Blog

Updates and Insights

{"options":[{"label":"AI","url":"https:\/\/hemi.xyz\/blog\/category\/ai\/","selected":""},{"label":"AMA","url":"https:\/\/hemi.xyz\/blog\/category\/ama\/","selected":""},{"label":"Announcements","url":"https:\/\/hemi.xyz\/blog\/category\/announcements\/","selected":""},{"label":"Bitcoin","url":"https:\/\/hemi.xyz\/blog\/category\/bitcoin\/","selected":""},{"label":"Ethereum","url":"https:\/\/hemi.xyz\/blog\/category\/ethereum\/","selected":""},{"label":"Features","url":"https:\/\/hemi.xyz\/blog\/category\/features\/","selected":""},{"label":"Hemi","url":"https:\/\/hemi.xyz\/blog\/category\/hemi\/","selected":""},{"label":"Learn Center","url":"https:\/\/hemi.xyz\/blog\/category\/learn-center\/","selected":""},{"label":"Partnerships","url":"https:\/\/hemi.xyz\/blog\/category\/partnerships\/","selected":""},{"label":"Press Releases","url":"https:\/\/hemi.xyz\/blog\/category\/press\/","selected":""},{"label":"Security","url":"https:\/\/hemi.xyz\/blog\/category\/security\/","selected":""},{"label":"Video","url":"https:\/\/hemi.xyz\/blog\/category\/video\/","selected":""},{"label":"Webinar","url":"https:\/\/hemi.xyz\/blog\/category\/webinar\/","selected":""}],"_content":""}

Introducing Debt Vaults on Hemi: Code-Driven Onchain Credit

A peer-to-peer lending primitive where loans are tokenized, repayments are flexible, and credit is programmable. Debt Vaults on Hemi introduce […]

Hemi Developer AMA Recap: What’s Next for Bitcoin Programmability and L3 Security

In this episode of MwM, the engineering team sat down to answer questions with the Hemi community. This week, the […]

How Do Crypto Bridges Work?

Hemi uses a technology called tunnels to manage cross blockchain connectivity. But how did users used to bridge Ethereum and […]

Midweek With Max: 1Delta Joins Us to Explore Their Tech Stack

No Karaoke, just solid Hemi news. This week’s Midweek with Max saw Jeremy Nation stepping in for Rick—who’s off somewhere being very […]

Hemi and Hypernative Partner to Strengthen Network Security

Hypernative reinforces Hemi’s network and protocols by establishing secure workflows, helping to minimize risk in DeFi. Hemi is pleased to […]

Proof-of-Proof vs. Validity Proofs: Security Tradeoffs Explained

In blockchain architecture, consensus security often comes down to how proof is established and verified. Two approaches gaining attention — Proof-of-Proof […]

{"eyebrow":"Let's get social","title":"Connect with us","_content":""}