US national on repatriation flight tests positive for hantavirus
Another one of 17 Americans who are being flown home has mild symptoms, the US health department says.
Another one of 17 Americans who are being flown home has mild symptoms, the US health department says.

Crypto analyst Michaël van de Poppe posted on X on May 11 that altcoins are beginning to break out to the upside, running one to three weeks behind Bitcoin’s move.
If that lag holds, Van de Poppe says altcoins could deliver gains of 100-300%, depending on momentum and available liquidity.
Van de Poppe has been one of the more closely followed voices in crypto through this cycle, and his reasoning is fairly straightforward: Bitcoin moves first, altcoins tend to follow with a delay, and when they do move, the percentage gains are usually far larger.
“If Bitcoin went up 40% from the lows, altcoins can do 100-300% depending on the momentum and the amount of liquidity in the books. We’re in that stage,” he wrote.
That framing got some support from trader Mark Chadwick, who posted that altcoins are “flashing the strongest signals we’ve seen in years.” He pointed to a breakout of a major falling wedge pattern and described last week’s candles as the biggest breakout moves in a long time.
“This is exactly how major alt runs begin,” he wrote, adding that the setup looks even stronger when you factor in the broader backdrop: expanding liquidity, the Russell 2000 hitting all-time highs, and the Digital Asset Market Clarity Act of 2025 edging closer to passage.
That last point matters because the Senate Banking Committee is scheduled to meet on May 14 to consider the crypto market structure bill, putting it back on the calendar after previous postponements.
The White House is also pushing Congress for faster action, and if institutional money starts flowing into crypto under a clearer regulatory framework, Chadwick argued, “this market could move on an entirely different scale.”
Van de Poppe also updated everyone about his own altcoin portfolio. He has put in a total of $160,000 in the portfolio, which is currently worth about $78,000, down by about 50% from the time he bought in but still up from an earlier drop of 75%.
He plans to add another $40,000 in four monthly tranches through September 1, then stop. The reason for that is that he believes the market has likely bottomed and wants to focus on compounding returns rather than putting in more fresh capital.
Van de Poppe’s comments have coincided with a broader improvement in crypto markets.
While Bitcoin was trading at around $81,000 at the time of writing, having been relatively quiet in the last 24 hours and gaining just 0.1%, per CoinGecko, the altcoin picture was more interesting, with several mid-cap tokens posting large gains during the weekend.
As CryptoPotato reported, ONDO and JUP rose more than 20% in a single day, with NEAR, ARB, and ICP also moving higher.
On the other hand, Ethereum is holding near $2,300, even though it dropped about 2.4% in the last 24 hours, while XRP was trading at around $1.45 after earlier rising to a three-week high of $1.50. Meanwhile, their top 10 counterpart, Solana, climbed 11% on the week to around $95.
The post Analyst Predicts Massive Altcoin Rally After Bitcoin Run appeared first on CryptoPotato.
But beneath the promise of passive earnings lies a more technical system involving validators, network security, lock-up periods, and risk management. Understanding how staking actually works is essential before committing funds to any blockchain protocol.
This article breaks down the fundamentals of crypto staking simply and practically.
Crypto staking is the process of locking cryptocurrency into a blockchain network to help support its operations. In return, participants receive rewards from the network.
Staking is commonly associated with blockchains that use a mechanism called Proof of Stake (PoS).
Unlike Bitcoin’s Proof of Work system, where miners use computing power to validate transactions, Proof of Stake networks rely on users who commit coins to the network. These users help verify transactions and maintain blockchain security.
Popular staking networks include:
When you stake crypto, you are essentially helping the blockchain remain decentralized and operational.
Validators are the backbone of Proof of Stake blockchains.
A validator is responsible for:
To become a validator, users usually need to stake a significant amount of cryptocurrency. For example, Ethereum validators require 32 ETH to operate independently.
Because running a validator can be technically demanding, many users instead delegate their tokens to professional validators through staking platforms or wallets.
Here is the simplified process:
The more stake a validator controls, the greater the chance they are selected to validate transactions and earn rewards.
Many beginners assume staking rewards are “free money.” In reality, rewards come from several blockchain mechanisms.
