Skip to main content

204 posts tagged with "Blockchain"

General blockchain technology and innovation

View all tags

MegaETH: The Real-Time Blockchain Promising 100,000 TPS Launches This Month

· 7 min read
Dora Noda
Software Engineer

MegaETH: The Real-Time Blockchain

What if blockchain transactions were as instant as pressing a button in a video game? That's the audacious promise of MegaETH, the Vitalik Buterin-backed Layer 2 that's launching its mainnet and token this January 2026. With claims of 100,000+ transactions per second and 10-millisecond block times—compared to Ethereum's 15 seconds and Base's 1.78 seconds—MegaETH isn't just iterating on existing L2 technology. It's attempting to redefine what "real-time" means for blockchain.

After raising $450 million in its public sale (from $1.39 billion in total bids) and securing backing from Ethereum's co-creator himself, MegaETH has become one of the most anticipated launches of 2026. But can it deliver on promises that sound more like science fiction than blockchain engineering?

The Shai-Hulud Attack: How a Supply Chain Worm Stole $58M from Crypto Developers and Users

· 9 min read
Dora Noda
Software Engineer

On Christmas Eve 2025, while most of the crypto world was on holiday, attackers pushed a malicious update to Trust Wallet's Chrome extension. Within 48 hours, $8.5 million vanished from 2,520 wallets. The seed phrases of thousands of users had been silently harvested, disguised as routine telemetry data. But this wasn't an isolated incident—it was the culmination of a supply chain attack that had been spreading through the crypto development ecosystem for weeks.

The Shai-Hulud campaign, named after the sandworms of Dune, represents the most aggressive npm supply chain attack of 2025. It compromised over 700 npm packages, infected 27,000 GitHub repositories, and exposed approximately 14,000 developer secrets across 487 organizations. The total damage: over $58 million in stolen cryptocurrency, making it one of the most costly developer-targeted attacks in crypto history.

The Anatomy of a Supply Chain Worm

Unlike typical malware that requires users to download malicious software, supply chain attacks poison the tools developers already trust. The Shai-Hulud campaign weaponized npm, the package manager that powers most JavaScript development—including nearly every crypto wallet, DeFi frontend, and Web3 application.

The attack began in September 2025 with the first wave, resulting in approximately $50 million in cryptocurrency theft. But it was "The Second Coming" in November that demonstrated the true sophistication of the operation. Between November 21-23, attackers compromised the development infrastructure of major projects including Zapier, ENS Domains, AsyncAPI, PostHog, Browserbase, and Postman.

The propagation mechanism was elegant and terrifying. When Shai-Hulud infects a legitimate npm package, it injects two malicious files—setup_bun.js and bun_environment.js—triggered by a preinstall script. Unlike traditional malware that activates after installation, this payload runs before installation completes and even when installation fails. By the time developers realize something is wrong, their credentials are already stolen.

The worm identifies other packages maintained by compromised developers, automatically injects malicious code, and publishes new compromised versions to the npm registry. This automated propagation allowed the malware to spread exponentially without direct attacker intervention.

From Developer Secrets to User Wallets

The connection between compromised npm packages and the Trust Wallet hack reveals how supply chain attacks cascade from developers to end users.

Trust Wallet's investigation revealed that their developer GitHub secrets were exposed during the November Shai-Hulud outbreak. This exposure gave attackers access to the browser extension source code and, critically, the Chrome Web Store API key. Armed with these credentials, attackers bypassed Trust Wallet's internal release process entirely.

On December 24, 2025, version 2.68 of the Trust Wallet Chrome extension appeared in the Chrome Web Store—published by attackers, not Trust Wallet developers. The malicious code was designed to iterate through all wallets stored in the extension and trigger a mnemonic phrase request for each wallet. Whether users authenticated with a password or biometrics, their seed phrases were silently exfiltrated to attacker-controlled servers, disguised as legitimate analytics data.

The stolen funds broke down as follows: approximately $3 million in Bitcoin, over $3 million in Ethereum, and smaller amounts in Solana and other tokens. Within days, the attackers began laundering funds through centralized exchanges—$3.3 million to ChangeNOW, $340,000 to FixedFloat, and $447,000 to KuCoin.

