{"id":90273,"date":"2018-10-23T03:00:31","date_gmt":"2018-10-23T10:00:31","guid":{"rendered":"https:\/\/cryptoslate.com\/?p=90273"},"modified":"2018-10-23T01:31:38","modified_gmt":"2018-10-23T08:31:38","slug":"is-delayed-proof-of-work-the-answer-to-51-attacks-interview","status":"publish","type":"post","link":"https:\/\/cryptoslate.com\/is-delayed-proof-of-work-the-answer-to-51-attacks-interview\/","title":{"rendered":"Is Delayed Proof of Work the Answer to 51% Attacks? [INTERVIEW]"},"content":{"rendered":"<p class=\"p1\"><span class=\"s1\">Earlier in October, an ethical hacker who goes by the handle GeoCold on Twitter announced the\u00a0<a href=\"https:\/\/cryptoslate.com\/anonymous-twitter-user-says-theyll-livestream-a-51-percent-altcoin-attack\/\"><span class=\"s2\">live-streaming of a 51% attack<\/span><\/a> on the alt coin Einsteinium. The plan was to gain control of the network and expose vulnerabilities that exist in conventional proof-of-work blockchains which allow for double-spending attacks. Only it didn\u2019t go quite as planned. <\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">GeoCold switched the coin he attacked to Bitcoin Private after discovering Einsteinium\u2019s use of a security protocol called Komodo, which utilizes delayed proof of work (dPoW) to verify the correct chain.<\/span><\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Just found out EMC2 uses <a href=\"https:\/\/twitter.com\/KomodoPlatform?ref_src=twsrc%5Etfw\">@KomodoPlatform<\/a>, still going to attack them later in the stream but it might not work (will be fun to test) so i&#39;m switching the main event to a bigger coin (to be announced).<\/p>\n<p>&mdash; GeoCold &quot;Mischief-Maker&quot; (@geocold51) <a href=\"https:\/\/twitter.com\/geocold51\/status\/1049766161326514176?ref_src=twsrc%5Etfw\">October 9, 2018<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<h2 class=\"p1\"><span class=\"s1\">What is dPoW?<\/span><\/h2>\n<p class=\"p1\"><span class=\"s1\">During the interview, Daniel Pigeon, a technical writer at Komodo, explained the concept: <\/span><\/p>\n<blockquote>\n<p class=\"p1\"><span class=\"s1\">\u201cTo put it really briefly, Komodo has a network of 64 community-elected nodes that notarize a blockhash onto the Bitcoin ledger (using OP_RETURN command) every ten minutes. This creates a checkpoint, so to speak, and any transactions that have occurred prior to that notarization are protected with the power of the BTC network. The process takes place every 10 minutes so potential attackers don't have enough time to launch a successful attack.\u201d<\/span><\/p>\n<\/blockquote>\n<p class=\"p1\"><span class=\"s1\">With each new checkpoint, the entire network is verified so if a chain doesn\u2019t match them all, it gets rejected.\u00a0<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">So, in order to gain control over a network using dPoW, a hacker would have to fork a blockchain, mine enough blocks to convince the system it was the correct one, reintroduce that chain to the network they were attacking, then double-spend the currency they were attacking through an exchange in under ten minutes. Pigeon argues that this is effectively impossible. <\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">The roughly two-hour wait time transactions are put through on exchanges which provides another layer of protection. By the time any attempt to double-spend goes through, \u201cour devs would be on it,\u201d Pigeon said. <\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Between verifications, chains using dPoW have a conventional level of security, but the checkpoint hashes written to the Bitcoin network would need an immense amount of power to overcome, due to its high amount of hashing power. Even if it were somehow to be hacked, each checkpoint contains a hash of the previous checkpoint within it. <\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><a href=\"https:\/\/cryptoslate.com\/coins\/einsteinium\/\">Einsteinium<\/a> is one of four projects not native to the <a href=\"https:\/\/cryptoslate.com\/coins\/komodo\/\">Komodo<\/a> system using its protocol. The other three are Bitcoin Hush, gaming cryptocurrency <a href=\"https:\/\/cryptoslate.com\/coins\/gamecredits\/\"><span class=\"s2\">GameCredits<\/span><\/a>, and Kreds. According to Pigeon, there are over 30 blockchains built on Komodo\u2019s platform as of this writing. The company has been around for nearly two years, having introduced their dPoW protocol in January of 2017, but it's been a slow build since.