Select Page
Web3 Adoption News – OpenSea Gets a Wells Notice from the SEC

Web3 Adoption News – OpenSea Gets a Wells Notice from the SEC

Last week it was reported that OpenSea, the world’s leading NFT marketplace, received a Wells notice from the US Securities and Exchange Commission (SEC), leading to lots of noise in the crypto space.

What is a Wells Notice?

The name of this type of notice comes from the Wells Committee, a legal advisory group created by the SEC in 1972 to review the agency’s enforcement practices, named after the SEC general counsel at that time, John A. Wells.

A Wells notice is given to a person or company following a completed investigation. It is a formal notice used to inform the subject that infractions have been discovered by the SEC, giving the investigated company or person an opportunity to publicly address and respond to the investigation prior to any rulings that might follow.

While the SEC neither confirmed nor denied any such regulatory investigation of OpenSea, in the NFT platform’s August 28th response, it stated that the notice “indicates that the SEC is considering bringing a lawsuit against OpenSea.”

OpenSea’s Position

OpenSea has not wavered in its position that NFTs on its platform should not be regulated as securities. Openly taking a stand for the rights of creators, artists and innovators who use the OpenSea platform, CEO Devin Finzer has pledged $5M (in addition to its own defense) to assist with legal fees for any creators or developers who have also received a Wells notice related to their NFT activity. 

“NFTs are fundamentally creative goods: art, collectibles, video game items, domain names, event tickets, and more. We should not regulate digital art in the same way we regulate collateralized debt obligations.”

“We hope that the SEC will reconsider its stance and approach this issue with the open-mindedness it deserves.” –Devin Finzer, OpenSea CEO

Ongoing Debate

The question of whether regulatory agencies would consider treating non-fungible tokens as securities has been looming over the web3 space for the last few years. 

While the debate has attracted the attention of the wider crypto world and concern from NFT collectors, the consequences of classifying NFTs as securities under US law would fall primarily on the creators and sellers of NFTs.

The SEC’s mission is to protect investors by maintaining fair, orderly and efficient markets. If NFTs were considered securities, then those who purchased them would be considered “investors” – The SEC would then be obligated to protect them.

Previous Enforcement Actions

While this is the first Wells notice from the SEC to target an NFT marketplace, several exchange platforms have received Wells notices, including Coinbase, Kraken, Robinhood, and decentralized exchange protocol Uniswap.

The question of whether or not certain types of digital goods will be regulated as securities has been approaching for some time, and veterans of the space have seen it coming.

Looking Ahead

Like regulation of cryptocurrency, regulation of non-fungible tokens on some level is inevitable. The majority of web3 innovators welcome such regulation with openness and compliance, because it allows the clarity needed to create and effectively execute projects.

At Gala, we stand with OpenSea that NFTs are not securities and their owners are not investors. We are however fully committed to regulatory compliance as these questions are settled over the coming months and years.

Ultimately, coming regulations should be seen as a sign of web3 adoption and we look forward to a world where such issues are settled, where we can fully focus on the empowerment and progress made possible by blockchain technology. 

SOURCES

CoinDesk – “OpenSea Gets ‘Wells Notice’ from SEC, Which Calls NFTs Sold on Platform ‘Securities’

OpenSea – “Take a Stand for a Better Internet”

CNBC – OpenSea Recieves Wells notice from SEC, regulator says NFTs are Securities

CoinTelegraph – “NFTs can be Securities but SEC Wells Notice to OpenSea ‘Not Productive” -Lawyer

Investopedia – “Wells Notice: What it Means, How it Works”

DevSpeak: Bandwidth, Throughput and Speed

DevSpeak: Bandwidth, Throughput and Speed

There’s a lot of jargon in the tech world. Sometimes, you may understand these terms on their face, but their nuances in relation to technology takes a bit of deeper understanding. Luckily, DevSpeak is here to have your back.

You’ve probably frequently heard terms like “bandwidth,” “throughput,” and “network speed,” especially when discussing internet connections. But what do these terms really mean, and how do they impact your online experience? For those new to tech, understanding these concepts can be confusing. People regularly lament, “but I have a fast connection!”, in response to data speed problems… but the speed of your connection is only one factor in determining data transfer speed and efficiency.

