Connect with us

Crypto

What Is Celestia (TIA) Cryptocurrency?

Published

on

What Is Celestia (TIA) Cryptocurrency?

The native token of the Celestia blockchain, TIA has a market capitalisation of over $US1.3 billion. That places it in the top 100 coins globally, but the token’s value seems to be trending downwards.

TIA started the year at around $US12, reached an all-time high of over $US20 in February, and at the time of writing was worth $US6.90. Of course that’s still up over 200% on its initial listing price of $US2.08 around 240 days prior.

Celestia is a Layer 1 blockchain, designed to be ‘modular’ in nature with the goal of making it easy for developers to launch their own blockchain. Development time is primarily reduced by enabling developers to combine existing rollup (aka Layer 2 scaling solution) technology options to create their own customised stack. Celestia lets you can build an independent blockchain where:

  • The ‘execution’ layer of the blockchain—where smart contracts and transactions happen—can be separate from the consensus mechanism.
  • The blockchain’s consensus mechanisms and data availability functions leverage Celestia infrastructure, including its network validators.

The Celestia project was initiated in 2019 by co-founders Mustafa Al-Bassam and Ismail Khoffi and attracted considerable venture capital investment including a $US1.5 million seed round in 2021 and $US55 million raised in 2022. Celestia is built on the Cosmos SDK framework.

What Is the TIA Token?

One billion TIA tokens were created, with 20% for public allocation. Its current circulating supply is around 193 million. More tokens owed to initial investors will be gradually unlocked over coming years—which can be freely traded—with the first unlock event in October this year.

The TIA token’s role in the Celestia blockchain is three-fold:

Advertisement
  1. Developers use TIA to pay gas fees on transactions and to publish data to what’s known as a ‘blobspace’ on the network’s data availability layer.
  2. Network validators and delegators stake TIA to support network consensus activities—verifying and securing transactions across a decentralised network of computers—as Celestia is a proof-of-stake blockchain. Validators and delegators also earn staking rewards in the form of TIA.
  3. TIA holders get some governance powers, being able to propose and vote on proposals to change a subset of network parameters.

Celestia’s TIA token is not to be confused with the token of the Tiamonds project, which also trades under the TIA symbol. The alternate TIA is a token distributed to owners of tokenised diamonds sold via the Tiamonds platform—which touts itself as the world’s largest tokenised diamond marketplace.

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Crypto

China Discovers ‘Largest’ Undersea Gold Deposit in Asia as State Mining Ambitions Expand

Published

on

China Discovers ‘Largest’ Undersea Gold Deposit in Asia as State Mining Ambitions Expand
China says it has uncovered Asia’s largest undersea gold deposit, a massive offshore find that strengthens domestic supply, reshapes regional resource rankings, and highlights Beijing’s accelerating push to secure strategic minerals.
Continue Reading

Crypto

North Korean hackers allegedly stole record $2.02 billion of cryptocurrency in 2025. Here’s how they did it | Stock Market News

Published

on

North Korean hackers allegedly stole record .02 billion of cryptocurrency in 2025. Here’s how they did it | Stock Market News

North Korea remains dominant threat to cryptocurrency security in 2025, even while confirmed incidents have decreased, according to a report by blockchain analytics company Chainanlysis.

Hackers from the Democratic People’s Republic of Korea (DPRK) allegedly stole a record $2.02 billion of crypto this year — a 51% jump compared to 2024, and taking their all-time total to $6.75 billion, it added.

The analysis further found that the DRPK is achieving larger thefts with fewer incidents, using unique methods to gain access and pull off their heists.

North Korea’s alleged crypto heists: Here’s how they did it

As per the report, these hacks were often carried out in unique fashion by embedding IT workers inside crypto services or using sophisticated impersonation tactics targeting executives.

Embedding IT workers

This is among the DPRK’s “principal attack vectors”, the report said. It added that the hackers secured jobs inside crypto services to gain privileged access and enable high‑impact compromises.

Advertisement

“Part of this record year likely reflects an expanded reliance on IT worker infiltration at exchanges, custodians, and web3 firms, which can accelerate initial access and lateral movement ahead of large‑scale theft,” it noted.

Fake jobs

Further, taking the IT worker model and “flipping it on its head”, the analysis said that DPRK-linked operators are also increasingly impersonating recruiters for prominent web3 and AI firms. This way, they orchestrate fake hiring processes that culminate in “technical screens” designed to harvest credentials, source code, and VPN or SSO access to the victim’s current employer.

“At the executive level, a similar social‑engineering playbook appears in the form of bogus outreach from purported strategic investors or acquirers, who use pitch meetings and pseudo–due diligence to probe for sensitive systems information and potential access paths into high‑value infrastructure,” it added.

Higher- value attacks

Over the years, DPRK-linked operators are increasingly undertaking significantly higher-value attacks compared to other threat actors. “This pattern reinforces that when North Korean hackers strike, they target large services and aim for maximum impact,” the report added.

It noted that “this year’s record haul came from significantly fewer known incidents”, including the massive $1.5 billion Bybit hack in February 2025.

Advertisement

DPRK’s distinctive laundering patterns

Not just the hacking process, the laundering of stolen funds is also distinctive, the report said. It noted that more than 60% of laundering was of volume concentrated below $5,00,000 transfer value tranches, despite the total stolen amounts being larger.

“Even while the DPRK consistently steals larger amounts than other stolen fund threat actors, they structure on-chain payments in smaller tranches, speaking to the sophistication of their laundering,” it added.

Continue Reading

Crypto

Coinbase Security Impersonation Scheme Exposed as Authorities Claim Nearly $16M Was Siphoned

Published

on

Coinbase Security Impersonation Scheme Exposed as Authorities Claim Nearly M Was Siphoned
Authorities allege a sweeping crypto phishing operation that drained nearly $16 million from Coinbase users nationwide, underscoring how social engineering scams exploit trust, move funds across blockchains, and trigger aggressive enforcement by New York prosecutors.
Continue Reading

Trending