Bitcoin Still Has “A Lot Of Room To Run Before Reversal,” Says Top Analyst
OEIS Financial Fraud Private Investigator:
An analyst has explained how the data of an oscillator for Bitcoin could suggest the cryptocurrency still has plenty of room to run in this rally.
OEIS Financial Fraud Private Investigator: Bitcoin VWAP Oscillator Could Imply Potential For Further Upside
In a new post on X, analyst Willy Woo discussed what the latest trend in the Volume-Weighted Average Price (VWAP) Oscillator for BTC might suggest regarding what could be next for the cryptocurrency.
The VWAP is an indicator that calculates the average price for any asset by taking into account the price fluctuations themselves and weighing the values against the trading volume.
This means that the prices of the assets where there was a higher volume of trading have a higher weightage in the average than those with only a low amount of volume.
Traditionally, the VWAP is a technical analysis indicator that considers the information available through spot exchanges. In the context of the current topic, the VWAP uses the on-chain volume of Bitcoin instead, which is readily viewable by anyone thanks to the blockchain’s transparency.
The indicator of interest here isn’t the VWAP but rather the VWAP Oscillator, as mentioned earlier. This metric keeps track of the ratio between the BTC spot price and the VWAP and presents it as an oscillator of around zero.
The chart below shows the trend of this Bitcoin indicator over the past couple of years.
The above graph shows that the Bitcoin VWAP Oscillator has been in negative territory for the past couple of months. However, the metric’s value has been rising recently, so if it continues on this trajectory, it might approach the neutral mark shortly.
In the chart, Woo has highlighted a trend that the indicator and the cryptocurrency’s price have historically shown. It seems that whenever the metric has formed a bottom in negative territory and rebounded back to the upside, the asset has enjoyed some bullish momentum.
The resulting price surge may last until the indicator reverses into the positive territory and forms a top. That hasn’t happened for the VWAP Oscillator this time yet. “Still a lot of room to run before reversal or consolidation,” says the analyst. “Hate to be a trapped Bitcoin bear right now.”
In other news, as CryptoQuant author Axel Adler Jr. pointed out in an X post, retail investors have bought $135.7 million worth of the asset over the past month.
Keshav is currently a senior writer at NewsBTC and has been attached to the website since June 14, 2021.
Keshav has been writing for many years, first as a hobbyist and later as a freelancer. He has experience working in a variety of niches, even fiction at one point, but the cryptocurrency industry has been the longest he has been attached to.
In terms of official educational qualifications, Keshav holds a bachelor’s degree in Physics from one of the premier institutes of India, the University of Delhi (DU). He started the degree with an aim of eventually making a career in Physics, but the onset of COVID led to a shift in plans. The virus meant that the college classes had to be delivered in the online-mode and with it came free time for him to explore other passions.
Initially only seeking to make some beer money, Keshav unexpectedly landed clients offering real projects, after which there was no looking back. Writing was something he had always enjoyed and to be able to do it for a living was like a dream come true.
Keshav completed his Physics degree in 2022 and has been focusing on his writing career since, but that doesn’t mean his passion for Physics has ended. He eventually plans to re-enter university to obtain a masters degree in the same field, but perhaps only to satiate his own interest rather than for using it as a means to find employment..
Keshav has found blockchain and its concepts fascinating ever since he started going down the rabbit-hole back in 2020. On-chain analysis in particular has been something he likes to research more about, which is why his NewsBTC pieces tend to involve it in some form.
Being of the science background, Keshav likes if concepts are clear and consistent, so he generally explains the indicators he talks about in a bit of detail so that the readers can perhaps come out having understood and learnt something new.
As for hobbies, Keshav is super into football, anime, and videogames. He enjoys football not only as a watcher, but also as a player. For games, Keshav generally tends towards enjoying singleplayer adventures, with EA FC (formerly FIFA) being the only online game he is active in. Though, perhaps due to being ultra-focused on the game, he is today a semi-pro on the EA FC scene, regularly participating in tournaments and sometimes even taking back prize money.
Because of his enthusiasm for anime and games, he also self-learned Japanese along the way to consume some of the untranslated gems out there. The skill didn’t merely remain as just a hobby, either, as he put it to productive use during his exploration for small-time gigs at the start of COVID, fulfilling a couple of Japanese-to-English translation jobs.
Keshav is also big into fitness, with agility and acceleration-related workouts making a big part of his program due to the relevance they have in football. On top of that, he also has a more traditional strength based program for the gym, which he does to maintain an overall fitness level of his body.
