Skip to main content

109 posts tagged with "Security"

Cybersecurity, smart contract audits, and best practices

View all tags

Resolv Hack: How One AWS Key Minted $25M and Broke DeFi Again

· 10 min read
Dora Noda
Software Engineer

On March 22, 2026, an attacker walked into Resolv Labs with $100,000 in USDC and walked out with $25 million in ETH. The smart contracts never bugged out. The oracle never lied. The delta-neutral hedging strategy behaved exactly as designed. Instead, a single AWS Key Management Service credential — one signing key that lived outside the blockchain — gave an intruder permission to mint 80 million unbacked USR tokens against a $100K deposit. Seventeen minutes later, USR had fallen from $1.00 to $0.025, a 97.5% collapse, and lending protocols across Ethereum were absorbing the shock.

The Resolv incident isn't remarkable because it was clever. It's remarkable because it wasn't. A missing max-mint check, a single point of failure in cloud key management, and oracles that priced a depegged stablecoin at $1 — DeFi has seen each of these failures before. What the hack reveals is uncomfortable: the attack surface of modern stablecoins has quietly migrated from Solidity to AWS consoles, and the industry's security models haven't caught up.

Scroll's Research Moat: Why the zkEVM Built With Ethereum Foundation Cryptographers Still Matters in 2026

· 12 min read
Dora Noda
Software Engineer

Most Layer 2s were built by product teams who hired cryptographers. Scroll was built by cryptographers who decided to ship a product. That distinction — buried in the git history of the zkevm-circuits repository, where roughly 50% of the early commits came from Ethereum Foundation researchers and 50% from Scroll engineers — is now one of the more interesting moats in the zkEVM landscape. As six production zkEVMs compete for the same DeFi settlement and institutional traffic, Scroll's origin story isn't just marketing. It's a claim about how the underlying math was designed, audited, and hardened — and whether that difference can still matter when everyone ships fast proofs.

The PSE Collaboration Nobody Else Can Replicate

Scroll's zkEVM was not built in isolation. From its earliest commits, it was co-developed with the Ethereum Foundation's Privacy and Scaling Explorations (PSE) team — the same researchers who author the cryptographic libraries the rest of the industry depends on. The collaboration ran deep enough that both parties contributed roughly 50% of the PSE zkEVM codebase, with Halo2 — the proof system powering the circuits — jointly modified by the two teams to swap its polynomial commitment scheme from IPA to KZG. That change cut proof size meaningfully and made ZK verification on Ethereum economically viable.

This is the technical point competitors have trouble replicating. When the team writing your circuits is the same team auditing the cryptographic library those circuits compile into, a class of subtle bugs disappears. You are not integrating an external primitive and praying its edge cases match your assumptions — you are designing both sides of the interface together. PSE has since shifted focus to a new zkVM exploration, but the Halo2 fork Scroll inherits is still actively maintained upstream. That matters because a zkEVM is not a one-time deliverable. It is a cryptographic surface that needs to be continuously extended as Ethereum adds opcodes, precompiles, and hard-fork changes.

Contrast this with the competing architectures. zkSync Era uses a Type 4 approach, transpiling Solidity to its own custom bytecode optimized for proving. Starknet uses Cairo, a new language designed for STARKs, which means the entire development stack is custom. Polygon's zkEVM takes a bytecode-level approach closer to Scroll, but the cryptographic library and execution environment were developed in-house rather than in tandem with Ethereum Foundation researchers. Linea, Taiko, and others each occupy different points on the compatibility spectrum.

None of them can honestly market "our circuits were co-designed with the researchers who invented the proving system." That sentence is a Scroll-only sentence.

Bytecode Equivalence Is a Security Posture, Not a Feature

The Vitalik-authored zkEVM type classification has become standard industry taxonomy: Type 1 aims for full Ethereum equivalence at every layer, Type 2 preserves bytecode equivalence with minor internal modifications, Type 3 makes larger compromises for performance, and Type 4 abandons bytecode entirely for speed. In 2026, Scroll is working toward Type 2 while documenting every opcode and precompile difference transparently in its public docs.

The practical meaning of bytecode equivalence is this: a Solidity contract compiled with the standard Ethereum toolchain produces bytecode that runs identically on Scroll as it does on Ethereum mainnet. No recompilation. No custom compiler. No special libraries. The contract you audit on mainnet is the contract that executes on L2.

This sounds like a developer-experience feature. It is actually a security posture. Every additional transformation between mainnet bytecode and L2 execution is a surface where bugs can appear — silently, in production, after the audit has already concluded. zkSync Era's transpiler has shipped multiple edge-case bugs where Solidity constructs behaved differently on L2 than on L1. These are not theoretical risks. They are the kind of issues that destroy DeFi TVL when a lending protocol's liquidation logic behaves slightly differently than its developers verified.

