Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

* Buying products/services anonymously, if you don't want to have your personally identifying information, like your credit card details, leaked one day when the website you purchased from is hacked.

* Making payments to parties underserved by banks, whether it's legal cannabis dispensaries, or Wikileaks when the credit card companies blockaded them.

* Triggering financial exchanges, without the friction (and risk of PII theft associated with the identity-based accounts that centralized custodians use) of signing up to a traditional online brokerage or exchange, via crypto transfers to self-executing smart contracts like decentralized exchanges.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: