Skip to main content

175 posts tagged with "Blockchain"

General blockchain technology and innovation

View all tags

Celestia's Competitive Edge in Data Availability: A Deep Dive

· 9 min read
Dora Noda
Software Engineer

When Ethereum L2s paid $3.83 per megabyte to post data using blobs, Eclipse was paying Celestia $0.07 for the same megabyte. That's not a typo—55 times cheaper, enabling Eclipse to post over 83 GB of data without bankrupting its treasury. This cost differential isn't a temporary market anomaly. It's the structural advantage of purpose-built infrastructure.

Celestia has now processed over 160 GB of rollup data, generates daily blob fees that have grown 10x since late 2024, and commands roughly 50% market share in the data availability sector. The question isn't whether modular data availability works—it's whether Celestia can maintain its lead as EigenDA, Avail, and Ethereum's native blobs compete for the same rollup customers.

Understanding Blob Economics: The Foundation

Before analyzing Celestia's numbers, it's worth understanding what makes data availability economically distinct from other blockchain services.

What Rollups Actually Pay For

When a rollup processes transactions, it produces state changes that need to be verifiable. Rather than trust the rollup operator, users can verify by re-executing transactions against the original data. This requires that transaction data remains available—not forever, but long enough for challenges and verification.

Traditional rollups posted this data directly to Ethereum calldata, paying premium prices for permanent storage on the world's most secure ledger. But most rollup data only needs availability for a challenge window (typically 7-14 days), not eternity. This mismatch created the opening for specialized data availability layers.

Celestia's PayForBlob Model

Celestia's fee model is straightforward: rollups pay per blob based on size and current gas prices. Unlike execution layers where computation costs dominate, data availability is fundamentally about bandwidth and storage—resources that scale more predictably with hardware improvements.

The economics create a flywheel: lower DA costs enable more rollups, more rollups generate more fee revenue, and increased usage justifies infrastructure investment for even greater capacity. Celestia's current throughput of approximately 1.33 MB/s (8 MB blocks every 6 seconds) represents early-stage capacity with a clear path to 100x improvement.

The 160 GB Reality: Who's Using Celestia

The aggregate numbers tell a story of rapid adoption. Over 160 GB of data has been published to Celestia since mainnet launch, with daily data volume averaging around 2.5 GB. But the composition of this data reveals more interesting patterns.

Eclipse: The Volume Leader

Eclipse—a Layer 2 combining Solana's virtual machine with Ethereum settlement—has published over 83 GB of data to Celestia, more than half of all network volume. Eclipse uses Celestia for data availability while settling to Ethereum, demonstrating the modular architecture in practice.

The volume isn't surprising given Eclipse's design choices. Solana Virtual Machine execution generates more data than EVM equivalents, and Eclipse's focus on high-throughput applications (gaming, DeFi, social) means transaction volumes that would be cost-prohibitive on Ethereum DA.

The Enterprise Cohort

Beyond Eclipse, the rollup ecosystem includes:

  • Manta Pacific: Over 7 GB posted, an OP Stack rollup focused on ZK applications with Universal Circuits technology
  • Plume Network: RWA-specialized L2 using Celestia for tokenized asset transaction data
  • Derive: On-chain options and structured products trading
  • Aevo: Decentralized derivatives exchange processing high-frequency trading data
  • Orderly Network: Cross-chain orderbook infrastructure

Twenty-six rollups now build on Celestia, with major frameworks—Arbitrum Orbit, OP Stack, Polygon CDK—all offering Celestia as a DA option. Rollups-as-a-Service platforms like Conduit and Caldera have made Celestia integration a standard offering.

Fee Revenue Growth

At the end of 2024, Celestia generated approximately $225 per day in blob fees. That number has grown nearly 10x, reflecting both increased usage and the network's ability to capture value as demand rises. The fee market remains early-stage—capacity utilization is low relative to tested limits—but the growth trajectory validates the economic model.

Cost Comparison: Celestia vs. The Competition

Data availability has become a competitive market. Understanding the cost structures helps explain rollup decisions.

Celestia vs. Ethereum Blobs

Ethereum's EIP-4844 (Dencun upgrade) introduced blob transactions, reducing DA costs by 90%+ compared to calldata. But Celestia remains significantly cheaper:

MetricEthereum BlobsCelestia
Cost per MB~$3.83~$0.07
Cost advantageBaseline55x cheaper
CapacityLimited blob space8 MB blocks (scaling to 1 GB)

For high-volume rollups like Eclipse, this difference is existential. At Ethereum blob prices, Eclipse's 83 GB of data would have cost over $300,000. On Celestia, it cost approximately $6,000.

Celestia vs. EigenDA

EigenDA offers a different value proposition: Ethereum-aligned security through restaking, with claimed throughput of 100 MB/s. The tradeoffs:

AspectCelestiaEigenDA
Security modelIndependent validator setEthereum restaking
Throughput1.33 MB/s (8 MB blocks)100 MB/s claimed
ArchitectureBlockchain-basedData Availability Committee
DecentralizationPublic verificationTrust assumptions

EigenDA's DAC architecture enables higher throughput but introduces trust assumptions that fully blockchain-based solutions avoid. For teams deeply embedded in Ethereum's ecosystem, EigenDA's restaking integration may outweigh Celestia's independence.

Celestia vs. Avail

Avail positions as the most flexible option for multichain applications:

AspectCelestiaAvail
Cost per MBHigherLower
Economic securityHigherLower
Mainnet capacity8 MB blocks4 MB blocks
Test capacity128 MB proven128 MB proven

Avail's lower costs come with lower economic security—a reasonable tradeoff for applications where the marginal cost savings matter more than maximum security guarantees.

The Scaling Roadmap: From 1 MB/s to 1 GB/s

Celestia's current capacity—approximately 1.33 MB/s—is intentionally conservative. The network has demonstrated dramatically higher throughput in controlled testing, providing a clear upgrade path.

Mammoth Testing Results

In October 2024, the Mammoth Mini devnet achieved 88 MB blocks with 3-second block times, delivering approximately 27 MB/s throughput—over 20x current mainnet capacity.

In April 2025, the mamo-1 testnet pushed further: 128 MB blocks with 6-second block times, achieving 21.33 MB/s sustained throughput. This represented 16x current mainnet capacity while incorporating new propagation algorithms like Vacuum! designed for efficient large-block data movement.

Mainnet Upgrade Progress

The scaling is happening incrementally:

  • Ginger Upgrade (December 2024): Reduced block times from 12 seconds to 6 seconds
  • 8 MB Block Increase (January 2025): Doubled block size via on-chain governance
  • Matcha Upgrade (January 2026): Enabled 128 MB blocks through improved propagation mechanics, reducing node storage requirements by 77%
  • Lotus Upgrade (July 2025): V4 mainnet release with further TIA holder improvements

The roadmap targets gigabyte-scale blocks by 2030, representing a 1,000x increase from current capacity. Whether market demand grows to justify this capacity remains uncertain, but the technical path is clear.

TIA Tokenomics: How Value Accrues

Understanding Celestia's economics requires understanding TIA's role in the system.

Token Utility

TIA serves three functions:

  1. Blob fees: Rollups pay TIA for data availability
  2. Staking: Validators stake TIA to secure the network and earn rewards
  3. Governance: Token holders vote on network parameters and upgrades

The fee mechanism creates direct linkage between network usage and token demand. As blob submissions increase, TIA is purchased and spent, creating buy pressure proportional to network utility.

Supply Dynamics

TIA launched with 1 billion genesis tokens. Initial inflation was set at 8% annually, decreasing over time toward 1.5% terminal inflation.

The January 2026 Matcha upgrade introduced Proof-of-Governance (PoG), slashing annual token issuance from 5% to 0.25%. This structural change:

  • Reduces sell pressure from inflation
  • Aligns rewards with governance participation
  • Strengthens value capture as network usage grows

Additionally, the Celestia Foundation announced a $62.5 million TIA buyback program in 2025, further reducing circulating supply.

Validator Economics

Effective January 2026, maximum validator commission increased from 10% to 20%. This addresses validators' rising operational expenses—particularly as block sizes grow—while maintaining competitive staking yields.

The Competitive Moat: First-Mover or Sustainable Advantage?

Celestia's 50% DA market share and 160+ GB of posted data represent clear traction. But moats in infrastructure can erode quickly.

Advantages

Framework Integration: Every major rollup framework—Arbitrum Orbit, OP Stack, Polygon CDK—supports Celestia as a DA option. This integration creates switching costs and reduces friction for new rollups.

Proven Scale: The 128 MB block testing provides confidence in future capacity that competitors haven't demonstrated at the same level.

Economic Alignment: The Proof-of-Governance tokenomics and buyback programs create stronger value capture than alternative models.

Challenges

EigenDA's Ethereum Alignment: For teams prioritizing Ethereum-native security, EigenDA's restaking model may be more attractive despite architectural trade-offs.

Avail's Cost Advantage: For cost-sensitive applications, Avail's lower fees may outweigh security differences.

Ethereum's Native Improvement: If Ethereum expands blob capacity significantly (as proposed in various roadmap discussions), the cost differential shrinks.

The Ecosystem Lock-in Question

Celestia's real moat may be ecosystem lock-in. Eclipse's 83+ GB of data creates path dependency—migrating to a different DA layer would require significant infrastructure changes. As more rollups accumulate history on Celestia, switching costs increase.

What the Data Tells Us

Celestia's blob economics validate the modular thesis: specialized infrastructure for data availability can be dramatically cheaper than general-purpose L1 solutions. The 55x cost advantage over Ethereum blobs isn't magic—it's the result of purpose-built architecture optimized for a specific function.

The 160+ GB of posted data proves market demand exists. The 10x growth in fee revenue demonstrates value capture. The scaling roadmap provides confidence in future capacity.

For rollup developers, the calculus is straightforward: Celestia offers the best-tested, most integrated DA solution with a clear path to gigabyte-scale capacity. EigenDA makes sense for Ethereum-native projects willing to accept DAC trust assumptions. Avail serves multichain applications prioritizing flexibility over maximum security.

