Coinbase Earn Adds Zcash, Letting Users Earn $3 Worth of ZEC Learning About It

The latest addition to Coinbase Earn, a section of the San Francisco-based cryptocurrency exchange’s website that lets users earn cryptocurrencies while learning about them, is the privacy-centric cryptocurrency Zcash (ZEC).

When it was launched late last year, the program initially featured 0x. Earlier this month, Coinbase added Brave’s Basic Attention Token (BAT) to the program. Through it, users can earn these cryptos by simply watching videos about them and learning.

While the other two cryptocurrencies were well-received by the cryptocurrency community, some have revealed they aren’t happy watching videos about Zcash to “only” earn $3 worth of ZEC tokens. This, as if they’re looking to sell the tokens on Coinbase itself fees will eat a part of the already small prize.

Nevertheless, some were happy to be able to earn ZEC by simply learning about it. Notably, while the BAT token jumped over 12% when the cryptocurrency was added to Coinbase’s program, the same hasn’t happened with Zcash.

The privacy-centric cryptocurrency, according to CryptoCompare data, is currently down by 0.6% in the last 24 hours, as it’s trading at $51.8. Its decline isn’t part of a general market trend, as most other top cryptocurrencies are up, with BTC rising 0.25% in said period.

P2P Token Trading Platform AirSwap Discloses ‘Critical Vulnerability’

  • Peer-to-peer trading platform AirSwap claims to have identified a "critical vulnerability" in one of its smart contracts. 
  • Ten addresses have been identified so far as being at risk of exploitation. 

Peer-to-peer token trading network AirSwap has disclosed a “critical vulnerability” in a newly released smart contract. 

AirSwap's Critical Vulnerability

According to the disclosure, which was published on Sept. 13, AirSwap’s internal security team identified a potential exploit in a newly released mainnet smart contract. The vulnerability would allow an attacker to “perform a swap without requiring a signature from a counterparty.” 

AirSwap claims that the offending code was only present for twenty-four hours on the network before being identified and removed. However, users of AirSwap Instant between Sept. 11 and Sept. 12 may have been affected by the vulnerability, with the report claiming that 10 accounts have been recognized so far as being at risk. 

AirSwap has published the addresses to the vulnerable accounts, telling all other users that no further action is required. The report also outlines the step-by-step actions taken by the exchange in the aftermath of discovering the vulnerability, including an apology to its client base, 

We would like to deeply apologize to our affected users for any inconvenience these vulnerabilities may have caused, and hope that the important lessons we continue to learn throughout these processes form the basis for a more open, secure, and efficient trading environment.

Featured Image Credit: Photo via