Skip to main content

34 posts tagged with "Security"

Cybersecurity, smart contract audits, and best practices

View all tags

Oasis Network: How Confidential Computing is Reshaping DeFi Security and MEV Protection

· 10 min read
Dora Noda
Software Engineer

More than $3 billion in Maximal Extractable Value (MEV) is siphoned annually from Ethereum, its rollups, and fast-finality chains like Solana—double the figures recorded just two years ago. Sandwich attacks alone constituted $289.76 million, or 51.56% of total MEV transaction volume in recent analysis. As DeFi grows, so does the incentive for sophisticated actors to exploit transaction ordering at users' expense. Oasis Network has emerged as a leading solution to this problem, leveraging Trusted Execution Environments (TEEs) to enable confidential smart contracts that fundamentally change how blockchain privacy and security work.

The Personal Wallet Security Crisis: Why 158,000 Individual Crypto Thefts in 2025 Demand a New Approach

· 11 min read
Dora Noda
Software Engineer

Individual wallet compromises surged to 158,000 incidents affecting 80,000 unique victims in 2025, resulting in $713 million stolen from personal wallets alone. That's not an exchange hack or a protocol exploit—that's everyday crypto users losing their savings to attackers who have evolved far beyond simple phishing emails. Personal wallet compromises now account for 37% of all stolen crypto value, up from just 7.3% in 2022. The message is clear: if you hold crypto, you are a target, and the protection strategies of yesterday are no longer enough.

Smart Contract Audit Landscape 2026: Why $3.4 Billion in Crypto Theft Demands a Security Revolution

· 9 min read
Dora Noda
Software Engineer

In the first half of 2025 alone, attackers drained over $2.3 billion from crypto protocols—more than all of 2024 combined. Access control vulnerabilities alone accounted for $1.6 billion of that carnage. The Bybit hack in February 2025, a $1.4 billion supply chain attack, demonstrated that even the largest exchanges remain vulnerable. As we enter 2026, the smart contract audit industry faces its most critical moment: evolve or watch billions more disappear into attackers' wallets.

The Rise of Wrench Attacks: A New Threat to Cryptocurrency Holders

· 8 min read
Dora Noda
Software Engineer

In January 2025, Ledger co-founder David Balland was kidnapped from his home in central France. His captors demanded EUR 10 million in cryptocurrency—and severed one of his fingers to prove they meant business. Four months later, an Italian investor was held captive for 17 days, subjected to severe physical abuse while attackers tried to extract access to his $28 million in Bitcoin.

These aren't isolated incidents. They're part of a disturbing trend that security experts are calling a "record year for wrench attacks"—physical violence used to bypass the digital security that cryptocurrency was designed to provide. And the data reveals an uncomfortable truth: as Bitcoin's price climbs, so does the violence targeting its holders.

What Is a Wrench Attack?

The term "wrench attack" comes from an xkcd webcomic illustrating a simple concept: no matter how sophisticated your encryption, an attacker can bypass it all with a $5 wrench and the willingness to use it. In crypto, this translates to criminals who skip the hacking and go straight to physical coercion—kidnapping, home invasion, torture, and threats against family members.

Jameson Lopp, chief security officer at Bitcoin wallet company Casa, maintains a database of over 225 verified physical attacks on cryptocurrency holders. The data tells a stark story:

  • 2025 saw approximately 70 wrench attacks—nearly double the 41 recorded in 2024
  • About 25% of incidents are home invasions, often aided by leaked KYC data or public records
  • 23% are kidnappings, frequently involving family members as leverage
  • Two-thirds of attacks succeed in extracting assets
  • Only 60% of known perpetrators are caught

And these numbers likely understate reality. Many victims choose not to report crimes, fearing repeat offenses or lacking confidence in law enforcement's ability to help.

The Price-Violence Correlation

Research by Marilyne Ordekian at University College London identified a direct correlation between Bitcoin's price and the frequency of physical attacks. Chainalysis confirmed this pattern, finding "a clear correlation between violent incidents and a forward-looking moving average of bitcoin's price."

The logic is grimly straightforward: when Bitcoin hits all-time highs (surpassing $120,000 in 2025), the perceived payoff for violent crime increases proportionally. Criminals don't need to understand blockchain technology—they just need to know that someone near them has valuable digital assets.

This correlation has predictive implications. As TRM Labs' global head of policy Ari Redbord notes: "As cryptocurrency adoption grows and more value is held directly by individuals, criminals are increasingly incentivised to bypass technical defenses altogether and target people instead."

The forecast for 2026 isn't optimistic. TRM Labs predicts wrench attacks will continue rising as Bitcoin maintains elevated prices and crypto wealth becomes more widespread.

The Anatomy of Modern Crypto Violence

The 2025 attack wave revealed how sophisticated these operations have become:

The Ledger Kidnapping (January 2025) David Balland and his partner were taken from their home in central France. The attackers demanded EUR 10 million, using finger amputation as leverage. French police eventually rescued both victims and arrested several suspects—but the psychological damage and security implications for the entire industry were profound.

The Paris Wave (May 2025) In a single month, Paris experienced multiple high-profile attacks:

  • The daughter and grandson of a cryptocurrency CEO were attacked in broad daylight
  • A crypto entrepreneur's father was abducted, with kidnappers demanding EUR 5-7 million and severing his finger
  • An Italian investor was held for 17 days of severe physical abuse

The U.S. Home Invasion Ring Gilbert St. Felix received a 47-year sentence—the longest ever in a U.S. crypto case—for leading a violent home-invasion ring targeting holders. His crew used KYC data leaks to identify targets, then employed extreme violence including waterboarding and threats of mutilation.

The Texas Brothers (September 2024) Raymond and Isiah Garcia allegedly held a Minnesota family hostage at gunpoint with AR-15s and shotguns, zip-tying victims while demanding $8 million in cryptocurrency transfers.

What's notable is the geographic spread. These aren't just happening in high-risk regions—attacks are concentrated in Western Europe, the U.S., and Canada, countries traditionally considered safe with robust law enforcement. As Solace Global notes, this "illustrates the risks criminal organizations are willing to take to secure such valuable and easily movable digital assets."

The KYC Data Problem

A troubling pattern has emerged: many attacks appear facilitated by leaked Know Your Customer (KYC) data. When you verify your identity on a cryptocurrency exchange, that information can become a targeting mechanism if the exchange suffers a data breach.

French crypto executives have explicitly blamed European cryptocurrency regulations for creating databases that hackers can exploit. According to Les Echos, kidnappers may have used these files to identify victims' places of residence.

The irony is bitter. Regulations designed to prevent financial crime may be enabling physical crime against the very users they're meant to protect.

France's Emergency Response

After recording its 10th crypto-related kidnapping in 2025, France's government launched unprecedented protective measures:

Immediate Security Upgrades

  • Priority access to police emergency services for crypto professionals
  • Home security inspections and direct consultations with law enforcement
  • Security training with elite police forces
  • Safety audits of executives' residences

Legislative Action Justice Minister Gérald Darmanin announced a new decree for rapid implementation. Lawmaker Paul Midy submitted a bill to automatically delete business leaders' personal addresses from public company records—addressing the doxing vector that enabled many attacks.

Investigation Progress 25 individuals have been charged in connection with French cases. An alleged mastermind was arrested in Morocco but awaits extradition.

The French response reveals something important: governments are beginning to treat crypto security as a matter of public safety, not just financial regulation.

Operational Security: The Human Firewall

Technical security—hardware wallets, multisig, cold storage—can protect assets from digital theft. But wrench attacks bypass technology entirely. The solution requires operational security (OpSec), treating yourself with the caution typically reserved for high-net-worth individuals.

Identity Separation

  • Never connect your real-world identity to your on-chain holdings
  • Use separate email addresses and devices for crypto activities
  • Avoid using home addresses for any crypto-related deliveries (including hardware wallets)
  • Consider purchasing hardware directly from manufacturers using a virtual office address

The First Rule: Don't Talk About Your Stack

  • Never discuss holdings publicly—including on social media, in Discord servers, or at meetups
  • Be wary of "crypto friends" who might share information
  • Avoid displaying wealth indicators that could signal crypto success

Physical Fortification

  • Security cameras and alarm systems
  • Home security assessments
  • Varying daily routines to avoid predictable patterns
  • Awareness of physical surroundings, especially when accessing wallets

Technical Measures That Also Provide Physical Protection

  • Geographic distribution of multisig keys (attackers can't force you to provide what you don't physically have access to)
  • Time-locked withdrawals that prevent immediate transfers under duress
  • "Panic wallets" with limited funds that can be surrendered if threatened
  • Casa-style collaborative custody where no single person controls all keys

Communication Security

  • Use authenticator apps, never SMS-based 2FA (SIM swapping remains a common attack vector)
  • Screen unknown calls ruthlessly
  • Never share verification codes
  • Put PINs and passwords on all mobile accounts

The Mindset Shift

Perhaps the most critical security measure is mental. As Casa's guide notes: "Complacency is arguably the greatest threat to your OPSEC. Many victims of bitcoin-related attacks knew what basic precautions to put in place, but they didn't get around to putting them into practice because they didn't believe they'd ever be a target."

The "it won't happen to me" mindset is the riskiest vulnerability of all.

Maximum physical privacy requires what one security guide describes as "treating yourself like a high-net-worth individual in witness protection—constant vigilance, multiple defense layers, and acceptance that perfect security doesn't exist, only making attacks too costly or difficult."

The Bigger Picture

The rise of wrench attacks reveals a fundamental tension in crypto's value proposition. Self-custody is celebrated as freedom from institutional gatekeepers—but it also means individual users bear full responsibility for their own security, including physical safety.

Traditional banking, for all its flaws, provides institutional layers of protection. When criminals target bank customers, the bank absorbs losses. When criminals target crypto holders, the victims are often on their own.

This doesn't mean self-custody is wrong. It means the ecosystem needs to mature beyond technical security to address human vulnerability.

What needs to change:

  • Industry: Better data hygiene practices and breach response protocols
  • Regulation: Recognition that KYC databases create targeting risks requiring protective measures
  • Education: Physical security awareness as standard onboarding for new users
  • Technology: More solutions like time-locks and collaborative custody that provide protection even under duress

Looking Ahead

The correlation between Bitcoin price and violent attacks suggests 2026 will see continued growth in this crime category. With Bitcoin maintaining prices above $100,000 and crypto wealth becoming more visible, the incentive structure for criminals remains strong.

But awareness is growing. France's legislative response, increased security training, and the mainstreaming of operational security practices represent the beginning of an industry-wide reckoning with physical vulnerability.

The next phase of crypto security won't be measured in key lengths or hash rates. It will be measured in how well the ecosystem protects the humans holding the keys.


Security is foundational to everything in Web3. BlockEden.xyz provides enterprise-grade blockchain infrastructure with security-first design across 30+ networks. For teams building applications where user safety matters, explore our API marketplace and start building on infrastructure you can trust.

The Rise and Fall of NFT Paris: A Reflection on Web3's Maturation

· 8 min read
Dora Noda
Software Engineer

Four years of building one of Europe's largest Web3 gatherings. 18,000 attendees at peak. France's First Lady gracing the stage. Then, one month before doors were set to open, a single post on X: "NFT Paris 2026 will not happen."

The cancellation of NFT Paris and RWA Paris marks the first major Web3 event casualties of 2026—and they won't be the last. But what looks like failure might actually be the clearest sign yet that this industry is finally growing up.

From 800 to 18,000 to Zero

NFT Paris's trajectory reads like Web3 itself compressed into four years. The inaugural 2022 edition drew roughly 800 attendees to Station F's amphitheater, a scrappy gathering of true believers during NFT mania's peak. By 2023, attendance exploded to 18,000 at the Grand Palais, with Brigitte Macron lending institutional legitimacy to what had been dismissed as digital tulips.

The 2024 and 2025 editions maintained that scale, with organizers ambitiously splitting into four concurrent events for 2025: XYZ Paris, Ordinals Paris, NFT Paris, and RWA Paris. Expectations for 2026 projected 20,000 visitors to La Grande Halle de la Villette.

Then reality intervened.

"The market collapse hit us hard," organizers wrote in their January 6 announcement. "Despite drastic cost cuts and months of trying to make it work, we couldn't pull it off this year."

The Numbers Don't Lie

The NFT market's implosion isn't hyperbole—it's mathematics. Global NFT sales volume crashed from $8.7 billion in Q1 2022 to just $493 million in Q4 2025, a 94% collapse. By December 2025, monthly trading volume had dwindled to $303 million, down from $629 million just two months earlier.

The supply-demand mismatch tells an even starker story. NFT supply exploded from 38 million tokens in 2021 to 1.34 billion by 2025—a 3,400% increase in four years. Meanwhile, unique buyers plummeted from 180,000 to 130,000, while average sale prices fell from $400 during the boom to just $96.

Blue-chip collections that once served as status symbols saw their floors crater. CryptoPunks dropped from 125 ETH to 29 ETH. Bored Ape Yacht Club fell from 30 ETH to 5.5 ETH—an 82% decline that turned million-dollar profile pictures into five-figure disappointments.

Market capitalization tells the same story: from $9.2 billion in January 2025 to $2.4 billion by year-end, a 74% evaporation. Statista projects continued decline, forecasting a -5% CAGR through 2026.

For event organizers dependent on sponsorship revenue from NFT projects, these numbers translate directly into empty bank accounts.

The Shadow Over Paris

But market conditions alone don't explain the full picture. While NFT Paris cited economics publicly, industry insiders point to a darker factor: France has become ground zero for crypto-related violence.