The data availability market has room for multiple winners serving different segments. But Celestia's combination of proven scale, deep integrations, and improving tokenomics positions it well for the coming wave of rollup expansion.


Building rollups that need reliable data availability infrastructure? BlockEden.xyz provides RPC endpoints across 30+ networks including major L2s built on Celestia DA. Explore our API marketplace to access the infrastructure your modular stack needs.

Navigating the Privacy Technology Landscape: FHE, ZK, and TEE in Blockchain

· 10 min read
Dora Noda
Software Engineer

When Zama became the first fully homomorphic encryption unicorn in June 2025—valued at over $1 billion—it signaled something larger than one company's success. The blockchain industry had finally accepted a fundamental truth: privacy isn't optional, it's infrastructure.

But here's the uncomfortable reality developers face: there's no single "best" privacy technology. Fully Homomorphic Encryption (FHE), Zero-Knowledge Proofs (ZK), and Trusted Execution Environments (TEE) each solve different problems with different tradeoffs. Choosing wrong doesn't just impact performance—it can fundamentally compromise what you're trying to build.

This guide breaks down when to use each technology, what you're actually trading off, and why the future likely involves all three working together.

The Privacy Technology Landscape in 2026

The blockchain privacy market has evolved from niche experimentation to serious infrastructure. ZK-based rollups now secure over $28 billion in Total Value Locked. The Zero-Knowledge KYC market alone is projected to grow from $83.6 million in 2025 to $903.5 million by 2032—a 40.5% compound annual growth rate.

But market size doesn't help you choose a technology. Understanding what each approach actually does is the starting point.

Zero-Knowledge Proofs: Proving Without Revealing

ZK proofs allow one party to prove a statement is true without revealing any information about the content itself. You can prove you're over 18 without revealing your birthdate, or prove a transaction is valid without exposing the amount.

How it works: The prover generates a cryptographic proof that a computation was performed correctly. The verifier can check this proof quickly without re-running the computation or seeing the underlying data.

The catch: ZK excels at proving things about data you already hold. It struggles with shared state. You can prove your balance is sufficient for a transaction, but you can't easily ask questions like "how many fraud cases happened chain-wide?" or "who won this sealed-bid auction?" without additional infrastructure.

Leading projects: Aztec enables hybrid public/private smart contracts where users choose whether transactions are visible. zkSync focuses primarily on scalability with enterprise-focused "Prividiums" for permissioned privacy. Railgun and Nocturne provide shielded transaction pools.

Fully Homomorphic Encryption: Computing on Encrypted Data

FHE is often called the "holy grail" of encryption because it allows computation on encrypted data without ever decrypting it. The data stays encrypted during processing, and the results remain encrypted—only the authorized party can decrypt the output.

How it works: Mathematical operations are performed directly on ciphertexts. Addition and multiplication on encrypted values produce encrypted results that, when decrypted, match what you'd get from operating on plaintext.

The catch: Computational overhead is massive. Even with recent optimizations, FHE-based smart contracts on Inco Network achieve only 10-30 TPS depending on hardware—orders of magnitude slower than plaintext execution.

Leading projects: Zama provides the foundational infrastructure with FHEVM (their fully homomorphic EVM). Fhenix builds application-layer solutions using Zama's technology, having deployed CoFHE coprocessor on Arbitrum with decryption speeds up to 50x faster than competing approaches.

Trusted Execution Environments: Hardware-Based Isolation

TEEs create secure enclaves within processors where computations occur in isolation. Data inside the enclave remains protected even if the broader system is compromised. Unlike cryptographic approaches, TEEs rely on hardware rather than mathematical complexity.

How it works: Specialized hardware (Intel SGX, AMD SEV) creates isolated memory regions. Code and data inside the enclave are encrypted and inaccessible to the operating system, hypervisor, or other processes—even with root access.

The catch: You're trusting hardware manufacturers. Any single compromised enclave can leak plaintext, regardless of how many nodes participate. In 2022, a critical SGX vulnerability forced coordinated key updates across Secret Network, demonstrating the operational complexity of hardware-dependent security.

Leading projects: Secret Network pioneered private smart contracts using Intel SGX. Oasis Network's Sapphire is the first confidential EVM in production, processing up to 10,000 TPS. Phala Network operates over 1,000 TEE nodes for confidential AI workloads.

The Tradeoff Matrix: Performance, Security, and Trust

Understanding the fundamental tradeoffs helps match technology to use case.

Performance

TechnologyThroughputLatencyCost
TEENear-native (10,000+ TPS)LowLow operational cost
ZKModerate (varies by implementation)Higher (proof generation)Medium
FHELow (10-30 TPS currently)HighVery high operational cost

TEEs win on raw performance because they're essentially running native code in protected memory. ZK introduces proof generation overhead but verification is fast. FHE currently requires intensive computation that limits practical throughput.

Security Model

TechnologyTrust AssumptionPost-QuantumFailure Mode
TEEHardware manufacturerNot resistantSingle enclave compromise exposes all data
ZKCryptographic (often trusted setup)Varies by schemeProof system bugs can be invisible
FHECryptographic (lattice-based)ResistantComputationally intensive to exploit

TEEs require trusting Intel, AMD, or whoever manufactures the hardware—plus trusting that no firmware vulnerabilities exist. ZK systems often require "trusted setup" ceremonies, though newer schemes eliminate this. FHE's lattice-based cryptography is believed quantum-resistant, making it the strongest long-term security bet.

Programmability

TechnologyComposabilityState PrivacyFlexibility
TEEHighFullLimited by hardware availability
ZKLimitedLocal (client-side)High for verification
FHEFullGlobalLimited by performance

ZK excels at local privacy—protecting your inputs—but struggles with shared state across users. FHE maintains full composability because encrypted state can be computed upon by anyone without revealing contents. TEEs offer high programmability but are constrained to environments with compatible hardware.

Choosing the Right Technology: Use Case Analysis

Different applications demand different tradeoffs. Here's how leading projects are making these choices.

DeFi: MEV Protection and Private Trading

Challenge: Front-running and sandwich attacks extract billions from DeFi users by exploiting visible mempools.

FHE solution: Zama's confidential blockchain enables transactions where parameters remain encrypted until block inclusion. Front-running becomes mathematically impossible—there's no visible data to exploit. The December 2025 mainnet launch included the first confidential stablecoin transfer using cUSDT.

TEE solution: Oasis Network's Sapphire enables confidential smart contracts for dark pools and private order matching. Lower latency makes it suitable for high-frequency trading scenarios where FHE's computational overhead is prohibitive.

When to choose: FHE for applications requiring the strongest cryptographic guarantees and global state privacy. TEE when performance requirements exceed what FHE can deliver and hardware trust is acceptable.

Identity and Credentials: Privacy-Preserving KYC

Challenge: Proving identity attributes (age, citizenship, accreditation) without exposing documents.

ZK solution: Zero-knowledge credentials let users prove "KYC passed" without revealing underlying documents. This satisfies compliance requirements while protecting user privacy—a critical balance as regulatory pressure intensifies.

Why ZK wins here: Identity verification is fundamentally about proving statements about personal data. ZK is purpose-built for this: compact proofs that verify without revealing. The verification is fast enough for real-time use.

Confidential AI and Sensitive Computation

Challenge: Processing sensitive data (healthcare, financial models) without exposure to operators.

TEE solution: Phala Network's TEE-based cloud processes LLM queries without platform access to inputs. With GPU TEE support (NVIDIA H100/H200), confidential AI workloads run at practical speeds.

FHE potential: As performance improves, FHE enables computation where even the hardware operator can't access data—removing the trust assumption entirely. Current limitations restrict this to simpler computations.

Hybrid approach: Run initial data processing in TEEs for speed, use FHE for the most sensitive operations, and generate ZK proofs to verify results.

The Vulnerability Reality

Each technology has failed in production—understanding failure modes is essential.

TEE Failures

In 2022, critical SGX vulnerabilities affected multiple blockchain projects. Secret Network, Phala, Crust, and IntegriTEE required coordinated patches. Oasis survived because its core systems run on older SGX v1 (unaffected) and don't rely on enclave secrecy for funds safety.

Lesson: TEE security depends on hardware you don't control. Defense-in-depth (key rotation, threshold cryptography, minimal trust assumptions) is mandatory.

ZK Failures

On April 16, 2025, Solana patched a zero-day vulnerability in its Confidential Transfers feature. The bug could have enabled unlimited token minting. The dangerous aspect of ZK failures: when proofs fail, they fail invisibly. You can't see what shouldn't be there.

Lesson: ZK systems require extensive formal verification and audit. The complexity of proof systems creates attack surface that's difficult to reason about.

FHE Considerations

FHE hasn't experienced major production failures—largely because it's earlier in deployment. The risk profile differs: FHE is computationally intensive to attack, but implementation bugs in complex cryptographic libraries could enable subtle vulnerabilities.

Lesson: Newer technology means less battle-testing. The cryptographic guarantees are strong, but the implementation layer needs continued scrutiny.

Hybrid Architectures: The Future Isn't Either/Or

The most sophisticated privacy systems combine multiple technologies, using each where it excels.

ZK + FHE Integration

User states (balances, preferences) stored with FHE encryption. ZK proofs verify valid state transitions without exposing encrypted values. This enables private execution within scalable L2 environments—combining FHE's global state privacy with ZK's efficient verification.

TEE + ZK Combination

TEEs process sensitive computations at near-native speed. ZK proofs verify that TEE outputs are correct, removing the single-operator trust assumption. If the TEE is compromised, invalid outputs would fail ZK verification.

