Skip to main content

52 posts tagged with "Infrastructure"

Blockchain infrastructure and node services

View all tags

DeFi Lending Hits $55 Billion: The Three-Horse Race Reshaping Institutional Credit

· 11 min read
Dora Noda
Software Engineer

The total value locked in DeFi lending protocols has surpassed $55 billion—a new all-time high that eclipses peaks set in 2021, 2022, and late 2024. But the more significant story isn't the number itself. It's who's driving it and how the underlying infrastructure has fundamentally changed.

Three protocols now define the institutional lending landscape: Aave commands nearly 50% market share with $26 billion in TVL. Morpho has grown 260% year-over-year to $13 billion in deposits. Maple Finance has surged 417% with $1.37 billion focused almost entirely on undercollateralized institutional lending. Together, they represent a decisive shift from DeFi's retail-speculation origins toward infrastructure that banks, hedge funds, and asset managers can actually use.

The transformation goes deeper than TVL metrics. Societe Generale—a fully regulated European bank—now operates lending markets through Morpho for its MiCA-compliant stablecoins. BlackRock's BUIDL tokenized Treasury fund has reached $2.3 billion in assets under management and integrates directly with DeFi protocols as collateral. The lines between traditional finance and decentralized lending are blurring faster than most observers expected.

Lido V3 Transforms Ethereum Staking: How stVaults Are Building the Infrastructure Layer for Institutional DeFi

· 10 min read
Dora Noda
Software Engineer

Lido controls roughly 27% of all staked Ethereum—over $33 billion in assets. Yet until now, every ETH deposited received identical treatment: same validators, same risk parameters, same fee structure. For retail users, this simplicity was a feature. For institutions managing billions under strict compliance requirements, it was a dealbreaker.

Lido V3 changes that equation entirely. With the introduction of stVaults—modular smart contracts that enable customizable staking configurations—Lido is transforming from a liquid staking protocol into Ethereum's core staking infrastructure. Institutions can now select specific node operators, implement tailored compliance frameworks, and create custom yield strategies while still accessing stETH liquidity. The upgrade represents the most significant evolution in Ethereum staking since the Merge, and it's arriving just as institutional demand for yield-bearing crypto products reaches unprecedented levels.

$10 Billion Frozen for 6 Hours: What Sui's Latest Outage Reveals About Blockchain's Institutional Readiness

· 8 min read
Dora Noda
Software Engineer

On January 14, 2026, at 2:52 PM UTC, the Sui Network stopped producing blocks. For nearly six hours, approximately $10 billion in on-chain value sat frozen—transactions couldn't settle, DeFi positions couldn't be adjusted, and gaming applications went dark. No funds were lost, but the incident reignited a critical debate: can high-throughput blockchains deliver the reliability that institutional adoption demands?

This wasn't Sui's first stumble. Following a November 2024 validator crash and a December 2025 DDoS attack that degraded performance, this latest consensus bug marks the network's third significant incident in just over a year. Meanwhile, Solana—once notorious for outages—survived a 6 Tbps DDoS attack in December 2025 with zero downtime. The contrast is stark, and it signals a fundamental shift in how we evaluate blockchain infrastructure: speed is no longer enough.

The Anatomy of a Consensus Failure

The technical post-mortem reveals an edge case that highlights the complexity of distributed consensus. Certain garbage collection conditions combined with an optimization path caused validators to compute divergent checkpoint candidates. When more than one-third of stake signed conflicting checkpoint digests, certification stalled entirely.

Here's what happened in sequence:

  1. Detection (2:52 PM UTC): Block production and checkpoint creation stopped. Sui's team flagged the issue immediately.

  2. Diagnosis (approximately 9 hours of analysis): Engineers identified that validators were reaching different conclusions when handling certain conflicting transactions—a subtle bug in how consensus commits were processed.

  3. Fix Development (11:37 PST): The team implemented a patch to the commit logic.

  4. Deployment (12:44 PST): After a successful canary deployment by Mysten Labs validators, the wider validator set upgraded.

  5. Recovery (8:44 PM UTC): Service restored, roughly 5 hours and 52 minutes after detection.

The recovery process required validators to remove incorrect consensus data, apply the fix, and replay the chain from the point of divergence. It worked—but six hours is an eternity in financial markets where milliseconds matter.

The Reliability Reckoning: From TPS Wars to Uptime Wars

For years, blockchain competition centered on a single metric: transactions per second. Solana promised 65,000 TPS. Sui claimed 297,000 TPS in testing. The arms race for throughput dominated marketing narratives and investor attention.

That era is ending. As one analyst noted: "After 2025, the core metrics for public chain competition will be shifting from 'Who is faster' to 'Who is more stable, who is more predictable.'"

The reason is institutional capital. When JPMorgan Asset Management launched a $100 million tokenized money market fund on Ethereum, they weren't optimizing for speed—they were optimizing for certainty. When BlackRock, Fidelity, and Grayscale deployed billions into Bitcoin and Ethereum ETFs, accumulating $31 billion in net inflows and processing $880 billion in trading volume, they chose chains with battle-tested reliability over theoretical throughput advantages.

True blockchain performance is now defined by three elements working together: throughput (capacity), block time (inclusion speed), and finality (irreversibility). The fastest chains are those that balance all three, but the most valuable chains are those that do so consistently—under attack, under load, and under edge-case conditions that no testnet anticipates.

Solana's Reliability Redemption

The comparison with Solana is instructive. Between 2021 and 2022, Solana suffered seven major outages, with the longest lasting 17 hours after bot activity during a token launch overwhelmed validators. The network became a punchline—"Solana is down again" was a running joke in crypto Twitter circles.