Since January 2025, France has recorded over 20 kidnappings and violent attacks targeting crypto professionals and their families. In January 2026 alone, four attempted kidnappings occurred within four days—including an engineer abducted from his home and a crypto investor's entire family tied up and beaten.

The violence isn't random. Ledger co-founder David Balland was kidnapped in January 2025, his finger severed by captors demanding crypto ransom. The daughter of Paymium's CEO narrowly escaped abduction in Paris thanks to an intervening passerby armed with a fire extinguisher.

An alleged government data leak has intensified fears. Reports suggest a government employee provided organized crime groups with information on crypto taxpayers, turning France's mandatory crypto reporting requirements into a targeting database. "We're now at 4 kidnapping attempts in 4 days in France after finding out a government employee was giving 'sponsors' information on crypto tax payers," crypto influencer Farokh warned.

Many French crypto entrepreneurs have abandoned public appearances entirely, hiring 24-hour armed security and avoiding any association with industry events. For a conference whose value proposition centered on networking, this security crisis proved existential.

The Broader Retreat

NFT Paris isn't an isolated casualty. NFT.NYC 2025 scaled down 40% from prior years. Hong Kong's NFT events transitioned from in-person to virtual-only between 2024 and 2025. The pattern is consistent: NFT-specific gatherings are struggling to justify their existence as utility shifts toward gaming and real-world assets.

Broader crypto conferences like Devcon and Consensus persist because Ethereum and Bitcoin maintain their relevance. But single-narrative events built around a market segment that's contracted 94% face a fundamental business model problem: when your sponsors are broke, so are you.

The refund situation has added salt to wounds. NFT Paris promised ticket refunds within 15 days, but sponsors—some reportedly out over 500,000 euros—face non-refundable losses. One-month-notice cancellations leave hotels booked, flights purchased, and marketing spend wasted.

What Survives the Filter

Yet declaring Web3 events dead misreads the situation entirely. TOKEN2049 Singapore expects 25,000 attendees from 160+ countries in October 2026. Consensus Miami projects 20,000 visitors for its 10th anniversary. Blockchain Life Dubai anticipates 15,000 participants from 130+ nations.

The difference? These events aren't tied to a single market narrative. They serve builders, investors, and institutions across the entire blockchain stack—from infrastructure to DeFi to real-world assets. Their breadth provides resilience that NFT-specific conferences couldn't match.

More importantly, the event landscape's consolidation mirrors Web3's broader maturation. What once felt like an endless sprawl of conferences has contracted to "a smaller set of global anchor events, surrounded by highly targeted regional weeks, builder festivals, and institutional forums where real decisions now happen," as one industry analysis noted.

This isn't decline—it's professionalization. The hype-era playbook of launching a conference for every narrative no longer works. Attendees demand signal over noise, substance over speculation.

The Maturation Thesis

Web3 in 2026 looks fundamentally different from 2022. Fewer projects, but more actual users. Less funding for whitepaper promises, more for proven traction. The filter that killed NFT Paris is the same one elevating infrastructure providers and real-world asset platforms.

Investors now demand "proof of usage, revenue signals, and realistic adoption paths" before writing checks. This reduces funded project counts while increasing survivor quality. Founders building "boring but necessary products" are thriving while those dependent on narrative cycles struggle.

The conference calendar reflects this shift. Events increasingly focus on clear use cases alongside existing financial infrastructure, measurable outcomes rather than speculative roadmaps. The wild run-up years' exuberance has cooled into professional pragmatism.

For NFT Paris, which rode the speculative wave perfectly on the way up, the same dynamics proved fatal on the way down. The event's identity was too closely linked to a market segment that hasn't found its post-speculation floor.

What This Signals

NFT Paris's cancellation crystallizes several truths about Web3's current state:

Narrative-specific events carry concentration risk. Tying your business model to a single market segment means dying with that segment. Diversified events survive; niche plays don't.

Security concerns are reshaping geography. France's kidnapping crisis hasn't just killed one conference—it's potentially damaging Paris's credibility as a Web3 hub. Meanwhile, Dubai and Singapore continue building their positions.

The sponsor model is broken for distressed sectors. When projects can't afford booth fees, events can't afford venues. The NFT market's contraction directly translated into conference economics.

Market timing is unforgiving. NFT Paris launched at the perfect moment (2022's peak) and died trying to survive the aftermath. First-mover advantage became first-mover liability.

Maturation means consolidation. Fewer events serving serious participants beats many events serving speculators. This is what growing up looks like.

Looking Forward

The 1,800+ early-stage Web3 startups and 350+ completed M&A transactions indicate an industry actively consolidating. The survivors of this filter will define the next cycle—and they'll gather at events that survived alongside them.

For attendees who bought NFT Paris tickets, refunds are processing. For sponsors with non-recoverable costs, the lesson is expensive but clear: diversify event portfolios like investment portfolios.

For the industry, NFT Paris's end isn't a funeral—it's a graduation ceremony. The Web3 events that remain have earned their place through resilience rather than timing, substance rather than hype.

Four years from scrappy amphitheater to Grand Palais to cancellation. The speed of that trajectory tells you everything about how fast this industry moves—and how unforgiving it is to those who can't adapt.

The next major Web3 event cancellations are coming. The question isn't whether the filter continues, but who else it catches.


Building on blockchain infrastructure that survives market cycles? BlockEden.xyz provides enterprise-grade RPC and API services across Sui, Aptos, Ethereum, and 20+ chains—infrastructure designed for builders focused on long-term value rather than narrative timing.

Quantum Computing vs Bitcoin: Timeline, Threats, and What Holders Should Know

· 8 min read
Dora Noda
Software Engineer

Google's Willow quantum chip can solve in five minutes what would take classical supercomputers 10 septillion years. Meanwhile, $718 billion in Bitcoin sits in addresses that quantum computers could theoretically crack. Should you panic? Not yet—but the clock is ticking.

The quantum threat to Bitcoin isn't a matter of if but when. As we enter 2026, the conversation has shifted from dismissive skepticism to serious preparation. Here's what every Bitcoin holder needs to understand about the timeline, the actual vulnerabilities, and the solutions already in development.

The Quantum Threat: Breaking Down the Math

Bitcoin's security rests on two cryptographic pillars: the Elliptic Curve Digital Signature Algorithm (ECDSA) for transaction signatures and SHA-256 for mining and address hashing. Both face different levels of quantum risk.

Shor's algorithm, running on a sufficiently powerful quantum computer, could derive private keys from public keys—effectively picking the lock on any Bitcoin address where the public key is exposed. This is the existential threat.

Grover's algorithm offers a quadratic speedup for brute-forcing hash functions, reducing SHA-256's effective strength from 256 bits to 128 bits. This is concerning but not immediately catastrophic—128-bit security remains formidable.

The critical question: How many qubits does it take to run Shor's algorithm against Bitcoin?

Estimates vary wildly:

  • Conservative: 2,330 stable logical qubits could theoretically break ECDSA
  • Practical reality: Due to error correction needs, this requires 1-13 million physical qubits
  • University of Sussex estimate: 13 million qubits to break Bitcoin encryption in one day
  • Most aggressive estimate: 317 million physical qubits to crack a 256-bit ECDSA key within an hour

Google's Willow chip has 105 qubits. The gap between 105 and 13 million explains why experts aren't panicking—yet.

Where We Stand: The 2026 Reality Check

The quantum computing landscape in early 2026 looks like this:

Current quantum computers are crossing the 1,500 physical qubit threshold, but error rates remain high. Approximately 1,000 physical qubits are needed to create just one stable logical qubit. Even with aggressive AI-assisted optimization, jumping from 1,500 to millions of qubits in 12 months is physically impossible.

Timeline estimates from experts:

SourceEstimate
Adam Back (Blockstream CEO)20-40 years
Michele Mosca (U. of Waterloo)1-in-7 chance by 2026 for fundamental crypto break
Industry consensus10-30 years for Bitcoin-breaking capability
US Federal mandatePhase out ECDSA by 2035
IBM roadmap500-1,000 logical qubits by 2029

The 2026 consensus: no quantum doomsday this year. However, as one analyst put it, "the likelihood that quantum becomes a top-tier risk factor for crypto security awareness in 2026 is high."

The $718 Billion Vulnerability: Which Bitcoins Are at Risk?

Not all Bitcoin addresses face equal quantum risk. The vulnerability depends entirely on whether the public key has been exposed on the blockchain.

High-risk addresses (P2PK - Pay to Public Key):

  • Public key is directly visible on-chain
  • Includes all addresses from Bitcoin's early days (2009-2010)
  • Satoshi Nakamoto's estimated 1.1 million BTC falls into this category
  • Total exposure: approximately 4 million BTC (20% of supply)

Lower-risk addresses (P2PKH, P2SH, SegWit, Taproot):

  • Public key is hashed and only revealed when spending
  • As long as you never reuse an address after spending, the public key remains hidden
  • Modern wallet best practices naturally provide some quantum resistance

The critical insight: if you've never spent from an address, your public key isn't exposed. The moment you spend and reuse that address, you become vulnerable.

Satoshi's coins present a unique dilemma. Those 1.1 million BTC in P2PK addresses cannot be moved to safer formats—the private keys would need to sign a transaction, which we have no evidence Satoshi can or will do. If quantum computers reach sufficient capability, those coins become the world's largest crypto bounty.

"Harvest Now, Decrypt Later": The Shadow Threat

Even if quantum computers can't break Bitcoin today, adversaries may already be preparing for tomorrow.

The "harvest now, decrypt later" strategy involves collecting exposed public keys from the blockchain now, storing them, and waiting for quantum computers to mature. When Q-Day arrives, attackers with archives of public keys could immediately drain vulnerable wallets.

Nation-state actors and sophisticated criminal organizations are likely already implementing this strategy. Every public key exposed on-chain today becomes a potential target in 5-15 years.

This creates an uncomfortable reality: the security clock for any exposed public key may have already started ticking.

Solutions in Development: BIP 360 and Post-Quantum Cryptography

The Bitcoin developer community isn't waiting for Q-Day. Multiple solutions are progressing through development and standardization.

BIP 360: Pay to Quantum Resistant Hash (P2TSH)

BIP 360 proposes a quantum-resistant tapscript-native output type as a critical "first step" toward quantum-safe Bitcoin. The proposal outlines three quantum-resistant signature methods, enabling gradual migration without disrupting network efficiency.

By 2026, advocates hope to see widespread P2TSH adoption, allowing users to migrate funds to quantum-safe addresses proactively.

NIST-Standardized Post-Quantum Algorithms

As of 2025, NIST finalized three post-quantum cryptography standards:

  • FIPS 203 (ML-KEM): Key encapsulation mechanism
  • FIPS 204 (ML-DSA/Dilithium): Digital signatures (lattice-based)
  • FIPS 205 (SLH-DSA/SPHINCS+): Hash-based signatures

BTQ Technologies has already demonstrated a working Bitcoin implementation using ML-DSA to replace ECDSA signatures. Their Bitcoin Quantum Core Release 0.2 proves the technical feasibility of migration.

The Tradeoff Challenge

Lattice-based signatures like Dilithium are significantly larger than ECDSA signatures—potentially 10-50x larger. This directly impacts block capacity and transaction throughput. A quantum-resistant Bitcoin might process fewer transactions per block, increasing fees and potentially pushing smaller transactions off-chain.

What Bitcoin Holders Should Do Now

The quantum threat is real but not imminent. Here's a practical framework for different holder profiles:

For all holders:

  1. Avoid address reuse: Never send Bitcoin to an address you've already spent from
  2. Use modern address formats: SegWit (bc1q) or Taproot (bc1p) addresses hash your public key
  3. Stay informed: Follow BIP 360 development and Bitcoin Core releases

For significant holdings (>1 BTC):

  1. Audit your addresses: Check if any holdings are in P2PK format using block explorers
  2. Consider cold storage refresh: Periodically move funds to fresh addresses
  3. Document your migration plan: Know how you'll move funds when quantum-safe options become standard

For institutional holders:

  1. Include quantum risk in security assessments: BlackRock added quantum computing warnings to their Bitcoin ETF filing in 2025
  2. Monitor NIST standards and BIP developments: Budget for future migration costs
  3. Evaluate custody providers: Ensure they have quantum migration roadmaps

The Governance Challenge: Bitcoin's Unique Vulnerability

Unlike Ethereum, which has a more centralized upgrade path through the Ethereum Foundation, Bitcoin upgrades require broad social consensus. There's no central authority to mandate post-quantum migration.

This creates several challenges:

Lost and abandoned coins can't migrate. An estimated 3-4 million BTC are lost forever. These coins will remain in quantum-vulnerable states indefinitely, creating a permanent pool of potentially stealable Bitcoin once quantum attacks become viable.

Satoshi's coins raise philosophical questions. Should the community freeze Satoshi's P2PK addresses preemptively? Ava Labs CEO Emin Gün Sirer has proposed this, but it would fundamentally challenge Bitcoin's immutability principles. A hard fork to freeze specific addresses sets a dangerous precedent.

Coordination takes time. Research indicates performing a full network upgrade, including migrating all active wallets, could require at least 76 days of dedicated on-chain effort in an optimistic scenario. In practice, with continued network operation, migration could take months or years.

Satoshi Nakamoto foresaw this possibility. In a 2010 BitcoinTalk post, he wrote: "If SHA-256 became completely broken, I think we could come to some agreement about what the honest blockchain was before the trouble started, lock that in and continue from there with a new hash function."