Scroll's trade-off is explicit: bytecode equivalence caps peak throughput below more aggressively optimized Type 3 and Type 4 designs. You pay for security in TPS. For DeFi protocols settling real value, that trade is almost always the right one. For gaming and consumer apps where a bug is a rollback and not a bankruptcy, the trade is less clear — which is why the landscape has fragmented rather than consolidated.

The Multi-Team Audit Stack

Scroll's audit history reveals how seriously the team takes circuit correctness — and how hard it is to get right. The codebase has been independently reviewed by Trail of Bits, OpenZeppelin, Zellic, and KALOS, with different firms covering different surfaces:

  • Trail of Bits, Zellic, and KALOS reviewed the zkEVM circuits themselves — the cryptographic proofs of execution correctness.
  • OpenZeppelin and Zellic audited the bridge and rollup contracts — the Solidity layer that actually moves funds.
  • Trail of Bits separately analyzed the node implementation — the off-chain infrastructure that produces blocks and proofs.

The Trail of Bits engagement alone produced custom Semgrep rules built specifically for Scroll's codebase, meaning future contributors inherit a static-analysis layer tuned to the project's specific risk surface. OpenZeppelin has run multiple diff audits as the code evolved — not one big audit at launch, but continuous review of pull requests. This is how mature security programs work in traditional software, and it is still rare in crypto, where "we were audited" often means "someone looked at the code once in 2023."

Multi-team independent review matters because circuit bugs are unlike smart contract bugs. A Solidity reentrancy vulnerability can often be discovered by a careful reader. A bug in a PLONKish arithmetization of an EVM opcode requires an auditor who understands both the EVM semantics and the constraint system used to prove them. There are perhaps a few dozen people in the world qualified to find such a bug, and they are spread across Trail of Bits, OpenZeppelin, Zellic, KALOS, and a handful of academic groups. Scroll has engaged most of them.

Proof Generation: The Number That Actually Matters

Early zkEVM prototypes required hours to generate a single block proof. That was a research demo, not a production system. By 2026, the frontier has moved dramatically:

  • Current zkEVM implementations complete proof generation in roughly 16 seconds — a 60x improvement from early designs.
  • Leading teams have demonstrated sub-2-second proof generation, faster than Ethereum's 12-second block times.
  • Scroll's prover sits in the competitive range of this curve, with ongoing work on prover compression and GPU acceleration.

Why does this matter economically? Proof generation cost is the dominant variable cost of a zkEVM. Every second of prover time is electricity and amortized hardware. The difference between 16-second proofs and 2-second proofs is roughly an 8x reduction in the cost to settle a block — which translates directly into lower transaction fees for end users and higher margins for rollup operators.

The more interesting question is whether proof speed is now commoditizing. When every serious zkEVM ships sub-10-second proofs, the differentiator moves back to security, developer experience, and ecosystem — the axes where Scroll's research pedigree and bytecode equivalence compound over time. A year ago, "our proofs are fast" was a legitimate marketing claim. In 2026, it is table stakes.

The TVL Reality Check

Technical elegance does not automatically translate into economic traction. Scroll hit over $748 million in TVL within one year of its October 2023 mainnet launch — briefly establishing itself as the largest zk rollup by TVL. By late 2024, DeFi TVL had compressed to around $152 million after a peak near $980 million in October 2024. As of February 2026, the network has processed over 110 million transactions and supports more than 100 dApps built by 700+ active developers.

Compare the zk-rollup leaderboard in 2026:

  • Linea leads newer zk-rollups with ~$963 million TVL.
  • Starknet holds ~$826 million with ~21.2% YoY growth.
  • zkSync Era has ~$569 million with ~22% YoY growth and captured 25% of on-chain RWA market share in 2025 ($1.9 billion).
  • Cumulative L2 TVL reached $39.39 billion for the 12 months ending November 2025, with the overall L2 ecosystem at roughly $70 billion.

Scroll's position in this pack is middle-of-leaderboard rather than dominant. The gap between the technical moat ("we were built with PSE") and the economic outcome ("we are the #1 zkEVM by TVL") is real — and it is the strategic question facing the team through 2026.

Why the Research Moat Still Matters

The pessimistic read of Scroll's position: in a market where proof generation is commoditizing, where every major zkEVM ships with reputable audits, and where user acquisition comes from incentive programs rather than cryptographic elegance, does the PSE collaboration actually matter? Users do not check which proving system their rollup uses. Developers do not compare audit reports before deploying a stablecoin.

