Skip to main content

114 posts tagged with "Web3"

Decentralized web technologies and applications

View all tags

InfoFi: Why Information Finance Could Capture More Value Than DeFi

· 8 min read
Dora Noda
Software Engineer

On January 9, 2026, bots generated 7.75 million crypto-related posts on X in a single day — a 1,224% spike from the baseline. Six days later, X revoked API access for every app paying users to post. The InfoFi sector lost $40 million in market cap within hours. But here is the paradox: the crash did not kill Information Finance. It may have saved it.

OpenClaw: Revolutionizing AI Agent Frameworks with Blockchain Integration

· 11 min read
Dora Noda
Software Engineer

In just 60 days, an open-source project transformed from a weekend experiment into GitHub's most-starred repository, surpassing React's decade-long dominance. OpenClaw, an AI agent framework that runs locally and integrates seamlessly with blockchain infrastructure, has achieved 250,000 GitHub stars while reshaping expectations for what autonomous AI assistants can accomplish in the Web3 era.

But behind the viral growth lies a more compelling story: OpenClaw represents a fundamental shift in how developers are building the infrastructure layer for autonomous agents in decentralized ecosystems. What started as one developer's weekend hack has evolved into a community-driven platform where blockchain integration, local-first architecture, and AI autonomy converge to solve problems that traditional centralized AI assistants cannot address.

From Weekend Project to Infrastructure Standard

Peter Steinberger published the first version of Clawdbot in November 2025 as a weekend hack. Within three months, what began as a personal experiment became the fastest-growing repository in GitHub history, gaining 190,000 stars in its first 14 days.

The project was renamed to "Moltbot" on January 27, 2026, following trademark complaints by Anthropic, and again to "OpenClaw" three days later.

By late January the project was viral, and by mid-February, Steinberger had joined OpenAI and the Clawdbot codebase was transitioning to an independent foundation. This transition from individual developer project to community-governed infrastructure mirrors the evolution patterns seen in successful blockchain protocols—from centralized innovation to decentralized maintenance.

The numbers tell part of the story: OpenClaw achieved 100,000 GitHub stars within a week of its late January 2026 release, making it one of the fastest-growing open-source AI projects in history. After launching, over 36,000 agents gathered within just a few days.

But what makes this growth remarkable isn't just velocity—it's the architectural decisions that enabled a community to build an entirely new category of blockchain-integrated AI infrastructure.

The Architecture That Enables Blockchain Integration

While most AI assistants rely on cloud infrastructure and centralized control, OpenClaw's architecture was designed for a fundamentally different paradigm. At its core, OpenClaw follows a modular, plugin-first design where even model providers are external packages loaded dynamically, keeping the core lightweight at approximately 8MB after the 2026 refactor.

This modular approach consists of five key components:

The Gateway Layer: A long-living WebSocket server (default: localhost:18789) that accepts inputs from any channel, enabling the headless architecture that connects to WhatsApp, Telegram, Discord, and other platforms through existing interfaces.

Local-First Memory: Unlike traditional LLM tools that abstract memory into vector spaces, OpenClaw puts long-term memory back into the local file system. An agent's memory is not hidden in abstract representations but stored as clearly visible Markdown files: summaries, logs, and user profiles are all on disk in the form of structured text.

The Skills System: With the ClawHub registry hosting 5,700+ community-built skills, OpenClaw's extensibility enables blockchain-specific capabilities to emerge organically from the community rather than being dictated by a central development team.

Multi-Model Support: OpenClaw supports Claude, GPT-4o, DeepSeek, Gemini, and local models via Ollama, running entirely on your hardware with full data sovereignty—a critical feature for users managing private keys and sensitive blockchain transactions.

Virtual Device Interface (VDI): OpenClaw achieves hardware and OS independence through adapters for Windows, Linux, and macOS that normalize system calls, while communication protocols are standardized via a ProtocolAdapter interface, enabling deployment flexibility on bare metal, Docker, or even serverless environments like Cloudflare Moltworker.

This architecture creates something uniquely suited for blockchain integration. When on the Base platform, an "OpenClaw × Blockchain" ecosystem is forming, centered around infrastructure like Bankr/Clanker/XMTP and extending to SNS, job markets, launchpads, trading, games, and more.

Community-Driven Development at Scale

Version 2026.2.2 includes 169 commits from 25 contributors, demonstrating the active community participation that has become OpenClaw's defining characteristic.

This wasn't organic growth alone—strategic community cultivation accelerated adoption.

BNB Chain launched the Good Vibes Hackathon: The OpenClaw Edition, a two-week sprint with nearly 300 project submissions from over 600 hackers. The results reveal both the promise and current limitations of blockchain integration: several community projects—such as 4claw, lobchanai, and starkbotai—are experimenting with agents that can initiate and manage blockchain transactions autonomously.

According to user examples shared on social media, OpenClaw is being used for tasks such as monitoring wallet activity and automating airdrop-related workflows. The community has built some of the most comprehensive on-chain trading automation available in any open-source AI agent framework, making it a powerful option for crypto traders who want natural language control over their positions.

However, the gap between potential and reality remains significant. Despite the proliferation of tokens and agent-branded experiments, there is still relatively little deep, native crypto interaction, with most agents not actively managing complex DeFi positions or generating sustained on-chain cash flows.

The March 2026 Technical Maturity Inflection

The OpenClaw 2026.3.1 release marks a critical transition from experimental tool to production-grade infrastructure. The update added:

  • OpenAI WebSocket streaming for low-latency token delivery, enabling real-time inference UX that can cut perceived response time and improve agent handoffs
  • Claude 4.6 adaptive thinking for improved multi-step reasoning, presenting a route to higher-quality tool-use chains in enterprise agents
  • Native Kubernetes support for production deployment, signaling readiness for enterprise-scale blockchain infrastructure
  • Discord threads and Telegram DM topics integration for structured chat workflows

Perhaps more significantly, the February 2026.2.19 release represented a maturity inflection point with 40+ security hardenings, authentication infrastructure, and observability upgrades.

Previous releases focused on feature expansion; this release prioritized production readiness.

For blockchain applications, this evolution matters. Managing private keys, executing smart contract interactions, and handling financial transactions require not just capability but security guarantees.

While security firms like Cisco and BitSight warn that OpenClaw presents risks due to prompt injection and compromised skills, advising users to run it in isolated environments like Docker or virtual machines, the project is rapidly closing the gap between experimental tool and institutional-grade infrastructure.

What Makes OpenClaw Different in the AI Agent Market

The AI agent landscape in 2026 is crowded, but OpenClaw occupies a unique position when compared to alternatives like Claude Code, which is Anthropic's terminal-based coding agent that focuses exclusively on helping developers write, understand, and maintain software.

Claude Code operates in a sandboxed environment where permissions are explicit and granular, with dedicated security infrastructure and regular audits. It excels at complex code refactoring, using the reasoning ability of Opus 4.6 coupled with Context Compaction to minimize the likelihood of breaking code.

In contrast, OpenClaw is designed to be an always-on, 24/7 personal assistant that you communicate with via standard messaging apps.

While Claude Code wins at coding tasks, OpenClaw dominates in day-to-day automation because of its integration with numerous tools and platforms.

The two tools are complementary, not competing. Claude Code handles your codebase. OpenClaw handles your life. But for blockchain developers and Web3 users, OpenClaw offers something Claude Code cannot: the ability to integrate autonomous AI decision-making with on-chain actions, wallet management, and decentralized protocol interactions.

The Blockchain Integration Challenge

Despite rapid technical progress, OpenClaw's blockchain integration reveals a fundamental tension in the AI × crypto convergence. The technical standards are emerging: ERC-8004, x402, L2, and stablecoins are suitable for agent IDs, permissions, credentials, evaluations, and payments.

The Base platform ecosystem centered around OpenClaw demonstrates what's possible. Infrastructure components like Bankr handle financial rails, Clanker manages token operations, and XMTP enables decentralized messaging. The full stack is being assembled.

Yet the gap between infrastructure capability and application reality persists. Most OpenClaw blockchain experiments focus on monitoring, simple wallet operations, and airdrop automation. The vision of agents autonomously managing complex DeFi positions, executing sophisticated trading strategies, or coordinating multi-protocol interactions remains largely unrealized.

This isn't a failure of OpenClaw's architecture—it's a reflection of broader challenges in the AI × blockchain convergence:

Trust and Verification: How do you verify that an AI agent's on-chain actions align with user intent when the agent operates autonomously? Traditional permission systems don't map cleanly to the nuanced decision-making required for DeFi strategies.

Economic Incentives: Most current integrations are experimental. Agents don't yet generate sustained on-chain cash flows that would justify their existence beyond novelty value.

Security Trade-offs: The local-first, always-on architecture that makes OpenClaw powerful for general automation creates attack surfaces when managing private keys and executing financial transactions.

The community is aware of these limitations. Rather than premature claims of solving Web3's UX problems, the ecosystem is methodically building the infrastructure layer—wallets integrated with AI decision-making, protocols designed for agent interaction, and security frameworks that balance autonomy with user control.

The Web3 Infrastructure Implications

OpenClaw's emergence signals several important shifts in how Web3 infrastructure is being built:

From Centralized AI to Local-First Agents: The success of OpenClaw's architecture validates the demand for AI assistants that don't send your data to centralized servers—particularly important when those conversations involve private keys, transaction strategies, and financial information.

Community-Driven vs Corporate-Led: While companies like Anthropic and OpenAI control their AI assistant roadmaps, OpenClaw demonstrates an alternative model where 25 contributors can ship 169 commits and the community determines which features matter. This parallels the governance evolution in successful blockchain protocols.

Skills as Composable Primitives: The ClawHub registry with 5,700+ skills creates a marketplace of capabilities that can be mixed and matched. This composability mirrors the building blocks approach of DeFi protocols, where smaller components combine to create complex functionality.

Open Standards for AI × Blockchain: The emergence of ERC-8004 for agent identity, x402 for agent payments, and standardized wallet integrations suggests the industry is converging on shared infrastructure rather than fragmented proprietary solutions.

The fact that OpenClaw has no token, no cryptocurrency, and no blockchain component is perhaps its greatest strength in the blockchain space. Any token claiming to be associated with the project is a scam. This clarity prevents the financialization from corrupting the technical development, allowing the infrastructure to mature before economic incentives shape the ecosystem.

The Path Forward: Infrastructure Before Applications

March 2026 represents a critical moment for OpenClaw in the blockchain ecosystem. The technical foundations are solidifying: production-ready security, Kubernetes deployment, enterprise-grade observability. The community infrastructure is growing: 25 active contributors, 300 hackathon submissions, 5,700+ skills.

But the most important developments are the ones that haven't happened yet. The killer applications for AI agents in Web3 aren't simple wallet monitors or airdrop farmers. They're likely to emerge from use cases we haven't fully imagined—perhaps agents that coordinate cross-chain liquidity provision, autonomously manage treasuries for DAOs, or execute sophisticated MEV strategies across multiple protocols.

For these applications to emerge, the infrastructure layer must mature first. OpenClaw's community-driven development model, local-first architecture, and blockchain-native design make it a strong candidate to become foundational infrastructure for this next phase.

The question isn't whether AI agents will transform how we interact with blockchain protocols. The question is whether the infrastructure being built today—exemplified by OpenClaw's approach—will be robust enough to handle the complexity, secure enough to manage real financial value, and flexible enough to enable innovations we can't yet anticipate.

Based on the architectural decisions, community momentum, and technical trajectory visible in March 2026, OpenClaw is positioning itself as the infrastructure layer that enables that future. Whether it succeeds depends not just on code quality or GitHub stars, but on the community's ability to navigate the complex trade-offs between autonomy and security, decentralization and usability, innovation and stability.

