Skip to main content

10 posts tagged with "crypto"

View All Tags

BASS 2025: Charting the Future of Blockchain Applications, from Space to Wall Street

· 8 min read
Dora Noda
Software Engineer

The Blockchain Application Stanford Summit (BASS) kicked off the week of the Science of Blockchain Conference (SBC), bringing together innovators, researchers, and builders to explore the cutting edge of the ecosystem. Organizers Gil, Kung, and Stephen welcomed attendees, highlighting the event's focus on entrepreneurship and real-world applications, a spirit born from its close collaboration with SBC. With support from organizations like Blockchain Builders and the Cryptography and Blockchain Alumni of Stanford, the day was packed with deep dives into celestial blockchains, the future of Ethereum, institutional DeFi, and the burgeoning intersection of AI and crypto.

Dalia Maliki: Building an Orbital Root of Trust with Space Computer

Dalia Maliki, a professor at UC Santa Barbara and an advisor to Space Computer, opened with a look at a truly out-of-this-world application: building a secure computing platform in orbit.

What is Space Computer? In a nutshell, Space Computer is an "orbital root of trust," providing a platform for running secure and confidential computations on satellites. The core value proposition lies in the unique security guarantees of space. "Once a box is launched securely and deployed into space, nobody can come later and hack into it," Maliki explained. "It's purely, perfectly tamper-proof at this point." This environment makes it leak-proof, ensures communications cannot be easily jammed, and provides verifiable geolocation, offering powerful decentralization properties.

Architecture and Use Cases The system is designed with a two-tier architecture:

  • Layer 1 (Celestial): The authoritative root of trust runs on a network of satellites in orbit, optimized for limited and intermittent communication.
  • Layer 2 (Terrestrial): Standard scaling solutions like rollups and state channels run on Earth, anchoring to the celestial Layer 1 for finality and security.

Early use cases include running highly secure blockchain validators and a true random number generator that captures cosmic radiation. However, Maliki emphasized the platform's potential for unforeseen innovation. "The coolest thing about building a platform is always that you build a platform and other people will come and build use cases that you never even dreamed of."

Drawing a parallel to the ambitious Project Corona of the 1950s, which physically dropped film buckets from spy satellites to be caught mid-air by aircraft, Maliki urged the audience to think big. "By comparison, what we work with today in space computer is a luxury, and we're very excited about the future."

Tomasz Stanczak: The Ethereum Roadmap - Scaling, Privacy, and AI

Tomasz Stanczak, Executive Director of the Ethereum Foundation, provided a comprehensive overview of Ethereum's evolving roadmap, which is heavily focused on scaling, enhancing privacy, and integrating with the world of AI.

Short-Term Focus: Supporting L2s The immediate priority for Ethereum is to solidify its role as the best platform for Layer 2s to build upon. Upcoming forks, Fusaka and Glumpsterdom, are centered on this goal. "We want to make much stronger statements that yes, [L2s] innovate, they extend Ethereum, and they will have a commitment from protocol builders that Layer 1 will support L2s in the best way possible," Stanczak stated.

Long-Term Vision: Lean Ethereum and Real-Time Proving Looking further ahead, the "Lean Ethereum" vision aims for massive scalability and security hardening. A key component is the ZK-EVM roadmap, which targets real-time proving with latencies under 10 seconds for 99% of blocks, achievable by solo stakers. This, combined with data availability improvements, could push L2s to a theoretical "10 million TPS." The long-term plan also includes a focus on post-quantum cryptography through hash-based signatures and ZK-EVMs.

Privacy and the AI Intersection Privacy is another critical pillar. The Ethereum Foundation has established the Privacy and Scaling Explorations (PSC) team to coordinate efforts, support tooling, and explore protocol-level privacy integrations. Stanczak sees this as crucial for Ethereum's interaction with AI, enabling use cases like censorship-resistant financial markets, privacy-preserving AI, and open-source agentic systems. He emphasized that Ethereum's culture of connecting multiple disciplines—from finance and art to robotics and AI—is essential for navigating the challenges and opportunities of the next decade.

Sreeram Kannan: The Trust Framework for Ambitious Crypto Apps with EigenCloud

Sreeram Kannan, founder of Eigen Labs, challenged the audience to think beyond the current scope of crypto applications, presenting a framework for understanding crypto's core value and introducing EigenCloud as a platform to realize this vision.

Crypto's Core Thesis: A Verifiability Layer "Underpinning all of this is a core thesis that crypto is the trust or verifiability layer on top of which you can build very powerful applications," Kannan explained. He introduced a "TAM vs. Trust" framework, illustrating that the total addressable market (TAM) for a crypto application grows exponentially as the trust it underwrites increases. Bitcoin's market grows as it becomes more trusted than fiat currencies; a lending platform's market grows as its guarantee of borrower solvency becomes more credible.

EigenCloud: Unleashing Programmability Kannan argued that the primary bottleneck for building more ambitious apps—like a decentralized Uber or trustworthy AI platforms—is not performance but programmability. To solve this, EigenCloud introduces a new architecture that separates application logic from token logic.

"Let's keep the token logic on-chain on Ethereum," he proposed, "but the application logic is moved outside. You can actually now write your core logic in arbitrary containers... execute them on any device of your choice, whether it's a CPU or a GPU... and then bring these results verifiably back on-chain."

This approach, he argued, extends crypto from a "laptop or server scale to cloud scale," allowing developers to build the truly disruptive applications that were envisioned in crypto's early days.

Panel: A Deep Dive into Blockchain Architecture

A panel featuring Leiyang from MegaETH, Adi from Realo, and Solomon from the Solana Foundation explored the trade-offs between monolithic, modular, and "super modular" architectures.

  • MegaETH (Modular L2): Leiyang described MegaETH's approach of using a centralized sequencer for extreme speed while delegating security to Ethereum. This design aims to deliver a Web2-level real-time experience for applications, reviving the ambitious "ICO-era" ideas that were previously limited by performance.
  • Solana (Monolithic L1): Solomon explained that Solana's architecture, with its high node requirements, is deliberately designed for maximum throughput to support its vision of putting all global financial activity on-chain. The current focus is on asset issuance and payments. On interoperability, Solomon was candid: "Generally speaking, we don't really care about interoperability... It's about getting as much asset liquidity and usage on-chain as possible."
  • Realo ("Super Modular" L1): Adi introduced Realo's "super modular" concept, which consolidates essential services like oracles directly into the base layer to reduce developer friction. This design aims to natively connect the blockchain to the real world, with a go-to-market focus on RWAs and making the blockchain invisible to end-users.

Panel: The Real Intersection of AI and Blockchain

Moderated by Ed Roman of HackVC, this panel showcased three distinct approaches to merging AI and crypto.

  • Ping AI (Bill): Ping AI is building a "personal AI" where users maintain self-custody of their data. The vision is to replace the traditional ad-exchange model. Instead of companies monetizing user data, Ping AI's system will reward users directly when their data leads to a conversion, allowing them to capture the economic value of their digital footprint.
  • Public AI (Jordan): Described as the "human layer of AI," Public AI is a marketplace for sourcing high-quality, on-demand data that can't be scraped or synthetically generated. It uses an on-chain reputation system and staking mechanisms to ensure contributors provide signal, not noise, rewarding them for their work in building better AI models.
  • Gradient (Eric): Gradient is creating a decentralized runtime for AI, enabling distributed inference and training on a network of underutilized consumer hardware. The goal is to provide a check on the centralizing power of large AI companies by allowing a global community to collaboratively train and serve models, retaining "intelligent sovereignty."

More Highlights from the Summit

  • Orin Katz (Starkware) presented building blocks for "compliant on-chain privacy," detailing how ZK-proofs can be used to create privacy pools and private tokens (ZRC20s) that include mechanisms like "viewing keys" for regulatory oversight.
  • Sam Green (Cambrian) gave an overview of the "Agentic Finance" landscape, categorizing crypto agents into trading, liquidity provisioning, lending, prediction, and information, and highlighted the need for fast, comprehensive, and verifiable data to power them.
  • Max Siegel (Privy) shared lessons from onboarding over 75 million users, emphasizing the need to meet users where they are, simplify product experiences, and let product needs inform infrastructure choices, not the other way around.
  • Nil Dalal (Coinbase) introduced the "Onchain Agentic Commerce Stack" and the open standard X42, a crypto-native protocol designed to create a "machine-payable web" where AI agents can seamlessly transact using stablecoins for data, APIs, and services.
  • Gordon Liao & Austin Adams (Circle) unveiled Circle Gateway, a new primitive for creating a unified USDC balance that is chain-abstracted. This allows for near-instant (<500ms) deployment of liquidity across multiple chains, dramatically improving capital efficiency for businesses and solvers.

