Skip to main content

150 posts tagged with "Web3"

Decentralized web technologies and applications

View all tags

POAP Goes Dark: What the Sunset of Web3's Favorite Identity Primitive Reveals About On-Chain Reputation

· 10 min read
Dora Noda
Software Engineer

On March 16, 2026, Web3 lost one of its most recognizable primitives. POAP — the Proof of Attendance Protocol that turned conference wristbands, DAO votes, and community moments into 7.2 million on-chain badges — quietly slipped into maintenance mode. No dramatic shutdown, no token collapse, no lawsuit. Just a blog post, a co-founder's short tweet, and the end of new issuer signups.

Self-Sovereign Identity Hits $7B: Why eIDAS 2.0 Is Web3's Stealth Adoption Event

· 11 min read
Dora Noda
Software Engineer

On November 21, 2026, every government in the European Union will be legally required to offer each of its citizens a digital identity wallet. That single deadline turns 450 million Europeans into forced users of a credential infrastructure that Web3 has been quietly building for a decade — and almost nobody on Crypto Twitter is talking about it.

This is the sleeper adoption event of the cycle. While attention cycles through AI agents, ETF flows, and L2 throughput wars, self-sovereign identity (SSI) has grown from a niche "W3C standards" conversation into a category the market now values between $6.87 billion and $7.4 billion in 2026, up from roughly $3.78 billion in 2025 — an 82% compound annual growth rate that most sectors would kill for. The forecasts running out to 2030 are even more aggressive: Research and Markets projects the SSI market reaching $74.88 billion within four years, while the broader decentralized identity market is expected to cross $44.98 billion by 2032 at an 84.5% CAGR.

Those numbers are not the story, though. The story is why they are materializing now, and who is about to capture them.

The Regulatory Firehose: eIDAS 2.0 Turns Identity Into Infrastructure

The European Digital Identity Regulation — known as eIDAS 2.0 — entered into force in May 2024 and set a hard deadline: by late December 2026, every one of the EU's 27 member states must make at least one certified digital identity wallet (an EUDI Wallet) available to its citizens and residents, free of charge. The first wallet must be production-ready by December 6, 2026. Starting in 2027, both public and private services operating in the EU will be legally required to accept these wallets for authentication.

This is not a pilot. This is not a voluntary standard. This is the largest forced-adoption event in digital identity history.

The scale: over 450 million EU citizens and residents. The target: 80% of Europeans using a digital ID solution by 2030, per the EU's Digital Decade policy. The trajectory: ABI Research forecasts 83 million wallets in circulation by the end of 2025, more than doubling to 169 million in 2026. (ABI also believes the 80% target will slip to 2032, not 2030 — but even the "slow" scenario is staggering.)

Three things make this different from every previous identity push:

  1. The wallet is the product, not the backend. For the first time, the credential holder — not the issuer, not the relying party — owns the user experience. Citizens will download a wallet, store a driver's license, a university diploma, a bank KYC attestation, and an age-verification credential inside it, and present them selectively to any service that asks.
  2. Member states set the floor; the market builds the ceiling. The minimum is a state-issued wallet. The ceiling is whatever private-sector wallet can meet the certification bar and compete on UX. That opens the door to blockchain-native issuers, crypto wallets, and Web3 identity protocols to plug directly into the same rails.
  3. Cross-border by default. A German citizen will be able to onboard a Spanish bank, rent a car in Portugal, and sign a contract in Ireland using the same wallet — a level of composability that existing national ID schemes have never delivered.

If you squint, that architecture looks a lot like a hardware wallet, a chain-agnostic credential format, and an attestation registry. Web3 has been shipping exactly those primitives since 2017.

The Web3 Stack Ready to Plug In

While regulators drafted eIDAS 2.0, the crypto-native identity ecosystem quietly matured into a coherent stack. The major components now have production traction:

Verifiable Credential issuers. Microsoft's Entra Verified ID — a REST API for W3C Verifiable Credentials signed using did:web — has gone mainstream inside enterprise Azure deployments and is expanding into healthcare provider credentialing and supply-chain authentication through 2026-2027. IBM and Google are building parallel enterprise stacks. The verifiable-credentials platform market, sized at $1.8 billion in 2025, is forecast to reach $12.6 billion by 2034 at a 24% CAGR.

