Author name: Kaspar Triebstok

Why Redcurry Exists?

Most financial tools today are built for one of two things: speculation or stagnation. If you want growth, you’re pushed toward high-risk investments that swing with the market. If you want stability, you’re offered near-zero yields that barely outpace inflation—if at all. At the same time, real estate remains one of the most trusted ways to …

Why Redcurry Exists? Read More »

ownerless money, a public commons

Access Over Ownership: Why You Should Embrace Decentralized Money

In an era where key assets are not owned but accessed, the importance of ownership dwindles. Access, powered by technological advancements is shaping our economy and giving you the benefits of ownership without the responsibilities. As society continues to decentralize, one aspect has remained unchanged – money. However, this is shifting, and it’s a change …

Access Over Ownership: Why You Should Embrace Decentralized Money Read More »

PolygonID

Identity: A Key Bottleneck to Mass DLT Adoption

Distributed Ledger Technology (DLT) has gained significant traction in recent years, with cryptocurrencies like Bitcoin and Ethereum becoming household names. DLT has the potential to revolutionize industries by offering increased transparency, security, and efficiency. However, mass adoption of this technology is hindered by various challenges, with identity and proof of uniqueness being two of the …

Identity: A Key Bottleneck to Mass DLT Adoption Read More »

Drawing of a hacker wearing a blue hoodie and sitting behind the red laptop, face hidden. We see the hacker through the layer of ones and zeros in the foreground.

12 Common Smart Contract Vulnerabilities and How To Address Them

Smart contracts provide a fundamental benefit by enabling us to verify the software that underlies a service and its actions without relying on trust in the service provider.   For a decentralized currency system to be adopted, it must be based on immutable rules, public auditability, and trust. This requires the use of secure and …

12 Common Smart Contract Vulnerabilities and How To Address Them Read More »