When to Use What

A practical decision framework:

Choose TEE when:

  • Performance is critical (high-frequency trading, real-time applications)
  • Hardware trust is acceptable for your threat model
  • You need to process large data volumes quickly

Choose ZK when:

  • You're proving statements about client-held data
  • Verification must be fast and low-cost
  • You don't need global state privacy

Choose FHE when:

  • Global state must remain encrypted
  • Post-quantum security is required
  • Computation complexity is acceptable for your use case

Choose hybrid when:

  • Different components have different security requirements
  • You need to balance performance with security guarantees
  • Regulatory compliance requires demonstrable privacy

What Comes Next

Vitalik Buterin recently pushed for standardized "efficiency ratios"—comparing cryptographic computation time to plaintext execution. This reflects the industry's maturation: we're moving from "does it work?" to "how efficiently does it work?"

FHE performance continues improving. Zama's December 2025 mainnet proves production-readiness for simple smart contracts. As hardware acceleration develops (GPU optimization, custom ASICs), the throughput gap with TEEs will narrow.

ZK systems are becoming more expressive. Aztec's Noir language enables complex private logic that would have been impractical years ago. Standards are slowly converging, enabling cross-chain ZK credential verification.

TEE diversity is expanding beyond Intel SGX. AMD SEV, ARM TrustZone, and RISC-V implementations reduce dependency on any single manufacturer. Threshold cryptography across multiple TEE vendors could address the single-point-of-failure concern.

The privacy infrastructure buildout is happening now. For developers building privacy-sensitive applications, the choice isn't about finding the perfect technology—it's about understanding tradeoffs well enough to combine them intelligently.


Building privacy-preserving applications on blockchain? BlockEden.xyz provides high-performance RPC endpoints across 30+ networks, including privacy-focused chains. Explore our API marketplace to access the infrastructure your confidential applications need.

The Blockchain Performance Revolution: How 2025 Redefined Scalability and Fees

· 8 min read
Dora Noda
Software Engineer

What if the blockchain performance debates of 2021-2023 already feel ancient? In 2025, the industry quietly crossed a threshold that venture capitalists and skeptics alike thought was years away: multiple mainnets now routinely process thousands of transactions per second while keeping fees below a single cent. The era of "blockchain can't scale" has officially ended.

This isn't about theoretical benchmarks or testnet claims. Real users, real applications, and real money are flowing through networks that would have been science fiction just two years ago. Let's examine the hard numbers behind blockchain's performance revolution.

The New TPS Leaders: No Longer a Two-Horse Race

The performance landscape has fundamentally shifted. While Bitcoin and Ethereum dominated blockchain conversations for years, 2025 established a new generation of speed champions.

Solana set the headline-grabbing record on August 17, 2025, processing 107,664 transactions per second on its mainnet—not in a laboratory, but under real-world conditions. This wasn't a one-off spike; the network demonstrated sustained high throughput that validates years of architectural decisions prioritizing performance.

But Solana's achievement is just one data point in a broader revolution:

  • Aptos has demonstrated 13,367 TPS on mainnet without failures, delays, or gas fee spikes. Their Block-STM parallel execution engine theoretically supports up to 160,000 TPS.
  • Sui has proven 297,000 TPS in controlled testing, with mainnet peaks reaching 822 TPS under typical usage and the Mysticeti v2 consensus achieving just 390ms latency.
  • BNB Chain consistently delivers around 2,200 TPS in production, with the Lorentz and Maxwell hard forks delivering 4x faster block times.
  • Avalanche processes 4,500 TPS through its unique subnet architecture, enabling horizontal scaling across specialized chains.

These numbers represent a 10x to 100x improvement over what the same networks achieved in 2023. More importantly, they're not theoretical maximums—they're observed, verifiable performance under actual usage conditions.

Firedancer: The Million-TPS Client That Changed Everything

The most significant technical breakthrough of 2025 wasn't a new blockchain—it was Firedancer, Jump Crypto's complete reimplementation of the Solana validator client. After three years of development, Firedancer went live on mainnet on December 12, 2025.

The numbers are staggering. In demonstrations at Breakpoint 2024, Jump's Chief Scientist Kevin Bowers showed Firedancer processing over 1 million transactions per second on commodity hardware. Benchmarks consistently showed 600,000 to 1,000,000 TPS in controlled tests—20x higher than the previous Agave client's demonstrated throughput.

What makes Firedancer different? Architecture. Unlike Agave's monolithic design, Firedancer uses a modular, tile-based architecture that splits validator tasks to run in parallel. Written in C rather than Rust, every component was optimized for raw performance from the ground up.

The adoption trajectory tells its own story. Frankendancer, a hybrid implementation combining Firedancer's networking stack with Agave's runtime, now runs on 207 validators representing 20.9% of all staked SOL—up from just 8% in June 2025. This isn't experimental software anymore; it's infrastructure that secures billions of dollars.

Solana's Alpenglow upgrade in September 2025 added another layer, replacing the original Proof of History and TowerBFT mechanisms with new Votor and Rotor systems. The result: 150ms block finality and support for multiple concurrent leaders enabling parallel execution.

Sub-Penny Fees: EIP-4844's Quiet Revolution

While TPS numbers grab headlines, the fee revolution is equally transformative. Ethereum's EIP-4844 upgrade in March 2024 fundamentally restructured how Layer 2 networks pay for data availability, and by 2025, the effects became impossible to ignore.

The mechanism is elegant: blob transactions provide temporary data storage for rollups at a fraction of previous costs. Where Layer 2s previously competed for expensive calldata space, blobs offer 18-day temporary storage that rollups actually need.

The impact on fees was immediate and dramatic:

  • Arbitrum fees dropped from $0.37 to $0.012 per transaction
  • Optimism fell from $0.32 to $0.009
  • Base achieved fees as low as $0.01

These aren't promotional rates or subsidized transactions—they're sustainable operating costs enabled by architectural improvement. Ethereum now effectively provides 10-100x cheaper data storage for Layer 2 solutions.

The activity surge followed predictably. Base saw a 319.3% increase in daily transactions post-upgrade, Arbitrum increased 45.7%, and Optimism rose 29.8%. Users and developers responded exactly as economics predicted: when transactions become cheap enough, usage explodes.

The May 2025 Pectra upgrade pushed further, expanding blob throughput from 6 to 9 blobs per block and raising the gas limit to 37.3 million. Ethereum's effective TPS through Layer 2s now exceeds 100,000, with average transaction costs dropping to $0.08 on L2 networks.

The Real-World Performance Gap

Here's what the benchmarks don't tell you: theoretical TPS and observed TPS remain very different numbers. This gap reveals important truths about blockchain maturity.

Consider Avalanche. While the network supports 4,500 TPS theoretically, observed activity averages around 18 TPS, with the C-Chain closer to 3-4 TPS. Sui demonstrates 297,000 TPS in testing but peaks at 822 TPS on mainnet.

This isn't failure—it's proof of headroom. These networks can handle massive demand spikes without degradation. When the next NFT frenzy or DeFi summer arrives, the infrastructure won't buckle.

The practical implications matter enormously for builders:

  • Gaming applications need consistent low latency more than peak TPS
  • DeFi protocols require predictable fees during volatility
  • Payment systems demand reliable throughput during holiday shopping spikes
  • Enterprise applications need guaranteed SLAs regardless of network conditions

Networks with significant headroom can offer these guarantees. Those operating near capacity cannot.

Move VM Chains: The Performance Architecture Advantage

A pattern emerges when examining 2025's top performers: the Move programming language shows up repeatedly. Both Sui and Aptos, built by teams with Facebook/Diem heritage, leverage Move's object-centric data model for parallelization advantages impossible in account-model blockchains.

Aptos's Block-STM engine demonstrates this clearly. By processing transactions simultaneously rather than sequentially, the network achieved 326 million successful transactions in a single day during peak periods—while maintaining approximately $0.002 average fees.

Sui's approach differs but follows similar principles. The Mysticeti consensus protocol achieves 390ms latency by treating objects rather than accounts as the fundamental unit. Transactions that don't touch the same objects execute in parallel automatically.

Both networks attracted significant capital in 2025. BlackRock's BUIDL fund added $500 million in tokenized assets to Aptos in October, making it the second-largest BUIDL chain. Aptos also powered the official digital wallet for Expo 2025 in Osaka, processing 558,000+ transactions and onboarding 133,000+ users—real-world validation at scale.

What High TPS Actually Enables

Beyond bragging rights, what do thousands of TPS unlock?

Institutional-grade settlement: When processing 2,000+ TPS with sub-second finality, blockchains compete directly with traditional payment rails. BNB Chain's Lorentz and Maxwell upgrades specifically targeted "Nasdaq-scale settlement" for institutional DeFi.

Microtransaction viability: At $0.01 per transaction, business models impossible at $5 fees become profitable. Streaming payments, per-API-call billing, and granular royalty distribution all require sub-penny economics.

Game state synchronization: Blockchain gaming requires updating player states hundreds of times per session. 2025's performance levels finally enable genuine on-chain gaming rather than the settlement-only models of previous years.

IoT and sensor networks: When devices can transact for fractions of a cent, supply chain tracking, environmental monitoring, and machine-to-machine payments become economically viable.

The common thread: 2025's performance improvements didn't just make existing applications faster—they enabled entirely new categories of blockchain usage.

The Decentralization Trade-off Debate

Critics correctly note that raw TPS often correlates with reduced decentralization. Solana runs fewer validators than Ethereum. Aptos and Sui require more expensive hardware. These trade-offs are real.

But 2025 also demonstrated that the binary choice between speed and decentralization is false. Ethereum's Layer 2 ecosystem delivers 100,000+ effective TPS while inheriting Ethereum's security guarantees. Firedancer improves Solana's throughput without reducing validator counts.

The industry is learning to specialize: settlement layers optimize for security, execution layers optimize for speed, and proper bridging connects them. This modular approach—data availability from Celestia, execution from rollups, settlement on Ethereum—achieves speed, security, and decentralization through composition rather than compromise.

Looking Forward: The Million-TPS Mainnet

If 2025 established high-TPS mainnets as reality rather than promise, what comes next?