In today’s DevSpeak, we’ll dive into these terms so you can confidently understand what each does and doesn’t mean. Use this knowledge wisely to understand your digital connections better… and to not put your foot in your mouth the next time you’re having a casual conversation with a developer.

Bandwidth, Throughput, and Network Speed, Defined

Let’s grab a very basic analogy here and hold it close as we explore these terms. Think of your internet connection as a highway. There’s lots of data packets trying to get through on the highway both ways.

  • Bandwidth: Think of this as the highway itself. Bandwidth is the total width of the road—the number of lanes available for cars (data) to travel on. The more lanes you have, the more cars can travel at the same time. In technical terms, bandwidth refers to the maximum amount of data that can be transmitted over a network in a given amount of time, usually measured in megabits per second (Mbps). Just because you have a solid maximum bandwidth, however, doesn’t mean you’ll always transmit data at those speeds… highways have other things that slow down traffic.
  • Throughput: Now, consider the traffic on the highway. Throughput is the number of cars that successfully reach their destination per unit of time. Even if you have a wide highway (high bandwidth), the actual traffic (throughput) might be lower due to various factors like road conditions or accidents. In network terms, throughput is the actual amount of data that gets successfully transmitted from one point to another over a given period of time.
  • Network Speed: Finally, network speed is the time it takes for a car to travel from point A to point B. It’s influenced by both bandwidth and throughput, but also by the car’s speed (latency). If the road is clear and cars are moving fast, data reaches its destination quickly. Network speed is often what people refer to when they talk about how “fast” their internet connection is, though it’s really a combination of several factors.

Different Metrics for Different Network Capabilities

These three terms — bandwidth, throughput, and network speed — each describe different aspects of your internet connection’s performance:

  • Bandwidth determines the potential maximum capacity of your connection. Think of it as the upper limit.
  • Throughput shows how much of that potential is being used effectively, giving you a realistic measure of your current connection.
  • Network speed impacts your experience of using the internet, like how fast pages load or how quickly you can stream videos.

To continue with our highway analogy, you could have a wide road (high bandwidth) but still experience slow traffic (low throughput) due to construction work or traffic jams. Similarly, even with good traffic flow (high throughput), if your cars (data packets) aren’t moving fast enough due to speed limits (latency), you’ll feel that your network is slow.

Let’s step outside of our analogy for a minute here. Keep in mind that data transfer is a 2-way issue. While you may be sending data packets efficiently and quickly, perhaps the other side of that connection is experiencing difficulties. Maybe a data center in between the two endpoints is congested. It’s a big internet, and it takes two to tango.

Not All Connection Problems Are Equal

Understanding these distinctions helps explain why sometimes your internet feels slow even if you have a high-speed plan. For instance:

  • Congestion: Just like rush hour on a highway, too many users online at the same time can lead to lower throughput, even if you have high bandwidth. Try connecting to two games, spinning up several YouTube videos and opening 42 tabs on Chrome to experience this limiting situation.
  • Latency: If your data takes a long time to travel across the network, it doesn’t matter how much bandwidth you have—your experience will still feel sluggish. Often this can be because of how far data is traveling, or how many stops in between. A ping test to the address you’re transmitting to can give you a good idea here. Ping is measured in ms, and tells you how long a signal takes to go to the other side and come back to you.
  • Packet Loss: Imagine some cars not reaching their destination at all due to accidents. In networking, this is called packet loss, and it can drastically reduce throughput. This one can be tougher to isolate into one experience… but trying to connect on bad wifi is usually a pretty good parallel. Try sitting with your laptop outside with a yard sprinkler between yourself and your wifi router. Those water droplets are each scattering part of your data stream, leading to lost packets that never make it to your laptop or to their destination.

When troubleshooting a slow internet connection, it’s important to consider all three factors—bandwidth, throughput, and network speed. The problem is usually a combination of them, but rarely in equal proportions. Deal with the biggest issue first, then reassess the situation.