For blockchain developers and Web3 infrastructure teams, OpenClaw offers a glimpse of what's possible when AI agent architecture is designed from first principles for decentralized systems rather than adapted from centralized paradigms. That makes it worth paying attention to—not because it's solved all the problems, but because it's asking the right questions about how autonomous agents should integrate with blockchain infrastructure in a post-cloud, local-first, community-governed world.

Phantom's Super App Revolution: How One Wallet is Rewriting Web3 Payments

· 14 min read
Dora Noda
Software Engineer

When Phantom launched in 2021 as a Solana-focused browser extension, few predicted it would challenge MetaMask's throne. Five years later, Phantom has evolved from a single-chain wallet into a 16-million-user super app that's fundamentally changing how people interact with cryptocurrency. With native support for six blockchains, one-tap Visa payments, and biometric security, Phantom isn't just competing with MetaMask—it's redefining what a crypto wallet should be.

The wallet wars of 2026 aren't about which chain you support. They're about who makes blockchain invisible.

From Solana Specialty to Multi-Chain Powerhouse

Phantom's origin story is one of surgical focus. While MetaMask dominated Ethereum with 30 million users by casting a wide net, Phantom zeroed in on Solana's explosive growth in 2021-2022. The bet paid off spectacularly.

By prioritizing "speed, low fees, and ease of use" on a single chain, Phantom built what users described as "super simple and distraction free" UX that made MetaMask feel cluttered by comparison. That clean interface became Phantom's calling card, attracting millions who wanted Web3 without the complexity.

But 2025 marked Phantom's transformation from specialist to generalist. The wallet systematically added support for Ethereum, Polygon, Base, Bitcoin (Native SegWit/Taproot), Sui, Monad, and HyperEVM. Each integration maintained Phantom's signature simplicity: users view all tokens and NFTs in one unified interface, connect to apps seamlessly, and never manually switch chains.

The multi-chain expansion wasn't just feature-matching MetaMask. It was strategic positioning for an interoperable future where users don't care about blockchain backends—they just want their assets accessible everywhere.

By January 2026, Phantom's documentation confirmed support for eight chains, deliberately excluding popular networks like BSC, Arbitrum, and Optimism. The selectivity signals Phantom's philosophy: better to do fewer things exceptionally well than many things adequately.

Recent data shows Phantom crossing 16 million monthly active users, putting it ahead of major fintech apps like Wise, SoFi, and Chime. While MetaMask maintains a commanding lead with 30 million users, Phantom's growth trajectory—and superior UX reputation—suggests the gap is closeable. The question isn't whether Phantom can scale. It's whether MetaMask can match Phantom's user experience before losing momentum to a faster, cleaner alternative.

The Visa Card Integration That Changes Everything

The most consequential development in Phantom's 2026 roadmap isn't another blockchain integration. It's the Oobit partnership that transforms Phantom from a crypto wallet into a payment instrument.

In January 2026, Tether-backed mobile wallet Oobit added native support for Phantom, giving 15 million users access to Visa payment rails without sacrificing self-custody. The implications are massive: Phantom users can now pay with crypto online and in-store at any Visa-accepting merchant, with transactions executed directly from their wallet, converted to local currency, and settled instantly to merchants through existing payment infrastructure.

Here's why this matters. Traditional crypto payment solutions require users to:

  1. Transfer crypto to a centralized exchange or custodial card provider
  2. Convert to fiat and pre-fund a card balance
  3. Hope the centralized provider doesn't freeze accounts or suffer security breaches

Oobit's "DePay" layer eliminates all three friction points. It acts as a bridge between on-chain crypto settlements and traditional Visa networks, automatically converting crypto to fiat at point-of-sale while funds remain fully under user control until the moment a payment is approved. No bridges. No custodial intermediaries. No pre-funding requirements.

The technical architecture leverages biometric authentication (Face ID or fingerprint) to authorize transactions in real-time, with the DePay layer handling the complexity of crypto-to-fiat conversion invisibly. From a merchant's perspective, it's a standard Visa transaction. From a user's perspective, it's spending SOL or USDC as easily as swiping a debit card.

Oobit's financial backing signals institutional conviction in this model. Solana co-founder Anatoly Yakovenko co-led Oobit's $25 million Series A alongside Tether, CMCC Global, and 468 Capital. Malaysia-based VCI Global followed with a $100 million investment in OOB tokens.

When one of the world's largest stablecoin issuers and a Layer-1 founder bet on crypto-native payment rails, the market takes notice.

The Phantom-Oobit integration demonstrates what "mainstream crypto adoption" actually looks like in practice. It's not convincing merchants to accept Bitcoin. It's making crypto payments flow through existing infrastructure so seamlessly that neither users nor merchants need to think about blockchain at all.

Cross-Chain Swaps and DEX Aggregation at Scale

Phantom's $20 billion annual swap volume reveals a crucial insight: users want liquidity access, not blockchain ideology. The wallet's cross-chain swapper—powered by LI.FI integration—enables frictionless asset movement between Solana, Ethereum, Base, and Polygon without forcing users to navigate complex bridge protocols or multiple wallet interfaces.

The DEX aggregation layer is where Phantom's UX obsession shines. Rather than locking users into a single decentralized exchange, Phantom aggregates liquidity from multiple DEXs and cross-chain providers to find optimal routes. Users choose between "Express Route" (prioritizing speed) or "Eco Route" (minimizing fees), and the wallet handles the complexity of splitting orders across venues to reduce price impact.

Many routes feature "gasless" swaps where transaction fees are paid from the token being sent, removing yet another mental burden for new users who don't want to juggle multiple gas tokens. Phantom routes swaps through trusted decentralized exchanges to find the best available price, solving the fragmented liquidity problem that has plagued multi-chain ecosystems since Ethereum's L2 proliferation.

The LI.FI integration is particularly strategic. deBridge, a cross-chain aggregator trusted by Phantom, has processed over $18 billion in transactions—a scale that provides competitive pricing and high success rates.

By partnering with proven infrastructure providers rather than building in-house, Phantom accelerates feature velocity while maintaining reliability.

Cross-chain swaps aren't just a convenience feature. They're the foundation for a future where users interact with applications across chains without mentally tracking which assets live where. Phantom's approach—abstracting away blockchain complexity while maintaining non-custodial security—is exactly the UX paradigm shift that Web3 needs to reach beyond early adopters.

Biometric Security Meets Web3 Autonomy

The tension between security and convenience has plagued crypto wallets since Bitcoin's inception. Phantom's biometric authentication resolves this tension elegantly: Face ID and fingerprint recognition provide fast approvals while ensuring private keys never leave the device.

The mobile app leverages biometric prompts to prevent unauthorized transaction signing, creating a security model that's both intuitive for mainstream users and cryptographically sound for security purists. Every transaction requires explicit user action gated by biometric verification, eliminating the "blind signing" vulnerability that has enabled countless phishing attacks.

Phantom's simulation feature adds another layer of protection. Before approving any transaction, users see in "plain English exactly what a transaction will do with your crypto," preventing approval of malicious smart contract interactions disguised as legitimate swaps. This combination of biometric gating and transaction transparency represents a significant UX advancement over the "sign this hexadecimal data and hope for the best" model that still dominates many wallet experiences.

The security architecture follows user-centric UX flows designed to minimize risk. Private keys never leave the device. Transaction signing requires explicit user action. Biometric authentication provides frictionless yet secure approvals. The result is a wallet that feels as secure as a hardware device but as convenient as a hot wallet.

Phantom's approach demonstrates that self-custody doesn't have to feel burdensome. By leveraging hardware security modules in modern smartphones (the same Secure Enclave technology protecting Apple Pay), Phantom delivers institutional-grade security wrapped in a consumer-friendly interface. That combination is essential for reaching the billions of people who will never memorize a 24-word seed phrase or use a hardware wallet for everyday transactions.

The MetaMask Comparison: UX vs. Ecosystem Depth

When comparing Phantom versus MetaMask in 2026, the choice increasingly comes down to philosophy. MetaMask offers the deepest Web3 integration, supporting more chains and dApps than any competitor. Phantom offers the most intuitive user experience, prioritizing simplicity over feature breadth.

MetaMask's 30 million monthly active users reflect its first-mover advantage and comprehensive EVM ecosystem coverage. The wallet's December 2025 addition of native Bitcoin support and January 2026 integration of Tron demonstrate continued expansion beyond Ethereum. In February 2026, MetaMask integrated Ondo Finance's Global Markets platform, enabling eligible non-US users to trade tokenized US stocks, ETFs, and commodities directly within the wallet.

MetaMask also launched Transaction Shield, a premium subscription offering transaction protection and priority support. The move toward premium services signals MetaMask's monetization strategy for its massive user base.

But MetaMask's breadth comes with complexity. New users consistently describe the wallet as "overwhelming" and note that it "assumes you're familiar with some complex crypto terms." The interface prioritizes power users who need granular control over every parameter. For beginners, that flexibility feels like friction.

Phantom's clean, single-page interface makes the opposite trade-off. Every option is accessible from one view. The wallet doesn't assume technical knowledge. Speed and low fees—Solana's original value propositions—remain central to the user experience even as Phantom expands to higher-fee chains.

User preference data validates Phantom's approach. Comments like "Phantom delivers a quicker and more instinctive user experience" and "design and interface prioritize simplicity and user-friendliness" dominate comparative reviews. The wallet's mobile-first design, complete with biometric authentication and streamlined onboarding via Phantom Connect, targets everyday users rather than DeFi power traders.

The strategic question for both wallets is whether the market consolidates around one or two dominant players (like browsers did with Chrome and Safari) or fragments into use-case-specific wallets. MetaMask's bet is on comprehensive coverage and premium features. Phantom's bet is that superior UX will drive switching costs as everyday users realize they don't need MetaMask's complexity for routine tasks.

Early 2026 data suggests Phantom's bet is paying off. While MetaMask maintains a 2:1 user advantage, Phantom's growth rate and higher user satisfaction scores indicate the gap is narrowing. In a market where "ease of use overtakes flexibility," as one analyst noted, Phantom's UX-first philosophy might prove more durable than MetaMask's ecosystem-depth approach.

Infrastructure That Scales: BlockEden.xyz and Multi-Chain RPC

Behind every wallet transaction is infrastructure—the RPC nodes that query blockchain state, broadcast transactions, and fetch account balances. As Phantom scales across eight chains and processes billions in swap volume, reliable multi-chain node access becomes mission-critical.

This is where services like BlockEden.xyz matter. When developers build applications that need to interact with Solana, Ethereum, Polygon, Sui, and other chains simultaneously, single-provider RPC dependencies create systemic risk. Node outages mean application downtime. Rate limits mean degraded user experience. Geographic latency means slow transaction confirmations.

BlockEden.xyz provides enterprise-grade multi-chain RPC infrastructure designed for exactly this use case: applications that need reliable, low-latency access across multiple blockchains without managing node infrastructure themselves.

For wallet providers integrating cross-chain swaps, DEX aggregation, and real-time balance queries across eight networks, distributed RPC architecture isn't optional—it's foundational.

As Phantom continues scaling its multi-chain capabilities and adding features like cross-chain swaps and real-time price feeds, the underlying infrastructure requirements grow exponentially. Building on battle-tested RPC providers ensures that UX innovations don't get undermined by infrastructure failures.

Explore BlockEden.xyz's multi-chain RPC infrastructure for building wallet and payment applications that require reliable access across Solana, Ethereum, and emerging Layer-1 ecosystems.