Ethereum's Fusaka upgrade will introduce full danksharding via PeerDAS, potentially enabling millions of TPS across rollups. Firedancer's production deployment should push Solana toward its tested 1 million TPS capacity. New entrants continue emerging with novel architectures.

More importantly, the developer experience has matured. Building applications that require thousands of TPS is no longer a research project—it's standard practice. The tooling, documentation, and infrastructure supporting high-performance blockchain development in 2025 would be unrecognizable to a 2021 developer.

The question is no longer whether blockchain can scale. The question is what we'll build now that it has.


BlockEden.xyz provides enterprise-grade RPC and API access for high-performance chains including Sui, Aptos, and Solana. When your application demands the throughput and reliability that 2025's performance revolution enables, explore our infrastructure designed for production-grade blockchain development.

PeerDAS Explained: How Ethereum Verifies Data Without Downloading Everything

· 9 min read
Dora Noda
Software Engineer

What if you could verify a 500-page book exists without reading a single page? That's essentially what Ethereum just learned to do with PeerDAS—and it's quietly reshaping how blockchains can scale without sacrificing decentralization.

On December 3, 2025, Ethereum activated its Fusaka upgrade, introducing PeerDAS (Peer Data Availability Sampling) as the headline feature. While most headlines focused on the 40-60% fee reductions for Layer 2 networks, the underlying mechanism represents something far more significant: a fundamental shift in how blockchain nodes prove data exists without actually storing all of it.

Pharos Network: How Ant Group Veterans Are Building the 'GPU of Blockchains' for a $10 Trillion RWA Market

· 8 min read
Dora Noda
Software Engineer

When the former CTO of Ant Chain and the Chief Security Officer of Ant Financial's Web3 division left one of the world's largest fintech companies to start a blockchain from scratch, the industry took notice. Their bet? That the $24 billion tokenized real-world asset market is about to explode into the trillions—and existing blockchains aren't ready for it.

Pharos Network, the high-performance Layer 1 they're building, just closed an $8 million seed round led by Lightspeed Faction and Hack VC. But the more interesting number is the $1.5 billion RWA pipeline they've announced with Ant Digital Technologies, their former employer's Web3 arm. This isn't a speculative DeFi play—it's an institutional-grade infrastructure bet backed by people who've already built financial systems processing billions of transactions.

The Ant Group DNA: Building for Scale They've Already Seen

Alex Zhang, Pharos's CEO, spent years as CTO of Ant Chain, overseeing blockchain infrastructure that processed transactions for hundreds of millions of users across Alibaba's ecosystem. Co-founder and CTO Meng Wu was responsible for security at Ant Financial's Web3 division, protecting some of the most valuable financial infrastructure in Asia.

Their diagnosis of the current blockchain landscape is blunt: existing networks weren't designed for the financial industry's actual requirements. Solana optimizes for speed but lacks the compliance primitives institutions need. Ethereum prioritizes decentralization but can't deliver the sub-second finality that real-time payments demand. The "institutional Solana" doesn't exist yet.

Pharos aims to fill that gap with what they call a "full-stack parallel blockchain"—a network designed from the ground up for the specific demands of tokenized assets, cross-border payments, and enterprise DeFi.

The Technical Architecture: Beyond Sequential Processing

Most blockchains process transactions sequentially, like a single-file line at a bank. Even Ethereum's recent upgrades and Solana's parallel processing treat the blockchain as a unified system with fundamental throughput limits. Pharos takes a different approach, implementing what they call "Degree of Parallelism" optimization—essentially treating the blockchain like a GPU rather than a CPU.

The Three-Layer Design:

  • L1-Base: Provides data availability with hardware acceleration, handling the raw storage and retrieval of blockchain data at speeds traditional networks can't match.

  • L1-Core: Implements a novel BFT consensus that allows multiple validator nodes to propose, validate, and commit transactions concurrently. Unlike classical BFT implementations requiring fixed leader roles and round-based communication, Pharos validators operate in parallel.

  • L1-Extension: Enables "Special Processing Networks" (SPNs)—customized execution environments for specific use cases like high-frequency trading or AI model execution. Think of it as creating dedicated fast lanes for different types of financial activity.

The Execution Engine:

The heart of Pharos is its parallel execution system combining LLVM-based intermediate representation conversion with speculative parallel processing. The technical innovations include:

  • Smart Access List Inference (SALI): Static and dynamic analysis to identify which state entries a contract will access, enabling transactions with non-overlapping state to execute simultaneously.

  • Dual VM Support: Both EVM and WASM virtual machines, ensuring Solidity compatibility while enabling high-performance execution for contracts written in Rust or other languages.

  • Pipelined Block Processing: Inspired by superscalar processors, dividing the block lifecycle into parallel stages—consensus ordering, database preloading, execution, Merkleization, and flushing all happen concurrently.

The result? Their testnet has demonstrated 30,000+ TPS with 0.5-second block times, with mainnet targets of 50,000 TPS and sub-second finality. For context, Visa processes roughly 1,700 TPS on average.

Why RWA Tokenization Needs Different Infrastructure

The tokenized real-world asset market has grown from $85 million in 2020 to over $24 billion by mid-2025—a 245x increase in just five years. McKinsey projects $2 trillion by 2030; Standard Chartered estimates $30 trillion by 2034. Some analysts expect $50 trillion in annual RWA trading by decade's end.

But here's the disconnect: most of this growth has happened on chains that weren't designed for it. Private credit dominates the current market at $17 billion, followed by U.S. Treasuries at $7.3 billion. These aren't speculative tokens—they're regulated financial instruments requiring:

  • Identity verification that satisfies KYC/AML requirements across jurisdictions
  • Compliance primitives built into the protocol layer, not bolted on afterward
  • Sub-second settlement for real-time payment applications
  • Institutional-grade security with formal verification and hardware-backed protection

Pharos addresses these requirements with native zkDID authentication and on-chain/off-chain credit systems. When they talk about "bridging TradFi and Web3," they mean building the compliance rails into the infrastructure itself.

The Ant Digital Partnership: $1.5 Billion in Real Assets

The strategic partnership with ZAN—Ant Digital Technologies' Web3 brand—isn't just a press release. It represents a $1.5 billion pipeline of renewable energy RWA assets slated for the Pharos mainnet at launch.

The collaboration focuses on three areas:

  1. Node services and infrastructure: ZAN's enterprise-grade node operations supporting Pharos's validator network
  2. Security and hardware acceleration: Leveraging Ant's experience with hardware-secured financial systems
  3. RWA use case development: Bringing actual tokenized assets—not hypothetical ones—to the network from day one

The Pharos team has prior experience implementing tokenization projects including Xiexin Energy Technology and Langxin Group. They're not learning RWA tokenization on Pharos—they're applying expertise developed inside one of the world's largest fintech ecosystems.

From Testnet to Mainnet: The Q1 2026 Launch

Pharos launched its AtlanticOcean testnet with impressive metrics: nearly 3 billion transactions across 23 million blocks since May, all with 0.5-second block times. The testnet introduced:

  • Hybrid parallel execution based on DAG and Block-STM V1
  • Official PoS tokenomics with a 1 billion token supply
  • Modular architecture decoupling consensus, execution, and storage layers
  • Integration with major wallets including OKX Wallet and Bitget Wallet

Mainnet is scheduled for Q1 2026, coinciding with the Token Generation Event. The foundation charter will be released after TGE, establishing the governance framework for what aims to be a truly decentralized network despite its institutional focus.

The project has attracted over 1.4 million testnet users—a significant community for a pre-mainnet network, suggesting strong interest in the RWA-focused narrative.

The Competitive Landscape: Where Does Pharos Fit?

The RWA tokenization space is getting crowded. Provenance leads with over $12 billion in assets. Ethereum hosts major issuers like BlackRock and Ondo. Canton Network—backed by Goldman Sachs, BNP Paribas, and DTCC—processes over $4 trillion in tokenized transactions monthly.

Pharos's positioning is distinct:

  • Versus Canton: Canton is permissioned; Pharos aims for trustless decentralization with compliance primitives
  • Versus Ethereum: Pharos offers 50x the throughput with native RWA infrastructure
  • Versus Solana: Pharos prioritizes institutional compliance over raw DeFi throughput
  • Versus Plume Network: Both target RWA, but Pharos brings Ant Group's enterprise DNA and existing asset pipeline

The Ant Group pedigree matters here. Building financial infrastructure isn't just about technical architecture—it's about understanding regulatory requirements, institutional risk management, and the actual workflows of financial services. The Pharos team has built these systems at scale.

What This Means for the RWA Narrative

The RWA tokenization thesis is straightforward: most of the world's value exists in illiquid assets that could benefit from blockchain's settlement efficiency, programmability, and global accessibility. Real estate, private credit, commodities, infrastructure—these markets dwarf cryptocurrency's entire market cap.

But the infrastructure gap has been real. Tokenizing a Treasury bill on Ethereum works; tokenizing $300 million in renewable energy assets requires compliance rails, institutional-grade security, and throughput that doesn't collapse under real-world transaction volumes.

Pharos represents a new category of blockchain: not a general-purpose smart contract platform optimizing for DeFi composability, but a specialized financial infrastructure layer designed for the specific requirements of tokenized real-world assets.

Whether they succeed depends on execution—literally. Can they deliver 50,000 TPS at mainnet? Will institutions actually deploy assets on the network? Does the compliance framework satisfy regulators across jurisdictions?

The answers will emerge through 2026. But with $8 million in funding, $1.5 billion in announced asset pipeline, and a team that's already built financial systems at Ant Group scale, Pharos has the resources and credibility to find out.


BlockEden.xyz provides enterprise-grade blockchain infrastructure for the next generation of Web3 applications. As RWA tokenization transforms global finance, reliable node services and API access become critical infrastructure. Explore our API marketplace to build on foundations designed for institutional-grade applications.