Zero-knowledge credential wallets. Billions Network (formerly Privado ID, formerly Polygon ID) raised $30 million after spinning out of Polygon Labs in June 2024 and has verified 2 million users in five months — with community counts of 550,000 on X and 650,000 on Discord. Its pitch is simple: prove a claim (over 18, EU resident, accredited investor) without leaking the underlying data, using zk-SNARKs to compress the credential check into a few kilobytes.

Proof-of-humanity networks. World (formerly Worldcoin) in April 2026 launched what it calls "full-stack proof of human" — integrations with Tinder (dating verification), Zoom (its "Deep Face" anti-deepfake feature), and Docusign (human-signed agreements). Meanwhile, Holonym Foundation acquired Gitcoin Passport in early 2025 and rebranded it as Human Passport, consolidating the largest non-biometric proof-of-humanity graph.

On-chain reputation and access. Galxe Passport, ENS, Unstoppable Domains, Civic, and Dock round out a mature layer for selective disclosure, credential revocation, and gated access — exactly the primitives eIDAS 2.0's wallet needs.

None of these started life as "eIDAS tools." They started life solving airdrops, sybil resistance, and DAO voting. But the architecture they developed — DIDs, VCs, selective disclosure, ZK attestations — is, almost by accident, the cleanest implementation of what European regulators now mandate.

The AI Forcing Function: Deepfakes Break the Old Identity Layer

The second catalyst driving this $7 billion market is not regulatory. It is the collapse of photo-and-password identity under the weight of generative AI.

Deloitte's research estimates deepfake-enabled financial fraud in the US alone will reach $40 billion by 2027. The canonical case study is already infamous: a Hong Kong finance worker in 2024 was convinced by a deepfake video call featuring his CFO and several colleagues to wire $25 million. The colleagues were all synthetic. The CFO was synthetic. The transfer was not.

This changes identity from a "nice privacy feature" into a "mandatory integrity primitive." And it creates demand that did not exist 24 months ago:

  • Video conferencing needs proof-of-human. Zoom shipping Deep Face with World ID is the first production-scale answer.
  • Digital signatures need proof-of-signer. Docusign integrating World ID addresses the "was this actually signed by a human" question that was previously assumed.
  • Content platforms need proof-of-origin. Every deepfake pushes YouTube, TikTok, and X closer to requiring cryptographic provenance on uploads.
  • AI agents need proof-of-authorization. As autonomous agents transact on behalf of humans, the protocol needs to know which human authorized which agent to do what — a question ERC-8004, which went live on Ethereum mainnet on January 29, 2026, attempts to answer with its Identity, Reputation, and Validation registries. Over 45,000 agents were registered within weeks of launch, with projections pointing to 130,000 ERC-8004-compliant agents across multiple chains by end of 2026.

Identity is no longer an adjacent problem to AI. It is the control plane.

The Architectures Compete for the Wallet Slot

Three architectural approaches are racing for the default position in each citizen's pocket:

Biometric-anchored (World, iris scanning). Strongest uniqueness guarantee, weakest privacy story. Regulators in Kenya, Spain, and the Philippines have suspended or banned Orb operations, and biometric data is unalterable — a permanent security risk if compromised.

Credential-graph-anchored (Human Passport, Galxe, Billions). Weaker uniqueness guarantee per credential, stronger privacy story. A user assembles many credentials — Gitcoin contribution history, ENS name, KYC attestation, proof-of-stake — and the aggregate is hard to fake even if any single one is weak.

Government-anchored (EUDI Wallet). Maximum legal standing, minimum interoperability with non-EU systems and on-chain apps. The wallet will accept third-party credentials, but the trust anchor is the member state.

The interesting question for 2026-2028 is not which of these wins. It is which combinations ship. A likely endgame: the EUDI Wallet holds your state-issued baseline (driver's license, passport, diploma), your bank issues a VC-formatted KYC attestation you load into the same wallet, Web3 apps accept that attestation plus a zero-knowledge proof-of-humanity attestation from Human Passport, and an AI agent operating on your behalf presents a derived credential that proves "authorized by a human who passed eIDAS 2.0 onboarding" without revealing which human.

