Ethena (ENA) sustainability report
| Name | BlockNodes SAS |
| Relevant legal entity identifier | 969500PZJWT3TD1SUI59 |
| Name of the crypto-asset | Ethena |
| Beginning of the period to which the disclosure relates | 2025-04-29 |
| End of the period to which the disclosure relates | 2026-04-29 |
| Energy consumption | 5115.77824 kWh/a |
Consensus Mechanism
Ethena is present on the following networks: Arbitrum, Avalanche, Base, Ethereum, Kava, Optimism, Zksync.
Arbitrum, an innovative Layer 2 scaling solution built on top of Ethereum, utilizes an Optimistic Rollup consensus mechanism to significantly enhance transaction scalability and reduce operational costs. This optimistic approach operates on the fundamental assumption that all transactions processed off-chain are valid by default. Consequently, transactions only undergo a rigorous verification process if their validity is explicitly challenged during a specific time window.
The core architecture of the Arbitrum network integrates several key components essential for its functionality. The Sequencer plays a pivotal role by efficiently ordering user transactions and aggregating them into batches, which are then processed off-chain. This mechanism is critical for achieving high transaction throughput and maintaining network efficiency. A Bridge facilitates secure and seamless transfers of assets between the Arbitrum Layer 2 environment and the underlying Ethereum Layer 1 mainnet, ensuring interoperability and leveraging Ethereum's robust security. Safeguarding the network from malicious activities are Fraud Proofs, an interactive verification system designed to detect and invalidate fraudulent transactions.
The transaction verification process unfolds as follows: users first submit their transactions to the Arbitrum Sequencer. The Sequencer orders these transactions, bundles them into batches, and subsequently submits these batches along with a cryptographic "state commitment" to the Ethereum mainnet. A crucial "challenge period" then commences, during which any network validator can initiate a fraud proof if they suspect an invalid state transition. Should a challenge be raised, an iterative dispute resolution protocol is activated to pinpoint the exact fraudulent step. If fraud is confirmed, the system rolls back the incorrect state, and the dishonest party is subjected to penalties. The final, validated state is then executed on the Ethereum blockchain, preserving the rollup's integrity. This combination of off-chain computation, batching, and on-chain fraud detection, as seen in networks built on the Arbitrum Nitro stack like Kinto, enables high transaction volumes at considerably lower fees.
The Avalanche blockchain network implements a sophisticated Proof-of-Stake (PoS) mechanism known as Avalanche Consensus, distinguishing itself from many other PoS protocols by incorporating a novel, subsampling-based approach rather than a traditional Byzantine Fault Tolerant (BFT) consensus. This unique consensus process is built upon three integrated protocols: Snowball, Snowflake, and Avalanche, all working in concert to achieve high throughput, rapid finality, and robust security. The process begins with the Snowball protocol, where each validator randomly samples a small, fixed-size group of other validators. Through repeated polling of these sampled validators, a preference for a particular transaction is established. Validators maintain confidence counters for each transaction, incrementing them as sampled validators express support for their chosen transaction. A transaction is deemed accepted once its confidence counter surpasses a predefined threshold. Building upon Snowball, the Snowflake protocol refines the process by introducing a binary decision system, compelling validators to choose between two conflicting transactions. Binary confidence counters track the preferred binary choice, and once a specific confidence level is attained, the decision becomes final and irreversible. The overarching Avalanche protocol organizes transactions using a Directed Acyclic Graph (DAG) structure. This DAG architecture is crucial for facilitating parallel transaction processing, which significantly enhances the network's overall throughput and efficiency. Transactions are added to the DAG based on their intrinsic dependencies, ensuring a consistent and logical order across the network. Ultimately, validators reach consensus on both the structure and content of this DAG through the iterative application of the Snowball and Snowflake protocols. The Avalanche X-Chain, a component of the broader Avalanche network, also utilizes this Avalanche consensus protocol, emphasizing repeated subsampling of validators to achieve agreement on transactions. Furthermore, networks like Flare integrate the Avalanche Consensus with a Federated Byzantine Agreement (FBA) model to further bolster scalability, security, and decentralization, leveraging a gossip protocol for rapid node communication and transaction confirmation.
Base operates as a Layer-2 (L2) scaling solution built on the Ethereum blockchain, having been developed by Coinbase using Optimism's OP Stack. Critically, Base L2 transactions do not possess an independent consensus mechanism. Instead, their validation is directly linked to and secured by the underlying Ethereum Layer-1 (L1) network. This is achieved through a specialized component known as a sequencer. The sequencer's role is to aggregate multiple L2 transactions into bundles, which are then regularly published to the Ethereum mainnet as a single L1 transaction.
Consequently, all transactions processed on the Base network are indirectly secured by Ethereum's robust Proof-of-Stake (PoS) consensus mechanism once they are recorded on L1. Ethereum's PoS system, established with "The Merge" in 2022, moves away from energy-intensive mining by requiring validators to stake at least 32 ETH. In this system, a validator is randomly selected every 12 seconds to propose a new block, while other validators on the network are responsible for verifying its integrity. The network employs a sophisticated slot and epoch system, with transaction finality typically occurring after two epochs, which translates to approximately 12.8 minutes, utilizing the Casper-FFG protocol. The Beacon Chain is central to coordinating validators, and the LMD-GHOST fork-choice rule ensures the chain adheres to the path with the most accumulated validator votes. Validators are incentivized with rewards for their participation in proposing and verifying blocks, but face stringent penalties, known as slashing, for any malicious actions or prolonged inactivity. This design choice by Ethereum aims to significantly enhance energy efficiency, security, and scalability, with ongoing and future upgrades, such as Proto-Danksharding, further targeting improvements in transaction processing efficiency, thereby benefiting Base as its foundational security layer. Base specifically leverages Optimistic Rollups as part of the OP Stack, meaning transactions are presumed valid unless challenged within a specified period via fault proofs.