Polkadot's JAM: Redefining Blockchain Architecture with RISC-V

· 9 min read
Dora Noda
Software Engineer

In April 2025, Vitalik Buterin proposed something that would have seemed heretical a year earlier: replacing Ethereum's EVM with RISC-V. The suggestion sparked immediate debate. But what most commentators missed was that Polkadot had already been building exactly this architecture for over a year—and was months away from deploying it to production.

Polkadot's JAM (Join-Accumulate Machine) isn't just another blockchain upgrade. It represents a fundamental rethinking of what a "blockchain" even means. Where Ethereum's worldview centers on a global virtual machine processing transactions, JAM eliminates the transaction concept entirely at its core layer, replacing it with a computation model that promises 850 MB/s data availability—42 times Polkadot's previous capacity and 650 times Ethereum's 1.3 MB/s.

The implications extend far beyond performance benchmarks. JAM may be the clearest articulation yet of a post-Ethereum paradigm for blockchain architecture.

The Gray Paper: Gavin Wood's Third Act

Dr. Gavin Wood wrote the Ethereum Yellow Paper in 2014, providing the formal specification that made Ethereum possible. He followed with the Polkadot White Paper in 2016, introducing heterogeneous sharding and shared security. In April 2024, he released the JAM Gray Paper at Token2049 in Dubai—completing a trilogy that spans the entire history of programmable blockchains.

The Gray Paper describes JAM as "a global singleton permissionless object environment—akin to Ethereum's smart-contract environment—paired with secure sideband computation parallelized over a scalable node network." But this undersells the conceptual shift.

JAM doesn't just improve on existing blockchain designs. It asks: what if we stopped thinking about blockchains as virtual machines entirely?

The Transaction Problem

Traditional blockchains—Ethereum included—are fundamentally transaction-processing systems. Users submit transactions, validators order and execute them, and the blockchain records state changes. This model has served well but carries inherent limitations:

  • Sequential bottlenecks: Transactions must be ordered, creating throughput constraints
  • Global state contention: Every transaction potentially touches shared state
  • Execution coupling: Consensus and computation are tightly bound

JAM decouples these concerns through what Wood calls the "Refine-Accumulate" paradigm. The system operates in two phases:

Refine: Computation happens in parallel across the network. Work is divided into independent units that can execute simultaneously without coordination.

Accumulate: Results are collected and merged into global state. Only this phase requires consensus on ordering.

The result is a "transactionless" core protocol. JAM itself doesn't process transactions—applications built on JAM do. This separation allows the base layer to focus purely on secure, parallel computation.

PolkaVM: Why RISC-V Matters

At the heart of JAM sits PolkaVM, a purpose-built virtual machine based on the RISC-V instruction set. This choice has profound implications for blockchain computation.

The EVM's Architectural Debt

Ethereum's EVM was designed in 2013-2014, before many modern assumptions about blockchain execution were understood. Its architecture reflects that era:

  • Stack-based execution: Operations push and pop values from an unbounded stack, requiring complex tracking
  • 256-bit word size: Chosen for cryptographic convenience but wasteful for most operations
  • Single-dimensional gas: One metric attempts to price vastly different computational resources
  • Interpretation-only: EVM bytecode cannot be compiled to native code efficiently

These design decisions made sense as initial choices but create ongoing performance penalties.

RISC-V's Advantages

PolkaVM takes a fundamentally different approach:

Register-based architecture: Like modern CPUs, PolkaVM uses a finite set of registers for argument passing. This aligns with actual hardware, enabling efficient translation to native instruction sets.

64-bit word size: Modern processors are 64-bit. Using a matching word size eliminates the overhead of emulating 256-bit operations for the vast majority of computations.

Multi-dimensional gas: Different resources (computation, storage, bandwidth) are priced independently, better reflecting true costs and preventing mispricing attacks.

Dual execution modes: Code can be interpreted for immediate execution or JIT-compiled for optimized performance. The system chooses the appropriate mode based on workload characteristics.

Performance Impact

The architectural differences translate to real performance gains. Benchmarks show PolkaVM achieving 10x+ improvements over WebAssembly for arithmetic-intensive contracts—and the EVM is slower still. For complex, multi-contract interactions, the gap widens further as JIT compilation amortizes setup costs.

Perhaps more importantly, PolkaVM supports any language that compiles to RISC-V. While EVM developers are limited to Solidity, Vyper, and a handful of specialized languages, PolkaVM opens the door to Rust, C++, and eventually any LLVM-supported language. This dramatically expands the potential developer pool.

Maintaining Developer Experience

Despite the architectural overhaul, PolkaVM maintains compatibility with existing workflows. The Revive compiler provides complete Solidity support, including inline assembler. Developers can continue using Hardhat, Remix, and MetaMask without changing their processes.

The Papermoon team demonstrated this compatibility by successfully migrating Uniswap V2's contract code to the PolkaVM testnet—proving that even complex, battle-tested DeFi code can transition without rewrites.

JAM's Performance Targets

The numbers Wood projects for JAM are staggering by current blockchain standards.

Data Availability

JAM targets 850 MB/s of data availability—roughly 42 times the vanilla Polkadot capacity before recent optimizations and 650 times Ethereum's 1.3 MB/s. For context, this approaches the throughput of enterprise database systems.

Computational Throughput

The Gray Paper estimates JAM can achieve approximately 150 billion gas per second at full capacity. Translating gas to transactions is imprecise, but theoretical maximum throughput reaches 3.4+ million TPS based on the data availability target.

Real-World Validation

These aren't purely theoretical numbers. Stress tests have validated the architecture:

  • Kusama (August 2025): Achieved 143,000 TPS at only 23% load capacity
  • Polkadot "Spammening" (2024): Reached 623,000 TPS in controlled testing

These figures represent genuine transaction throughput, not optimistic projections or testnet conditions that don't reflect production environments.

Development Status and Timeline

JAM development follows a structured milestone system, with 43 implementation teams competing for a prize pool exceeding $60 million (10 million DOT + 100,000 KSM).

Current Progress (Late 2025)

The ecosystem has reached several critical milestones:

  • Multiple teams have achieved 100% conformance with Web3 Foundation test vectors
  • Development has progressed through Gray Paper versions 0.6.2 through 0.8.0, approaching v1.0
  • The JAM Experience conference in Lisbon (May 2025) brought together implementation teams for deep technical collaboration
  • University tours reached over 1,300 attendees across nine global locations, including Cambridge, Peking University, and Fudan University

Milestone Structure

Teams progress through a series of milestones:

  1. IMPORTER (M1): Passing state-transitioning conformance tests and importing blocks
  2. AUTHORER (M2): Full conformance including block production, networking, and off-chain components
  3. HALF-SPEED (M3): Achieving Kusama-level performance, with access to JAM Toaster for full-scale testing
  4. FULL-SPEED (M4): Polkadot mainnet-level performance with professional security audits

Multiple teams have completed M1, with several progressing toward M2.

Timeline to Mainnet

  • Late 2025: Final Gray Paper revisions, continued milestone submissions, expanded testnet participation
  • Q1 2026: JAM mainnet upgrade on Polkadot following governance approval via OpenGov referendum
  • 2026: CoreChain Phase 1 deployment, official public JAM testnet, full network transition

The governance process has already shown strong community support. A near-unanimous DOT holder vote approved the upgrade direction in May 2024.

JAM vs. Ethereum: Complementary or Competitive?

The question of whether JAM represents an "Ethereum killer" misses the architectural nuance.

Different Design Philosophies

Ethereum builds outward from a monolithic foundation. The EVM provides a global execution environment, and scaling solutions—L2s, rollups, sharding—layer on top. This approach has created an enormous ecosystem but also accumulated technical debt.

JAM starts with modularity at its core. The separation of Refine and Accumulate phases, the domain-specific optimization for rollup handling, and the transactionless base layer all reflect a ground-up design for scalability.

Convergent Technical Choices

Despite different starting points, the projects are converging on similar conclusions. Vitalik's April 2025 RISC-V proposal acknowledged that the EVM's architecture limits long-term performance. Polkadot had already deployed RISC-V support to testnet months earlier.

This convergence validates both projects' technical judgment while highlighting the execution gap: Polkadot is shipping what Ethereum is proposing.

Ecosystem Realities

Technical superiority doesn't automatically translate to ecosystem dominance. Ethereum's developer community, application diversity, and liquidity depth represent substantial network effects that can't be replicated overnight.

The more likely outcome isn't replacement but specialization. JAM's architecture is optimized for certain workloads—particularly high-throughput applications and rollup infrastructure—while Ethereum retains advantages in ecosystem maturity and capital formation.

In 2026, they look less like competitors and more like complementary layers of a multi-chain internet.

What JAM Means for Blockchain Architecture

JAM's significance extends beyond Polkadot. It represents the clearest articulation of a post-EVM paradigm that other projects will study and selectively adopt.

Key Principles

Computation separation: Decoupling execution from consensus enables parallel processing at the base layer, not as an afterthought.

Domain-specific optimization: Rather than building a general-purpose VM and hoping it scales, JAM is architected specifically for the workloads blockchains actually run.

Hardware alignment: Using RISC-V and 64-bit words aligns virtual machine architecture with physical hardware, eliminating emulation overhead.

Transaction abstraction: Moving transaction handling to the application layer allows the protocol to focus on computation and state management.

Industry Impact

Whether JAM succeeds or fails commercially, these architectural choices will influence blockchain design for the next decade. The Gray Paper provides a formal specification that other projects can study, critique, and selectively implement.

Ethereum's RISC-V proposal already demonstrates this influence. The question isn't whether these ideas will spread, but how quickly and in what form.

The Road Ahead

JAM represents Gavin Wood's most ambitious technical vision since Polkadot itself. The stakes match the ambition: success would validate an entirely different approach to blockchain architecture, while failure would leave Polkadot competing with newer L1s without a differentiated technical narrative.

The next 18 months will determine whether JAM's theoretical advantages translate to production reality. With 43 implementation teams, a nine-figure prize pool, and a clear roadmap to mainnet, the project has resources and momentum. What remains to be seen is whether the complexity of the Refine-Accumulate paradigm can deliver on Wood's vision of a "distributed computer that can run almost any kind of task."