The Scale Precedent: Why India Is the Closest Analogy

The skeptics' argument is that government-mandated digital ID always produces centralized, surveillance-prone systems. India's Aadhaar — with 1.4 billion enrollees — is the scale precedent. It is also the cautionary tale: centralized biometric databases, leaks affecting hundreds of millions, and political controversy over coercive enrollment.

eIDAS 2.0's bet is that the architecture can deliver Aadhaar-scale adoption with SSI-style decentralization: the citizen holds the credential, the state signs but does not store the presentation, and zero-knowledge proofs minimize what any relying party learns. Whether Brussels executes on that bet or quietly collapses into a centralized fallback is the single most important governance question in the sector.

The Web3 stack has a vested interest in the decentralized path winning. If it does, every DID, VC, and zk-credential primitive the industry has built becomes part of the default European identity rail.

What This Means for Builders Right Now

For infrastructure operators, three concrete moves become rational in 2026:

  1. Support VC-format credentials in your wallets, SDKs, and APIs. The W3C Verifiable Credentials Data Model is no longer academic — it is what member states will issue.
  2. Build ZK attestation flows into onboarding. KYC/AML without leaking PII is a 2026 baseline expectation, not a 2028 roadmap item.
  3. Map your product to AI-agent identity primitives. ERC-8004 plus selective disclosure is where agent authorization is heading; services that can authenticate an agent and verify the human behind it will capture the trust premium.

The $6.87 billion SSI market is the leading indicator. The underlying tide — European regulation, AI-forced identity hardening, and enterprise-grade tooling from Microsoft, IBM, and Google — is what will carry the numbers from $7 billion this year to $74 billion by 2030.

Crypto spent a decade arguing that users should own their keys, their money, and their data. eIDAS 2.0 just made that argument the law for 450 million people.

BlockEden.xyz provides enterprise-grade RPC and indexing infrastructure across the chains where identity, credential, and agent-authorization protocols are being built — from Ethereum (ERC-8004) to Aptos, Sui, and beyond. Explore our services to build identity-aware applications on rails designed for the agentic and credential-verified Web3.

Sources

Hacken Q1 2026: $482M Stolen and the Quarter That Broke Crypto's Audit-First Religion

· 12 min read
Dora Noda
Software Engineer

One person lost $282 million in a single phone call. No smart contract was exploited. No line of Solidity was touched. A fake IT support representative talked a crypto holder through a hardware wallet "recovery" flow on January 10, 2026, and walked away with more Bitcoin and Litecoin than most DeFi protocols hold in total value locked. That single incident — bigger than Drift, bigger than Kelp DAO on its own — accounts for more than half of every dollar Web3 lost in the first quarter of 2026.

Hacken's Q1 2026 Blockchain Security & Compliance Report puts the full quarter at $482.6 million in stolen funds across 44 incidents. Phishing and social engineering alone dragged away $306 million — 63.4% of the quarterly damage. Smart contract exploits contributed just $86.2 million. Access control failures — compromised keys, cloud credentials, multisig takeovers — added another $71.9 million. The math is blunt: for every dollar stolen from buggy code last quarter, attackers extracted roughly three and a half through the people, processes, and credentials that sit around the code.

For an industry that has spent five years treating "audited" as a synonym for "safe," the Q1 numbers are an intervention. The attack surface has moved. The spending hasn't.

InfoFi Is the New DeFi: How Information Finance Became Web3's $10B Sector in 2026

· 12 min read
Dora Noda
Software Engineer

In March 2026, prediction markets traded $25.7 billion in a single month. That is more notional volume than most mid-cap equity indices. It is not a bubble, and it is not a meme. It is the clearest signal yet that a new asset class — information itself — has finally found a price.

Welcome to InfoFi.

For years, crypto tried to financialize everything: loans, art, cat pictures, liquidity positions, even carbon. But the one thing markets have always struggled to price — the quality of a prediction, the trust of a person, the value of a dataset — stayed stubbornly analog. That changed in 2026. Three previously separate experiments (prediction markets, on-chain reputation, and AI data marketplaces) converged into a single sector with a single thesis: put skin in the game behind information, and the information gets better.

Wall Street has a name for this thesis. It calls it Information Finance. And on current trajectory, InfoFi will cross $10 billion in sector value before the end of this year.

Chrome 146 Shipped WebMCP. Web3 Just Got Its Biggest Distribution Unlock Ever.

