This blog post walks you through cracking a captured WPA handshake using Hashcat — from understanding password hashing and brute-force attacks to converting capture files and executing mask-based attacks. It also demonstrates how weak password choices can leave even WPA-secured networks vulnerable.This blog post walks you through cracking a captured WPA handshake using Hashcat — from understanding password hashing and brute-force attacks to converting capture files and executing mask-based attacks. It also demonstrates how weak password choices can leave even WPA-secured networks vulnerable.

Hands-On WPA Cracking — Capture, Convert, Crack with Hashcat

2025/10/01 11:29

Till now we:

  • Set up and configured the Raspberry Pi Zero W
  • Remotely accessed the Pi from a mobile phone over a hotspot
  • Captured the WPA Handshake

\

\


\

:::warning Disclaimer: Everything shown in this blog was performed within legal boundaries and with full authorization from the network owner. This content is strictly for educational purposes. The author does not condone or take responsibility for any misuse of the techniques demonstrated.

:::

\


\ Now, in this part, we will crack the captured WPA handshake using Hashcat.

\ Before we move on, let me briefly introduce…

\


Hashcat

\ Hashcat is the fastest and most advanced password recovery tool, supporting five attack modes and over 300 highly optimized hashing algorithms. It runs on CPUs, GPUs and other hardware accelerators across Linux, Windows and macOS. Hashcat also supports distributed cracking, making it suitable for large-scale or high-performance use cases.

\

Hashcat Evolution

\

  • Initially written in mid-2009, the first version (v 0.01) was called atomcrack, notable for introducing multi-threading support (a rare feature at the time).

  • In version 0.29, it was renamed [Dr Hash]().

  • On December 4, 2009, it was officially rebranded and released as Hashcat.

    \

Hashcat historically had two separate versions:

\

  • hashcat (CPU-based, known as the legacy version)

  • oclHashcat (GPU-accelerated version)

    \

Eventually, both versions were merged into a single, unified tool now known as Hashcat, combining the strengths of both CPU and GPU cracking capabilities.

\ With the emergence of GPUs and the powerful capabilities of Hashcat, it has become the ideal tool for cracking WPA handshakes.

\


\

What is Cracking?

\

\ At its core, cracking is a process of repeatedly attempting to guess passwords until one matches the target credential.

With computational theory and methodologies involved, cracking becomes a science. Through algorithms, rulesets, and patterns, it evolves into a systematic process.

But to implement it properly, we need to understand how systems store and manage passwords - especially PSKs (pre-shared keys).

In a typical username/password setup, systems store passwords using one of two general methods:

\

Security Through Obscurity

\ In this method, systems store passwords in plaintext; their security relies on hiding the storage location or restricting access to it. This approach lacks cryptographic protection and is highly insecure, as anyone with escalated or sufficient access can read the password directly.

\

Hashing

\ Unlike the previous method, the system stores only a hashed version of the password, rather than the actual password.

  • Hashing involves passing the password through a one-way function that outputs a fixed-length string, called a hash.
  • This process is irreversible, meaning it is nearly impossible to recover the original password from the hash.
  • It is comparable to mixing paint colors and trying to identify the exact proportions of the original colors.

\

# p = plain text password # h() = hashing function # n = hash  h(p) = n 

\ An example of how hashing is used is:

\ When you log in to a web page, the stored hash value is compared with the hash value of your password, ensuring that the actual password is never transmitted. This verification process enhances the reliability of password storage.

\ At this stage, cracking becomes applicable, assuming the adversary already possesses the hash values and knows the corresponding hashing algorithm, they systematically guess passwords and pass them through the same function until a matching hash confirms a successful crack.

\ There are various techniques to do cracking more effectively and efficiently. We will focus on brute-force, one of the most common  techniques used for cracking passwords.


\

What is a Brute-Force attack?

\ Brute-force, in the simplest terms, is a trial-and-error method that involves testing multiple password guesses to find the correct one.

\ In theory, an attacker can eventually crack any password given enough time and computational resources.

However, in practice, the length and randomness of a password can make it so time-consuming to crack that it becomes computationally or practically impossible.

\ To understand this better, let's walk through a simple example by calculating the rough estimate of time required to crack a password.