<\/span><\/p>\n<p>Pigeon said:<\/p>\n<blockquote>\n<p class=\"p1\"><span class=\"s1\">\u201cWe\u2019ve kinda been flying under the radar.&#8221;<\/span><\/p>\n<\/blockquote>\n<h2 class=\"p1\"><span class=\"s1\">Ethical Hacking<\/span><\/h2>\n<p class=\"p1\"><span class=\"s1\">Instances like GeoCold\u2019s attempt to stream an altcoin attack highlight ways that ethical hackers and the blockchain community can work hand in hand to advance the technology. It's far from novel for a company to bring on whitehats as consultants or offer bounties for any bugs they find. <\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">When I asked Pigeon what he thought of GeoCold\u2019s efforts, he said, \u201cWe welcome it with open arms, actually.\u201d The publicity around GeoCold\u2019s planned attack brought attention both to the vulnerabilities in conventional, small proof of work blockchains and the possible benefits of dPoW. Komodo\u2019s developers appreciated the spotlight.<\/span><\/p>\n<p>P<span class=\"s1\">igeon said of hackers,<\/span><\/p>\n<blockquote>\n<p class=\"p1\"><span class=\"s1\">\u201cRather than having an enemy. We can have them join the team and help us be more secure.\u201d <\/span><\/p>\n<\/blockquote>\n<p class=\"p1\"><span class=\"s1\">GeoCold\u2019s planned attack on Bitcoin Private was cut off when two streaming platforms shut him down, but in <a href=\"https:\/\/thebitcoinpodcast.com\/the-bull-pen-8-5\/\"><span class=\"s2\">an interview on the podcast The Bull Pen<\/span><\/a>, he said he was able to \u201cdo everything but hit the button.\u201d He thinks people have too much confidence that some chains can\u2019t be hacked, leaning on assurances from before people could rent hashing power from sites like Nicehash. After raising money via donations, he planned to attack both Bitcoin Private and Einsteinium for a side-by-side security contrast.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Komodo's dPoW still isn\u2019t perfect. Another whitehat by the username forkwitch <a href=\"https:\/\/twitter.com\/forkwitch\/status\/1052748624717852672\"><span class=\"s2\">managed to reorganize a block<\/span><\/a> on Einsteinium's chain last week, but Komodo is planning to address the exposed vulnerability in an upcoming bug fix. <\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">GeoCold also mentioned the possibility of using old nodes on the Einsteinium network without verification in place as a way to fork the chain. \u201cThat,\u201d he said, \u201cWould be curious.\u201d <\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Earlier in October, an ethical hacker who goes by the handle GeoCold on Twitter announced the\u00a0live-streaming of a 51% attack on the alt coin Einsteinium. The plan was to gain control of the network and expose vulnerabilities that exist in conventional proof-of-work blockchains which allow for double-spending attacks. Only it didn\u2019t go quite as planned. [&hellip;]<\/p>\n","protected":false},"author":93,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[16041,10085,37],"tags":[],"post_folder":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v21.9 (Yoast SEO v21.9.1) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Is Delayed Proof of Work the Answer to 51% Attacks? [INTERVIEW]<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cryptoslate.com\/is-delayed-proof-of-work-the-answer-to-51-attacks-interview\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Is Delayed Proof of Work the Answer to 51% Attacks? [INTERVIEW]\" \/>\n<meta property=\"og:description\" content=\"Earlier in October, an ethical hacker who goes by the handle GeoCold on Twitter announced the\u00a0live-streaming of a 51% attack on the alt coin Einsteinium. The plan was to gain control of the network and expose vulnerabilities that exist in conventional proof-of-work blockchains which allow for double-spending attacks. Only it didn\u2019t go quite as planned. [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cryptoslate.com\/is-delayed-proof-of-work-the-answer-to-51-attacks-interview\/\" \/>\n<meta property=\"og:site_name\" content=\"CryptoSlate\" \/>\n<meta property=\"article:published_time\" content=\"2018-10-23T10:00:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-10-23T08:31:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cryptoslate.com\/wp-content\/uploads\/2025\/11\/cryptoslate-cover.