The optimistic read: cryptographic infrastructure is the kind of thing that does not matter until it suddenly matters catastrophically. A serious circuit bug in a competing zkEVM — the kind that allows a prover to forge a state transition — would be an extinction-level event for that chain's TVL and a reallocation moment for the entire ZK rollup category. In that scenario, "built with Ethereum Foundation researchers, audited by four independent circuit security teams, explicit bytecode equivalence with mainnet" becomes the default flight-to-quality destination.

This is not a hypothetical. The optimistic rollup space has had fraud-proof windows precisely because the industry understands that rare, catastrophic failures do happen. The ZK space has been lucky so far — no production zkEVM has yet shipped a verifiable soundness bug that led to user fund loss. When that day comes (and statistically, across six-plus production zkEVMs running for years, something will eventually break), the chains with the deepest research heritage and the most redundant audit stacks will absorb the displaced TVL.

Scroll is positioning for that day.

What This Means for Builders and Infrastructure

For protocol developers choosing a zkEVM in 2026, the calculus has shifted. A year ago, you picked based on proof speed, fees, and token incentives. Today, those factors are increasingly similar across the top six chains. The differentiators that persist:

  • Bytecode equivalence (Scroll, Polygon zkEVM) vs transpilation (zkSync) vs new VM (Starknet) — affects how much of your Ethereum tooling works without modification.
  • Cryptographic heritage — whether your circuits were built by the same community that maintains the proving libraries.
  • Audit depth — single-team vs multi-team, one-time vs continuous.
  • DA layer flexibility — whether you are locked into Ethereum calldata or can use blobs and external DA.

For infrastructure providers, the fragmentation is the story. Six serious zkEVMs, plus optimistic rollups, plus emerging SVM L2s, plus app-chains — each with their own RPC endpoints, indexing requirements, and node software. The winners in this landscape are not the chains themselves but the neutral providers who abstract the complexity away from developers.

BlockEden.xyz provides production-grade RPC and indexing infrastructure across Ethereum, major Layer 2s, and leading alternative chains. If you are building across zkEVMs and need reliable endpoints without operating your own node fleet, explore our API marketplace — it is built for teams who would rather ship product than operate infrastructure.

The Verdict

Scroll's PSE collaboration and bytecode equivalence posture are not going to win the TVL race on their own. Incentive programs, ecosystem partnerships, and institutional integrations matter too, and Scroll is in a fight there against chains with larger treasuries and earlier institutional relationships.

But the underlying claim — that a zkEVM built in tandem with Ethereum Foundation researchers, audited by four independent circuit security teams, and deliberately constrained to mainnet bytecode equivalence is a materially safer piece of cryptographic infrastructure than its competitors — is defensible. In a category where the rare catastrophic failure eventually arrives, that defensibility is worth something. How much it ends up being worth depends on whether the market prices safety before the accident or only after.

For 2026, the Scroll story is the story of whether research-grade security becomes a durable moat or gets outcompeted by faster-shipping teams with shallower cryptographic heritage. It is one of the more interesting experiments running in the L2 space — and the answer will shape how institutional allocators think about zkEVM risk for years.

Sources

Ketman Project: How 100 North Korean Operatives Slipped Inside Web3

· 9 min read
Dora Noda
Software Engineer

One hundred North Korean operatives. Fifty-three crypto projects. Six months of patient intelligence work — and the uncomfortable conclusion that the most dangerous DPRK attack on Web3 is not the next exploit, but the engineer who already merged code to your main branch last quarter.

That is the headline finding from the Ketman Project, an Ethereum Foundation-backed initiative running under the ETH Rangers security program. Its April 2026 disclosure does not describe a hack. It describes a workforce — a long-horizon labor pipeline that has been quietly funneling DPRK revenue out of crypto payrolls while planting the kind of insider access that makes events like the $1.5 billion Bybit heist possible in the first place.

For an industry conditioned to think of DPRK risk as something that happens at the multisig, this is a category shift. The threat is no longer just "they will break in." It is "they are already inside, and they wrote the build script."

DeFi's Shadow Contagion: When a $25M Hack Triggers $500M in Cascading Losses

· 10 min read
Dora Noda
Software Engineer

On March 22, 2026, an attacker deposited about $100,000 of USDC into a stablecoin protocol most of crypto had never heard of. Seventeen minutes later, they walked away with roughly $25 million in ETH. By the end of the week, the actual damage wasn't $25 million. It was more than $500 million — scattered across lending markets that had never been touched by the exploit itself.

Welcome to DeFi's shadow contagion problem: the systemic risk nobody is pricing, because nobody has a map of the pipes.