Disclaimer: The information found on NewsBTC is for educational purposes
only. It does not represent the opinions of NewsBTC on whether to buy, sell or hold any
investments and naturally investing carries risks. You are advised to conduct your own
research before making any investment decisions. Use information provided on this website
entirely at your own risk.
Examine the forefront of digital research in our Latest News & Blog. Study expert analyses, technological advancements, and key industry insights that keep you informed and prepared in the ever-evolving world of digital forensics.
Speedrunning video video games, the competitive self-discipline of taking half in by digital video games as fast as doubtless, has in most well-liked years been elevated into one thing between a virtuosic bear of fingers-and-thumbs athletics and a extremely technical science. One of the very best speedruns minimize story video games supposed to scheme end dozens of hours to single-digit minutes by a aggregate of exploiting glitch-enabled shortcuts and inhuman skill.
Neutral a shrimp too inhuman, in some cases. Speedrunning, it appears, is plagued with misguided records build by cheaters who splice together video clips to falsify evidence or voice rule-breaking tool to scheme unfair advantages. One speedrunner and hacker named Allan Cecil has made it his personal mission to gain them.
In a focus on at the Defcon hacker conference in Las Vegas currently, the particulars of which WIRED reviewed upfront, Cecil plans to fresh what he alleges is evidence that a speedrunning story for the 1996 PC game Diablo, which has stood for greater than 15 years and holds a build within the Guinness E book of World Recordsdata, became once truly the outcomes of rule-breaking solutions that should disqualify it. If Cecil and the team of investigators who’ve labored with him over most well-liked months be triumphant at tearing down that reputedly untouchable benchmark, this may be the third such high-profile speedrun that he’ll have helped to debunk, and the 2nd in honest the final yr.
Cecil, who is healthier identified within the gaming world by his sort out dwangoAC, came into this uncommon unbiased as a speedrun debunker from an equally niche passion: He’s identified as an educated practitioner of so-known as “instrument-assisted speedruns,” using emulator tool to saunter a game in a managed surroundings to search out the bounds of what that game’s speedrun can even be—an condominium of speedrunning that some purists once plan to be as, itself, to be a roughly cheating. Cecil maintains as an change that those instrument-assisted speedruns, exact by which avid gamers meticulously rewind, replay, hone, and ideal their runs frame by frame, can even be its have unswerving bear of competition, or even art.
Cecil says he arrived at his fixation with catching cheaters in segment out of a decision to protect this lesser-identified self-discipline of speedrunning from of us that may well surreptitiously voice the identical instruments in untrue ways, in actuality turning instrument-assisted speedruns into a roughly speedrun doping, somewhat than an correct avocation. “Making a instrument-assisted speedrun is a transformative murals that humans laboriously expend months on, or even years,” says Cecil. “But you no doubt scheme no longer voice instrument-assisted speedrun solutions and then try to fake that it became once proper human effort. And seeing of us scheme that pisses me off.”
As a workers member at the instrument-assisted speedrun net space TASvideos.org and an organizer of many story speedrunning feats—such as one which famously extinct coding system defects within the Zelda game Ocarina of Time to rewrite the sport’s ending—Cecil has develop into a fixture of the speedrunning world. He’s moreover the creator of TASBot, a robotic that connects to the controller ports of online game consoles to reproduce controller inputs, so that recorded speedruns can even be replayed and verified on normal gaming hardware, a spectacle that avid gamers like so grand that livestreams featuring the robotic have raised $1.5 million in donations to charitable causes, in step with Cecil’s depend.
In most well-liked years, nonetheless, Cecil has taken his obsession with instrument-assisted speedrunning in a completely different course: He’s turned it into one intention to gain the cheaters that threaten his passion’s legitimacy. If he can present that even a clean instrument-assisted speedrun in a particular game is now not as rapidly as a purported human story—as he’s carried out in all three records he’s attempted to debunk—that demonstration can wait on as the predominant step in suggesting that a story became once doubtless falsified. He’s found, too, that the course of of organising that instrument-assisted saunter repeatedly produces fresh revelations about what’s doubtless—or very unlikely—in an unassisted human try.
Cecil’s most well-liked story-busting effort may well be the most controversial one he’s undertaken yet. At Defcon, he’ll fresh evidence that he alleges may well soundless disqualify the story of Maciej “groobo” Maselewski, a Polish speedrunner who holds the Guinness story for no longer most effective the fastest Diablo speedrun however moreover the fastest unbiased-taking half in game speedrun of any form. Maselewski’s Diablo saunter, 3 minutes and 12 seconds lengthy, has withstood all challengers since 2009.