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"John Bogna\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Is Delayed Proof of Work the Answer to 51% Attacks? [INTERVIEW]\" \/>\n<meta name=\"twitter:creator\" content=\"@cryptoslate\" \/>\n<meta name=\"twitter:site\" content=\"@cryptoslate\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"John Bogna\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\/\/cryptoslate.com\/is-delayed-proof-of-work-the-answer-to-51-attacks-interview\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cryptoslate.com\/is-delayed-proof-of-work-the-answer-to-51-attacks-interview\/\"},\"author\":{\"name\":\"John Bogna\",\"@id\":\"https:\/\/cryptoslate.com\/#\/schema\/person\/df5684538f8d0b919de99dd65ca7d760\"},\"headline\":\"Is Delayed Proof of Work the Answer to 51% Attacks? [INTERVIEW]\",\"datePublished\":\"2018-10-23T10:00:31+00:00\",\"dateModified\":\"2018-10-23T08:31:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cryptoslate.com\/is-delayed-proof-of-work-the-answer-to-51-attacks-interview\/\"},\"wordCount\":720,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/cryptoslate.com\/#organization\"},\"articleSection\":[\"Hacks\",\"Interview\",\"Technology\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/cryptoslate.com\/is-delayed-proof-of-work-the-answer-to-51-attacks-interview\/#respond\"]}],\"copyrightYear\":\"2018\",\"copyrightHolder\":{\"@id\":\"https:\/\/cryptoslate.com\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cryptoslate.com\/is-delayed-proof-of-work-the-answer-to-51-attacks-interview\/\",\"url\":\"https:\/\/cryptoslate.com\/is-delayed-proof-of-work-the-answer-to-51-attacks-interview\/\",\"name\":\"Is Delayed Proof of Work the Answer to 51% Attacks? [INTERVIEW]\",\"isPartOf\":{\"@id\":\"https:\/\/cryptoslate.com\/#website\"},\"datePublished\":\"2018-10-23T10:00:31+00:00\",\"dateModified\":\"2018-10-23T08:31:38+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cryptoslate.com\/is-delayed-proof-of-work-the-answer-to-51-attacks-interview\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cryptoslate.com\/is-delayed-proof-of-work-the-answer-to-51-attacks-interview\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cryptoslate.com\/is-delayed-proof-of-work-the-answer-to-51-attacks-interview\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cryptoslate.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Is Delayed Proof of Work the Answer to 51% Attacks? [INTERVIEW]\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cryptoslate.com\/#website\",\"url\":\"https:\/\/cryptoslate.com\/\",\"name\":\"CryptoSlate\",\"description\":\"Cryptocurrency News and Real-time Coin Data\",\"publisher\":{\"@id\":\"https:\/\/cryptoslate.com\/#organization\"},\"inLanguage\":\"en-US\"},{\"@type\":[\"Organization\",\"NewsMediaOrganization\"],\"@id\":\"https:\/\/cryptoslate.com\/#organization\",\"name\":\"CryptoSlate\",\"url\":\"https:\/\/cryptoslate.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cryptoslate.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cryptoslate.com\/wp-content\/uploads\/2018\/05\/c-logo.jpg\",\"contentUrl\":\"https:\/\/cryptoslate.com\/wp-content\/uploads\/2018\/05\/c-logo.jpg\",\"width\":1000,\"height\":1000,\"caption\":\"CryptoSlate\"},\"image\":{\"@id\":\"https:\/\/cryptoslate.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/twitter.com\/cryptoslate\",\"https:\/\/www.instagram.com\/cryptoslate\",\"https:\/\/www.linkedin.com\/company\/cryptoslate\",\"https:\/\/www.youtube.com\/c\/cryptoslate\",\"https:\/\/cryptoslate.substack.com\",\"https:\/\/t.me\/cryptoslatenews\",\"https:\/\/www.tiktok.com\/@cryptoslatenews\"],\"publishingPrinciples\":\"https:\/\/cryptoslate.com\/editorial-policy\/#editorial-principles\",\"ownershipFundingInfo\":\"https:\/\/cryptoslate.com\/disclaimers\/how-cryptoslate-makes-and-spends-money\/\",\"actionableFeedbackPolicy\":\"https:\/\/cryptoslate.com\/editorial-policy\/#corrections-feedback\",\"correctionsPolicy\":\"https:\/\/cryptoslate.com\/editorial-policy\/#corrections-feedback\",\"ethicsPolicy\":\"https:\/\/cryptoslate.com\/editorial-policy\/#editorial-principles\",\"foundingDate\":\"2017-08-04\",\"founder\":[{\"@type\":\"Person\",\"name\":\"Nate