Coinbase Shift Payments To Bitcoin Debit Card

This isn’t the first bitcoin debit card in the world, but this is the first one that works with your Coinbase account. Coinbase has partnered with Shift Payments so that you can get a Visa card for just $10 and pay everywhere with your bitcoins. There are no fees for now.

Shift Payments is a company that is working on integrating all your currencies in one card. The company’s key product is a debit card. Once you have it, you can connect it with multiple accounts to seamlessly spend all your real money and Internet money with the same card.

So far, the company supports Coinbase and Dwolla accounts. You can choose a first source of funding, a second one, etc. For instance, you can tell Shift to spend your bitcoins first, and to use your Dwolla account as a backup once your Coinbase hot wallet is empty. You can see your transaction history in the app as well.

How much does it cost? After spending $10 to get your card, there is no annual fee or domestic transaction fee. There is a $2.50 ATM fee and a 3 percent international transaction fee. When you spend bitcoins, Coinbase doesn’t take any cut — the BTC to USD conversion fee is 0 percent.

But there are some restrictions as well, starting with fees. Coinbase wrote that there isn’t any domestic transaction fee “for a limited time.” So you can expect a small conversion fee in the future. The Coinbase integration for the Shift Card is only available for people living in one of these 24 states as well.

Shift Payments also plans to let you spend airline miles, loyalty points and other stores of value. As for the bitcoin angle, anything that makes it easier to buy and spend bitcoins is a good thing — and it is particularly interesting when it comes from a big player like Coinbase.
Techcrunch: http://tcrn.ch/1Suk2fz

 

« Cyber Security Firm Tanium Raises New Capital At $2.5billion Valuation
Bitwalking: Digital Currency Pays People to Walk »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Cyber Security Recruiters

Cyber Security Recruiters

Cyber Security Recruiters is a niche recruiting firm who finds impact players for our clients in the Information Security Space.

National Defence Radio Establishment (FRA) - Sweden

National Defence Radio Establishment (FRA) - Sweden

The National Defence Radio Establishment (Försvarets Radioanstalt), is the Swedish national authority for Signals Intelligence, also providing Information assurance services to government authorities.

National Institute of Information and Communications Technology (NICT) - Japan

National Institute of Information and Communications Technology (NICT) - Japan

NICT is Japan’s sole National Research and Development Agency specializing in the field of information and communications technology.

Intensity Analytics

Intensity Analytics

Intensity Analytics is a software firm that develops next-generation, physical user and entity behavioral authentication ("physical UEBA") security software technology.

CyRise

CyRise

CyRise is a venture accelerator focused squarely on early stage cyber security startups.

IronNet Cybersecurity

IronNet Cybersecurity

IronNet’s product and services provide enterprise-wide security management and visibility of your network, users and assets.

ZeroNorth

ZeroNorth

ZeroNorth provides a new approach to improve software and infrastructure security, simplify continuous compliance reporting and to create more cost-effective risk management programs.

Cylus

Cylus

Cylus, a global leader in rail cybersecurity, helps rail and metro companies avoid safety incidents and service disruptions caused by cyber-attacks.

Crosspoint Capital Partners

Crosspoint Capital Partners

Crosspoint Capital Partners is a private equity investment firm focused on the cybersecurity and privacy sectors.

AirDroid Business

AirDroid Business

AirDroid Business is an efficient mobile device management solution for Android devices, helping businesses to remotely control and access devices in large quantities using a centralized approach.

National Cyber Security Agency (NCSA) - Thailand

National Cyber Security Agency (NCSA) - Thailand

National Cyber Security Agency of Thailand is responsible for coordinating and implementing national cybersecurity policies, strategies, and initiatives.

Genix Cyber

Genix Cyber

Genix Cyber provides world-class cybersecurity services that protect systems, cloud applications, infrastructure, critical data, and networks from evolving cyber threats.

Odaseva

Odaseva

Odaseva delivers the strongest data security solution for enterprises running on Salesforce, safeguarding confidentiality and integrity of critical business information.

Nordic Defender

Nordic Defender

Nordic Defender is the first crowd-powered modern cybersecurity solution provider in the Nordic region.

Adili Group

Adili Group

Adili Group is a leading pan-African corporate advisory firm. We deliver tailored solutions in regulation and compliance, risk management, and improving business efficiency.

Straiker

Straiker

Straiker's AI-native security platform is designed to protect enterprise AI applications and autonomous agents from evolving threats through automated assessment and runtime guardrails.