But Solana's engineering team responded with structural changes. They implemented the QUIC protocol and Stake-Weighted Quality of Service (SWQoS), fundamentally redesigning how the network handles transaction prioritization and spam resistance. The December 2025 DDoS attack—a 6 Tbps assault that would rival attacks against global cloud giants—tested these improvements. The result: sub-second confirmation times and stable latency throughout.

This resilience isn't just technical achievement—it's the foundation for institutional trust. Solana now leads the ETF wave with eight spot-plus-staking ETF applications and six products live by November 2025, generating over $4.6 billion in cumulative volume. The network's reputation has inverted from "fast but fragile" to "proven under fire."

Sui's path forward requires a similar transformation. The planned changes—improved automation for validator operations, increased testing for consensus edge cases, and early detection of checkpoint inconsistencies—are necessary but incremental. The deeper question is whether Sui's architectural decisions inherently create more surface area for consensus failures than mature alternatives.

The Institutional Reliability Threshold

What do institutions actually require? The answer has become clearer as traditional finance deploys on-chain:

Predictable Settlement: Large custodians and clearing agents now operate hybrid models linking blockchain rails with conventional payment and securities networks. Same-day transaction finality under regulated controls is the baseline expectation.

Operational Auditability: Institutional settlement infrastructure in 2026 is defined by precision and auditability. Every transaction must be traceable, every failure explainable, and every recovery documented to regulatory standards.

Uptime Guarantees: Traditional financial infrastructure operates with "five nines" (99.999%) uptime expectations—roughly 5 minutes of downtime per year. Six hours of frozen assets would be career-ending for a traditional custodian.

Graceful Degradation: When failures occur, institutions expect systems to degrade gracefully rather than halt completely. A blockchain that freezes entirely during consensus disputes violates this principle.

Sui's $10 billion freeze, even without fund loss, represents a category failure on the third point. For retail traders and DeFi degens, a six-hour pause is an inconvenience. For institutional allocators managing client capital under fiduciary duty, it's a disqualifying event until proven otherwise.

The Emerging Reliability Hierarchy

Based on 2025-2026 performance data, a rough reliability hierarchy is emerging among high-throughput chains:

Tier 1 - Proven Institutional Grade: Ethereum (no major outages, but limited throughput), Solana (reformed with 18+ months clean record)

Tier 2 - Promising but Unproven: Base (backed by Coinbase infrastructure), Arbitrum/Optimism (inheriting Ethereum's security model)

Tier 3 - High Potential, Reliability Questions: Sui (multiple incidents), newer L1s without extended track records

This hierarchy doesn't reflect technological superiority—Sui's object-centric data model and parallel processing capabilities remain genuinely innovative. But innovation without reliability creates technology that institutions can admire but not deploy.

What Comes Next for Sui

Sui's response to this incident will determine its institutional trajectory. The immediate technical fixes address the specific bug, but the broader challenge is demonstrating systemic reliability improvement.

Key metrics to watch:

Time Between Incidents: The November 2024 → December 2025 → January 2026 progression shows accelerating, not decreasing, frequency. Reversing this trend is essential.

Recovery Time Improvement: Six hours is better than 17 hours (Solana's worst), but the goal should be minutes, not hours. Automated failover and faster consensus recovery mechanisms need development.

Validator Set Maturation: Sui's validator set is smaller and less battle-tested than Solana's. Expanding geographic distribution and operational sophistication across validators would improve resilience.

Formal Verification: Sui's Move language already emphasizes formal verification for smart contracts. Extending this rigor to consensus-layer code could catch edge cases before they reach production.

The good news: Sui's ecosystem (DeFi, gaming, NFTs) showed resilience. No funds were lost, and the community response was more constructive than panicked. The SUI token dropped 6% during the incident but didn't collapse, suggesting the market treats these events as growing pains rather than existential threats.

The Reliability Premium in 2026 Markets

The broader lesson transcends Sui. As blockchain infrastructure matures, reliability becomes a differentiating feature that commands premium valuations. Chains that can demonstrate institutional-grade uptime will attract the next wave of tokenized assets—the gold, stocks, intellectual property, and GPUs that OKX Ventures founder Jeff Ren predicts will move on-chain in 2026.

This creates a strategic opportunity for established chains and a challenge for newer entrants. Ethereum's relatively modest throughput is increasingly acceptable because its reliability is unquestioned. Solana's reformed reputation opens doors that were closed during its outage-prone era.

For Sui and similar high-throughput chains, the 2026 competitive landscape requires proving that innovation and reliability aren't trade-offs. The technology to achieve both exists—the question is whether teams can implement it before institutional patience runs out.

The $10 billion that sat frozen for six hours wasn't lost, but neither was the lesson: in the institutional era, uptime is the ultimate feature.


Building reliable infrastructure on Sui, Ethereum, or other high-throughput chains requires battle-tested RPC providers that maintain uptime when networks face stress. BlockEden.xyz provides enterprise-grade API endpoints with redundancy and monitoring designed for institutional requirements. Explore our infrastructure to build on foundations that stay online.

The Oracle Wars of 2026: Who Will Control the Future of Blockchain Infrastructure?

· 9 min read
Dora Noda
Software Engineer

The blockchain oracle market just crossed $100 billion in total value secured—and the battle for dominance is far from over. While Chainlink commands nearly 70% market share, a new generation of challengers is rewriting the rules of how blockchains connect to the real world. With sub-millisecond latency, modular architectures, and institutional-grade data feeds, the oracle wars of 2026 will determine who controls the critical infrastructure layer powering DeFi, RWA tokenization, and the next wave of on-chain finance.

