Blog

Updates and Insights

{"options":[{"label":"AI","url":"https:\/\/hemi.xyz\/blog\/category\/ai\/","selected":""},{"label":"AMA","url":"https:\/\/hemi.xyz\/blog\/category\/ama\/","selected":""},{"label":"Announcements","url":"https:\/\/hemi.xyz\/blog\/category\/announcements\/","selected":""},{"label":"Bitcoin","url":"https:\/\/hemi.xyz\/blog\/category\/bitcoin\/","selected":""},{"label":"Ethereum","url":"https:\/\/hemi.xyz\/blog\/category\/ethereum\/","selected":""},{"label":"Features","url":"https:\/\/hemi.xyz\/blog\/category\/features\/","selected":""},{"label":"Hemi","url":"https:\/\/hemi.xyz\/blog\/category\/hemi\/","selected":"selected"},{"label":"Learn Center","url":"https:\/\/hemi.xyz\/blog\/category\/learn-center\/","selected":""},{"label":"Partnerships","url":"https:\/\/hemi.xyz\/blog\/category\/partnerships\/","selected":""},{"label":"Press Releases","url":"https:\/\/hemi.xyz\/blog\/category\/press\/","selected":""},{"label":"Security","url":"https:\/\/hemi.xyz\/blog\/category\/security\/","selected":""},{"label":"Video","url":"https:\/\/hemi.xyz\/blog\/category\/video\/","selected":""},{"label":"Webinar","url":"https:\/\/hemi.xyz\/blog\/category\/webinar\/","selected":""}],"_content":""}

Hemi Developer AMA Recap: What’s Next for Bitcoin Programmability and L3 Security

In this episode of MwM, the engineering team sat down to answer questions with the Hemi community. This week, the […]

Midweek With Max: 1Delta Joins Us to Explore Their Tech Stack

No Karaoke, just solid Hemi news. This week’s Midweek with Max saw Jeremy Nation stepping in for Rick—who’s off somewhere being very […]

Proof-of-Proof vs. Validity Proofs: Security Tradeoffs Explained

In blockchain architecture, consensus security often comes down to how proof is established and verified. Two approaches gaining attention — Proof-of-Proof […]

Bitcoin in DeFi: Use Cases That Don’t Require Custody

Bitcoin has long been seen as a store of value, a hedge against inflation, and a decentralized form of money. […]

How to Develop Cross-Chain Apps Using the hVM

The Hemi Virtual Machine (hVM) is at the core of Hemi’s approach to secure, scalable, and bridgeless interoperability. For developers building cross-chain applications, […]

A Deep Dive into Programmable Bitcoin Applications

Bitcoin was created to move value securely without the need for a central authority. It does that well. But today, […]

{"eyebrow":"Let's get social","title":"Connect with us","_content":""}