\


\

:::info Note: This calculation provides an approximation of the time required to exhaust the entire keyspace in a worst-case scenario. The actual time to crack a specific password is probabilistic and can vary significantly. Given the simplicity of the password, an attacker could discover it in seconds or minutes. High-end GPUs commonly used by attackers can perform millions or even billions of hashes per second, making such simple passwords trivial to crack.

:::

\


\ The most common password is 123456, based on real-world data from recent data breaches.

\ Let's use it as an example to simulate how long it would take to crack this password, assuming the attacker knows:

  • It is made of digits only (0–9)

  • It has only six characters

    \

First, let's calculate the total number of possible combinations for a 6-digit password

\

combinations = keyspace ^ length  # each character in the password has 10 possibilities from 0-9  10^6 = 1000000  10 * 10 * 10 * 10 * 10 * 10 = 1000000 

\ Now let's estimate how long it would take to brute-force through all the combinations manually, one guess per second:

\

combinations / guess per second = Time  1000000 / 1 = 277 hrs 46 min 40 sec  

\ Going through all the combinations of this password manually would take 11 days and 13 hours, which is obviously impractical.

Now let's use Hashcat to accelerate the process.

Assuming we are using a very low-end GPU, like the Quadro NVS 135M, which benchmarks at around 279 hashes per second (H/s) for WPA cracking.

\

1000000 / 279 = 0 hrs 59 min 44 sec 

\ Using Hashcat on outdated hardware, a password that takes over 11 days to crack manually can be broken within an hour (in worst-case scenario).

Now that we've established a basic understanding of how password cracking works, let's apply that to cracking..


\

WPA Handshakes

\ Unlike the previous example, WPA handshakes do not contain the actual password or even a hash of the password.

\ So, how is it possible to crack one?

\ The WPA 4-way handshake captures all required information to recreate the handshake locally, as discussed in the previous part of this series.

\ If you can generate a handshake using a guessed password that results in the same Message Integrity Code (MIC) as the captured handshake, then the guessed password is correct.

\


\

:::tip Prerequisite: You should have a basic understanding of Linux commands to follow along.

:::

\


\ There are two essential steps to complete before we can start cracking:

  • We need to convert the .cap to .hc22000

  • We need to transfer the capture files from the Pi to a desktop/laptop running Hashcat; (Pi Zero W is a lightweight, headless device and can't handle heavy tasks like cracking).

    \

Let's look at how to transfer files from the Pi to the desktop/laptop.

\

SFTP (Secure File Transfer Protocol)

\ SFTP is an extension of SSH version 2.0 that provides file transfer capabilities over a reliable data stream. It is a replacement for FTP due to its superior security.

\ Making connections

\

sftp <username>@<ip> -oPort=<port>  

\ -oPort is only needed if you are using a custom port

\

\ Interacting in SFTP

\ You can use standard Linux commands to interact with the remote host (PI), e.g. ls ,cd , etc.

Add an l as an prefix to the standard Linux commands to interact with the local host (Windows/Linux), e.g. lls , lcd , etc.

\ Downloading files from a remote host

\ Ensure you navigate to the directory where you want to download the file on your local host.

Use the lpwd command to check the current directory on your local host.

\

get /path/to/file  # this will download the file and rename it  get /path/to/file newname 

\

\ Uploading files to a remote host

\ This process is similar to downloading files from a remote host, but it uses the put command instead of the get command.

\

put /path/to/file-to-move  # this will upload the file and rename it  put /path/to/file-to-move newname 

\

:::tip Type help or ? to learn more commands

:::

\ Now, let us look at how to convert the .cap

\

Converting .cap

\ Before we can start cracking, it is essential to convert the captured file to a hashcat-compatible format. 

\ .hc22000 is the hashcat-compatible format for WPA handshakes.

\ here 22000 is the hash-mode for WPA PSK mode (WPA-PBKDF2-PMKID+EAPOL).

\ This format enables combining PMKIDs and EAPOL message pairs into a single hash line, allowing PBKDF2 reuse and lowering GPU cycles.

\ The .hc22000 format addressed the limitations of .hccapx, which had a rigid binary structure that prevented the use of new attack vectors such as PMKID and did not optimize GPU resource usage effectively.

\ CLI Method (recommended)

\ You can manually convert .cap right in the CLI with the hashcat utility tools.