· 10 min read
Dora Noda
Software Engineer

On March 10, 2026, Google quietly shipped Chrome 146 to stable. Buried in the release notes — behind yet another round of password-manager tweaks and a tab-groups redesign — was a browser API that will reshape Web3 distribution more than any wallet launch of the last five years.

It's called WebMCP. It lives at navigator.modelContext. And it just gave 3.83 billion Chrome users a native path to transact on-chain without ever installing a wallet.

The quiet feature that breaks the wallet-install bottleneck

For a decade, Web3's growth math looked like this: acquire user → convince user to install MetaMask → convince user to fund wallet → convince user to sign a transaction. Every one of those steps bled 40–70% of the funnel. The entire "crypto UX" discourse has been a running post-mortem on the MetaMask dependency.

WebMCP — the Web Model Context Protocol — removes the first three steps by moving the transaction surface into the browser itself.

Developed jointly by Google and Microsoft engineers and incubated through the W3C's Web Machine Learning community group, WebMCP adapts Anthropic's Model Context Protocol (MCP) for the browser. Any website can now register structured "tools" that AI agents running inside Chrome can discover and call directly, bypassing DOM scraping, button-clicking heuristics, and screen-reader simulation. Google engineer Khushal Sagar described the ambition in one sentence: WebMCP aims to be "the USB-C of AI agent interactions with the web."

That framing undersells what it means for crypto. USB-C standardized hardware connectors. WebMCP standardizes the interface between 3.83 billion browser users, their AI agents, and every on-chain service those agents might need to pay, swap, or settle against.

What Chrome 146 actually shipped

The API surface is deliberately minimal. A site calls navigator.modelContext.registerTool() to expose a named action — say, swapTokens or signPermit — with a JSON schema for its inputs and an execute() handler for its logic. Agents in the browser enumerate those tools the same way they enumerate any MCP server: by asking for a capability list, reading the schema, and invoking with typed parameters.

There are two ways to register:

  • Declarative API: HTML form attributes define standard actions. Zero JavaScript.
  • Imperative API: registerTool(), unregisterTool(), provideContext(), and clearContext() let dynamic apps update their tool surface as state changes.

Both paths present the agent with the same thing — a named tool with a typed contract. No more "find the button that says Confirm," no more brittle Playwright scripts, no more LLM-guessed XPaths. The website tells the agent, in a structured way, what it can do.

Chrome 146 Canary carried the feature behind a chrome://flags toggle in February 2026. Stable promotion landed March 10. Microsoft Edge 147 followed within days. That is effectively the entire desktop browser market — Chrome plus Chromium derivatives clear 75% of global browser share, and Statcounter puts Chrome alone at 67.72% in 2026.

Why Web3 protocols are racing to publish WebMCP endpoints

The implications for agentic crypto commerce are immediate, and the protocols paying attention have already started moving.

Consider the stack as it exists today:

  • MCP — how agents discover and call tools.
  • x402 — HTTP 402 revived, pioneered by Coinbase, enabling instant stablecoin payments over plain HTTP. Over 50 million transactions processed by early 2026, with Solana handling roughly 65% of x402 volume across Base, Solana, and BNB Chain.
  • AP2 (Agent Payments Protocol) — Google's coordination layer, built with Coinbase, the Ethereum Foundation, and MetaMask, with an explicit "A2A x402 extension" for crypto settlement.
  • ERC-8004 — Ethereum's emerging agent-execution primitive.

Before Chrome 146, this stack lived in server-side agent frameworks. An autonomous agent calling a paid API had to run inside someone's managed runtime — OpenAI's Custom Actions, Anthropic's MCP-hosted tools, a Zapier-style broker. The user surface was a chat window, and the distribution bottleneck was whichever AI app the user happened to open that day.

WebMCP collapses that. The browser becomes the runtime. The agent lives one tab over from the website it's transacting with. And crucially, the payment flow doesn't need a pre-installed wallet — the MetaMask+AP2+x402 consortium has already designed the path where a Chrome-native agent negotiates a stablecoin payment, routes it through a user-consented signer, and receives a structured confirmation back as a tool response.

The Linux Foundation's April 2026 announcement that it will house the newly-formed x402 Foundation isn't a coincidence. x402 needs a neutral standards home precisely because Chrome, Edge, and every AI agent vendor are about to treat it as the default payment primitive for WebMCP-exposed tools.