What Phantom's Evolution Means for Web3

Phantom's transformation from Solana specialist to multi-chain super app signals three broader industry shifts:

1. The End of Single-Chain Maximalism

Users don't care about blockchain philosophy. They care about accessing liquidity, using applications, and making payments. Wallets that require users to manage separate interfaces for each chain will lose to unified experiences that abstract complexity. Phantom's "turn chains on or off" approach recognizes that multi-chain is reality, not ideology.

2. Payments Beat Speculation

The Oobit partnership represents Phantom's bet that crypto's future is payments, not trading. When users can spend USDC at grocery stores via Visa rails while maintaining self-custody, stablecoin adoption accelerates beyond the crypto-native crowd. The $25 million Oobit raise led by Solana's co-founder and Tether validates this thesis with institutional capital.

3. UX Determines Winners

MetaMask's 30 million users represent an early lead, not an insurmountable moat. Phantom's 16 million users and superior UX satisfaction scores show that users will switch to better experiences when the friction is low enough. In a market where mobile-first design, biometric security, and invisible blockchain complexity matter more than which chains you support, Phantom's philosophy gives it long-term advantages.

The wallet wars of 2026 aren't about technology. They're about designing experiences so intuitive that crypto stops feeling like crypto.

Looking Ahead: The Super App Future

Phantom's roadmap through 2026 reveals ambitions beyond wallets. Phantom Terminal targets active traders with advanced features. Phantom Connect simplifies onboarding for mainstream users. The recent Oobit integration transforms the wallet into a payment instrument.

The question is whether Phantom can maintain its UX advantage while scaling feature breadth to match MetaMask. Every new blockchain, integration, and premium feature risks cluttering the clean interface that attracted 16 million users. The challenge isn't building features—it's building them without sacrificing simplicity.

MetaMask faces the inverse challenge: can it simplify its interface for mainstream users without alienating the power users who need granular control? The February 2026 addition of tokenized equities trading shows MetaMask doubling down on features. Transaction Shield's premium tier shows monetization strategy. But neither addresses the fundamental UX gap that drives users to Phantom.

The market may not consolidate to a single wallet. Power users may keep MetaMask for complex DeFi strategies while using Phantom for everyday payments. Enterprise users may adopt specialized wallets for compliance. But for the next billion crypto users—the ones who don't trade perps or farm yields—Phantom's super app approach offers a glimpse of what mainstream adoption actually looks like.

It looks like biometric authentication, not seed phrases. One-tap Visa payments, not bridge tutorials. Cross-chain swaps that feel instant, not multi-step workflows across three interfaces. And most importantly, it looks like blockchain disappearing into the background while value flows freely in the foreground.

That's the future Phantom is building. Whether it outpaces MetaMask or forces convergent evolution across the wallet ecosystem, the result is the same: Web3 becomes accessible to people who never wanted to learn about gas fees, nonce values, or consensus mechanisms.

The wallet wars aren't about which technology wins. They're about whose UX makes technology irrelevant.


Sources:

Japan's Datachain Launches First Enterprise Web3 Wallet with Privacy-Preserving Architecture

· 10 min read
Dora Noda
Software Engineer

Every corporate blockchain transaction tells a story—and that's exactly the problem.

When enterprises deploy stablecoins for cross-border payments or treasury operations, public blockchain transparency creates a dilemma. Every transaction becomes permanently visible: payment amounts, counterparties, timing patterns, and business relationships. For corporations, this isn't just uncomfortable—it's a competitive intelligence leak that makes blockchain adoption a non-starter.

Japan's Datachain has built a solution. This Spring 2026, the company is launching the country's first corporate-focused Web3 wallet that delivers what seemed impossible: complete transaction privacy while meeting stringent regulatory compliance requirements. The announcement signals a critical evolution in enterprise blockchain infrastructure, moving beyond the binary choice between transparency and privacy.

The Corporate Privacy Problem

Traditional finance operates on privacy by default. When Toyota wires payment to a supplier, competitors don't see the amount, timing, or counterparty. Banking infrastructure enforces confidentiality through institutional silos, with regulators granted selective access for compliance.

Public blockchains invert this model. Every transaction creates a permanent, public record. While wallet addresses provide pseudonymity, blockchain analytics firms can de-anonymize participants through pattern analysis. Transaction volumes reveal business relationships. Timing patterns expose operational rhythms. Payment amounts telegraph commercial terms.

For enterprises considering blockchain adoption, this transparency creates untenable risks. A manufacturer using stablecoins for supplier payments inadvertently broadcasts their entire supply chain to competitors. A treasury department moving assets between wallets reveals liquidity positions to market observers. Cross-border payment flows expose geographic expansion plans before public announcements.

Japan's regulatory environment compounds the challenge. The country's Payment Services Act requires crypto asset exchange service providers (CAESPs) to implement comprehensive know-your-customer (KYC) and anti-money laundering (AML) procedures. The Travel Rule, effective since June 2023, mandates that providers share originator and beneficiary information when transferring crypto assets or stablecoins. Service providers must obtain and record counterparty details—even for transactions not subject to the Travel Rule—and investigate unhosted wallet attributes to assess associated risks.

This regulatory framework leaves enterprises caught between two incompatible requirements: blockchain transparency that regulators can audit, and commercial confidentiality that competitive business demands.

Datachain's Privacy-by-Design Architecture

Datachain's solution—branded as "Datachain Privacy" infrastructure with the "Datachain Wallet" interface—implements what the company describes as a "triple-layer privacy model": anonymity, confidentiality, and unlinkability.

Anonymity means transaction participants' identities remain hidden from public view. Unlike pseudonymous blockchain addresses that can be de-anonymized through pattern analysis, Datachain's architecture prevents correlation between wallet addresses and corporate identities without explicit disclosure.

Confidentiality ensures transaction details—amounts, counterparties, timestamps—remain private between participating parties. Public blockchain observers cannot determine payment values or business relationships by analyzing on-chain data.

Unlinkability prevents observers from connecting multiple transactions to the same entity. Even if an enterprise conducts thousands of stablecoin transfers, blockchain analytics cannot cluster these activities into a coherent profile.

The system achieves this privacy through what appears to be zero-knowledge proof technology and selective disclosure mechanisms. Zero-knowledge proofs enable one party to prove statement validity—like "this transaction meets regulatory requirements"—without revealing the underlying data. Selective disclosure allows enterprises to demonstrate compliance to regulators while maintaining commercial privacy from competitors.

Crucially, Datachain implements Passkey-based key management, leveraging WebAuthn and FIDO2 standards. Traditional blockchain wallets rely on seed phrases or private keys—cryptographic secrets that, if compromised or lost, mean irrecoverable fund loss. Enterprise users struggle with this model: seed phrases create custody nightmares, while hardware security modules add complexity and cost.

Passkeys solve this through public-key cryptography backed by device biometrics. When an enterprise user creates a wallet, their device generates a key pair. The private key never leaves the device's secure enclave (such as Apple's Secure Element or Android's Trusted Execution Environment). Authentication happens through biometric verification—Face ID, Touch ID, or Android biometrics—instead of remembering 12- or 24-word seed phrases.

For enterprises, this dramatically simplifies key management while enhancing security. IT departments no longer need to design seed phrase custody procedures or manage hardware security modules. Employee turnover doesn't create key handoff vulnerabilities. Lost or stolen devices don't compromise wallets, as the private key cannot be extracted from the secure enclave.

Spring 2026 Launch and Enterprise Adoption

Datachain has commenced pre-registration for the Spring 2026 launch, targeting corporate stablecoin use cases. The wallet will support EVM-compatible blockchains and integrate with major stablecoins including JPYC (Japan's leading yen-backed stablecoin), USDC, USDT, and native tokens like ETH.

The timing aligns with Japan's accelerating stablecoin adoption. Following regulatory clarification that classified stablecoins as "electronic payment instruments" rather than crypto assets, major financial institutions have launched yen-backed offerings. MUFG's Progmat Coin, SBI Holdings' SBIUSDT, and JPYC have created a regulated stablecoin ecosystem targeting enterprise payment use cases.

However, stablecoin infrastructure without privacy-preserving architecture creates adoption friction. Enterprises need blockchain's benefits—24/7 settlement, programmability, reduced intermediary costs—without blockchain's transparency drawbacks. Datachain's wallet addresses this gap.

The company is accepting implementation and collaboration inquiries from enterprises through a dedicated landing page. Early adopters likely include:

  • Cross-border payment operations: Corporations using stablecoins for international supplier payments, where transaction privacy prevents competitors from analyzing supply chain relationships
  • Treasury management: CFOs moving assets between wallets or chains without broadcasting liquidity positions to market observers
  • Inter-company settlements: Conglomerates conducting internal transfers across subsidiaries without creating public transaction trails
  • B2B payment platforms: Enterprise payment processors requiring privacy for their corporate clients

Japan's regulatory environment positions Datachain uniquely. While Western jurisdictions grapple with evolving frameworks, Japan has established clear rules: stablecoins require licensing, AML/CFT compliance is mandatory, and the Travel Rule applies. Datachain's selective disclosure model demonstrates compliance without sacrificing commercial confidentiality.

The Enterprise Wallet Infrastructure Race

Datachain enters a rapidly evolving enterprise wallet infrastructure market. In 2026, the category has fragmented into specialized offerings:

Embedded wallet platforms like Privy, Portal, and Dynamic provide developers with SDKs for seamless onboarding through email, social login, and passkeys while maintaining non-custodial security. These solutions bundle account abstraction, gas sponsorship, and orchestration, targeting consumer applications rather than enterprise compliance.

Institutional custody solutions from Fireblocks, Copper, and Anchorage emphasize multi-party computation (MPC) wallet infrastructure for high-value asset protection. These platforms power hardware-secured, SOC 2-compliant wallets across EVM, Solana, Bitcoin, and other chains, but typically lack the privacy-preserving features that corporate stablecoin payments demand.

Enterprise payment platforms like BVNK and AlphaPoint focus on multi-chain stablecoin payment infrastructure, integrating Travel Rule compliance, transaction monitoring, and sanctions screening. However, these systems generally operate on public blockchain transparency, making corporate transaction details visible to blockchain observers.

Datachain's positioning combines elements from all three categories: Passkey authentication from embedded wallets, enterprise-grade security from institutional custody, and payment infrastructure from stablecoin platforms—wrapped in privacy-preserving architecture that existing solutions lack.

The market opportunity is substantial. As stablecoins transition from crypto-native applications to mainstream corporate treasury tools, enterprises need infrastructure that matches traditional finance's confidentiality expectations while meeting blockchain's transparency requirements for compliance.

Broader Implications for Enterprise Blockchain

Datachain's launch highlights a critical gap in current blockchain infrastructure: the privacy-compliance dilemma.

Public blockchains were designed for transparency. Bitcoin's breakthrough was creating a system where anyone could verify transaction validity without trusted intermediaries. Ethereum extended this to programmable smart contracts, enabling decentralized applications built on transparent state transitions.

This transparency serves essential purposes. It enables trustless verification, allowing participants to independently confirm network rules without intermediaries. It creates auditability, letting regulators and compliance officers trace fund flows. It prevents double-spending and ensures network integrity.

But transparency was never intended for corporate financial operations. When enterprises adopt blockchain for payments, they're not seeking transparency—they're seeking efficiency, programmability, and reduced intermediary costs. Transparency becomes a bug, not a feature.

Privacy-preserving technologies are maturing to address this gap. Zero-knowledge proofs, pioneered by Zcash and advanced by protocols like Aztec and Polygon zkEVM, enable transaction validity verification without revealing transaction details. Fully homomorphic encryption (FHE), commercialized by platforms like Zama Protocol, allows computation on encrypted data without decryption. Trusted execution environments (TEEs) create hardware-isolated computation zones where sensitive operations occur without external visibility.