The question is whether the community can achieve that agreement before, not after, the threat materializes.

The Bottom Line: Urgency Without Panic

Quantum computers capable of breaking Bitcoin are likely 10-30 years away. The immediate threat is low. However, the consequences of being unprepared are catastrophic, and migration takes time.

The crypto industry's response should match the threat: deliberate, technically rigorous, and proactive rather than reactive.

For individual holders, the action items are straightforward: use modern address formats, avoid reuse, and stay informed. For the Bitcoin ecosystem, the next five years are critical for implementing and testing quantum-resistant solutions before they're needed.

The quantum clock is ticking. Bitcoin has time—but not unlimited time—to adapt.


BlockEden.xyz provides enterprise-grade blockchain infrastructure across 25+ networks. As the crypto industry prepares for the quantum era, we're committed to supporting protocols that prioritize long-term security. Explore our API services to build on networks preparing for tomorrow's challenges.

The WaaS Infrastructure Revolution: How Embedded Wallets Are Reshaping Web3 Adoption

· 35 min read
Dora Noda
Software Engineer

Wallet-as-a-Service has emerged as the critical missing infrastructure layer enabling mainstream Web3 adoption. The market is experiencing explosive 30% compound annual growth toward $50 billion by 2033, driven by three converging forces: account abstraction eliminating seed phrases, multi-party computation solving the custody trilemma, and social login patterns bridging Web2 to Web3. With 103 million smart account operations executed in 2024—a 1,140% surge from 2023—and major acquisitions including Stripe's purchase of Privy and Fireblocks' $90 million Dynamic acquisition, the infrastructure landscape has reached an inflection point. WaaS now powers everything from Axie Infinity's play-to-earn economy (serving millions in the Philippines) to NBA Top Shot's $500 million marketplace, while institutional players like Fireblocks secure over $10 trillion in digital asset transfers annually. This research provides actionable intelligence for builders navigating the complex landscape of security models, regulatory frameworks, blockchain support, and emerging innovations reshaping digital asset infrastructure.

Security architecture: MPC and TEE emerge as the gold standard

The technical foundation of modern WaaS revolves around three architectural paradigms, with multi-party computation combined with trusted execution environments representing the current security apex. Fireblocks' MPC-CMP algorithm delivers 8x speed improvements over traditional approaches while distributing key shares across multiple parties—the complete private key never exists at any point during generation, storage, or signing. Turnkey's entirely TEE-based architecture using AWS Nitro Enclaves pushes this further, with five specialized enclave applications written entirely in Rust operating under a zero-trust model where even the database is considered untrusted.

The performance metrics validate this approach. Modern MPC protocols achieve 100-500 millisecond signing latency for 2-of-3 threshold signatures, enabling consumer-grade experiences while maintaining institutional security. Fireblocks processes millions of operations daily, while Turnkey guarantees 99.9% uptime with sub-second transaction signing. This represents a quantum leap from traditional HSM-only approaches, which create single points of failure despite hardware-level protection.

Smart contract wallets via ERC-4337 present a complementary paradigm focused on programmability over distributed key management. The 103 million UserOperations executed in 2024 demonstrate real traction, with 87% utilizing Paymasters to sponsor gas fees—directly addressing the onboarding friction that has plagued Web3. Alchemy deployed 58% of new smart accounts, while Coinbase processed over 30 million UserOps, primarily on Base. The August 2024 peak of 18.4 million monthly operations signals growing mainstream readiness, though the 4.3 million repeat users indicate retention challenges remain.

Each architecture presents distinct trade-offs. MPC wallets deliver universal blockchain support through curve-based signing, appearing as standard single signatures on-chain with minimal gas overhead. Smart contract wallets enable sophisticated features like social recovery, session keys, and batch transactions but incur higher gas costs and require chain-specific implementations. Traditional HSM approaches like Magic's AWS KMS integration provide battle-tested security infrastructure but introduce centralized trust assumptions incompatible with true self-custody requirements.

The security model comparison reveals why enterprises favor MPC-TSS combined with TEE protection. Turnkey's architecture with cryptographic attestation for all enclave code ensures verifiable security properties impossible with traditional cloud deployments. Web3Auth's distributed network approach splits keys across Torus Network nodes plus user devices, achieving non-custodial security through distributed trust rather than hardware isolation. Dynamic's TSS-MPC with flexible threshold configurations allows dynamic adjustment from 2-of-3 to 3-of-5 without address changes, providing operational flexibility enterprises require.

Key recovery mechanisms have evolved beyond seed phrases into sophisticated social recovery and automated backup systems. Safe's RecoveryHub implements smart contract-based guardian recovery with configurable time delays, supporting self-custodial configurations with hardware wallets or institutional third-party recovery through partners like Coincover and Sygnum. Web3Auth's off-chain social recovery avoids gas costs entirely while enabling device share plus guardian share reconstruction. Coinbase's public-verifiable backups use cryptographic proofs ensuring backup integrity before enabling transactions, preventing the catastrophic loss scenarios that plagued early custody solutions.

Security vulnerabilities in the 2024 threat landscape underscore why defense-in-depth approaches are non-negotiable. With 44,077 CVEs disclosed in 2024—a 33% increase from 2023—and average exploitation occurring just 5 days after disclosure, WaaS infrastructure must anticipate constant adversary evolution. Frontend compromise attacks like the BadgerDAO $120 million theft via malicious script injection demonstrate why Turnkey's TEE-based authentication eliminates trust in the web application layer entirely. The WalletConnect fake app stealing $70,000 through Google Play impersonation highlights protocol-level verification requirements, now standard in leading implementations.

Market landscape: Consolidation accelerates as Web2 giants enter

The WaaS provider ecosystem has crystallized around distinct positioning strategies, with Stripe's Privy acquisition and Fireblocks' $90 million Dynamic purchase signaling the maturation phase where strategic buyers consolidate capabilities. The market now segments cleanly between institutional-focused providers emphasizing security and compliance, versus consumer-facing solutions optimizing for seamless onboarding and Web2 integration patterns.

Fireblocks dominates the institutional segment with an $8 billion valuation and over $1 trillion in secured assets annually, serving 500+ institutional customers including banks, exchanges, and hedge funds. The company's acquisition of Dynamic represents vertical integration from custody infrastructure into consumer-facing embedded wallets, creating a full-stack solution spanning enterprise treasury management to retail applications. Fireblocks' MPC-CMP technology secures 130+ million wallets with SOC 2 Type II certification and insurance policies covering assets in storage and transit—critical requirements for regulated financial institutions.

Privy's trajectory from $40 million in funding to Stripe acquisition exemplifies the consumer wallet path. Supporting 75 million wallets across 1,000+ developer teams before acquisition, Privy excelled at React-focused integration with email and social login patterns familiar to Web2 developers. The Stripe integration follows their $1.1 billion Bridge acquisition for stablecoin infrastructure, signaling a comprehensive crypto payments stack combining fiat on-ramps, stable coins, and embedded wallets. This vertical integration mirrors Coinbase's strategy with their Base L2 plus embedded wallet infrastructure targeting "hundreds of millions of users."

Turnkey carved out differentiation through developer-first, open-source infrastructure with AWS Nitro Enclave security. Raising $50+ million including a $30 million Series B from Bain Capital Crypto, Turnkey powers Polymarket, Magic Eden, Alchemy, and Worldcoin with sub-second signing and 99.9% uptime guarantees. The open-source QuorumOS and comprehensive SDK suite appeal to developers building custom experiences requiring infrastructure-level control rather than opinionated UI components.

Web3Auth achieves remarkable scale with 20+ million monthly active users across 10,000+ applications, leveraging blockchain-agnostic architecture supporting 19+ social login providers. The distributed MPC approach with keys split across Torus Network nodes plus user devices enables true non-custodial wallets while maintaining Web2 UX patterns. At $69 monthly for the Growth plan versus Magic's $499 for comparable features, Web3Auth targets developer-led adoption through aggressive pricing and comprehensive platform support including Unity and Unreal Engine for gaming.

Dfns represents the fintech specialization strategy, partnering with Fidelity International, Standard Chartered's Zodia Custody, and ADQ's Tungsten Custody. Their $16 million Series A in January 2025 from Further Ventures/ADQ validates the institutional banking focus, with EU DORA and US FISMA regulatory alignment plus SOC-2 Type II certification. Supporting 40+ blockchains including Cosmos ecosystem chains, Dfns processes over $1 billion monthly transaction volume with 300% year-over-year growth since 2021.

Particle Network's full-stack chain abstraction approach differentiates through Universal Accounts providing a single address across 65+ blockchains with automatic cross-chain liquidity routing. The modular L1 blockchain (Particle Chain) coordinates multi-chain operations, enabling users to spend assets on any chain without manual bridging. BTC Connect launched as the first Bitcoin account abstraction implementation, demonstrating technical innovation beyond Ethereum-centric solutions.

The funding landscape reveals investor conviction in WaaS infrastructure as foundational Web3 building blocks. Fireblocks raised $1.04 billion over six rounds including a $550 million Series E at $8 billion valuation, backed by Sequoia Capital, Paradigm, and D1 Capital Partners. Turnkey, Privy, Dynamic, Portal, and Dfns collectively raised over $150 million in 2024-2025, with top-tier investors including a16z crypto, Bain Capital Crypto, Ribbit Capital, and Coinbase Ventures participating across multiple deals.

Partnership activity indicates ecosystem maturation. IBM's Digital Asset Haven partnership with Dfns targets transaction lifecycle management for banks and governments across 40 blockchains. McDonald's integration with Web3Auth for NFT collectibles (2,000 NFTs claimed in 15 minutes) demonstrates major Web2 brand adoption. Biconomy's support for Dynamic, Particle, Privy, Magic, Dfns, Capsule, Turnkey, and Web3Auth shows account abstraction infrastructure providers enabling interoperability across competing wallet solutions.

Developer experience: Integration time collapses from months to hours

The developer experience revolution in WaaS manifests through comprehensive SDK availability, with Web3Auth leading at 13+ framework support including JavaScript, React, Next.js, Vue, Angular, Android, iOS, React Native, Flutter, Unity, and Unreal Engine. This platform breadth enables identical wallet experiences across web, mobile native, and gaming environments—critical for applications spanning multiple surfaces. Privy focuses more narrowly on React ecosystem dominance with Next.js and Expo support, accepting framework limitations for deeper integration quality within that stack.

Integration time claims by major providers suggest the infrastructure has reached plug-and-play maturity. Web3Auth documents 15-minute basic integration with 4 lines of code, validated through integration builder tools generating ready-to-deploy code. Privy and Dynamic advertise similar timeframes for React-based applications, while Magic's npx make-magic scaffolding tool accelerates project setup. Only enterprise-focused Fireblocks and Turnkey quote days-to-weeks timelines, reflecting custom implementation requirements for institutional policy engines and compliance frameworks rather than SDK limitations.

API design converged around RESTful architectures rather than GraphQL, with webhook-based event notifications replacing persistent WebSocket connections across major providers. Turnkey's activity-based API model treats all actions as activities flowing through a policy engine, enabling granular permissions and comprehensive audit trails. Web3Auth's RESTful endpoints integrate with Auth0, AWS Cognito, and Firebase for federated identity, supporting custom JWT authentication for bring-your-own-auth scenarios. Dynamic's environment-based configuration through a developer dashboard balances ease-of-use with flexibility for multi-environment deployments.

Documentation quality separates leading providers from competitors. Web3Auth's integration builder generates framework-specific starter code, reducing cognitive load for developers unfamiliar with Web3 patterns. Turnkey's AI-ready documentation structure optimizes for LLM ingestion, enabling developers using Cursor or GPT-4 to receive accurate implementation guidance. Dynamic's CodeSandbox demos and multiple framework examples provide working references. Privy's starter templates and demo applications accelerate React integration, though less comprehensive than blockchain-agnostic competitors.

Onboarding flow options reveal strategic positioning through authentication method emphasis. Web3Auth's 19+ social login providers including Google, Twitter, Discord, GitHub, Facebook, Apple, LinkedIn, and regional options like WeChat, Kakao, and Line position for global reach. Custom JWT authentication enables enterprises to integrate existing identity systems. Privy emphasizes email-first with magic links, treating social logins as secondary options. Magic pioneered the magic link approach but now competes with more flexible alternatives. Turnkey's passkey-first architecture using WebAuthn standards positions for the passwordless future, supporting biometric authentication via Face ID, Touch ID, and hardware security keys.

Security model trade-offs emerge through key management implementations. Web3Auth's distributed MPC with Torus Network nodes plus user devices achieves non-custodial security through cryptographic distribution rather than centralized trust. Turnkey's AWS Nitro Enclave isolation ensures keys never leave hardware-protected environments, with cryptographic attestation proving code integrity. Privy's Shamir Secret Sharing approach splits keys across device and authentication factors, reconstructing only in isolated iframes during transaction signing. Magic's AWS HSM storage with AES-256 encryption accepts centralized key management trade-offs for operational simplicity, suitable for enterprise Web2 brands prioritizing convenience over self-custody.

White-labeling capabilities determine applicability for branded applications. Web3Auth offers the most comprehensive customization at accessible pricing ($69 monthly Growth plan), enabling modal and non-modal SDK options with full UI control. Turnkey's pre-built Embedded Wallet Kit balances convenience with low-level API access for custom interfaces. Dynamic's dashboard-based design controls streamline appearance configuration without code changes. The customization depth directly impacts whether WaaS infrastructure remains visible to end users or disappears behind brand-specific interfaces.

