Connect with us
DAPA Banner

Crypto World

MoneyGram Joins Midnight Network to Advance On-Chain Privacy Infrastructure

Published

on

Nexo Partners with Bakkt for US Crypto Exchange and Yield Programs

TLDR:

  • MoneyGram will operate a founding federated node on Midnight mainnet ahead of launch.
  • Midnight mainnet uses zero-knowledge cryptography to enable confidential smart contracts.
  • The federated model ensures coordinated governance during the Kūkolu roadmap phase.
  • Enterprise operators aim to support stable, compliance-ready blockchain infrastructure.

MoneyGram joins Midnight Network as a founding federated node operator, reinforcing the blockchain’s privacy-first architecture ahead of its planned March mainnet launch.

The Midnight Foundation confirmed the development as part of the Kūkolu phase of its roadmap. By integrating an established global payments provider into its launch infrastructure, Midnight mainnet strengthens its operational framework while advancing confidential, compliance-aware blockchain deployment from day one.

MoneyGram Anchors Founding Federated Infrastructure

MoneyGram will operate a founding federated node on Midnight mainnet. The company serves customers in more than 200 countries and territories. Its addition embeds real-world payments infrastructure directly into Midnight’s early operational layer.

In an official statement released by the Midnight Foundation, Luke Tuttle, Chief Product and Technology Officer at MoneyGram, explained the company’s position.

He stated that MoneyGram has delivered practical crypto solutions for years. He added that running blockchain nodes aligns naturally with that strategy.

Advertisement

Tuttle further noted that participation allows MoneyGram to help ensure privacy, compliance, and reliability are built into the network from the outset.

His remarks framed the collaboration as an operational step rather than a symbolic partnership. The statement was circulated through Midnight’s communication channels following recent announcements at Consensus Hong Kong.

Zero-Knowledge Design Supports Compliance and Privacy

Midnight mainnet is engineered around zero-knowledge cryptography and confidential smart contracts. The architecture enables transaction verification without disclosing sensitive user information. This structure is intended to support regulated industries entering on-chain environments.

Addressing this approach, Omri Ross, Chief Blockchain Officer at eToro, commented on Midnight’s programmable data protection model.

Advertisement

In a statement shared by the foundation, Ross said eToro was encouraged by the network’s selective disclosure capabilities.

He emphasized that granular control over data visibility is foundational for blockchain infrastructure serving global markets.

Ross also stated that confidential smart contracts with built-in verifiability align with eToro’s long-term view of asset tokenization.

His remarks connected privacy-enhancing technology with regulated financial expansion. The comments accompanied confirmation that eToro will serve as a federated node operator.

Advertisement

Broader Industry Participation in Federated Operations

Midnight mainnet’s federated model includes operators from payments, fintech, and telecommunications. Pairpoint, backed by Vodafone and Sumitomo Corporation, will also run a node. Pairpoint focuses on enabling autonomous economic activity within connected device ecosystems.

David Palmer, Chief Innovation Officer at Pairpoint, addressed the partnership in a formal statement. He said Midnight’s zero-knowledge architecture is essential for trusted IoT device identity and authentication. Palmer connected privacy infrastructure with scaling across global networks in the emerging IoT AI economy.

Fahmi Syed, President of the Midnight Foundation, commented on the collective participation of MoneyGram, Pairpoint, and eToro.

In a statement accompanying the announcement, he said the presence of a global payments network, a Fortune 500-backed technology venture, and a publicly traded fintech operating nodes signals the direction of blockchain infrastructure. He described the consortium as an early foundation for a broader privacy-focused ecosystem.

Advertisement

Midnight mainnet is preparing for its March launch under explicit coordination rules for federated operators. The foundation stated that additional updates will be published as the rollout approaches.

Developers are expected to begin building privacy-enhancing applications from the network’s initial operational phase.

Source link

Advertisement
Continue Reading
Click to comment

You must be logged in to post a comment Login

Leave a Reply

Crypto World

AI Routers Can Steal Credentials and Crypto

Published

on

AI Routers Can Steal Credentials and Crypto

University of California researchers have discovered that some third-party AI large language model (LLM) routers can pose security vulnerabilities that can lead to crypto theft. 

A paper measuring malicious intermediary attacks on the LLM supply chain, published on Thursday by the researchers, revealed four attack vectors, including malicious code injection and extraction of credentials

“26 LLM routers are secretly injecting malicious tool calls and stealing creds,” said the paper’s co-author, Chaofan Shou, on X.

LLM agents increasingly route requests through third-party API intermediaries or routers that aggregate access to providers like OpenAI, Anthropic and Google. However, these routers terminate Internet TLS (Transport Layer Security) connections and have full plaintext access to every message. 

Advertisement

This means that developers using AI coding agents such as Claude Code to work on smart contracts or wallets could be passing private keys, seed phrases and sensitive data through router infrastructure that has not been screened or secured.

Multi-hop LLM router supply chain. Source: arXiv.org

ETH stolen from a decoy crypto wallet 

The researchers tested 28 paid routers and 400 free routers collected from public communities. 

Their findings were startling, with nine routers actively injecting malicious code, two deploying adaptive evasion triggers, 17 accessing researcher-owned Amazon Web Services credentials, and one draining Ether (ETH) from a researcher-owned private key.

Related: Anthropic limits access to AI model over cyberattack concerns

The researchers prefunded Ethereum wallet “decoy keys” with nominal balances and reported that the value lost in the experiment was below $50, but no further details such as the transaction hash were provided. 

Advertisement

The authors also ran two “poisoning studies” showing that even benign routers become dangerous once they reuse leaked credentials through weak relays.

Hard to tell whether routers are malicious

The researchers said it was not easy to detect when a router was malicious.  

“The boundary between ‘credential handling’ and ‘credential theft’ is invisible to the client because routers already read secrets in plaintext as part of normal forwarding.” 

Another unsettling find was what the researchers called “YOLO mode.” This is a setting in many AI agent frameworks where the agent executes commands automatically without asking the user to confirm each one.

Previously legitimate routers can be silently weaponized without the operator even knowing, while free routers may be stealing credentials while offering cheap API access as the lure, the researchers found.

Advertisement

“LLM API routers sit on a critical trust boundary that the ecosystem currently treats as transparent transport.” 

The researchers recommended that developers using AI agents to code should bolster client-side defenses, suggesting never letting private keys or seed phrases transit an AI agent session.

The long-term fix is for AI companies to cryptographically sign their responses so the instructions an agent executes can be mathematically verified as coming from the actual model. 

Magazine: Nobody knows if quantum secure cryptography will even work