These usually include:
Some blockchains create new coins over time to incentivize validators and stakers.
This works similarly to how central banks issue currency, except blockchain issuance follows programmed rules.
Users pay transaction fees whenever they interact with the blockchain.
Part of those fees may be distributed to validators and delegators.
Certain protocols offer additional incentives to encourage participation during early growth stages.
This is why newer projects sometimes advertise unusually high staking returns.
One of the most misunderstood aspects of staking is liquidity restriction.
When you stake crypto, your assets are often locked for a certain period of time.
This means:
For example:
This matters because crypto markets move quickly. A token’s price can rise or collapse while your funds remain locked.
Investors should always check:
before committing funds.
Staking is often promoted as low-risk passive income, but it still carries significant risks.
The largest risk is often not staking itself, but the cryptocurrency’s price movement.
Example:
In that case, the staking yield does not offset the capital loss.
If a validator behaves maliciously or experiences downtime, penalties may occur.
This process is known as slashing.
Slashing can reduce the validator’s stake — and potentially affect delegated users as well.
Some staking platforms rely on smart contracts.
If vulnerabilities exist, funds could be exploited or lost.
This is particularly important in decentralized finance (DeFi) ecosystems.
Large staking providers can accumulate excessive control over networks.
If too much stake becomes concentrated among a few entities, blockchain decentralization weakens.
Locked funds may prevent investors from reacting to sudden market conditions.
This becomes especially dangerous during major market crashes.
One of the biggest misconceptions in crypto staking involves advertised returns.
You will often see platforms promoting:
These numbers can be misleading.
Higher APY figures often assume rewards are continuously restaked.
A high-stakes APR does not guarantee real gains.
Several factors can reduce profitability:
For example:
A project may offer 80% staking rewards, but if the token loses 85% of its value, stakers still lose money overall.
This is why experienced investors evaluate:
Instead of focusing only on reward percentages.
Staking is generally considered safer than speculative trading, but it is not risk-free.
The safety of staking depends on:
Major established networks tend to carry lower operational risk than smaller experimental projects.
However, even reputable ecosystems can experience technical failures, governance issues, or severe price declines.
To solve liquidity problems, many platforms now offer liquid staking.
Liquid staking allows users to:
These tokenized assets can sometimes be traded or used in DeFi applications while the original funds remain staked.
Although convenient, liquid staking introduces additional smart contract and counterparty risks.
Crypto staking plays a critical role in modern blockchain networks. It helps secure decentralized systems while allowing users to earn rewards for participation.
However, staking is far more complex than simply “locking coins for passive income.”
Validators maintain network integrity, rewards are tied to economic incentives, lock-up periods affect liquidity, and high APR figures can sometimes create unrealistic expectations.
For beginners, the most important lesson is this:
Staking rewards should never be evaluated in isolation. The long-term value of the underlying asset, the security of the network, and the sustainability of the reward model matter far more than headline percentages.
As Proof of Stake ecosystems continue expanding, staking will likely remain a central pillar of the cryptocurrency economy — but informed participation will always be more important than chasing the highest yield.
The post What Actually Happens When You Stake Crypto? appeared first on Smart Liquidity Research.
The Academy Award winner will topline the “serial killer procedural” that is being described as an “original, violent and blistering high-stakes thriller” being introduced to buyers in Cannes this week.

The whitehat hacker said the decision to exploit Renegade’s dark pool was made to protect the funds and safety of DeFi users.
Well-known and award-winning international centralized crypto exchange Toobit has announced that it managed to achieve an AAA security rating from CER.live
This is the industry’s premier cybersecurity ranking and certification platform. The milestone makes Toobit one of the top 10 most secure crypto exchanges globally (according to the certifiers). The move follows rigorous audits of its infrastructure and protocols installed to enhance user protection.
CER.live data shows that Toobit was able to score a perfect 100/1000 in Server Security, User Security, Penetration Testing, and Bug Bounty management.
Combined with ISO 27001 certification and funds insurance, these metrics confirm a resilient, robust security environment for international traders.

It’s important to understand that the CER.live methodology is globally recognized as one of the most comprehensive in the entire digital asset industry.