The Ethereum blockchain network, following "The Merge" in 2022, operates on a Proof-of-Stake (PoS) consensus mechanism, a significant departure from its previous Proof of Work system. This transition replaced energy-intensive mining with validator staking, aiming to enhance energy efficiency, security, and scalability. In this model, participants willing to secure the network act as validators by staking a minimum of 32 units of the network's native asset (Ether). The network organizes its operations around a precise slot and epoch system. Every 12 seconds, a validator is randomly selected to propose a new block. Following this proposal, other validators on the network verify the integrity and validity of the block. Finalization of transactions, meaning they become irreversible, occurs after approximately two epochs, which translates to about 12.8 minutes, utilizing the Casper-FFG (Friendly Finality Gadget) protocol. The Beacon Chain plays a central role in coordinating the activities of these validators, while the LMD-GHOST (Latest Message Driven-Greedy Heaviest Observed SubTree) fork-choice rule is employed to ensure all network participants agree on the canonical chain, following the branch with the heaviest accumulated validator votes. Validators are economically incentivized for their honest participation in proposing and verifying blocks, but they also face severe penalties, known as slashing, for malicious actions or prolonged inactivity. This PoS framework is designed not only to reduce the network's environmental footprint but also to lay the groundwork for future upgrades, such as Proto-Danksharding, which are intended to further improve transaction efficiency and overall network throughput. The core components like validator selection, block production, and transaction finality are intrinsically tied to the amount of Ether staked, ensuring that participants have a vested interest in the network's security and stability.
The Kava blockchain network employs a robust Proof of Stake (PoS) consensus mechanism, integrated with the Tendermint Core consensus engine, to ensure high levels of security, scalability, and decentralized governance. This architecture is fundamental to how transactions are validated and blocks are finalized on the Kava network. Tendermint Core, which leverages a Practical Byzantine Fault Tolerance (PBFT) based consensus algorithm, is critical for achieving rapid block finality and maintaining consistent transaction validation across the distributed ledger. This means that once a block is committed, it is considered irreversible, providing strong assurances for network participants.
Under the Proof of Stake model, validators on the Kava network are chosen based on the amount of KAVA tokens they have staked or have been delegated by other token holders. The system is configured to have the top 100 nodes, determined by their total bonded stake, responsible for the crucial tasks of validating transactions and proposing new blocks. This selective participation helps streamline the consensus process while still promoting decentralization through a competitive staking environment. To ensure accountability and foster honest participation, the Kava network incorporates a sophisticated slashing mechanism. This system penalizes validators who engage in malicious activities, such as double-signing transactions or experiencing extended periods of downtime, by reducing their staked KAVA tokens. This economic disincentive aligns validators' interests with the overall health and integrity of the network, reinforcing its security posture. The combination of Tendermint Core’s BFT properties and a well-structured PoS model with strong accountability measures makes Kava a resilient and efficient blockchain environment.
Optimism operates as a Layer 2 scaling solution for the Ethereum network, designed to boost transaction throughput and minimize costs by utilizing Optimistic Rollups while inheriting the robust security features of the underlying Ethereum main chain. The system is built upon several core components. At its heart are Optimistic Rollups, where transactions are batched into "rollup blocks" and processed off-chain. The resulting state commitments, which represent the collective outcome of these off-chain operations, are then periodically committed to the Ethereum main chain.
Key to Optimism's functionality are the "Sequencers." These entities are tasked with collecting and ordering transactions into batches. Following processing, sequencers update the Layer 2 state and transmit these updates to Ethereum. Specifically, they construct and execute Layer 2 blocks, which are subsequently posted as calldata on the Ethereum mainnet. This involves publishing a cryptographic hash of the state root and the associated transaction data. This aggregation method efficiently combines numerous Layer 2 transactions into a single Layer 1 transaction, significantly reducing the average cost per transaction.
A defining characteristic of Optimistic Rollups is its "Fraud Proof" mechanism. Transactions are initially presumed valid, facilitating rapid finality. However, a critical "challenge period" allows any network participant to submit a fraud proof if they detect an invalid transaction. If a challenge is initiated, an "interactive verification game" unfolds, meticulously breaking down the disputed transaction into granular steps to pinpoint any fraudulent activity. Should fraud be conclusively proven, the invalid state is reverted, and the dishonest sequencer or actor is penalized, typically by forfeiting their staked collateral. A batch achieves finality and its state updates become permanent only after the challenge period expires without any successful fraud proofs. This design ensures that Optimism leverages Ethereum's underlying Proof-of-Stake consensus, thereby securing all Layer 2 transactions once they are enshrined on the Layer 1 network.
Zksync utilizes a sophisticated Layer 2 scaling architecture built on zero-knowledge rollup (ZK-Rollup) technology. Unlike traditional Layer 1 networks that require every node to execute every transaction, this network aggregates numerous transactions into discrete batches off-chain. The core of its consensus and security mechanism lies in the generation of validity proofs, specifically employing zk-SNARKs (Succinct Non-Interactive Arguments of Knowledge). These cryptographic proofs provide a mathematical guarantee that all transactions within a batch are legitimate and adhere to the protocol's rules. Once a validity proof is generated, it is submitted to the Ethereum mainnet. This approach allows the network to inherit the robust security of Ethereum's base layer while significantly increasing throughput. A critical component in this process is the sequencer, which is responsible for the ordering and bundling of user transactions. Unlike optimistic rollups that rely on a challenge period and fraud proofs, Zksync provides immediate finality once the validity proof is verified on the Layer 1 chain. This architectural choice eliminates the withdrawal delays often associated with other scaling solutions. Furthermore, the network ensures data availability by publishing transaction data on-chain, which allows any participant to reconstruct the state of the network independently. This transparency maintains the decentralized nature of the system while offloading the heavy computational burden from the primary blockchain, resulting in a highly efficient and secure environment for decentralized applications.
Incentive Mechanisms and Applicable Fees
Ethena is present on the following networks: Arbitrum, Avalanche, Base, Ethereum, Kava, Optimism, Zksync.
Arbitrum One, serving as a Layer 2 scaling solution for Ethereum, incorporates a sophisticated array of incentive mechanisms to guarantee the ongoing security and integrity of its network. Central to this framework are the Validators and Sequencers. Sequencers are entrusted with the vital task of ordering user transactions and compiling them into batches for efficient off-chain processing, playing a critical role in optimizing network throughput and speed. Validators, conversely, actively monitor the Sequencers' activities, meticulously verifying state transitions and ensuring that only valid transactions are included in the batches. Both Sequencers and Validators are motivated through economic rewards, primarily derived from collected transaction fees and potentially other protocol-specific incentives, contingent on their honest and efficient performance.