The numbers that make this a category-defining moment

A few data points to anchor scale:

  • 3.83 billion Chrome users worldwide in 2026, per consolidated Statcounter and DemandSage figures.
  • 67.72% global browser market share, up slightly year-over-year — this is not a declining distribution channel.
  • $8 billion in agentic commerce transaction value already flowing in 2026, projected to reach $3.5 trillion by 2031 (Juniper Research).
  • 50+ million x402 transactions processed by Q1 2026, with weekly volume crossing 500,000 by late 2025.
  • 40% of enterprise applications expected to embed task-specific AI agents by end-2026 (Gartner).
  • IDC pegs agentic AI at 10–15% of total IT spending in 2026.

Now multiply: if even 1% of Chrome's 3.83 billion users activate a WebMCP-capable agent (and Google is aggressively pushing Gemini integration in exactly this direction), that is 38 million agent-wielding users with one-click access to any WebMCP-enabled crypto service. No wallet install. No seed phrase ceremony. No "what's gas?" drop-off.

That's a distribution unlock crypto has never had.

The architectural race: who gets to be the wallet?

WebMCP doesn't pick a wallet. That's both its genius and the thing about to trigger a months-long knife fight between incumbents.

Three camps are already staking positions:

  1. Custodial exchange wallets (Coinbase Agentic Wallet, Binance Web3 Wallet). Fastest UX, compliance-friendly, but reintroduces a centralized signer. Coinbase's head start with x402 and Browserbase integration makes it the obvious default for retail agent flows.
  2. Self-custody incumbents (MetaMask, Rabby). MetaMask explicitly positioned itself in the AP2 launch: "Blockchains are the natural payment layer for agents." Their pitch is composability plus true self-custody — the agent negotiates, but the user signs.
  3. Programmatic wallet infrastructure (Privy, Turnkey, MoonPay Open Wallet Standard, Polygon Agent CLI). These target the developer layer: a WebMCP tool that internally creates a scoped, spending-limited wallet for the agent itself, with no human key management at all.

None of these require the user to have anything pre-installed. The agent calls the WebMCP tool, the tool orchestrates the wallet path, and the user gets a single consent prompt. The friction that defined Web3 onboarding for a decade compresses into one modal.

The historical parallel: Service Workers and the PWA unlock

If you want a template for how this plays out, look at Chrome 49 in March 2016, when Service Workers shipped to stable and quietly created the Progressive Web App ecosystem. Nobody noticed on day one. Within two years, every major retail site had a PWA strategy, Twitter Lite was shipping 70% faster load times in emerging markets, and the mobile web stopped losing ground to native apps for the first time since 2010.

WebMCP has the same shape: boring release-notes entry, fundamental platform capability, multi-year compounding adoption. The companies that ship WebMCP endpoints in Q2 2026 will own the agent-routed traffic when Google flips on Gemini-in-Chrome default agent mode — which every signal suggests is the Chrome 150 or 151 release.

For Web3 protocols, that means the window to be a first-class WebMCP citizen is measured in months, not years. A DEX that exposes swapTokens as a structured tool gets routed by every agent that needs to rebalance a portfolio. A stablecoin issuer that exposes mint and redeem captures every AP2 payment flow that needs on-ramp. A node/API provider that exposes RPC methods as MCP tools becomes the default compute layer for the entire agent economy.

What builders should do on Monday

Three concrete moves, in order of leverage:

  1. Audit your existing API surface for WebMCP-able actions. Anything already behind a REST or GraphQL endpoint is a candidate. Pick the five highest-intent actions (swap, bridge, mint, stake, query-balance) and wrap them with navigator.modelContext.registerTool() behind a feature flag.
  2. Decide your payment posture. Will you accept x402 directly? Require AP2 handshake? Gate tools behind user session cookies? The answer determines whether agents can transact autonomously or require human-in-the-loop. For most protocols, x402 + per-tool spending caps is the right default.
  3. Publish a /.well-known/mcp.json manifest. Chrome 146 doesn't require it yet, but the spec is heading toward automatic tool discovery via well-known URIs. Protocols that publish manifests early will be indexed by agent registries (including the ones Anthropic and Google are building) before their competitors exist in those indexes at all.

