Binance Square
LIVE
LIVE
kaymyg
Hausse
--721 views
#Circle makes it to #Solana New Pre-Mint Address for $USDC on #Solana. Ahead of mainnet launch for Cross-Chain Transfer Protocol (CCTP) on Solana on March 26, 2024, we’ve deployed a new pre-mint address to enable CCTP to programmatically mint USDC on Solana.   The new address is: #FSxJ85FXVsXSr51SeWf9ciJWTcRnqKFSmBgRDeL3KyWw  and the full list of pre-mint addresses are contained within our GitHub repo. For exchanges and websites that track USDC in circulation for Solana, you can continue to use our public API as normal – no action is required.   Pre-minting details On some non-EVM blockchains like Solana, Circle uses the concept of pre-minting to create and hold a balance of USDC before it goes into circulation. This is made possible by pre-mint addresses, which hold USDC that is not considered part of the circulating supply until Circle officially authorizes a mint.   How it works Pre-mint addresses have an existing balance of pre-minted USDC, which is not considered in circulation.When a customer sends US dollars to Circle to mint USDC, Circle authorizes a pre-mint address to send USDC to the customer’s Circle Mint account, which means USDC in circulation goes up.When a customer sends USDC to Circle to redeem for US dollars, Circle sends USDC to a pre-mint address, which means USDC in circulation goes down. This operation is analogous to a burn of USDC on an EVM blockchain.   For any questions or help getting started with your build, join the conversation in our Discord.

#Circle makes it to #Solana

New Pre-Mint Address for $USDC on #Solana .

Ahead of mainnet launch for Cross-Chain Transfer Protocol (CCTP) on Solana on March 26, 2024, we’ve deployed a new pre-mint address to enable CCTP to programmatically mint USDC on Solana.

 

The new address is: #FSxJ85FXVsXSr51SeWf9ciJWTcRnqKFSmBgRDeL3KyWw  and the full list of pre-mint addresses are contained within our GitHub repo. For exchanges and websites that track USDC in circulation for Solana, you can continue to use our public API as normal – no action is required.

 

Pre-minting details

On some non-EVM blockchains like Solana, Circle uses the concept of pre-minting to create and hold a balance of USDC before it goes into circulation. This is made possible by pre-mint addresses, which hold USDC that is not considered part of the circulating supply until Circle officially authorizes a mint.

 

How it works

Pre-mint addresses have an existing balance of pre-minted USDC, which is not considered in circulation.When a customer sends US dollars to Circle to mint USDC, Circle authorizes a pre-mint address to send USDC to the customer’s Circle Mint account, which means USDC in circulation goes up.When a customer sends USDC to Circle to redeem for US dollars, Circle sends USDC to a pre-mint address, which means USDC in circulation goes down. This operation is analogous to a burn of USDC on an EVM blockchain.

 

For any questions or help getting started with your build, join the conversation in our Discord.

Ansvarsfriskrivning: Inkluderar åsikter från tredje part. Ingen ekonomisk rådgivning. Se användarvillkor.
0
Relevant kreatör
LIVE
@kaymyg

Utforska mer från Creator

--
(@sell9000 ) PSA re: an expensive opsec lesson At this time I have confirmed that it was a Google login that caused this compromise. An unknown Windows machine gained access about half a day before the attack. It also spoofed the device name, so the notification of the new activity alert (which occurred early morning while I was asleep) appeared similar to devices I normally use (it may have been a calculated gamble for a common device name unless I was specifically targeted). Upon further investigation, this device is a VPS hosted by #KaopuCloud as a global edge cloud provider that is shared among hacker circles in Telegram, and has been used in the past for #phishing and other malicious activities by shared users. I do have 2FA enabled, which the user managed to bypass. I have yet to determine exactly how this was achieved, but possibly attack vectors were OAuth phishing, cross site scripting, or man-in-the-middle attack on a compromised site, followed by possible additional #Malware . In fact, apparently #OAuth endpoint attack recently has been reported to hijack user cookie session (https://darkreading.com/cloud-security/attackers-abuse-google-oauth-endpoint-hijack-user-sessions…). Be extremely careful if you have to use Sign In From Google. Takeaways: 1. Bitdefender sucks, it caught nothing while Malwarebytes caught a bunch of vulnerabilities after the fact. 2. Do not become complacent just because you were moving large figures for years without issues. 3. Never enter a seed, period, no matter what reasonable excuse you give yourself. Not worth the risk, just nuke the computer and start fresh. 4. I'm done with Chrome, stick with a better browser like Brave. 5. Preferably never mix devices, and have an isolated device for crypto activities. 6. Always check the Google Activity alert if you are continuing to use Google based devices or authentication. 7. Turn off extension sync'ing. Or just turn off sync'ing period for your isolated crypto machine. 8. 2FA is clearly not bulletproof, don't become complacent to it.
--
Webbplatskarta
Cookie Preferences
Plattformens villkor