Arbitrum’s security model is heavily reliant on its Fraud Proofs system. Transactions processed off-chain are initially given an "assumption of validity," which enables swift transaction finality and higher throughput. However, a predefined "challenge period" is established, during which any network participant can submit a fraud proof to contest the validity of a transaction. This acts as a powerful deterrent against malicious behavior. If a challenge is successfully brought forward, an interactive verification process is initiated to precisely identify and confirm any fraudulent activity. In instances where fraud is proven, the invalid transaction is reversed, and the dishonest actor faces economic penalties, which may include the slashing of staked tokens or other forms of financial disincentive. This balanced system of rewards for honest participation and strict penalties for malicious actions aligns participants' interests with the overall health and security of the Arbitrum network.
The Applicable Fees on the Arbitrum One blockchain are structured to be cost-effective. Users pay Layer 2 Fees for transactions executed on the Arbitrum network, which are typically significantly lower than those on the Ethereum mainnet due to reduced computational load. A specific "Arbitrum Transaction Fee" is applied to each transaction processed by the sequencer, covering the costs of processing and batch inclusion. Additionally, L1 Data Fees are incurred when batches of Layer 2 state updates are periodically posted as calldata to the Ethereum mainnet. This fee covers the requisite gas costs on Ethereum. A key economic benefit is "cost sharing," where the fixed expenses of submitting these state updates to Ethereum are distributed across multiple transactions within a batch, substantially lowering the per-transaction cost for users. For example, protocols leveraging the Arbitrum stack, such as Kinto, utilize ETH for transaction fee payments.
The Avalanche blockchain network employs a comprehensive system of incentive mechanisms and fees designed to ensure its security, integrity, and efficiency, primarily through its Avalanche Consensus mechanism. Validators, who are critical to the network's operation, are required to stake a certain amount of AVAX tokens. The quantity of staked tokens directly influences their likelihood of being chosen to propose or validate new blocks. In return for their active participation, validators receive rewards, which are calculated proportionally to the amount of AVAX they have staked, as well as their consistent uptime and overall performance in validating transactions. To further decentralize participation, validators can also accept delegations from other token holders. These delegators subsequently share in the earned rewards, thus incentivizing smaller token holders to contribute indirectly to the network's security. The economic incentives for validators extend beyond staking rewards to include block rewards, which are distributed from the inflationary issuance of new AVAX tokens for proposing and validating blocks. Additionally, validators earn a portion of the transaction fees paid by users across the network, covering simple transactions, complex smart contract interactions, and the creation of new assets. Crucially, Avalanche's penalty system differs from some other Proof-of-Stake systems by not employing 'slashing,' which involves the confiscation of staked tokens for misbehavior. Instead, the network relies on the economic disincentive of lost future rewards. Validators who fail to maintain consistent uptime or engage in malicious activities will simply miss out on potential earnings, providing a strong incentive for honest and reliable behavior. The network also imposes clear uptime requirements, where poor performance directly impacts a validator's ability to earn rewards. Fees on the Avalanche blockchain are structured to be dynamic, adjusting based on current network demand and the computational complexity of transactions. This ensures that fees remain equitable and reflect the actual network usage. A significant portion of these transaction fees is 'burned,' meaning they are permanently removed from circulation. This deflationary mechanism helps to offset the inflationary effects of block rewards and aims to enhance the long-term value of AVAX tokens. Fees for deploying and interacting with smart contracts are determined by the required computational resources, promoting efficient resource utilization. Similarly, fees are imposed for creating new assets on the network, a measure designed to deter spam and ensure that network resources are utilized by serious projects. On the Avalanche X-Chain, validator incentives are realized indirectly through the network's overall AVAX issuance, while its transaction fees are fixed and burned to combat spam and progressively reduce the total supply of AVAX.
The Base blockchain, as an Ethereum Layer-2 solution utilizing Optimistic Rollups from the OP Stack, implements incentive mechanisms primarily focused on optimizing transaction costs and ensuring secure asset transfers, leveraging the economic security of its underlying Ethereum L1. A core incentive to use Base is its efficiency in reducing transaction expenses. This is achieved by a sequencer that bundles numerous L2 transactions together, submitting them as a single, consolidated L1 transaction to Ethereum. This process significantly lowers the average transaction cost for individual L2 operations, as the collective L2 transactions share the cost of the single L1 transaction fee, thereby making Base a more economically attractive option compared to direct L1 usage.
For the secure movement of crypto-assets between Base and Ethereum, a specialized smart contract on the Ethereum network is employed. Since Base, as an L2, does not manage its own consensus for fund withdrawals, an additional mechanism is in place to guarantee that only legitimate funds can be moved off the L2. When a user initiates a withdrawal request on Ethereum's L1, a predetermined challenge period begins. During this window, any other network participant has the opportunity to submit a "fault proof" if they detect a fraudulent withdrawal attempt, triggering a dispute resolution process. This entire system is strategically designed with economic incentives to encourage honest behavior and deter malicious activities, although specific details of these economic incentives for fault proof submission are not explicitly outlined beyond the general principle.
Furthermore, Base inherits and benefits from the robust incentive structure of Ethereum’s Proof-of-Stake (PoS) system, which indirectly secures Base transactions. Ethereum validators, by staking a minimum of 32 ETH, are rewarded for proposing and attesting to valid blocks, as well as for participating in sync committees. These rewards are distributed through newly issued ETH and a portion of transaction fees. Under the EIP-1559 fee model, transaction fees comprise a base fee, which is algorithmically burned to manage supply, and an optional priority fee (or 'tip') paid directly to validators. To maintain network integrity, validators face economic penalties, known as slashing, if they engage in malicious conduct or fail to perform their duties. This comprehensive incentive framework ensures strong security alignment for Base by reinforcing reliable validator behavior on its underlying L1.