The Stakes Have Never Been Higher

Oracles are the unsung heroes of blockchain infrastructure. Without them, smart contracts are isolated computers with no knowledge of asset prices, weather data, sports scores, or any external information. Yet this critical middleware layer has become a battleground where billions of dollars—and the future of decentralized finance—hang in the balance.

Price oracle manipulation attacks caused over $165.8 million in losses between January 2023 and May 2025, accounting for 17.3% of all major DeFi exploits. The February 2025 Venus Protocol attack on ZKsync demonstrated how a single vulnerable oracle integration could drain $717,000 in minutes. When oracles fail, protocols bleed.

This existential risk explains why the oracle market has attracted some of crypto's most sophisticated players—and why the competition is intensifying.

Chainlink's dominance is staggering by any measure. The network has secured over $100 billion in total value, processed more than 18 billion verified messages, and enabled approximately $26 trillion in cumulative on-chain transaction volume. On Ethereum alone, Chainlink secures 83% of all oracle-dependent value; on Base, it approaches 100%.

The numbers tell a story of institutional adoption that competitors struggle to match. JPMorgan, UBS, and SWIFT have integrated Chainlink infrastructure for tokenized asset settlements. Coinbase selected Chainlink to power wrapped asset transfers. When TRON decided to sunset its WinkLink oracle in early 2025, it migrated to Chainlink—a tacit admission that building oracle infrastructure is harder than it looks.

Chainlink's strategy has evolved from pure data delivery to what the company calls a "full-stack institutional platform." The 2025 launch of native integration with MegaETH marked its entry into real-time oracle services, directly challenging Pyth's speed advantage. Combined with its Cross-Chain Interoperability Protocol (CCIP) and Proof of Reserve systems, Chainlink is positioning itself as the default plumbing for institutional DeFi.

But dominance breeds complacency—and competitors are exploiting the gaps.

Pyth Network: The Speed Demon

If Chainlink won the first oracle war through decentralization and reliability, Pyth is betting the next war will be won on speed. The network's Lazer product, launched in Q1 2025, delivers price updates as fast as one millisecond—400 times faster than traditional oracle solutions.

This isn't a marginal improvement. It's a paradigm shift.

Pyth's architecture differs fundamentally from Chainlink's push model. Rather than having oracles continuously push data on-chain (expensive and slow), Pyth uses a pull model where applications fetch data only when needed. First-party data publishers—including Jump Trading, Wintermute, and major exchanges—provide prices directly rather than through aggregator intermediaries.

The result is a network covering 1,400+ assets across 50+ blockchains, with sub-400-millisecond updates even for its standard service. Pyth's recent expansion into traditional finance data—85 Hong Kong-listed stocks ($3.7 trillion market cap) and 100+ ETFs from BlackRock, Vanguard, and State Street ($8 trillion in assets)—signals ambitions far beyond crypto.

Coinbase International's integration of Pyth Lazer in 2025 validated the thesis: even centralized exchanges need decentralized oracle infrastructure when speed matters. Pyth's TVS reached $7.15 billion in Q1 2025, with market share climbing from 10.7% to 12.8%.

Yet Pyth's speed advantage comes with trade-offs. By the network's own admission, Lazer sacrifices "some elements of decentralization" for performance. For protocols where trust minimization trumps latency, this compromise may be unacceptable.

RedStone: The Modular Insurgent

While Chainlink and Pyth battle over market share, RedStone has quietly emerged as the fastest-growing oracle in the industry. The project scaled from its first DeFi integration in early 2023 to $9 billion in Total Value Secured by September 2025—a 1,400% year-over-year increase.

RedStone's secret weapon is modularity. Unlike Chainlink's monolithic architecture (which requires replicating the entire pipeline on each new chain), RedStone's design decouples data collection from delivery. This allows deployment on new chains within one to two weeks, compared to three to four months for traditional solutions.

The numbers are striking: RedStone now supports over 110 chains, more than any competitor. This includes non-EVM networks like Solana and Sui, plus Canton Network—the institutional blockchain backed by major financial institutions where RedStone became the first primary oracle provider.

RedStone's 2025 milestones read like a strategic assault on institutional territory. The Securitize partnership brought RedStone infrastructure to BlackRock's BUIDL and Apollo's ACRED tokenized funds. The Credora acquisition merged DeFi credit ratings with oracle infrastructure. The Kalshi integration delivered regulated U.S. prediction market data across all supported chains.

RedStone Bolt—the project's ultra-low latency offering—competes directly with Pyth Lazer for speed-sensitive applications. But RedStone's modular approach allows it to offer both push and pull models, adapting to protocol requirements rather than forcing architectural compromises.

For 2026, RedStone has announced plans to scale to 1,000 chains and integrate AI-powered ML models for dynamic data feeds and volatility prediction. It's an aggressive roadmap that positions RedStone as the oracle for an omnichain future.

API3: The First-Party Purist

API3 takes a philosophically different approach to the oracle problem. Rather than operating its own node network or aggregating third-party data, API3 enables traditional API providers to run their own oracle nodes and deliver data directly on-chain.

This "first-party" model eliminates middlemen entirely. When a weather service provides data through API3, there's no aggregation layer, no third-party node operators, and no opportunity for manipulation along the delivery chain. The API provider is directly accountable for data accuracy.

For enterprise applications requiring regulatory compliance and clear data provenance, API3's approach is compelling. Financial institutions subject to audit requirements need to know exactly where their data originates—something traditional oracle networks can't always guarantee.

API3's managed dAPIs (decentralized APIs) use a push model similar to Chainlink, making migration straightforward for existing protocols. The project has carved out a niche in IoT integrations and enterprise applications where data authenticity matters more than update frequency.