  • Install hcxtools:

\

sudo apt install hcxtools  

\

\

  • Convert .cap using the hcxpcapngtool

\

hcxpcapngtool -o <output.hc22000> <input.cap>  

\

\

  • Finally, transfer the converted .hc22000 to your Desktop/Laptop

\ Online Tool Method

\ You can also use the Hashcat's official web-based tool, cap2hashcat.

\

  • Transfer the .cap to your desktop/laptop:

Since we are using a headless setup, we cannot visit the site on the Pi

\

  • Visit https://hashcat.net/cap2hashcat/

    \

  • Upload the captured .cap and click convert

    \

  • Finally, download the converted .hc22000 file

\ Now, it's time to get hands-on with..

\


Cracking WPA Handshake

\ I decided to attempt a brute‑force attack against the WPA handshake I'd previously captured.

But before doing that, it's always good to think ahead.

\ The maximum length of a Pre-shared key is 63 characters.

\ Let's assume my target used alphabets and digits (alpha-numeric) in their password, that's 36 keyspace to go through, which, trust me, would take literally an eternity to go through, even with 5000 H/s, you will be dead by the time it goes through all the combinations, so I need to narrow down..

\ But how?

\ The answer was in my environment, just by observing the people and my surroundings, I got some subtle hints, upon which I came up with this theory:

\ There is only one supplier that supplies all the Wi-Fi connections in my neighborhood and they often set the password as the customer's phone number and no one seems to care about changing it.

\ Why? Well, because humans tend to prioritize convenience over security, even at the expense of best practices.

\ To the average person, a phone number feels like a strong password; It is long with random numbers and memorable, but it is far from secure.

\ So, based on this, I assumed:

  • The password must be 10 characters long (since Indian numbers are 10 digits)

  • The password must only include digits (0–9)

  • IT MUST BE A PHONE NUMBER

    \

So, I went ahead and tested my theory…

\


\ Before that, let's set up hashcat Install hashcat

\ In Linux, you can run:

\

 sudo apt install hashcat  

\ Or, download the source from the official

\

 https://hashcat.net/hashcat/  

\ Check backend info

\

# Get backend info of GPU, etc  hashcat -I  # Get verbose backend info  hashcat -II  

\

\ Check benchmark for hash-mode 22000 (WPA)

\

# By default, this uses kernel optimized mode ('-O')  hashcat -b -m 22000  # To test speed only  hashcat -a 3 -m 22000 <path/to/.hc22000> --speed-only  

\

\ Type hashcat --help or visit the official site for more commands

\


\

Finally, start cracking

\

\

hashcat --session <session-name> -w 3 -a 3 -m 22000 <path/to/.hc22000> ?d?d?d?d?d?d?d?d?d?d  

\ --session → This specifies the session name, which also helps to restore the session using --restore later on.

\

hashcat --session <session-name> --restore  

\ \

\ -w 3 → This specifies the work-load profile, which determines how much GPU Hashcat will utilize. By default, it uses level 2 . In my case, I chose level 3 to set the workload to high, given that we have 10000000000 combinations to process.

\


\

:::info Note: At level 3, the device might become unresponsive to any other activity you perform on it. Whereas work-load profile level 4 is not recommended, as it might crash your device.

:::

\


\

\ -a 3 → This specifies the attack mode.

In my case, I set the attack mode to 3, which allows for brute-force/masked attacks.

\


\ Wait, what is a masked attack?

mask-attack is a subcategory of brute-force.

Simply put, mask attacks reduce the total candidate key space.

But what does that mean?

Let me show you a simple example to explain it more clearly:

Once again, consider 123456 as an example.

The password consists of 6 characters.

Assuming we are going the traditional way, which includes uppercase letters (A–Z), lowercase letters (a–z) and digits (0–9), which sums up to a total of 62 (26+26+10) characters.

\ Which means the total possible combinations would be:

\ \

combinations = keyspace^length  combinations = 62^6  62 * 62 * 62 * 62 * 62 * 62 = 56800235584  

\ This results in 56800235584 combinations.

If we take 1000 H/s, it would take..

\

combinations / guess per second = time  56800235584 / 1000 = 56800235.584 seconds 

\ Nearly one and a half year to go through.

Instead, by analyzing human behavior and common password patterns we can significantly reduce the candidate keyspace.

For example, if we are attempting to crack this 6-digit PIN, it is reasonable to assume that only the digits (0–9) are involved.