The Ethereum network's Proof-of-Stake (PoS) system is underpinned by a robust framework of incentive mechanisms and applicable fees, meticulously designed to secure transactions and encourage active, honest participation from validators. Validators, who are essential for the network's operation, commit at least 32 units of the network's native asset (Ether) to secure their role. Their primary incentives include rewards for successfully proposing new blocks, attesting to the validity of other blocks, and participating in sync committees, all of which contribute to the network's integrity and consensus. These rewards are distributed in newly issued Ether, alongside a portion of the transaction fees generated on the network. A key feature of Ethereum's fee structure is the implementation of EIP-1559, which divides transaction fees into two main components. The first is a base fee, which is automatically burned, effectively reducing the overall supply of Ether over time and potentially introducing a deflationary aspect, especially during periods of high network activity. The second is an optional priority fee, also known as a "tip," which users can choose to pay directly to validators to incentivize faster inclusion of their transactions into a block. This dual-fee structure aims to make transaction costs more predictable for users. To enforce honest behavior and prevent malicious activities, the network employs a strict system of economic penalties, including slashing. Validators who engage in dishonest acts or demonstrate extended periods of inactivity risk losing a portion of their staked Ether, providing a powerful deterrent against misconduct and ensuring the long-term security and reliability of the network. This comprehensive system aligns the economic interests of validators with the overall health and security of the Ethereum blockchain.
The Kava blockchain network utilizes a comprehensive system of incentive mechanisms and applicable fees designed to foster network security, encourage active participation from its community, and sustain its ecosystem. This framework creates a symbiotic relationship among validators, delegators, and the network itself, driven by an inflationary token model.
At the core of the incentive structure are the validator rewards. Validators, who are essential for securing the network and processing transactions, are compensated with newly minted KAVA tokens through block rewards, as well as a share of the transaction fees generated on the network. This dual reward system ensures that validators are adequately remunerated for their computational resources and honest efforts. Beyond direct validation, Kava also supports staking rewards for general KAVA token holders. These individuals can delegate their tokens to trusted validators, thereby contributing to the network's security and decentralization, and in return, they earn a proportionate share of the rewards. This delegation mechanism broadens participation in network governance and security beyond those capable of running full validator nodes.
Regarding applicable fees, users engaging in transactions on the Kava network are required to pay fees, which are denominated in KAVA tokens. These transaction fees are then distributed among the active validators and their delegators, forming a vital component of the network's ongoing maintenance and operational funding. Furthermore, Kava operates with an inflation mechanism where new KAVA tokens are periodically minted. These newly created tokens are strategically allocated to fund various ecosystem initiatives, such as the Kava Rise program. This program is instrumental in supporting the network's continuous decentralization efforts, enhancing its security infrastructure, and ensuring the long-term stability and growth of the Kava ecosystem, ultimately aligning the interests of all stakeholders with the network’s prosperity.
Optimism, functioning as an Ethereum Layer 2 scaling solution, employs Optimistic Rollups to implement a sophisticated array of incentive mechanisms and fee structures. These are meticulously designed to guarantee network security, operational efficiency, and cost-effectiveness, with a primary objective to significantly increase transaction throughput and lower costs compared to the Ethereum mainnet, all while preserving decentralization and robust security.
Sequencers are central to this model, responsible for collecting, ordering, and batching transactions off-chain, thereby optimizing the processing flow. Their economic incentive stems directly from the transaction fees they accrue from users, which drives them to process transactions swiftly and accurately. This expedited processing is crucial for the network’s overall speed and responsiveness.
A pivotal incentive mechanism is embedded within the validator and "Fraud Proofs" system. Transactions on Optimism are optimistically assumed to be valid, which inherently allows for quicker confirmation times. To prevent and address potential malicious activities, a "challenge mechanism" is in place. During a predefined challenge window, any network participant, including designated validators, can submit a fraud proof if an invalid transaction is detected. Successful challengers are rewarded for their diligence in identifying and substantiating fraudulent transactions. This reward system economically encourages active and continuous network monitoring, thus bolstering the overall security posture of the rollup. Conversely, "Economic Penalties" serve as a powerful deterrent. If a sequencer includes an invalid transaction that is subsequently and successfully challenged, they face financial repercussions, such as the loss of a portion of their staked collateral. Similarly, any form of inactivity or misbehavior by sequencers or validators can lead to penalties and the forfeiture of potential rewards, aligning participant actions with the network's best interests.
Optimism’s fee structure encompasses several categories. "Layer 2 Transaction Fees," paid by users for transactions processed on the Layer 2 network, are notably lower than those on the Ethereum mainnet due to the reduced computational load. The bundling of multiple transactions into a single batch significantly enhances this cost efficiency. Additionally, "L1 Data Fees" are incurred when state updates from Layer 2 transactions are periodically posted to the Ethereum mainnet as calldata. This fee covers the underlying gas costs on Ethereum, but these expenses are distributed across numerous transactions within a batch, further reducing individual transaction burdens. Lastly, "Smart Contract Fees" apply to the deployment and interaction with smart contracts on Optimism, calculated based on the computational resources consumed, ensuring charges are proportional to resource usage.
The Zksync network employs a multifaceted incentive and fee structure designed to balance operational efficiency with network security. The primary participants, including validators and sequencers, are compensated through transaction fees paid by users. Sequencers play a vital role in the ecosystem by ordering and bundling transactions into batches; they receive a portion of the transaction fees to cover the costs of maintaining high-performance processing and fast confirmation times. Validators, who are responsible for the computationally intensive task of generating validity proofs, are likewise rewarded for ensuring that these batches are processed accurately and efficiently. Unlike some Layer 2 solutions that might use a native utility token for all operations, Zksync utilizes Ether (ETH) as the primary currency for paying transaction fees. This integrates the network more closely with the Ethereum ecosystem and simplifies the user experience. The fee model itself is dynamic, calculating costs based on the complexity of the specific transaction—such as smart contract interactions versus simple transfers—as well as the current gas prices on the Ethereum mainnet for submitting the aggregated proofs. By batching transactions, the network significantly reduces the individual gas burden on users, making it far more cost-effective than direct Layer 1 interactions. Additionally, the protocol includes provisions for ecosystem growth rewards, allocating resources to incentivize developers and projects that contribute to the proliferation of decentralized finance (DeFi) and non-fungible token (NFT) marketplaces. This holistic approach ensures that all roles, from infrastructure providers to end-users and developers, have clear economic reasons to participate in and support the network's long-term sustainability.