Code complexity analysis reveals the abstraction achievements. Web3Auth's modal integration requires just four lines—import, initialize with client ID, call initModal, then connect. Privy's React Provider wrapper approach integrates naturally with React component trees while maintaining isolation. Turnkey's more verbose setup reflects flexibility prioritization, with explicit configuration of organization IDs, passkey clients, and policy parameters. This complexity spectrum enables developer choice between opinionated simplicity and low-level control depending on use case requirements.

Community feedback through Stack Overflow, Reddit, and developer testimonials reveals patterns. Web3Auth users occasionally encounter breaking changes during version updates, typical for rapidly-evolving infrastructure. Privy's React dependency limits adoption for non-React projects, though acknowledges this trade-off consciously. Dynamic receives praise for responsive support, with testimonials describing the team as partners rather than vendors. Turnkey's professional documentation and Slack community appeal to teams prioritizing infrastructure understanding over managed services.

Real-world adoption: Gaming, DeFi, and NFTs drive usage at scale

Gaming applications demonstrate WaaS removing blockchain complexity at massive scale. Axie Infinity's integration with Ramp Network collapsed onboarding from 2 hours and 60 steps to just 12 minutes and 19 steps—a 90% time reduction and 30% step reduction enabling millions of players, particularly in the Philippines where 28.3% of traffic originates. This transformation allowed play-to-earn economics to function, with participants earning meaningful income through gaming. NBA Top Shot leveraged Dapper Wallet to onboard 800,000+ accounts generating $500+ million in sales, with credit card purchases and email login eliminating crypto complexity. The Flow blockchain's custom design for consumer-scale NFT transactions enables 9,000 transactions per second with near-zero gas fees, demonstrating infrastructure purpose-built for gaming economics.

DeFi platforms integrate embedded wallets to reduce friction from external wallet requirements. Leading decentralized exchanges like Uniswap, lending protocols like Aave, and derivatives platforms increasingly embed wallet functionality directly into trading interfaces. Fireblocks' enterprise WaaS serves exchanges, lending desks, and hedge funds requiring institutional custody combined with trading desk operations. The account abstraction wave enables gas sponsorship for DeFi applications, with 87% of ERC-4337 UserOperations utilizing Paymasters to cover $3.4 million in gas fees during 2024. This gas abstraction removes the bootstrapping problem where new users need tokens to pay for transactions acquiring their first tokens.

NFT marketplaces pioneered embedded wallet adoption to reduce checkout abandonment. Immutable X's integration with Magic wallet and MetaMask provides zero gas fees through Layer-2 scaling, processing thousands of NFT transactions per second for Gods Unchained and Illuvium. OpenSea's wallet connection flows support embedded options alongside external wallet connections, recognizing user preference diversity. The Dapper Wallet approach for NBA Top Shot and VIV3 demonstrates marketplace-specific embedded wallets can capture 95%+ of secondary market activity when UX optimization removes competing friction.

Enterprise adoption validates WaaS for financial institution use cases. Worldpay's Fireblocks integration delivered 50% faster payment processing with 24/7/365 T+0 settlements, diversifying revenue through blockchain payment rails while maintaining regulatory compliance. Coinbase WaaS targets household brands including partnerships with tokenproof, Floor, Moonray, and ENS Domains, positioning embedded wallets as infrastructure enabling Web2 companies to offer Web3 capabilities without blockchain engineering. Flipkart's integration with Fireblocks brings embedded wallets to India's massive e-commerce user base, while Grab in Singapore accepts crypto top-ups across Bitcoin, Ether, and stablecoins via Fireblocks infrastructure.

Consumer applications pursuing mainstream adoption rely on WaaS to abstract complexity. Starbucks Odyssey loyalty program uses custodial wallets with simplified UX for NFT-based rewards and token-gated experiences, demonstrating major retail brand Web3 experimentation. The Coinbase vision of "giving wallets to literally every human on the planet" through social media integration represents the ultimate mainstream play, with username/password onboarding and MPC key management replacing seed phrase requirements. This bridges the adoption chasm where technical complexity excludes non-technical users.

Geographic patterns reveal distinct regional adoption drivers. Asia-Pacific leads global growth with India receiving $338 billion in on-chain value during 2023-2024, driven by large diaspora remittances, young demographics, and existing UPI fintech infrastructure familiarity. Southeast Asia shows the fastest regional growth at 69% year-over-year to $2.36 trillion, with Vietnam, Indonesia, and the Philippines leveraging crypto for remittances, gaming, and savings. China's 956 million digital wallet users with 90%+ urban adult penetration demonstrate mobile payment infrastructure preparing populations for crypto integration. Latin America's 50% annual adoption increase stems from currency devaluation concerns and remittance needs, with Brazil and Mexico leading. Africa's 35% increase in active mobile money users positions the continent for leapfrogging traditional banking infrastructure through crypto wallets.

North America focuses on institutional and enterprise adoption with regulatory clarity emphasis. The US contributes 36.92% of global market share with 70% of online adults using digital payments, though fewer than 60% of small businesses accept digital wallets—an adoption gap WaaS providers target. Europe shows 52% of online shoppers favoring digital wallets over legacy payment methods, with MiCA regulations providing clarity enabling institutional adoption acceleration.

Adoption metrics validate market trajectory. Global digital wallet users reached 5.6 billion in 2025 with projections for 5.8 billion by 2029, representing 35% growth from 4.3 billion in 2024. Digital wallets now account for 49-56% of global e-commerce transaction value at $14-16 trillion annually. The Web3 wallet security market alone is projected to reach $68.8 billion by 2033 at 23.7% CAGR, with 820 million unique crypto addresses active in 2025. Leading providers support tens to hundreds of millions of wallets: Privy with 75 million, Dynamic with 50+ million, Web3Auth with 20+ million monthly active users, and Fireblocks securing 130+ million wallets.

Blockchain support: Universal EVM coverage with expanding non-EVM ecosystems

The blockchain ecosystem support landscape bifurcates between providers pursuing universal coverage through curve-based architectures versus those integrating chains individually. Turnkey and Web3Auth achieve blockchain-agnostic support through secp256k1 and ed25519 curve signing, automatically supporting any new blockchain utilizing these cryptographic primitives without provider intervention. This architecture future-proofs infrastructure as new chains launch—Berachain and Monad receive day-one Turnkey support through curve compatibility rather than explicit integration work.

Fireblocks takes the opposite approach with explicit integrations across 80+ blockchains, fastest in adding new chains through institutional focus requiring comprehensive feature support per chain. Recent additions include Cosmos ecosystem expansion in May 2024 adding Osmosis, Celestia, dYdX, Axelar, Injective, Kava, and Thorchain. November 2024 brought Unichain support immediately at launch, while World Chain integration followed in August 2024. This velocity stems from modular architecture and institutional client demand for comprehensive chain coverage including staking, DeFi protocols, and WalletConnect integration per chain.

EVM Layer-2 scaling solutions achieve universal support across major providers. Base, Arbitrum, and Optimism receive unanimous support from Magic, Web3Auth, Dynamic, Privy, Turnkey, Fireblocks, and Particle Network. Base's explosive growth as the highest-revenue Layer-2 by late 2024 validates Coinbase's infrastructure bet, with WaaS providers prioritizing integration given Base's institutional backing and developer momentum. Arbitrum maintains 40% Layer-2 market share with largest total value locked, while Optimism benefits from Superchain ecosystem effects as multiple projects deploy OP Stack rollups.

ZK-rollup support shows more fragmentation despite technical advantages. Linea achieves the highest TVL among ZK rollups at $450-700 million backed by ConsenSys, with Fireblocks, Particle Network, Web3Auth, Turnkey, and Privy providing support. zkSync Era garners Web3Auth, Privy, Turnkey, and Particle Network integration despite market share challenges following controversial token launch. Scroll receives support from Web3Auth, Turnkey, Privy, and Particle Network serving developers with 85+ integrated protocols. Polygon zkEVM benefits from Polygon ecosystem association with Fireblocks, Web3Auth, Turnkey, and Privy support. The ZK-rollup fragmentation reflects technical complexity and lower usage compared to Optimistic rollups, though long-term scalability advantages suggest increasing attention.

Non-EVM blockchain support reveals strategic positioning differences. Solana achieves near-universal support through ed25519 curve compatibility and market momentum, with Web3Auth, Dynamic, Privy, Turnkey, Fireblocks, and Particle Network providing full integration. Particle Network's Solana Universal Accounts integration demonstrates chain abstraction extending beyond EVM to high-performance alternatives. Bitcoin support appears in Dynamic, Privy, Turnkey, Fireblocks, and Particle Network offerings, with Particle's BTC Connect representing the first Bitcoin account abstraction implementation enabling programmable Bitcoin wallets without Lightning Network complexity.

Cosmos ecosystem support concentrates in Fireblocks following their May 2024 strategic expansion. Supporting Cosmos Hub, Osmosis, Celestia, dYdX, Axelar, Kava, Injective, and Thorchain with plans for Sei, Noble, and Berachain additions, Fireblocks positions for inter-blockchain communication protocol dominance. Web3Auth provides broader Cosmos compatibility through curve support, while other providers offer selective integration based on client demand rather than ecosystem-wide coverage.

Emerging layer-1 blockchains receive varying attention. Turnkey added Sui and Sei support reflecting ed25519 and Ethereum compatibility respectively. Aptos receives Web3Auth support with Privy planning Q1 2025 integration, positioning for Move language ecosystem growth. Near, Polkadot, Kusama, Flow, and Tezos appear in Web3Auth's blockchain-agnostic catalog through private key export capabilities. TON integration appeared in Fireblocks offerings targeting Telegram ecosystem opportunities. Algorand and Stellar receive Fireblocks support for institutional applications in payment and tokenization use cases.

Cross-chain architecture approaches determine future-proofing. Particle Network's Universal Accounts provide single addresses across 65+ blockchains with automatic cross-chain liquidity routing through their modular L1 coordination layer. Users maintain unified balances and spend assets on any chain without manual bridging, paying gas fees in any token. Magic's Newton network announced November 2024 integrates with Polygon's AggLayer for chain unification focused on wallet-level abstraction. Turnkey's curve-based universal support achieves similar outcomes through cryptographic primitives rather than coordination infrastructure. Web3Auth's blockchain-agnostic authentication with private key export enables developers to integrate any chain through standard libraries.

Chain-specific optimizations appear in provider implementations. Fireblocks supports staking across multiple Proof-of-Stake chains including Ethereum, Cosmos ecosystem chains, Solana, and Algorand with institutional-grade security. Particle Network optimized for gaming workloads with session keys, gasless transactions, and rapid account creation. Web3Auth's plug-and-play modal optimizes for rapid multi-chain wallet generation without customization requirements. Dynamic's wallet adapter supports 500+ external wallets across ecosystems, enabling users to connect existing wallets rather than creating new embedded accounts.

Roadmap announcements indicate continued expansion. Fireblocks committed to supporting Berachain at mainnet launch, Sei integration, and Noble for USDC-native Cosmos operations. Privy announced Aptos and Move ecosystem support for Q1 2025, expanding beyond EVM and Solana focus. Magic's Newton mainnet launch from private testnet brings AggLayer integration to production. Particle Network continues expanding Universal Accounts to additional non-EVM chains with enhanced cross-chain liquidity features. The architectural approaches suggest two paths forward: comprehensive individual integrations for institutional features versus universal curve-based support for developer flexibility and automatic new chain compatibility.

Regulatory landscape: MiCA brings clarity while US frameworks evolve

The regulatory environment for WaaS providers transformed substantially in 2024-2025 through comprehensive frameworks emerging in major jurisdictions. The EU's Markets in Crypto-Assets (MiCA) regulation taking full effect in December 2024 establishes the world's most comprehensive crypto regulatory framework, requiring Crypto Asset Service Provider authorization for any entity offering custody, transfer, or exchange services. MiCA introduces consumer protection requirements including capital reserves, operational resilience standards, cybersecurity frameworks, and conflict of interest disclosures while providing a regulatory passport enabling CASP-authorized providers to operate across all 27 EU member states.

Custody model determination drives regulatory classification and obligations. Custodial wallet providers automatically qualify as VASPs/CASPs/MSBs requiring full financial services licensing, KYC/AML programs, Travel Rule compliance, capital requirements, and regular audits. Fireblocks, Coinbase WaaS, and enterprise-focused providers deliberately accept these obligations to serve institutional clients requiring regulated counterparties. Non-custodial wallet providers like Turnkey and Web3Auth generally avoid VASP classification by demonstrating users control private keys, though must carefully structure offerings to maintain this distinction. Hybrid MPC models face ambiguous treatment depending on whether providers control majority key shares—a critical architectural decision with profound regulatory implications.

KYC/AML compliance requirements vary by jurisdiction but universally apply to custodial providers. FATF Recommendations require VASPs to implement customer due diligence, suspicious activity monitoring, and transaction reporting. Major providers integrate with specialized compliance technology: Chainalysis for transaction screening and wallet analysis, Elliptic for risk scoring and sanctions screening, Sumsub for identity verification with liveness detection and biometrics. TRM Labs, Crystal Intelligence, and Merkle Science provide complementary transaction monitoring and behavior detection. Integration approaches range from native built-in compliance (Fireblocks with integrated Elliptic/Chainalysis) to bring-your-own-key configurations letting customers use existing provider contracts.