The day concluded with a clear message: the foundational layers of crypto are maturing, and the focus is shifting decisively towards building robust, user-friendly, and economically sustainable applications that can bridge the gap between the on-chain world and the global economy.

How EigenLayer + Liquid Restaking Are Re‑pricing DeFi Yields in 2025

· 9 min read
Dora Noda
Software Engineer

For months, "restaking" was the hottest narrative in crypto, a story fueled by points, airdrops, and the promise of compounded yield. But narratives don't pay the bills. In 2025, the story has been replaced by something far more tangible: a functioning economic system with real cash flows, real risks, and a completely new way to price yield on-chain.

With key infrastructure like slashing now live and fee-generating services hitting their stride, the restaking ecosystem has finally matured. The hype cycle of 2024 has given way to the underwriting cycle of 2025. This is the moment where we move from chasing points to pricing risk.

Here’s the TL;DR on the state of play:

  • Restaking moved from narrative to cash flow. With slashing live on mainnet as of April 17, 2025, and the Rewards v2 governance framework in place, EigenLayer’s yield mechanics now include enforceable downside, clearer operator incentives, and increasingly fee-driven rewards.
  • Data availability got cheaper and faster. EigenDA, a major Actively Validated Service (AVS), slashed its prices by approximately 10x in 2024 and is on a path toward massive throughput. This is a big deal for the rollups that will actually pay AVSs and the operators securing them.
  • Liquid Restaking Tokens (LRTs) make the stack accessible, but add new risks. Protocols like Ether.fi (weETH), Renzo (ezETH), and Kelp DAO (rsETH) offer liquidity and convenience, but they also introduce new vectors for smart contract failures, operator selection risk, and market peg instability. We’ve already seen real depeg events, a stark reminder of these layered risks.

1) The 2025 Yield Stack: From Base Staking to AVS Fees

At its core, the concept is simple. Ethereum staking gives you a base yield for securing the network. Restaking, pioneered by EigenLayer, allows you to take that same staked capital (ETH or Liquid Staking Tokens) and extend its security to other third-party services, known as Actively Validated Services (AVSs). These can be anything from data availability layers and oracles to cross-chain bridges and specialized coprocessors. In return for this "borrowed" security, AVSs pay fees to the node operators and, ultimately, to the restakers who underwrite their operations. EigenLayer calls this a “marketplace for trust.”

In 2025, this marketplace matured significantly:

  • Slashing is in production. AVSs can now define and enforce conditions to penalize misbehaving node operators. This turns the abstract promise of security into a concrete economic guarantee. With slashing, "points" are replaced by enforceable risk/reward calculations.
  • Rewards v2 formalizes how rewards and fee distributions flow through the system. This governance-approved change brings much-needed clarity, aligning incentives between AVSs that need security, operators that provide it, and restakers who fund it.
  • Redistribution has started rolling out. This mechanism determines how slashed funds are handled, clarifying how losses and clawbacks are socialized across the system.

Why it matters: Once AVSs begin to generate real revenue and the penalties for misbehavior are credible, restaked yield becomes a legitimate economic product, not just a marketing story. The activation of slashing in April was the inflection point, completing the original vision for a system already securing billions in assets across dozens of live AVSs.


2) DA as a Revenue Engine: EigenDA’s Price/Performance Curve

If rollups are the primary customers for cryptoeconomic security, then data availability (DA) is where the near-term revenue lives. EigenDA, EigenLayer's flagship AVS, is the perfect case study.

  • Pricing: In August 2024, EigenDA announced a dramatic price cut of roughly 10x and introduced a free tier. This move makes it economically viable for more applications and rollups to post their data, directly increasing the potential fee flow to the operators and restakers securing the service.
  • Throughput: The project is on a clear trajectory for massive scale. While its mainnet currently supports around 10 MB/s, the public roadmap targets over 100 MB/s as the operator set expands. This signals that both capacity and economics are trending in the right direction for sustainable fee generation.

Takeaway: The combination of cheaper DA services and credible slashing creates a clear runway for AVSs to generate sustainable revenue from fees rather than relying on inflationary token emissions.


3) AVS, Evolving: From “Actively Validated” to “Autonomous Verifiable”

You may notice a subtle but important shift in terminology. AVSs are increasingly described not just as “Actively Validated Services” but as “Autonomous Verifiable Services.” This change in language emphasizes systems that can prove their correct behavior cryptographically and enforce consequences automatically, rather than simply being monitored. This framing pairs perfectly with the new reality of live slashing and programmatic operator selection, pointing to a future of more robust and trust-minimized infrastructure.


4) How You Participate

For the average DeFi user or institution, there are three common ways to engage with the restaking ecosystem, each with distinct trade-offs.

  • Native restaking

    • How it works: You restake your native ETH (or other approved assets) directly on EigenLayer and delegate to an operator of your choice.
    • Pros: You have maximum control over your operator selection and which AVSs you are securing.
    • Cons: This approach comes with operational overhead and requires you to do your own due diligence on operators. You shoulder all the selection risk yourself.
  • LST → EigenLayer (Liquid restaking without a new token)

    • How it works: You take your existing Liquid Staking Tokens (LSTs) like stETH, rETH, or cbETH and deposit them into EigenLayer strategies.
    • Pros: You can reuse your existing LSTs, keeping your exposure relatively simple and building on a familiar asset.
    • Cons: You are stacking protocol risks. A failure in the underlying LST, EigenLayer, or the AVSs you secure could result in losses.
  • LRTs (Liquid Restaking Tokens)

    • How it works: Protocols issue tokens like weETH (wrapping eETH), ezETH, and rsETH that bundle the entire restaking process—delegation, operator management, and AVS selection—into a single, liquid token you can use across DeFi.
    • Pros: The primary benefits are convenience and liquidity.
    • Cons: This convenience comes with added layers of risk, including the LRT's own smart contracts and the peg risk of the token on secondary markets. The depeg of ezETH in April 2024, which triggered a cascade of liquidations, serves as a real-world reminder that LRTs are leveraged exposures to multiple interconnected systems.

5) Risk, Repriced

Restaking’s promise is higher yield for performing real work. Its risks are now equally real.

  • Slashing & policy risk: Slashing is live, and AVSs can define custom, and sometimes complex, conditions for penalties. It is critical to understand the quality of the operator set you are exposed to and how disputes or appeals are handled.
  • Peg & liquidity risk in LRTs: Secondary markets can be volatile. As we've already seen, sharp dislocations between an LRT and its underlying assets can and do happen. You must build in buffers for liquidity crunches and conservative collateral factors when using LRTs in other DeFi protocols.
  • Smart-contract & strategy risk: You are stacking multiple smart contracts on top of each other (LST/LRT + EigenLayer + AVSs). The quality of audits and the power of governance over protocol upgrades are paramount.
  • Throughput/economics risk: AVS fees are not guaranteed; they depend entirely on usage. While DA price cuts are a positive catalyst, sustained demand from rollups and other applications is the ultimate engine of restaking yield.

6) A Simple Framework to Value Restaked Yield

With these dynamics in play, you can now think about the expected return on restaking as a simple stack:

Expected Return=(Base Staking Yield)+(AVS Fees)(Expected Slashing Loss)(Frictions)\text{Expected Return} = (\text{Base Staking Yield}) + (\text{AVS Fees}) - (\text{Expected Slashing Loss}) - (\text{Frictions})

Let's break that down:

  • Base staking yield: The standard return from securing Ethereum.
  • AVS fees: The additional yield paid by AVSs, weighted by your specific operator and AVS allocation.
  • Expected slashing loss: This is the crucial new variable. You can estimate it as: probability of a slashable event × penalty size × your exposure.
  • Frictions: These include protocol fees, operator fees, and any liquidity haircuts or peg discounts if you are using an LRT.

You will never have perfect inputs for this formula, but forcing yourself to estimate the slashing term, even conservatively, will keep your portfolio honest. The introduction of Rewards v2 and Redistribution makes this calculation far less abstract than it was a year ago.