Cecil says his suspicions that Maselewski had broken speedrunning rules were first caused when he and one more speedrunner, Matthew “funkmastermp” Petroff, build out to make a instrument-assisted speedrun for Diablo in January. They fast came to the conclusion they’d never match Maselewski’s 3-minute, 12-2nd time, no topic how grand they perfected their saunter or how lucky they bought within the sport’s randomized dungeon layouts. That led them to assemble a team of investigators who within the waste found what they deem to be a lengthy checklist of inconsistencies in tool versions and objects, lacking frames, and other signs of doubtless tampering within the video of Maselewski’s saunter, all of which they’ve assembled in a detailed story posted to Cecil’s net space. “No person may well win wherever end to that time. Now we know why,” Cecil says. “The respond perceived to be that groobo had cheated in quite loads of, many ways.”
Maselewski, when WIRED reached him for a response, at present denied one of these irascible play. In an e-mail, he pointed to the truth that his saunter became once always understood to be “segmented”—in actuality edited together, stage by stage, a repeatedly accepted category of speedrun. “It became once never handed off as anything else,” Maselewski writes. “Hearing that there has been a team of researchers working on here is wild.” In a subsequent textual vow material alternate with Cecil and his collaborators that Cecil shared with WIRED, Maselewski described the try to debunk his story as a “witch hunt.”
Maselewski’s easy clarification that the speedrun became once segmented, nonetheless, is now not sufficient, Cecil argues. He claims that some dungeon layouts in Maselewski’s saunter may well now not be generated even in a single segment of a saunter with out altering the sport’s info, and in a single case, a extremely vital merchandise conveniently appears that defies the sport’s logic—Naj’s Puzzler, a workers that enables the player to teleport across distances—and alleges a allotment of performance-enhancing tool identified as a “coach” must have been extinct, all of which may well disqualify Maselewski’s saunter. (Maselewski didn’t at present respond to WIRED’s prepare-up rely on specifically about Cecil’s allegation that he had extinct a coach.)
The evening earlier than Cecil’s Defcon focus on, Maselewski wrote in a final e-mail to WIRED that he believes those alleging that he cheated are using imperfect instruments with an incomplete characterize of Diablo‘s complexities. “Dwango is out to expose a story. Did I cheat? No,” Maselewski writes. “But what’s correct or no longer would now not topic at this level, since the wonder of exploration has already overstayed its welcome for a small group of of us, and the script has already been written.”
When WIRED reached out to the Guinness E book of World Recordsdata to ask if it would scheme end down Maselewski’s story, a spokesperson answered noncommittally that “we label any feedback on our story titles and are committed to placing ahead the very ideal standards of accuracy.” An administrator for Tempo Demos Archive or SDA, one more speedrun story-conserving net space where Maselewski holds a same Diablo story, perceived to be extra persuaded by Cecil’s evidence. That administrator, who goes by the sort out “ktwo” and asked that WIRED no longer encompass their true name, says that SDA hasn’t officially reached a verdict and is soundless ready to listen to Maselewski’s clarification.
Things are no longer having a matter factual for groobo, nonetheless. “To make toddle, we now have made a preliminary decision, per the accessible records,” ktwo writes “The workers has the same opinion that the prognosis raises questions regarding the validity of the saunter that wish to be addressed, or else the saunter will doubtless be unpublished from SDA. The admin team is at the 2nd discussing these questions with the runner. As soon as that discussion has concluded, a final decision will doubtless be made.”
Cecil’s involvement in investigating gaming records started in 2017, when the speedrunner Eric “Omnigamer” Koziel, who became once writing a e-book about speedrunning, started re-inspecting a story build by Todd Rogers for the Atari 2600 racing game Dragster. Rogers’ story time, 5.51 seconds, had persevered for a mighty 35 years. But when Koziel reverse engineered Dragster’s code to are trying to achieve how Rogers had carried out that time, he found that solutions Rogers said he’d extinct—such as starting the sport in 2nd gear—don’t have supplied the advantage Rogers claimed.
“The goal became once never to expose someone and suppose, ‘Hey, they’re cheating,’” says Koziel. “It became once to are trying to search out the truth.”