In this case, rather than considering all 62 alpha-numeric characters, we can limit the character set to just 10 digits.

This gives us a total combination of ..

\

10^6 = 1000000  

\ Assuming a cracking speed of 1000 hashes per second (H/s), it would take..

\

1000000 / 1000 = 1000 seconds  

\ close to 17 minutes to go through all the combinations.

you can specify masks with the built-in charsets.

\

\ You can also specify a custom charset:

-1&nbsp;?l?u?d → this will create a combination of lowercase letters, uppercase letters and digits, which is represented by ?1 .

\ In the example above, the mask would look like this:

?d?d?d?d?d?d which is equivalent to saying there are 6 digits in the password.

\ Now that mask attacks are clear, let's continue cracking..


\ -m 22000 → This specifies the mode representing the type of hash.

In my case, I set the mode to 22000 since we are dealing with WPA-PSK handshakes

\ Now, enter the path to the .hc22000 file and enter the mask, which in my case would be ?d?d?d?d?d?d?d?d?d?d, indicating the password is a 10-digit number.

\

\ This process took nearly 5 to 6 hours and a few checkpoints before I had the password.

Depending on the combination of numbers in the password, this could have taken more or less time or even days to crack.

\ This shows how weak password choices can make even a WPA-secured networks vulnerable.

\


\ In the final part of this series, we'll conclude with a shift from offense to defense, exploring digital hygiene and the practical steps you can take to harden your wireless networks against these types of attacks…

\

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.
Share Insights

You May Also Like

Michigan’s Stalled Reserve Bill Advances After 7 Months

Michigan’s Stalled Reserve Bill Advances After 7 Months

The post Michigan’s Stalled Reserve Bill Advances After 7 Months appeared on BitcoinEthereumNews.com. After seven months of inactivity, Michigan’s Bitcoin Reserve Bill, HB 4087, made progress Thursday by advancing to the second reading in the state House of Representatives. The bill, introduced in February, aims to establish a strategic bitcoin BTC$115,427.11 reserve by authorizing the state treasury to invest up to 10% of its reserves in the largest cryptocurrency and possibly others. It has now been referred to the Committee on Government Operations. If approved, Michigan would join the three states — Texas, New Hampshire and Arizona — that have enacted bitcoin reserve laws. While Texas allocated $10 million to purchase BTC in June, the other two have yet to fund the reserve with state money. Recently, the U.S. House directed the Treasury Department to study the feasibility and governance of a strategic bitcoin reserve, including key areas such as custody, cybersecurity and accounting standards. Sovereign adoption of bitcoin has emerged as one of the defining trends of 2025, with several U.S. states and countries considering or implementing BTC reserves as part of their public finance strategy. That’s in addition to the growing corporate adoption of bitcoin in company treasuries. This institutional embrace has contributed to a significant boost in bitcoin’s market valuation. The BTC price has increased 25% this year, and touched a record high near $124,500 in August, CoinDesk data show. Despite the enthusiasm, skeptics remain concerned about the risks posed by bitcoin’s notorious price volatility. Source: https://www.coindesk.com/policy/2025/09/19/michigan-s-stalled-bitcoin-reserve-bill-advances-after-7-months
Share
BitcoinEthereumNews2025/09/20 04:26
Share
The SEC Finally Approves Investment Giant Grayscale’s Multi-Crypto Fund! What Altcoins Does the Fund Contain? Here Are the Details

The SEC Finally Approves Investment Giant Grayscale’s Multi-Crypto Fund! What Altcoins Does the Fund Contain? Here Are the Details