7) Playbooks for 2025 Allocators

  • Conservative

    • Prefer native restaking or direct LST restaking strategies.
    • Delegate only to diversified, high-uptime operators with transparent, well-documented AVS security policies.
    • Focus on AVSs with clear, understandable fee models, such as those providing data availability or core infrastructure services.
  • Balanced

    • Use a mix of direct LST restaking and select LRTs that have deep liquidity and transparent disclosures about their operator sets.
    • Cap your exposure to any single LRT protocol and actively monitor peg spreads and on-chain liquidity conditions.
  • Aggressive

    • Utilize LRT-heavy baskets to maximize liquidity and target smaller, potentially higher-growth AVSs or newer operator sets for higher upside.
    • Explicitly budget for potential slashing or depeg events. Avoid using leverage on top of LRTs unless you have thoroughly modeled the impact of a significant depeg.

8) What to Watch Next

  • AVS revenue turn-on: Which services are actually generating meaningful fee revenue? Keep an eye on DA-adjacent and core infrastructure AVSs, as they are likely to lead the pack.
  • Operator stratification: Over the next two to three quarters, slashing and the Rewards v2 framework should begin to separate best-in-class operators from the rest. Performance and reliability will become key differentiators.
  • The "Autonomous Verifiable" trend: Watch for AVS designs that lean more heavily on cryptographic proofs and automated enforcement. These are likely to be the most robust and fee-worthy services in the long run.

9) A Note on Numbers (and Why They’ll Change)

You will encounter different throughput and TVL figures across various sources and dates. For instance, EigenDA's own site may reference both its current mainnet support of around 10 MB/s and its future roadmap targeting 100+ MB/s. This reflects the dynamic nature of a system that is constantly evolving as operator sets grow and software improves. Always check the dates and context of any data before anchoring your financial models to it.


Bottom Line

2024 was the hype cycle. 2025 is the underwriting cycle. With slashing live and AVS fee models becoming more compelling, restaking yields are finally becoming priceable—and therefore, truly investable. For sophisticated DeFi users and institutional treasuries willing to do the homework on operators, AVSs, and LRT liquidity, restaking has evolved from a promising narrative into a core component of the on-chain economy.


This article is for informational purposes only and is not financial advice.

What Are Crypto Airdrops? A Concise Guide for Builders and Users (2025 Edition)

· 12 min read
Dora Noda
Software Engineer

TL;DR

A crypto airdrop is a distribution of tokens to specific wallet addresses—often for free—to bootstrap a network, decentralize ownership, or reward early community members. Popular methods include retroactive rewards for past actions, points-to-token conversions, drops for NFT or token holders, and interactive "quest" campaigns. The devil is in the details: snapshot rules, claim mechanics like Merkle proofs, Sybil resistance, clear communication, and legal compliance are critical for success. For users, the value is tied to tokenomics and safety. For teams, a successful airdrop must align with core product goals, not just generate temporary hype.


What is an airdrop—really?

At its core, a crypto airdrop is a marketing and distribution strategy where a project sends its native token to the wallets of a specific group of users. This isn't just a giveaway; it’s a calculated move to achieve specific goals. As defined by educational resources from Coinbase and Binance Academy, airdrops are commonly used when a new network, DeFi protocol, or dApp wants to rapidly build a user base. By giving tokens to potential users, projects can incentivize them to participate in governance, provide liquidity, test new features, or simply become active members of the community, kickstarting the network effect.

Where airdrops show up in the wild

Airdrops come in several flavors, each with a different strategic purpose. Here are the most common models seen in the wild today.

Retroactive (reward past behavior)

This is the classic model, designed to reward early adopters who used a protocol before it had a token. Uniswap’s 2020 airdrop is the definitive example, setting the modern template by distributing 400UNI400 UNI tokens to every address that had ever interacted with the protocol. It was a powerful "thank you" that turned users into owners overnight.

Points → token (incentives first, token later)

A dominant trend in 2024 and 2025, the points model gamifies participation. Projects track user actions—like bridging, swapping, or staking—and award off-chain "points." Later, these points are converted into a token allocation. This approach allows teams to measure and incentivize desired behaviors over a longer period before committing to a token launch.

Holder/NFT drops

This type of airdrop targets users who already hold a specific token or NFT. It’s a way to reward loyalty within an existing ecosystem or to bootstrap a new project with an engaged community. A famous case is ApeCoin, which granted claim rights for its $APE token to Bored Ape and Mutant Ape Yacht Club NFT holders upon its launch in 2022.

Ecosystem/governance programs

Some projects use a series of airdrops as part of a long-term strategy for decentralization and community growth. Optimism, for example, has conducted multiple airdrops for users, while also reserving a significant portion of its token supply for public goods funding through its RetroPGF program. This demonstrates a commitment to building a sustainable and value-aligned ecosystem.

How an airdrop works (mechanics that matter)

The difference between a successful airdrop and a chaotic one often comes down to technical and strategic execution. Here are the mechanics that truly matter.

Snapshot & eligibility

First, a project must decide who qualifies. This involves choosing a snapshot—a specific block height or date—after which user activity will no longer be counted. Eligibility criteria are then defined based on behaviors the project wants to reward, such as bridging funds, executing swaps, providing liquidity, participating in governance, or even contributing code. For its airdrop, Arbitrum collaborated with the analytics firm Nansen to develop a sophisticated distribution model based on a snapshot taken at a specific block on February 6, 2023.

Claim vs. direct send

While sending tokens directly to wallets seems simpler, most mature projects use a claim-based flow. This prevents tokens from being sent to lost or compromised addresses and requires users to actively engage. The most common pattern is a Merkle Distributor. A project publishes a cryptographic fingerprint (a Merkle root) of the eligible addresses on-chain. Each user can then generate a unique "proof" to verify their eligibility and claim their tokens. This method, popularized by Uniswap’s open-source implementation, is gas-efficient and secure.

Sybil resistance

Airdrops are a prime target for "farmers"—individuals who use hundreds or thousands of wallets (a "Sybil attack") to maximize their rewards. Teams employ various methods to combat this. These include using analytics to cluster wallets controlled by a single entity, applying heuristics (like wallet age or activity diversity), and, more recently, implementing self-reporting programs. LayerZero’s 2024 campaign introduced a widely discussed model where users were given a chance to self-report Sybil activity for a 15% allocation; those who didn't and were later caught faced exclusion.

Release schedule & governance

Not all tokens from an airdrop are immediately available. Many projects implement a gradual release schedule (or vesting period) for allocations given to the team, investors, and ecosystem funds. Understanding this schedule is crucial for users to gauge future supply pressure on the market. Platforms like TokenUnlocks provide public dashboards that track these release timelines across hundreds of assets.

Case studies (fast facts)

  • Uniswap (2020): Distributed 400UNI400 UNI per eligible address, with larger allocations for liquidity providers. It established the claim-based Merkle proof model as the industry standard and demonstrated the power of rewarding a community retroactively.
  • Arbitrum (2023): Launched its L2 governance token, $ARB, with an initial supply of 10 billion. The airdrop used a points system based on on-chain activity before a February 6, 2023 snapshot, incorporating advanced analytics and Sybil filters from Nansen.
  • Starknet (2024): Branded its airdrop as the "Provisions Program," with claims opening on February 20, 2024. It targeted a broad range of contributors, including early users, network developers, and even Ethereum stakers, offering a multi-month window to claim.
  • ZKsync (2024): Announced on June 11, 2024, this was one of the largest Layer 2 user distributions to date. A one-time airdrop distributed 17.5% of the total token supply to nearly 700,000 wallets, rewarding the protocol's early community.

Why teams airdrop (and when they shouldn’t)

Teams leverage airdrops for several strategic reasons:

  • Kickstart a two-sided network: Airdrops can seed a network with the necessary participants, whether they are liquidity providers, traders, creators, or restakers.
  • Decentralize governance: Distributing tokens to a wide base of active users is a foundational step toward credible decentralization and community-led governance.
  • Reward early contributors: For projects that didn't conduct an ICO or token sale, an airdrop is the primary way to reward the early believers who provided value when the outcome was uncertain.
  • Signal values: An airdrop’s design can communicate a project’s core principles. Optimism's focus on public goods funding is a prime example of this.

However, airdrops are not a silver bullet. Teams should not conduct an airdrop if the product has poor retention, the community is weak, or the token's utility is poorly defined. An airdrop amplifies existing positive feedback loops; it cannot fix a broken product.

For users: how to evaluate and participate—safely

Airdrops can be lucrative, but they also carry significant risks. Here’s how to navigate the landscape safely.