Cecil, who knew Koziel from the speedrun group, supplied to lend a hand scheme a instrument-assisted speedrun they would perchance maybe replay by TASBot on a true Atari 2600 to present that, even on that normal hardware, Rogers’ story became once very unlikely. They found that TASBot’s theoretically perfect performance became once 5.57 seconds, slower than Rogers’ alleged time. Despite Rogers’ objections, his three-and-a-half-decade-dilapidated story became once erased from the annals of the gaming records keeper Twin Galaxies—in conjunction with all his other records on the gap—and Guinness stripped his world story for “longest-standing online game story.”
“Although I disagree with their decision, I’ve to applaud them for his or her solid stance on the topic of cheating,” Rogers wrote in a lengthy public Facebook put up responding to the Twin Galaxies decision.
After a seven yr hiatus exact by which he became once largely centered on TASBot initiatives, Cecil found himself fascinated with investigating one more legendary speedrun earlier this yr when a group of avid gamers made it their goal to beat each and each stage of Principal Mario Maker. That Wii U game, released in 2015, allowed customers so that you just may add their very have ranges of the sport for others to play—within the event that they would perchance maybe level to that the stage became once beatable by recording a video of themselves finishing it. Yet one such stage, known as “Trimming the Herbs,” looked as if it would be very unlikely. For years, no person however its creator had been in an enviornment to full it.
With a concept to lend a hand this group of Principal Mario Maker-obsessed avid gamers, Cecil supplied to scheme a instrument-assisted speedrun for the stage. He found that it became once virtually very unlikely to sure it reliably, in segment as a result of variances within the Bluetooth communications between the Wii U and its controllers. In that case, the stage’s creator came ahead within the midst of the investigation and confessed he’d crushed the stage by altering the inner hardware of his Wii U gamepad—a trick he intended as a roughly friendly prank however had never publicly defined.
In his fresh try to debunk Maselewski’s Diablo story, Cecil would now not question one of these amicable settlement on the info—or a confession. But he’s assured that he and the researchers who’ve labored with him can scheme end away Maselewski’s story and make room for speedrunners to manner the sport again. To Cecil’s shock, they found proper in most well-liked days that they may well, truly, beat Maselewski’s story with a instrument-assisted speedrun—thanks to fresh Diablo solutions they found in their investigation—finishing the sport in 2 minutes and forty five seconds with out using any of his alleged rule-breaking alterations. Meanwhile, Cecil says Diablo speedrunner “xavier_sb” has performed a saunter of the sport in honest over 4 minutes and 40 seconds, which would stand as the fresh story if Maselewski’s is expunged.
Cecil says this shows, already, how the “chilling attain” of what he alleges to be an very unlikely story is lifting. “Folks had proper stopped attempting, as a result of there wasn’t any level,” Cecil says. Now the Diablo speedrunning saunter is on, once more.
Cecil says he hopes that his work to retain speedrunners correct is now not any longer going to most effective lend a hand mature speedrunning to thrive, however gas the instrument-assisted form that he has helped pioneer, too. The principle, he maintains, will doubtless be drawing a clear line between of us that voice tool instruments to play video games with inhuman precision as an correct art bear, and of us that voice them for deception. “Each and each the jerk and the jester bend the established rules. We detest the vileness of the jerk and pleasure of the shenanigans of the jester,” Cecil says. “But one ingredient has held correct: No person likes a cheat.”
It be a big week for Apple. The new iPhone 16line hits retailer cupboards as of late alongside the new AirPods 4. Unswerving a few days earlier, Apple released the new iOS 18 and macOS 15, basically identified as macOS Sequoia, too.
On the opposite hand, Mac customers are reporting some points as it pertains to the latter initiate and the cybersecurity tools that they employ.
As seen by TechCrunch, Mac customers who upgraded to macOS Sequoia are experiencing points with their cybersecurity utility and its compatibility with Apple’s new working machine.
Oeisdigitalinvestigator.com: Cybersecurity tools reportedly conflict with macOS Sequoia
The field with macOS Sequoia not taking part in good with cybersecurity tools used to be first discovered after some Mac customers who upgraded reported that they were experiencing network connection points on social media.
The errors were solved when customers turned off cybersecurity tools from firms love Microsoft, CrowdStrike, SentinelOne, and ESET.
Mashable Gentle Tempo
As well, BleepingComputer also discovered reports of Mac customers having points with utilizing VPNs on macOS Sequoia as smartly. The cybersecurity files outlet renowned a commerce in macOS Sequoia’s initiate notes that could possibly demonstrate the doable field.
It appears that Apple removed a characteristic in macOS’s firewall, that could possibly delight in damaged these purposes. The firewall field appears to be affecting some customers’ Firefox internet browser too.
