og_description":"Researchers have discovered the vulnerabilities on Bitcoin lightning network that could result in the theft of 750 Bitcoin.","og_url":"https:\/\/cryptoslate.com\/researchers-discover-vulnerabilities-in-bitcoin-layer-2-lightning-network\/","og_site_name":"CryptoSlate","article_published_time":"2022-08-12T12:15:21+00:00","article_modified_time":"2023-05-25T01:13:49+00:00","og_image":[{"width":720,"height":378,"url":"https:\/\/cryptoslate.com\/wp-content\/uploads\/2022\/08\/image_2022-08-12_170743519.png","type":"image\/png"}],"author":"Oluwapelumi Adejumo","twitter_card":"summary_large_image","twitter_creator":"@cryptoslate","twitter_site":"@cryptoslate","twitter_misc":{"Written by":"Oluwapelumi Adejumo","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/cryptoslate.com\/researchers-discover-vulnerabilities-in-bitcoin-layer-2-lightning-network\/#article","isPartOf":{"@id":"https:\/\/cryptoslate.com\/researchers-discover-vulnerabilities-in-bitcoin-layer-2-lightning-network\/"},"author":{"@type":"Person","@id":"https:\/\/cryptoslate.com\/author\/oluwapelumi-adejumo\/#person","name":"Oluwapelumi Adejumo","url":"https:\/\/cryptoslate.com\/author\/oluwapelumi-adejumo\/","mainEntityOfPage":{"@id":"https:\/\/cryptoslate.com\/author\/oluwapelumi-adejumo\/"},"image":{"@type":"ImageObject","@id":"https:\/\/cryptoslate.com\/author\/oluwapelumi-adejumo\/#authorimage","url":"https:\/\/cryptoslate.com\/wp-content\/uploads\/2025\/12\/profile-photo-oluwapelumi-adejumo-300x300.jpg","contentUrl":"https:\/\/cryptoslate.com\/wp-content\/uploads\/2025\/12\/profile-photo-oluwapelumi-adejumo-300x300.jpg","caption":"Oluwapelumi Adejumo"},"jobTitle":"Senior Reporter","description":"Oluwapelumi values Bitcoin's potential. He imparts insights on a range of topics like DeFi, hacks, mining and culture, underlining transformative power.","worksFor":{"@id":"https:\/\/cryptoslate.com\/#organization"},"sameAs":["https:\/\/x.com\/hardeyjumoh","https:\/\/www.linkedin.com\/in\/oluwapelumi-adejumo","https:\/\/muckrack.com\/oluwapelumi-adejumo"]},"headline":"Researchers discover vulnerabilities in Bitcoin layer-2 Lightning Network","datePublished":"2022-08-12T12:15:21+00:00","dateModified":"2023-05-25T01:13:49+00:00","mainEntityOfPage":{"@id":"https:\/\/cryptoslate.com\/researchers-discover-vulnerabilities-in-bitcoin-layer-2-lightning-network\/"},"wordCount":451,"commentCount":0,"publisher":{"@id":"https:\/\/cryptoslate.com\/#organization"},"keywords":["Bitcoin lightning network","Lightning Network"],"articleSection":["Featured","Lightning","Technology"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cryptoslate.com\/researchers-discover-vulnerabilities-in-bitcoin-layer-2-lightning-network\/#respond"]}],"copyrightYear":"2022","copyrightHolder":{"@id":"https:\/\/cryptoslate.com\/#organization"}},{"@type":"WebPage","@id":"https:\/\/cryptoslate.com\/researchers-discover-vulnerabilities-in-bitcoin-layer-2-lightning-network\/","url":"https:\/\/cryptoslate.com\/researchers-discover-vulnerabilities-in-bitcoin-layer-2-lightning-network\/","name":"Researchers discover vulnerabilities in Bitcoin layer-2 Lightning Network","isPartOf":{"@id":"https:\/\/cryptoslate.com\/#website"},"datePublished":"2022-08-12T12:15:21+00:00","dateModified":"2023-05-25T01:13:49+00:00","description":"Researchers have discovered the vulnerabilities on Bitcoin lightning network that could result in the theft of 750 Bitcoin.","breadcrumb":{"@id":"https:\/\/cryptoslate.com\/researchers-discover-vulnerabilities-in-bitcoin-layer-2-lightning-network\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cryptoslate.com\/researchers-discover-vulnerabilities-in-bitcoin-layer-2-lightning-network\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cryptoslate.com\/researchers-discover-vulnerabilities-in-bitcoin-layer-2-lightning-network\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cryptoslate.com\/"},{"@type":"ListItem","position":2,"name":"Researchers discover vulnerabilities in Bitcoin layer-2 Lightning Network"}]},{"@type":"WebSite","@id":"https:\/\/cryptoslate.com\/#website","url":"https:\/\/cryptoslate.com\/","name":"CryptoSlate","description":"Cryptocurrency News and Real-time Coin Data","publisher":{"@id":"https:\/\/cryptoslate.com\/#organization"},"inLanguage":"en-US"},{"@type":"NewsMediaOrganization","@id":"https:\/\/cryptoslate.com\/#organization","name":"CryptoSlate","url":"https:\/\/cryptoslate.