The Dead Man's Switch

Perhaps most disturbing is the Shai-Hulud malware's "dead man's switch" mechanism. If the worm cannot authenticate with GitHub or npm—if its propagation and exfiltration channels are severed—it will wipe all files in the user's home directory.

This destructive feature serves multiple purposes. It punishes detection attempts, creates chaos that masks the attackers' tracks, and provides leverage if defenders try to cut off command-and-control infrastructure. For developers who haven't maintained proper backups, a failed cleanup attempt could result in catastrophic data loss on top of credential theft.

The attackers also demonstrated psychological sophistication. When Trust Wallet announced the breach, the same attackers launched a phishing campaign exploiting the ensuing panic, creating fake Trust Wallet-branded websites asking users to enter their recovery seed phrases for "wallet verification." Some victims were compromised twice.

The Insider Question

Binance co-founder Changpeng Zhao (CZ) hinted that the Trust Wallet exploit was "most likely" carried out by an insider or someone with prior access to deployment permissions. Trust Wallet's own analysis suggests attackers may have gained control of developer devices or obtained deployment permissions before December 8, 2025.

Security researchers have noted patterns suggesting possible nation-state involvement. The timing—Christmas Eve—follows a common advanced persistent threat (APT) playbook: attack during holidays when security teams are understaffed. The technical sophistication and scale of the Shai-Hulud campaign, combined with the rapid laundering of funds, suggests resources beyond typical criminal operations.

Why Browser Extensions Are Uniquely Vulnerable

The Trust Wallet incident highlights a fundamental vulnerability in the crypto security model. Browser extensions operate with extraordinary privileges—they can read and modify web pages, access local storage, and in the case of crypto wallets, hold the keys to millions of dollars.

The attack surface is massive:

  • Update mechanisms: Extensions auto-update, and a single compromised update reaches all users
  • API key security: Chrome Web Store API keys, if leaked, allow anyone to publish updates
  • Trust assumptions: Users assume updates from official stores are safe
  • Holiday timing: Reduced security monitoring during holidays enables longer dwell time

This isn't the first browser extension attack on crypto users. Previous incidents include the GlassWorm campaign targeting VS Code extensions and the FoxyWallet Firefox extension fraud. But the Trust Wallet breach was the largest in dollar terms and demonstrated how supply chain compromises amplify the impact of extension attacks.

Binance's Response and the SAFU Precedent

Binance confirmed that affected Trust Wallet users would be fully reimbursed through its Secure Asset Fund for Users (SAFU). This fund, established after a 2018 exchange hack, holds a portion of trading fees in reserve specifically to cover user losses from security incidents.

The decision to reimburse sets an important precedent—and creates an interesting question about responsibility allocation. Trust Wallet was compromised through no direct fault of users who simply opened their wallets during the affected window. But the root cause was a supply chain attack that compromised developer infrastructure, which in turn was enabled by broader ecosystem vulnerabilities in npm.

Trust Wallet's immediate response included expiring all release APIs to block new version releases for two weeks, reporting the malicious exfiltration domain to its registrar (resulting in prompt suspension), and pushing a clean version 2.69. Users were advised to migrate funds to fresh wallets immediately if they had unlocked the extension between December 24-26.

Lessons for the Crypto Ecosystem

The Shai-Hulud campaign exposes systemic vulnerabilities that extend far beyond Trust Wallet:

For Developers

Pin dependencies explicitly. The preinstall script exploitation works because npm installs can run arbitrary code. Pinning to known clean versions prevents automatic updates from introducing compromised packages.

Treat secrets as compromised. Any project that pulled npm packages between November 21 and December 2025 should assume credential exposure. This means revoking and regenerating npm tokens, GitHub PATs, SSH keys, and cloud provider credentials.

Implement proper secret management. API keys for critical infrastructure like app store publishing should never be stored in version control, even in private repositories. Use hardware security modules or dedicated secret management services.

Enforce phishing-resistant MFA. Standard two-factor authentication can be bypassed by sophisticated attackers. Hardware keys like YubiKeys provide stronger protection for developer and CI/CD accounts.

For Users

Diversify wallet infrastructure. Don't keep all funds in browser extensions. Hardware wallets provide isolation from software vulnerabilities—they can sign transactions without ever exposing seed phrases to potentially compromised browsers.