The post The SEC Finally Approves Investment Giant Grayscale’s Multi-Crypto Fund! What Altcoins Does the Fund Contain? Here Are the Details appeared on BitcoinEthereumNews.com. The U.S. Securities and Exchange Commission (SEC) has approved Grayscale’s application for a multi-cryptoasset exchange-traded product (ETP) as part of its efforts to expedite the approval process for crypto funds. SEC Approves Grayscale’s Multi-Crypto Fund Including XRP, Solana, and Cardano Grayscale CEO Peter Mintzberg announced the approval of the Grayscale Digital Large Cap Fund (GDLC) on Wednesday via social media platform X. Mintzberg stated that GDLC will be the first multi-cryptoasset ETP to be traded on the market. The fund offers investment opportunities in Bitcoin, Ethereum, XRP, Solana, and Cardano. According to Grayscale’s official website, the fund has a net asset value of $57.7 per share and over $915 million in total assets under management. The SEC previously postponed the filing in July and began reviewing its conversion to trade on NYSE Arca. On the same day, the SEC also approved “expedited” public listing standards for crypto ETF issuers. SEC Chairman Paul Atkins stated that this step would provide investors with more options and lower barriers to accessing digital asset products. According to experts, this decision could lead to the launch of more than 100 new crypto ETFs in the next 12 months. Bloomberg ETF Analyst Eric Balchunas emphasized that this could be a critical turning point for the crypto market, noting that previous similar regulations have tripled ETF launches. *This is not investment advice. Follow our Telegram and Twitter account now for exclusive news, analytics and on-chain data! Source: https://en.bitcoinsistemi.com/the-sec-finally-approves-investment-giant-grayscales-multi-crypto-fund-what-altcoins-does-the-fund-contain-here-are-the-details/
Share
BitcoinEthereumNews2025/09/19 02:39
Share
Fintech 3.0: Blockchain Eats the World