Seven Phone Calls and a $5 Million Deal: The Milei-Libra Scandal Becomes Latin America's Defining Crypto Reckoning

· 10 min read
Dora Noda
Software Engineer

On the night of February 14, 2025, Javier Milei — Argentina's self-described "anarcho-capitalist" president — posted a link to a memecoin called LIBRA to his millions of X followers. Within an hour, the token's market cap blew past \4.5 billion. By the next morning it had collapsed 96%, erasing roughly $251 million from the wallets of about 114,000 retail traders. For fourteen months, Milei insisted he had no direct involvement — that he had simply "shared information" about a project he did not properly vet.

Court documents released this month tell a different story. According to phone records obtained by Argentine federal prosecutors and first reported by The New York Times, Milei exchanged seven phone calls with crypto lobbyist Mauricio Novelli — a key figure behind the LIBRA launch — on the exact evening of the promotion. Calls occurred both before and after Milei hit post. Prosecutors also recovered a draft agreement from Novelli's phone outlining a $5 million payment tied to the president's promotional support.

Quantum-Safe Bitcoin Without a Soft Fork at $200 a Transaction

· 10 min read
Dora Noda
Software Engineer

What if you could quantum-proof your Bitcoin today — no hard fork, no soft fork, no waiting seven years for governance consensus — as long as you were willing to pay about $200 per transaction?

That's the offer on the table from a new StarkWare paper that has quietly become one of the most important Bitcoin research artifacts of 2026. On April 9, StarkWare researcher Avihu Levy published "QSB: Quantum Safe Bitcoin Transactions Without Softforks," and within 24 hours CoinDesk, The Quantum Insider, and Bitcoin Magazine had all framed it as a potential escape hatch for the roughly 4 million BTC — more than $280 billion at April's prices — that already sit in quantum-vulnerable addresses.

The catch is real. So is the relief. Together, they reshape how serious Bitcoin holders should be thinking about Q-Day.

Project Glasswing: How Anthropic's $100M AI Security Cartel Forces Crypto Into a Two-Tier Defense Economy

· 10 min read
Dora Noda
Software Engineer

On April 7, 2026, Treasury Secretary Scott Bessent and Federal Reserve Chair Jerome Powell pulled the CEOs of Citigroup, Morgan Stanley, Bank of America, Wells Fargo, and Goldman Sachs into an emergency meeting at Treasury headquarters. The subject was not a bank failure, a rate decision, or a sanctions regime. It was a single AI model built by a San Francisco research lab — Anthropic's Claude Mythos Preview — that had quietly found thousands of high-severity vulnerabilities in every major operating system and every major web browser, more than 99% of them still unpatched.

Three days earlier, Anthropic had announced Project Glasswing: a commitment of up to $100M in Mythos usage credits to a closed coalition of twelve technology, security, and financial giants — AWS, Apple, Broadcom, Cisco, CrowdStrike, Google, JPMorgan Chase, the Linux Foundation, Microsoft, NVIDIA, Palo Alto Networks — plus over 40 critical open-source maintainers. Everyone else, including Coinbase and Binance, was left to negotiate from outside the perimeter.

For crypto, the implications cut deeper than a typical security-tool launch. Glasswing is the first time a private AI lab has effectively defined a two-tier vulnerability-discovery economy, and the crypto industry — which lost over $3B to exploits in H1 2025 alone — has to decide whether it belongs on the inside or the outside of that perimeter.

What Mythos Actually Does

Anthropic's own framing is unusually stark. In internal tests, Mythos identified a 27-year-old bug in OpenBSD that no human auditor had ever surfaced, then chained consecutive vulnerabilities to break out of modern browser sandboxes. Traditional smart contract audits take weeks. Mythos generates effective attack paths in seconds.

That asymmetry is the story. The model does not just flag candidate bugs; it auto-generates working exploit code and orchestrates multi-stage attack chains. Anthropic deemed the capability "super dangerous" for unsupervised public release, which is why Mythos Preview is not available via normal API access. Instead, it lives behind the Glasswing gate.

The coalition is not a research collaboration in the academic sense. Participants receive live access to Mythos to hunt vulnerabilities in their own systems — TLS implementations, AES-GCM primitives, SSH daemons, kernel code, and in JPMorgan's case, the internal payment and trading stacks that clear trillions of dollars daily. Anthropic has committed to publish a 90-day public report in early July 2026 summarizing what Glasswing has fixed.

Why Coinbase and Binance Are Now Negotiating From Outside the Wall

Coinbase's chief security officer Philip Martin has publicly confirmed the company is in "close communication" with Anthropic, framing the objective as building an "AI immune system" — using Mythos defensively to scan its own systems before someone with a comparable capability uses it offensively. Binance's CSO described a parallel evaluation, citing both the defensive upside and the threat surface.