Datachain's implementation appears to combine these approaches: zero-knowledge proofs for transaction privacy, selective disclosure for regulatory compliance, and potentially TEEs for secure key operations within the Passkey framework.

The selective disclosure model represents a particularly important innovation for regulatory compliance. Rather than choosing between "fully public for compliance" or "fully private and non-compliant," enterprises can maintain commercial privacy while demonstrating regulatory adherence through cryptographic proofs or controlled disclosures to authorized parties.

This approach aligns with Japan's "privacy-by-design" regulatory philosophy, enshrined in the country's Act on the Protection of Personal Information (APPI). Japanese regulators emphasize accountability and purpose limitation: organizations must clearly define data usage purposes and limit processing accordingly. Selective disclosure architectures make disclosure explicit and limited, aligning with APPI principles better than blanket transparency or total privacy.

The Road to Enterprise Blockchain Adoption

For blockchain to transition from crypto-native applications to mainstream enterprise infrastructure, privacy must become a standard feature, not an exception.

The current paradigm—where corporate blockchain adoption requires accepting total transaction transparency—artificially limits the technology's addressable market. Enterprises won't sacrifice competitive intelligence for marginally better settlement speed. Treasury departments won't broadcast liquidity positions to save basis points on international transfers. Supply chain managers won't expose supplier networks for programmable payment automation.

Datachain's launch, alongside similar efforts from ZKsync's Prividium banking stack (targeting Deutsche Bank and UBS) and JPMorgan's Canton Network (providing privacy for institutional applications), suggests the market is converging toward privacy-preserving enterprise blockchain infrastructure.

The Spring 2026 timeline is ambitious but achievable. Passkey authentication is production-ready, with widespread adoption across consumer applications. Zero-knowledge proof systems have matured from research curiosities to production-grade infrastructure powering Ethereum L2 networks processing billions in daily value. Selective disclosure frameworks exist in both academic literature and enterprise implementations.

The harder challenge is market education. Enterprises accustomed to traditional banking privacy must understand that blockchain privacy requires explicit architecture, not institutional silos. Regulators familiar with bank examination processes need frameworks for auditing privacy-preserving systems through cryptographic proofs rather than direct data access. Blockchain developers focused on transparency maximization must recognize that privacy is essential for institutional adoption, not antithetical to blockchain principles.

If Datachain succeeds, the template extends beyond Japan. European enterprises operating under MiCA stablecoin regulations face similar privacy-compliance tension. Singapore's Payment Services Act creates comparable requirements. U.S. state-level stablecoin licensing frameworks emerging in 2026 will likely incorporate Travel Rule obligations similar to Japan's.

BlockEden.xyz provides enterprise-grade blockchain infrastructure for developers building the next generation of Web3 applications. Explore our API services for reliable, scalable access to 40+ blockchain networks, enabling you to focus on building privacy-preserving solutions like Datachain's wallet without managing node infrastructure.

Conclusion

Japan's Datachain is solving a problem that has constrained enterprise blockchain adoption since Bitcoin's launch: public transaction transparency that conflicts with corporate confidentiality requirements.

By combining privacy-preserving cryptography with regulatory-compliant selective disclosure, wrapped in Passkey authentication that eliminates seed phrase custody nightmares, Datachain's Spring 2026 wallet launch demonstrates that enterprises can have both blockchain efficiency and traditional finance privacy.

For blockchain infrastructure to fulfill its promise beyond crypto-native applications, privacy cannot remain a specialized feature available only through complex implementations. It must become standard architecture, as fundamental as consensus mechanisms or network protocols.

Datachain's launch suggests that future is arriving. Whether building cross-border payment platforms, treasury management systems, or B2B settlement networks, enterprises will increasingly demand infrastructure that delivers blockchain's benefits without sacrificing commercial confidentiality.

The question isn't whether privacy-preserving enterprise blockchain will emerge. The question is whether incumbents will adapt or whether nimble challengers like Datachain will define the next decade of institutional Web3 infrastructure.

x402 Foundation: How Coinbase and Cloudflare Are Building the Payment Layer for the AI Internet

· 8 min read
Dora Noda
Software Engineer

For nearly three decades, HTTP status code 402 — "Payment Required" — sat dormant in the internet's specification, a placeholder for a future that never arrived. In September 2025, Coinbase and Cloudflare finally activated it. By March 2026, the x402 protocol has processed over 35 million transactions on Solana alone, Stripe has integrated it into its PaymentIntents API, and Google's Agent Payments Protocol explicitly incorporates x402 for agent-to-agent crypto settlements. The forgotten status code is now the foundation of a $600 million annualized payment layer purpose-built for machines.

This is the story of how x402 went from whitepaper to production standard in under a year — and why it matters for every builder in Web3.

The Graph's 2026 Transformation: Redefining Blockchain Data Infrastructure

· 13 min read
Dora Noda
Software Engineer

When 37% of your new users aren't human, you know something fundamental has shifted.

That's the reality The Graph faced in early 2026 when analyzing Token API adoption: more than one in three new accounts belonged to AI agents, not developers. These autonomous programs — querying DeFi liquidity pools, tracking tokenized real-world assets, and executing institutional trades — now consume blockchain data at a scale that would be impossible for human operators to match.

This isn't a future scenario. It's happening now, and it's forcing a complete rethinking of how blockchain data infrastructure works.

From Subgraph Pioneer to Multi-Service Data Backbone

The Graph built its reputation on a single elegant solution: subgraphs. Developers create custom schemas that index on-chain events and smart contract states, enabling dApps to fetch precise, real-time data without running their own nodes.

It's the reason you can check your DeFi portfolio balance instantly or browse NFT metadata without waiting for blockchain queries to complete.

By late 2025, The Graph had processed over 1.5 trillion queries since inception — a milestone that positions it as the largest decentralized data infrastructure in Web3. But raw query volume only tells part of the story.

The more revealing metric emerged in Q4 2025: 6.4 billion queries per quarter, with active subgraphs reaching an all-time high of 15,500. Yet new subgraph creation had slowed dramatically.

The interpretation? The Graph's existing infrastructure serves its current users exceptionally well, but the next wave of adoption requires something fundamentally different.

Enter Horizon, the protocol upgrade that went live in December 2025 and sets the stage for The Graph's 2026 transformation.

The Horizon Architecture: Multi-Service Infrastructure for the On-Chain Economy

Horizon isn't a feature update. It's a complete architectural redesign that transforms The Graph from a subgraph-focused platform into a multi-service data infrastructure capable of serving three distinct customer segments simultaneously: developers, AI agents, and institutions.

The architecture introduces three foundational components:

A core staking protocol that extends economic security to any data service, not just subgraphs. This allows new data products to inherit The Graph's existing network of 167,000+ delegators and active indexers without building separate security models.

A unified payments layer that handles fees across all services, enabling seamless cross-service billing and reducing friction for users who need multiple types of blockchain data.

A permissionless framework allowing new data services to integrate without requiring protocol governance votes. Any team can build on The Graph's infrastructure, as long as they meet technical standards and stake GRT tokens for security.

This modular approach solves a critical problem: different use cases require different data architectures.

A DeFi trading bot needs millisecond-level liquidity updates. An institutional compliance team needs SQL-queryable audit trails. A wallet app needs pre-indexed token balances across dozens of chains. Before Horizon, these use cases would require separate infrastructure providers.

Now, they can all run on The Graph.

Four Services, Four Distinct Markets

The Graph's 2026 roadmap introduces four specialized data services, each targeting a specific market need:

Token API: Pre-Indexed Data for Common Queries

The Token API eliminates the need for custom indexing when you just need standard token data — balances, transfer histories, contract addresses across 10 chains. Wallets, explorers, and analytics platforms no longer need to deploy their own subgraphs for basic queries.

This is where AI agents have shown up in force. The 37% non-human user adoption rate reflects a simple reality: AI agents don't want to configure indexers or write GraphQL queries. They want an API that speaks natural language and returns structured data instantly.

The integration with Model Context Protocol (MCP) enables AI agents to query blockchain data through tools like Claude, Cursor, and ChatGPT without setup keys. The x402 protocol adds autonomous payment capabilities, letting agents pay per query without human intervention.

Tycho: Real-Time Liquidity Tracking for DeFi

Tycho streams live liquidity changes across decentralized exchanges — exactly what trading systems, solvers, and MEV bots need. Instead of polling subgraphs every few seconds, Tycho pushes updates as they happen on-chain.

For DeFi infrastructure providers, this reduces latency from seconds to milliseconds. In high-frequency trading environments where a 100ms delay can mean the difference between profit and loss, Tycho's streaming architecture becomes mission-critical.

Amp: SQL Database for Institutional Analytics

Amp represents The Graph's most explicit play for traditional finance adoption: an enterprise-grade blockchain database with SQL access, built-in audit trails, lineage tracking, and on-premises deployment options.

This isn't for DeFi degens. It's for treasury oversight teams, risk management divisions, and regulated payment systems that need compliance-ready data infrastructure.

The DTCC's Great Collateral Experiment — a pilot program exploring tokenized securities settlement — already uses Graph technology, validating the institutional use case.

SQL compatibility is crucial. Financial institutions have decades of tooling, reporting systems, and analyst expertise built around SQL.

Asking them to learn GraphQL is a non-starter. Amp meets them where they are.

Subgraphs: The Foundation That Still Matters

Despite the new services, subgraphs remain central to The Graph's value proposition. The 50,000+ active subgraphs powering virtually every major DeFi protocol represent an installed base that competitors cannot easily replicate.

In 2026, subgraphs deepen in two ways: expanded multi-chain coverage (now spanning 40+ blockchains) and tighter integration with the new services.

A developer can use a subgraph for custom logic while pulling pre-indexed token data from Token API — best of both worlds.

Cross-Chain Expansion: GRT Utility Beyond Ethereum

For years, The Graph's GRT token existed primarily on Ethereum mainnet, creating friction for users on other chains. That changed with Chainlink's Cross-Chain Interoperability Protocol (CCIP) integration, which bridged GRT to Arbitrum, Base, and Avalanche in late 2025, with Solana planned for 2026.

This isn't just about token availability. Cross-chain GRT utility enables developers on any chain to pay for Graph services using their native tokens, stake GRT to secure data services, and delegate to indexers without moving assets to Ethereum.

The network effects compound quickly: Base processed 1.23 billion queries in Q4 2025 (up 11% quarter-over-quarter), while Arbitrum posted the strongest growth among major networks at 31% QoQ. As L2s continue absorbing transaction volume from Ethereum mainnet, The Graph's cross-chain strategy positions it to serve the entire multi-chain ecosystem.

The AI Agent Data Problem: Why Indexing Becomes Critical

AI agents represent a fundamentally different class of blockchain user. Unlike human developers who write queries once and deploy them, agents generate thousands of unique queries per day across dozens of data sources.

Consider an autonomous DeFi yield optimizer:

  1. It queries current APYs across lending protocols (Aave, Compound, Morpho)
  2. Checks gas prices and transaction congestion
  3. Monitors token price feeds from oracles
  4. Tracks historical volatility to assess risk
  5. Verifies smart contract security audits
  6. Executes rebalancing transactions when conditions are met

Each step requires structured, indexed data. Running a full node for every protocol is economically infeasible. APIs from centralized providers introduce single points of failure and censorship risk.

The Graph solves this by providing a decentralized, censorship-resistant data layer that AI agents can query programmatically. The economic model works because agents pay per query via x402 protocol — no monthly subscriptions, no API keys to manage, just usage-based billing settled on-chain.

