Cryptomonnaies

Ukraine Is Buying Bulletproof Vests and Night-Vision Goggles Using Crypto

Some of the military suppliers to Ukraine have crypto accounts, said the Ukraine government.

Some of Ukraine’s weapons suppliers are accepting payments directly in crypto, a senior official told CoinDesk Monday.

Ukraine “weaponized” crypto after Russia invaded the European nation at the end of February, raising over $60 million in bitcoin (BTC), ether (ETH) and other cryptocurrencies and immediately spending some of these funds on fuel, food and other supplies – including bulletproof vests for soldiers.

Ukraine’s de facto crypto ministry, the Ministry of Digital Transformation, is facilitating the buying of military equipment based on the demands of the Ministry of Defense, said Alex Bornyakov, the deputy minister at the ministry. The operation involves Kuna, the Ukrainian exchange that set up the donation addresses; two ministries; five signatories and several other government officials as key players.

Spending crypto

At least three of five authorized signatories have to approve any expenditure of Ukraine’s crypto funds. The process has been put in place in order to avoid a situation in which signatories are stuck in bunkers or incommunicado.

“Most of the people are in Ukraine. And it is a terrible situation right now. The war zone is in different parts of Ukraine. It is possible that people could be in a shelter or they can lose connection for days and so we have to have a redundancy plan just in case someone can’t be in touch,” Bornyakov said. The ministry is working with Ukraine’s Kuna exchange in a public-private partnership as the exchange already had an infrastructure in place to receive the funds or transact on behalf of the government.

What also helps Ukraine is some of its vendors are willing to accept crypto payments directly.
Veille-cyber

Share
Published by
Veille-cyber

Recent Posts

L’IA : opportunité ou menace ? Les DSI de la finance s’interrogent

L'IA : opportunité ou menace ? Les DSI de la finance s'interrogent Alors que l'intelligence…

1 mois ago

Sécurité des identités : un pilier essentiel pour la conformité au règlement DORA dans le secteur financier

Sécurité des identités : un pilier essentiel pour la conformité au règlement DORA dans le…

1 mois ago

Règlement DORA : implications contractuelles pour les entités financières et les prestataires informatiques

La transformation numérique du secteur financier n'a pas que du bon : elle augmente aussi…

1 mois ago

Telegram menace de quitter la France : le chiffrement de bout en bout en ligne de mire

Telegram envisage de quitter la France : le chiffrement de bout en bout au cœur…

1 mois ago

Quand l’IA devient l’alliée des hackers : le phishing entre dans une nouvelle ère

L'intelligence artificielle (IA) révolutionne le paysage de la cybersécurité, mais pas toujours dans le bon…

1 mois ago

LES DIFFÉRENCES ENTRE ISO 27001 ET TISAX®

TISAX® et ISO 27001 sont toutes deux des normes dédiées à la sécurité de l’information. Bien qu’elles aient…

2 mois ago

This website uses cookies.