Travel Rule compliance presents operational complexity as 65+ jurisdictions mandate VASP-to-VASP information exchange for transactions above threshold amounts (typically $1,000 USD equivalent, though Singapore requires $1,500 and Switzerland $1,000). FATF's June 2024 report found only 26% of implementing jurisdictions have taken enforcement actions, though compliance adoption accelerated with virtual asset transaction volume using Travel Rule tools increasing. Providers implement through protocols including Global Travel Rule Protocol, Travel Rule Protocol, and CODE, with Notabene providing VASP directory services. Sumsub offers multi-protocol support balancing compliance across jurisdictional variations.

The United States regulatory landscape shifted dramatically with the Trump administration's pro-crypto stance beginning January 2025. The administration's crypto task force charter established in March 2025 aims to clarify SEC jurisdiction and potentially repeal SAB 121. The Genius Act for stablecoin regulation and FIT21 for digital commodities advance through Congress with bipartisan support. State-level complexity persists with money transmitter licensing required in 48+ states, each with distinct capital requirements, bonding rules, and approval timelines ranging from 6-24 months. FinCEN registration as a Money Services Business provides federal baseline, supplementing rather than replacing state requirements.

Singapore's Monetary Authority maintains leadership in Asia-Pacific through Payment Services Act licensing distinguishing Standard Payment Institution licenses (≤SGD 5 million monthly) from Major Payment Institution licenses (>SGD 5 million), with SGD 250,000 minimum base capital. The August 2023 stablecoin framework specifically addresses payment-focused digital currencies, enabling Grab's crypto top-up integration and institutional partnerships like Dfns with Singapore-based custody providers. Japan's Financial Services Agency enforces strict requirements including 95% cold storage, asset segregation, and Japanese subsidiary establishment for most foreign providers. Hong Kong's Securities and Futures Commission implements ASPIRe framework with platform operator licensing and mandatory insurance requirements.

Privacy regulations create technical challenges for blockchain implementations. GDPR's right to erasure conflicts with blockchain immutability, with EDPB April 2024 guidelines recommending off-chain personal data storage, on-chain hashing for references, and encryption standards. Implementation requires separating personally identifiable information from blockchain transactions, storing sensitive data in encrypted off-chain databases controllable by users. 63% of DeFi platforms fail right to erasure compliance according to 2024 assessments, indicating technical debt many providers carry. CCPA/CPRA requirements in California largely align with GDPR principles, with 53% of US crypto firms now subject to California's framework.

Regional licensing comparison reveals substantial variation in complexity and cost. EU MiCA CASP authorization requires 6-12 months with costs varying by member state but providing 27-country passport, making single application economically efficient for European operations. US licensing combines federal MSB registration (6-month typical timeline) with 48+ state money transmitter licenses requiring 6-24 months with costs exceeding $1 million for comprehensive coverage. Singapore MAS licensing takes 6-12 months with SGD 250,000 capital for SPI, while Japan CAES registration typically requires 12-18 months with Japanese subsidiary establishment preferred. Hong Kong VASP licensing through SFC takes 6-12 months with insurance requirements, while UK FCA registration requires 6-12 months with £50,000+ capital and AML/CFT compliance.

Compliance technology costs and operational requirements create barriers to entry favoring well-funded providers. Licensing fees range from $100,000 to $1+ million across jurisdictions, while annual compliance technology subscriptions cost $50,000-500,000 for KYC, AML, and transaction monitoring tools. Legal and consulting expenses typically reach $200,000-1,000,000+ annually for multi-jurisdictional operations, with dedicated compliance teams costing $500,000-2,000,000+ in personnel expenses. Regular audits and certifications (SOC 2 Type II, ISO 27001) add $50,000-200,000 annually. Total compliance infrastructure commonly exceeds $2-5 million in first-year setup costs for multi-jurisdictional providers, creating moats around established players while limiting new entrant competition.

Innovation frontiers: Account abstraction and AI reshape wallet paradigms

Account abstraction represents the most transformative infrastructure innovation since Ethereum's launch, with ERC-4337 UserOperations surging 1,140% to 103 million in 2024 compared to 8.3 million in 2023. The standard introduces smart contract wallets without requiring protocol changes, enabling gas sponsorship, batched transactions, social recovery, and session keys through a parallel transaction execution system. Bundlers aggregate UserOperations into single transactions submitted to the EntryPoint contract, with Coinbase processing 30+ million operations primarily on Base, Alchemy deploying 58% of new smart accounts, and Pimlico, Biconomy, and Particle providing complementary infrastructure.

Paymaster adoption demonstrates killer application viability. 87% of all UserOperations utilized Paymasters to sponsor gas fees, covering $3.4 million in transaction costs during 2024. This gas abstraction solves the bootstrapping problem where users need tokens to pay for acquiring their first tokens, enabling true frictionless onboarding. Verifying Paymasters link off-chain verification to on-chain execution, while Depositing Paymasters maintain on-chain balances covering batched user operations. Multi-round validation enables sophisticated spending policies without users managing gas strategies.

EIP-7702 launched with the Pectra upgrade on May 7, 2025, introducing Type 4 transactions enabling EOAs to delegate code execution to smart contracts. This bridges account abstraction benefits to existing externally-owned accounts without requiring asset migration or new address generation. Users maintain original addresses while gaining smart contract capabilities selectively, with MetaMask, Rainbow, and Uniswap implementing initial support. The authorization list mechanism enables temporary or permanent delegation, backward compatible with ERC-4337 infrastructure while solving adoption friction from account migration requirements.

Passkey integration eliminates seed phrases as authentication primitives, with biometric device security replacing memorization and physical backup requirements. Coinbase Smart Wallet pioneered at-scale passkey wallet creation using WebAuthn/FIDO2 standards, though security audits identified concerns around user verification requirements and Windows 11 device-bound passkey cloud sync limitations. Web3Auth, Dynamic, Turnkey, and Portal implement passkey-authorized MPC sessions where biometric authentication controls wallet access and transaction signing without directly exposing private keys. EIP-7212 precompile support for P-256 signature verification reduces gas costs for passkey transactions on Ethereum and compatible chains.

The technical challenge of passkey-blockchain integration stems from curve incompatibilities. WebAuthn uses P-256 (secp256r1) curves while most blockchains expect secp256k1 (Ethereum, Bitcoin) or ed25519 (Solana). Direct passkey signing would require expensive on-chain verification or protocol modifications, so most implementations use passkeys to authorize MPC operations rather than direct transaction signing. This architecture maintains security properties while achieving cryptographic compatibility across blockchain ecosystems.

AI integration transforms wallets from passive key storage into intelligent financial assistants. The AI in FinTech market projects growth from $14.79 billion in 2024 to $43.04 billion by 2029 at 23.82% CAGR, with crypto wallets representing substantial adoption. Fraud detection leverages machine learning for anomaly detection, behavioral pattern analysis, and real-time phishing identification—MetaMask's Wallet Guard integration exemplifies AI-powered threat prevention. Transaction optimization through predictive gas fee models analyzing network congestion, optimal timing recommendations, and MEV protection delivers measurable cost savings averaging 15-30% versus naive timing.

Portfolio management AI features include asset allocation recommendations, risk tolerance profiling with automatic rebalancing, yield farming opportunity identification across DeFi protocols, and performance analytics with trend prediction. Rasper AI markets as the first self-custodial AI wallet with portfolio advisor functionality, real-time threat and volatility alerts, and multi-currency behavioral trend tracking. ASI Wallet from Fetch.ai provides privacy-focused AI-native experiences with portfolio tracking and predictive insights integrated with Cosmos ecosystem agent-based interactions.

Natural language interfaces represent the killer application for mainstream adoption. Conversational AI enables users to execute transactions through voice or text commands without understanding blockchain mechanics—"send 10 USDC to Alice" automatically resolves names, checks balances, estimates gas, and executes across appropriate chains. The Zebu Live panel featuring speakers from Base, Rhinestone, Zerion, and Askgina.ai articulated the vision: future users won't think about gas fees or key management, as AI handles complexity invisibly. Intent-based architectures where users specify desired outcomes rather than transaction mechanics shift cognitive load from users to protocol infrastructure.

Zero-knowledge proof adoption accelerates through Google's ZKP integration announced May 2, 2025 for age verification in Google Wallet, with open-source libraries released July 3, 2025 via github.com/google/longfellow-zk. Users prove attributes like age over 18 without revealing birthdates, with first partner Bumble implementing for dating app verification. EU eIDAS regulation encouraging ZKP in European Digital Identity Wallet planned for 2026 launch drives standardization. The expansion targets 50+ countries for passport validation, health service access, and attribute verification while maintaining privacy.

Layer-2 ZK rollup adoption demonstrates scalability breakthroughs. Polygon zkEVM TVL surpassed $312 million in Q1 2025 representing 240% year-over-year growth, while zkSync Era saw 276% increase in daily transactions. StarkWare's S-two mobile prover enables local proof generation on laptops and phones, democratizing ZK proof creation beyond specialized hardware. ZK-rollups bundle hundreds of transactions into single proofs verified on-chain, delivering 100-1000x scalability improvements while maintaining security properties through cryptographic guarantees rather than optimistic fraud proof assumptions.

Quantum-resistant cryptography research intensifies as threat timelines crystallize. NIST standardized post-quantum algorithms including CRYSTALS-Kyber for key encapsulation and CRYSTALS-Dilithium for digital signatures in November 2024, with SEALSQ's QS7001 Secure Element launching May 21, 2025 as first Bitcoin hardware wallet implementing NIST-compliant post-quantum cryptography. The hybrid approach combining ECDSA and Dilithium signatures enables backward compatibility during transition periods. BTQ Technologies' Bitcoin Quantum launched October 2025 as the first NIST-compliant quantum-safe Bitcoin implementation capable of 1 million+ post-quantum signatures per second.

Decentralized identity standards mature toward mainstream adoption. W3C DID specifications define globally unique, user-controlled identifiers blockchain-anchored for immutability without central authorities. Verifiable Credentials enable digital, cryptographically-signed credentials issued by trusted entities, stored in user wallets, and verified without contacting issuers. The European Digital Identity Wallet launching 2026 will require EU member states to provide interoperable cross-border digital ID with ZKP-based selective disclosure, potentially impacting 450+ million residents. Digital identity market projections reach $200+ billion by 2034, with 25-35% of digital IDs expected to be decentralized by 2035 as 60% of countries explore decentralized frameworks.

Cross-chain interoperability protocols address fragmentation across 300+ blockchain networks. Chainlink CCIP integrated 60+ blockchains as of 2025, leveraging battle-tested Decentralized Oracle Networks securing $100+ billion TVL for token-agnostic secure transfers. Recent integrations include Stellar through Chainlink Scale and TON for Toncoin cross-chain transfers. Arcana Chain Abstraction SDK launched January 2025 provides unified balances across Ethereum, Polygon, Arbitrum, Base, and Optimism with stablecoin gas payments and automatic liquidity routing. Particle Network's Universal Accounts deliver single addresses across 65+ chains with intent-based transaction execution abstracting chain selection entirely from user decisions.

Price comparisons

WalletsTHIRDWEBPRIVYDYNAMICWEB3 AUTHMAGIC LINK
10,000$150 Total
($0.015/wallet)
$499 Total
($0.049/wallet)
$500 Total
($0.05/wallet)
$400 Total
($0.04/wallet)
$500 Total
($0.05/wallet)
100,000$1,485 Total
($0.01485/wallet)
Enterprise pricing
(talk to sales)
$5,000 Total
($0.05/wallet)
$4,000 Total
($0.04/wallet)
$5,000 Total
($0.05/wallet)
1,000,000$10,485 Total
($0.0104/wallet)
Enterprise pricing
(talk to sales)
$50,000 Total
($0.05/wallet)
$40,000 Total
($0.04/wallet)
$50,000 Total
($0.05/wallet)
10,000,000$78,000 Total
($0.0078/wallet)
Enterprise pricing
(talk to sales)
Enterprise pricing
(talk to sales)
$400,000 Total
($0.04/wallet)
Enterprise pricing
(talk to sales)
100,000,000$528,000 Total
($0.00528/wallet)
Enterprise pricing
(talk to sales)
Enterprise pricing
(talk to sales)
$4,000,000 Total
($0.04/wallet)
Enterprise pricing
(talk to sales)

Strategic imperatives for builders and enterprises

WaaS infrastructure selection requires evaluating security models, regulatory positioning, blockchain coverage, and developer experience against specific use case requirements. Institutional applications prioritize Fireblocks or Turnkey for SOC 2 Type II certification, comprehensive audit trails, policy engines enabling multi-approval workflows, and established regulatory relationships. Fireblocks' $8 billion valuation and $10+ trillion in secured transfers provides institutional credibility, while Turnkey's AWS Nitro Enclave architecture and open-source approach appeals to teams requiring infrastructure transparency.

Consumer applications optimize for conversion rates through frictionless onboarding. Privy excels for React-focused teams requiring rapid integration with email and social login, now backed by Stripe's resources and payment infrastructure. Web3Auth provides blockchain-agnostic support for teams targeting multiple chains and frameworks, with 19+ social login options at $69 monthly making it economically accessible for startups. Dynamic's acquisition by Fireblocks creates a unified custody-to-consumer offering combining institutional security with developer-friendly embedded wallets.

Gaming and metaverse applications benefit from specialized features. Web3Auth's Unity and Unreal Engine SDKs remain unique among major providers, critical for game developers working outside web frameworks. Particle Network's session keys enable gasless in-game transactions with user-authorized spending limits, while account abstraction batching allows complex multi-step game actions in single transactions. Consider gas sponsorship requirements carefully—game economies with high transaction frequencies require either Layer-2 deployment or substantial Paymaster budgets.