This is why Cookie DAO, a decentralized data network indexing AI agent activity across Solana, Base, and BNB Chain, builds on The Graph's infrastructure. The fragmented on-chain actions and social signals generated by thousands of agents need structured data feeds to be useful.

DeFi and RWA: The Data Demands of Tokenized Finance

DeFi's data requirements have matured dramatically. In 2021, a DEX aggregator might query basic token prices and liquidity pool reserves. In 2026, institutional DeFi platforms need:

  • Real-time collateralization ratios for lending protocols
  • Historical volatility data for risk modeling
  • Cross-chain asset pricing with oracle verification
  • Transaction provenance for compliance audits
  • Liquidity depth across multiple venues for trade execution

Tokenized real-world assets add another layer of complexity. When a tokenized U.S. Treasury fund integrates with a DeFi lending protocol (as BlackRock's BUIDL did with Uniswap), the data infrastructure must track:

  • On-chain ownership records
  • Redemption requests and settlement status
  • Regulatory compliance events
  • Yield distribution to token holders
  • Cross-chain bridge activity

The Graph's multi-service architecture addresses this by allowing RWA platforms to use Amp for institutional-grade SQL analytics while simultaneously streaming real-time updates via Tycho for DeFi integrations.

The market opportunity is staggering: Ripple and BCG forecast tokenized RWAs expanding from $0.6 trillion in 2025 to $18.9 trillion by 2033 — a 53% compound annual growth rate. Every dollar tokenized on-chain generates data that needs indexing, querying, and reporting.

Network Economics: The Indexer and Delegator Model

The Graph's decentralized architecture relies on economic incentives aligning three stakeholder groups:

Indexers run infrastructure to process and serve queries, earning query fees and indexing rewards in GRT tokens. The number of active indexers increased modestly in Q4 2025, suggesting operators remained committed despite lower near-term profitability from reduced query fees.

Delegators stake GRT tokens with indexers to earn a portion of rewards without running infrastructure themselves. The network's 167,000+ delegators represent distributed economic security that makes data censorship prohibitively expensive.

Curators signal which subgraphs are valuable by staking GRT, earning a portion of query fees when their curated subgraphs are used. This creates a self-organizing quality filter: high-quality subgraphs attract curation, which attracts indexers, which improves query performance.

The Horizon upgrade extends this model to all data services, not just subgraphs. An indexer can now serve Token API queries, stream Tycho liquidity updates, and provide Amp database access — all secured by the same GRT stake.

This multi-service revenue model matters because it diversifies indexer income beyond subgraph queries. If AI agent query volume scales as projected, indexers serving Token API could see significant revenue growth, even if traditional subgraph usage plateaus.

The Institutional Wedge: From DeFi to TradFi

The DTCC pilot program represents something bigger than a single use case. It's proof that major financial institutions — in this case, the organization that settles $2.5 quadrillion in securities transactions annually — will build on public blockchain data infrastructure when it meets regulatory requirements.

Amp's feature set directly targets this segment:

  • Lineage tracking: Every data point traces back to its on-chain source, creating an immutable audit trail.
  • Compliance features: Role-based access controls, data retention policies, and privacy controls meet regulatory standards.
  • On-premises deployment: Regulated entities can run Graph infrastructure inside their security perimeter while still participating in the decentralized network.

The playbook mirrors how enterprise blockchain adoption played out: start with private/permissioned chains, gradually integrate with public chains as compliance frameworks mature. The Graph positions itself as the data layer that works across both environments.

If major banks adopt Amp for tokenized securities settlement, blockchain analytics for AML compliance, or real-time risk monitoring, the query volume could dwarf current DeFi usage. A single large institution running hourly compliance queries across multiple chains generates more sustainable revenue than thousands of individual developers.

The 2026 Inflection Point: Is This The Graph's Year?

The Graph's 2026 roadmap presents a clear thesis: the current token price fundamentally misprices the network's position in the emerging AI agent economy and institutional blockchain adoption.

The bull case rests on three assumptions:

  1. AI agent query volume scales meaningfully. If the 37% adoption rate among Token API users reflects a broader trend, and autonomous agents become the primary consumers of blockchain data, query fees could surge beyond historical levels.

  2. Horizon's multi-service architecture drives fee revenue growth. By serving developers, agents, and institutions simultaneously, The Graph captures revenue from multiple customer segments instead of relying solely on DeFi developers.

  3. Cross-chain GRT utility via Chainlink CCIP generates sustained demand. As users on Arbitrum, Base, Avalanche, and Solana pay for Graph services using bridged GRT, token velocity increases while supply remains capped.

The bear case argues that the infrastructure moat is narrower than it appears. Alternative indexing solutions like Chainstack, BlockXs, and Goldsky offer hosted subgraph services with simpler pricing and faster setup. Centralized API providers like Alchemy and Infura bundle data access with node infrastructure, creating switching costs.

The counterargument: The Graph's decentralized architecture matters precisely because AI agents and institutions cannot rely on centralized data providers. AI agents need censorship resistance to ensure uptime during adversarial conditions. Institutions need verifiable data provenance that centralized APIs cannot provide.

The 50,000+ active subgraphs, 167,000+ delegators, and ecosystem integrations with virtually every major DeFi protocol create a network effect that competitors must overcome, not just match.

Why Data Infrastructure Becomes the AI Economy Backbone

The blockchain industry spent 2021-2023 obsessing over execution layers: faster Layer 1s, cheaper Layer 2s, more scalable consensus mechanisms.

The result? Transactions that cost fractions of a penny and settle in milliseconds. The bottleneck shifted.

Execution is solved. Data is the new constraint.

AI agents can execute trades, rebalance portfolios, and settle payments autonomously. What they cannot do is operate without high-quality, indexed, queryable data about on-chain state. The Graph's trillion-query milestone reflects this reality: as blockchain applications grow more sophisticated, data infrastructure becomes more critical than transaction throughput.

This mirrors the evolution of traditional tech infrastructure. Amazon didn't win e-commerce because it had the fastest servers — it won because it built the best data infrastructure for inventory management, personalization, and logistics optimization. Google didn't win search because it had the most storage — it won because it indexed the web better than anyone else.

The Graph is positioning itself as the Google of blockchain data: not the only indexing solution, but the default infrastructure that everything else builds on top of.

Whether that vision materializes depends on execution in the next 12-24 months. If Horizon's multi-service architecture attracts institutional clients, if AI agent query volume justifies the infrastructure investment, and if cross-chain expansion drives sustainable GRT demand, 2026 could be the year The Graph transitions from "important DeFi infrastructure" to "essential backbone of the on-chain economy."

The 1.5 trillion queries are just the beginning.


Building applications that rely on robust blockchain data infrastructure? BlockEden.xyz provides high-performance API access across 40+ chains, complementing decentralized indexing with enterprise-grade reliability for production Web3 applications.

Cross-Chain Messaging Protocol Wars: Who Wins the Battle for Multichain Dominance?

· 12 min read
Dora Noda
Software Engineer

The multichain future isn't coming — it's already here. With over $19.5 billion locked in cross-chain bridges and a market racing toward $3.5 billion by end of 2026, blockchain interoperability has moved from experimental to mission-critical infrastructure. But beneath the surface of seamless token transfers and cross-chain dApps, three protocols are locked in an architectural arms race that will determine the backbone of Web3's next decade.

LayerZero, Wormhole, and Axelar have emerged as the undisputed leaders in cross-chain messaging, yet they couldn't be more different in design philosophy. One prioritizes lightning-fast finality through minimalist architecture. Another bets on decentralization through a robust validator network. The third attempts to split the difference, offering balanced performance with institutional-grade reliability.

The question isn't whether cross-chain messaging matters — with Wormhole processing over $70 billion in cumulative volume and LayerZero securing Cardano's $80 billion omnichain integration, the market has spoken. The real question is: which architectural trade-off wins when speed, security, and decentralization collide?

The Architecture Battle: Three Paths to Cross-Chain Supremacy

LayerZero: The Speed Minimalist

LayerZero's design philosophy is deceptively simple: keep the on-chain footprint minimal, push verification off-chain, and let developers choose their security model. At its core, LayerZero deploys immutable "Endpoint" smart contracts on each blockchain, but the heavy lifting happens through its network of Decentralized Verifier Networks (DVNs).

Unlike traditional bridges that lock assets in escrow contracts, LayerZero uses an oracle-relayer model where independent entities verify message integrity across chains.

Developers can configure their own security parameters by selecting from over 60 available DVNs, including institutional players like Fidelity's FCAT verifier that secures Ondo Finance's $2.7 billion in tokenized assets.

The payoff? Near-instant message delivery. LayerZero's lightweight architecture eliminates the consensus overhead that plagues heavier protocols, enabling sub-second cross-chain transactions when properly configured. This speed advantage is why the protocol has become the de facto standard for DeFi applications requiring rapid cross-chain arbitrage and liquidity routing.

But minimalism comes with trade-offs. By outsourcing verification to external DVNs, LayerZero introduces trust assumptions that purists argue compromise decentralization. If a DVN set is compromised or colludes, message integrity could be at risk. The protocol's response? Modular security — applications can require multiple independent DVNs to sign off on messages, creating redundancy at the cost of slight latency increases.

LayerZero's 2026 moonshot further amplifies its speed-first strategy: the announcement of "Zero," a dedicated Layer 1 blockchain launching fall 2026. Using heterogeneous architecture that separates execution from verification via zero-knowledge proofs through the Jolt zkVM, Zero claims a staggering 2 million transactions per second with minimal fees. If delivered, this would make LayerZero not just a messaging protocol but a high-performance settlement layer for cross-chain activity.

Wormhole: The Decentralization Purist

Wormhole takes the opposite bet: prioritize trust minimization through robust consensus, even if it means sacrificing some speed. The protocol's Guardian Network consists of 19 independent validators, and a message only achieves authenticity when 2/3+ Guardians cryptographically sign it using t-Schnorr multisig.

This design creates a meaningful security buffer. Unlike LayerZero's configurable DVNs, Wormhole's Guardian Network operates as a fixed quorum that's harder to compromise. The validators are geographically distributed and run by reputable entities, creating redundancy that has proven resilient even during market turbulence.

When the Terra/LUNA collapse triggered cascading liquidations across DeFi in 2022, Wormhole's Guardian Network maintained 100% uptime without message failures.

The architecture connects 40+ blockchains through on-chain core contracts that emit and verify messages, with Guardians observing events and producing signed attestations that relayers deliver to destination chains. This guardian-observer pattern scales remarkably well — Wormhole has processed over 1 billion transactions handling $70 billion in cumulative volume without the network itself becoming a bottleneck.

Wormhole's 2026 evolution, dubbed "W 2.0," introduces economic incentives through a staking mechanism targeting 4% base yield and a Wormhole Reserve treasury that accumulates protocol revenue. This move addresses a long-standing criticism: that Wormhole validators lacked direct economic skin in the game compared to PoS-based competitors.

The trade-off? Finality takes slightly longer. Because messages must wait for 2/3+ Guardian signatures before achieving canonical status, Wormhole's confirmation times lag LayerZero's optimistic relaying by several seconds. For high-frequency DeFi strategies requiring sub-second execution, this latency matters. For institutional cross-chain transfers prioritizing security over speed, it's a non-issue.

Axelar: The Pragmatic Middle Ground

Axelar positions itself as the Goldilocks solution — neither too fast to be reckless nor too slow to be practical. Built on the Cosmos SDK using CometBFT consensus and CosmWasm VM, Axelar operates as a Proof-of-Stake blockchain connecting other chains through a "hub and spoke" model.