Assume updates can be malicious. The auto-update model that makes software convenient also makes it vulnerable. Consider disabling auto-updates for security-critical extensions and manually verifying new versions.

Monitor wallet activity. Services that alert on unusual transactions can provide early warning of compromise, potentially limiting losses before attackers drain entire wallets.

For the Industry

Strengthen the npm ecosystem. The npm registry is critical infrastructure for Web3 development, yet it lacks many security features that would prevent worm-like propagation. Mandatory code signing, reproducible builds, and anomaly detection for package updates could significantly raise the bar for attackers.

Rethink browser extension security. The current model—where extensions auto-update and have broad permissions—is fundamentally incompatible with security requirements for holding significant assets. Sandboxed execution environments, delayed updates with user review, and reduced permissions could help.

Coordinate incident response. The Shai-Hulud campaign affected hundreds of projects across the crypto ecosystem. Better information sharing and coordinated response could have limited the damage as compromised packages were identified.

The Future of Supply Chain Security in Crypto

The cryptocurrency industry has historically focused security efforts on smart contract audits, exchange cold storage, and user-facing phishing protection. The Shai-Hulud campaign demonstrates that the most dangerous attacks may come from compromised developer tooling—infrastructure that crypto users never directly interact with but that underlies every application they use.

As Web3 applications become more complex, their dependency graphs grow larger. Each npm package, each GitHub action, each CI/CD integration represents a potential attack vector. The industry's response to Shai-Hulud will determine whether this becomes a one-time wake-up call or the beginning of an era of supply chain attacks on crypto infrastructure.

For now, the attackers remain unidentified. Approximately $2.8 million of stolen Trust Wallet funds remain in attacker wallets, while the rest has been laundered through centralized exchanges and cross-chain bridges. The broader Shai-Hulud campaign's $50+ million in earlier thefts has largely disappeared into the blockchain's pseudonymous depths.

The sandworm has burrowed deep into crypto's foundations. Rooting it out will require rethinking security assumptions that the industry has taken for granted since its earliest days.


Building secure Web3 applications requires robust infrastructure. BlockEden.xyz provides enterprise-grade RPC nodes and APIs with built-in monitoring and anomaly detection, helping developers identify unusual activity before it impacts users. Explore our API marketplace to build on security-focused foundations.

Solana's Alpenglow: The 100x Speed Upgrade That Could Bring Wall Street's Trading Desks On-Chain

· 8 min read
Dora Noda
Software Engineer

What if your blockchain confirmed transactions faster than you could blink? That's not science fiction—it's the promise of Solana's Alpenglow upgrade, which slashes finality from 12.8 seconds to just 150 milliseconds. For context, the average human blink takes 300-400 milliseconds. When Alpenglow goes live in Q1 2026, Solana won't just be faster than other blockchains—it will be faster than human perception.

This isn't just a technical flex. The upgrade represents the most fundamental rearchitecture of Solana's consensus mechanism since the network's launch, abandoning the iconic Proof-of-History system that once defined it. And the implications extend far beyond bragging rights: at these speeds, the line between centralized exchanges and decentralized protocols effectively disappears.

What Alpenglow Actually Changes

At its core, Alpenglow replaces Solana's existing Tower BFT and Proof-of-History (PoH) consensus mechanisms with two new protocols: Votor and Rotor. The community approved the upgrade (SIMD-0326) with 98.27% validator support in September 2025, signaling near-unanimous confidence in the architectural overhaul.

Votor: Off-Chain Voting, On-Chain Proof

The most radical change is moving consensus voting off-chain. Today, Solana validators broadcast voting transactions directly on the blockchain—consuming bandwidth and adding latency. Votor eliminates this overhead entirely.

Under the new system, validators exchange votes through a dedicated network layer. Once a block leader collects sufficient votes, they aggregate hundreds or thousands of signatures into a single, compact "finality certificate" using BLS signature aggregation. Only this certificate gets published on-chain.

Votor employs a dual-path finalization system:

  • Fast Finalization: If a block receives ≥80% stake approval in the first voting round, it's immediately finalized. This is the happy path—one round, done.
  • Slow Finalization: If approval falls between 60% and 80%, a second round triggers. If the second round also reaches ≥60%, the block finalizes. This backup path ensures robustness without sacrificing speed.