Whitehill\"},{\"@type\":\"Person\",\"name\":\"Matthew Blancarte\"}],\"contactPoint\":[{\"@type\":\"ContactPoint\",\"contactType\":\"customer support\",\"url\":\"https:\/\/cryptoslate.com\/contact\/\",\"availableLanguage\":\"en-US\"},{\"@type\":\"ContactPoint\",\"contactType\":\"sales\",\"url\":\"https:\/\/cryptoslate.com\/advertising\/\",\"availableLanguage\":\"en-US\"},{\"@type\":\"ContactPoint\",\"contactType\":\"newsroom\",\"url\":\"https:\/\/cryptoslate.com\/editorial-policy\/#corrections-feedback\",\"email\":\"tips@cryptoslate.com\",\"availableLanguage\":\"en-US\"}],\"masthead\":\"https:\/\/cryptoslate.com\/about\/#masthead\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/cryptoslate.com\/#\/schema\/person\/df5684538f8d0b919de99dd65ca7d760\",\"name\":\"John Bogna\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cryptoslate.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/cryptoslate.com\/wp-content\/uploads\/2018\/09\/author-john-bogna-150x150.jpg\",\"contentUrl\":\"https:\/\/cryptoslate.com\/wp-content\/uploads\/2018\/09\/author-john-bogna-150x150.jpg\",\"caption\":\"John Bogna\"},\"description\":\"John Bogna is a freelance writer and journalist with seven years of experience covering everything from arts to tech.\",\"url\":\"https:\/\/cryptoslate.com\/author\/john-bogna\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Is Delayed Proof of Work the Answer to 51% Attacks? [INTERVIEW]","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cryptoslate.com\/is-delayed-proof-of-work-the-answer-to-51-attacks-interview\/","og_locale":"en_US","og_type":"article","og_title":"Is Delayed Proof of Work the Answer to 51% Attacks? [INTERVIEW]","og_description":"Earlier in October, an ethical hacker who goes by the handle GeoCold on Twitter announced the\u00a0live-streaming of a 51% attack on the alt coin Einsteinium. The plan was to gain control of the network and expose vulnerabilities that exist in conventional proof-of-work blockchains which allow for double-spending attacks. Only it didn\u2019t go quite as planned. [&hellip;]","og_url":"https:\/\/cryptoslate.com\/is-delayed-proof-of-work-the-answer-to-51-attacks-interview\/","og_site_name":"CryptoSlate","article_published_time":"2018-10-23T10:00:31+00:00","article_modified_time":"2018-10-23T08:31:38+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/cryptoslate.com\/wp-content\/uploads\/2025\/11\/cryptoslate-cover.jpg","type":"image\/jpeg"}],"author":"John Bogna","twitter_card":"summary_large_image","twitter_title":"Is Delayed Proof of Work the Answer to 51% Attacks? [INTERVIEW]","twitter_creator":"@cryptoslate","twitter_site":"@cryptoslate","twitter_misc":{"Written by":"John Bogna","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/cryptoslate.com\/is-delayed-proof-of-work-the-answer-to-51-attacks-interview\/#article","isPartOf":{"@id":"https:\/\/cryptoslate.com\/is-delayed-proof-of-work-the-answer-to-51-attacks-interview\/"},"author":{"name":"John Bogna","@id":"https:\/\/cryptoslate.com\/#\/schema\/person\/df5684538f8d0b919de99dd65ca7d760"},"headline":"Is Delayed Proof of Work the Answer to 51% Attacks? [INTERVIEW]","datePublished":"2018-10-23T10:00:31+00:00","dateModified":"2018-10-23T08:31:38+00:00","mainEntityOfPage":{"@id":"https:\/\/cryptoslate.com\/is-delayed-proof-of-work-the-answer-to-51-attacks-interview\/"},"wordCount":720,"commentCount":0,"publisher":{"@id":"https:\/\/cryptoslate.com\/#organization"},"articleSection":["Hacks","Interview","Technology"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cryptoslate.com\/is-delayed-proof-of-work-the-answer-to-51-attacks-interview\/#respond"]}],"copyrightYear":"2018","copyrightHolder":{"@id":"https:\/\/cryptoslate.com\/#organization"}},{"@type":"WebPage","@id":"https:\/\/cryptoslate.com\/is-delayed-proof-of-work-the-answer-to-51-attacks-interview\/","url":"https:\/\/cryptoslate.com\/is-delayed-proof-of-work-the-answer-to-51-attacks-interview\/","name":"Is Delayed Proof of Work the Answer to 