Energy consumption sources and methodologies
Ethena is present on the following networks: Arbitrum, Avalanche, Base, Ethereum, Kava, Optimism, Zksync.
The methodology employed for calculating the energy consumption attributed to the Arbitrum network adopts a "bottom-up" approach, systematically assessing individual operational components to arrive at an aggregate consumption figure. Within this framework, network nodes are identified as the central and most significant contributors to the network's overall energy footprint. The foundational assumptions underpinning these calculations are derived from empirical findings, which are compiled through the extensive use of publicly available information sites, proprietary in-house crawlers developed by the assessors, and various open-source data collection tools.
A crucial step in estimating energy consumption involves accurately determining the specific hardware devices utilized within the network. This determination is made by evaluating the technical requirements necessary for operating the client software pertinent to the Arbitrum network. Once these hardware profiles are established, their corresponding energy consumption rates are precisely measured under controlled conditions in certified test laboratories, ensuring a high degree of accuracy and reliability for the baseline data. To ensure a comprehensive and accurate scope, particularly when accounting for diverse implementations of crypto-assets across different networks, the Functionally Fungible Group Digital Token Identifier (FFG DTI) is employed whenever such an identifier is available. This tool assists in clearly delineating all relevant instances of an asset, with these mappings consistently updated based on data provided by the Digital Token Identifier Foundation.
Furthermore, the methodology relies on specific assumptions regarding the type of hardware deployed and the estimated number of active participants within the network. These assumptions are subjected to continuous validation using best-effort empirical data. A general guiding principle in these estimations is the presumption that network participants act in a largely economically rational manner. In accordance with a precautionary principle, conservative estimates are applied whenever there is uncertainty, typically resulting in higher assessments of potential adverse environmental impacts. When quantifying the energy consumption for a particular crypto-asset operating on Arbitrum, a proportionate fraction of the overall network's energy consumption is allocated to that asset, based on its observed activity within the Arbitrum ecosystem. The source documents do not provide any direct external links related to this methodology.
The methodology for assessing the Avalanche network's energy consumption is founded on a 'bottom-up' approach, where individual nodes are identified as the primary contributors to the network's overall energy footprint. This comprehensive calculation aggregates energy usage across various interconnected components of the network. The assumptions underpinning these calculations are derived from extensive empirical findings, utilizing a combination of publicly available information sites, sophisticated open-source crawlers, and proprietary in-house developed crawlers. A key aspect of this methodology involves estimating the hardware deployed within the network. This estimation is primarily driven by the technical specifications and operational requirements for running the client software, which dictates the type and performance of necessary hardware devices. The energy consumption profiles of these identified hardware devices are meticulously measured in certified test laboratories to ensure accuracy. To ensure a broad and precise scope, the Functionally Fungible Group Digital Token Identifier (FFG DTI) is leveraged, whenever available, to pinpoint all relevant implementations of the crypto-asset under consideration. These mappings are regularly updated based on current data provided by the Digital Token Identifier Foundation. The data regarding specific hardware usage and the total number of network participants is based on empirically verified assumptions, consistently updated with best-effort validation. A foundational assumption in this model is that network participants generally behave in an economically rational manner. Furthermore, adhering to a precautionary principle, any uncertainties or doubts during the estimation process lead to conservative assumptions, specifically by making higher estimates for potential adverse environmental impacts. When determining the energy consumption attributable to a specific token within the Avalanche ecosystem, the energy consumption of the entire Avalanche network (including subnets like Avalanche X-Chain) is calculated first. Subsequently, a fraction of this total network energy is allocated to the token, proportional to its activity and footprint within the network. This detailed, multi-layered approach aims to provide a robust and conservative estimate of the energy consumption associated with the Avalanche blockchain.
The energy consumption calculation for the Base blockchain network is meticulously performed using a "bottom-up" approach, where individual nodes are identified as the primary contributors to the network's overall energy footprint. This methodology is based on empirical data collected from a variety of sources, including publicly available information sites, dedicated open-source crawlers, and proprietary in-house crawling tools. The fundamental aspect of estimating hardware usage within the network involves determining the minimum requirements necessary to operate the client software. The energy consumption profiles of the specific hardware devices identified are obtained from measurements conducted in certified test laboratories, ensuring a high degree of accuracy in these foundational figures.
In the process of calculating network energy consumption, the Functionally Fungible Group Digital Token Identifier (FFG DTI) is utilized when available, serving to identify and encompass all relevant implementations of a crypto-asset within the scope of analysis. These mappings are regularly updated, drawing on data provided by the Digital Token Identifier Foundation. However, the source documents do not provide specific URLs for the public information sites, open-source crawlers, or the Digital Token Identifier Foundation, preventing direct external linking within this summary.
The methodology also incorporates assumptions regarding the hardware deployed and the number of participants operating within the network. These assumptions are rigorously verified with "best effort" against empirical data to ensure their realism and accuracy. A key underlying principle is the assumption that network participants generally act in a "largely economically rational" manner. Furthermore, to adhere to a precautionary principle, conservative estimates are applied in situations of uncertainty, leading to higher projected impacts to mitigate underestimation risks. For a specific token on Base, a fraction of the network’s total energy consumption is attributed, based on the token's activity within the network.
The methodology for calculating the Ethereum network's energy consumption primarily employs a "bottom-up" approach, which focuses on the energy demands of individual nodes that are central to the network's operation. These nodes are considered the fundamental factor driving the network's overall energy use. The assumptions underpinning these calculations are derived from empirical data gathered through a variety of sources, including public information sites, open-source crawlers, and proprietary in-house crawlers developed for this purpose. A critical step in this methodology involves determining the hardware used within the network, primarily by assessing the computational and other requirements necessary to run the client software. The energy consumption characteristics of these identified hardware devices are then rigorously measured in certified test laboratories to ensure accuracy. When quantifying the energy consumption for the network, the Functionally Fungible Group Digital Token Identifier (FFG DTI) is utilized, when available, to identify all implementations of the asset in scope, with mappings regularly updated based on data from the Digital Token Identifier Foundation. The information regarding the specific hardware deployed and the total number of participants in the network relies on assumptions that are diligently verified using empirical data whenever possible. Generally, participants are presumed to act in an economically rational manner. Furthermore, adhering to a precautionary principle, if there is any doubt in estimations, conservative assumptions are made, meaning higher estimates are used for potential adverse impacts to ensure a comprehensive and cautious assessment of energy consumption.