The Security Imperative

Oracle security isn't theoretical—it's existential. The February 2025 wUSDM exploit demonstrated how ERC-4626 vault standards, when combined with vulnerable oracle integrations, create attack vectors that sophisticated adversaries readily exploit.

The attack pattern is now well-documented: use flash loans to temporarily manipulate liquidity pool prices, exploit oracles that read from those pools without adequate safeguards, and extract value before the transaction completes. The BonqDAO hack—$88 million lost through price manipulation—remains the largest single oracle exploit on record.

Mitigation requires defense in depth: aggregating multiple independent data sources, implementing time-weighted average prices (TWAP) to smooth volatility, setting circuit breakers for anomalous price movements, and continuously monitoring for manipulation attempts. Protocols that treat oracle integration as a checkbox rather than a security-critical design decision are playing Russian roulette with user funds.

The leading oracles have responded with increasingly sophisticated security measures. Chainlink's decentralized aggregation, Pyth's first-party publisher accountability, and RedStone's cryptographic proofs all address different aspects of the trust problem. But no solution is perfect, and the cat-and-mouse game between oracle designers and attackers continues.

The Institutional Frontier

The real prize in the oracle wars isn't DeFi market share—it's institutional adoption. With RWA tokenization approaching $62.7 billion in market capitalization (up 144% in 2026), oracles have become critical infrastructure for traditional finance's blockchain migration.

Tokenized assets require reliable off-chain data: pricing information, interest rates, corporate actions, proof of reserves. This data must meet institutional standards for accuracy, auditability, and regulatory compliance. The oracle that wins institutional trust wins the next decade of financial infrastructure.

Chainlink's head start with JPMorgan, UBS, and SWIFT creates powerful network effects. But RedStone's Securitize partnership and Canton Network deployment prove institutional doors are open to challengers. Pyth's expansion into traditional equities and ETF data positions it for the convergence of crypto and TradFi markets.

The EU's MiCA regulation and the U.S. SEC's "Project Crypto" are accelerating this institutional migration by providing regulatory clarity. Oracles that can demonstrate compliance readiness—clear data provenance, audit trails, and institutional-grade reliability—will capture disproportionate market share as traditional finance moves on-chain.

What Comes Next

The oracle market in 2026 is fragmenting along clear lines:

Chainlink remains the default choice for protocols prioritizing battle-tested reliability and institutional credibility. Its full-stack approach—data feeds, cross-chain messaging, proof of reserves—creates switching costs that protect market share.

Pyth captures speed-sensitive applications where milliseconds matter: perpetual futures, high-frequency trading, and derivatives protocols. Its first-party publisher model and traditional finance data expansion position it for the CeFi-DeFi convergence.

RedStone appeals to the omnichain future, offering modular architecture that adapts to diverse protocol requirements across 110+ chains. Its institutional partnerships signal credibility beyond DeFi degeneracy.

API3 serves enterprise applications requiring regulatory compliance and direct data provenance—a smaller but defensible niche.

No single oracle will win everything. The market is large enough to support multiple specialized providers, each optimized for different use cases. But the competition will drive innovation, reduce costs, and ultimately make blockchain infrastructure more robust.

For builders, the message is clear: oracle selection is a first-order architectural decision with long-term implications. Choose based on your specific requirements—latency, decentralization, chain coverage, institutional compliance—rather than market share alone.

For investors, oracle tokens represent leveraged bets on blockchain adoption. As more value flows on-chain, oracle infrastructure captures a slice of every transaction. The winners will compound growth for years; the losers will fade into irrelevance.

The oracle wars of 2026 are just beginning. The infrastructure being built today will power the financial system of tomorrow.


Building DeFi applications that require reliable oracle infrastructure? BlockEden.xyz provides enterprise-grade blockchain RPC services with high availability across multiple networks. Explore our API marketplace to connect your applications to battle-tested infrastructure.

Celestia's Competitive Edge in Data Availability: A Deep Dive

· 9 min read
Dora Noda
Software Engineer

When Ethereum L2s paid $3.83 per megabyte to post data using blobs, Eclipse was paying Celestia $0.07 for the same megabyte. That's not a typo—55 times cheaper, enabling Eclipse to post over 83 GB of data without bankrupting its treasury. This cost differential isn't a temporary market anomaly. It's the structural advantage of purpose-built infrastructure.

Celestia has now processed over 160 GB of rollup data, generates daily blob fees that have grown 10x since late 2024, and commands roughly 50% market share in the data availability sector. The question isn't whether modular data availability works—it's whether Celestia can maintain its lead as EigenDA, Avail, and Ethereum's native blobs compete for the same rollup customers.

Understanding Blob Economics: The Foundation

Before analyzing Celestia's numbers, it's worth understanding what makes data availability economically distinct from other blockchain services.

What Rollups Actually Pay For

When a rollup processes transactions, it produces state changes that need to be verifiable. Rather than trust the rollup operator, users can verify by re-executing transactions against the original data. This requires that transaction data remains available—not forever, but long enough for challenges and verification.

Traditional rollups posted this data directly to Ethereum calldata, paying premium prices for permanent storage on the world's most secure ledger. But most rollup data only needs availability for a challenge window (typically 7-14 days), not eternity. This mismatch created the opening for specialized data availability layers.

Celestia's PayForBlob Model

Celestia's fee model is straightforward: rollups pay per blob based on size and current gas prices. Unlike execution layers where computation costs dominate, data availability is fundamentally about bandwidth and storage—resources that scale more predictably with hardware improvements.