The asymmetry problem for crypto exchanges is brutal. A centralized exchange holds hot wallet keys, user balances, and a custody stack that any moderately motivated offensive operator would pay seven figures to probe. If Mythos — or a model of equivalent capability leaked from an employee, a state-sponsored actor, or an eventual open-weight competitor — ends up in attacker hands before exchanges harden their systems, the exploit window is measured in hours, not quarters.

That is the core of the Glasswing dilemma. Exchanges that are not inside the coalition cannot use Mythos to pre-audit their own code. They can use second-tier tools, but the capability gap matters. A bug that Mythos catches in 30 seconds might take a human auditor three weeks, and might be found by an adversary with comparable AI access in minutes.

The $3B Context: Why Speed Asymmetry Is an Existential Threat for DeFi

H1 2025 saw over $3B in Web3 platform losses. Access control exploits alone accounted for $1.63B — the leading category in that period's OWASP Smart Contract Top 10. FailSafe's 2025 report tallied $2.6B in losses across 192 incidents. Immunefi has paid out over $115M in bug bounties across 400+ protocols and claims to have prevented more than $25B in potential losses.

Now overlay Mythos-class capability on that threat model. A protocol with $500M TVL that relies on a quarterly audit from a top-tier firm was already losing the race against well-resourced attackers. When one side of the table can auto-generate exploit chains in seconds, the audit cadence that defined DeFi security from 2020 through 2025 stops working.

The defensive equivalent exists but lags. CertiK's AI Auditor, open-sourced after six months of internal testing, achieves an 88.6% cumulative hit rate across 35 real 2026 web3 security incidents. It runs parallel specialized scanners through a multi-stage validator to filter duplicates and non-exploitable findings. CertiK has flagged over 180,000 vulnerabilities across its eight-year history and secured more than $600B in digital assets.

But 88.6% is not 100%, and an open-source auditor that runs in minutes is not the same as a frontier model that reasons about novel vulnerability classes in seconds. The gap between what Glasswing partners get and what public tools deliver is structural.

Three Competing Security Architectures

The crypto industry now has to choose among three incompatible models for AI-era security:

Public bug bounties (Immunefi). Decentralized, economically aligned, proven at scale — $115M paid out, $25B saved. But the incentive structure assumes attackers and defenders operate at roughly equivalent speed. Mythos breaks that assumption. A white-hat researcher chasing a $50K bounty cannot outbid a state-sponsored actor paying $5M for a zero-day on a $10B protocol.

Open-source AI auditing (CertiK, Sherlock, Cyfrin). Democratic access to mid-tier AI capability, 88.6% hit rate, integrates into developer workflows. Preserves the crypto-native ethos that security tooling should be public. But the capability ceiling is below what Glasswing partners get, and the gap compounds as frontier models improve.

Gated-access frontier AI (Glasswing). Best-in-class vulnerability discovery, but only for members of a private coalition that currently does not include any crypto-native company. Creates clear tiers of cyber defense where the inside of the wall is safer than the outside.

The three models are not mutually exclusive — an exchange could run CertiK's auditor on every contract deployment, maintain an Immunefi bounty, and lobby for Glasswing partnership — but they imply very different industry structures. If Glasswing becomes the default tier for "systemically important" infrastructure, crypto's largest custodians face pressure to get in, and the protocols that can't get in face a pricing penalty on their risk premium.

The Systemic Framing Changes Everything

What made the April 7 Bessent-Powell meeting remarkable is not the fact that regulators talked to bank CEOs about cyber risk. That happens routinely. The remarkable fact is the framing: AI-class cyber capability is now being treated as a potential catalyst for systemic financial events, on par with a sovereign debt crisis or a major clearinghouse failure.

That framing has second-order consequences for crypto. Stablecoin issuers holding tens of billions in reserves, custodians holding institutional BTC and ETH, and the exchange matching engines that process hundreds of billions in monthly volume all sit squarely inside the definition of "systemically important" that regulators are starting to apply to AI cyber risk. If the next Powell-Bessent-style meeting happens and crypto leadership is not at the table, that is both a signal and a problem.

The regulatory signal matters because Glasswing's 90-day public report in July 2026 will publish both what partners fixed and what the broader industry should learn. If that report documents classes of vulnerabilities that Mythos found in critical infrastructure, and crypto protocols have not done equivalent work, the gap will be visible to regulators, insurers, and institutional allocators pricing counterparty risk.

What This Means for Infrastructure Providers

Machine-speed offensive AI changes the audit cadence required to defend production systems. A protocol or infrastructure provider that relied on annual audits, quarterly pen tests, and reactive incident response needs to shift to continuous AI-assisted red-teaming. That is expensive, and the expense lands unevenly across the stack.