The distribution story for Web3 has always been "wait for users to come to us." Chrome 146 inverts it: now agents come to you, at browser scale, with payment rails pre-negotiated. The protocols that show up as structured tools will be the ones the machine economy uses. The ones that don't will be invisible.

BlockEden.xyz powers the RPC and indexing infrastructure that makes WebMCP-exposed Web3 tools fast and reliable across 20+ chains. If you're building agent-ready endpoints, explore our API marketplace — we've already optimized for the high-frequency, low-latency call patterns autonomous agents generate.

Sources

Lens Protocol V3 on ZKsync: The SocialFi Layer 2 Bet

· 11 min read
Dora Noda
Software Engineer

What if your social graph, the invisible map of every person you follow, every post you've liked, every creator you've tipped, wasn't locked inside a corporate database? What if migrating 650,000 profiles, 28 million social connections, and 12 million posts to a brand-new blockchain could happen in a single weekend, without any of those users lifting a finger?

That is exactly what Lens pulled off when it shipped Lens Chain and Lens V3. And in doing so, the project placed one of the biggest bets in Web3 to date: that SocialFi, decentralized social media with built-in monetization, needs its own purpose-built Layer 2, not a general-purpose chain shared with DeFi bots and NFT flippers. The stack of choice? ZKsync's ZK Stack for execution, Avail for data availability, and Aave's GHO stablecoin as the gas token.

It's an opinionated bet. It might also be the right one.

SEC Chair Atkins' DeFi Innovation Exemption: The Informal Safe Harbor Behind $95B of Permissionless Finance

· 11 min read
Dora Noda
Software Engineer

For three years, American DeFi developers woke up every morning asking the same question: Am I a broker-dealer today? As of April 2026, the SEC has effectively answered — not with a rule, not with a statute, but with speeches, staff statements, and closed investigations. Welcome to the age of informal safe harbor, where $95 billion in permissionless protocol TVL operates under the regulatory equivalent of a wink.

SEC Chair Paul Atkins has been explicit about the destination. His "Project Crypto" initiative, launched July 31, 2025, aims to move America's financial markets on-chain. His proposed "Innovation Exemption" is due to take effect this year. And his Division of Trading and Markets has already told front-end developers they can keep building self-custodial interfaces without registering as broker-dealers — at least for the next five years. The pending CLARITY Act would bake all of this into statute, but with a Senate deadline of April 25, 2026 before the bill risks shelving until 2030, the industry is discovering an uncomfortable truth: the most powerful regulatory regime in crypto right now has no force of law behind it.

Ketman Project: How 100 North Korean Operatives Slipped Inside Web3

· 9 min read
Dora Noda
Software Engineer

One hundred North Korean operatives. Fifty-three crypto projects. Six months of patient intelligence work — and the uncomfortable conclusion that the most dangerous DPRK attack on Web3 is not the next exploit, but the engineer who already merged code to your main branch last quarter.

That is the headline finding from the Ketman Project, an Ethereum Foundation-backed initiative running under the ETH Rangers security program. Its April 2026 disclosure does not describe a hack. It describes a workforce — a long-horizon labor pipeline that has been quietly funneling DPRK revenue out of crypto payrolls while planting the kind of insider access that makes events like the $1.5 billion Bybit heist possible in the first place.

For an industry conditioned to think of DPRK risk as something that happens at the multisig, this is a category shift. The threat is no longer just "they will break in." It is "they are already inside, and they wrote the build script."

Google A2A vs Anthropic MCP: The Agent Protocol Stack Web3 Builders Cannot Ignore

· 11 min read
Dora Noda
Software Engineer

Two protocols now sit between every AI agent and the blockchain it wants to touch. One came from Anthropic. One came from Google. And by April 2026, neither is optional for Web3 builders who want their infrastructure to be reachable by the 250,000+ daily active on-chain agents that came online in Q1.

The Model Context Protocol (MCP) tells an agent how to use a tool. The Agent2Agent Protocol (A2A) tells an agent how to talk to another agent. They are not rivals so much as layers — but the choice of which to support first, which to optimize for, and how to expose crypto-native primitives through both, is now a foundational architecture decision for anyone building for the agentic web.

