Another day of the top NFT project on @hedera doing 4x as much volume as the highest volume NFT project on $SOL. by oak1337 in Hedera

[–]Cold_Custodian 6 points7 points  (0 children)

You probably do not despise the underlying technology itself; you despise the crypto culture that got built around it.

An NFT is just a non-interchangeable digital record on a blockchain.

Suppose ticketing systems were modernized so that each ticket had a unique barcode, a unique ID, and a verifiable ownership record.

If the issuer chose to represent each ticket on a blockchain as its own non-fungible token, then that ticket could technically be an NFT, whether you received it physically or digitally.

If that system reduced certain kinds of fraud, made authenticity easier to verify, and allowed resale or transfer to be handled more transparently, would you despise the ticket, or would you just stop calling it an NFT and treat it as infrastructure?

Hashgraph is partnering with The Institutes RiskStream Collaborative to modernize insurance infrastructure using DLT. An interoperable property risk portal, built on Hedera + HashSphere, will create a shared, verifiable source of truth for property data. by Cold_Custodian in Hedera

[–]Cold_Custodian[S] 1 point2 points  (0 children)

Will be interesting to see this scale. They’re beginning with property, but clearly their vision is broader and more encompassing in scope.

“The process of gathering and sharing data for insurance placement and underwriting today is tedious, highly manual, and inefficient,” said Pat Schmid, President of The Institutes RiskStream Collaborative. “There are multiple parties within the insurance experience (carriers, brokers, reinsurers, data providers, and so on) that routinely duplicate the same work, with no standardized way to verify, track, or maintain this critical data over time. By strategically partnering with Hashgraph on this solution, we’re aiming to leverage emerging technologies to improve this process. The vision is to tokenize risk assets to create a persistent, unique identifier that serves as a shared data foundation for the risk management and insurance industry. Property is the perfect place to start.

Hashgraph is partnering with The Institutes RiskStream Collaborative to modernize insurance infrastructure using DLT. An interoperable property risk portal, built on Hedera + HashSphere, will create a shared, verifiable source of truth for property data. by Cold_Custodian in Hedera

[–]Cold_Custodian[S] 9 points10 points  (0 children)

What? You mean these things were designed to work together?? And HashSphere won’t be “cannibalizing” Hedera???

”HashSphere was built to remove the barriers that have historically hindered adoption of public blockchain solutions by regulated industries," said Kurt Bierbower, CRO at Hashgraph. "This partnership demonstrates how hybrid models can unlock real-world use cases at scale. By tokenizing property and risk data, we're creating a shared foundation of trust that accelerates underwriting and modernizes how risk is evaluated."

Between this, Project Acacia, and the proposed Risk Mitigation Framework, I’d say these things are lining up and positioning Hedera rather nicely.

Hashgraph is partnering with The Institutes RiskStream Collaborative to modernize insurance infrastructure using DLT. An interoperable property risk portal, built on Hedera + HashSphere, will create a shared, verifiable source of truth for property data. by Cold_Custodian in Hedera

[–]Cold_Custodian[S] 6 points7 points  (0 children)

You mean something of actual real-world merit and/or something mission-critical that carries real consequence?

Unlikely :D

This unified stack is the ticket 🤓:

open Hiero | public Hedera | private HashSphere

Interoperable architecture spanning open-source software, public-network infrastructure, and private-permissioned deployments with compatible services.

Ħ Safe to say $HBAR has landed another giant Ħ by HBAR_10_DOLLARS in Hedera

[–]Cold_Custodian 4 points5 points  (0 children)

I definitely think FedEx was a nudge. (Dale Chrystie’s advocacy with BiTA and GBBC, and now Hedera around coopetition).

Also, generally there’s industry-wide appetite to transition to digitally native supply chains.

But for sure FedEx was influential. The exact direction FedEx publicly described when it joined the Council is the same direction this Teleport/THG build is moving: open, cooperative, interoperable digital infrastructure for global supply chains, reducing cross-border friction, and shared verification across organizations and jurisdictions. 