Before you chase a drop

  • Check legitimacy: Always verify airdrop announcements through the project’s official channels (website, X account, Discord). Be extremely wary of "claim" links sent via DMs, found in ads, or promoted by unverified accounts.
  • Map the economics: Understand the tokenomics. What is the total supply? What percentage is allocated to users? What is the vesting schedule for insiders? Tools like TokenUnlocks can help you track future supply releases.
  • Know the style: Is it a retroactive drop rewarding past behavior, or a points program that requires ongoing participation? The rules for each are different, and points programs can change their criteria over time.

Wallet hygiene

  • Use a fresh wallet: When possible, use a dedicated, low-value "burner" wallet for claiming airdrops. This isolates the risk from your main holdings.
  • Read what you sign: Never blindly approve transactions. Malicious sites can trick you into signing permissions that allow them to drain your assets. Use wallet simulators to understand a transaction before signing. Periodically review and revoke stale approvals using tools like Revoke.cash.
  • Be cautious with off-chain signatures: Scammers increasingly abuse Permit and Permit2 signatures, which are off-chain approvals that can be used to move your assets without an on-chain transaction. Be just as careful with these as you are with on-chain approvals.

Common risks

  • Phishing & drainers: The most common risk is interacting with a fake "claim" site designed to drain your wallet. Research from firms like Scam Sniffer shows that sophisticated drainer kits were responsible for massive losses in 2023–2025.
  • Geofencing & KYC: Some airdrops may have geographic restrictions or require Know Your Customer (KYC) verification. Always read the terms and conditions, as residents of certain countries may be excluded.
  • Taxes (quick orientation, not advice): Tax treatment varies by jurisdiction. In the US, the IRS generally treats airdropped tokens as taxable income at their fair market value on the date you gain control of them. In the UK, HMRC may view an airdrop as income if you performed an action to receive it. Disposing of the tokens later can trigger Capital Gains Tax. Consult a qualified professional.

For teams: a pragmatic airdrop design checklist

Planning an airdrop? Here’s a checklist to guide your design process.

  1. Clarify the objective: What are you trying to achieve? Reward real usage, decentralize governance, seed liquidity, or fund builders? Define your primary goal and make the target behavior explicit.
  2. Set eligibility that mirrors your product: Design criteria that reward sticky, high-quality users. Weight actions that correlate with retention (e.g., time-weighted balances, consistent trading) over simple volume, and consider capping rewards for whales. Study public post-mortems from major airdrops on platforms like Nansen.
  3. Build in Sybil resistance: Don't rely on a single method. Combine on-chain heuristics (wallet age, activity diversity) with clustering analytics. Consider novel approaches like the community-assisted reporting model pioneered by LayerZero.
  4. Ship a robust claim path: Use a battle-tested Merkle Distributor contract. Publish the full dataset and Merkle tree so that anyone can independently verify the root and their own eligibility. Keep the claim UI minimal, audited, and rate-limited to handle traffic spikes without overwhelming your RPC endpoints.
  5. Communicate the release plan: Be transparent about the total token supply, allocations for different recipient groups (community, team, investors), and future release events. Public dashboards build trust and support healthier market dynamics.
  6. Address governance, legal, and tax: Align the token’s on-chain capabilities (voting, fee sharing, staking) with your long-term roadmap. Seek legal counsel regarding jurisdictional restrictions and necessary disclosures. As the IRS and HMRC guidance shows, details matter.

Quick glossary

  • Snapshot: A specific block or time used as a cutoff to determine who is eligible for an airdrop.
  • Claim (Merkle): A gas-efficient, proof-based method that allows eligible users to pull their token allocation from a smart contract.
  • Sybil: A scenario where one actor uses many wallets to game a distribution. Teams use filtering techniques to detect and remove them.
  • Points: Off-chain or on-chain tallies that track user engagement. They often convert to tokens later, but the criteria can be subject to change.
  • Release schedule: The timeline detailing how and when non-circulating tokens (e.g., team or investor allocations) enter the market.

Builder’s corner: how BlockEden can help

Launching an airdrop is a massive undertaking. BlockEden provides the infrastructure to ensure you ship it responsibly and effectively.

  • Reliable snapshots: Use our high-throughput RPC and indexing services to compute eligibility across millions of addresses and complex criteria, on any chain.
  • Claim infra: Get expert guidance on designing and implementing Merkle claim flows and gas-efficient distribution contracts.
  • Sybil ops: Leverage our data pipelines to run heuristics, perform clustering analysis, and iterate on your exclusion list before finalizing your distribution.
  • Launch support: Our infrastructure is built for scale. With built-in rate-limits, automatic retries, and real-time monitoring, you can ensure claim day doesn’t melt your endpoints.

Frequently asked (fast answers)

Is an airdrop “free money”? No. It’s a distribution tied to specific behaviors, market risks, potential tax liabilities, and security considerations. It's an incentive, not a gift.

Why didn’t I get one? Most likely, you either missed the snapshot date, didn't meet the minimum activity thresholds, or were filtered out by the project's Sybil detection rules. Legitimate projects usually publish their criteria; read them closely.

Should teams leave claims open forever? It varies. Uniswap’s claim contract remains open years later, but many modern projects set a deadline (e.g., 3-6 months) to simplify accounting, recover unclaimed tokens for the treasury, and reduce long-term security maintenance. Choose a policy and document it clearly.

Further reading (primary sources)

Momentary Custody, Long-Term Compliance: A Playbook for Crypto-Payment Founders

· 6 min read
Dora Noda
Software Engineer

If you’re building a crypto payments platform, you might have told yourself, “My platform only touches customer funds for a few seconds. That doesn’t really count as custody, right?”

This is a dangerous assumption. To financial regulators worldwide, even momentary control over customer funds makes you a financial intermediary. That brief touch—even for a few seconds—triggers a long-term compliance burden. For founders, understanding the substance of regulation, not just the technical implementation of your code, is critical for survival.

This playbook offers a clear guide to help you make smart, strategic decisions in a complex regulatory landscape.

1. Why “Just a Few Seconds” Still Triggers Money-Transmission Rules

The core of the issue is how regulators define control. The U.S. Financial Crimes Enforcement Network (FinCEN) is unequivocal: anyone who “accepts and transmits convertible virtual currency” is classified as a money transmitter, regardless of how long the funds are held.

This standard was reaffirmed in FinCEN’s 2019 CVC guidance and again in the 2023 DeFi risk assessment.

Once your platform meets this definition, you face a host of demanding requirements, including:

  • Federal MSB registration: Registering as a Money Services Business with the U.S. Department of the Treasury.
  • A written AML program: Establishing and maintaining a comprehensive Anti-Money Laundering program.
  • CTR/SAR filing: Filing Currency Transaction Reports (CTRs) and Suspicious Activity Reports (SARs).
  • Travel-Rule data exchange: Exchanging originator and beneficiary information for certain transfers.
  • Ongoing OFAC screening: Continuously screening users against sanctions lists.

2. Smart Contracts ≠ Immunity

Many founders believe that automating processes with smart contracts provides a safe harbor from custodial obligations. However, regulators apply a functional test: they judge based on who has effective control, not how the code is written.

The Financial Action Task Force (FATF) made this clear in its 2023 targeted update, stating that “marketing terms or self-identification as DeFi is not determinative” of regulatory status.

If you (or a multisig you control) can perform any of the following actions, you are the custodian:

  • Upgrade a contract via an admin key.
  • Pause or freeze funds.
  • Sweep funds through a batch-settlement contract.

Only contracts with no admin key and direct user-signed settlement may avoid the Virtual Asset Service Provider (VASP) label—and even then, you still need to integrate sanctions screening at the UI layer.

3. The Licensing Map at a Glance

The path to compliance varies dramatically across jurisdictions. Here is a simplified overview of the global licensing landscape.

RegionCurrent GatekeeperPractical Hurdle
U.S.FinCEN + State MTMA licencesDual layer, costly surety bonds, and audits. 31 states have adopted the Money Transmission Modernization Act (MTMA) so far.
EU (today)National VASP registersMinimal capital requirements, but passporting rights are limited until MiCA is fully implemented.
EU (2026)MiCA CASP licence€125k–€150k capital requirement, but offers a single-passport regime for all 27 EU markets.
UKFCA crypto-asset registerRequires a full AML program and a Travel Rule-compliant interface.
SG / HKPSA (MAS) / VASP OrdinanceMandates custody segregation and a 90% cold-wallet rule for customer assets.

4. Case Study: BoomFi’s Poland VASP Route

BoomFi’s strategy provides an excellent model for startups targeting the EU. The company registered with the Polish Ministry of Finance in November 2023, securing a VASP registration.