With over 75 active validator nodes using Delegated Proof-of-Stake consensus, Axelar achieves predictable finality times that split the difference between LayerZero's minimalism and Wormhole's quorum-based approach. Messages achieve consensus through Cosmos-style block finality, creating a transparent audit trail without the trust assumptions of external oracles.

Axelar's killer feature is General Message Passing (GMP), which accounted for 84% of its $732.7 million quarterly cross-chain volume in Q2 2024. Unlike simple token bridges, GMP enables smart contracts to send and execute arbitrary function calls across chains — powering cross-chain swaps, multichain gaming logic, NFT bridging, and complex DeFi strategies that require composability between disparate ecosystems.

The protocol's full-stack interoperability extends beyond simple asset bridging to support permissionless overlay programmability, allowing developers to deploy dApps that execute logic across networks without rewriting smart contracts for each chain.

This "write once, deploy everywhere" capability is why Axelar has processed $8.66 billion in transfers across 1.85 million transactions spanning 64 blockchains.

Axelar's 2026 roadmap includes strategic integrations with Stellar and Hedera, expanding its multichain reach beyond EVM chains into enterprise-focused networks. The Stellar integration, announced in February 2026, signals Axelar's bet on connecting payment-optimized blockchains with DeFi-native ecosystems.

The compromise? Axelar's PoS consensus model inherits Cosmos-style validator set limitations. While 75+ validators provide meaningful decentralization, the network is more centralized than Ethereum's 1 million+ validators yet more distributed than Wormhole's 19 Guardians. Performance sits between the extremes: faster than quorum-based systems but not as instantaneous as oracle-relayer models.

The Numbers Behind the Narratives

Market activity reveals distinct adoption patterns. Wormhole dominates raw volume metrics with $70 billion in cumulative transfers across 1 billion transactions. Its Portal Bridge alone processed $60 billion since inception, with 30-day volumes hitting $1.413 billion as of January 28, 2026.

Axelar's numbers tell a different story — fewer transactions (1.85 million) but higher average value ($8.66 billion total), suggesting institutional and protocol-level adoption over retail speculation. The fact that 84% of its volume comes from General Message Passing rather than simple token swaps indicates Axelar's infrastructure powers more sophisticated cross-chain applications.

LayerZero's metrics focus on integration breadth rather than raw volume. With 60+ independent DVNs and headline integrations like Cardano's access to $80 billion in omnichain assets and Ondo Finance's $2.7 billion in tokenized treasuries, LayerZero's strategy prioritizes developer flexibility and high-value partnerships over transaction throughput.

The broader market context matters: with $19.5 billion in total value locked across all cross-chain bridges as of January 2025 and projections hitting $3.5 billion in market size by end of 2026, the sector is growing faster than individual protocols can capture alone.

The Blockchain Bridges market itself is projected to expand from $202 million in 2024 to $911 million by 2032 at a 22.5% CAGR.

This isn't a zero-sum game. The three protocols often complement rather than compete — many applications use multiple messaging layers for redundancy, routing high-value transactions through Wormhole while batching smaller operations via LayerZero's faster relaying.

Trade-Offs That Define Developer Choices

For developers building cross-chain applications, the choice isn't purely technical — it's philosophical. What matters more: speed, decentralization, or developer experience?

Speed-critical applications naturally gravitate toward LayerZero. If your dApp requires sub-second cross-chain execution — think arbitrage bots, real-time gaming, or high-frequency trading — LayerZero's oracle-relayer model delivers unmatched finality. The ability to configure custom DVN sets means developers can dial in exactly the security-latency balance their application demands.

Security-maximalist protocols default to Wormhole. When transacting billions in institutional capital or bridging assets for custodians with fiduciary obligations, Wormhole's 2/3+ Guardian consensus provides the strongest trust minimization. The validator set's geographic distribution and reputation act as an implicit insurance policy against Byzantine failures.

Composability-focused builders find a home with Axelar. If your application requires smart contracts on Chain A to trigger complex logic on Chain B — orchestrating multichain DeFi strategies, synchronizing NFT state across ecosystems, or coordinating cross-chain governance — Axelar's GMP infrastructure was purpose-built for this use case. The Cosmos SDK foundation also means native IBC compatibility for Cosmos-family chains, creating a natural bridge between Cosmos and EVM ecosystems.

Finality models introduce subtle but critical differences. LayerZero's optimistic relaying means messages appear on the destination chain before full verification completes, creating a brief window of uncertainty that sophisticated attackers could theoretically exploit. Wormhole's quorum-based finality guarantees canonical message status before delivery. Axelar's PoS consensus provides cryptoeconomic finality backed by validator collateral.

Integration complexity varies significantly. LayerZero's minimalist design means simpler smart contract interfaces but more DevOps overhead configuring DVNs. Wormhole's guardian-observer model abstracts complexity but offers fewer customization options. Axelar's full-stack approach provides the richest feature set but steepest learning curve for developers unfamiliar with Cosmos architecture.

2026 Milestones Reshaping the Competitive Landscape

The protocol wars are entering a new phase as 2026 unfolds. LayerZero's "Zero" blockchain launch represents the boldest gambit — transitioning from pure messaging protocol to application platform. If the promised 2 million TPS with zero-knowledge proof verification delivers, LayerZero could capture not just cross-chain messaging but settlement finality itself, becoming the canonical source of truth for multichain state.

Wormhole's W 2.0 staking mechanism changes its economic model fundamentally. By introducing a 4% base yield for stakers and accumulating protocol revenue in the Wormhole Reserve, the protocol addresses critics who argued Guardians lacked sufficient economic incentives to ensure message integrity. The staking layer also creates a secondary market for $W token beyond speculative trading, potentially attracting institutional validators.

Axelar's Stellar and Hedera integrations signal strategic expansion beyond EVM-dominated DeFi into payments and enterprise use cases. Stellar's focus on cross-border remittances and regulated stablecoins complements Axelar's institutional positioning, while Hedera's enterprise adoption provides a foothold in permissioned blockchain networks that have historically remained siloed from public chains.

The XRPL EVM sidechain integration represents another potential catalyst. If Ripple's XRP Ledger achieves true EVM compatibility with seamless cross-chain messaging, it could unlock $80+ billion in XRP liquidity for DeFi applications currently locked in the XRPL ecosystem. Whichever protocol secures dominant integration will gain a massive on-ramp for institutional capital.

Meanwhile, innovations like Jumper's gasless routing address one of cross-chain UX's biggest pain points: users needing destination chain gas tokens before they can complete transactions. If messaging protocols integrate gasless abstraction natively, it removes a significant friction point that has historically limited cross-chain adoption to sophisticated users.

The Multi-Protocol Future

The endgame likely isn't winner-takes-all dominance but strategic specialization. Just as Layer 2 scaling evolved from "Ethereum killers" to complementary rollups, cross-chain messaging is maturing into a heterogeneous infrastructure stack where different protocols serve different niches.

LayerZero's speed and flexibility make it the default for DeFi primitives requiring rapid finality and custom security parameters. Wormhole's decentralization and battle-tested resilience position it as the bridge of choice for institutional capital and high-value asset transfers. Axelar's GMP infrastructure and Cosmos-native interoperability make it the connective tissue for complex multichain applications requiring arbitrary message passing.

The real competition isn't between these three giants — it's between this multichain future and the walled gardens of monolithic blockchains that still hope to capture 100% of value within a single ecosystem. Every billion dollars in cross-chain volume, every multichain dApp achieving product-market fit, every institution routing assets through permissionless messaging protocols proves that the future of Web3 is interconnected, not isolated.

For developers and users, the protocol wars create a powerful dynamic: competition drives innovation, redundancy improves security, and optionality prevents monopolistic rent extraction. Whether your transaction routes through LayerZero's DVNs, Wormhole's Guardians, or Axelar's validators, the outcome is the same — a more open, composable, and accessible blockchain ecosystem.

The question isn't which protocol wins. It's how quickly the entire stack matures to make cross-chain feel as seamless as loading a webpage.


Sources:

Sony's Soneium Brings 200M LINE Users to Web3: The Gaming Onboarding Revolution

· 14 min read
Dora Noda
Software Engineer

Web3 gaming has a dirty secret: for every hundred games promising to revolutionize the industry, maybe two have figured out how to onboard users who don't already own a MetaMask wallet. The problem isn't technology—it's friction. Creating a wallet, buying gas tokens, understanding transaction signatures—these barriers have kept blockchain gaming trapped in a niche of crypto-native users while Web2 gaming serves billions.

Sony's Soneium blockchain is betting $13 million that it can change this equation. By partnering with LINE, Asia's messaging giant with 200 million active users, Soneium is deploying four mini-app games directly inside a platform people already use daily. No wallet downloads. No gas fee confusion. Just games that happen to run on blockchain rails invisible to the user.

This isn't theoretical. Since launching its mainnet in January 2025, Soneium has already processed over 500 million transactions across 5.4 million active wallets and more than 250 live decentralized applications. Now, with LINE's integration going live, the question shifts from "can blockchain handle mainstream gaming?" to "what happens when millions of casual gamers suddenly become on-chain users without realizing it?"

The Web3 Gaming Onboarding Crisis

The numbers tell a brutal story. In 2025, more than 11.6 million cryptocurrency tokens died—many of them gaming projects that failed to find users. Research shows that platforms achieving 5 million Web3 users took roughly one year to scale from zero, yet most Web3 games never crack 10,000 daily active users.

The problem isn't interest. Web2 gamers spend billions annually on in-game purchases, virtual goods, and digital collectibles. The problem is asking them to learn blockchain mechanics before they can play. Traditional Web3 onboarding requires:

  • Installing a crypto wallet extension
  • Securing a 12-24 word recovery phrase
  • Acquiring native tokens for gas fees
  • Understanding transaction approvals and signatures
  • Managing multiple wallet addresses across chains

For crypto veterans, this is routine. For the average Candy Crush player, it's absurd friction for uncertain value.

Playnance, a Web3 infrastructure company that emerged from stealth in early 2026, demonstrated the solution: make blockchain invisible. Their platform processes approximately 1.5 million on-chain transactions daily from 10,000+ users—the majority originating from Web2 environments. Users onboard through familiar account creation flows while blockchain functionality runs silently in the background. No external wallets. No manual key management.

Sony's Soneium is applying this same philosophy, but with something Playnance doesn't have: distribution at massive scale through LINE's 200 million user base.

Sony's Soneium: Built for Mass Adoption

Soneium isn't Sony's first blockchain experiment, but it's the first designed explicitly for mainstream consumer adoption. Launched in January 2025 as an Ethereum Layer 2 using Optimism's OP Stack, Soneium prioritizes speed, low cost, and compatibility with Ethereum's existing ecosystem.

The technical foundation is solid:

  • 2-second block times enable real-time gaming interactions
  • Sub-10-second finality through Soneium's Fast Finality Layer (powered by Astar Network, AltLayer, and EigenLayer)
  • Optimistic rollup architecture with fraud proof mechanisms for security
  • Full EVM compatibility allowing developers to deploy existing Ethereum smart contracts

But the real differentiator isn't the technology stack—it's the integration strategy. Rather than building games and hoping users come, Soneium is embedding blockchain into platforms where users already spend time.

LINE is the perfect partner. With 200 million active users concentrated in Japan, Taiwan, Thailand, and other Asian markets, LINE functions as a "super app"—messaging, payments, shopping, and now gaming all in one platform. For many users in these regions, LINE isn't just an app; it's digital infrastructure.