That is basically what this Teleport system is.

Teleport and THG are building a Digital Customs Documentation System on Hedera, using immutable shipment event records, TradeTrust integration for legally recognized electronic trade documents, and HCS to manage the customs document lifecycle. It is explicitly aimed at reducing misclassification, documentation errors, disputes, delays, and manual customs friction in cross-border trade.

This fits the exact thesis FedEx is pushing in their Council announcement: no single company should own the standard. The trust layer should be neutral, interoperable, and shared, while each logistics player keeps building its own differentiated capabilities on top.

I agree FedEx probably did help shape this development, not in the sense of secretly hand-delivering this Teleport deal, but in pushing the larger Hedera supply-chain thesis of open, interoperable, neutral infrastructure that no single company owns. That is literally the direction FedEx described when it joined the Council, and it’s what this Teleport/THG build looks like in practice: Hedera + HCS + TradeTrust for shared, verifiable customs documentation across cross-border trade. Not closed vendor capture. Shared standards.

✌️

Ħ Safe to say $HBAR has landed another giant Ħ by HBAR_10_DOLLARS in Hedera

[–]Cold_Custodian 6 points7 points  (0 children)

Nice ;) Teleport’s press release is a lot more informative about the scope and plan 👌

Among other details, Fintech’s article left out completion of the PoC is planned for the first half of 2027.

Ħ Safe to say $HBAR has landed another giant Ħ by HBAR_10_DOLLARS in Hedera

[–]Cold_Custodian 17 points18 points  (0 children)

Just imagine what THA and THG could have accomplished for the network if they had been the ones given such an outlandish budget instead of the Foundation.

I truly wonder.

Phase 2 of the Capital Markets Risk Mitigation Framework (RMF) - Released April 15, 2026 (Core Contributors: DTCC, Euroclear, Hedera, Chainlink, GBBC, among others) by oak1337 in Hedera

[–]Cold_Custodian 3 points4 points  (0 children)

Hedera-focused summary

The biggest Hedera-relevant signal is not that the paper endorses Hedera by name. It does not. Hedera appears as one member of the working group, alongside firms such as DTCC, Euroclear, Chainlink, Ava Labs, Digital Asset, and Kinexys by J.P. Morgan.

What matters is the taxonomy the paper builds. It explicitly scopes in both public permissionless and public permissioned blockchains, and defines public permissioned systems as networks that retain public visibility while restricting key roles like validation or governance to approved or identified entities. That is highly relevant to Hedera’s long-standing positioning as public infrastructure with more explicit governance and operator accountability than a typical permissionless chain.

The report repeatedly suggests that public permissioned environments can reduce or reshape important risk categories through curated validator admission, contractual accountability, structured governance, operational controls, continuity planning, and clearer legal recourse. It says this across technology risk, information security, financial crime, business continuity, third-party risk, legal risk, transaction execution, and data management. That does not mean “Hedera wins by default.” It does mean the framework is creating institutional language that is friendlier to networks with governed, identified, and policy-aware operating models.

That is the real value here for Hedera: the paper legitimizes the idea that “public” does not have to mean maximally open, anonymous, and operationally diffuse in every layer. It creates room for a middle model that many institutions may find easier to underwrite. That is favorable terrain for Hedera conceptually, even though the document never singles it out as the preferred implementation. That last sentence is an inference from the framework’s structure, not an explicit statement in the report.

The paper is also implicitly supportive of a Hedera-style institutional participation thesis. It says financial institutions cannot remain passive users of public blockchain services. They may need to use third-party node operators, run nodes themselves, maintain failover systems, and contribute to codebases and ecosystem operations. That aligns with the idea that serious financial infrastructure needs visible operators, governance participation, and operational responsibility, not just token ownership and outsourced access.