Multi-chain applications must evaluate architectural approaches. Curve-based universal support from Turnkey and Web3Auth automatically covers new chains at launch without provider integration dependencies, future-proofing against blockchain proliferation. Fireblocks' comprehensive individual integrations provide deeper chain-specific features like staking and DeFi protocol access. Particle Network's Universal Accounts represent the bleeding edge with true chain abstraction through coordination infrastructure, suitable for applications willing to integrate novel architectures for superior UX.

Regulatory compliance requirements vary drastically by business model. Custodial models trigger full VASP/CASP licensing across jurisdictions, requiring $2-5 million first-year compliance infrastructure investment and 12-24 month licensing timelines. Non-custodial approaches using MPC or smart contract wallets avoid most custody regulations but must carefully structure key control to maintain classification. Hybrid models require legal analysis for each jurisdiction, as determination depends on subtle implementation details around key recovery and backup procedures.

Cost considerations extend beyond transparent pricing to total cost of ownership. Transaction-based pricing creates unpredictable scaling costs for high-volume applications, while monthly active wallet pricing penalizes user growth. Evaluate provider lock-in risks through private key export capabilities and standard derivation path support enabling migration without user disruption. Infrastructure providers with vendor lock-in through proprietary key management create switching costs hindering future flexibility.

Developer experience factors compound over application lifetime. Integration time represents one-time cost, but SDK quality, documentation completeness, and support responsiveness impact ongoing development velocity. Web3Auth, Turnkey, and Dynamic receive consistent praise for documentation quality, while some providers require sales contact for basic integration questions. Active developer communities on GitHub, Discord, and Stack Overflow indicate ecosystem health and knowledge base availability.

Security certification requirements depend on customer expectations. SOC 2 Type II certification reassures enterprise buyers about operational controls and security practices, often required for procurement approval. ISO 27001/27017/27018 certifications demonstrate international security standard compliance. Regular third-party security audits from reputable firms like Trail of Bits, OpenZeppelin, or Consensys Diligence validate smart contract and infrastructure security. Insurance coverage for assets in storage and transit differentiates institutional-grade providers, with Fireblocks offering policies covering the digital asset lifecycle.

Future-proofing strategies require quantum readiness planning. While cryptographically-relevant quantum computers remain 10-20 years away, the "harvest now, decrypt later" threat model makes post-quantum planning urgent for long-lived assets. Evaluate providers' quantum resistance roadmaps and crypto-agile architectures enabling algorithm transitions without user disruption. Hardware wallet integrations supporting Dilithium or FALCON signatures future-proof high-value custody, while protocol participation in NIST standardization processes signals commitment to quantum readiness.

Account abstraction adoption timing represents strategic decision. ERC-4337 and EIP-7702 provide production-ready infrastructure for gas sponsorship, social recovery, and session keys—features dramatically improving conversion rates and reducing support burden from lost access. However, smart account deployment costs and ongoing transaction overhead require careful cost-benefit analysis. Layer-2 deployment mitigates gas concerns while maintaining security properties, with Base, Arbitrum, and Optimism offering robust account abstraction infrastructure.

The WaaS landscape continues rapid evolution with consolidation around platform players building full-stack solutions. Stripe's Privy acquisition and vertical integration with Bridge stablecoins signals Web2 payment giants recognizing crypto infrastructure criticality. Fireblocks' Dynamic acquisition creates custody-to-consumer offerings competing with Coinbase's integrated approach. This consolidation favors providers with clear positioning—best-in-class institutional security, superior developer experience, or innovative chain abstraction—over undifferentiated middle-market players.

For builders deploying WaaS infrastructure in 2024-2025, prioritize providers with comprehensive account abstraction support, passwordless authentication roadmaps, multi-chain coverage through curve-based or abstraction architectures, and regulatory compliance frameworks matching your business model. The infrastructure has matured from experimental to production-grade, with proven implementations powering billions in transaction volume across gaming, DeFi, NFTs, and enterprise applications. The winners in Web3's next growth phase will be those leveraging WaaS to deliver Web2 user experiences powered by Web3's programmable money, composable protocols, and user-controlled digital assets.

Google’s Agent Payments Protocol (AP2)

· 34 min read
Dora Noda
Software Engineer

Google’s Agent Payments Protocol (AP2) is a newly announced open standard designed to enable secure, trustworthy transactions initiated by AI agents on behalf of users. Developed in collaboration with over 60 payments and technology organizations (including major payment networks, banks, fintechs, and Web3 companies), AP2 establishes a common language for “agentic” payments – i.e. purchases and financial transactions that an autonomous agent (such as an AI assistant or LLM-based agent) can carry out for a user. AP2’s creation is driven by a fundamental shift: traditionally, online payment systems assumed a human is directly clicking “buy,” but the rise of AI agents acting on user instructions breaks this assumption. AP2 addresses the resulting challenges of authorization, authenticity, and accountability in AI-driven commerce, while remaining compatible with existing payment infrastructure. This report examines AP2’s technical architecture, purpose and use cases, integrations with AI agents and payment providers, security and compliance considerations, comparisons to existing protocols, implications for Web3/decentralized systems, and the industry adoption/roadmap.

Technical Architecture: How AP2 Works

At its core, AP2 introduces a cryptographically secure transaction framework built on verifiable digital credentials (VDCs) – essentially tamper-proof, signed data objects that serve as digital “contracts” of what the user has authorized. In AP2 terminology these contracts are called Mandates, and they form an auditable chain of evidence for each transaction. There are three primary types of mandates in the AP2 architecture:

  • Intent Mandate: Captures the user’s initial instructions or conditions for a purchase, especially for “human-not-present” scenarios (where the agent will act later without the user online). It defines the scope of authority the user gives the agent – for example, “Buy concert tickets if they drop below $200, up to 2 tickets”. This mandate is cryptographically signed upfront by the user and serves as verifiable proof of consent within specific limits.
  • Cart Mandate: Represents the final transaction details that the user has approved, used in “human-present” scenarios or at the moment of checkout. It includes the exact items or services, their price, and other particulars of the purchase. When the agent is ready to complete the transaction (e.g. after filling a shopping cart), the merchant first cryptographically signs the cart contents (guaranteeing the order details and price), and then the user (via their device or agent interface) signs off to create a Cart Mandate. This ensures what-you-see-is-what-you-pay, locking in the final order exactly as presented to the user.
  • Payment Mandate: A separate credential that is sent to the payment network (e.g. card network or bank) to signal that an AI agent is involved in the transaction. The Payment Mandate includes metadata such as whether the user was present or not during authorization and serves as a flag for risk management systems. By providing the acquiring and issuing banks with cryptographically verifiable evidence of user intent, this mandate helps them assess the context (for example, distinguishing an agent-initiated purchase from typical fraud) and manage compliance or liability accordingly.

All mandates are implemented as verifiable credentials signed by the relevant party’s keys (user, merchant, etc.), yielding a non-repudiable audit trail for every agent-led transaction. In practice, AP2 uses a role-based architecture to protect sensitive information – for instance, an agent might handle an Intent Mandate without ever seeing raw payment details, which are only revealed in a controlled way when needed, preserving privacy. The cryptographic chain of user intent → merchant commitment → payment authorization establishes trust among all parties that the transaction reflects the user’s true instructions and that both the agent and merchant adhered to those instructions.

Transaction Flow: To illustrate how AP2 works end-to-end, consider a simple purchase scenario with a human in the loop:

  1. User Request: The user asks their AI agent to purchase a particular item or service (e.g. “Order this pair of shoes in my size”).
  2. Cart Construction: The agent communicates with the merchant’s systems (using standard APIs or via an agent-to-agent interaction) to assemble a shopping cart for the specified item at a given price.
  3. Merchant Guarantee: Before presenting the cart to the user, the merchant’s side cryptographically signs the cart details (item, quantity, price, etc.). This step creates a merchant-signed offer that guarantees the exact terms (preventing any hidden changes or price manipulation).
  4. User Approval: The agent shows the user the finalized cart. The user confirms the purchase, and this approval triggers two cryptographic signatures from the user’s side: one on the Cart Mandate (to accept the merchant’s cart as-is) and one on the Payment Mandate (to authorize payment through the chosen payment provider). These signed mandates are then shared with the merchant and the payment network respectively.
  5. Execution: Armed with the Cart Mandate and Payment Mandate, the merchant and payment provider proceed to execute the transaction securely. For example, the merchant submits the payment request along with the proof of user approval to the payment network (card network, bank, etc.), which can verify the Payment Mandate. The result is a completed purchase transaction with a cryptographic audit trail linking the user’s intent to the final payment.

This flow demonstrates how AP2 builds trust into each step of an AI-driven purchase. The merchant has cryptographic proof of exactly what the user agreed to buy at what price, and the issuer/bank has proof that the user authorized that payment, even though an AI agent facilitated the process. In case of disputes or errors, the signed mandates act as clear evidence, helping determine accountability (e.g. if the agent deviated from instructions or if a charge was not what the user approved). In essence, AP2’s architecture ensures that verifiable user intent – rather than trust in the agent’s behavior – is the basis of the transaction, greatly reducing ambiguity.

Purpose and Use Cases for AP2

Why AP2 is Needed: The primary purpose of AP2 is to solve emerging trust and security issues that arise when AI agents can spend money on behalf of users. Google and its partners identified several key questions that today’s payment infrastructure cannot adequately answer when an autonomous agent is in the loop:

  • Authorization: How to prove that a user actually gave the agent permission to make a specific purchase? (In other words, ensuring the agent isn’t buying things without the user’s informed consent.)
  • Authenticity: How can a merchant know that an agent’s purchase request is genuine and reflects the user’s true intent, rather than a mistake or AI hallucination?
  • Accountability: If a fraudulent or incorrect transaction occurs via an agent, who is responsible – the user, the merchant, the payment provider, or the creator of the AI agent?

Without a solution, these uncertainties create a “crisis of trust” around agent-led commerce. AP2’s mission is to provide that solution by establishing a uniform protocol for secure agent transactions. By introducing standardized mandates and proofs of intent, AP2 prevents a fragmented ecosystem of each company inventing its own ad-hoc agent payment methods. Instead, any compliant AI agent can interact with any compliant merchant/payment provider under a common set of rules and verifications. This consistency not only avoids user and merchant confusion, but also gives financial institutions a clear way to manage risk for agent-initiated payments, rather than dealing with a patchwork of proprietary approaches. In short, AP2’s purpose is to be a foundational trust layer that lets the “agent economy” grow without breaking the payments ecosystem.

Intended Use Cases: By solving the above issues, AP2 opens the door to new commerce experiences and use cases that go beyond what’s possible with a human manually clicking through purchases. Some examples of agent-enabled commerce that AP2 supports include:

  • Smarter Shopping: A customer can instruct their agent, “I want this winter jacket in green, and I’m willing to pay up to 20% above the current price for it”. Armed with an Intent Mandate encoding these conditions, the agent will continuously monitor retailer websites or databases. The moment the jacket becomes available in green (and within the price threshold), the agent automatically executes a purchase with a secure, signed transaction – capturing a sale that otherwise would have been missed. The entire interaction, from the user’s initial request to the automated checkout, is governed by AP2 mandates ensuring the agent only buys exactly what was authorized.
  • Personalized Offers: A user tells their agent they’re looking for a specific product (say, a new bicycle) from a particular merchant for an upcoming trip. The agent can share this interest (within the bounds of an Intent Mandate) with the merchant’s own AI agent, including relevant context like the trip date. The merchant agent, knowing the user’s intent and context, could respond with a custom bundle or discount – for example, “bicycle + helmet + travel rack at 15% off, available for the next 48 hours.” Using AP2, the user’s agent can accept and complete this tailored offer securely, turning a simple query into a more valuable sale for the merchant.
  • Coordinated Tasks: A user planning a complex task (e.g. a weekend trip) delegates it entirely: “Book me a flight and hotel for these dates with a total budget of $700.” The agent can interact with multiple service providers’ agents – airlines, hotels, travel platforms – to find a combination that fits the budget. Once a suitable flight-hotel package is identified, the agent uses AP2 to execute multiple bookings in one go, each cryptographically signed (for example, issuing separate Cart Mandates for the airline and the hotel, both authorized under the user’s Intent Mandate). AP2 ensures all parts of this coordinated transaction occur as approved, and even allows simultaneous execution so that tickets and reservations are booked together without risk of one part failing mid-way.

These scenarios illustrate just a few of AP2’s intended use cases. More broadly, AP2’s flexible design supports both conventional e-commerce flows and entirely new models of commerce. For instance, AP2 can facilitate subscription-like services (an agent keeps you stocked on essentials by purchasing when conditions are met), event-driven purchases (buying tickets or items the instant a trigger event occurs), group agent negotiations (multiple users’ agents pooling mandates to bargain for a group deal), and many other emerging patterns. In every case, the common thread is that AP2 provides the trust framework – clear user authorization and cryptographic auditability – that allows these agent-driven transactions to happen safely. By handling the trust and verification layer, AP2 lets developers and businesses focus on innovating new AI commerce experiences without re-inventing payment security from scratch.