For developers and projects evaluating blockchain infrastructure, JAM merits serious attention—not as hype, but as a technically rigorous attempt to solve problems that every major blockchain faces. The blockchain-as-virtual-machine paradigm served the industry well for a decade. JAM bets that the next decade requires something fundamentally different.


Building on next-generation blockchain infrastructure? BlockEden.xyz provides high-performance RPC endpoints across the Polkadot ecosystem and 30+ other networks. Explore our API marketplace to access enterprise-grade infrastructure for your applications.

The Rise of Regional Payment Networks: How Stablecoins Outpaced Visa and Mastercard

· 11 min read
Dora Noda
Software Engineer

When stablecoin transfers quietly processed $27.6 trillion in 2024—outpacing Visa and Mastercard's combined volume by nearly 8%—most headlines missed the real story. The shift wasn't happening in Silicon Valley board rooms or Wall Street trading desks. It was unfolding across QR-code-enabled street vendors in Lagos, mobile money kiosks in Nairobi, and scan-to-pay terminals throughout Southeast Asia.

Welcome to the age of regional payment networks, where a constellation of focused players is systematically dismantling the assumption that global payments require global companies.

The $27 Trillion Signal

For decades, cross-border payments have been the exclusive domain of a few giants. Visa processes transactions in over 200 countries. Mastercard serves 150 million merchants globally. PayPal's network spans 200 markets. These numbers seemed insurmountable—until they weren't.

According to CEX.IO research, USD-backed stablecoins outperformed Visa and Mastercard in all four quarters of 2024 and continued their dominance into Q1 2025. But the more interesting finding isn't the volume—it's where the volume is coming from.

The Chainalysis 2024 Global Adoption Index reveals that Central and Southern Asia and Oceania (CSAO) leads global cryptocurrency adoption, with seven of the top 20 countries located in the region. Sub-Saharan Africa saw "significant" DeFi growth, with South Africa emerging as a major hub for retail crypto payments.

This isn't random. It's the result of regional networks building infrastructure that actually fits local needs.

AEON: 50 Million Merchants in 18 Months

Consider AEON, a payment network that most Western observers have never heard of. Within 18 months of launch, AEON has connected over 50 million merchants across emerging markets, primarily in Southeast Asia, Africa, and Latin America.

The numbers tell a compelling story:

  • 20+ million merchants acquired within four months of launch
  • 994,000+ transactions processed worth over $29 million in early volume
  • 200,000+ active users leveraging scan-to-pay functionality

AEON's approach sidesteps the traditional card network model entirely. Rather than requiring POS terminal upgrades or merchant agreements through acquiring banks, AEON enables payments via QR codes—the same interface that already dominates payments across Asia. In December 2025, AEON integrated with X Layer, OKX's Ethereum Layer 2, bringing scan-to-pay capability directly to the network's merchant base.

The network's 2026 roadmap is even more ambitious: establishing industry standards for AI agent payments with "Know Your Agent" authentication frameworks that could make AEON the default settlement layer for autonomous commerce.

Gnosis Pay: Self-Custody Meets Visa Rails

While AEON is building parallel infrastructure, Gnosis Pay is taking a different approach: leveraging existing rails while preserving crypto's core value proposition.

The Gnosis Pay Visa debit card launched across Europe in February 2024 with a unique selling point—it's genuinely self-custodial. Unlike virtually every other crypto card, which requires depositing funds into a custodial account, Gnosis Pay users maintain control of their private keys. Funds stay in a Safe wallet on Gnosis Chain until the moment of purchase.

The economics are equally distinctive:

  • Zero transaction fees at any of Visa's 80+ million global merchants
  • Zero foreign exchange fees for international purchases
  • Zero off-ramping fees that typically drain 1-3% of every transaction

For European users, Gnosis Pay provides an Estonia IBAN through a partnership with Monerium, enabling SEPA transfers and salary deposits. It's effectively a traditional bank account backed by self-custodial crypto.

The tiered cashback system—ranging from 1% to 5% based on GNO token holdings—creates alignment between users and the network. But the real innovation is proving that card networks and self-custody aren't mutually exclusive. Gnosis Pay has demonstrated that crypto payments can integrate with existing infrastructure without sacrificing the properties that make crypto valuable.

Geographic expansion plans for 2026 include the USA, Mexico, Colombia, Australia, Singapore, Thailand, Japan, Indonesia, and India—essentially, the same emerging markets where AEON is building alternative rails.

M-Pesa: 60 Million Users Go On-Chain

If AEON represents new entrants and Gnosis Pay represents crypto-native innovation, M-Pesa represents something potentially more significant: incumbent adoption.

In January 2026, M-Pesa—Africa's dominant mobile money platform with over 60 million monthly users—announced a partnership with the ADI Foundation to deploy blockchain infrastructure across eight African countries: Kenya, the DRC, Egypt, Ethiopia, Ghana, Lesotho, Mozambique, and Tanzania.

The timing aligns with Kenya's Virtual Asset Service Providers Act, which took effect in November 2025 as Africa's most comprehensive cryptocurrency regulatory framework. The partnership will introduce a UAE Dirham-backed stablecoin—issued by First Abu Dhabi Bank under UAE Central Bank oversight—providing users with a hedge against local currency volatility.

The opportunity is substantial. Kenya alone processed $3.3 billion in stablecoin transactions in the year to June 2024, ranking fourth among African nations. The cryptocurrency market across sub-Saharan Africa grew 52% year-over-year, reaching over $205 billion between July 2024 and June 2025.

But volume tells only part of the story. The more compelling statistic: 42% of adults in sub-Saharan Africa remain unbanked. M-Pesa's blockchain integration isn't disrupting financial services—it's providing them for the first time to populations that traditional banks have systematically ignored.

The Cost Arbitrage

Why are regional networks succeeding where global players have struggled for decades? The answer comes down to economics that make global payment giants structurally uncompetitive for cross-border transfers.

Traditional remittance costs:

  • Sub-Saharan Africa average: 8.78% of transaction value (Q1 2025, World Bank)
  • Global average: 6%+ for cross-border transfers
  • Bank wire processing time: 3-5 business days

Stablecoin transfer costs:

For a $200 remittance to Kenya, the math is stark: a traditional transfer might cost $17.56 in fees; a stablecoin transfer costs roughly $1-2. When global remittances exceed $800 billion annually, that cost difference represents tens of billions in potential savings—money that currently flows to intermediaries rather than recipients.

Regional networks are capturing this arbitrage because they're built for it. They don't carry the legacy infrastructure costs of correspondent banking relationships or the compliance overhead of operating in 200 markets simultaneously.

The B2B Explosion

Consumer payments get the headlines, but the faster-growing segment is B2B. Monthly B2B stablecoin payment volumes surged from under $100 million in early 2023 to over $3 billion by 2025—a 30-fold increase in two years.

Companies across Latin America, Africa, and Southeast Asia are increasingly using stablecoins for global payroll, supplier payments, and FX optimization. Bitso, the Latin American crypto platform, has reported significant B2B flows driven entirely by stablecoin settlement.

Analysis of 31 stablecoin payment companies shows that over $94.2 billion in payments were settled from January 2023 to February 2025. These aren't speculative transactions—they're ordinary business payments operating outside traditional banking rails.

The appeal is straightforward: businesses in emerging markets often face unreliable correspondent banking relationships, multi-day settlement times, and opaque fees. Stablecoins provide immediate finality and predictable costs, regardless of which countries are involved in the transaction.

How Traditional Giants Are Responding

Visa and Mastercard aren't ignoring the threat. Mastercard partnered with MoonPay to enable stablecoin payments across 150 million merchants. Visa is piloting stablecoin services in six Latin American countries and supports over 130 stablecoin-linked card programs in more than 40 countries.

But their response reveals the structural challenge. Traditional networks are adding crypto as an optional overlay to existing infrastructure. Regional networks are building crypto-native infrastructure from the ground up.

The distinction matters. When Gnosis Pay offers zero fees, it's because the underlying Gnosis Chain was designed for efficient settlement. When Visa offers stablecoin support, it's routing through the same correspondent banking system that makes traditional transfers expensive. The infrastructure dictates the economics.

2026: The Year of Convergence

Several trends are converging to accelerate regional network adoption:

Regulatory clarity: Kenya's VASP Act, the EU's MiCA framework, and Brazil's stablecoin regulations are creating compliance pathways that were absent even 18 months ago.

Infrastructure maturity: Southeast Asia's digital payments market is projected to hit $3 trillion by end of 2025, expanding at 18% annually. That's infrastructure regional crypto networks can leverage rather than build from scratch.

Mobile penetration: Africa's mobile money ecosystem reached 562 million users in 2025, handling $495 billion in yearly transactions. Every smartphone becomes a potential crypto payment terminal.

User volume: Over 560 million people worldwide hold cryptocurrency as of early 2025, with growth concentrated in the same regions where traditional banking fails.

The first wave of stablecoin infrastructure scaling will really happen in 2026, according to AArete's global head of financial services consulting. Crypto payment adoption is projected to grow 85% through 2026, fueled by regulatory support and scalable infrastructure.

The Localization Advantage

Perhaps the most underappreciated advantage regional networks hold is localization—not just in language, but in payment behavior.

QR codes dominate payments across Asia for cultural and practical reasons that differ from the card-centric West. M-Pesa's agent network model works in Africa because it mirrors existing informal economy structures. Latin America's preference for bank transfers over cards reflects decades of credit card fraud concerns.

Regional networks understand these nuances because they're built by teams embedded in local markets. AEON's founders understand Southeast Asian payment behavior. Gnosis Pay's team understands European regulatory requirements. M-Pesa's operators have 15 years of experience in African mobile money.

Global networks, by contrast, optimize for the average case. They provide the same POS terminals to Lagos as they do to London, the same onboarding flows to Jakarta as to New York. The result is infrastructure that works acceptably everywhere but optimally nowhere.