Obviously, turning off antivirus utility or firewalls will not be an awesome resolution. Corporations love CrowdStrike and SentinelOne are recommending that customers not toughen to macOS Sequoia unless the points are resolved.
While many Apple Mac customers could not be struggling from these explicit points as they achieve not employ these merchandise, it is miles a must-want to display how any new utility initiate can lead to points on day one.
Be cautious and check with the developers of your very crucial day after day employ purposes referring to any compatibility points earlier than upgrading.
We reached out to Apple for comment. If we safe a response, we’ll update this text.
Several businesses I’ve worked with recently have had the misfortune of being victims of cybersecurity incidents. While these incidents come in many forms, there is a common thread: they all started with a compromise of user identity.
Why Identities are Targeted
Identity security—whether it involves usernames and passwords, machine names, encryption keys, or certificates—presents a real challenge. These credentials are needed for access control, ensuring only authorized users have access to systems, infrastructure, and data. Cybercriminals also know this, which is why they are constantly trying to compromise credentials. It’s why incidents such as phishing attacks remain an ongoing problem; gaining access to the right credentials is the foothold an attacker needs.
Attempts to compromise identity do leave a trail: a phishing email, an attempted logon from an incorrect location, or more sophisticated signs such as the creation of a new multifactor authentication (MFA) token. Unfortunately, these things can happen many days apart, are often recorded across multiple systems, and individually may not look suspicious. This creates security gaps attackers can exploit.
Solving the Identity Security Challenge
Identity security is complex and difficult to address. Threats are constant and many, with users and machines targeted with increasingly innovative attack methods by focused cyberattackers. A compromised account can be highly valuable to an attacker, offering hard-to-detect access that can be used to carry out reconnaissance and craft a targeted attack to deploy malware or steal data or funds. The problem of compromised identities is only going to grow, and the impact of compromise is significant, as in many cases, organizations do not have the tools or knowledge to deal with it.
It was the challenge of securing user identities that made me leap at the chance to work on a GigaOm research project into identity threat detection and response (ITDR) solutions, providing me with a chance to learn and understand how security vendors could help address this complex challenge. ITDR solutions are a growing IT industry trend, and while they are a discipline rather than a product, the trend has led to software-based solutions that help enforce that discipline.
How to Choose the Right ITDR Solution
Solution Capabilities ITDR tools bring together identity-based threat telemetry from many sources, including user directories, identity platforms, cloud platforms, SaaS solutions, and other areas such as endpoints and networks. They then apply analytics, machine learning, and human oversight to look for correlations across data points to provide insight into potential threats.
Critically, they do this quickly and accurately—within minutes—and it is this speed that is essential in tackling threats. In the examples I mentioned, it took days before the identity compromise was spotted, and by then the damage had been done. Tools that can quickly notify of threats and even automate the response will significantly reduce the risk of potential compromise.
Proactive security that can help reduce risk in the first place adds additional value. ITDR solutions can help build a picture of the current environment and apply risk templates to it to highlight areas of concern, such as accounts or data repositories with excessive permissions, unused accounts, and accounts found on the dark web. The security posture insights provided by highlighting these concerns help improve security baselines.
Deception technology is also useful. It works by using fake accounts or resources to attract attackers, leaving the true resources untouched. This reduces the risk to actual resources while providing a useful way to study attacks in progress without risking valuable assets.
Vendor Approach ITDR solutions fall into two main camps, and while neither approach is better or worse than the other, they are likely to appeal to different markets.
One route is the “add-on” approach, usually from vendors either in the extended detection and response (XDR) space or privileged access management (PAM) space. This approach uses existing insights and applies identity threat intelligence to them. For organizations using XDR or PAM tools already, adding ITDR to can be an attractive option, as they are likely to have more robust and granular mitigation controls and the capability to use other parts of their solution stack to help isolate and stop attacks.
The other approach comes from vendors that have built specific, identity-focused tools from the ground up, designed to integrate broadly with existing technology stacks. These tools pull telemetry from the existing stacks into a dedicated ITDR engine and use that to highlight and prioritize risk and potentially enforce isolation and mitigation. The flexibility and breadth of coverage these tools offer can make them attractive to users with broader and more complex environments that want to add identity security without changing other elements of their current investment.
Next Steps
To learn more, take a look at GigaOm’s ITDR Key Criteria and Radar reports. These reports provide a comprehensive overview of the market, outline the criteria you’ll want to consider in a purchase decision, and evaluate how a number of vendors perform against those decision criteria.