By January 2026, just one year after mainnet launch, Soneium's metrics demonstrated real traction:

  • 500 million transactions processed
  • 5.4 million active wallets created
  • 250+ live dApps deployed
  • Additional $13 million investment from Sony to scale on-chain entertainment infrastructure

These aren't vanity metrics inflated by bot activity or airdrop farming. These represent actual on-chain activity from applications building on Soneium's infrastructure.

Four Games, One Mission: Making Blockchain Invisible

The LINE integration debuts with four mini-apps, each designed to meet users where they already are:

Sleepagotchi LITE: Gamifying Wellness

Sleep-to-earn applications have flirted with success before, but most suffered from unsustainable token economics or complex onboarding. Sleepagotchi LITE reached 1 million users on Telegram in its first month by focusing on simplicity: go to sleep, wake up, earn rewards.

The blockchain integration enables verifiable reward distribution and interoperability with other Soneium applications. Users don't need to understand these mechanics—they just see rewards appearing after maintaining healthy sleep habits. The blockchain rails enable features impossible in Web2: provably fair reward distribution, portable progress across games, and true ownership of earned assets.

Farm Frens: Simulation Meets Speculation

Amihan Entertainment's Farm Frens raised over $10 million before its Soneium relaunch, signaling strong investor confidence in its model. Farming simulators have massive appeal—FarmVille alone had 80 million monthly users at its peak. Farm Frens brings that casual accessibility while adding blockchain-enabled features: tradeable crops, scarce land NFTs, and player-driven economies.

The key innovation is abstraction. Players farm, harvest, and trade using familiar game mechanics. The fact that crops are tokens and land is NFTs is implementation detail, not user experience.

Puffy Match: Quick-Play Meets Crypto Rewards

Developed by Moonveil and powered by zk-Layer 2 and AI, Puffy Match targets the massive casual puzzle game market. Think Bejeweled or Candy Crush, but with blockchain-backed rewards. The zero-knowledge proof integration enables privacy-preserving competition—players can verify others' scores without exposing gameplay data.

With 2-second block times, Soneium can handle the rapid state updates quick-play games require. Players match, score, and earn rewards in real-time without waiting for transaction confirmations that plague slower blockchains.

Pocket Mob: Social Strategy With Portable Rewards

Sonzai Labs' Pocket Mob is a social strategy RPG where players earn Respect points convertible to NFT rewards. The social mechanics leverage LINE's existing social graph—players can battle friends, form alliances, and trade items without leaving the messaging app.

The blockchain integration enables true ownership and portability. Respect points and earned NFTs aren't trapped in a siloed database—they're on-chain assets that can be used across the Soneium ecosystem, traded on marketplaces, or even bridged to Ethereum mainnet.

Technical Architecture That Enables Real-Time Gaming

Gaming places unique demands on blockchain infrastructure. Unlike DeFi transactions where a 10-second confirmation is acceptable, games require near-instant state updates. Players expect sub-100ms responsiveness; anything slower feels laggy.

Soneium's technical architecture specifically addresses these gaming requirements:

Optimistic Rollup with OP Stack

By building on Optimism's battle-tested OP Stack, Soneium inherits years of optimization and benefits from ongoing improvements. Optimistic rollups assume transactions are valid by default, only computing fraud proofs if challenged. This dramatically reduces computational overhead compared to validity rollups that prove every transaction correct.

For gaming, this means developers can process thousands of transactions per second at a fraction of Ethereum mainnet costs—critical for games generating frequent microtransactions.

Fast Finality Layer

Standard optimistic rollups face a finality problem: withdrawals to Ethereum mainnet require a 7-day challenge period. While this doesn't affect transactions staying within the L2, it creates friction for users withdrawing funds or bridging assets.

Soneium addresses this with a Fast Finality Layer powered by Astar Network, AltLayer, and EigenLayer. This integration reduces finality from Ethereum's native 13 minutes to under 10 seconds, enabling near-instant withdrawals and cross-chain bridges without sacrificing security.

For gaming applications, fast finality enables real-time tournaments and competitions where prize pools can be distributed immediately upon completion rather than waiting days for finality.

2-Second Block Times

Ethereum produces blocks every 12 seconds. Even fast L2s like Arbitrum operate on 1-second block times. Soneium's 2-second blocks strike a balance between responsiveness and decentralization, enabling gaming interactions that feel instantaneous to users while maintaining sufficient time for validators to process transactions.

This architecture supports gaming features that would be impossible on slower chains:

  • Real-time competitive leaderboards
  • Instant reward distribution after gameplay
  • Live multiplayer state synchronization
  • Dynamic in-game economies responding to player actions

EVM Compatibility

By maintaining full compatibility with Ethereum's EVM, Soneium allows developers to deploy existing smart contracts without modification. This dramatically lowers development barriers—teams can build using familiar tools like Solidity, Hardhat, and Foundry rather than learning new languages or frameworks.

For Sony's strategy, this is critical. Rather than building a closed ecosystem from scratch, Soneium can leverage Ethereum's massive developer community and proven DeFi infrastructure.

Soneium For All: Fueling the Next Wave

The LINE integration demonstrates Soneium's present capabilities, but Sony's long-term play requires a sustainable developer ecosystem. Enter "Soneium For All"—a Web3 gaming and consumer app incubator launched in partnership with Astar Network and Startale Cloud Services.

Set to begin in Q3 2025, the program targets developers building consumer and gaming applications with real-world traction potential. The support structure includes:

  • $60,000 grant pool for projects integrating ASTR as utility or payment mechanism
  • Technical mentorship from Sony engineering teams
  • Infrastructure support including RPC access, development tools, and testing environments
  • Marketing amplification through Sony's global brand presence
  • Demo Day with pitch opportunities to Sony's venture capital arms

Applications opened with a June 30 deadline, seeking "onchain applications that aren't just about NFTs—think gamified trading, prediction mechanics, memes, or entirely new consumer experiences."

This approach mirrors successful Web2 accelerators like Y Combinator but with blockchain-native features: token-based incentive alignment, composable building blocks from existing dApps, and global distribution through on-chain networks.

The strategic logic is clear: LINE brings users, but sustainable growth requires developers building compelling applications. By funding the next wave of consumer apps before they choose competing chains, Soneium positions itself as the default platform for Web3 gaming and entertainment.

The Bigger Picture: Web2 to Web3 Migration

Soneium's LINE integration represents a broader industry trend: abstracting blockchain complexity to unlock mainstream adoption.

Compare this to crypto's early days, when using Bitcoin required running a full node and manually managing private keys. The innovation wasn't making blockchain simpler—it was building user-friendly wallets and exchange interfaces that handled complexity behind the scenes. Today, millions use Bitcoin through Coinbase without understanding UTXO models or signature algorithms.

Web3 gaming is undergoing the same evolution. First-generation blockchain games asked users to become crypto experts before they could play. Second-generation games, like those launching on Soneium, make blockchain an implementation detail rather than a user experience.

This shift has profound implications:

Distribution Trumps Decentralization

Pure decentralization maximalists may criticize Soneium's centralized sequencer or Sony's corporate backing. But for mainstream adoption, trust in a recognizable brand beats trust in cryptographic protocols. LINE users trust Sony more than they trust proof-of-stake validators.

Invisible Infrastructure Wins

The best infrastructure is infrastructure users never think about. LINE users won't care that Pocket Mob uses ERC-20 tokens and NFT rewards—they care that the game is fun and rewards are valuable. Developers who make blockchain invisible will capture users developers who emphasize blockchain won't.

Real-World Adoption Precedes Speculation

First-generation blockchain gaming emphasized token speculation: land sales, NFT drops, play-to-earn mechanics. This attracted crypto traders but alienated gamers. Second-generation gaming emphasizes gameplay first, with blockchain enabling features impossible in Web2: true asset ownership, portable progress, player-driven economies.

When executed well, these features enhance gaming without requiring players to become crypto experts.

Asia Leads Global Web3 Gaming

While Western markets debate crypto regulation, Asian markets are building. LINE's 200 million users are concentrated in Japan, Taiwan, and Thailand—regions with relatively clear blockchain regulations and high mobile gaming penetration. By capturing Asian markets first, Soneium positions itself for global expansion as regulatory clarity emerges in Western markets.

The Road Ahead: Challenges and Opportunities

Soneium's early traction is impressive, but scaling to hundreds of millions of users presents significant challenges:

Centralization Risks

Like most L2s, Soneium's sequencer is currently centralized. Sony processes all transactions, introducing single-point-of-failure risks and censorship concerns. While the roadmap includes decentralization plans, centralized infrastructure could undermine user trust if Sony acts maliciously or suffers technical failures.

Economic Sustainability

Early traction often relies on subsidies and incentives. Soneium For All's grant program, discounted transaction fees, and Sony's capital injections attract developers now—but these users must convert to paying customers for long-term sustainability. Gaming's free-to-play model generates revenue from 2-5% of users; Soneium needs sufficient scale to make these economics work.

Regulatory Uncertainty

While Japan has relatively clear crypto regulations, global expansion faces complexity. If Soneium enables real-money gambling or unregulated securities trading through gaming mechanics, regulators may intervene. Sony's mainstream brand makes it a higher-profile target than anonymous DeFi protocols.

Competition from Gaming Giants

Soneium isn't the only major gaming company exploring blockchain. Epic Games, Ubisoft, Square Enix, and others are building or experimenting with Web3 gaming. If a competitor with larger distribution or better execution captures the market, Soneium's technical advantages become less relevant.

Despite these challenges, Soneium has significant advantages:

  • Sony's brand and capital provide credibility and resources smaller competitors lack
  • LINE's distribution offers immediate access to 200 million potential users
  • OP Stack adoption enables easy collaboration with the broader Optimism ecosystem
  • Focus on user experience rather than token speculation differentiates it from failed projects

Conclusion: The Invisible Blockchain Revolution

The future of blockchain gaming isn't flashy NFT sales or play-to-earn bubbles—it's invisible integration into experiences people already love. When LINE users play Sleepagotchi and earn rewards, most won't know they're using blockchain technology. They'll just know the game works, the rewards are real, and they didn't need a computer science degree to start playing.

That's the revolution Soneium is betting on: blockchain powerful enough to enable new gaming mechanics, invisible enough that users never think about it.

If Sony succeeds, we won't measure success by trading volume or token prices. We'll measure it by how many LINE users seamlessly transition from Web2 gaming to Web3-powered experiences without noticing the difference—while developers gain access to composable infrastructure, fair reward distribution, and truly portable digital assets.

The next major blockchain success might not announce itself with a whitepaper and ICO. It might arrive quietly, embedded in a messaging app 200 million people already use every day, enabling gaming experiences that are subtly better in ways most players never consciously identify.

Sony's placing a $13 million bet that the best blockchain is the one you never see. Based on Soneium's first year of traction and LINE's massive user base, that bet looks increasingly smart.


Building the next generation of blockchain gaming infrastructure requires reliable, scalable node access across multiple chains. BlockEden.xyz provides enterprise-grade RPC infrastructure for game developers building on foundations designed to last—from Ethereum and Optimism to emerging L2s powering the Web3 gaming revolution.

Sources

zkTLS: The Cryptographic Bridge Making Web2 Data Verifiable On-Chain

· 14 min read
Dora Noda
Software Engineer

What if you could prove your bank balance exceeds $10,000 for a DeFi loan without revealing the exact amount? Or verify your credit score to a lending protocol without exposing your financial history? This isn't science fiction—it's the promise of zkTLS, a cryptographic protocol combining zero-knowledge proofs with Transport Layer Security to create verifiable attestations about private internet data.