What This Means for the Future

The implications extend beyond payments. Regional networks are proving that critical financial infrastructure doesn't require global scale to be valuable—it requires local fit.

This suggests a future where payments fragment into regional networks connected by interoperability protocols, rather than consolidating under a few global providers. It's a model that more closely resembles the internet—multiple networks connected by common standards—than the current credit card duopoly.

For emerging market populations, this shift represents something more significant: the first credible alternative to financial systems that have extracted fees while providing minimal service for decades.

For traditional payment giants, it represents an existential strategic question: can they adapt their infrastructure quickly enough, or will regional networks capture the next billion payment users before they can respond?

The next 24 months will provide the answer.


For builders developing in the Web3 payments space, robust infrastructure is the foundation of everything. BlockEden.xyz provides enterprise-grade API access across major blockchain networks including Ethereum, Solana, and Sui—the same chains powering the next generation of payment applications. Explore our API marketplace to build on infrastructure designed for the scale these opportunities demand.

Decentralized AI: Bittensor vs. Sahara AI in the Race for Open Intelligence

· 9 min read
Dora Noda
Software Engineer

What if the future of artificial intelligence isn't controlled by a handful of trillion-dollar corporations, but by millions of contributors earning tokens for training models and sharing data? Two projects are racing to make this vision real—and they couldn't be more different in their approach.

Bittensor, with its Bitcoin-inspired tokenomics and proof-of-intelligence mining, has built a $2.9 billion ecosystem where AI models compete for rewards. Sahara AI, backed by $49 million from Pantera and Binance Labs, is constructing a full-stack blockchain where data ownership and copyright protection come first. One rewards raw intelligence output; the other protects the humans behind the data.

As centralized AI giants like OpenAI and Google race toward artificial general intelligence, these decentralized alternatives are betting that the future belongs to open, permissionless systems. But which vision will prevail?

The Centralization Problem in AI

The AI industry faces a stark concentration of power. Training frontier models requires billions of dollars in compute infrastructure, with clusters of thousands of GPUs running for months. Only a handful of companies—OpenAI, Google, Anthropic, Meta—can afford this scale. DeepMind CEO Demis Hassabis recently described it as "the most intense competitive environment" veteran technologists have ever seen.

This concentration creates cascading problems. Data contributors—the artists, writers, and programmers whose work trains these models—receive no compensation or attribution. Small developers can't compete against proprietary moats. And users have no choice but to trust that centralized providers will behave responsibly with their data and outputs.

Decentralized AI protocols offer an alternative architecture. By distributing computation, data, and rewards across global networks, they aim to democratize access while ensuring fair compensation. But the design space is vast, and two leading projects have chosen radically different paths.

Bittensor: The Proof-of-Intelligence Mining Network

Bittensor operates like "Bitcoin for AI"—a permissionless network where participants earn TAO tokens by contributing valuable machine learning outputs. Instead of solving arbitrary cryptographic puzzles, miners run AI models and answer queries. The better their responses, the more they earn.

How It Works

The network consists of specialized subnets, each focused on a particular AI task: text generation, image synthesis, trading signals, protein folding, code completion. As of early 2026, Bittensor hosts over 129 active subnets, up from 32 in its early stages.

Within each subnet, three roles interact:

  • Miners run AI models and respond to queries, earning TAO based on output quality
  • Validators evaluate miner responses and assign scores using the Yuma Consensus algorithm
  • Subnet Owners curate the task specifications and receive a portion of emissions

The emission split is 41% to miners, 41% to validators, and 18% to subnet owners. This creates a market-driven system where the best AI contributions earn the most rewards—a meritocracy enforced by cryptographic consensus rather than corporate hierarchy.

The TAO Token Economy

TAO mirrors Bitcoin's tokenomics: a hard cap of 21 million tokens, regular halving events, and no pre-mine or ICO. On December 12, 2025, Bittensor completed its first halving, reducing daily emissions from 7,200 to 3,600 TAO.

The February 2025 dynamic TAO (dTAO) upgrade introduced market-driven subnet pricing. When stakers buy into a subnet's alpha token, they're voting with their TAO for that subnet's value. Higher demand means higher emissions—a price discovery mechanism for AI capabilities.

Currently, around 73% of TAO supply is staked, signaling strong long-term conviction. Grayscale's GTAO trust filed for NYSE conversion in December 2025, potentially opening the door to a TAO ETF and broader institutional access.

Network Scale and Adoption

The numbers tell a story of rapid growth:

  • 121,567 unique wallets across all subnets
  • 106,839 miners and 37,642 validators
  • Market cap of approximately $2.9 billion
  • EVM compatibility enabling smart contracts on subnets

Bittensor's thesis is simple: if you create the right incentives, intelligence will emerge from the network. No central coordinator needed.

Sahara AI: The Full-Stack Data Sovereignty Platform

While Bittensor focuses on incentivizing AI output, Sahara AI tackles the input problem: who owns the data that trains these models, and how do contributors get paid?

Founded by researchers from MIT and USC, Sahara has raised $49 million across funding rounds led by Pantera Capital, Binance Labs, and Polychain Capital. Its 2025 IDO on Buidlpad attracted 103,000 participants from 118 countries, raising over $74 million—with 79% paid in World Liberty Financial's USD1 stablecoin.

The Three Pillars

Sahara AI is built on three foundational principles:

1. Sovereignty and Provenance: Every data contribution is recorded on-chain with immutable attribution. Even after data is ingested into AI models during training, contributors retain verifiable ownership. The platform is SOC2 certified for security and compliance.

2. AI Utility: The Sahara Marketplace (launched in open beta June 2025) allows users to buy, sell, and license AI models, datasets, and compute resources. Every transaction is recorded on the blockchain with transparent revenue sharing.

3. Collaborative Economy: High-quality contributors receive soulbound tokens (non-transferable reputation markers) that unlock premium roles and governance rights. Token holders vote on platform upgrades and fund allocation.

Data Services Platform

Sahara's Data Services Platform, launched December 2024, lets anyone earn money by creating datasets for AI training. Over 200,000 global AI trainers and 35 enterprise clients use the platform, with more than 3 million data annotations processed.

This addresses a fundamental asymmetry in AI development: companies like OpenAI scrape the internet for training data, but the original creators see nothing. Sahara ensures that data contributors—whether labeling images, writing code, or annotating text—receive direct compensation through SAHARA token payments.

Technical Architecture

Sahara Chain uses CometBFT (a fork of Tendermint Core) for Byzantine fault-tolerant consensus. The design prioritizes privacy, provenance, and performance for AI applications requiring secure data handling.

The token economy features:

  • Per-inference payments priced in SAHARA
  • Proof-of-Stake validation with staking rewards
  • Decentralized governance for protocol decisions
  • 10 billion maximum supply with June 2025 TGE

The mainnet launched in Q3 2025, with the team reporting 1.4 million daily active accounts on the testnet and partnerships with Microsoft, AWS, and Google Cloud.

Head-to-Head: Comparing the Visions

DimensionBittensorSahara AI
Primary FocusAI output qualityData input sovereignty
ConsensusProof of Intelligence (Yuma)Proof of Stake (CometBFT)
Token Supply21M hard cap10B maximum
Mining ModelCompetitive (best outputs win)Collaborative (all contributors paid)
Key MetricIntelligence per tokenData provenance per transaction
Market Cap (Jan 2026)~$2.9B~$71M
Institutional SignalGrayscale ETF filingBinance/Pantera backing
Main DifferentiatorSubnet diversityCopyright protection

Different Problems, Different Solutions

Bittensor asks: How do we incentivize the production of the best AI outputs? Its answer is market competition—let miners battle for rewards, and quality will emerge.

Sahara AI asks: How do we fairly compensate everyone who contributes to AI? Its answer is provenance—track every contribution on-chain, and ensure creators get paid.

These aren't contradictory visions; they're complementary layers of a potential decentralized AI stack. Bittensor optimizes for model quality through competition. Sahara optimizes for data quality through fair compensation.

One of AI's most contentious issues is training data rights. Major lawsuits from artists, authors, and publishers argue that scraping copyrighted content for training constitutes infringement.

Sahara addresses this directly with on-chain provenance. When a dataset enters the system, the contributor's ownership is cryptographically recorded. If that data is used to train a model, the attribution persists—and royalty payments can flow automatically.

Bittensor, by contrast, is agnostic about where miners get their training data. The network rewards output quality, not input provenance. This makes it more flexible but also more vulnerable to the same copyright challenges facing centralized AI.

Scale and Adoption Trajectories

Bittensor's $2.9 billion market cap dwarfs Sahara's $71 million, reflecting a multi-year head start and the TAO halving narrative. With 129 subnets and Grayscale's ETF filing, Bittensor has achieved meaningful institutional validation.

Sahara is earlier in its lifecycle but growing fast. The $74 million IDO demonstrates retail demand, and enterprise partnerships with AWS and Google Cloud suggest real-world adoption potential. The Q3 2025 mainnet launch puts it on track for full production operations in 2026.

The 2026 Outlook: Show Me the ROI

As Menlo Ventures partner Venky Ganesan observed, "2026 is the 'show me the money' year for AI." Enterprises demand real ROI, and countries need productivity gains to justify infrastructure spending.

Decentralized AI must prove it can compete with centralized alternatives—not just philosophically, but practically. Can Bittensor subnets produce models that rival GPT-5? Can Sahara's data marketplace attract enough contributors to build premium training sets?

The total AI crypto market cap sits at $24-27 billion, small compared to OpenAI's rumored $150 billion valuation. But decentralized projects offer something centralized giants cannot: permissionless participation, transparent economics, and resistance to single points of failure.

What to Watch

For Bittensor:

  • Post-halving supply dynamics and price discovery
  • Subnet quality metrics vs. centralized model benchmarks
  • Grayscale ETF approval timeline

For Sahara AI:

  • Mainnet stability and transaction volume
  • Enterprise adoption beyond pilot programs
  • Regulatory reception of on-chain copyright provenance

The Convergence Thesis

The most likely outcome isn't that one project wins while the other loses. AI infrastructure is vast enough for multiple winners addressing different problems.