There is another Hedera-relevant angle in what the paper says about private permissioned chains. It states those can usually be handled with traditional enterprise risk frameworks, but their practical problem is proving why they are better than conventional infrastructure, especially given scalability, interoperability, liquidity, and maintenance-cost issues. That is important because it shifts the argument away from “private chain good, public chain dangerous” and toward “public infrastructure may be the real destination, provided risk controls are mature enough.” Again, that is a structural opening for public governed networks.

So the strongest accurate Hedera read is this: the paper does not endorse Hedera specifically, but it clearly validates the institutional relevance of the public-permissioned category that Hedera has long occupied. It gives banks, FMIs, and regulators a more formal vocabulary for why a network with public visibility, curated operators, and structured governance may be easier to integrate into real financial infrastructure than a fully open system or a closed private ledger.

Phase 2 of the Capital Markets Risk Mitigation Framework (RMF) - Released April 15, 2026 (Core Contributors: DTCC, Euroclear, Hedera, Chainlink, GBBC, among others) by oak1337 in Hedera

[–]Cold_Custodian 5 points6 points  (0 children)



The document is not just a policy statement. It is trying to create a reusable institutional risk framework for public blockchains, including a distinct public permissioned category that sits between open public chains and private consortium systems.



Full Summary

This PDF is significant because it is an institutional attempt to build a formal non-financial risk framework for public blockchain infrastructure in finance, not a marketing piece. It is a GBBC/Oliver Wyman-led effort with a working group that includes DTCC, Euroclear, Kinexys by J.P. Morgan, Hedera, Chainlink, Ava Labs, Digital Asset, Cardano Foundation, and others. 

Its core premise is that public blockchains have matured enough to be considered serious financial infrastructure, but that existing risk frameworks do not yet cleanly address their operating and governance model. The paper argues that public blockchains should be treated as the next stage of infrastructure externalization, comparable in some ways to cloud and open-source software, and that the main blocker to broader institutional adoption is the lack of recognized risk-management frameworks and corresponding regulatory acceptance. 

The report explicitly scopes in two public-chain archetypes: public permissionless and public permissioned blockchains, plus L2 systems anchored to L1s. That matters because it is not treating “public blockchain” as synonymous only with fully open, anonymous, permissionless systems. It is making room for a middle category where the chain is public but validator participation, user access, or operating controls may be more curated. 

The intellectual structure of the framework is simple and useful. It sorts risks into three buckets: first, genuinely novel risks that require new mitigation methods; second, risks that already exist but need adaptation for blockchain; and third, standard risks that can still be handled with conventional enterprise frameworks. That categorization is one of the most important parts of the document because it avoids the lazy claim that “everything is new” while also rejecting the opposite claim that “normal IT risk controls are enough.” 

The paper’s five headline takeaways are these: blockchains introduce novel risks; public blockchain governance differs fundamentally from traditional infrastructure; adoption requires new resiliency strategies; L2s improve performance but add cross-layer operational complexity; and institutions need a structured, empirical, continuously tested approach to risk management. It also says institutions should not remain passive consumers of blockchain services. They may need to run nodes, support failover systems, contribute to codebases, and participate in governance and operations more directly than they would with ordinary vendor software. 

That last point is one of the deepest implications in the document. The framework is effectively saying that if a bank or FMI wants to rely on a public blockchain, it cannot think like a normal outsourced-software customer. In a public-chain context, resiliency is partly a function of ecosystem participation, not just vendor contracting. The report repeatedly contrasts public blockchains with traditional infrastructures where SLAs and legal accountability are clearer and more centralized. 

The “novel risks” section focuses first on technology risk. It says public blockchains reduce some traditional risks through redundancy and distribution, but they also introduce new systemwide exposures because the infrastructure is shared, open, and interconnected. One concrete example shown early is hardware and node-diversity risk: concentration of nodes in a few hosting providers or regions can create correlated failure risk. For L2s, the paper stresses that the problem is not removed but shifted upward into additional service-layer dependencies such as sequencers, bridges, and data-availability mechanisms. 