Knowledge Transmitted

Understanding the differences between bandwidth, throughput, and network speed can help you make informed decisions about your internet service and troubleshoot connection issues more effectively. Remember, a wide highway (bandwidth) doesn’t always guarantee smooth traffic (throughput), and how fast you can get from point A to point B (network speed) depends on several factors working together. Once you grasp, you’ll be better equipped to navigate the digital highway with confidence.

Hopefully this DevSpeak showed you how to more confidently conversate about these networking topics and also gave you some practical knowledge about connection problems that we all face from time to time in our digital lives.

Even if you’re not the most techy person in the world, these are important concepts that everyone should know at least a little about. We’ll be back again soon with another DevSpeak to bring you more clarity to the confusing terms tossed around tech!

Web3 Concepts Explained: What is a DAO?

Web3 Concepts Explained: What is a DAO?

Imagine a company or an organization that instead of being controlled by a CEO or a board of directors, is run by the people who use its services or participate in its community. This is essentially what a DAO, or Decentralized Autonomous Organization, is.

In simpler terms, a DAO is like a cooperative business or club where everyone involved gets a say in how things are done. But instead of having meetings in person, all decisions and rules are managed online, using blockchain technology. This setup ensures that the organization is decentralized, meaning no single person or group has complete control.

It’s autonomous because it essentially operates itself according to rules encoded in smart contracts, which are self-executing pieces of code on a blockchain.

How Does a DAO Work?

DAOs work through a series of smart contracts, which are basically programs running on a blockchain. These contracts define the rules of the organization, automatically enforcing decisions made by the community. Here’s a breakdown:

Proposals: Any member of the DAO can propose changes, new projects or other decisions about current operations or the future of the DAO.

Voting: Members then vote on these proposals. In a truly decentralized system, each vote is weighted by how much stake (often in the form of tokens) each member holds.

Execution: Once a proposal is approved by the majority, the smart contract automatically executes the decision without need for any human intervention.

LEARN MORE:
“What is a DAO and How Does It Work?” – Cointelegraph, August 2024

Why Are DAOs Important?

DAOs represent a shift from traditional hierarchical structures to more community-driven models. Here’s why they’re significant in the web3 world:

Decentralization: Power is distributed among all members instead of concentrated into a single centralized entity, reducing the risk of corruption or poor management. This distribution also reduces the consumer-to-business trust necessary for an effective organization. In fact, DAOs could almost alternately be called democratized autonomous organizations, but decentralization is a more apt description.

Transparency: Every decision and transaction is recorded on the blockchain, making the organization’s operations fully transparent. For centralized organizations to achieve this level of transparency, there must be a well established routine of sharing information with the users, such as the way publicly owned companies share quarterly financial reports or how a traditional non-profit organization’s financials are shared with its community.

Inclusivity: Anyone with internet access and the required tokens can participate, making DAOs more inclusive than traditional organizations. Because of their ability to essentially manage themselves, DAOs lend themselves well to greater specialization, allowing people to participate in governance in fields for which they are especially qualified, no matter where they live in the world.

Global Reach: DAOs can operate across borders, allowing global participation without the need for a centralized authority.

Examples of DAO Benefits

To make this concept more relatable, let’s consider a few scenarios:

Community-Driven Development

Imagine a group of indie game developers who come together to create a new game. Instead of going through a traditional publisher, they form a DAO. Players and fans can buy tokens to join the DAO and vote on game features, funding allocation, or marketing strategies. This way, the game evolves according to the community’s preferences, and profits are distributed among all contributors.

In this example, the use of a DAO not only covers the governance of their project, but also provides development funding through the sale of tokens.

Charitable Organizations

A charity could be run as a DAO, where donors get to vote on which causes should receive funding. Because all transactions are on the blockchain, donors can see exactly how their money is being used, ensuring transparency and trust. As a result of these benefits, more people could be inclined to donate.

Government Organizations

While the governments of the world are understandably hesitant to begin using a technology as new as blockchain, DAOs would serve well for many aspects of government operations. As traditional democratized voting processes become more corruptible, the security and transparency of DAOs could help protect voting rights and election sovereignty, aligning more closely with the will of the people. 