Integration with Agents, LLMs, and Payment Providers

AP2 is explicitly designed to integrate seamlessly with AI agent frameworks and with existing payment systems, acting as a bridge between the two. Google has positioned AP2 as an extension of its Agent2Agent (A2A) protocol and Model Context Protocol (MCP) standards. In other words, if A2A provides a generic language for agents to communicate tasks and MCP standardizes how AI models incorporate context/tools, then AP2 adds a transactions layer on top for commerce. The protocols are complementary: A2A handles agent-to-agent communication (allowing, say, a shopping agent to talk to a merchant’s agent), while AP2 handles agent-to-merchant payment authorization within those interactions. Because AP2 is open and non-proprietary, it’s meant to be framework-agnostic: developers can use it with Google’s own Agent Development Kit (ADK) or any AI agent library, and likewise it can work with various AI models including LLMs. An LLM-based agent, for example, could use AP2 by generating and exchanging the required mandate payloads (guided by the AP2 spec) instead of just free-form text. By enforcing a structured protocol, AP2 helps transform an AI agent’s high-level intent (which might come from an LLM’s reasoning) into concrete, secure transactions.

On the payments side, AP2 was built in concert with traditional payment providers and standards, rather than as a rip-and-replace system. The protocol is payment-method-agnostic, meaning it can support a variety of payment rails – from credit/debit card networks to bank transfers and digital wallets – as the underlying method for moving funds. In its initial version, AP2 emphasizes compatibility with card payments, since those are most common in online commerce. The AP2 Payment Mandate is designed to plug into the existing card processing flow: it provides additional data to the payment network (e.g. Visa, Mastercard, Amex) and issuing bank that an AI agent is involved and whether the user was present, thereby complementing existing fraud detection and authorization checks. Essentially, AP2 doesn’t process the payment itself; it augments the payment request with cryptographic proof of user intent. This allows payment providers to treat agent-initiated transactions with appropriate caution or speed (for example, an issuer might approve an unusual-looking purchase if it sees a valid AP2 mandate proving the user pre-approved it). Notably, Google and partners plan to evolve AP2 to support “push” payment methods as well – such as real-time bank transfers (like India’s UPI or Brazil’s PIX systems) – and other emerging digital payment types. This indicates AP2’s integration will expand beyond cards, aligning with modern payment trends worldwide.

For merchants and payment processors, integrating AP2 would mean supporting the additional protocol messages (mandates) and verifying signatures. Many large payment platforms are already involved in shaping AP2, so we can expect they will build support for it. For example, companies like Adyen, Worldpay, Paypal, Stripe (not explicitly named in the blog but likely interested), and others could incorporate AP2 into their checkout APIs or SDKs, allowing an agent to initiate a payment in a standardized way. Because AP2 is an open specification on GitHub with reference implementations, payment providers and tech platforms can start experimenting with it immediately. Google has also mentioned an AI Agent Marketplace where third-party agents can be listed – these agents are expected to support AP2 for any transactional capabilities. In practice, an enterprise that builds an AI sales assistant or procurement agent could list it on this marketplace, and thanks to AP2, that agent can carry out purchases or orders reliably.

Finally, AP2’s integration story benefits from its broad industry backing. By co-developing the protocol with major financial institutions and tech firms, Google ensured AP2 aligns with existing industry rules and compliance requirements. The collaboration with payment networks (e.g. Mastercard, UnionPay), issuers (e.g. American Express), fintechs (e.g. Revolut, Paypal), e-commerce players (e.g. Etsy), and even identity/security providers (e.g. Okta, Cloudflare) suggests AP2 is being designed to slot into real-world systems with minimal friction. These stakeholders bring expertise in areas like KYC (Know Your Customer regulations), fraud prevention, and data privacy, helping AP2 address those needs out of the box. In summary, AP2 is built to be agent-friendly and payment-provider-friendly: it extends existing AI agent protocols to handle transactions, and it layers on top of existing payment networks to utilize their infrastructure while adding necessary trust guarantees.

Security, Compliance, and Interoperability Considerations

Security and trust are at the heart of AP2’s design. The protocol’s use of cryptography (digital signatures on mandates) ensures that every critical action in an agentic transaction is verifiable and traceable. This non-repudiation is crucial: neither the user nor merchant can later deny what was authorized and agreed upon, since the mandates serve as secure records. A direct benefit is in fraud prevention and dispute resolution – with AP2, if a malicious or buggy agent attempts an unauthorized purchase, the lack of a valid user-signed mandate would be evident, and the transaction can be declined or reversed. Conversely, if a user claims “I never approved this purchase,” but a Cart Mandate exists with their cryptographic signature, the merchant and issuer have strong evidence to support the charge. This clarity of accountability answers a major compliance concern for the payments industry.

Authorization & Privacy: AP2 enforces an explicit authorization step (or steps) from the user for agent-led transactions, which aligns with regulatory trends like strong customer authentication. The User Control principle baked into AP2 means an agent cannot spend funds unless the user (or someone delegated by the user) has provided a verifiable instruction to do so. Even in fully autonomous scenarios, the user predefines the rules via an Intent Mandate. This approach can be seen as analogous to giving a power-of-attorney to the agent for specific transactions, but in a digitally signed, fine-grained manner. From a privacy perspective, AP2 is mindful about data sharing: the protocol uses a role-based data architecture to ensure that sensitive info (like payment credentials or personal details) is only shared with parties that absolutely need it. For example, an agent might send a Cart Mandate to a merchant containing item and price info, but the user’s actual card number might only be shared through the Payment Mandate with the payment processor, not with the agent or merchant. This minimizes unnecessary exposure of data, aiding compliance with privacy laws and PCI-DSS rules for handling payment data.

Compliance & Standards: Because AP2 was developed with input from established financial entities, it has been designed to meet or complement existing compliance standards in payments. The protocol doesn’t bypass the usual payment authorization flows – instead, it augments them with additional evidence and flags. This means AP2 transactions can still leverage fraud detection systems, 3-D Secure checks, or any regulatory checks required, with AP2’s mandates acting as extra authentication factors or context cues. For instance, a bank could treat a Payment Mandate akin to a customer’s digital signature on a transaction, potentially streamlining compliance with requirements for user consent. Additionally, AP2’s designers explicitly mention working “in concert with industry rules and standards”. We can infer that as AP2 evolves, it may be brought to formal standards bodies (such as the W3C, EMVCo, or ISO) to ensure it aligns with global financial standards. Google has stated commitment to an open, collaborative evolution of AP2 possibly through standards organizations. This open process will help iron out any regulatory concerns and achieve broad acceptance, similar to how previous payment standards (EMV chip cards, 3-D Secure, etc.) underwent industry-wide collaboration.

Interoperability: Avoiding fragmentation is a key goal of AP2. To that end, the protocol is openly published and made available for anyone to implement or integrate. It is not tied to Google Cloud services – in fact, AP2 is open-source (Apache-2 licensed) and the specification plus reference code is on a public GitHub repository. This encourages interoperability because multiple vendors can adopt AP2 and still have their systems work together. Already, the interoperability principle is highlighted: AP2 is an extension of existing open protocols (A2A, MCP) and is non-proprietary, meaning it fosters a competitive ecosystem of implementations rather than a single-vendor solution. In practical terms, an AI agent built by Company A could initiate a transaction with a merchant system from Company B if both follow AP2 – neither side is locked into one platform.

One possible concern is ensuring consistent adoption: if some major players chose a different protocol or closed approach, fragmentation could still occur. However, given the broad coalition behind AP2, it appears poised to become a de facto standard. The inclusion of many identity and security-focused firms (for example, Okta, Cloudflare, Ping Identity) in the AP2 ecosystem Figure: Over 60 companies across finance, tech, and crypto are collaborating on AP2 (partial list of partners). suggests that interoperability and security are being jointly addressed. These partners can help integrate AP2 into identity verification workflows and fraud prevention tools, ensuring that an AP2 transaction can be trusted across systems.

From a technology standpoint, AP2’s use of widely accepted cryptographic techniques (likely JSON-LD or JWT-based verifiable credentials, public key signatures, etc.) makes it compatible with existing security infrastructure. Organizations can use their existing PKI (Public Key Infrastructure) to manage keys for signing mandates. AP2 also seems to anticipate integration with decentralized identity systems: Google mentions that AP2 creates opportunities to innovate in areas like decentralized identity for agent authorization. This means in the future, AP2 could leverage DID (Decentralized Identifier) standards or decentralized identifier verification for identifying agents and users in a trusted way. Such an approach would further enhance interoperability by not relying on any single identity provider. In summary, AP2 emphasizes security through cryptography and clear accountability, aims to be compliance-ready by design, and promotes interoperability through its open standard nature and broad industry support.

Comparison with Existing Protocols

AP2 is a novel protocol addressing a gap that existing payment and agent frameworks have not covered: enabling autonomous agents to perform payments in a secure, standardized manner. In terms of agent communication protocols, AP2 builds on prior work like the Agent2Agent (A2A) protocol. A2A (open-sourced earlier in 2025) allows different AI agents to talk to each other regardless of their underlying frameworks. However, A2A by itself doesn’t define how agents should conduct transactions or payments – it’s more about task negotiation and data exchange. AP2 extends this landscape by adding a transaction layer that any agent can use when a conversation leads to a purchase. In essence, AP2 can be seen as complementary to A2A and MCP, rather than overlapping: A2A covers the communication and collaboration aspects, MCP covers using external tools/APIs, and AP2 covers payments and commerce. Together, they form a stack of standards for a future “agent economy.” This modular approach is somewhat analogous to internet protocols: for example, HTTP for data communication and SSL/TLS for security – here A2A might be like the HTTP of agents, and AP2 the secure transactional layer on top for commerce.

When comparing AP2 to traditional payment protocols and standards, there are both parallels and differences. Traditional online payments (credit card checkouts, PayPal transactions, etc.) typically involve protocols like HTTPS for secure transmission, and standards like PCI DSS for handling card data, plus possibly 3-D Secure for additional user authentication. These assume a user-driven flow (user clicks and perhaps enters a one-time code). AP2, by contrast, introduces a way for a third-party (the agent) to participate in the flow without undermining security. One could compare AP2’s mandate concept to an extension of OAuth-style delegated authority, but applied to payments. In OAuth, a user can grant an application limited access to an account via tokens; similarly in AP2, a user grants an agent authority to spend under certain conditions via mandates. The key difference is that AP2’s “tokens” (mandates) are specific, signed instructions for financial transactions, which is more fine-grained than existing payment authorizations.

Another point of comparison is how AP2 relates to existing e-commerce checkout flows. For instance, many e-commerce sites use protocols like the W3C Payment Request API or platform-specific SDKs to streamline payments. Those mainly standardize how browsers or apps collect payment info from a user, whereas AP2 standardizes how an agent would prove user intent to a merchant and payment processor. AP2’s focus on verifiable intent and non-repudiation sets it apart from simpler payment APIs. It’s adding an additional layer of trust on top of the payment networks. One could say AP2 is not replacing the payment networks (Visa, ACH, blockchain, etc.), but rather augmenting them. The protocol explicitly supports all types of payment methods (even crypto), so it is more about standardizing the agent’s interaction with these systems, not creating a new payment rail from scratch.

In the realm of security and authentication protocols, AP2 shares some spirit with things like digital signatures in EMV chip cards or the notarization in digital contracts. For example, EMV chip card transactions generate cryptograms to prove the card was present; AP2 generates cryptographic proof that the user’s agent was authorized. Both aim to prevent fraud, but AP2’s scope is the agent-user relationship and agent-merchant messaging, which no existing payment standard addresses. Another emerging comparison is with account abstraction in crypto (e.g. ERC-4337) where users can authorize pre-programmed wallet actions. Crypto wallets can be set to allow certain automated transactions (like auto-paying a subscription via a smart contract), but those are typically confined to one blockchain environment. AP2, on the other hand, aims to be cross-platform – it can leverage blockchain for some payments (through its extensions) but also works with traditional banks.

There isn’t a direct “competitor” protocol to AP2 in the mainstream payments industry yet – it appears to be the first concerted effort at an open standard for AI-agent payments. Proprietary attempts may arise (or may already be in progress within individual companies), but AP2’s broad support gives it an edge in becoming the standard. It’s worth noting that IBM and others have an Agent Communication Protocol (ACP) and similar initiatives for agent interoperability, but those don’t encompass the payment aspect in the comprehensive way AP2 does. If anything, AP2 might integrate with or leverage those efforts (for example, IBM’s agent frameworks could implement AP2 for any commerce tasks).

In summary, AP2 distinguishes itself by targeting the unique intersection of AI and payments: where older payment protocols assumed a human user, AP2 assumes an AI intermediary and fills the trust gap that results. It extends, rather than conflicts with, existing payment processes, and complements existing agent protocols like A2A. Going forward, one might see AP2 being used alongside established standards – for instance, an AP2 Cart Mandate might work in tandem with a traditional payment gateway API call, or an AP2 Payment Mandate might be attached to a ISO 8583 message in banking. The open nature of AP2 also means if any alternative approaches emerge, AP2 could potentially absorb or align with them through community collaboration. At this stage, AP2 is setting a baseline that did not exist before, effectively pioneering a new layer of protocol in the AI and payments stack.