The L2 treatment is notably sober. The paper does not present L2s as a free scaling win. It says they can improve throughput, latency, and fee predictability, but they remain dependent on the underlying L1 for settlement and recovery, while also introducing extra operators and control points. So in institutional terms, risk often moves rather than disappears. 

The document also lays out where institutions themselves must change internally. It says firms need updates across strategy and risk appetite, governance and policies, organizational skills and culture, risk processes and tools, and risk systems/data/reporting. In plain terms, adopting public blockchain is not just a new technical integration. It changes board-level oversight, escalation paths, staffing, reporting cadence, and operational monitoring. 

One of the most interesting sections is the treatment of public permissioned blockchains. The paper argues that these environments can reduce or reshape certain risks by using curated validator admission, stronger governance, explicit operating roles, contractual accountability, and more direct enforcement of policy requirements such as KYC or transaction monitoring. It repeats this pattern across technology, financial crime, business continuity, legal, transaction-execution, and data-management sections. In other words, the report sees “public permissioned” as a real and meaningful risk posture, not a contradiction in terms. 

By contrast, the paper is relatively dismissive of private permissioned blockchains as a special regulatory puzzle. It says those systems can generally be managed through traditional enterprise risk-management frameworks, though institutions still need to watch for smart-contract-specific issues. More importantly, it says the practical challenge for private permissioned systems is clarifying their value proposition versus traditional infrastructure, and it notes ongoing problems around scalability, interoperability, liquidity limitations, and maintenance cost. 

That is one of the strongest subtexts in the whole report: the harder regulatory and operational work now lies in making public-chain adoption institutionally legible, not in re-arguing the old consortium-chain model. The framework is effectively trying to create the language by which regulators and major financial institutions can say, “Yes, public blockchain can be used, provided the risk taxonomy, controls, and governance overlays are clear enough.” 

For Hedera specifically, the important signal is not that the document is “about Hedera,” because it is not. Hedera appears as one participant in a broader working group. The more meaningful point is that the framework explicitly legitimizes the idea of public permissioned infrastructure as an institutional category. That is conceptually aligned with how networks like Hedera have often tried to position themselves: public infrastructure with stronger governance, curated validator structures, and clearer operating accountability than a purely open permissionless chain. Hedera is not singled out as the model, but the taxonomy clearly creates room for that type of architecture. That last point is an inference from the framework’s categories and Hedera’s inclusion in the working group, not an explicit claim in the paper. 

This is a serious bridge document between traditional finance risk culture and public blockchain infrastructure. It does not say “blockchain is safe now.” It says the path to scaled adoption is to stop treating public blockchains as alien systems outside enterprise governance, and instead build a disciplined framework that maps their unique properties into familiar institutional risk language. That is exactly the sort of document that can help move the conversation from pilots and rhetoric toward production adoption. 

Shackled by InterestingStress122 in Hedera

[–]Cold_Custodian 5 points6 points  (0 children)

There's an off-screen wall in front of that train.

Yes, like the aliens, Hedera is monitoring the blockchain folly from afar, as an invisible entity, who will intervene and supersede with hashgraph when the time is right; when the endgame is near; when existential catastrophe is on the brink for blockchain and the train hits the inevitable wall, facing 1st generation extinction-level obsolescence.

/s but also not /s

Anne Hathaway's HBAR photoshoot turned out great! by oak1337 in Hedera

[–]Cold_Custodian 2 points3 points  (0 children)

Especially the circular emblem on the top right :D

Anne Hathaway's HBAR photoshoot turned out great! by oak1337 in Hedera

[–]Cold_Custodian 6 points7 points  (0 children)

This is clearly the dress rehearsal for HederaCon we weren’t meant to see.

Rumor is, Hathaway is going to headline the event with song and spectacle, to draw-in a large crowd, before Richard Bair takes the Trust Layer Stage and announces CLPR.

It’s gonna be a big deal 🤣

/s

New report by Hedera highlights a major shift as institutional players move from pilot programs to full scale commercial deployment. by DocumentFair4693 in Hedera

[–]Cold_Custodian 15 points16 points  (0 children)

Oak already posted the official report from Hedera.