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cryptoslate.com\/#\/schema\/logo\/image\/","url":"https:\/\/cryptoslate.com\/wp-content\/uploads\/2018\/05\/c-logo.jpg","contentUrl":"https:\/\/cryptoslate.com\/wp-content\/uploads\/2018\/05\/c-logo.jpg","width":1000,"height":1000,"caption":"CryptoSlate"},"image":{"@id":"https:\/\/cryptoslate.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/twitter.com\/cryptoslate","https:\/\/www.instagram.com\/cryptoslate","https:\/\/www.linkedin.com\/company\/cryptoslate","https:\/\/www.youtube.com\/c\/cryptoslate","https:\/\/cryptoslate.substack.com","https:\/\/t.me\/cryptoslatenews","https:\/\/www.crunchbase.com\/organization\/cryptoslate","https:\/\/iq.wiki\/wiki\/cryptoslate","https:\/\/news.google.com\/publications\/CAAqKggKIiRDQklTRlFnTWFoRUtEMk55ZVhCMGIzTnNZWFJsTG1OdmJTZ0FQAQ","https:\/\/muckrack.com\/media-outlet\/cryptoslate","https:\/\/www.tiktok.com\/@cryptoslatenews"],"publishingPrinciples":"https:\/\/cryptoslate.com\/editorial-policy\/#editorial-principles","ownershipFundingInfo":"https:\/\/cryptoslate.com\/disclaimers\/how-cryptoslate-makes-and-spends-money\/","correctionsPolicy":"https:\/\/cryptoslate.com\/editorial-policy\/#corrections-feedback","ethicsPolicy":"https:\/\/cryptoslate.com\/editorial-policy\/#editorial-principles","foundingDate":"2017-08-04","founder":[{"@type":"Person","name":"Nate Whitehill"},{"@type":"Person","name":"Matthew Blancarte"}],"contactPoint":[{"@type":"ContactPoint","contactType":"customer support","url":"https:\/\/cryptoslate.com\/contact\/","availableLanguage":"en-US"},{"@type":"ContactPoint","contactType":"sales","url":"https:\/\/cryptoslate.com\/advertising\/","availableLanguage":"en-US"},{"@type":"ContactPoint","contactType":"newsroom","url":"https:\/\/cryptoslate.com\/editorial-policy\/#corrections-feedback","email":"tips@cryptoslate.com","availableLanguage":"en-US"}],"masthead":"https:\/\/cryptoslate.com\/about\/#masthead"},{"@type":"Person","@id":"https:\/\/cryptoslate.com\/#\/schema\/person\/b333928a322ba4c082e8bb2ad0f14eb6","name":"Oluwapelumi Adejumo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cryptoslate.com\/#\/schema\/person\/image\/","url":"https:\/\/cryptoslate.com\/wp-content\/uploads\/2025\/12\/profile-photo-oluwapelumi-adejumo-150x150.jpg","contentUrl":"https:\/\/cryptoslate.com\/wp-content\/uploads\/2025\/12\/profile-photo-oluwapelumi-adejumo-150x150.jpg","caption":"Oluwapelumi Adejumo"},"description":"Oluwapelumi values Bitcoin's potential. He imparts insights on a range of topics like DeFi, hacks, mining and culture, underlining transformative power.","jobTitle":"Reporter","worksFor":"CryptoSlate","url":"https:\/\/cryptoslate.com\/author\/oluwapelumi-adejumo\/"}]}},"_links":{"self":[{"href":"https:\/\/cryptoslate.com\/wp-json\/wp\/v2\/posts\/254710"}],"collection":[{"href":"https:\/\/cryptoslate.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cryptoslate.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cryptoslate.com\/wp-json\/wp\/v2\/users\/720"}],"replies":[{"embeddable":true,"href":"https:\/\/cryptoslate.com\/wp-json\/wp\/v2\/comments?post=254710"}],"version-history":[{"count":13,"href":"https:\/\/cryptoslate.com\/wp-json\/wp\/v2\/posts\/254710\/revisions"}],"predecessor-version":[{"id":254767,"href":"https:\/\/cryptoslate.com\/wp-json\/wp\/v2\/posts\/254710\/revisions\/254767"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cryptoslate.com\/wp-json\/wp\/v2\/media\/254766"}],"wp:attachment":[{"href":"https:\/\/cryptoslate.com\/wp-json\/wp\/v2\/media?parent=254710"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cryptoslate.com\/wp-json\/wp\/v2\/categories?post=254710"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cryptoslate.com\/wp-json\/wp\/v2\/tags?post=254710"},{"taxonomy":"post_folder","embeddable":true,"href":"https:\/\/cryptoslate.com\/wp-json\/wp\/v2\/post_folder?post=254710"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}