LEARN MORE:

“The Power of DAOs Will Be Unleashed When Boomers Leave the Workforce” – Forbes Trends, August 2024

The Gala Ecosystem and DAO Principles

While the Gala ecosystem doesn’t currently operate as an official DAO, it shares many of the principles that make DAOs powerful. At Gala, community input is highly valued, especially through platforms like Discord and Telegram, where feedback is actively monitored and considered in decision-making.

For instance, Gala’s Founder’s Nodes—a network of community-run nodes—play a crucial role in maintaining and securing the GalaChain, which is a key part of the Gala ecosystem. These nodes are operated by community members, and the decisions regarding the ecosystem’s future increasingly involve community voting and participation, which mirrors the decentralized governance seen in DAOs. Nearly all important decisions about $GALA tokenomics are presented to the Founder’s Node community for a governance vote before being put into practice.

Gala’s Path Toward Decentralization

Gala is not just stopping at community feedback. The long-term vision is to move toward greater decentralized autonomy, similar to what a DAO offers. This means that as GalaChain evolves, Gala wishes to see control over the ecosystem gradually shift more toward the community, aligning with the ultimate goal of decentralization​.

Even if Founder’s Node operators do not technically represent a DAO themselves, the goal is to see GalaChain channel creators ultimately having the ability to create DAOs for their project, platform, service, etc. We are creating a secure and scalable web3 ecosystem built on a layer-1 blockchain with the power to host numerous community-created DAOs.

In summary, while Gala isn’t a DAO in the strictest sense today, it embodies many DAO principles and is progressing toward a future where the community could have even more say in the governance and direction of the ecosystem.

Thanks for reading our latest web3 explainer article! Hopefully you learned a little something!

Create a free Gala Games account

Gala and Coinflow Integrate Google Pay and Apple Pay for Seamless NFT Transactions

Gala and Coinflow Integrate Google Pay and Apple Pay for Seamless NFT Transactions

Announce the latest development in our partnership with Coinflow: the integration of Google Pay and Apple Pay as new payment options for the Gala Games ecosystem. This update marks a significant milestone in our mission to provide our community with the most accessible and versatile payment solutions.

Expanding Payment Horizons

Continuing to build on our recent integration with Coinflow, we’re now enabling Google Pay and Apple Pay as payment methods, making it easier than ever for users to interact with our platform. This enhancement empowers our users to engage with the Gala ecosystem using the payment tools they trust and prefer, streamlining the experience of owning and interacting with digital assets on GalaChain.

For the first phase of this rollout, Google Pay and Apple Pay options through Coinflow are limited only to the Gala Games store, but with future updates we hope to expand this payment variety to Gala Music, Gala Film and beyond.

Streamlined Mobile Experience

As part of our ongoing efforts to innovate and enhance the user experience, the addition of Google Pay and Apple Pay underscores our commitment to bringing decentralized entertainment to a broader audience. With the recent wave of new users coming from our free Telegram mini app “tapper” games, Treasure Tapper and Music Coin, creating a smooth mobile onboarding experience has become especially important.

These payment methods are recognized and used by hundreds of millions of people worldwide, making them a natural fit for our ecosystem. With this integration, we are not only simplifying transactions but also paving the way for more mainstream adoption of web3 digital assets.

The Future of Decentralized Entertainment

We are excited about the possibilities this integration opens up for our users and the broader Gala community. As we continue to innovate and expand our ecosystem, we remain committed to making decentralized entertainment more accessible, engaging and rewarding for everyone.

Stay tuned for more updates, and thank you for being a part of our journey! Together, we are reshaping the future of entertainment on GalaChain.

DevSpeak: Encryption

DevSpeak: Encryption

Welcome back to another DevSpeak, where we decode the often confusing language of developers in a way that you can understand. Speaking of decoding, today we’re diving into a concept that is entirely ubiquitous in the web3 world… but not often understood. Today we’re diving into encryption!

If you’ve heard the term but are unsure what it really means, you’re not alone. Let’s break down what people mean when they say “encryption” and explore why it’s crucial for your digital safety.