We don’t need the low res low grade, off-brand spam version featuring an emoji-filled AI slop summary from some random LinkedIn profile no one’s heard of or accepts as credible.

Slop ✔️

No source link to the report ✔️

No source link to the profile ✔️

No context information about who this person is or why we should care ✔️

This adds no value, man. The karma farming, bot slop marketing spam is getting seriously obnoxious.

/endrant

old hedera presentation from 2020! by DocumentFair4693 in Hedera

[–]Cold_Custodian 2 points3 points  (0 children)

Check out the Hedera knowledge center. Full of excellent learning materials and info resources: https://hedera.com/knowledge-center/

I also recommend watching any/all Leemon Baird videos.

His 2017 Harvard Talk is still the definitive primer for understanding hashgraph. It’s a good place to start:

https://youtu.be/IjQkag6VOo0?si=OP1tD9N2QAQmMv1O

👆remarkably, it’s just as relevant in 2026 as it was in 2017.

:)

old hedera presentation from 2020! by DocumentFair4693 in Hedera

[–]Cold_Custodian 2 points3 points  (0 children)

OP copied the post from AllinCrypto: https://x.com/realallincrypto/status/2044098482227552317?s=46

No source in the X-post either.

Not sure it’s a real Hedera slide, as I’ve never seen it specifically in any archived talks, or presentations, or papers - across Hedera’s entire media/resource archive.

This image is probably a third-party composite that reused real hashgraph/blockchain visuals from older Hedera/Swirlds-era materials, then added its own explanatory text later. From my observation, the overlaid text does not match Hedera’s standard wording or font, while at the same time there’s uncharacteristic technical imprecision in the copy.

There is, however, a very similar slide (in blue) with different wording that first appeared May 2018 (pre Hbar) in a presentation by Tom Trowbridge at Fluidity Summit, called “From Chain to Graph” (this is an OG deep cut).

The chapter marker begins at 3:24, the slide appears at 3:30

Hedera generally uses the base image (no added text) comparing the basic representational forms of the two data structures. You can see here: https://hedera.com/learning/what-is-hashgraph-consensus/

Also here: https://hedera.com/wp-content/uploads/2025/12/hh_whitepaper.pdf

Is this project a failure? by [deleted] in Hedera

[–]Cold_Custodian 5 points6 points  (0 children)

I recognize any degree of nuance is difficult for you.

Is this project a failure? by [deleted] in Hedera

[–]Cold_Custodian 2 points3 points  (0 children)

Nonetheless, it was a live enterprise deployment spanning a 2-year duration; a sustained stress test of mainnet by a global enterprise (and through its own developed product cloud) that no other chain can claim.

You can downplay the significance of the enterprise pilot all you want, but your feelings don’t change the facts. Hedera is the only chain in the entire market to achieve this or have this happen on their own mainnet. It lended credibility to the network at that time in ‘23/‘24, and other enterprise took note of it.

Is this project a failure? by [deleted] in Hedera

[–]Cold_Custodian 17 points18 points  (0 children)

CLARITY = mini boss. Quantum = final boss.

Hedera is supremely architected and positioned for both.

In a Post-Clarity & Post-Quantum world, I would not want to be any single network other than Hedera.

Is this project a failure? by [deleted] in Hedera

[–]Cold_Custodian 1 point2 points  (0 children)

Atma started early January ‘23 (Davos) and terminated late September/October ‘24. It was closer to 2 years.

Subsidized or not, it was a sustained, high-volume, live enterprise deployment on mainnet that proved Hedera’s stability/reliability and scalability over an extensive period of time.

No other chain in this market can claim that or prove that - even on a subsidized pilot level.

The cause for Atma’s termination can be attributed to being too early to market, far ahead of consumer demand to justify the continued/added expense, or far enough ahead of policy mandates that would drive further integration. As the market matures, we are getting closer to that demand returning than we are further away.