Both paths run concurrently, meaning finalization happens as soon as either succeeds. In practice, most blocks should finalize in a single 100-150ms round.

Rotor: Rethinking Data Distribution

If Votor handles consensus, Rotor handles getting data to validators fast enough for Votor to work. The current Turbine protocol uses a multi-layer tree with a fanout of 200 nodes per layer. Rotor simplifies this to a single-hop model: relay nodes distribute shreds (data fragments) directly to validators without multiple bounces.

The design philosophy is elegant: speed of light is still too slow. When you're targeting 150ms finality, every network hop matters. By minimizing hops and using stake-weighted relay paths, Rotor achieves 18ms block propagation under typical conditions—fast enough that Votor can do its job within the target window.

The Death of Proof-of-History

Perhaps most symbolically, Alpenglow abandons Proof-of-History, the cryptographic clock that was Solana's signature innovation. PoH provided a trustless ordering of events without validators needing to communicate, but it introduced complexity that Alpenglow's architects deemed unnecessary for the speed targets.

The replacement is simpler: a fixed 400ms block time with validators maintaining local timeout timers. If the leader delivers data in time, validators vote. If not, they vote to skip. The elegance of PoH remains admirable, but it's being sacrificed on the altar of raw performance.

Why 150 Milliseconds Matters

For most blockchain users, 12-second finality is already "instant enough." You tap a button, wait a moment, and your swap completes. But Solana isn't optimizing for casual DeFi users—it's positioning for markets that measure time in microseconds.

High-Frequency Trading Goes On-Chain

Traditional financial markets operate on millisecond timing. High-frequency trading firms spend billions to shave microseconds off execution. Solana's current 12.8-second finality was always a non-starter for these players. At 150ms, the calculus changes fundamentally.

"At these speeds, Solana could realize Web2-level responsiveness with L1 finality, unlocking new use cases that require both speed and cryptographic certainty," the Solana Foundation stated. Translation: the same traders who pay premium rents for co-located servers in Nasdaq data centers might find Solana's transparent, programmable trading infrastructure compelling.

On-chain order books become viable. Perpetual futures can update positions without arbitrage risk. Market makers can quote tighter spreads knowing their hedges will execute reliably. Analysts project Alpenglow could unlock $100 billion+ in on-chain trading volume by 2027.

Real-Time Applications Finally Make Sense

Sub-second finality enables application categories that were previously blockchain-incompatible:

  • Live auctions: Bid, confirm, outbid—all within human perception thresholds
  • Multiplayer gaming: On-chain game state that updates faster than frame rates
  • Real-time data streams: IoT devices settling payments as data flows
  • Instant cross-border remittances: Transaction confirmation before the recipient refreshes their wallet

Researcher Vangelis Andrikopoulos from Sei Labs summarized it: Alpenglow will make "real-time gaming, high-frequency trading, and instant payments practically viable."

The 20+20 Resilience Model

Speed means nothing if the network crashes. Alpenglow introduces a fault tolerance model designed for adversarial conditions: the network remains operational even if 20% of validators are malicious AND an additional 20% are unresponsive simultaneously.

This "20+20" model exceeds standard Byzantine fault tolerance requirements, providing security margins that institutional participants demand. When you're settling millions in trades per second, "the network went down" isn't an acceptable explanation.

Competitive Implications

Ethereum's Different Bet

While Solana pursues sub-second L1 finality, Ethereum maintains its architectural separation: 12-second L1 blocks with layer-2 rollups handling execution. Pectra (May 2025) focused on account abstraction and validator efficiency; Fusaka (targeting Q2/Q3 2026) will expand blob capacity to push L2s toward 100,000+ combined TPS.

The philosophies diverge sharply. Solana collapses execution, settlement, and finality into a single 400ms slot (soon 150ms for finality). Ethereum separates concerns, letting each layer specialize. Neither is objectively superior—the question is which model better serves specific application requirements.

For latency-critical applications like trading, Solana's integrated approach eliminates cross-layer coordination delays. For applications prioritizing censorship resistance or composability across a vast ecosystem, Ethereum's rollup-centric model may prove more resilient.