The ranking process tends to evaluate more than 18 indicators across server security, user security, penetration testing, as well as bug bounty programs. In order to receive an AAA rating, which is the highest possible tier, the exchange has to pass rigorous technical scans. It also has to demonstrate operational transparency through recurring external audits as well as bug bounty programs.
This security milestone follows Toobit’s recent Proof of Reserves (PoR) report, independently verified by Hacken. The Hacken audit confirmed that Toobit maintains a collateral ratio of over 100% across all in-scope digital assets, including BTC, ETH, USDT, and USDC.
The need for such standards is further underscored by the current landscape of the crypto industry. The value of hacked or stolen money in the ecosystem increased by 31% year-over-year in early 2026. Moreover, threats driven by the advance of AI such as automated smart contract probing, as well as deepfake phishing, have become some of the fastest-growing cyber risks for trading platforms.
In a world where illicit actors are becoming more targeted, third-party verification from reputable auditors is absolutely essential for establishing platform integrity.
The post Toobit Achieves AAA Security Rating from CER.live, Ranking Among Top 10 Global Exchanges appeared first on CryptoPotato.
Actor-producer Kelvin Harrison Jr. will join the jury and present the Golden Globes Prize for Documentary in Partnership With Artemis Rising Foundation during the 79th edition of the Cannes Film Festival. Harrison Jr. shared a SAG Award with the cast of “The Trial of the Chicago 7.” His recent and upcoming work includes voicing Taka […]
Returning for its second year, the honor is handed out in partnership with the Artemis Rising Foundation.
The first US presidential visit to China in almost 10 years will test a fragile tariff truce.
Privacy proponents have criticized Google’s latest updates to its reCAPTCHA system, arguing it has effectively “locked out” millions of websites from Android users running privacy–focused operating systems.
Google-owned reCAPTCHA is used to verify whether a user is a person, usually by asking them to click on images of a bus or a fire hydrant.
Google announced “Cloud Fraud Defense” in late April, branding it “the next evolution of reCAPTCHA.”The latest update now presents users with a QR code to verify their humanity, but requires Google Play Services or the Apple equivalent to be running on the device, which isn’t present on “de-Googled” Android phones, such as those running GrapheneOS or CalyxOS.
“They’re directly participating in locking out competition via their own services,” said the GrapheneOS team on Sunday, referring to the increasing use of Apple’s App Attest and Google’s Play Integrity.
“Requiring people to have an Apple device or Google-certified Android device is anti-competition, not security.”
Privacy advocates often use de-Googled mobile operating systems to prevent data harvesting by Google software and have more freedom over what can be installed on their devices.
“Privacy-conscious internet users are being demoted from 2nd to 3rd class netizens,” said Bitcoin security researcher and cypherpunk Jameson Lopp on Sunday.
“Google now treats privacy as suspicious behavior by default,” cybersecurity outlet International Cyber Digest said.
The CEO and co-founder of the privacy-focused Brave browser, Brendan Eich, said services shouldn’t ban people from using arbitrary hardware and operating systems in the first place.
“Google’s security excuse is clearly bogus when they permit devices with no patches for ten years… It’s for enforcing their monopolies via GMS licensing, that’s all.”

Source: Jameson Lopp
To complete mobile verification, one must use a compatible mobile device that includes Google Play Services version 25.41.30 or greater or iOS version 15.0 or greater, states Google on its website.
The team at GrapheneOS explained that the move would impact Microsoft Windows or other operating systems not certified by Google or Apple. The prompt is primarily going to be shown on desktop platforms, but could be expanded, it said.
“Their plan requires having a certified Android device or iOS device to pass this on a desktop,” they added.
Related: Google Chrome’s 4GB AI model shows why browser trust matters for crypto security
“Control over reCAPTCHA puts Google in a position where they can require having either iOS or a certified Android device to use an enormous amount of the web.”
Google attempted something similar in 2023 with a system called “Web Environment Integrity (WEI),” which would have let the company decide which devices were “real enough” to access the web, wrote International Cyber Digest.
“Standards bodies and the public pushed back hard, and Google killed it. Three years later, the same idea is back, just hidden behind a QR code instead of a browser feature,” they added.
Magazine: Strategy reveals why they would sell BTC, Trump Media posts loss: Hodler’s Digest