top of page
The Communiqué News

A recent episode of the Unchained podcast addressed how ERC 6551 could revolutionise the crypto market by providing NFTs with their own wallets. The planned ERC 6551 token standard for NFTs has piqued the curiosity of crypto fans since it would allow digital assets to hold other tokens, a development that has the potential to radically alter the NFT and metaverse scene.


Pritish Bagdi

ERC 6551
ERC 6551

What exactly is ERC 6551?

The token standard proposal, announced in February, aims to create a system that provides a smart contract account to every ERC-721 (non-fungible token). These tokens will be able to hold assets and interact with applications without requiring any changes to existing ERC-721 smart contracts or infrastructure.

The key components of this system are a permissionless registry for deploying token-bound accounts and a standard implementation interface.

Each ERC-721 coin will be assigned a unique smart contract account, allowing it to interact with the blockchain, record transaction history, and possess on-chain assets. The owner of the ERC-721 token has control over each token-bound account, allowing them to initiate on-chain operations on behalf of their token.

The proposal aims to be as backward compatible as possible with existing non-fungible token contracts. EIP-155 chain IDs are also used to uniquely identify ERC-721 tokens, allowing for the optional support of multi-chain token-bound accounts.


What are the benefits of ERC 6551?

The ERC 6551 standard was a potential solution to past attempts to standardise NFTs owning assets, such as the requirement for custom logic in their smart contract. The ERC 6551 standard eliminates these limitations by offering NFTs the same rights as Ethereum users, allowing them to hold assets and execute actions.

While ERC 721, ERC 1155, and soul-bound tokens exist as means to own objects on Ethereum, the podcast panelists emphasised that ERC 6551 is not a token standard in the traditional sense because it offers every current ERC 721 its own wallet, unlocking a new layer of compatibility for NFTs.








Numeric, a leading manufacturer of power backup solutions, is pleased to announce the release of Intizon, a Next-Generation Mini Uninterruptible Power Supply (UPS) intended to assure continuous Wi-Fi access. Intizon is more than just a technology product; it is a trailblazer that is redefining how people stay connected in the digital era. Intizon, which is designed to handle 12V-rated Wi-Fi routers, provides up to 4 hours of backup power and is poised to become an indispensable part of consumer's life by catering to both residential and business users.

ree

The COVID-19 pandemic highlighted the critical importance of continuous internet connectivity as people increasingly relied on it for remote work, content creation and consumption, online gaming, and other activities, making the need for reliable and continuous Wi-Fi connectivity paramount. In response to this demand, Numeric created Intizon, a Mini UPS for Wi-Fi routers that ensure continuous internet connection even during power outages or fluctuations. Intizon intends to carve a position in this market by raising awareness and satisfying the growing demand for backup solutions for various devices such as Wi-Fi routers, CCTVs, set-top boxes, POS systems, and others.

"In today's digital landscape, we recognized the growing demand for continuous internet access." Our Mini UPS demonstrates our dedication to innovation and providing need-based solutions. "It's a game changer, allowing individuals and businesses to stay online, access critical information, work efficiently, and maintain seamless communication even in the face of power outages and disruptions," said Satpal Singh, CEO of Numeric UPS.

With its tiny size, superior aesthetics, advanced functionality, and unmatched durability, Intizon is poised to reinvent the Mini UPS market. It provides a hassle-free experience to users with no installation help required and a plug-and-play configuration. Individuals may enjoy uninterrupted Wi-Fi even during power outages thanks to Intizon, guaranteeing that they can stay connected and thrive in today's interconnected world.









Cybersecurity is very important to all of us because we’re living in an era where information and data are our most valuable assets. That’s why today’s world is so focused on data privacy and personal information. Cyberattacks are a potential threat to everyone, with viruses and phishing able to target individuals’ mobile devices, companies, and governments. So it’s crucial for us to focus on developing and producing secure technologies.


Dr. Jassim Haji

How Can We Develop a New Approach to Cybersecurity & National Security

A New Approach to Cybersecurity and National Security


Information security is like an onion in that it has multiple layers. People assume that technology is everything, but it is only one layer and perhaps the easiest one, People tend to overlook that ecosystem ownerships, patents, regulations, laws, directives, cyber strategies, processes, standard operating procedures, best practices, and cyber diplomacy are equally important. And sometimes even more challenging.

Huawei's goal is to provide a fresh approach to cybersecurity and national digital sovereignty. Complying with national legislation and taking a responsible attitude to the legal context of security, is something that every 5G network vendor has a responsibility to do.

Huawei’s 5G networking equipment allows nations to use their own encryption algorithms, the encryption keys of which are not available to Huawei, outsiders, or other governments – only local mobile operators are allowed to perform decryption when legally required to do so. Thus they don't have access to data that is flowing through their equipment. Central our strategy is to support the national data sovereignty of every country.


The Importance of Standards in Cybersecurity


Huawei is a strong advocate for cybersecurity standards that are globally recognized and agreed upon. They believe that trust needs to be based on facts, facts need to be verifiable, and verification needs to be based on common standards. Based on industry practices, certification is the most effective way to address security issues. Certification is verification that everyone reads standards in the same way and it therefore guarantees interoperability. That means that different vendors’ equipment can work seamlessly together.


5G Security Challenges


5G faces security challenges due to new services, architectures, and technologies, as well as higher user privacy and protection requirements. However, 5G is the most secure telecommunications standard that the industry has developed to date.

The assets of wireless and core networks, computing resources, accounts, passwords, logs, configurations, and charging data records (CDRs) are operated and maintained by operators, not equipment vendors. Hackers attack wireless networks in an attempt to steal and tamper with users’ personal data or compromise the availability of networks or computing resources. The way in which equipment vendors work together with operators to make this more difficult for hackers is by implementing 3GPP specifications.





bottom of page