The Race to Institutional Adoption

Both networks are courting institutional capital, but with different pitches. Solana offers raw performance: sub-second finality, 3,000-5,000 real-world TPS today, with Firedancer pushing toward 1 million TPS by 2027-2028. Ethereum offers ecosystem depth: $50B+ in DeFi TVL, battle-tested security, and regulatory familiarity from ETF approvals.

Alpenglow's timing isn't accidental. With traditional finance increasingly exploring tokenized securities and on-chain settlement, Solana is positioning its infrastructure to meet institutional requirements before demand crystallizes.

Risks and Trade-offs

Centralization Concerns

Stake-weighted relay paths in Rotor could concentrate network influence among high-stake validators. If a handful of large validators control relay infrastructure, the decentralization benefits of blockchain become academic.

Some critics have noted a more fundamental concern: "There's a certain speed beyond which you literally can't go over a fiber optic cable through the ocean to another continent and back again within a certain number of milliseconds. If you're faster than that, you're just giving up decentralization for speed."

At 150ms finality, validators across oceans may struggle to participate equally in consensus, potentially marginalizing non-US or non-European validators.

Regulatory Attention

High-speed on-chain trading will inevitably attract regulatory scrutiny. The SEC already treats certain crypto activities as securities trading; a network explicitly optimized for HFT might face heightened examination. Solana's regulatory strategy will need to evolve alongside its technical capabilities.

Execution Risk

Replacing core consensus mechanisms carries inherent risk. Testnet deployment is scheduled for late 2025, with mainnet targeted for early 2026, but blockchain history is littered with upgrades that didn't survive contact with production workloads. The 98.27% validator approval suggests confidence, but confidence isn't certainty.

The Road Ahead

Alpenglow's design also enables future enhancements. Multiple Concurrent Leaders (MCL) could allow parallel block production, further scaling throughput. The architecture is "much more flexible to adopt a multi-leader framework compared to Solana's current consensus architecture," noted Anatoly Yakovenko, Solana's co-founder.

For now, the focus is proving that 150ms finality works reliably under real-world conditions. If Alpenglow delivers on its promises, the competitive dynamics of blockchain infrastructure will shift permanently. The question will no longer be whether blockchains are fast enough for serious finance—it will be whether traditional infrastructure can justify its existence when transparent, programmable alternatives execute faster.

When your blockchain confirms transactions before you can blink, the future isn't approaching—it's already arrived.


Building on Solana's high-performance infrastructure? BlockEden.xyz provides enterprise-grade RPC nodes and APIs for Solana developers seeking reliable access to the fastest blockchain network. Explore our Solana API to build applications ready for the Alpenglow era.

Virtuals Protocol and the Rise of the AI Agent Economy: How Autonomous Software Is Building Its Own Commerce Layer

· 10 min read
Dora Noda
Software Engineer

The AI agent market added $10 billion in market capitalization in a single week. But here's what most observers missed: the rally wasn't driven by hype around chatbots—it was fueled by infrastructure for machines to do business with each other. Virtuals Protocol, now valued near $915 million with over 650,000 holders, has emerged as the leading launchpad for autonomous AI agents that can negotiate, transact, and coordinate on-chain without human intervention. When VIRTUAL surged 27% in early January 2026 on trading volume of $408 million, it signaled something larger than speculation: the birth of an entirely new economic layer where software agents operate as independent businesses.

This isn't about AI assistants answering your questions. It's about AI agents that own assets, pay for services, and earn revenue—24/7, across multiple blockchains, with full transparency baked into smart contracts. The question isn't whether this technology will matter. It's whether the infrastructure being built today will define how trillions in autonomous transactions flow over the next decade.

Oasis Network: How Confidential Computing is Reshaping DeFi Security and MEV Protection

· 10 min read
Dora Noda
Software Engineer

More than $3 billion in Maximal Extractable Value (MEV) is siphoned annually from Ethereum, its rollups, and fast-finality chains like Solana—double the figures recorded just two years ago. Sandwich attacks alone constituted $289.76 million, or 51.56% of total MEV transaction volume in recent analysis. As DeFi grows, so does the incentive for sophisticated actors to exploit transaction ordering at users' expense. Oasis Network has emerged as a leading solution to this problem, leveraging Trusted Execution Environments (TEEs) to enable confidential smart contracts that fundamentally change how blockchain privacy and security work.