The methodology for assessing the energy consumption of the Kava blockchain network, when evaluated as part of a broader crypto-asset's footprint (such as a token that exists across multiple DLTs), primarily employs a "bottom-up" approach. This comprehensive strategy considers the fundamental components contributing to the network's energy usage, with nodes identified as the primary drivers of consumption. The process relies on a blend of empirical findings, drawing data from publicly available information sites, proprietary in-house crawlers, and open-source crawling tools. These resources are leveraged to gather detailed insights into the operational characteristics of the network.
Key to this methodology is the estimation of hardware utilization within the network. This is primarily determined by analyzing the minimum and recommended requirements for operating the client software that powers the nodes. Once hardware specifications are identified, their respective energy consumption rates are measured under controlled conditions in certified test laboratories, ensuring accuracy and reliability. When calculating the energy consumption attributable to specific crypto-assets, such as a token like KAVA that may be deployed on multiple networks, the Functionally Fungible Group Digital Token Identifier (FFG DTI) is utilized where available. This identifier helps in scoping all implementations of the asset across different DLTs, with mappings regularly updated by the Digital Token Identifier Foundation. The data concerning the hardware and the number of participants within the network is built upon assumptions, which are diligently verified through empirical data and a general presumption of economically rational behavior among participants. A conservative precautionary principle is applied, leading to higher estimates for potential adverse impacts in situations of uncertainty, ensuring a robust and cautious assessment of the Kava network's energy footprint. While the energy consumption of the KAVA token considers its presence on various networks, the underlying methodology for assessing the Kava blockchain network's own operations focuses on its native nodes and infrastructure.
The energy consumption profile of the Optimism blockchain network, being a Layer 2 scaling solution for Ethereum, is not isolated but rather intricately integrated with and aggregated within the broader Ethereum ecosystem. Its energy usage also includes the demands of its own specialized operational components. The general approach for calculating the energy consumption of such networks, including Optimism, typically involves a "bottom-up" methodology. This method primarily identifies network nodes—which, in Optimism’s context, encompass sequencers and any participants involved in the fraud proof mechanisms—as the principal contributors to the network's energy footprint.
Energy consumption estimations are built upon empirical data gathered from diverse sources, including publicly available information, open-source crawling tools, and internal proprietary crawlers. A key determinant in these calculations is the hardware used across the network, with particular emphasis on the specific requirements for running the client software on participating nodes. The energy consumption of these hardware devices is precisely measured in certified testing laboratories. To ensure a comprehensive assessment, the Functionally Fungible Group Digital Token Identifier (FFG DTI) is utilized, where applicable, to identify all implementations of a given asset across various networks, with these mappings consistently updated using data from the Digital Token Identifier Foundation.
Moreover, data pertaining to the deployed hardware configurations and the number of active participants in the network relies on certain assumptions. These assumptions undergo rigorous verification through empirical data whenever possible. A general tenet guiding these assumptions is the presumption of economically rational behavior among network participants. As a precautionary measure, especially in instances of data ambiguity or incompleteness, estimates for adverse impacts, such as energy consumption, are deliberately made on the conservative side, meaning higher values are chosen to account for potential underestimations. For any specific crypto-asset operating on Optimism, its allocated energy consumption is determined as a fraction of the network’s total energy, proportional to that asset's activity within the network, thereby providing a robust, albeit estimated, understanding of its energy demands.
To determine the energy consumption of the Zksync network, a comprehensive methodology is applied that aggregates data from various infrastructure components. The process begins by assessing the total energy requirements of the blockchain environment, considering all participants involved in transaction processing and proof generation. A key element of this calculation involves the use of the Functionally Fungible Group Digital Token Identifier (FFG DTI) system. This identifier allows for the precise mapping of all implementations and activities associated with the network, ensuring that energy data is tracked accurately across different protocols and platforms. The data used for these assessments is frequently updated based on records from the Digital Token Identifier Foundation. In instances where direct measurements are unavailable, the methodology relies on a set of standardized assumptions regarding hardware efficiency and the number of active participants. These assumptions are grounded in the principle of economic rationality, positing that participants will optimize their operations for cost-effectiveness. However, to ensure environmental integrity, a "precautionary principle" is adopted. This means that when there is uncertainty in the data or the empirical evidence, the model leans toward more conservative estimates, which generally result in higher projected figures for energy consumption. This rigorous approach aims to capture the full scope of the network's ecological footprint, from the off-chain computation performed by sequencers and provers to the finality achieved through the Ethereum mainnet. By verifying these assumptions with the best available empirical data, the methodology provides a robust framework for understanding how Layer 2 scaling solutions interact with global energy resources.
Key energy sources and methodologies
Ethena is present on the following networks: Avalanche, Ethereum, Kava, Optimism, Zksync.
The methodology for determining the key energy sources and the proportion of renewable energy utilized by the Avalanche blockchain network relies on a multi-pronged approach that integrates geographical data with energy mix statistics. To ascertain the percentage of renewable energy consumption, the initial step involves accurately identifying the geographical locations of the network's nodes. This crucial data is gathered through a combination of public information sites, advanced open-source crawlers, and proprietary in-house crawlers developed specifically for this purpose. In instances where comprehensive geographical distribution information for the nodes is not readily available, the methodology pivots to utilizing 'reference networks.' These reference networks are carefully selected for their comparability to Avalanche in terms of their incentivization structures and underlying consensus mechanisms, ensuring that the estimated renewable energy mix remains relevant and reflective of similar blockchain operations. Once the geographical data for the nodes (either directly identified or inferred from reference networks) is compiled, this geo-information is meticulously merged with comprehensive public data sets on electricity generation. A primary source for this integration is the data provided by Our World in Data, which offers detailed insights into the global energy landscape. The energy intensity of the network is then calculated as the marginal energy cost incurred for processing one additional transaction. This granular measurement provides a precise understanding of the energy overhead per unit of network activity. The specific datasets and sources referenced for this methodology include: Ember (2025) and the Energy Institute - Statistical Review of World Energy (2024), both of which undergo significant processing by Our World in Data. The dataset titled “Share of electricity generated by renewables – Ember and Energy Institute” is a key input, comprising original data from Ember’s “Yearly Electricity Data Europe” and “Yearly Electricity Data,” alongside the Energy Institute’s “Statistical Review of World Energy.” This information is publicly accessible at Share of electricity generated by renewables – Ember and Energy Institute.