Why it works:

  • Fast and low-cost: The approval process took less than 60 days and had no hard capital floor.
  • Builds credibility: The registration signals compliance and is a key requirement for EU merchants who need to work with a VASP-of-record.
  • Smooth path to MiCA: This VASP registration can be upgraded to a full MiCA CASP license in-place, preserving the existing customer base.

This lightweight approach allowed BoomFi to gain early market access and validate its product while preparing for the more rigorous MiCA framework and a future U.S. rollout.

5. De-risking Patterns for Builders

Compliance shouldn’t be an afterthought. It must be woven into your product design from day one. Here are several patterns that can minimize your licensing exposure.

Wallet Architecture

  • User-signed, contract-forwarding flows: Use patterns like ERC-4337 Paymasters or Permit2 to ensure all fund movements are explicitly signed and initiated by the user.
  • Time-lock self-destruct of admin keys: After the contract is audited and deployed, use a time-lock to permanently renounce admin privileges, proving you no longer have control.
  • Shard custody with licensed partners: For batch settlements, partner with a licensed custodian to handle the aggregation and disbursement of funds.

Operational Stack

  • Pre-transaction screening: Use an API gateway that injects OFAC and chain-analysis scores to vet addresses before a transaction is ever processed.
  • Travel Rule messenger: For cross-VASP transfers of $1,000 or more, integrate a solution like TRP or Notabene to handle required data exchange.
  • KYB first, then KYC: Vet the merchant (Know Your Business) before you onboard their users (Know Your Customer).

Expansion Sequencing

  1. Europe via VASP: Start in Europe with a national VASP registration (e.g., Poland) or a UK FCA registration to prove product-market fit.
  2. U.S. via partners: While state licenses are pending, enter the U.S. market by partnering with a licensed sponsor bank or custodial institution.
  3. MiCA CASP: Upgrade to a MiCA CASP license to lock in the EU passport for 27 markets.
  4. Asia-Pac: Pursue a license in Singapore (MAS) or Hong Kong (VASP Ordinance) if volume and strategic goals justify the additional capital outlay.

Key Takeaways

For every founder in the crypto-payments space, remember these core principles:

  1. Control trumps code: Regulators look at who can move money, not how the code is structured.
  2. Licensing is strategy: A lightweight EU VASP can open doors while you prepare for more capital-intensive jurisdictions.
  3. Design for compliance early: Admin-free contracts and sanction-aware APIs buy you runway and investor confidence.

Build like you will one day be inspected—because if you move customer funds, you will.

The Copy-Paste Crime: How a Simple Habit is Draining Millions from Crypto Wallets

· 5 min read
Dora Noda
Software Engineer

When you send crypto, what’s your routine? For most of us, it involves copying the recipient's address from our transaction history. After all, nobody can memorize a 40-character string like 0x1A2b...8f9E. It's a convenient shortcut we all use.

But what if that convenience is a carefully laid trap?

A devastatingly effective scam called Blockchain Address Poisoning is exploiting this exact habit. Recent research from Carnegie Mellon University has uncovered the shocking scale of this threat. In just two years, on the Ethereum and Binance Smart Chain (BSC) networks alone, scammers have made over 270 million attack attempts, targeting 17 million victims and successfully stealing at least $83.8 million.

This isn't a niche threat; it's one of the largest and most successful crypto phishing schemes operating today. Here’s how it works and what you can do to protect yourself.


How the Deception Works 🤔

Address poisoning is a game of visual trickery. The attacker’s strategy is simple but brilliant:

  1. Generate a Lookalike Address: The attacker identifies a frequent address you send funds to. They then use powerful computers to generate a new crypto address that has the exact same starting and ending characters. Since most wallets and block explorers shorten addresses for display (e.g., 0x1A2b...8f9E), their fraudulent address looks identical to the real one at a glance.

  2. "Poison" Your Transaction History: Next, the attacker needs to get their lookalike address into your wallet's history. They do this by sending a "poison" transaction. This can be:

    • A Tiny Transfer: They send you a minuscule amount of crypto (like $0.001) from their lookalike address. It now appears in your list of recent transactions.
    • A Zero-Value Transfer: In a more cunning move, they exploit a feature in many token contracts to create a fake, zero-dollar transfer that looks like it came from you to their lookalike address. This makes the fake address seem even more legitimate, as it appears you've sent funds there before.
    • A Counterfeit Token Transfer: They create a worthless, fake token (e.g., "USDTT" instead of USDT) and fake a transaction to their lookalike address, often mimicking the amount of a previous real transaction you made.
  3. Wait for the Mistake: The trap is now set. The next time you go to pay a legitimate contact, you scan your transaction history, see what you believe is the correct address, copy it, and hit send. By the time you realize your mistake, the funds are gone. And thanks to the irreversible nature of blockchain, there's no bank to call and no way to get them back.


A Glimpse into a Criminal Enterprise 🕵️‍♂️

This isn't the work of lone hackers. The research reveals that these attacks are carried out by large, organized, and highly profitable criminal groups.

Who They Target

Attackers don't waste their time on small accounts. They systematically target users who are:

  • Wealthy: Holding significant balances in stablecoins.
  • Active: Conducting frequent transactions.
  • High-Value Transactors: Moving large sums of money.

A Hardware Arms Race

Generating a lookalike address is a brute-force computational task. The more characters you want to match, the exponentially harder it gets. Researchers found that while most attackers use standard CPUs to create moderately convincing fakes, the most sophisticated criminal group has taken it to another level.

This top-tier group has managed to generate addresses that match up to 20 characters of a target's address. This feat is nearly impossible with standard computers, leading researchers to conclude they are using massive GPU farms—the same kind of powerful hardware used for high-end gaming or AI research. This shows a significant financial investment, which they easily recoup from their victims. These organized groups are running a business, and business is unfortunately booming.


How to Protect Your Funds 🛡️

While the threat is sophisticated, the defenses are straightforward. It all comes down to breaking bad habits and adopting a more vigilant mindset.

  1. For Every User (This is the most important part):

    • VERIFY THE FULL ADDRESS. Before you click "Confirm," take five extra seconds to manually check the entire address, character by character. Do not just glance at the first and last few digits.
    • USE AN ADDRESS BOOK. Save trusted, verified addresses to your wallet's address book or contact list. When sending funds, always select the recipient from this saved list, not from your dynamic transaction history.
    • SEND A TEST TRANSACTION. For large or important payments, send a tiny amount first. Confirm with the recipient that they have received it before sending the full sum.
  2. A Call for Better Wallets:

    • Wallet developers can help by improving user interfaces. This includes displaying more of the address by default or adding strong, explicit warnings when a user is about to send funds to an address they've only interacted with via a tiny or zero-value transfer.
  3. The Long-Term Fix:

    • Systems like the Ethereum Name Service (ENS), which allow you to map a human-readable name like yourname.eth to your address, can eliminate this problem entirely. Broader adoption is key.

In the decentralized world, you are your own bank, which also means you are your own head of security. Address poisoning is a silent but powerful threat that preys on convenience and inattention. By being deliberate and double-checking your work, you can ensure your hard-earned assets don't end up in a scammer's trap.

The Great Crypto Checkout Gap: Why Accepting Bitcoin on Shopify Is Still a Pain

· 9 min read
Dora Noda
Software Engineer

The gap between the promise of crypto payments and the reality for e-commerce merchants remains surprisingly wide. Here's why—and where the opportunities lie for founders and builders.

Despite cryptocurrency's rise in mainstream awareness, accepting crypto payments on leading e-commerce platforms like Shopify remains far more complicated than it should be. The experience is fragmented for merchants, confusing for customers, and limiting for developers—even as demand for crypto payment options continues to grow.

After speaking with merchants, analyzing user flows, and reviewing the current plugin ecosystem, I've mapped the problem space to identify where entrepreneurial opportunities exist. The punchline? The current solutions leave much to be desired, and the startup that solves these pain points could capture significant value in the emerging crypto-commerce landscape.

The Merchant's Dilemma: Too Many Hoops, Too Little Integration

For Shopify merchants, accepting crypto presents an immediate set of challenges:

Restrictive Integration Options — Unless you've upgraded to Shopify Plus (starting at $2,000/month), you cannot add custom payment gateways directly. You're limited to the few crypto payment providers Shopify has formally approved, which may not support the currencies or features you want.

The Third-Party "Tax" — Shopify charges an additional 0.5% to 2% fee on transactions processed through external payment gateways—effectively penalizing merchants for accepting crypto. This fee structure actively discourages adoption, especially for small merchants with tight margins.