The Personal Wallet Security Crisis: Why 158,000 Individual Crypto Thefts in 2025 Demand a New Approach

· 11 min read
Dora Noda
Software Engineer

Individual wallet compromises surged to 158,000 incidents affecting 80,000 unique victims in 2025, resulting in $713 million stolen from personal wallets alone. That's not an exchange hack or a protocol exploit—that's everyday crypto users losing their savings to attackers who have evolved far beyond simple phishing emails. Personal wallet compromises now account for 37% of all stolen crypto value, up from just 7.3% in 2022. The message is clear: if you hold crypto, you are a target, and the protection strategies of yesterday are no longer enough.

Smart Contract Audit Landscape 2026: Why $3.4 Billion in Crypto Theft Demands a Security Revolution

· 9 min read
Dora Noda
Software Engineer

In the first half of 2025 alone, attackers drained over $2.3 billion from crypto protocols—more than all of 2024 combined. Access control vulnerabilities alone accounted for $1.6 billion of that carnage. The Bybit hack in February 2025, a $1.4 billion supply chain attack, demonstrated that even the largest exchanges remain vulnerable. As we enter 2026, the smart contract audit industry faces its most critical moment: evolve or watch billions more disappear into attackers' wallets.

Web3 2025 Annual Review: 10 Charts That Tell the Real Story of Crypto Institutional Coming of Age

· 9 min read
Dora Noda
Software Engineer

The total crypto market cap crossed $4 trillion for the first time in 2025. Bitcoin ETFs accumulated $57.7 billion in net inflows. Stablecoin monthly transaction volume hit $3.4 trillion—surpassing Visa. Real-world asset tokenization exploded 240% year-over-year. And yet, amidst these record-breaking numbers, the most important story of 2025 wasn't about price—it was about the fundamental transformation of Web3 from a speculative playground into institutional-grade financial infrastructure.

Celestia's Competitive Edge in Data Availability: A Deep Dive

· 9 min read
Dora Noda
Software Engineer

When Ethereum L2s paid $3.83 per megabyte to post data using blobs, Eclipse was paying Celestia $0.07 for the same megabyte. That's not a typo—55 times cheaper, enabling Eclipse to post over 83 GB of data without bankrupting its treasury. This cost differential isn't a temporary market anomaly. It's the structural advantage of purpose-built infrastructure.

Celestia has now processed over 160 GB of rollup data, generates daily blob fees that have grown 10x since late 2024, and commands roughly 50% market share in the data availability sector. The question isn't whether modular data availability works—it's whether Celestia can maintain its lead as EigenDA, Avail, and Ethereum's native blobs compete for the same rollup customers.

Understanding Blob Economics: The Foundation

Before analyzing Celestia's numbers, it's worth understanding what makes data availability economically distinct from other blockchain services.

What Rollups Actually Pay For

When a rollup processes transactions, it produces state changes that need to be verifiable. Rather than trust the rollup operator, users can verify by re-executing transactions against the original data. This requires that transaction data remains available—not forever, but long enough for challenges and verification.

Traditional rollups posted this data directly to Ethereum calldata, paying premium prices for permanent storage on the world's most secure ledger. But most rollup data only needs availability for a challenge window (typically 7-14 days), not eternity. This mismatch created the opening for specialized data availability layers.

Celestia's PayForBlob Model

Celestia's fee model is straightforward: rollups pay per blob based on size and current gas prices. Unlike execution layers where computation costs dominate, data availability is fundamentally about bandwidth and storage—resources that scale more predictably with hardware improvements.

The economics create a flywheel: lower DA costs enable more rollups, more rollups generate more fee revenue, and increased usage justifies infrastructure investment for even greater capacity. Celestia's current throughput of approximately 1.33 MB/s (8 MB blocks every 6 seconds) represents early-stage capacity with a clear path to 100x improvement.

The 160 GB Reality: Who's Using Celestia

The aggregate numbers tell a story of rapid adoption. Over 160 GB of data has been published to Celestia since mainnet launch, with daily data volume averaging around 2.5 GB. But the composition of this data reveals more interesting patterns.