For RPC providers, API infrastructure, and node services that sit between agents and chains, the pressure is to harden the surface where machine-initiated traffic terminates. Agent-driven transaction volume already creates a different threat profile than human-driven dApps: burst-heavy, predictable schedules, and deterministic call graphs that an attacker can model more precisely than a dispersed human user base.

BlockEden.xyz operates enterprise-grade RPC and API infrastructure across Sui, Aptos, Ethereum, Solana, and other major chains, with security and reliability built to serve both human developers and autonomous agent workloads. Explore our services to build on infrastructure designed to hold up in an AI-accelerated threat environment.

The Open Question Heading Into July 2026

The 90-day Glasswing report is the pivot. If it documents a large backlog of serious vulnerabilities fixed in AWS, Google, Microsoft, Apple, and JPMorgan systems, the case for expanding the coalition gets stronger, and pressure builds on Anthropic to add crypto-native members or to license Mythos-equivalent access through a formal vendor relationship. If the report underdelivers — overcounts CVE findings, documents mostly low-severity bugs, or surfaces issues that existing scanners already caught — the Glasswing model loses some of its regulatory mystique and the crypto industry's open-source alternative looks relatively stronger.

Either way, the status quo from 2020-2025 is gone. The combination of an emergency Bessent-Powell meeting, a $100M Anthropic commitment, a 99%+ unpatched rate on Mythos-discovered bugs, and $3B in annual DeFi losses means that AI-era security is no longer a research question. It is a market structure question, and crypto's answer will define whether the next $100B of on-chain value sits inside a defensible perimeter or outside one.

Sources

Bonk.fun Domain Hijack: Front-End Attacks Are Crypto's Fastest-Growing Threat Vector

· 9 min read
Dora Noda
Software Engineer

On March 12, 2026, a community-driven Solana launchpad processing hundreds of thousands of dollars in daily fees briefly turned into a wallet-draining trap — and the smart contracts powering it were never touched. Bonk.fun, the letsBONK-branded meme coin platform backed by Raydium and the BONK DAO, had its domain hijacked, a fake "Terms of Service" signature prompt injected into its front-end, and roughly 35 wallets emptied before the team flagged the compromise. The attackers didn't need a zero-day. They needed a hostname.

That single hour of chaos captures what security teams across DeFi have been whispering since 2023 and shouting since the $1.4 billion Bybit heist: the Solidity code is no longer the soft target. The front-end is. And the industry's collective blind spot is costing users more than any smart contract exploit in history.

Circle Arc Bets the Stablecoin Future on Quantum-Resistant Cryptography — Why the First Post-Quantum L1 Matters Before Bitcoin Does

· 13 min read
Dora Noda
Software Engineer

What if the $200 billion stablecoin market is about to pick a winner based not on speed, fees, or liquidity — but on cryptography that does not exist in production anywhere else?

That is the wager Circle just made. In April 2026, the issuer of USDC published a full-stack, phased post-quantum security roadmap for Arc, its upcoming Layer-1 blockchain. Arc will debut at mainnet with opt-in quantum-resistant wallets and signatures based on NIST-standardized lattice cryptography. No other major L1 — not Bitcoin, not Ethereum, not Solana — currently ships this at launch. Arc is aiming to be the first chain where "post-quantum" is a shipping feature, not a years-away governance debate.

The timing is not accidental. Six days before Circle's announcement, Google Quantum AI published research slashing the qubit count needed to break Bitcoin's elliptic curve cryptography by a factor of twenty. Google now says the industry needs to migrate by 2029. For a stablecoin chain targeting BlackRock, Visa, HSBC, and ten-year institutional commitments, "we will figure it out later" is not a credible answer.

A Stablecoin-Native Chain With Heavyweight Testnet Traffic

Arc is not a typical "crypto VC chain." It is a stablecoin operating system, built by the company with the second-largest regulated stablecoin on Earth.

USDC's market cap sits around $77.5 billion, trailing only Tether. Arc's testnet, which went live in October 2025, already counts BlackRock, Visa, HSBC, AWS, and Anthropic as participants. Visa is evaluating stablecoin-backed payment rails for cross-border settlement. BlackRock's digital assets team is exploring on-chain FX and capital markets use cases for its tokenized funds. These are not pilot-program footnotes — they are the institutions that define what "enterprise blockchain" actually means in 2026.

The chain's technical stack is tuned for this audience:

  • USDC as native gas. No volatile native token to account for. Fees are dollar-denominated and predictable — a feature finance departments have been demanding since 2017.
  • Malachite consensus. Built by the team Circle acquired from Informal Systems, Malachite is a formally verified Byzantine Fault Tolerant engine. Benchmarks show roughly 780-millisecond finality with 100 validators on 1MB blocks.
  • Built-in FX engine. An institutional-grade RFQ system for 24/7 PvP (payment-versus-payment) settlement across stablecoins.
  • Opt-in privacy. Selectively shielded balances and transactions — a nod to enterprises that cannot publish every payroll run to a public explorer.

