Releases Experimental Authenticators for Google Chrome, Safari

The developers at, a Cayman Islands-registered open-source software publisher focused on the ongoing development of EOS, one of the largest platforms for building and deploying decentralized applications (dApps), have released a set of Reference Authenticator apps.

The apps have been launched as “experimental reference Open Source Software”,’s development team clarified. As noted in a blog post published on May 29, 2019, by the leading blockchain-powered software developer, the Reference Authenticator apps are available for iOS users.

Key Management and Signing Protected by Biometric Authentication

The distributed ledger technology (DLT)-based software allows users to log in and approve transactions from web-based applications running on the mobile Safari browser,’s blog mentioned. Additionally, it stated users may access the Reference Authenticator from “other native iOS apps on the same device."

As explained in the software publisher’s blog, key management and signing are performed in Apple’s Secure Enclave and/or Keychain and are “protected with the device’s biometric authentication.”

Signing in and Approving Transactions via Google Chrome, Safari

In order to provide this type of security, the apps “leverage” the recently-introduced EOSIO software development kit (SDK) for Swift library and its “Vault Signature Provider.” This type of functionality allows users to authenticate and sign transactions from third-party mobile apps,’s blog explained.

The software development firm’s blog further noted that the Reference Authenticator apps are now also available as a Google Chrome Extension. This will allow users to sign in and approve their transactions directly from web-based apps that are opened using the Google Chrome browser (from both mobile and desktop computers). A secret passphrase, managed by the user, is used to secure the key management and signing process.

Tropical Stay App Demonstrates How Login and Transaction Verification Process Works

Web-based apps are also able to integrate (or are compatible) with the EOSIO Reference Authenticator apps, by using the Universal Authenticator Library and “the EOSIO Reference Authenticator plugin for UAL.”’s latest Reference Authenticator release package also includes a newly developed Tropical Stay app, which shows how the sign in and transaction verification process works. Moreover, developers may directly use EOS Javascript (EOSJS) and an appropriate signature provider to accomplish the same tasks.

Notably, the EOSIO Reference Authenticator apps are “entirely chain agnostic” and they have been implemented in a manner that does not require communication with EOSIO nodes directly.

Data Analytics Firm LongHash Refutes Tether Manipulation Causing Bitcoin's 2017 Bull Run

  • A new report by crypto analytics firm LongHash refutes Tether's manipulation of the market and bitcoin's price.
  • LongHash found that Tether's influence on BTC is strongest when bitcoin's price falls. 

A new report by crypto data analytics firm LongHash refutes the idea that Tether manipulated the market to create bitcoin’s 2017 bull run. 

LongHash’s report disputes the previously published controversial academic paper “Is Bitcoin Really Un-Tethered?,” which argues that stablecoin manufacturer Tether played a role in manipulating the market for bitcoin’s massive bull run at the end of 2017.

The academic paper, authored by the University of Texas professor John Griffin and Ohio State University Assistant Professor Amin Shams, also claimed that a single whale investor was responsible for kick-starting the BTC price bubble. 

According to the report, LongHash analyzed a metric called “Tether Purchasing Power” to determine its influence on bitcoin’s price, 

To measure the impact of Tether on the Bitcoin market, we calculated a metric called Tether Purchasing Power, which is defined as the market cap of Tether divided by the market cap of Bitcoin. It measures how many Bitcoins can be purchased with all the Tether supply in the market at its current spot price. The higher the ratio, the more potential manipulation could have been perpetrated with Tether.

LongHash determined that Tether’s impact on the market is strongest when the price of bitcoin falls rather than increases. Per LongHash, the data suggests that if Tether was using the USDt stablecoin to manipulate the market, it would be at its strongest when BTC's price falls. PEr its report, "Tether's potential influence on Bitcoin prices" would be "maximal during bear, not bull, markets."

The report concludes current evidence “to be lacking” in supporting Tether’s manipulation of the price of bitcoin.

Featured Image Credit: Photo via