The Multi-Platform Headache — Setting up crypto payments means juggling multiple accounts. You'll need to create an account with the payment provider, complete their business verification process, configure API keys, and then connect everything to Shopify. Each provider has its own dashboard, reporting, and settlement schedule, creating an administrative maze.

Refund Purgatory — Perhaps the most glaring issue: Shopify does not support automatic refunds for cryptocurrency payments. While credit card refunds can be issued with a click, crypto refunds require merchants to manually arrange payments through the gateway or send crypto back to the customer's wallet. This error-prone process creates friction in a critical part of the customer relationship.

A merchant I spoke with put it bluntly: "I was excited to accept Bitcoin, but after going through the setup and handling my first refund request, I almost turned it off. The only reason I kept it was that a handful of my best customers prefer paying this way."

The Customer Experience Is Still Web1 in a Web3 World

When customers attempt to pay with crypto on Shopify stores, they encounter a user experience that feels distinctly behind the times:

The Redirect Shuffle — Unlike the seamless in-line credit card forms or one-click wallets like Shop Pay, selecting crypto payment typically redirects customers to an external checkout page. This jarring transition breaks the flow, creates trust issues, and increases abandonment rates.

The Countdown Timer of Doom — After selecting a cryptocurrency, customers are presented with a payment address and a ticking clock (typically 15 minutes) to complete the transaction before the payment window expires. This pressure-inducing timer exists because of price volatility, but it creates anxiety and frustration, especially for crypto newcomers.

The Mobile Maze — Making crypto payments on mobile devices is particularly cumbersome. If a customer needs to scan a QR code displayed on their phone with their wallet app (which is also on their phone), they're stuck in an impossible situation. Some integrations offer workarounds, but they're rarely intuitive.

The "Where's My Order?" Moment — After sending crypto, customers often face an uncertain wait. Unlike credit card transactions that confirm instantly, blockchain confirmations can take minutes (or longer). This leaves customers wondering if their order went through or if they need to try again—a recipe for support tickets and abandoned carts.

The Developer's Straitjacket

Developers hoping to improve this situation face their own set of constraints:

Shopify's Walled Garden — Unlike open platforms like WooCommerce or Magento where developers can freely create payment plugins, Shopify tightly controls who can integrate with their checkout. This limitation stifles innovation and keeps promising solutions off the platform.

Limited Checkout Customization — On standard Shopify plans, developers cannot modify the checkout UI to make crypto payments more intuitive. There's no way to add explainer text, custom buttons, or Web3 wallet connection interfaces within the checkout flow.

The Compatibility Treadmill — When Shopify updates its checkout or payment APIs, third-party integrations must adapt quickly. In 2022, a platform change forced several crypto payment providers to rebuild their integrations, leaving merchants scrambling when their payment options suddenly stopped working.

A developer I interviewed who built crypto payment solutions for both WooCommerce and Shopify noted: "On WooCommerce, I can build exactly what merchants need. On Shopify, I'm constantly fighting the platform limitations—and that's before we even get to the technical challenges of blockchain integration."

Current Solutions: A Fragmented Landscape

Shopify currently supports several crypto payment providers, each with their own limitations:

BitPay offers automatic conversion to fiat and supports about 14 cryptocurrencies, but charges a 1% processing fee and has its own KYC requirements for merchants.

Coinbase Commerce allows merchants to accept major cryptocurrencies, but doesn't automatically convert to fiat, leaving merchants to manage volatility. Refunds must be handled manually outside their dashboard.

Crypto.com Pay advertises zero transaction fees and supports 20+ cryptocurrencies, but works best for customers already in the Crypto.com ecosystem.

DePay takes a Web3 approach, allowing customers to pay with any token that has DEX liquidity, but requires customers to use Web3 wallets like MetaMask—a significant barrier for mainstream shoppers.

Other options include specialty providers like OpenNode (Bitcoin and Lightning), Strike (Lightning for US merchants), and Lunu (focused on European luxury retail).

The common thread? No single provider offers a comprehensive solution that delivers the simplicity, flexibility, and user experience that merchants and customers expect in 2025.

Where the Opportunities Lie

These gaps in the market create several promising opportunities for founders and builders:

1. The Universal Crypto Checkout

There's room for a "meta-gateway" that aggregates multiple payment providers under a single, cohesive interface. This would give merchants one integration point while offering customers their choice of cryptocurrency, with the system intelligently routing payments through the optimal provider. By abstracting the complexity, such a solution could dramatically simplify the merchant experience while improving conversion rates.

2. The Seamless Wallet Integration

The current disconnected experience—where customers are redirected to external pages—is ripe for disruption. A solution that enables in-checkout crypto payments via WalletConnect or browser wallet integration could eliminate redirects entirely. Imagine clicking "Pay with Crypto" and having your browser wallet pop up directly, or scanning a QR code that immediately connects to your mobile wallet without leaving the checkout page.

3. The Instant Confirmation Service

The lag between payment submission and blockchain confirmation is a major friction point. An innovative approach would be a payment guarantee service that fronts the payment to the merchant instantly (allowing immediate order processing) while handling blockchain confirmation in the background. By taking on settlement risk for a small fee, such a service could make crypto payments feel as immediate as credit cards.

4. The Refund Resolver

The lack of automated refunds is perhaps the most glaring gap in the current ecosystem. A platform that simplifies crypto refunds—perhaps through a combination of smart contracts, escrow systems, and user-friendly interfaces—could remove a major pain point for merchants. Ideally, it would enable one-click refunds that handle all the complexity of sending crypto back to customers.

5. The Crypto Accountant

Tax and accounting complexity remains a significant barrier for merchants accepting crypto. A specialized solution that integrates with Shopify and crypto wallets to automatically track payment values, calculate gains/losses, and generate tax reports could transform a headache into a selling point. By making compliance simple, such a tool could encourage more merchants to accept crypto.

The Big Picture: Beyond Payments

Looking ahead, the real opportunity may extend beyond simply fixing the current checkout experience. The most successful solutions will likely leverage crypto's unique properties to offer capabilities that traditional payment methods cannot match:

Borderless Commerce — True global reach without currency exchange complications, enabling merchants to sell to underbanked regions or countries with unstable currencies.

Programmable Loyalty — NFT-based loyalty programs that provide special benefits to repeat customers who pay in crypto, creating stickier customer relationships.

Decentralized Escrow — Smart contracts that hold funds until delivery is confirmed, balancing the interests of both merchants and customers without requiring a trusted third party.

Token-Gated Exclusivity — Special products or early access for customers who hold specific tokens, creating new business models for premium merchants.

The Bottom Line

The current state of crypto checkout on Shopify reveals a striking gap between the promise of digital currency and its practical implementation in e-commerce. Despite mainstream interest in cryptocurrencies, the experience of using them for everyday purchases remains needlessly complex.

For entrepreneurs, this gap represents a significant opportunity. The startup that can deliver a truly seamless crypto payment experience—one that feels as easy as credit cards for both merchants and customers—stands to capture substantial value as digital currency adoption continues to grow.

The blueprint is clear: abstract away the complexity, eliminate redirects, solve the confirmation lag, simplify refunds, and integrate natively with the platforms merchants already use. Execution remains challenging due to technical complexity and platform limitations, but the prize for getting it right is a central position in the future of digital commerce.

In a world where money is increasingly digital, the checkout experience should reflect that reality. We're not there yet—but we're getting closer.


What crypto payment experiences have you encountered as a merchant or customer? Have you tried implementing crypto payments on your Shopify store? Share your experiences in the comments below.

The Wallet Revolution: Navigating the Three Paths of Account Abstraction

· 6 min read
Dora Noda
Software Engineer

For years, the crypto world has been hampered by a critical usability problem: the wallet. Traditional wallets, known as Externally Owned Accounts (EOAs), are unforgiving. A single lost seed phrase means your funds are gone forever. Every action requires a signature, and gas fees must be paid in the chain's native token. This clunky, high-stakes experience is a major barrier to mainstream adoption.

Enter Account Abstraction (AA), a paradigm shift set to redefine how we interact with the blockchain. At its core, AA transforms a user's account into a programmable smart contract, unlocking features like social recovery, one-click transactions, and flexible gas payments.

The journey toward this smarter future is unfolding along three distinct paths: the battle-tested ERC-4337, the efficient Native AA, and the highly anticipated EIP-7702. Let's break down what each approach means for developers and users.


💡 Path 1: The Pioneer — ERC-4337

ERC-4337 was the breakthrough that brought account abstraction to Ethereum and EVM chains without changing the core protocol. Think of it as adding a smart layer on top of the existing system.