Circle CEO Jeremy Allaire confirmed at a Seoul event on April 14, 2026 that a native Arc token is under active consideration, primarily for governance, validator incentives, and economic alignment — but not for gas. That stays USDC.

The pitch is clear: Arc is the chain you build on if your compliance team reads the cryptography section.

Why Quantum Just Became an Urgent Problem

For most of the last decade, "quantum threat to Bitcoin" was a dinner-party thought experiment. That changed in March 2026.

Google Quantum AI published research showing that breaking the ECDSA cryptography securing Bitcoin, Ethereum, and virtually every major cryptocurrency now requires roughly twenty times fewer qubits than prior estimates suggested. Specifically: fewer than 500,000 physical qubits, with a runtime measured in minutes.

The more dramatic number inside the paper is the transaction-window risk. Under idealized conditions, Google estimates a 41 percent probability that a primed quantum computer could derive a private key from a public key before a Bitcoin transaction is confirmed. A real-time attack on the mempool, not a years-long post-hoc breakage.

Google paired the finding with a specific deadline. In a follow-up paper picked up by Bloomberg, the company stated that its own systems — and by implication the broader financial infrastructure that uses the same elliptic curves — need to migrate to post-quantum schemes by 2029. Google is careful to note this is not a prediction that quantum computers will break cryptography by 2029. It is a stance that it plans to be ready before they do.

Three months, three major quantum-computing papers, one consistent direction: the timeline is compressing.

Bitcoin's response has been to merge BIP 360, which introduces a quantum-resistant address format called Pay-to-Merkle-Root, into the formal improvement repository. Merged is not deployed. Core-level signature migration for Bitcoin is, realistically, years away. Ethereum has active EIP discussions but no agreed timeline. Solana has no formal quantum roadmap at all.

Arc is shipping at mainnet.

The Arc Post-Quantum Roadmap, Decoded

Circle's April 2026 roadmap outlines four phases, running through 2030.

Phase 1: Mainnet launch — quantum-resistant wallets and signatures. Arc will implement CRYSTALS-Dilithium (now standardized as ML-DSA) and Falcon as its primary post-quantum signature schemes. Both were finalized by NIST in August 2024 as part of FIPS 204. Both are lattice-based, meaning their security rests on the computational hardness of structured lattice problems — a class of problems for which no efficient quantum algorithm is known. Crucially, Phase 1 ships these as opt-in, not mandatory. Developers can migrate their wallets when they are ready; the chain does not break existing tooling on day one. This is a deliberate compatibility-first choice that acknowledges the reality of developer ecosystems: a chain that bricks every existing library on launch day does not get institutional adoption regardless of how advanced its cryptography is.

Phase 2: Private state encryption. The next layer wraps public keys in symmetric encryption to protect balances and transaction data against quantum-era surveillance. This addresses the "harvest now, decrypt later" problem: an adversary who captures today's blockchain data could, once a cryptographically relevant quantum computer arrives, decrypt historical transaction graphs. For stablecoin finance, where payment metadata is commercially sensitive, this is not theoretical.

Phase 3: Validator security. Consensus messages, attestations, and validator-to-validator communication get post-quantum signatures. This closes the gap where an attacker could target the consensus layer rather than individual user transactions.

Phase 4: Off-chain infrastructure. The final phase extends coverage to communication protocols, cloud environments, hardware security modules, and access controls. Full-stack means full-stack.

The roadmap's phased structure is itself a differentiator. Arc is not claiming to be "quantum-safe on day one" the way some marketing decks overstate. It is claiming to be the first L1 where quantum resistance is a first-class design axis, deployed incrementally, with a credible schedule.

The Institutional Premium — And the Competitive Positioning

Here is the argument Arc is making to its testnet participants: cryptographic agility is now a line item in institutional risk assessments.

A BlackRock-sized allocator evaluating which chain to use for a tokenized money-market fund with a ten-year horizon cannot assume that the ECDSA signatures securing that fund will still be considered safe in 2035. The conservative procurement decision is to pick the chain that already has a roadmap — not the chain that will figure it out.

This creates a "quantum premium" dynamic that did not exist in prior L1 competitions. Arc's direct competitors for institutional stablecoin settlement are:

  • Tempo — building around ISO 20022 compliance for traditional finance messaging.
  • Pharos Network — commercial-finance-focused with KYC at the chain level, fresh off a $44M Series A at a $1B valuation.
  • Ethereum mainnet + L2s — the incumbent with the deepest liquidity but the oldest cryptographic assumptions.
  • Solana, Aptos, Sui — high-performance general-purpose chains with strong stablecoin volume but no quantum-specific roadmaps.