A Year That Reshuffled the Agent Stack

MCP was born at Anthropic in late 2024 as a narrow standard: let Claude, and later any model, plug into external tools and data through a single client-server interface instead of bespoke integrations. By the time Coinbase shipped its Payments MCP in February 2026, MCP had become the way frontier models — Claude, Gemini, Codex — reach wallets, APIs, and data feeds. deBridge exposed cross-chain swap routing through an MCP server. Solana's MCP server gave any MCP-aware model the ability to check balances, swap tokens, and mint NFTs in plain English.

A2A took a different path. Google announced it in April 2025 with more than 50 launch partners — Atlassian, Box, Cohere, Intuit, LangChain, MongoDB, PayPal, Salesforce, SAP, ServiceNow, and the big consulting firms. It was donated to the Linux Foundation in June 2025. Where MCP standardized the agent-to-tool link, A2A standardized the agent-to-agent link: how an agent discovers another agent, reads its "agent card," negotiates a task, and coordinates work across organizational boundaries.

Then December 2025 happened. The Linux Foundation launched the Agentic AI Foundation (AAIF) with six co-founders — OpenAI, Anthropic, Google, Microsoft, AWS, and Block — and placed both MCP and A2A under the same governance umbrella. The "protocol war" framing collapsed almost as fast as it started. They are complementary, and the industry now treats them that way.

For Web3, the complementarity matters more than the competition ever did. Tools live on-chain; agents live everywhere. You need both.

What MCP Actually Does for a Crypto Stack

MCP is a client-server tool-calling protocol. A model running inside an application — the MCP client — connects to an MCP server that publishes a set of tools, resources, and prompt templates. The server can be anything: a local file system, a SaaS API, or a blockchain RPC wrapped with semantic descriptions.

That last category is where Web3 plugs in. Coinbase's Payments MCP exposes wallet creation, on-ramp flows, and stablecoin transfers as tools any MCP client can call. deBridge's MCP server exposes cross-chain quoting and non-custodial swap execution. A Solana MCP server exposes balance checks, transfers, swaps, and mints. For the model, these feel identical to calling a calculator tool — the crypto-native complexity is hidden behind JSON schemas.

The practical effect is that any model with MCP support — Claude, Gemini, Codex, and most open-weight agent frameworks — can now interact with on-chain infrastructure without custom SDK work. As of early 2026, the x402 payment protocol (more on that below) has processed more than $600 million in volume and supports nearly 500,000 active AI wallets, most of them operating through MCP-exposed tools.

What A2A Adds That MCP Cannot

A2A answers a different question: once my agent needs to hire another agent — one that can do legal review, fraud scoring, translation, or specialized on-chain analytics — how does it find that agent, verify it, and work with it?

The A2A answer is agent cards: small JSON documents hosted over HTTPS that describe an agent's capabilities, endpoints, authentication requirements, and skills. An agent discovers another agent, reads the card, and initiates a task through a standard set of HTTP + JSON-RPC methods. The protocol is deliberately thin: it does not care what framework the other agent runs on, only that it speaks A2A.

For Web3, this is where cross-organizational workflows live. A trading agent on one platform hiring a risk-assessment agent on another. A DAO treasury agent delegating a compliance check to a third-party service. A game agent commissioning an on-chain asset from a generative-art agent. None of that is a tool call — it is a negotiation between peers, and MCP was never designed for it.

The Web3-Native Layer: x402 and ERC-8004 Fit Underneath

Neither MCP nor A2A handles payment or identity. That gap is where crypto-native standards now slot in.

x402 is Coinbase's revival of the long-dormant HTTP 402 "Payment Required" status code. When an agent hits a paywalled endpoint, the server returns 402 with payment instructions; the agent pays in stablecoin — typically USDC — and retries. It is account-free, subscription-free, and sized for sub-cent micropayments. By April 2026 the x402 Foundation includes Adyen, AWS, American Express, Base, Circle, Cloudflare, Coinbase, Google, Mastercard, Microsoft, Shopify, Solana Foundation, Stripe, and Visa. Google has folded x402 into its own Agents Payment Protocol (AP2) initiative, which effectively blesses it as the payment rail underneath A2A-coordinated transactions.

ERC-8004, which went live on Ethereum mainnet on January 29, 2026, is the identity and reputation counterpart. Co-authored by contributors from MetaMask, the Ethereum Foundation, Google, and Coinbase, it introduces three on-chain registries — Identity, Reputation, and Validation — that let agents prove who they are and accumulate verifiable track records across organizational boundaries. By April 2026 more than 20,000 agents are registered and 70+ projects build against it. The standard deliberately mirrors A2A's agent card concept: the on-chain AgentID resolves to an off-chain AgentCard, so A2A-compliant agents can inherit ERC-8004 identity without a new protocol.