Eclipse: The Volume Leader

Eclipse—a Layer 2 combining Solana's virtual machine with Ethereum settlement—has published over 83 GB of data to Celestia, more than half of all network volume. Eclipse uses Celestia for data availability while settling to Ethereum, demonstrating the modular architecture in practice.

The volume isn't surprising given Eclipse's design choices. Solana Virtual Machine execution generates more data than EVM equivalents, and Eclipse's focus on high-throughput applications (gaming, DeFi, social) means transaction volumes that would be cost-prohibitive on Ethereum DA.

The Enterprise Cohort

Beyond Eclipse, the rollup ecosystem includes:

  • Manta Pacific: Over 7 GB posted, an OP Stack rollup focused on ZK applications with Universal Circuits technology
  • Plume Network: RWA-specialized L2 using Celestia for tokenized asset transaction data
  • Derive: On-chain options and structured products trading
  • Aevo: Decentralized derivatives exchange processing high-frequency trading data
  • Orderly Network: Cross-chain orderbook infrastructure

Twenty-six rollups now build on Celestia, with major frameworks—Arbitrum Orbit, OP Stack, Polygon CDK—all offering Celestia as a DA option. Rollups-as-a-Service platforms like Conduit and Caldera have made Celestia integration a standard offering.

Fee Revenue Growth

At the end of 2024, Celestia generated approximately $225 per day in blob fees. That number has grown nearly 10x, reflecting both increased usage and the network's ability to capture value as demand rises. The fee market remains early-stage—capacity utilization is low relative to tested limits—but the growth trajectory validates the economic model.

Cost Comparison: Celestia vs. The Competition

Data availability has become a competitive market. Understanding the cost structures helps explain rollup decisions.

Celestia vs. Ethereum Blobs

Ethereum's EIP-4844 (Dencun upgrade) introduced blob transactions, reducing DA costs by 90%+ compared to calldata. But Celestia remains significantly cheaper:

MetricEthereum BlobsCelestia
Cost per MB~$3.83~$0.07
Cost advantageBaseline55x cheaper
CapacityLimited blob space8 MB blocks (scaling to 1 GB)

For high-volume rollups like Eclipse, this difference is existential. At Ethereum blob prices, Eclipse's 83 GB of data would have cost over $300,000. On Celestia, it cost approximately $6,000.

Celestia vs. EigenDA

EigenDA offers a different value proposition: Ethereum-aligned security through restaking, with claimed throughput of 100 MB/s. The tradeoffs:

AspectCelestiaEigenDA
Security modelIndependent validator setEthereum restaking
Throughput1.33 MB/s (8 MB blocks)100 MB/s claimed
ArchitectureBlockchain-basedData Availability Committee
DecentralizationPublic verificationTrust assumptions

EigenDA's DAC architecture enables higher throughput but introduces trust assumptions that fully blockchain-based solutions avoid. For teams deeply embedded in Ethereum's ecosystem, EigenDA's restaking integration may outweigh Celestia's independence.

Celestia vs. Avail

Avail positions as the most flexible option for multichain applications:

AspectCelestiaAvail
Cost per MBHigherLower
Economic securityHigherLower
Mainnet capacity8 MB blocks4 MB blocks
Test capacity128 MB proven128 MB proven

Avail's lower costs come with lower economic security—a reasonable tradeoff for applications where the marginal cost savings matter more than maximum security guarantees.

The Scaling Roadmap: From 1 MB/s to 1 GB/s

Celestia's current capacity—approximately 1.33 MB/s—is intentionally conservative. The network has demonstrated dramatically higher throughput in controlled testing, providing a clear upgrade path.

Mammoth Testing Results

In October 2024, the Mammoth Mini devnet achieved 88 MB blocks with 3-second block times, delivering approximately 27 MB/s throughput—over 20x current mainnet capacity.

In April 2025, the mamo-1 testnet pushed further: 128 MB blocks with 6-second block times, achieving 21.33 MB/s sustained throughput. This represented 16x current mainnet capacity while incorporating new propagation algorithms like Vacuum! designed for efficient large-block data movement.