To ascertain the proportion of renewable energy utilized by the Ethereum network, a specific set of methodologies is applied. The initial step involves pinpointing the geographical locations of the network's nodes. This crucial geo-information is gathered through various means, including publicly available information sites, as well as both open-source and internally developed crawlers designed to scan the network. In instances where comprehensive geographical data for nodes is not directly accessible, the analysis resorts to leveraging "reference networks." These are comparable networks chosen for their similar incentivization structures and consensus mechanisms, providing a proxy for node distribution. Once the geo-information is established, it is then integrated and cross-referenced with public data obtained from "Our World in Data." This comprehensive dataset offers insights into the energy mixes and renewable energy penetration across different regions globally. The final calculation of energy intensity is defined as the marginal energy cost incurred for processing one additional transaction on the network. This approach allows for an estimation of the energy footprint associated with scaling the network's transactional volume. For detailed information and the underlying data sources on the share of electricity generated by renewables, relevant information can be found through sources such as Ember (2025) and the Energy Institute - Statistical Review of World Energy (2024), with further processing by Our World in Data, accessible via Share of electricity generated by renewables – Ember and Energy Institute.
To ascertain the key energy sources and their associated methodologies for the Kava blockchain network, a detailed assessment is undertaken, focusing on understanding the energy mix powering the underlying infrastructure. This process begins with efforts to pinpoint the geographical locations of the network's nodes. Data for this localization is sourced from a combination of public information platforms, advanced open-source crawlers, and specialized in-house developed crawling tools. The precise geographical distribution of nodes is critical because it directly influences the type of electricity grid they draw power from.
In instances where comprehensive geographical information regarding node distribution is not fully available, the methodology strategically incorporates data from reference networks. These reference networks are carefully selected based on their structural comparability to the Kava network, particularly concerning their incentivization frameworks and consensus mechanisms. This ensures that the energy characteristics of the reference networks provide a relevant proxy for Kava's operational profile. Once the geographical data is established, it is meticulously integrated with extensive public data on electricity generation from renowned sources like Our World in Data. This integration allows for the calculation of the proportion of renewable energy contributing to the network's power consumption. The energy intensity, a crucial metric, is then determined by calculating the marginal energy cost associated with processing one additional transaction on the network. This provides an understanding of the energy footprint per unit of activity.
Sources for electricity generation data typically include datasets such as Ember (2025) and the Energy Institute's Statistical Review of World Energy (2024), both of which are heavily processed by Our World in Data. This rigorous approach, combining direct node location data with broader energy statistics, aims to provide a transparent and accurate picture of the energy sources powering the Kava network and its environmental implications.
For more information, refer to Share of electricity generated by renewables - Ember and Energy Institute.
For the Optimism blockchain network, the notion of "key energy sources" primarily refers to the specific operational components that draw electrical power, consistent with its design as a Layer 2 solution built atop Ethereum. Optimism's energy requirements are inherently linked to the power needed to operate the hardware and infrastructure that support its sequencers. These sequencers are critical for processing and batching transactions off-chain. Additionally, the network of participants, including validators and challengers involved in the fraud proof mechanism, also contribute to the energy expenditure. Since Optimism derives its ultimate security from the Ethereum main chain, the energy consumption associated with Ethereum's underlying Proof-of-Stake validators also indirectly feeds into Optimism's overall energy footprint. While the provided documents do not specify the precise geographical locations or the specific types of power grids (e.g., renewable versus fossil fuel sources) that supply energy to these components, the functional "sources" of energy consumption are fundamentally the computational resources and networking equipment that constitute these operational nodes.
The methodology for quantifying this energy consumption adheres to a meticulous "bottom-up" approach. This process begins by identifying the exact hardware components, such as servers, processors, and associated networking gear, necessary to run the Optimism network's client software. The power draw of these individual hardware devices is typically ascertained through precise measurements conducted in certified test laboratories. The total estimated energy expenditure is then derived by multiplying the measured power consumption of these devices by their estimated operational duration and the assumed number of active participating nodes or sequencers. The Functionally Fungible Group Digital Token Identifier (FFG DTI) is employed to ensure that all relevant instances and implementations of crypto-assets within the network are accurately identified for a comprehensive measurement. Data concerning hardware utilization and the number of network participants are based on empirically verified assumptions, generally assuming economically rational behavior among participants. In situations where data is uncertain, a conservative estimation approach is applied, resulting in higher reported energy impact figures to mitigate any potential underestimations. This framework systematically accounts for the energy consumed by Optimism's operational infrastructure and its interaction with Ethereum's Layer 1, even in the absence of granular details about specific energy grid mixes.
The identification of key energy sources for the Zksync network relies on determining the geographic distribution of its infrastructure. This is achieved through a combination of public information portals, open-source web crawlers, and proprietary software designed to locate the nodes and servers supporting the network. When precise geographic data for specific nodes is missing, the methodology utilizes reference networks that share similar consensus mechanisms and incentive structures to estimate location patterns. This geographical data is then integrated with statistical information from Share of electricity generated by renewables - Ember and Energy Institute to calculate the proportion of renewable energy being utilized by the network's participants. This dataset provides a global view of electricity generation trends, allowing for a more accurate assessment of whether the power consumed comes from sustainable or traditional sources. The energy intensity of the network is further refined by calculating the marginal energy cost associated with each additional transaction. This approach moves beyond simple averages, providing insight into the incremental environmental impact of network activity. By merging internal node telemetry with external datasets like those from the Energy Institute, the analysis can distinguish between regions with high renewable penetration and those still reliant on fossil fuels. This level of detail is essential for a transparent view of the network's sustainability profile, ensuring that the environmental benefits of Layer 2 scaling are documented alongside the specific energy mix of the underlying infrastructure.