ERC-8183, from the Ethereum Foundation and Virtuals Protocol, closes the loop with a hire-deliver-settle escrow pattern. It defines Client, Provider, and Evaluator roles for on-chain agent job markets. The neat summary making the rounds this quarter: x402 answers how to pay, ERC-8004 answers who the other party is and whether they are trustworthy, and ERC-8183 answers how to transact with confidence. All three ride on top of A2A coordination and MCP tool use.

What Chains Are Betting On

Different L1s and L2s are making different bets about which protocol surface matters most — and those bets shape what their developer stacks prioritize.

Ethereum has gone deepest on identity and job semantics via ERC-8004 and ERC-8183, aligning cleanly with A2A's cross-organizational model. The Ethereum Foundation's dAI team named ERC-8004 a core 2026 roadmap component.

Solana has doubled down on MCP tool exposure and x402 payments. More than 9,000 Solana network agents are deployed, and the Solana MCP server is the canonical entry point for any MCP-aware model that wants to touch the chain. The ecosystem bet is that fast, cheap execution plus native MCP plumbing wins the tool-call layer.

BNB Chain took a third path with BAP-578, the Non-Fungible Agent (NFA) standard that went live on mainnet in February 2026. BAP-578 makes the agent itself the primary on-chain asset — each NFA owns a wallet, can hold tokens, execute logic, and be bought or hired. The standard supports RAG, MCP integration, fine-tuning, and reinforcement-learning approaches through pluggable logic contracts. By mid-February the BNB Chain agent ecosystem had expanded to 58 projects across 10 categories.

Base anchors the x402 rail through Coinbase and has become the default settlement layer for agent-to-agent micropayments; Stripe's integration with Base, announced this quarter, extends that rail into mainstream merchant infrastructure.

The pattern: no chain is choosing MCP or A2A — they are all choosing both, plus a crypto-native differentiator (identity on Ethereum, execution on Solana, asset representation on BNB, payments on Base).

The Real Question for Builders: Which Surface Do You Expose First?

Standards convergence does not eliminate sequencing decisions. A protocol, wallet, bridge, or data provider still has to choose what to ship first, and that choice has consequences.

  • Ship an MCP server first if your product is a tool — a wallet, a bridge, a data feed, a swap router. MCP is where individual-agent-to-tool flow lives, and most autonomous agents in 2026 are still single-agent setups calling tools.
  • Ship an A2A agent card next if your product is itself an agent or a service that other agents will hire. Risk scoring, compliance checks, on-chain analytics, market-making — these are agent-to-agent flows.
  • Wire x402 into both if your service can be metered. Every MCP tool call and every A2A task invocation is a potential micropayment, and x402 is the path of least resistance.
  • Register on ERC-8004 if your agent operates across organizational boundaries and reputation matters. Identity without reputation is a name tag; identity with on-chain reputation is a track record.
  • Consider ERC-8183 if your service sells discrete, evaluable deliverables — the escrow pattern maps cleanly to agent-as-contractor business models.

The comparison with ERC-4337's slow adoption versus ERC-20's instant one is instructive. ERC-20 won because every token needed the same thing. ERC-4337 has crawled because account abstraction is worth it only when the payoff is obvious. MCP looks more like ERC-20 — nearly every agent needs tools — while A2A looks more like ERC-4337, with adoption concentrated where multi-agent workflows genuinely exist. That may flip as agent populations grow and specialization takes hold, but through 2026 the MCP-first sequencing looks right for most Web3 builders.

Why This Matters for Infrastructure Providers

For an RPC-and-indexer provider serving the agentic web, the implication is straightforward: every blockchain you support needs to be reachable through both protocols, with x402 metering baked in where it makes sense.

BlockEden.xyz runs production RPC and indexing infrastructure across 27+ blockchains — including Sui, Aptos, Solana, Ethereum, BNB Chain, and Base — that autonomous agents increasingly hit through MCP servers and A2A workflows. Explore our API marketplace if you are building agent-integrated infrastructure that has to speak both protocols from day one.

Sources