It introduces a new transaction flow involving:

  • UserOperations: A new object that represents a user's intent (e.g., "swap 100 USDC for ETH").
  • Bundlers: Off-chain actors that pick up UserOperations, bundle them together, and submit them to the network.
  • EntryPoint: A global smart contract that validates and executes the bundled operations.

The Good:

  • Universal Compatibility: It can be deployed on any EVM chain.
  • Flexibility: Enables rich features like session keys for gaming, multi-signature security, and gas sponsorship via Paymasters.

The Trade-off:

  • Complexity & Cost: It introduces significant infrastructure overhead (running Bundlers) and has the highest gas costs of the three approaches, as every operation goes through the extra EntryPoint logic. Because of this, its adoption has flourished primarily on gas-friendly L2s like Base and Polygon.

ERC-4337 walked so that other AA solutions could run. It proved the demand and laid the groundwork for a more intuitive Web3 experience.


🚀 Path 2: The Integrated Ideal — Native Account Abstraction

If ERC-4337 is an add-on, Native AA is building smart features directly into the blockchain's foundation. Chains like zkSync Era and Starknet were designed from the ground up with AA as a core principle. On these networks, every account is a smart contract.

The Good:

  • Efficiency: By integrating AA logic into the protocol, it strips away the extra layers, leading to significantly lower gas costs compared to ERC-4337.
  • Simplicity for Devs: Developers don't need to manage Bundlers or a separate mempool. The transaction flow feels much more like a standard one.

The Trade-off:

  • Ecosystem Fragmentation: Native AA is chain-specific. An account on zkSync is different from an account on Starknet, and neither is native to Ethereum mainnet. This creates a fragmented experience for users and developers working across multiple chains.

Native AA shows us the "endgame" for efficiency, but its adoption is tied to the growth of its host ecosystems.


🌉 Path 3: The Pragmatic Bridge — EIP-7702

Set to be included in Ethereum's 2025 "Pectra" upgrade, EIP-7702 is a game-changer designed to bring AA features to the masses of existing EOA users. It takes a hybrid approach: it allows an EOA to temporarily delegate its authority to a smart contract for a single transaction.

Think of it as giving your EOA temporary superpowers. You don't need to migrate your funds or change your address. Your wallet can simply add an authorization to a transaction, allowing it to perform batched operations (e.g., approve + swap in one click) or have its gas sponsored.

The Good:

  • Backward Compatibility: It works with the billions of dollars secured by existing EOAs. No migration needed.
  • Low Complexity: It uses the standard transaction pool, eliminating the need for Bundlers and drastically simplifying infrastructure.
  • Mass Adoption Catalyst: By making smart features accessible to every Ethereum user overnight, it could rapidly accelerate the adoption of better UX patterns.

The Trade-off:

  • Not "Full" AA: EIP-7702 doesn't solve key management for the EOA itself. If you lose your private key, you're still out of luck. It's more about enhancing transaction capabilities than overhauling account security.

Head-to-Head: A Clear Comparison

FeatureERC-4337 (The Pioneer)Native AA (The Ideal)EIP-7702 (The Bridge)
Core IdeaExternal smart contract system via BundlersProtocol-level smart accountsEOA temporarily delegates to a smart contract
Gas CostHighest (due to EntryPoint overhead)Low (protocol-optimized)Moderate (small overhead on one transaction for batching)
InfrastructureHigh (Requires Bundlers, Paymasters)Low (Handled by the chain's validators)Minimal (Uses existing transaction infrastructure)
Key Use CaseFlexible AA on any EVM chain, especially L2s.Highly efficient AA on purpose-built L2s.Upgrading all existing EOAs with smart features.
Best For...Gaming wallets, dApps needing gasless onboarding now.Projects building exclusively on chains like zkSync/Starknet.Bringing batching & gas sponsorship to mainstream users.

The Future is Convergent and User-Centric

These three paths aren't mutually exclusive; they are converging toward a future where the wallet is no longer a point of friction.

  1. Social Recovery Becomes Standard 🛡️: The era of "lost keys, lost funds" is ending. AA enables guardian-based recovery, making self-custody as safe and forgiving as a traditional bank account.
  2. Gaming UX Reimagined 🎮: Session keys will allow for seamless gameplay without constant "approve transaction" pop-ups, finally making Web3 gaming feel like Web2 gaming.
  3. Wallets as Programmable Platforms: Wallets will become modular. Users might add a "DeFi module" for automated yield farming or a "security module" that requires 2FA for large transfers.

For developers and infrastructure providers like Blockeden.xyz, this evolution is incredibly exciting. The complexity of Bundlers, Paymasters, and various AA standards creates a massive opportunity to provide robust, reliable, and abstracted infrastructure. The goal is a unified experience where a developer can easily integrate AA features, and the wallet intelligently uses ERC-4337, Native AA, or EIP-7702 under the hood, depending on what the chain supports.

The wallet is finally getting the upgrade it deserves. The transition from static EOAs to dynamic, programmable smart accounts is not just an improvement—it's the revolution that will make Web3 accessible and safe for the next billion users.

Dubai's Crypto Ambitions: How DMCC is Building the Middle East's Largest Web3 Hub

· 4 min read

While much of the world still grapples with how to regulate cryptocurrencies, Dubai has quietly been building the infrastructure to become a global crypto hub. At the center of this transformation is the Dubai Multi Commodities Centre (DMCC) Crypto Centre, which has emerged as the largest concentration of crypto and web3 firms in the Middle East with over 600 members.

Dubai's Crypto Ambitions

The Strategic Play

What makes DMCC's approach interesting isn't just its size – it's the comprehensive ecosystem they've built. Rather than simply offering companies a place to register, DMCC has created a full-stack environment that addresses the three critical challenges crypto companies typically face: regulatory clarity, access to capital, and talent acquisition.

Regulatory Innovation

The regulatory framework is particularly noteworthy. DMCC offers 15 different types of crypto licenses, creating what might be the most granular regulatory structure in the industry. This isn't just bureaucratic complexity – it's a feature. By creating specific licenses for different activities, DMCC can provide clarity while maintaining appropriate oversight. This stands in stark contrast to jurisdictions that either lack clear regulations or apply one-size-fits-all approaches.

The Capital Advantage

But perhaps the most compelling aspect of DMCC's offering is its approach to capital access. Through strategic partnerships with Brinc Accelerator and various VC firms, DMCC has created a funding ecosystem with access to over $150 million in venture capital. This isn't just about money – it's about creating a self-sustaining ecosystem where success breeds success.

Why This Matters

The implications extend beyond Dubai. DMCC's model offers a blueprint for how emerging tech hubs can compete with traditional centers of innovation. By combining regulatory clarity, capital access, and ecosystem building, they've created a compelling alternative to traditional tech hubs.

Some key metrics that illustrate the scale:

  • 600+ crypto and web3 firms (the largest concentration in the region)
  • Access to $150M+ in venture capital
  • 15 different license types
  • 8+ ecosystem partners
  • Network of 25,000+ potential collaborators across sectors

Leadership and Vision

The vision behind this transformation comes from two key figures:

Ahmed Bin Sulayem, DMCC's Executive Chairman and CEO, has overseen the organization's growth from 28 member companies in 2003 to over 25,000 in 2024. This track record suggests the crypto initiative isn't just a trend-chasing move, but part of a longer-term strategy to position Dubai as a global business hub.

Belal Jassoma, Director of Ecosystems, brings crucial expertise in scaling up DMCC's commercial offerings. His focus on strategic relationships and ecosystem development across verticals like crypto, gaming, AI, and financial services suggests a sophisticated understanding of how different tech sectors can cross-pollinate.

The Road Ahead

While DMCC's progress is impressive, several questions remain:

  1. Regulatory Evolution: How will DMCC's regulatory framework evolve as the crypto industry matures? The current granular approach provides clarity, but maintaining this as the industry evolves will be challenging.

  2. Sustainable Growth: Can DMCC maintain its growth trajectory? While 600+ crypto firms is impressive, the real test will be how many of these companies achieve significant scale.

  3. Global Competition: As other jurisdictions develop their crypto regulations and ecosystems, can DMCC maintain its competitive advantage?

Looking Forward

DMCC's approach offers valuable lessons for other aspiring tech hubs. Their success suggests that the key to attracting innovative companies isn't just about offering tax benefits or light-touch regulation – it's about building a comprehensive ecosystem that addresses multiple business needs simultaneously.

For crypto entrepreneurs and investors, DMCC's initiative represents an interesting alternative to traditional tech hubs. While it's too early to declare it a definitive success, the early results suggest they're building something worth watching.