Each of these has real strengths. None of them currently match Arc's combination of USDC-native gas, Circle's banking and fintech distribution (Visa, Stripe, Coinbase), sub-second finality, and quantum-resistance-as-a-design-requirement. For institutions optimizing for cryptographic risk alongside performance and compliance, that is a differentiated bundle.

The skeptical read is also fair. Quantum attacks on ECDSA remain, today, a hypothetical. A chain that shipped in 2023 with standard cryptography has not been exploited and will not be exploited tomorrow. Arc's quantum bet may only matter in 2030 — if it matters at all on the timeline quantum researchers currently project. Opt-in migration means the security is real only for users who choose it, at least in Phase 1.

The counter is simpler: cryptographic migration is a lagging indicator. By the time it is obviously needed, it is too late to retrofit quietly. Arc is pricing in the fat-tail outcome.

What This Means For Developers and Infrastructure

For builders, the practical implication is that post-quantum wallet primitives — once an academic curiosity — are about to become a mainnet feature with real traffic.

Arc's opt-in design means tooling has to evolve: SDKs that expose signature-scheme choice as a first-class parameter, explorers that render ML-DSA signatures cleanly, HSMs that hold Dilithium keys, and APIs that serve both classical and post-quantum transactions without fragmenting developer experience. Teams building on Arc will need to reason about which signature class a user or smart contract expects, and how to migrate users between them without breaking existing balances or authorization flows.

For blockchain infrastructure providers — RPC, indexing, and data services — the shift is less dramatic but still real. Node operators must support new signature verification paths. Indexers must recognize post-quantum transaction types. API consumers writing agents or DeFi backends must handle a world where not every signature is an ECDSA blob of the same shape.

The broader point is that cryptographic diversity is coming to the application layer. For a decade, developers could assume "secp256k1 or Ed25519." The next decade will layer post-quantum schemes on top, and the chains that make this transition smooth for developers will capture institutional workloads.

BlockEden.xyz provides enterprise-grade RPC and API infrastructure across Sui, Aptos, Ethereum, Solana, and 20+ chains. As stablecoin-native chains like Arc bring post-quantum primitives to mainnet, reliable data access across signature schemes and consensus engines is table stakes. Explore our API marketplace to build on infrastructure that is ready for what comes next.

Q&A: The Questions Institutional Allocators Are Actually Asking

Is Arc the first quantum-resistant blockchain? Not the first to talk about it — QANplatform, Algorand, and a few others have shipped partial post-quantum features. Arc is the first major L1 with significant institutional backing to treat quantum resistance as a design requirement at mainnet, with a phased roadmap through 2030 and NIST-standardized schemes (ML-DSA, Falcon).

How close are quantum computers to actually breaking Bitcoin? Unknown precisely, but rapidly compressing. Google's March 2026 paper reduced the estimated qubit requirement to under 500,000 physical qubits. Current quantum systems are in the low thousands. Most experts place the earliest credible date in the early 2030s, with 2029 as the Google-recommended migration deadline.

Does Arc have a token? Not at launch. USDC is the native gas. CEO Jeremy Allaire confirmed on April 14, 2026 that Circle is actively exploring a native Arc token for governance and staking, separate from gas.

What does "opt-in" quantum resistance mean in practice? Users and developers can choose ML-DSA or Falcon signatures at wallet creation. Existing ECDSA wallets continue to work. The migration is voluntary in Phase 1, which protects compatibility but means only quantum-conscious users get the security benefit at first.

Which institutions are on the testnet? BlackRock, Visa, HSBC, AWS, and Anthropic are publicly named, alongside regional stablecoin issuers. Each is running production-shaped workloads — cross-border payments (Visa), tokenized fund operations (BlackRock), banking integrations (HSBC).

The Ten-Year Bet

The honest framing is this: Arc is a bet that the decade ahead will be defined by institutional capital flowing onto blockchains, and that those institutions will increasingly price cryptographic risk the way they already price credit risk and counterparty risk.

If that bet is right, the chains that shipped post-quantum cryptography first — before it was a crisis, before the CISOs asked — will have a durable moat. If it is wrong, Arc will still be a high-performance stablecoin L1 with USDC-native gas and top-tier institutional adoption. The downside is bounded; the upside is a structural position at the center of regulated on-chain finance.

Either way, the conversation has moved. Quantum resistance is no longer a theoretical concern for the 2030s. It is a roadmap item for 2026, an RFP question for 2027, and an audit requirement not long after. Circle just put it in the center of the table.

Sources