Bittensor excels at coordinating distributed intelligence production. Sahara excels at coordinating fair data compensation. A mature decentralized AI ecosystem might use both: Sahara for sourcing high-quality, ethically-sourced training data, and Bittensor for competitively improving models trained on that data.

The real competition isn't between Bittensor and Sahara—it's between decentralized AI as a category and the centralized giants that currently dominate. If decentralized networks can achieve even a fraction of frontier model capabilities while offering superior economics for contributors, they'll capture enormous value as AI spending accelerates.

Two visions. Two architectures. One question: can decentralized AI deliver intelligence without centralized control?


Building AI applications on blockchain infrastructure requires reliable, high-performance RPC services. BlockEden.xyz provides enterprise-grade API access to support AI-blockchain integrations. Explore our API marketplace to build on foundations designed for the decentralized AI era.

The Rise of Wrench Attacks: A New Threat to Cryptocurrency Holders

· 8 min read
Dora Noda
Software Engineer

In January 2025, Ledger co-founder David Balland was kidnapped from his home in central France. His captors demanded EUR 10 million in cryptocurrency—and severed one of his fingers to prove they meant business. Four months later, an Italian investor was held captive for 17 days, subjected to severe physical abuse while attackers tried to extract access to his $28 million in Bitcoin.

These aren't isolated incidents. They're part of a disturbing trend that security experts are calling a "record year for wrench attacks"—physical violence used to bypass the digital security that cryptocurrency was designed to provide. And the data reveals an uncomfortable truth: as Bitcoin's price climbs, so does the violence targeting its holders.

What Is a Wrench Attack?

The term "wrench attack" comes from an xkcd webcomic illustrating a simple concept: no matter how sophisticated your encryption, an attacker can bypass it all with a $5 wrench and the willingness to use it. In crypto, this translates to criminals who skip the hacking and go straight to physical coercion—kidnapping, home invasion, torture, and threats against family members.

Jameson Lopp, chief security officer at Bitcoin wallet company Casa, maintains a database of over 225 verified physical attacks on cryptocurrency holders. The data tells a stark story:

  • 2025 saw approximately 70 wrench attacks—nearly double the 41 recorded in 2024
  • About 25% of incidents are home invasions, often aided by leaked KYC data or public records
  • 23% are kidnappings, frequently involving family members as leverage
  • Two-thirds of attacks succeed in extracting assets
  • Only 60% of known perpetrators are caught

And these numbers likely understate reality. Many victims choose not to report crimes, fearing repeat offenses or lacking confidence in law enforcement's ability to help.

The Price-Violence Correlation

Research by Marilyne Ordekian at University College London identified a direct correlation between Bitcoin's price and the frequency of physical attacks. Chainalysis confirmed this pattern, finding "a clear correlation between violent incidents and a forward-looking moving average of bitcoin's price."

The logic is grimly straightforward: when Bitcoin hits all-time highs (surpassing $120,000 in 2025), the perceived payoff for violent crime increases proportionally. Criminals don't need to understand blockchain technology—they just need to know that someone near them has valuable digital assets.

This correlation has predictive implications. As TRM Labs' global head of policy Ari Redbord notes: "As cryptocurrency adoption grows and more value is held directly by individuals, criminals are increasingly incentivised to bypass technical defenses altogether and target people instead."

The forecast for 2026 isn't optimistic. TRM Labs predicts wrench attacks will continue rising as Bitcoin maintains elevated prices and crypto wealth becomes more widespread.

The Anatomy of Modern Crypto Violence

The 2025 attack wave revealed how sophisticated these operations have become:

The Ledger Kidnapping (January 2025) David Balland and his partner were taken from their home in central France. The attackers demanded EUR 10 million, using finger amputation as leverage. French police eventually rescued both victims and arrested several suspects—but the psychological damage and security implications for the entire industry were profound.

The Paris Wave (May 2025) In a single month, Paris experienced multiple high-profile attacks:

  • The daughter and grandson of a cryptocurrency CEO were attacked in broad daylight
  • A crypto entrepreneur's father was abducted, with kidnappers demanding EUR 5-7 million and severing his finger
  • An Italian investor was held for 17 days of severe physical abuse

The U.S. Home Invasion Ring Gilbert St. Felix received a 47-year sentence—the longest ever in a U.S. crypto case—for leading a violent home-invasion ring targeting holders. His crew used KYC data leaks to identify targets, then employed extreme violence including waterboarding and threats of mutilation.

The Texas Brothers (September 2024) Raymond and Isiah Garcia allegedly held a Minnesota family hostage at gunpoint with AR-15s and shotguns, zip-tying victims while demanding $8 million in cryptocurrency transfers.

What's notable is the geographic spread. These aren't just happening in high-risk regions—attacks are concentrated in Western Europe, the U.S., and Canada, countries traditionally considered safe with robust law enforcement. As Solace Global notes, this "illustrates the risks criminal organizations are willing to take to secure such valuable and easily movable digital assets."

The KYC Data Problem

A troubling pattern has emerged: many attacks appear facilitated by leaked Know Your Customer (KYC) data. When you verify your identity on a cryptocurrency exchange, that information can become a targeting mechanism if the exchange suffers a data breach.

French crypto executives have explicitly blamed European cryptocurrency regulations for creating databases that hackers can exploit. According to Les Echos, kidnappers may have used these files to identify victims' places of residence.

The irony is bitter. Regulations designed to prevent financial crime may be enabling physical crime against the very users they're meant to protect.

France's Emergency Response

After recording its 10th crypto-related kidnapping in 2025, France's government launched unprecedented protective measures:

Immediate Security Upgrades

  • Priority access to police emergency services for crypto professionals
  • Home security inspections and direct consultations with law enforcement
  • Security training with elite police forces
  • Safety audits of executives' residences

Legislative Action Justice Minister Gérald Darmanin announced a new decree for rapid implementation. Lawmaker Paul Midy submitted a bill to automatically delete business leaders' personal addresses from public company records—addressing the doxing vector that enabled many attacks.

Investigation Progress 25 individuals have been charged in connection with French cases. An alleged mastermind was arrested in Morocco but awaits extradition.

The French response reveals something important: governments are beginning to treat crypto security as a matter of public safety, not just financial regulation.

Operational Security: The Human Firewall

Technical security—hardware wallets, multisig, cold storage—can protect assets from digital theft. But wrench attacks bypass technology entirely. The solution requires operational security (OpSec), treating yourself with the caution typically reserved for high-net-worth individuals.

Identity Separation

  • Never connect your real-world identity to your on-chain holdings
  • Use separate email addresses and devices for crypto activities
  • Avoid using home addresses for any crypto-related deliveries (including hardware wallets)
  • Consider purchasing hardware directly from manufacturers using a virtual office address

The First Rule: Don't Talk About Your Stack

  • Never discuss holdings publicly—including on social media, in Discord servers, or at meetups
  • Be wary of "crypto friends" who might share information
  • Avoid displaying wealth indicators that could signal crypto success

Physical Fortification

  • Security cameras and alarm systems
  • Home security assessments
  • Varying daily routines to avoid predictable patterns
  • Awareness of physical surroundings, especially when accessing wallets

Technical Measures That Also Provide Physical Protection

  • Geographic distribution of multisig keys (attackers can't force you to provide what you don't physically have access to)
  • Time-locked withdrawals that prevent immediate transfers under duress
  • "Panic wallets" with limited funds that can be surrendered if threatened
  • Casa-style collaborative custody where no single person controls all keys

Communication Security

  • Use authenticator apps, never SMS-based 2FA (SIM swapping remains a common attack vector)
  • Screen unknown calls ruthlessly
  • Never share verification codes
  • Put PINs and passwords on all mobile accounts

The Mindset Shift

Perhaps the most critical security measure is mental. As Casa's guide notes: "Complacency is arguably the greatest threat to your OPSEC. Many victims of bitcoin-related attacks knew what basic precautions to put in place, but they didn't get around to putting them into practice because they didn't believe they'd ever be a target."

The "it won't happen to me" mindset is the riskiest vulnerability of all.

Maximum physical privacy requires what one security guide describes as "treating yourself like a high-net-worth individual in witness protection—constant vigilance, multiple defense layers, and acceptance that perfect security doesn't exist, only making attacks too costly or difficult."

The Bigger Picture

The rise of wrench attacks reveals a fundamental tension in crypto's value proposition. Self-custody is celebrated as freedom from institutional gatekeepers—but it also means individual users bear full responsibility for their own security, including physical safety.

Traditional banking, for all its flaws, provides institutional layers of protection. When criminals target bank customers, the bank absorbs losses. When criminals target crypto holders, the victims are often on their own.

This doesn't mean self-custody is wrong. It means the ecosystem needs to mature beyond technical security to address human vulnerability.

What needs to change:

  • Industry: Better data hygiene practices and breach response protocols
  • Regulation: Recognition that KYC databases create targeting risks requiring protective measures
  • Education: Physical security awareness as standard onboarding for new users
  • Technology: More solutions like time-locks and collaborative custody that provide protection even under duress

Looking Ahead

The correlation between Bitcoin price and violent attacks suggests 2026 will see continued growth in this crime category. With Bitcoin maintaining prices above $100,000 and crypto wealth becoming more visible, the incentive structure for criminals remains strong.

But awareness is growing. France's legislative response, increased security training, and the mainstreaming of operational security practices represent the beginning of an industry-wide reckoning with physical vulnerability.

The next phase of crypto security won't be measured in key lengths or hash rates. It will be measured in how well the ecosystem protects the humans holding the keys.


Security is foundational to everything in Web3. BlockEden.xyz provides enterprise-grade blockchain infrastructure with security-first design across 30+ networks. For teams building applications where user safety matters, explore our API marketplace and start building on infrastructure you can trust.