The most interesting aspect might be what this tells us about the future of innovation hubs. In a world where talent and capital are increasingly mobile, DMCC's model suggests that new tech centers can emerge rapidly when they offer the right combination of regulatory clarity, capital access, and ecosystem support.

For those watching the evolution of global tech hubs, Dubai's experiment with DMCC offers valuable insights into how emerging markets can position themselves in the global tech landscape. Whether this model can be replicated elsewhere remains to be seen, but it's certainly providing a compelling blueprint for others to study.

A16Z’s Crypto 2025 Outlook: Twelve Ideas That Might Reshape the Next Internet

· 8 min read

Every year, a16z publishes sweeping predictions on the technologies that will define our future. This time, their crypto team has painted a vivid picture of a 2025 where blockchains, AI, and advanced governance experiments collide.

I’ve summarized and commented on their key insights below, focusing on what I see as the big levers for change — and possible stumbling blocks. If you’re a tech builder, investor, or simply curious about the next wave of the internet, this piece is for you.

1. AI Meets Crypto Wallets

Key Insight: AI models are moving from “NPCs” in the background to “main characters,” acting independently in online (and potentially physical) economies. That means they’ll need crypto wallets of their own.

  • What It Means: Instead of an AI just spitting out answers, it might hold, spend, or invest digital assets — transacting on behalf of its human owner or purely on its own.
  • Potential Payoff: Higher-efficiency “agentic AIs” could help businesses with supply chain coordination, data management, or automated trading.
  • Watch Out For: How do we ensure an AI is truly autonomous, not just secretly manipulated by humans? Trusted execution environments (TEEs) can provide technical guarantees, but establishing trust in a “robot with a wallet” won’t happen overnight.

2. Rise of the DAC (Decentralized Autonomous Chatbot)

Key Insight: A chatbot running autonomously in a TEE can manage its own keys, post content on social media, gather followers, and even generate revenue — all without direct human control.

  • What It Means: Think of an AI influencer that can’t be silenced by any one person because it literally controls itself.
  • Potential Payoff: A glimpse of a world where content creators aren’t individuals but self-governing algorithms with million-dollar (or billion-dollar) valuations.
  • Watch Out For: If an AI breaks laws, who’s liable? Regulatory guardrails will be tricky when the “entity” is a set of code housed on distributed servers.

3. Proof of Personhood Becomes Essential

Key Insight: With AI lowering the cost of generating hyper-realistic fakes, we need better ways to verify that we’re interacting with real humans online. Enter privacy-preserving unique IDs.

  • What It Means: Every user might eventually have a certified “human stamp” — hopefully without sacrificing personal data.
  • Potential Payoff: This could drastically reduce spam, scams, and bot armies. It also lays the groundwork for more trustworthy social networks and community platforms.
  • Watch Out For: Adoption is the main barrier. Even the best proof-of-personhood solutions need broad acceptance before malicious actors outpace them.

4. From Prediction Markets to Broader Information Aggregation

Key Insight: 2024’s election-driven prediction markets grabbed headlines, but a16z sees a bigger trend: using blockchain to design new ways of revealing and aggregating truths — be it in governance, finance, or community decisions.

  • What It Means: Distributed incentive mechanisms can reward people for honest input or data. We might see specialized “truth markets” for everything from local sensor networks to global supply chains.
  • Potential Payoff: A more transparent, less gameable data layer for society.
  • Watch Out For: Sufficient liquidity and user participation remain challenging. For niche questions, “prediction pools” can be too small to yield meaningful signals.

5. Stablecoins Go Enterprise

Key Insight: Stablecoins are already the cheapest way to move digital dollars, but large companies haven’t embraced them — yet.

  • What It Means: SMBs and high-transaction merchants might wake up to the idea that they can save hefty credit-card fees by adopting stablecoins. Enterprises that process billions in annual revenue could do the same, potentially adding 2% to their bottom lines.
  • Potential Payoff: Faster, cheaper global payments, plus a new wave of stablecoin-based financial products.
  • Watch Out For: Companies will need new ways to manage fraud protection, identity verification, and refunds — previously handled by credit-card providers.

6. Government Bonds on the Blockchain

Key Insight: Governments exploring on-chain bonds could create interest-bearing digital assets that function without the privacy issues of a central bank digital currency.

  • What It Means: On-chain bonds could serve as high-quality collateral in DeFi, letting sovereign debt seamlessly integrate with decentralized lending protocols.
  • Potential Payoff: Greater transparency, potentially lower issuance costs, and a more democratized bond market.
  • Watch Out For: Skeptical regulators and potential inertia in big institutions. Legacy clearing systems won’t disappear easily.

Key Insight: Wyoming introduced a new category called the “decentralized unincorporated nonprofit association” (DUNA), meant to give DAOs legal standing in the U.S.

  • What It Means: DAOs can now hold property, sign contracts, and limit the liability of token holders. This opens the door for more mainstream usage and real commercial activity.
  • Potential Payoff: If other states follow Wyoming’s lead (as they did with LLCs), DAOs will become normal business entities.
  • Watch Out For: Public perception is still fuzzy on what DAOs do. They’ll need a track record of successful projects that translate to real-world benefits.

8. Liquid Democracy in the Physical World

Key Insight: Blockchain-based governance experiments might extend from online DAO communities to local-level elections. Voters could delegate their votes or vote directly — “liquid democracy.”

  • What It Means: More flexible representation. You can choose to vote on specific issues or hand that responsibility to someone you trust.
  • Potential Payoff: Potentially more engaged citizens and dynamic policymaking.
  • Watch Out For: Security concerns, technical literacy, and general skepticism around mixing blockchain with official elections.

9. Building on Existing Infrastructure (Instead of Reinventing It)

Key Insight: Startups often spend time reinventing base-layer technology (consensus protocols, programming languages) rather than focusing on product-market fit. In 2025, they’ll pick off-the-shelf components more often.

  • What It Means: Faster speed to market, more reliable systems, and greater composability.
  • Potential Payoff: Less time wasted building a new blockchain from scratch; more time spent on the user problem you’re solving.
  • Watch Out For: It’s tempting to over-specialize for performance gains. But specialized languages or consensus layers can create higher overhead for developers.

10. User Experience First, Infrastructure Second

Key Insight: Crypto needs to “hide the wires.” We don’t make consumers learn SMTP to send email — so why force them to learn “EIPs” or “rollups”?

  • What It Means: Product teams will choose the technical underpinnings that serve a great user experience, not vice versa.
  • Potential Payoff: A big leap in user onboarding, reducing friction and jargon.
  • Watch Out For: “Build it and they will come” only works if you truly nail the experience. Marketing lingo about “easy crypto UX” means nothing if people are still forced to wrangle private keys or memorize arcane acronyms.

11. Crypto’s Own App Stores Emerge

Key Insight: From Worldcoin’s World App marketplace to Solana’s dApp Store, crypto-friendly platforms provide distribution and discovery free from Apple or Google’s gatekeeping.

  • What It Means: If you’re building a decentralized application, you can reach users without fear of sudden deplatforming.
  • Potential Payoff: Tens (or hundreds) of thousands of new users discovering your dApp in days, instead of being lost in the sea of centralized app stores.
  • Watch Out For: These stores need enough user base and momentum to compete with Apple and Google. That’s a big hurdle. Hardware tie-ins (like specialized crypto phones) might help.

12. Tokenizing ‘Unconventional’ Assets

Key Insight: As blockchain infrastructure matures and fees drop, tokenizing everything from biometric data to real-world curiosities becomes more feasible.

  • What It Means: A “long tail” of unique assets can be fractionalized and traded globally. People could even monetize personal data in a controlled, consent-based way.
  • Potential Payoff: Massive new markets for otherwise “locked up” assets, plus interesting new data pools for AI to consume.
  • Watch Out For: Privacy pitfalls and ethical landmines. Just because you can tokenize something doesn’t mean you should.

A16Z’s 2025 outlook shows a crypto sector that’s reaching for broader adoption, more responsible governance, and deeper integration with AI. Where previous cycles dwelled on speculation or hype, this vision revolves around utility: stablecoins saving merchants 2% on every latte, AI chatbots operating their own businesses, local governments experimenting with liquid democracy.

Yet execution risk looms. Regulators worldwide remain skittish, and user experience is still too messy for the mainstream. 2025 might be the year that crypto and AI finally “grow up,” or it might be a halfway step — it all depends on whether teams can ship real products people love, not just protocols for the cognoscenti.