51% Attacks? [INTERVIEW]","isPartOf":{"@id":"https:\/\/cryptoslate.com\/#website"},"datePublished":"2018-10-23T10:00:31+00:00","dateModified":"2018-10-23T08:31:38+00:00","breadcrumb":{"@id":"https:\/\/cryptoslate.com\/is-delayed-proof-of-work-the-answer-to-51-attacks-interview\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cryptoslate.com\/is-delayed-proof-of-work-the-answer-to-51-attacks-interview\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cryptoslate.com\/is-delayed-proof-of-work-the-answer-to-51-attacks-interview\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cryptoslate.com\/"},{"@type":"ListItem","position":2,"name":"Is Delayed Proof of Work the Answer to 51% Attacks? [INTERVIEW]"}]},{"@type":"WebSite","@id":"https:\/\/cryptoslate.com\/#website","url":"https:\/\/cryptoslate.com\/","name":"CryptoSlate","description":"Cryptocurrency News and Real-time Coin Data","publisher":{"@id":"https:\/\/cryptoslate.com\/#organization"},"inLanguage":"en-US"},{"@type":["Organization","NewsMediaOrganization"],"@id":"https:\/\/cryptoslate.com\/#organization","name":"CryptoSlate","url":"https:\/\/cryptoslate.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cryptoslate.com\/#\/schema\/logo\/image\/","url":"https:\/\/cryptoslate.com\/wp-content\/uploads\/2018\/05\/c-logo.jpg","contentUrl":"https:\/\/cryptoslate.com\/wp-content\/uploads\/2018\/05\/c-logo.jpg","width":1000,"height":1000,"caption":"CryptoSlate"},"image":{"@id":"https:\/\/cryptoslate.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/twitter.com\/cryptoslate","https:\/\/www.instagram.com\/cryptoslate","https:\/\/www.linkedin.com\/company\/cryptoslate","https:\/\/www.youtube.com\/c\/cryptoslate","https:\/\/cryptoslate.substack.com","https:\/\/t.me\/cryptoslatenews","https:\/\/www.tiktok.com\/@cryptoslatenews"],"publishingPrinciples":"https:\/\/cryptoslate.com\/editorial-policy\/#editorial-principles","ownershipFundingInfo":"https:\/\/cryptoslate.com\/disclaimers\/how-cryptoslate-makes-and-spends-money\/","actionableFeedbackPolicy":"https:\/\/cryptoslate.com\/editorial-policy\/#corrections-feedback","correctionsPolicy":"https:\/\/cryptoslate.com\/editorial-policy\/#corrections-feedback","ethicsPolicy":"https:\/\/cryptoslate.com\/editorial-policy\/#editorial-principles","foundingDate":"2017-08-04","founder":[{"@type":"Person","name":"Nate Whitehill"},{"@type":"Person","name":"Matthew Blancarte"}],"contactPoint":[{"@type":"ContactPoint","contactType":"customer support","url":"https:\/\/cryptoslate.com\/contact\/","availableLanguage":"en-US"},{"@type":"ContactPoint","contactType":"sales","url":"https:\/\/cryptoslate.com\/advertising\/","availableLanguage":"en-US"},{"@type":"ContactPoint","contactType":"newsroom","url":"https:\/\/cryptoslate.com\/editorial-policy\/#corrections-feedback","email":"tips@cryptoslate.com","availableLanguage":"en-US"}],"masthead":"https:\/\/cryptoslate.com\/about\/#masthead"},{"@type":"Person","@id":"https:\/\/cryptoslate.com\/#\/schema\/person\/df5684538f8d0b919de99dd65ca7d760","name":"John Bogna","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cryptoslate.com\/#\/schema\/person\/image\/","url":"https:\/\/cryptoslate.com\/wp-content\/uploads\/2018\/09\/author-john-bogna-150x150.jpg","contentUrl":"https:\/\/cryptoslate.com\/wp-content\/uploads\/2018\/09\/author-john-bogna-150x150.jpg","caption":"John Bogna"},"description":"John Bogna is a freelance writer and journalist with seven years of experience covering everything from arts to tech.","url":"https:\/\/cryptoslate.com\/author\/john-bogna\/"}]}},"_links":{"self":[{"href":"https:\/\/cryptoslate.com\/wp-json\/wp\/v2\/posts\/90273"}],"collection":[{"href":"https:\/\/cryptoslate.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cryptoslate.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cryptoslate.com\/wp-json\/wp\/v2\/users\/93"}],"replies":[{"embeddable":true,"href":"https:\/\/cryptoslate.com\/wp-json\/wp\/v2\/comments?post=90273"}],"version-history":[{"count":5,"href":"https:\/\/cryptoslate.com\/wp-json\/wp\/v2\/posts\/90273\/revisions"}],"predecessor-version":[{"id":90388,"href":"https:\/\/cryptoslate.com\/wp-json\/wp\/v2\/posts\/90273\/revisions\/90388"}],"wp:attachment":[{"href":"https:\/\/cryptoslate.com\/wp-json\/wp\/v2\/media?parent=90273"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cryptoslate.com\/wp-json\/wp\/v2\/categories?post=90273"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cryptoslate.com\/wp-json\/wp\/v2\/tags?post=90273"},{"taxonomy":"post_folder","embeddable":true,"href":"https:\/\/cryptoslate.com\/wp-json\/wp\/v2\/post_folder?post=90273"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}