The economics create a flywheel: lower DA costs enable more rollups, more rollups generate more fee revenue, and increased usage justifies infrastructure investment for even greater capacity. Celestia's current throughput of approximately 1.33 MB/s (8 MB blocks every 6 seconds) represents early-stage capacity with a clear path to 100x improvement.

The 160 GB Reality: Who's Using Celestia

The aggregate numbers tell a story of rapid adoption. Over 160 GB of data has been published to Celestia since mainnet launch, with daily data volume averaging around 2.5 GB. But the composition of this data reveals more interesting patterns.

Eclipse: The Volume Leader

Eclipse—a Layer 2 combining Solana's virtual machine with Ethereum settlement—has published over 83 GB of data to Celestia, more than half of all network volume. Eclipse uses Celestia for data availability while settling to Ethereum, demonstrating the modular architecture in practice.

The volume isn't surprising given Eclipse's design choices. Solana Virtual Machine execution generates more data than EVM equivalents, and Eclipse's focus on high-throughput applications (gaming, DeFi, social) means transaction volumes that would be cost-prohibitive on Ethereum DA.

The Enterprise Cohort

Beyond Eclipse, the rollup ecosystem includes:

  • Manta Pacific: Over 7 GB posted, an OP Stack rollup focused on ZK applications with Universal Circuits technology
  • Plume Network: RWA-specialized L2 using Celestia for tokenized asset transaction data
  • Derive: On-chain options and structured products trading
  • Aevo: Decentralized derivatives exchange processing high-frequency trading data
  • Orderly Network: Cross-chain orderbook infrastructure

Twenty-six rollups now build on Celestia, with major frameworks—Arbitrum Orbit, OP Stack, Polygon CDK—all offering Celestia as a DA option. Rollups-as-a-Service platforms like Conduit and Caldera have made Celestia integration a standard offering.

Fee Revenue Growth

At the end of 2024, Celestia generated approximately $225 per day in blob fees. That number has grown nearly 10x, reflecting both increased usage and the network's ability to capture value as demand rises. The fee market remains early-stage—capacity utilization is low relative to tested limits—but the growth trajectory validates the economic model.

Cost Comparison: Celestia vs. The Competition

Data availability has become a competitive market. Understanding the cost structures helps explain rollup decisions.

Celestia vs. Ethereum Blobs

Ethereum's EIP-4844 (Dencun upgrade) introduced blob transactions, reducing DA costs by 90%+ compared to calldata. But Celestia remains significantly cheaper:

MetricEthereum BlobsCelestia
Cost per MB~$3.83~$0.07
Cost advantageBaseline55x cheaper
CapacityLimited blob space8 MB blocks (scaling to 1 GB)

For high-volume rollups like Eclipse, this difference is existential. At Ethereum blob prices, Eclipse's 83 GB of data would have cost over $300,000. On Celestia, it cost approximately $6,000.

Celestia vs. EigenDA

EigenDA offers a different value proposition: Ethereum-aligned security through restaking, with claimed throughput of 100 MB/s. The tradeoffs:

AspectCelestiaEigenDA
Security modelIndependent validator setEthereum restaking
Throughput1.33 MB/s (8 MB blocks)100 MB/s claimed
ArchitectureBlockchain-basedData Availability Committee
DecentralizationPublic verificationTrust assumptions

EigenDA's DAC architecture enables higher throughput but introduces trust assumptions that fully blockchain-based solutions avoid. For teams deeply embedded in Ethereum's ecosystem, EigenDA's restaking integration may outweigh Celestia's independence.

Celestia vs. Avail

Avail positions as the most flexible option for multichain applications:

AspectCelestiaAvail
Cost per MBHigherLower
Economic securityHigherLower
Mainnet capacity8 MB blocks4 MB blocks
Test capacity128 MB proven128 MB proven

Avail's lower costs come with lower economic security—a reasonable tradeoff for applications where the marginal cost savings matter more than maximum security guarantees.

The Scaling Roadmap: From 1 MB/s to 1 GB/s

Celestia's current capacity—approximately 1.33 MB/s—is intentionally conservative. The network has demonstrated dramatically higher throughput in controlled testing, providing a clear upgrade path.

Mammoth Testing Results

In October 2024, the Mammoth Mini devnet achieved 88 MB blocks with 3-second block times, delivering approximately 27 MB/s throughput—over 20x current mainnet capacity.

In April 2025, the mamo-1 testnet pushed further: 128 MB blocks with 6-second block times, achieving 21.33 MB/s sustained throughput. This represented 16x current mainnet capacity while incorporating new propagation algorithms like Vacuum! designed for efficient large-block data movement.

Mainnet Upgrade Progress

The scaling is happening incrementally:

  • Ginger Upgrade (December 2024): Reduced block times from 12 seconds to 6 seconds
  • 8 MB Block Increase (January 2025): Doubled block size via on-chain governance
  • Matcha Upgrade (January 2026): Enabled 128 MB blocks through improved propagation mechanics, reducing node storage requirements by 77%
  • Lotus Upgrade (July 2025): V4 mainnet release with further TIA holder improvements

The roadmap targets gigabyte-scale blocks by 2030, representing a 1,000x increase from current capacity. Whether market demand grows to justify this capacity remains uncertain, but the technical path is clear.

TIA Tokenomics: How Value Accrues

Understanding Celestia's economics requires understanding TIA's role in the system.

Token Utility

TIA serves three functions:

  1. Blob fees: Rollups pay TIA for data availability
  2. Staking: Validators stake TIA to secure the network and earn rewards
  3. Governance: Token holders vote on network parameters and upgrades

The fee mechanism creates direct linkage between network usage and token demand. As blob submissions increase, TIA is purchased and spent, creating buy pressure proportional to network utility.