Key GHG sources and methodologies
Ethena is present on the following networks: Avalanche, Ethereum, Kava, Zksync.
The methodology employed to determine the Greenhouse Gas (GHG) emissions associated with the Avalanche blockchain network involves a detailed process of locating network infrastructure and integrating this geographical data with carbon intensity statistics. The initial step is to precisely identify the locations of the network's nodes, a task accomplished through the diligent use of public information sites, sophisticated open-source crawlers, and specialized in-house crawlers. This geographical mapping is fundamental to understanding the specific energy grids from which the nodes draw their power. In situations where direct geographical information on node distribution is insufficient, the methodology relies on 'reference networks.' These are selected based on their structural similarities to Avalanche, particularly concerning their incentivization mechanisms and consensus protocols, ensuring that the estimates are as representative as possible. The collected geo-information, whether direct or inferred, is then carefully integrated with public data regarding the carbon intensity of electricity generation. A significant source for this critical data is Our World in Data, which provides comprehensive global information on electricity generation’s carbon footprint. The GHG intensity of the network is quantified as the marginal emission generated per additional transaction processed. This metric allows for a precise evaluation of the environmental impact as network activity scales. The foundational data and citations for this methodology include: Ember (2025) and the Energy Institute - Statistical Review of World Energy (2024), which have been extensively processed by Our World in Data. The specific dataset used is titled “Carbon intensity of electricity generation – Ember and Energy Institute,” drawing original data from Ember’s “Yearly Electricity Data Europe” and “Yearly Electricity Data,” as well as the Energy Institute’s “Statistical Review of World Energy.” This crucial resource for carbon intensity data is available under a CC BY 4.0 license at Carbon intensity of electricity generation – Ember and Energy Institute.
The methodology for determining the Greenhouse Gas (GHG) emissions of the Ethereum network closely mirrors the approach used for energy consumption, focusing on identifying emission sources and their quantification. The initial and fundamental step involves precisely identifying the geographical locations of the network's operational nodes. This data collection is facilitated through a combination of publicly available information, as well as specialized open-source and proprietary crawlers designed to actively discover and map node distributions across the globe. Should there be an absence of specific geographic information for the nodes, the analysis intelligently defaults to utilizing "reference networks." These are carefully selected networks that exhibit comparable characteristics in terms of their incentivization structures and consensus mechanisms, providing a basis for estimating the geographic spread when direct data is unavailable. This collected geo-information is then meticulously integrated with publicly accessible data from "Our World in Data." This integration allows for the application of regional carbon intensity factors to the estimated energy consumption, thereby enabling the calculation of associated GHG emissions. The overall GHG intensity is quantified as the marginal emission generated per additional transaction processed on the network, offering a metric for the environmental impact of increased network activity. For detailed information and original data regarding the carbon intensity of electricity generation, sources include Ember (2025) and the Energy Institute - Statistical Review of World Energy (2024), processed by Our World in Data, available at Carbon intensity of electricity generation – Ember and Energy Institute. This resource is licensed under CC BY 4.0.
The methodology for determining the Greenhouse Gas (GHG) emissions attributable to the Kava blockchain network is closely integrated with the energy consumption assessment, building on the foundation of understanding its operational energy profile. The primary step involves accurately identifying the geographical distribution of the network's nodes, as the carbon intensity of electricity varies significantly across different regions. This geographical data is acquired through a combination of public information sites, sophisticated open-source crawlers, and specialized in-house crawling technologies.
Where direct geographic data for all nodes is insufficient, the methodology employs a pragmatic approach by utilizing reference networks. These selected reference networks share similar incentivization structures and consensus mechanisms with Kava, ensuring their GHG emission profiles serve as appropriate benchmarks. The geo-information, whether directly obtained or inferred from reference networks, is then systematically merged with comprehensive public data on the carbon intensity of electricity generation. This crucial data is often sourced from established entities such as Our World in Data, which processes information from key energy reports.
The calculation of GHG emissions then proceeds by factoring in the energy consumption data, the identified energy sources, and their corresponding carbon intensities. A critical metric derived from this analysis is the GHG intensity, which quantifies the marginal emissions produced for each additional transaction processed on the network. This granular measurement provides insight into the environmental impact per unit of network activity. Key data sources for carbon intensity typically include processed data from Ember (2025) and the Energy Institute's Statistical Review of World Energy (2024) as aggregated by Our World in Data. This multi-faceted approach aims to offer a transparent and accurate representation of the Kava network's carbon footprint, facilitating informed assessment of its environmental performance.
For more detailed information on carbon intensity, refer to Carbon intensity of electricity generation - Ember and Energy Institute.
The methodology for evaluating Greenhouse Gas (GHG) emissions for Zksync mirrors the geographic assessment used for energy sources, focusing on the carbon intensity of the power grids where the network's nodes are situated. By identifying the locations of validators and sequencers through specialized crawlers and public data, the analysis assigns specific emission factors based on regional electricity profiles. These profiles are derived from the Carbon intensity of electricity generation - Ember and Energy Institute dataset, which offers comprehensive information on the grams of CO2 equivalent produced per kilowatt-hour across different nations. The methodology categorizes emissions into different scopes, typically focusing on Scope 2 emissions related to purchased electricity for running the hardware. To provide a granular view of the network's impact, the GHG intensity is expressed as the marginal emission generated by a single additional transaction on the blockchain. This allows users and developers to understand the carbon footprint of their specific interactions with the protocol. In cases where node data is sparse, the model employs reference network comparisons to ensure that the global footprint is not underestimated. The integration of this geo-information with the data provided by Ember and the Energy Institute ensures that the final figures reflect the most current and peer-reviewed information available in the field of energy statistics. This evidence-based approach to carbon accounting allows the network to maintain a high standard of transparency and align with international sustainability reporting standards.