Encryption, Defined

Encryption is a method of converting plain, readable information into a coded format that only authorized parties can decipher. If bad actors intercept your data, it’s gibberish to them without the proper cipher. Security measures use complex algorithms to ensure reliable encryption of information.

This isn’t just a process computers can do – you’ve probably encountered the idea of ciphers and code before in entertainment or history even if you don’t have super secret coded messages to send around.

You use a set of rules to replace each letter with another symbol or letter. To anyone who doesn’t know the code, the message looks like a jumble of symbols. But if you have the cipher, you can easily decode the message and read it as it was originally written. That’s the essence of encryption.

Remember these puzzles from newspapers? Classic encryption problems!

This is an old, old practice. In fact, one of the most classic examples of this is Cesarian Code, a method reportedly used by Julius Cesar to send coded messages to his legions.

Read More: Interested in knowing more about the Ceasarian cypher? 👇
https://www.sciencedirect.com/topics/computer-science/caesar-cipher

In this method, you move each letter back three positions in the alphabet, revealing the true letters. While this method is obviously not secure after kicking around for 2100 years, there are many variations that are still used in manual ciphers today.

When the Fuzzles were lost in the wormhole in 2022, they used a slightly modified version of the Cesarian cipher to communicate with Earth! For extra security and interplanar transmission strength, they altered the amount of position offset and converted the entire message to binary.

Why Encryption

So, why is encryption so important? The primary reason is privacy and security. Every time you send an email, make an online purchase, or log into your bank account, your personal information is transmitted over the internet. Without encryption, this data could be intercepted and read by cybercriminals, leading to identity theft, financial loss, or other serious breaches of privacy.

©ภัทรชัย รัตนชัยวงค์ | Licensed through Adobe Stock #826157319

Consider that when you shop online, for instance, you’re entering sensitive details like your credit card number and home address – that info is being sent from your computer to a server somewhere else, then probably to a datacenter in an entirely different location! If the website you’re using doesn’t employ encryption, those details could be easily stolen by someone who’s able to intercept the data transmission. Encryption ensures that even if someone tries to steal your information, it’s unreadable without the decryption key.

Encryption also plays a crucial role in securing communications between individuals and organizations. When you use messaging apps or email services that offer end-to-end encryption, only you and the intended recipients can read your messages – they aren’t accessible by any other party during transmission. This makes sure there’s confidentiality in conversations.

Not All Encryption is Equal

It’s important to know that not all encryption is created equal. In the most basic sense, there are two main types of encryption. Their effectiveness can vary based on how they’re implemented.

  1. Symmetric Encryption: This method uses the same key for both encrypting and decrypting information. It’s like having a single key to lock and unlock a diary. It’s fast and efficient, but the main challenge is securely sharing the key between parties. If the key is intercepted, the encryption is useless.
  2. Asymmetric Encryption: This method uses a pair of keys—a public key and a private key. The public key encrypts the information, while the private key decrypts it. This approach is like having a public lock that anyone can use to securely send you a message, but only you have the private key to unlock it. This method enhances security, especially in scenarios where secure key exchange is challenging.
Sound familiar? We dove into the details of symmetric vs asymmetric encryption in our second article in The Guardian Papers!

While encryption is a powerful tool, it’s not foolproof. The security of encrypted data depends on the strength of the encryption method, the management of encryption keys and the overall security practices you use to protect your data.

Frqfoxvlrq

In a world where our personal and professional lives are increasingly dependent on digital security, a basic understanding of encryption is more important than ever. Encryption is constantly protecting your activity every day!

Uh oh, did we leave the heading encrypted? Your first test begins!

The details of how encryption works can be complicated in practice, but the basic why and how of this practice are easy to understand. It’s about safeguarding your privacy and ensuring that only you and those you choose to share your information with can access your data.

Hopefully this DevSpeak gave you enough insight to not be totally lost the next time you go out on the town with your techy friends. We know that not everyone is or will be a tech expert, but understanding the basics of these concepts is important to not only use technology to its full potential, but also prepare you for the next wave of advancements! 

Let’s all be ready for the world of tomorrow together!