Supply Dynamics

TIA launched with 1 billion genesis tokens. Initial inflation was set at 8% annually, decreasing over time toward 1.5% terminal inflation.

The January 2026 Matcha upgrade introduced Proof-of-Governance (PoG), slashing annual token issuance from 5% to 0.25%. This structural change:

  • Reduces sell pressure from inflation
  • Aligns rewards with governance participation
  • Strengthens value capture as network usage grows

Additionally, the Celestia Foundation announced a $62.5 million TIA buyback program in 2025, further reducing circulating supply.

Validator Economics

Effective January 2026, maximum validator commission increased from 10% to 20%. This addresses validators' rising operational expenses—particularly as block sizes grow—while maintaining competitive staking yields.

The Competitive Moat: First-Mover or Sustainable Advantage?

Celestia's 50% DA market share and 160+ GB of posted data represent clear traction. But moats in infrastructure can erode quickly.

Advantages

Framework Integration: Every major rollup framework—Arbitrum Orbit, OP Stack, Polygon CDK—supports Celestia as a DA option. This integration creates switching costs and reduces friction for new rollups.

Proven Scale: The 128 MB block testing provides confidence in future capacity that competitors haven't demonstrated at the same level.

Economic Alignment: The Proof-of-Governance tokenomics and buyback programs create stronger value capture than alternative models.

Challenges

EigenDA's Ethereum Alignment: For teams prioritizing Ethereum-native security, EigenDA's restaking model may be more attractive despite architectural trade-offs.

Avail's Cost Advantage: For cost-sensitive applications, Avail's lower fees may outweigh security differences.

Ethereum's Native Improvement: If Ethereum expands blob capacity significantly (as proposed in various roadmap discussions), the cost differential shrinks.

The Ecosystem Lock-in Question

Celestia's real moat may be ecosystem lock-in. Eclipse's 83+ GB of data creates path dependency—migrating to a different DA layer would require significant infrastructure changes. As more rollups accumulate history on Celestia, switching costs increase.

What the Data Tells Us

Celestia's blob economics validate the modular thesis: specialized infrastructure for data availability can be dramatically cheaper than general-purpose L1 solutions. The 55x cost advantage over Ethereum blobs isn't magic—it's the result of purpose-built architecture optimized for a specific function.

The 160+ GB of posted data proves market demand exists. The 10x growth in fee revenue demonstrates value capture. The scaling roadmap provides confidence in future capacity.

For rollup developers, the calculus is straightforward: Celestia offers the best-tested, most integrated DA solution with a clear path to gigabyte-scale capacity. EigenDA makes sense for Ethereum-native projects willing to accept DAC trust assumptions. Avail serves multichain applications prioritizing flexibility over maximum security.

The data availability market has room for multiple winners serving different segments. But Celestia's combination of proven scale, deep integrations, and improving tokenomics positions it well for the coming wave of rollup expansion.


Building rollups that need reliable data availability infrastructure? BlockEden.xyz provides RPC endpoints across 30+ networks including major L2s built on Celestia DA. Explore our API marketplace to access the infrastructure your modular stack needs.

Navigating the Privacy Technology Landscape: FHE, ZK, and TEE in Blockchain

· 10 min read
Dora Noda
Software Engineer

When Zama became the first fully homomorphic encryption unicorn in June 2025—valued at over $1 billion—it signaled something larger than one company's success. The blockchain industry had finally accepted a fundamental truth: privacy isn't optional, it's infrastructure.

But here's the uncomfortable reality developers face: there's no single "best" privacy technology. Fully Homomorphic Encryption (FHE), Zero-Knowledge Proofs (ZK), and Trusted Execution Environments (TEE) each solve different problems with different tradeoffs. Choosing wrong doesn't just impact performance—it can fundamentally compromise what you're trying to build.

This guide breaks down when to use each technology, what you're actually trading off, and why the future likely involves all three working together.

The Privacy Technology Landscape in 2026

The blockchain privacy market has evolved from niche experimentation to serious infrastructure. ZK-based rollups now secure over $28 billion in Total Value Locked. The Zero-Knowledge KYC market alone is projected to grow from $83.6 million in 2025 to $903.5 million by 2032—a 40.5% compound annual growth rate.

But market size doesn't help you choose a technology. Understanding what each approach actually does is the starting point.

Zero-Knowledge Proofs: Proving Without Revealing

ZK proofs allow one party to prove a statement is true without revealing any information about the content itself. You can prove you're over 18 without revealing your birthdate, or prove a transaction is valid without exposing the amount.

How it works: The prover generates a cryptographic proof that a computation was performed correctly. The verifier can check this proof quickly without re-running the computation or seeing the underlying data.

The catch: ZK excels at proving things about data you already hold. It struggles with shared state. You can prove your balance is sufficient for a transaction, but you can't easily ask questions like "how many fraud cases happened chain-wide?" or "who won this sealed-bid auction?" without additional infrastructure.

Leading projects: Aztec enables hybrid public/private smart contracts where users choose whether transactions are visible. zkSync focuses primarily on scalability with enterprise-focused "Prividiums" for permissioned privacy. Railgun and Nocturne provide shielded transaction pools.

Fully Homomorphic Encryption: Computing on Encrypted Data

FHE is often called the "holy grail" of encryption because it allows computation on encrypted data without ever decrypting it. The data stays encrypted during processing, and the results remain encrypted—only the authorized party can decrypt the output.

How it works: Mathematical operations are performed directly on ciphertexts. Addition and multiplication on encrypted values produce encrypted results that, when decrypted, match what you'd get from operating on plaintext.