Implications for Web3 and Decentralized Systems

From the outset, AP2 has been designed to be inclusive of Web3 and cryptocurrency-based payments. The protocol recognizes that future commerce will span both traditional fiat channels and decentralized blockchain networks. As noted earlier, AP2 supports payment types ranging from credit cards and bank transfers to stablecoins and cryptocurrencies. In fact, alongside AP2’s launch, Google announced a specific extension for crypto payments called A2A x402. This extension, developed in collaboration with crypto-industry players like Coinbase, the Ethereum Foundation, and MetaMask, is a “production-ready solution for agent-based crypto payments”. The name “x402” is an homage to the HTTP 402 “Payment Required” status code, which was never widely used on the Web – AP2’s crypto extension effectively revives the spirit of HTTP 402 for decentralized agents that want to charge or pay each other on-chain. In practical terms, the x402 extension adapts AP2’s mandate concept to blockchain transactions. For example, an agent could hold a signed Intent Mandate from a user and then execute an on-chain payment (say, send a stablecoin) once conditions are met, attaching proof of the mandate to that on-chain transaction. This marries the AP2 off-chain trust framework with the trustless nature of blockchain, giving the best of both worlds: an on-chain payment that off-chain parties (users, merchants) can trust was authorized by the user.

The synergy between AP2 and Web3 is evident in the list of collaborators. Crypto exchanges (Coinbase), blockchain foundations (Ethereum Foundation), crypto wallets (MetaMask), and Web3 startups (e.g. Mysten Labs of Sui, Lightspark for Lightning Network) are involved in AP2’s development. Their participation suggests AP2 is viewed as complementary to decentralized finance rather than competitive. By creating a standard way for AI agents to interact with crypto payments, AP2 could drive more usage of crypto in AI-driven applications. For instance, an AI agent might use AP2 to seamlessly swap between paying with a credit card or paying with a stablecoin, depending on user preference or merchant acceptance. The A2A x402 extension specifically allows agents to monetize or pay for services through on-chain means, which could be crucial in decentralized marketplaces of the future. It hints at agents possibly running as autonomous economic actors on blockchain (a concept some refer to as DACs or DAOs) being able to handle payments required for services (like paying a small fee to another agent for information). AP2 could provide the lingua franca for such transactions, ensuring even on a decentralized network, the agent has a provable mandate for what it’s doing.

In terms of competition, one could ask: do purely decentralized solutions make AP2 unnecessary, or vice-versa? It’s likely that AP2 will coexist with Web3 solutions in a layered approach. Decentralized finance offers trustless execution (smart contracts, etc.), but it doesn’t inherently solve the problem of “Did an AI have permission from a human to do this?”. AP2 addresses that very human-to-AI trust link, which remains important even if the payment itself is on-chain. Rather than competing with blockchain protocols, AP2 can be seen as bridging them with the off-chain world. For example, a smart contract might accept a certain transaction only if it includes a reference to a valid AP2 mandate signature – something that could be implemented to combine off-chain intent proof with on-chain enforcement. Conversely, if there are crypto-native agent frameworks (some blockchain projects explore autonomous agents that operate with crypto funds), they might develop their own methods for authorization. AP2’s broad industry support, however, might steer even those projects to adopt or integrate with AP2 for consistency.

Another angle is decentralized identity and credentials. AP2’s use of verifiable credentials is very much in line with Web3’s approach to identity (e.g. DIDs and VCs as standardized by W3C). This means AP2 could plug into decentralized identity systems – for instance, a user’s DID could be used to sign an AP2 mandate, which a merchant could verify against a blockchain or identity hub. The mention of exploring decentralized identity for agent authorization reinforces that AP2 may leverage Web3 identity innovations for verifying agent and user identities in a decentralized way, rather than relying only on centralized authorities. This is a point of synergy, as both AP2 and Web3 aim to give users more control and cryptographic proof of their actions.

Potential conflicts might arise only if one envisions a fully decentralized commerce ecosystem with no role for large intermediaries – in that scenario, could AP2 (initially pushed by Google and partners) be too centralized or governed by traditional players? It’s important to note AP2 is open source and intended to be standardizable, so it’s not proprietary to Google. This makes it more palatable to the Web3 community, which values open protocols. If AP2 becomes widely adopted, it might reduce the need for separate Web3-specific payment protocols for agents, thereby unifying efforts. On the other hand, some blockchain projects might prefer purely on-chain authorization mechanisms (like multi-signature wallets or on-chain escrow logic) for agent transactions, especially in trustless environments without any centralized authorities. Those could be seen as alternative approaches, but they likely would remain niche unless they can interact with off-chain systems. AP2, by covering both worlds, might actually accelerate Web3 adoption by making crypto just another payment method an AI agent can use seamlessly. Indeed, one partner noted that “stablecoins provide an obvious solution to scaling challenges [for] agentic systems with legacy infrastructure”, highlighting that crypto can complement AP2 in handling scale or cross-border scenarios. Meanwhile, Coinbase’s engineering lead remarked that bringing the x402 crypto extension into AP2 “made sense – it’s a natural playground for agents... exciting to see agents paying each other resonate with the AI community”. This implies a vision where AI agents transacting via crypto networks is not just a theoretical idea but an expected outcome, with AP2 acting as a catalyst.

In summary, AP2 is highly relevant to Web3: it incorporates crypto payments as a first-class citizen and is aligning with decentralized identity and credential standards. Rather than competing head-on with decentralized payment protocols, AP2 likely interoperates with them – providing the authorization layer while the decentralized systems handle the value transfer. As the line between traditional finance and crypto blurs (with stablecoins, CBDCs, etc.), a unified protocol like AP2 could serve as a universal adapter between AI agents and any form of money, centralized or decentralized.

Industry Adoption, Partnerships, and Roadmap

One of AP2’s greatest strengths is the extensive industry backing behind it, even at this early stage. Google Cloud announced that it is “collaborating with a diverse group of more than 60 organizations” on AP2. These include major credit card networks (e.g. Mastercard, American Express, JCB, UnionPay), leading fintech and payment processors (PayPal, Worldpay, Adyen, Checkout.com, Stripe’s competitors), e-commerce and online marketplaces (Etsy, Shopify (via partners like Stripe or others), Lazada, Zalora), enterprise tech companies (Salesforce, ServiceNow, Oracle possibly via partners, Dell, Red Hat), identity and security firms (Okta, Ping Identity, Cloudflare), consulting firms (Deloitte, Accenture), and crypto/Web3 organizations (Coinbase, Ethereum Foundation, MetaMask, Mysten Labs, Lightspark), among others. Such a wide array of participants is a strong indicator of industry interest and likely adoption. Many of these partners have publicly voiced support. For example, Adyen’s Co-CEO highlighted the need for a “common rulebook” for agentic commerce and sees AP2 as a natural extension of their mission to support merchants with new payment building blocks. American Express’s EVP stated that AP2 is important for “the next generation of digital payments” where trust and accountability are paramount. Coinbase’s team, as noted, is excited about integrating crypto payments into AP2. This chorus of support shows that many in the industry view AP2 as the likely standard for AI-driven payments, and they are keen to shape it to ensure it meets their requirements.

From an adoption standpoint, AP2 is currently at the specification and early implementation stage (announced in September 2025). The complete technical spec, documentation, and some reference implementations (in languages like Python) are available on the project’s GitHub for developers to experiment with. Google has also indicated that AP2 will be incorporated into its products and services for agents. A notable example is the AI Agent Marketplace mentioned earlier: this is a platform where third-party AI agents can be offered to users (likely part of Google’s generative AI ecosystem). Google says many partners building agents will make them available in the marketplace with “new, transactable experiences enabled by AP2”. This implies that as the marketplace launches or grows, AP2 will be the backbone for any agent that needs to perform a transaction, whether it’s buying software from the Google Cloud Marketplace autonomously or an agent purchasing goods/services for a user. Enterprise use cases like autonomous procurement (one agent buying from another on behalf of a company) and automatic license scaling have been specifically mentioned as areas AP2 could facilitate soon.

In terms of a roadmap, the AP2 documentation and Google’s announcement give some clear indications:

  • Near-term: Continue open development of the protocol with community input. The GitHub repo will be updated with additional reference implementations and improvements as real-world testing happens. We can expect libraries/SDKs to emerge, making it easier to integrate AP2 into agent applications. Also, initial pilot programs or proofs-of-concept might be conducted by the partner companies. Given that many large payment companies are involved, they might trial AP2 in controlled environments (e.g., an AP2-enabled checkout option in a small user beta).
  • Standards and Governance: Google has expressed a commitment to move AP2 into an open governance model, possibly via standards bodies. This could mean submitting AP2 to organizations like the Linux Foundation (as was done with the A2A protocol) or forming a consortium to maintain it. The Linux Foundation, W3C, or even bodies like ISO/TC68 (financial services) might be in the cards for formalizing AP2. An open governance would reassure the industry that AP2 is not under single-company control and will remain neutral and inclusive.
  • Feature Expansion: Technically, the roadmap includes expanding support to more payment types and use cases. As noted in the spec, after cards, the focus will shift to “push” payments like bank wires and local real-time payment schemes, and digital currencies. This means AP2 will outline how an Intent/Cart/Payment Mandate works for, say, a direct bank transfer or a crypto wallet transfer, where the flow is a bit different than card pulls. The A2A x402 extension is one such expansion for crypto; similarly, we might see an extension for open banking APIs or one for B2B invoicing scenarios.
  • Security & Compliance Enhancements: As real transactions start flowing through AP2, there will be scrutiny from regulators and security researchers. The open process will likely iterate on making mandates even more robust (e.g., ensuring mandate formats are standardized, possibly using W3C Verifiable Credentials format, etc.). Integration with identity solutions (perhaps leveraging biometrics for user signing of mandates, or linking mandates to digital identity wallets) could be part of the roadmap to enhance trust.
  • Ecosystem Tools: An emerging ecosystem is likely. Already, startups are noticing gaps – for instance, the Vellum.ai analysis mentions a startup called Autumn building “billing infrastructure for AI,” essentially tooling on top of Stripe to handle complex pricing for AI services. As AP2 gains traction, we can expect more tools like agent-focused payment gateways, mandate management dashboards, agent identity verification services, etc., to appear. Google’s involvement means AP2 could also be integrated into its Cloud products – imagine AP2 support in Dialogflow or Vertex AI Agents tooling, making it one-click to enable an agent to handle transactions (with all the necessary keys and certificates managed in Google Cloud).

Overall, the trajectory of AP2 is reminiscent of other major industry standards: an initial launch with a strong sponsor (Google), broad industry coalition, open-source reference code, followed by iterative improvement and gradual adoption in real products. The fact that AP2 is inviting all players “to build this future with us” underscores that the roadmap is about collaboration. If the momentum continues, AP2 could become as commonplace in a few years as protocols like OAuth or OpenID Connect are today in their domains – an unseen but critical layer enabling functionality across services.

Conclusion

AP2 (Agents/Agent Payments Protocol) represents a significant step toward a future where AI agents can transact as reliably and securely as humans. Technically, it introduces a clever mechanism of verifiable mandates and credentials that instill trust in agent-led transactions, ensuring user intent is explicit and enforceable. Its open, extensible architecture allows it to integrate both with the burgeoning AI agent frameworks and the established financial infrastructure. By addressing core concerns of authorization, authenticity, and accountability, AP2 lays the groundwork for AI-driven commerce to flourish without sacrificing security or user control.

The introduction of AP2 can be seen as laying a new foundation – much like early internet protocols enabled the web – for what some call the “agent economy.” It paves the way for countless innovations: personal shopper agents, automatic deal-finding bots, autonomous supply chain agents, and more, all operating under a common trust framework. Importantly, AP2’s inclusive design (embracing everything from credit cards to crypto) positions it at the intersection of traditional finance and Web3, potentially bridging these worlds through a common agent-mediated protocol.

Industry response so far has been very positive, with a broad coalition signaling that AP2 is likely to become a widely adopted standard. The success of AP2 will depend on continued collaboration and real-world testing, but its prospects are strong given the clear need it addresses. In a broader sense, AP2 exemplifies how technology evolves: a new capability (AI agents) emerged that broke old assumptions, and the solution was to develop a new open standard to accommodate that capability. By investing in an open, security-first protocol now, Google and its partners are effectively building the trust architecture required for the next era of commerce. As the saying goes, “the best way to predict the future is to build it” – AP2 is a bet on a future where AI agents seamlessly handle transactions for us, and it is actively constructing the trust and rules needed to make that future viable.

Sources:

  • Google Cloud Blog – “Powering AI commerce with the new Agent Payments Protocol (AP2)” (Sept 16, 2025)
  • AP2 GitHub Documentation – “Agent Payments Protocol Specification and Overview”
  • Vellum AI Blog – “Google’s AP2: A new protocol for AI agent payments” (Analysis)
  • Medium Article – “Google Agent Payments Protocol (AP2)” (Summary by Tahir, Sept 2025)
  • Partner Quotes on AP2 (Google Cloud Blog)
  • A2A x402 Extension (AP2 crypto payments extension) – GitHub README

Consensus Model Trade-offs for Interoperability: PoW, PoS, DPoS, and BFT in Cross-Chain Bridge Security

· 11 min read
Dora Noda
Software Engineer

Over $2.3 billion was drained from cross-chain bridges in the first half of 2025 alone—already surpassing the full-year total from 2024. While much of the industry conversation focuses on smart contract audits and multisig key management, a quieter but equally critical vulnerability often goes unexamined: the mismatch between how different blockchains reach consensus and how bridges assume they do.

Every cross-chain bridge makes implicit assumptions about finality. When those assumptions collide with the actual consensus model of a source or destination chain, attackers find windows to exploit. Understanding how PoW, PoS, DPoS, and BFT consensus mechanisms differ—and how those differences cascade into bridge design choices and messaging protocol selection—is one of the most important topics in Web3 infrastructure today.