Fintech 3.0: Blockchain Eats the World

Author: Harj Taggar (YC), Jesse Pollak (Base) Compiled by Tim, PANews PANews Editor's Note: Y Combinator, a well-known Silicon Valley incubator in the United States, and crypto giant Coinbase have jointly launched a crypto entrepreneurship camp. This article is a "call for action" and hopes that more entrepreneurs will start on-chain development. The article mainly explains the current development of the crypto industry, such as how stablecoins and tokenized assets will penetrate people's lives, and also indicates the investment areas they are interested in. We believe the time is ripe for a shift to on-chain development. Over the past decade, the relevant tools have continued to develop, and with the emergence of low-gas public chains, the global circulation of stablecoins, an easy-to-use wallet ecosystem, and a growing user base, the infrastructure is finally in place. We've observed several key trends that are creating tremendous opportunities for developers worldwide. This starts with the fact that we are at the beginning of a new era in FinTech – FinTech 3.0. Fintech 1.0 was the initial digitization of the financial industry in the 1990s, driven by companies like PayPal. The key breakthrough during this period was the rise in consumer acceptance of online payment methods. Fintech 2.0, which took place over the past decade and was driven by companies like Stripe, Plaid, Brex, and Chime, is centered around building application programming interfaces (APIs) on top of the existing financial system. A key breakthrough in this phase was the emergence of banking-as-a-service providers, which enabled startups to innovate and develop on top of the legacy financial system. We are entering the FinTech 3.0 era. This era will see the financial system restructured with code, with payments and settlements delivered instantly around the clock around the world. User assets will be stored in digital wallets and fully controlled by individuals, and traditional banks will no longer be the only option for asset custody. For years, regulatory uncertainty has been a major obstacle to building Fintech 3.0. With the enactment of the GENIUS Act and the potential imminent introduction of the CLARITY Act, the US now has a clear regulatory framework for cryptocurrencies, enabling entrepreneurs to confidently build groundbreaking businesses on-chain. This represents the greatest opportunity for cryptocurrency startups in years, and Y Combinator and Coinbase are committed to providing funding and support to help you seize this opportunity. While the list below is by no means exhaustive, there are several key areas where we will be particularly focused and looking to invest. Stablecoins Stablecoins are the first major success story in the FinTech 3.0 era. Stablecoins are on-chain assets whose value is pegged to fiat currencies or assets like gold, designed to maintain price stability. As a payment tool, stablecoins offer significant advantages over traditional financial transactions, particularly in cross-border payments. Users can transfer stablecoins to anywhere in the world 24/7, at a cost of less than a cent, in less than a second, and without foreign exchange fees. This isn't just a theoretical assumption; trillions of dollars in stablecoins are already being used to settle payments in real time. People are already building stablecoin applications with millions of users. YC alumni companies like Kontigo, DolarApp, and Aspora are providing instant, low-cost payment and remittance services to millions of users across Latin America and South Asia. El Dorado, a platform for sending and receiving stablecoins in Latin America, backed by Coinbase Ventures, has processed $200 million in transactions for nearly 1 million users over the past year, demonstrating the region's growing demand for cryptocurrencies as a hedge against currency devaluation. This isn’t just an attempt by startups: Coinbase has just partnered with Shopify to launch an open-source commercial payment protocol that supports any traditional online business scenario and on-chain stablecoin payment processes. It combines all the advantages of crypto payments (lightning-fast settlement speeds and near-zero transaction fees) with the security and scalability of typical e-commerce functions (delay capture, final tax confirmation, and refund capabilities). Despite regulatory headwinds, the continued success of stablecoins demonstrates strong market demand for them. Following the successful passage of the GENIUS Act in the United States, stablecoin adoption is poised for explosive growth. This legislation creates a comprehensive federal regulatory framework for stablecoins, similar to that of the banking system. Since the GENIUS Act's enactment, the total stablecoin market capitalization has grown by over $30 billion, with major corporations such as Amazon and Walmart expressing interest in issuing their own stablecoins. There are many directions for development in the stablecoin space, but we are particularly interested in the following: Full access to stablecoins: Platforms that process payments, lending, and other financial services can achieve significant efficiency gains through stablecoins. Enabling businesses and consumers to transact seamlessly on these platforms will unlock significant value. Local currency stablecoins: Stablecoins pegged to local currencies allow citizens in countries with high inflation to reap the benefits of cryptocurrency without relying solely on the US dollar. Governments and consumers concerned about dollarization can use these stablecoins as the cornerstone of local payment, savings, and credit systems. Crypto-native businesses: With the emergence of the Commerce Payments protocol and other tools, merchants, lenders, and consumers will have the opportunity to process acceptance, credit, and payments in a crypto-native manner. This will open up new possibilities for serving customers, given the global nature of the platform. Tokenization and Trading The infrastructure that powers stablecoins can be used for any asset. This is what makes Fintech 3.0 truly fascinating. Through tokenization, we will fundamentally change the definition of assets and the range of holders. Tokenization involves representing real-world assets (such as government bonds, startup equity, art, or loans) as digital tokens on a blockchain. Its core value lies in making assets that have historically lacked liquidity and been monopolized by layers of middlemen accessible to anyone, anywhere, at any time. In reality, this might mean: Instead of waiting a month for a check, you can receive your share of the rental income of your properties in real time, every second. Rather than going through complicated paperwork to exercise your startup stock options, you could have a “live cap sheet” that converts your equity into programmable tokens that you actually own and can buy and sell freely on the open market. Instead of investing millions in private lending, you can simply purchase tokens that represent a portion of a decentralized loan portfolio. This is already happening. Mainstream institutions like JPMorgan Chase are bringing deposit tokens to the blockchain, while startups like Courtyard are tokenizing physical collectibles. We're also witnessing a wave of tokenization of new on-chain native assets like creator tokens and content tokens on platforms like Zora and Pump.fun. All of this is giving rise to a ton of new things: companies like Axiom, a YC alumnus, have become the fastest-growing YC alumnus we've ever seen. The core infrastructure is in place, and we are looking for founders to develop products that will bring all types of assets online. We are particularly interested in: New credit market: Lending protocols leverage on-chain identity and reputation to provide undercollateralized loans, providing funding to individuals and businesses overlooked by the traditional financial system. On-chain capital structuring: A tool for startups to raise funds directly from users, managing equity structure tables through programmable tokens, replacing the traditional model of spreadsheets and legal services. New trading front ends: The surge in assets presents new trading and investment opportunities for consumers and businesses. Applications and Agents On-chain technology also opens up new frontiers for applications and intelligent agents, unattainable in the previous internet era. Think of blockchain as a new operating system: a globally shared platform that makes application development an order of magnitude more efficient than traditional models. No single company holds a monopoly, and any developer can build products on it without permission. With its "money as software" nature, intelligent agents are inherently equipped to participate in this new economic landscape. We believe this will trigger a surge in new applications. Social, financial, collaborative, gaming—you name it. We're already seeing this trend with platforms like Base: you can use these apps to do everything from getting a loan instantly, to earning money while playing games, to supporting your favorite creators and earning money yourself. We believe these applications will also appear in chats in the form of agents. AI agents equipped with digital wallets will be super-empowered to help people participate in and navigate the rapidly growing global economy. They will simplify and improve the user experience, just as they do in other areas of commerce around the world.
Share
PANews2025/09/24 16:49
Share