The catch: Computational overhead is massive. Even with recent optimizations, FHE-based smart contracts on Inco Network achieve only 10-30 TPS depending on hardware—orders of magnitude slower than plaintext execution.

Leading projects: Zama provides the foundational infrastructure with FHEVM (their fully homomorphic EVM). Fhenix builds application-layer solutions using Zama's technology, having deployed CoFHE coprocessor on Arbitrum with decryption speeds up to 50x faster than competing approaches.

Trusted Execution Environments: Hardware-Based Isolation

TEEs create secure enclaves within processors where computations occur in isolation. Data inside the enclave remains protected even if the broader system is compromised. Unlike cryptographic approaches, TEEs rely on hardware rather than mathematical complexity.

How it works: Specialized hardware (Intel SGX, AMD SEV) creates isolated memory regions. Code and data inside the enclave are encrypted and inaccessible to the operating system, hypervisor, or other processes—even with root access.

The catch: You're trusting hardware manufacturers. Any single compromised enclave can leak plaintext, regardless of how many nodes participate. In 2022, a critical SGX vulnerability forced coordinated key updates across Secret Network, demonstrating the operational complexity of hardware-dependent security.

Leading projects: Secret Network pioneered private smart contracts using Intel SGX. Oasis Network's Sapphire is the first confidential EVM in production, processing up to 10,000 TPS. Phala Network operates over 1,000 TEE nodes for confidential AI workloads.

The Tradeoff Matrix: Performance, Security, and Trust

Understanding the fundamental tradeoffs helps match technology to use case.

Performance

TechnologyThroughputLatencyCost
TEENear-native (10,000+ TPS)LowLow operational cost
ZKModerate (varies by implementation)Higher (proof generation)Medium
FHELow (10-30 TPS currently)HighVery high operational cost

TEEs win on raw performance because they're essentially running native code in protected memory. ZK introduces proof generation overhead but verification is fast. FHE currently requires intensive computation that limits practical throughput.

Security Model

TechnologyTrust AssumptionPost-QuantumFailure Mode
TEEHardware manufacturerNot resistantSingle enclave compromise exposes all data
ZKCryptographic (often trusted setup)Varies by schemeProof system bugs can be invisible
FHECryptographic (lattice-based)ResistantComputationally intensive to exploit

TEEs require trusting Intel, AMD, or whoever manufactures the hardware—plus trusting that no firmware vulnerabilities exist. ZK systems often require "trusted setup" ceremonies, though newer schemes eliminate this. FHE's lattice-based cryptography is believed quantum-resistant, making it the strongest long-term security bet.

Programmability

TechnologyComposabilityState PrivacyFlexibility
TEEHighFullLimited by hardware availability
ZKLimitedLocal (client-side)High for verification
FHEFullGlobalLimited by performance

ZK excels at local privacy—protecting your inputs—but struggles with shared state across users. FHE maintains full composability because encrypted state can be computed upon by anyone without revealing contents. TEEs offer high programmability but are constrained to environments with compatible hardware.

Choosing the Right Technology: Use Case Analysis

Different applications demand different tradeoffs. Here's how leading projects are making these choices.

DeFi: MEV Protection and Private Trading

Challenge: Front-running and sandwich attacks extract billions from DeFi users by exploiting visible mempools.

FHE solution: Zama's confidential blockchain enables transactions where parameters remain encrypted until block inclusion. Front-running becomes mathematically impossible—there's no visible data to exploit. The December 2025 mainnet launch included the first confidential stablecoin transfer using cUSDT.

TEE solution: Oasis Network's Sapphire enables confidential smart contracts for dark pools and private order matching. Lower latency makes it suitable for high-frequency trading scenarios where FHE's computational overhead is prohibitive.

When to choose: FHE for applications requiring the strongest cryptographic guarantees and global state privacy. TEE when performance requirements exceed what FHE can deliver and hardware trust is acceptable.

Identity and Credentials: Privacy-Preserving KYC

Challenge: Proving identity attributes (age, citizenship, accreditation) without exposing documents.

ZK solution: Zero-knowledge credentials let users prove "KYC passed" without revealing underlying documents. This satisfies compliance requirements while protecting user privacy—a critical balance as regulatory pressure intensifies.

Why ZK wins here: Identity verification is fundamentally about proving statements about personal data. ZK is purpose-built for this: compact proofs that verify without revealing. The verification is fast enough for real-time use.

Confidential AI and Sensitive Computation

Challenge: Processing sensitive data (healthcare, financial models) without exposure to operators.

TEE solution: Phala Network's TEE-based cloud processes LLM queries without platform access to inputs. With GPU TEE support (NVIDIA H100/H200), confidential AI workloads run at practical speeds.

FHE potential: As performance improves, FHE enables computation where even the hardware operator can't access data—removing the trust assumption entirely. Current limitations restrict this to simpler computations.

Hybrid approach: Run initial data processing in TEEs for speed, use FHE for the most sensitive operations, and generate ZK proofs to verify results.

The Vulnerability Reality

Each technology has failed in production—understanding failure modes is essential.

TEE Failures

In 2022, critical SGX vulnerabilities affected multiple blockchain projects. Secret Network, Phala, Crust, and IntegriTEE required coordinated patches. Oasis survived because its core systems run on older SGX v1 (unaffected) and don't rely on enclave secrecy for funds safety.

Lesson: TEE security depends on hardware you don't control. Defense-in-depth (key rotation, threshold cryptography, minimal trust assumptions) is mandatory.

ZK Failures

On April 16, 2025, Solana patched a zero-day vulnerability in its Confidential Transfers feature. The bug could have enabled unlimited token minting. The dangerous aspect of ZK failures: when proofs fail, they fail invisibly. You can't see what shouldn't be there.

