Schwab plans spot bitcoin, ether trading launch in first half of 2026
The financial services giant with almost $12 trillion in client assets is moving closer to direct crypto trading, offering subscription for early access to the Schwab Crypto account.
The financial services giant with almost $12 trillion in client assets is moving closer to direct crypto trading, offering subscription for early access to the Schwab Crypto account.
Apr 3, 2026, 7:18 p.m.
Make preferred on
Brokerage services giant Charles Schwab plans to roll out spot cryptocurrency trading in the first half of 2026, pushing it deeper into digital assets.
"We remain on track to launch our spot crypto offer in the first half of 2026, starting with bitcoin BTC$66,871.28 and ether (ETH)," a company spokesperson told CoinDesk on Friday.
The firm has opened a waitlist for clients seeking early access to what it calls a "Schwab Crypto" account, which will allow users to buy and sell the two largest cryptocurrencies. The firm will offer the service via Charles Schwab Premier Bank, SSB.
The move builds on comments from CEO Rick Wurster, who said last July that Schwab aimed to introduce crypto trading "sometime soon" in response to client demand. He framed the effort as a way to bring digital assets into the same account view as stocks and bonds in a push toward a more unified investment platform.
Schwab's scale could give it an edge as it enters a market long dominated by crypto-native exchanges. The firm reported $11.9 trillion in client assets in 2025, offering a built-in base of retail and institutional investors who may prefer trading crypto within a familiar brokerage environment rather than using standalone platforms.
The firm already allows clients to invest in ETFs linked to cryptocurrencies and trade bitcoin futures on its platform. It also launched the Schwab Crypto Thematic Index (STCE), an ETF that tracks the performance of companies linked to the digital asset sector.
More For You
Most crypto privacy models weaken as blockchain data grows. Encryption-based models like Zcash strengthen. CoinDesk Research maps the five privacy approaches and examines the widening gap.
Why it matters:
As blockchain adoption scales, the metadata available to machine learning models scales with it. Obfuscation-based privacy approaches are structurally degrading as a result. This report provides a comprehensive comparison of all five major crypto privacy architectures and a framework for evaluating which models remain durable as AI capabilities improve.
View Full Report
More For You
Prominent blockchain sleuth ZachXBT alleged faster action by Circle could have limited crypto losses, but freezing asset without legal authorization carries legal risks.
What to know:
- After exploiting crypto protocol Drift, the attacker moved about $232 million in USDC from Solana to Ethereum using Circle’s cross-chain transfer protocol.
- Critics like blockchain investigator ZachXBT said Circle could have moved faster to blacklist wallets and freeze funds. But freezing assets without authorization could carry legal liability, Plume general...
Read full story
Sign in to highlight and annotate this article

Conversation starters
Daily AI Digest
Get the top 5 AI stories delivered to your inbox every morning.
More about
launchservice
How to Use Claude Code for Security Audits: The Script That Found a 23-Year-Old Linux Bug
Learn the exact script and prompting technique used to find a 23-year-old Linux kernel vulnerability, and how to apply it to your own codebases. The Technique — A Simple Script for Systematic Audits At the [un]prompted AI security conference, Anthropic research scientist Nicholas Carlini revealed he used Claude Code to find multiple remotely exploitable heap buffer overflows in the Linux kernel, including one that had gone undetected for 23 years. The breakthrough wasn't a complex AI agent—it was a straightforward bash script that systematically directed Claude Code's attention. Carlini's script iterates over every file in a source tree, feeding each one to Claude Code with a specific prompt designed to bypass safety constraints and focus on vulnerability discovery. Why It Works — Context,

Architecture Is the Missing Layer in AI Harness Engineering
Originally published in longer form on Substack. This DEV version is adapted for software engineers and platform practitioners who want the practical takeaway quickly. Most AI harness work focuses on execution. That makes sense. Teams need better context management, tool access, workflow boundaries, verification, memory, and sub-agent coordination. Without those pieces, coding agents are unreliable fast. But there is a different failure mode that those harness improvements do not solve: an agent can operate inside a well-designed execution harness and still produce the wrong architecture. That is the missing layer. The Real Problem Is Not Just Code Quality Ask an agent to design a small SaaS product and it will often produce something that is technically coherent and operationally excessiv
Knowledge Map
Connected Articles — Knowledge Graph
This article is connected to other articles through shared AI topics and tags.
More in Releases

AI companions can comfort lonely users but may deepen distress over time
AI companions are always available, never judge, never tire and never demand anything in return. If someone is struggling with loneliness, this frictionlessness can seem profoundly appealing. However, new research shows that in the long term, seeking emotional support from an AI companion can pull users away from important human relationships.

Hackers breached the European Commission by poisoning the security tool it used to protect itself
CERT-EU has attributed a major data breach at the European Commission to cybercrime group TeamPCP, which exploited a supply chain attack on the open-source security tool Trivy to steal 92 GB of compressed data from the Commission’s AWS infrastructure. The notorious ShinyHunters gang then published the data, which included emails and personal details from up [ ] This story continues at The Next Web

Microsoft's AI in its own terms: "use Copilot at your own risk"
The Copilot terms of use, updated last October, draw clear limits around what the software is meant to do. The document states Copilot is for entertainment purposes only, adding that "it can make mistakes, and it may not work as intended." More notably, Microsoft explicitly advises against relying on it... Read Entire Article



Discussion
Sign in to join the discussion
No comments yet — be the first to share your thoughts!