While blockchain oracles have traditionally fetched public data like stock prices and sports scores, they've struggled with the exponentially larger universe of private, authenticated web data. zkTLS changes the game by transforming any HTTPS-secured website into a verifiable data source, all without requiring permission from the data holder or exposing sensitive information. As of early 2026, more than 20 projects have integrated zkTLS infrastructure across Arbitrum, Sui, Polygon, and Solana, applying it to use cases from decentralized identity to real-world asset tokenization.

The Oracle Problem That Wouldn't Die

Smart contracts have always faced a fundamental limitation: they can't directly access off-chain data. Traditional oracle solutions like Chainlink pioneered the decentralized oracle network model, enabling blockchains to consume external information through consensus mechanisms among data providers. But this approach has critical constraints.

First, traditional oracles work best with public data—stock prices, weather data, sports results. When it comes to private, authenticated data like your bank balance or medical records, the model breaks down. You can't have a decentralized network of nodes accessing your private banking portal.

Second, traditional oracles introduce trust assumptions. Even with decentralized oracle networks, you're trusting that the oracle nodes are faithfully reporting data rather than manipulating it. For public data, this trust can be distributed. For private data, it becomes a single point of failure.

Third, the cost structure doesn't scale to personalized data. Oracle networks charge per query, making it prohibitively expensive to verify individualized information for every user in a DeFi protocol. According to Mechanism Capital, traditional oracle usage is "limited to public data, and they are costly, making it difficult to scale to personally identifiable information and Web2 scenarios."

zkTLS solves all three problems simultaneously. It enables users to generate cryptographic proofs about private web data without revealing the data itself, without requiring permission from the data source, and without relying on trusted intermediaries.

How zkTLS Actually Works: Three-Party TLS Meets Zero-Knowledge

At its core, zkTLS integrates Three-Party TLS (3P-TLS) with zero-knowledge proof systems to create verifiable attestations about HTTPS sessions. The protocol involves three entities: the Prover (the user), the Verifier (typically a smart contract), and the DataSource (the TLS server, like a bank's API).

Here's how the magic happens:

The 3P-TLS Handshake

Traditional TLS establishes a secure, encrypted channel between a client and server. zkTLS extends this into a three-party protocol. The Prover and Verifier effectively collaborate to act as a single "client" communicating with the Server.

During the handshake, they jointly generate cryptographic parameters using Multi-Party Computation (MPC) techniques. The pre-master key is split between Prover and Verifier using Oblivious Linear Evaluation (OLE), with each party holding one share while the Server retains the full key. This ensures that neither the Prover nor Verifier can decrypt the session alone, but together they maintain the complete transcript.

Two Operational Modes

zkTLS implementations typically support two modes:

Proxy Mode: The Verifier acts as a proxy between Prover and Server, recording traffic for later verification. This is simpler to implement but requires the Verifier to be online during the TLS session.

MPC Mode: Prover and Verifier work together through a series of stages based on elliptic curve Diffie-Hellman (ECDH) protocol, enhanced with MPC and oblivious transfer techniques. This mode offers stronger privacy guarantees and allows asynchronous verification.

Generating the Proof

Once the TLS session completes and the Prover has retrieved their private data, they generate a zero-knowledge proof. Modern implementations like zkPass use VOLE-in-the-Head (VOLEitH) technology paired with SoftSpokenOT, enabling proof generation in milliseconds while maintaining public verifiability.

The proof attests to several critical facts:

  1. A TLS session occurred with a specific server (verified by the server's certificate)
  2. The data retrieved meets certain conditions (e.g., bank balance > $10,000)
  3. The data was transmitted within a valid time window
  4. The integrity of the data is intact (via HMAC or AEAD verification)

Crucially, the proof reveals nothing about the actual data beyond what the Prover chooses to disclose. If you're proving your balance exceeds $10,000, the verifier learns only that single bit of information—not your actual balance, not your transaction history, not even which bank you use if you choose not to reveal it.

The zkTLS Ecosystem: From Research to Production

The zkTLS landscape has evolved rapidly from academic research to production deployments, with several key protocols leading the charge.

TLSNotary: The Pioneer

TLSNotary represents one of the most explored zkTLS models, implementing a comprehensive protocol with distinct phases: MPC-TLS (incorporating a secure three-party TLS handshake and the DEAP protocol), the Notarization phase, Selective Disclosure for data redaction, and Data Verification. At FOSDEM 2026, TLSNotary showcased how users can "liberate their user data" by generating verifiable proofs for HTTPS sessions without relying on centralized intermediaries.

zkPass: The Oracle Specialist

zkPass has emerged as the leading oracle protocol for private internet data, raising $12.5 million in Series A funding to drive its zkTLS implementation. Unlike OAuth, APIs, or centralized data providers, zkPass operates without authorization keys or intermediaries—users generate verifiable proofs directly for any HTTPS website.

The protocol's technical architecture stands out for its efficiency. By leveraging VOLE-based Zero-Knowledge Proofs, zkPass achieves proof generation in milliseconds rather than seconds. This performance matters enormously for user experience—nobody wants to wait 30 seconds to prove their identity when logging into a DeFi application.

zkPass supports selective disclosure across a wide range of data types: legal identity, financial records, healthcare information, social media interactions, gaming data, real-world assets, work experience, education credentials, and skill certifications. The protocol has already been deployed on Arbitrum, Sui, Polygon, and Solana, with more than 20 projects integrating the infrastructure in 2025 alone.

First introduced by Chainlink, DECO is a three-phase protocol where the prover, verifier, and server work together to establish secret-shared session keys. The prover and verifier effectively collaborate to fulfill the role of the "client" in traditional TLS settings, maintaining cryptographic guarantees throughout the session.

Emerging Implementations

Opacity Network represents one of the most robust deployments, building upon the TLSNotary framework with garbled circuits, oblivious transfer, proof by committee, and on-chain verification with slashing mechanisms for misbehaving notaries.

Reclaim Protocol leverages a proxy witness model, inserting an attestor node as a passive observer during a user's TLS session to create attestations without requiring complex MPC protocols.

The diversity of implementations reflects the protocol's flexibility—different use cases demand different trade-offs between privacy, performance, and decentralization.

Real-World Use Cases: From Theory to Practice

zkTLS unlocks use cases that were previously impossible or impractical for blockchain applications.

Privacy-Preserving DeFi Lending

Imagine applying for an on-chain loan. Traditional approaches force a binary choice: either conduct invasive KYC that exposes your entire financial history, or accept only over-collateralized loans that lock up capital inefficiently.

zkTLS enables a middle path. You could prove your annual income exceeds a threshold, your credit score is above a certain level, or your checking account maintains a minimum balance—all without revealing exact figures. The lending protocol gets the risk assessment it needs; you retain privacy over sensitive financial details.

Decentralized Identity and Credentials

Current digital identity systems create honeypots of personal data. A credential verification service that knows everyone's employment history, education records, and professional certifications becomes an attractive target for hackers.

zkTLS flips the model. Users can selectively prove credentials from existing Web2 sources—your LinkedIn employment history, your university transcript, your professional license from a government database—without those credentials ever being aggregated in a centralized repository. Each proof is generated locally, verified on-chain, and contains only the specific claims being made.

Bridging Web2 and Web3 Gaming

Gaming economies have long struggled with the wall between Web2 achievements and Web3 assets. With zkTLS, players could prove their Steam achievements, Fortnite rankings, or mobile game progress to unlock corresponding Web3 assets or participate in tournaments with verified skill levels. All without game developers needing to integrate blockchain APIs or share proprietary data.

Real-World Asset Tokenization

RWA tokenization requires verification of asset ownership and characteristics. zkTLS enables proving real estate ownership from county recorder databases, vehicle titles from DMV systems, or securities holdings from brokerage accounts—all without these government or financial institutions needing to build blockchain integrations.

Verifiable Web Scraping for AI Training

An emerging use case involves verifiable data provenance for AI models. zkTLS could prove that training data genuinely came from claimed sources, enabling AI model builders to cryptographically attest to their data sources without revealing proprietary datasets. This addresses growing concerns about AI model training transparency and copyright compliance.

Technical Challenges and the Road Ahead

Despite rapid progress, zkTLS faces several technical hurdles before achieving mainstream adoption.

Performance and Scalability

While modern implementations achieve millisecond-level proof generation, verification overhead remains a consideration for resource-constrained environments. On-chain verification of zkTLS proofs can be gas-intensive on Ethereum mainnet, though Layer 2 solutions and alternative chains with lower gas fees mitigate this concern.

Research into multiparty garbled circuit approaches aims to further decentralize notaries while maintaining security guarantees. As these techniques mature, we'll see zkTLS verification become cheaper and faster.

Trust Assumptions and Decentralization

Current implementations make varying trust assumptions. Proxy mode requires trusting the verifier during the TLS session. MPC mode distributes trust but requires both parties to be online simultaneously. Fully asynchronous protocols with minimal trust assumptions remain an active research area.

The notary model—where specialized nodes attest to TLS sessions—introduces new trust considerations. How many notaries are needed for security? What happens if notaries collude? Opacity Network's slashing mechanisms represent one approach, economically penalizing misbehaving notaries. But the optimal governance model for decentralized notaries is still being discovered.

Certificate Authority Dependencies

zkTLS inherits TLS's reliance on the traditional Certificate Authority (CA) infrastructure. If a CA is compromised or issues fraudulent certificates, zkTLS proofs could be generated for fake data. While this is a known issue in web security broadly, it becomes more critical when these proofs have financial consequences in DeFi applications.

Future developments might integrate certificate transparency logs or decentralized PKI systems to reduce dependence on traditional CAs.

Privacy vs. Compliance

zkTLS's privacy-preserving properties create tension with regulatory compliance requirements. Financial regulations often mandate that institutions maintain detailed records of customer transactions and identities. A system where users generate proofs locally, revealing minimal information, complicates compliance.

The solution likely involves selective disclosure mechanisms sophisticated enough to satisfy both privacy and regulatory requirements. Users might prove compliance with relevant regulations (e.g., "I am not a sanctioned individual") without revealing unnecessary personal details. But building these nuanced disclosure systems requires collaboration between cryptographers, lawyers, and regulators.

The Verifiable Internet: A Vision Taking Shape

zkTLS represents more than a clever cryptographic trick—it's a fundamental reimagining of how digital trust works. For three decades, the web has operated on a model where trust means revealing information to centralized gatekeepers. Banks verify your identity by collecting comprehensive documentation. Platforms prove your credentials by centralizing all user data. Services establish trust by accessing your private accounts directly.

zkTLS inverts this paradigm. Trust no longer requires revelation. Verification no longer demands centralization. Proof no longer necessitates exposure.

The implications extend far beyond DeFi and crypto. A verifiable internet could reshape digital privacy broadly. Imagine proving your age to access content without revealing your birth date. Demonstrating employment authorization without exposing immigration status. Verifying creditworthiness without surrendering your entire financial history to every lender.

As zkTLS protocols mature and adoption accelerates, we're witnessing the early stages of what might be called "privacy-preserving interoperability"—the ability for disparate systems to verify claims about each other without sharing underlying data. It's a future where privacy and verification aren't trade-offs but complements.

For blockchain developers, zkTLS opens design space that was simply closed before. Applications that require real-world data inputs—lending, insurance, derivatives—can now access the vast universe of private, authenticated web data. The next wave of DeFi protocols will likely rely as much on zkTLS oracles for private data as today's protocols rely on Chainlink for public data.

The technology has moved from research papers to production systems. The use cases have evolved from theoretical examples to live applications. The infrastructure is being built, protocols are being standardized, and developers are getting comfortable with the paradigms. zkTLS isn't coming—it's here. The question now is which applications will be first to fully exploit its potential.

Sources