Mainnet Upgrade Progress

The scaling is happening incrementally:

  • Ginger Upgrade (December 2024): Reduced block times from 12 seconds to 6 seconds
  • 8 MB Block Increase (January 2025): Doubled block size via on-chain governance
  • Matcha Upgrade (January 2026): Enabled 128 MB blocks through improved propagation mechanics, reducing node storage requirements by 77%
  • Lotus Upgrade (July 2025): V4 mainnet release with further TIA holder improvements

The roadmap targets gigabyte-scale blocks by 2030, representing a 1,000x increase from current capacity. Whether market demand grows to justify this capacity remains uncertain, but the technical path is clear.

TIA Tokenomics: How Value Accrues

Understanding Celestia's economics requires understanding TIA's role in the system.

Token Utility

TIA serves three functions:

  1. Blob fees: Rollups pay TIA for data availability
  2. Staking: Validators stake TIA to secure the network and earn rewards
  3. Governance: Token holders vote on network parameters and upgrades

The fee mechanism creates direct linkage between network usage and token demand. As blob submissions increase, TIA is purchased and spent, creating buy pressure proportional to network utility.

Supply Dynamics

TIA launched with 1 billion genesis tokens. Initial inflation was set at 8% annually, decreasing over time toward 1.5% terminal inflation.

The January 2026 Matcha upgrade introduced Proof-of-Governance (PoG), slashing annual token issuance from 5% to 0.25%. This structural change:

  • Reduces sell pressure from inflation
  • Aligns rewards with governance participation
  • Strengthens value capture as network usage grows

Additionally, the Celestia Foundation announced a $62.5 million TIA buyback program in 2025, further reducing circulating supply.

Validator Economics

Effective January 2026, maximum validator commission increased from 10% to 20%. This addresses validators' rising operational expenses—particularly as block sizes grow—while maintaining competitive staking yields.

The Competitive Moat: First-Mover or Sustainable Advantage?

Celestia's 50% DA market share and 160+ GB of posted data represent clear traction. But moats in infrastructure can erode quickly.

Advantages

Framework Integration: Every major rollup framework—Arbitrum Orbit, OP Stack, Polygon CDK—supports Celestia as a DA option. This integration creates switching costs and reduces friction for new rollups.

Proven Scale: The 128 MB block testing provides confidence in future capacity that competitors haven't demonstrated at the same level.

Economic Alignment: The Proof-of-Governance tokenomics and buyback programs create stronger value capture than alternative models.

Challenges

EigenDA's Ethereum Alignment: For teams prioritizing Ethereum-native security, EigenDA's restaking model may be more attractive despite architectural trade-offs.

Avail's Cost Advantage: For cost-sensitive applications, Avail's lower fees may outweigh security differences.

Ethereum's Native Improvement: If Ethereum expands blob capacity significantly (as proposed in various roadmap discussions), the cost differential shrinks.

The Ecosystem Lock-in Question

Celestia's real moat may be ecosystem lock-in. Eclipse's 83+ GB of data creates path dependency—migrating to a different DA layer would require significant infrastructure changes. As more rollups accumulate history on Celestia, switching costs increase.

What the Data Tells Us

Celestia's blob economics validate the modular thesis: specialized infrastructure for data availability can be dramatically cheaper than general-purpose L1 solutions. The 55x cost advantage over Ethereum blobs isn't magic—it's the result of purpose-built architecture optimized for a specific function.

The 160+ GB of posted data proves market demand exists. The 10x growth in fee revenue demonstrates value capture. The scaling roadmap provides confidence in future capacity.

For rollup developers, the calculus is straightforward: Celestia offers the best-tested, most integrated DA solution with a clear path to gigabyte-scale capacity. EigenDA makes sense for Ethereum-native projects willing to accept DAC trust assumptions. Avail serves multichain applications prioritizing flexibility over maximum security.

The data availability market has room for multiple winners serving different segments. But Celestia's combination of proven scale, deep integrations, and improving tokenomics positions it well for the coming wave of rollup expansion.


Building rollups that need reliable data availability infrastructure? BlockEden.xyz provides RPC endpoints across 30+ networks including major L2s built on Celestia DA. Explore our API marketplace to access the infrastructure your modular stack needs.