Lesson: ZK systems require extensive formal verification and audit. The complexity of proof systems creates attack surface that's difficult to reason about.

FHE Considerations

FHE hasn't experienced major production failures—largely because it's earlier in deployment. The risk profile differs: FHE is computationally intensive to attack, but implementation bugs in complex cryptographic libraries could enable subtle vulnerabilities.

Lesson: Newer technology means less battle-testing. The cryptographic guarantees are strong, but the implementation layer needs continued scrutiny.

Hybrid Architectures: The Future Isn't Either/Or

The most sophisticated privacy systems combine multiple technologies, using each where it excels.

ZK + FHE Integration

User states (balances, preferences) stored with FHE encryption. ZK proofs verify valid state transitions without exposing encrypted values. This enables private execution within scalable L2 environments—combining FHE's global state privacy with ZK's efficient verification.

TEE + ZK Combination

TEEs process sensitive computations at near-native speed. ZK proofs verify that TEE outputs are correct, removing the single-operator trust assumption. If the TEE is compromised, invalid outputs would fail ZK verification.

When to Use What

A practical decision framework:

Choose TEE when:

  • Performance is critical (high-frequency trading, real-time applications)
  • Hardware trust is acceptable for your threat model
  • You need to process large data volumes quickly

Choose ZK when:

  • You're proving statements about client-held data
  • Verification must be fast and low-cost
  • You don't need global state privacy

Choose FHE when:

  • Global state must remain encrypted
  • Post-quantum security is required
  • Computation complexity is acceptable for your use case

Choose hybrid when:

  • Different components have different security requirements
  • You need to balance performance with security guarantees
  • Regulatory compliance requires demonstrable privacy

What Comes Next

Vitalik Buterin recently pushed for standardized "efficiency ratios"—comparing cryptographic computation time to plaintext execution. This reflects the industry's maturation: we're moving from "does it work?" to "how efficiently does it work?"

FHE performance continues improving. Zama's December 2025 mainnet proves production-readiness for simple smart contracts. As hardware acceleration develops (GPU optimization, custom ASICs), the throughput gap with TEEs will narrow.

ZK systems are becoming more expressive. Aztec's Noir language enables complex private logic that would have been impractical years ago. Standards are slowly converging, enabling cross-chain ZK credential verification.

TEE diversity is expanding beyond Intel SGX. AMD SEV, ARM TrustZone, and RISC-V implementations reduce dependency on any single manufacturer. Threshold cryptography across multiple TEE vendors could address the single-point-of-failure concern.

The privacy infrastructure buildout is happening now. For developers building privacy-sensitive applications, the choice isn't about finding the perfect technology—it's about understanding tradeoffs well enough to combine them intelligently.


Building privacy-preserving applications on blockchain? BlockEden.xyz provides high-performance RPC endpoints across 30+ networks, including privacy-focused chains. Explore our API marketplace to access the infrastructure your confidential applications need.

JPMorgan Canton Network

· 8 min read
Dora Noda
Software Engineer

JPMorgan processes $2-3 billion in daily blockchain transactions. Goldman Sachs and BNY Mellon just launched tokenized money market funds on shared infrastructure. And the DTCC—the backbone of US securities settlement—received SEC approval to tokenize Treasury securities on a blockchain most crypto natives have never heard of. Welcome to the Canton Network, Wall Street's answer to Ethereum that's quietly processing $4 trillion monthly while public chains debate which memecoin to pump next.

White-Label Stablecoin Wars: How Platforms Are Recapturing the $10B Margin Circle and Tether Keep

· 10 min read
Dora Noda
Software Engineer

Tether made $10 billion in profit during the first three quarters of 2025. With fewer than 200 employees, that's over $65 million in gross profit per person—making it one of the most profitable companies per employee on Earth.

Circle isn't far behind. Despite sharing 50% of its reserve revenue with Coinbase, the USDC issuer generated $740 million in Q3 2025 alone, keeping 38% margins after distribution costs.

Now platforms are asking an obvious question: why are we sending this money to Circle and Tether?

Hyperliquid holds nearly $6 billion in USDC deposits—about 7.5% of all USDC in circulation. Until September 2025, every dollar of interest on those deposits flowed to Circle. Then Hyperliquid launched USDH, its own native stablecoin, with 50% of reserve yields flowing back to the protocol.

They're not alone. SoFi became the first U.S. national bank to issue a stablecoin on a public blockchain. Coinbase launched white-label stablecoin infrastructure. WSPN rolled out turnkey solutions letting enterprises deploy branded stablecoins in weeks. The great stablecoin margin recapture has begun.

x402 Protocol: How a Forgotten HTTP Code Became the Payment Rails for 15 Million AI Agent Transactions

· 10 min read
Dora Noda
Software Engineer

For 28 years, HTTP status code 402 sat dormant in the protocol specification. "Payment Required"—a placeholder for a future that never arrived. Credit cards won. Subscription models dominated. The internet evolved without native payments.

Then AI agents started needing to buy things.

In May 2025, Coinbase launched x402—a protocol that finally activates HTTP 402 for instant, autonomous stablecoin payments. Within months, x402 processed 15 million transactions. Cloudflare co-founded the x402 Foundation. Google integrated it into their Agentic Payments Protocol. Transaction volume grew 10,000% in a single month.

The timing wasn't accidental. As AI agents evolved from chatbots to autonomous economic actors—buying API access, paying for compute, purchasing data—they exposed a fundamental gap: traditional payment infrastructure assumes human participation. Account creation. Authentication. Explicit approval. None of it works when machines need to transact in milliseconds.

x402 treats AI agents as first-class economic participants. And that changes everything.