SuperVerse (SUPER) sustainability report
| Name | BlockNodes SAS |
| Relevant legal entity identifier | 969500PZJWT3TD1SUI59 |
| Name of the crypto-asset | SuperVerse |
| Beginning of the period to which the disclosure relates | 2025-04-29 |
| End of the period to which the disclosure relates | 2026-04-29 |
| Energy consumption | 3096.80841 kWh/a |
Consensus Mechanism
SuperVerse is present on the following networks: Avalanche, Base, Ethereum, Polygon.
The Avalanche blockchain network implements a sophisticated Proof-of-Stake (PoS) mechanism known as Avalanche Consensus, distinguishing itself from many other PoS protocols by incorporating a novel, subsampling-based approach rather than a traditional Byzantine Fault Tolerant (BFT) consensus. This unique consensus process is built upon three integrated protocols: Snowball, Snowflake, and Avalanche, all working in concert to achieve high throughput, rapid finality, and robust security. The process begins with the Snowball protocol, where each validator randomly samples a small, fixed-size group of other validators. Through repeated polling of these sampled validators, a preference for a particular transaction is established. Validators maintain confidence counters for each transaction, incrementing them as sampled validators express support for their chosen transaction. A transaction is deemed accepted once its confidence counter surpasses a predefined threshold. Building upon Snowball, the Snowflake protocol refines the process by introducing a binary decision system, compelling validators to choose between two conflicting transactions. Binary confidence counters track the preferred binary choice, and once a specific confidence level is attained, the decision becomes final and irreversible. The overarching Avalanche protocol organizes transactions using a Directed Acyclic Graph (DAG) structure. This DAG architecture is crucial for facilitating parallel transaction processing, which significantly enhances the network's overall throughput and efficiency. Transactions are added to the DAG based on their intrinsic dependencies, ensuring a consistent and logical order across the network. Ultimately, validators reach consensus on both the structure and content of this DAG through the iterative application of the Snowball and Snowflake protocols. The Avalanche X-Chain, a component of the broader Avalanche network, also utilizes this Avalanche consensus protocol, emphasizing repeated subsampling of validators to achieve agreement on transactions. Furthermore, networks like Flare integrate the Avalanche Consensus with a Federated Byzantine Agreement (FBA) model to further bolster scalability, security, and decentralization, leveraging a gossip protocol for rapid node communication and transaction confirmation.
Base operates as a Layer-2 (L2) scaling solution built on the Ethereum blockchain, having been developed by Coinbase using Optimism's OP Stack. Critically, Base L2 transactions do not possess an independent consensus mechanism. Instead, their validation is directly linked to and secured by the underlying Ethereum Layer-1 (L1) network. This is achieved through a specialized component known as a sequencer. The sequencer's role is to aggregate multiple L2 transactions into bundles, which are then regularly published to the Ethereum mainnet as a single L1 transaction.
Consequently, all transactions processed on the Base network are indirectly secured by Ethereum's robust Proof-of-Stake (PoS) consensus mechanism once they are recorded on L1. Ethereum's PoS system, established with "The Merge" in 2022, moves away from energy-intensive mining by requiring validators to stake at least 32 ETH. In this system, a validator is randomly selected every 12 seconds to propose a new block, while other validators on the network are responsible for verifying its integrity. The network employs a sophisticated slot and epoch system, with transaction finality typically occurring after two epochs, which translates to approximately 12.8 minutes, utilizing the Casper-FFG protocol. The Beacon Chain is central to coordinating validators, and the LMD-GHOST fork-choice rule ensures the chain adheres to the path with the most accumulated validator votes. Validators are incentivized with rewards for their participation in proposing and verifying blocks, but face stringent penalties, known as slashing, for any malicious actions or prolonged inactivity. This design choice by Ethereum aims to significantly enhance energy efficiency, security, and scalability, with ongoing and future upgrades, such as Proto-Danksharding, further targeting improvements in transaction processing efficiency, thereby benefiting Base as its foundational security layer. Base specifically leverages Optimistic Rollups as part of the OP Stack, meaning transactions are presumed valid unless challenged within a specified period via fault proofs.
The Ethereum blockchain network, following "The Merge" in 2022, operates on a Proof-of-Stake (PoS) consensus mechanism, a significant departure from its previous Proof of Work system. This transition replaced energy-intensive mining with validator staking, aiming to enhance energy efficiency, security, and scalability. In this model, participants willing to secure the network act as validators by staking a minimum of 32 units of the network's native asset (Ether). The network organizes its operations around a precise slot and epoch system. Every 12 seconds, a validator is randomly selected to propose a new block. Following this proposal, other validators on the network verify the integrity and validity of the block. Finalization of transactions, meaning they become irreversible, occurs after approximately two epochs, which translates to about 12.8 minutes, utilizing the Casper-FFG (Friendly Finality Gadget) protocol. The Beacon Chain plays a central role in coordinating the activities of these validators, while the LMD-GHOST (Latest Message Driven-Greedy Heaviest Observed SubTree) fork-choice rule is employed to ensure all network participants agree on the canonical chain, following the branch with the heaviest accumulated validator votes. Validators are economically incentivized for their honest participation in proposing and verifying blocks, but they also face severe penalties, known as slashing, for malicious actions or prolonged inactivity. This PoS framework is designed not only to reduce the network's environmental footprint but also to lay the groundwork for future upgrades, such as Proto-Danksharding, which are intended to further improve transaction efficiency and overall network throughput. The core components like validator selection, block production, and transaction finality are intrinsically tied to the amount of Ether staked, ensuring that participants have a vested interest in the network's security and stability.
The Polygon blockchain network, originally known as Matic Network, operates as a Layer 2 scaling solution for Ethereum, leveraging a sophisticated hybrid consensus mechanism to enhance scalability, ensure security, and maintain decentralization. The foundational elements of its consensus protocol are built upon a combination of Proof of Stake (PoS) and Plasma Chains. Within the PoS framework, validators are selected based on the number of MATIC tokens they have staked, with a larger stake increasing their probability of being chosen to validate transactions and produce new blocks. This system also allows MATIC token holders who prefer not to run their own validator nodes to delegate their tokens to trusted validators, thereby earning a share of the rewards and actively contributing to the network's overall security and decentralization.
Supplementing PoS, Polygon utilizes Plasma Chains, which serve as a framework for establishing child chains that run in parallel with the main Ethereum chain. These child chains facilitate off-chain transaction processing, significantly improving transaction throughput and reducing congestion on the Ethereum mainnet by committing only the final, aggregated state back to Ethereum. To uphold the integrity and security of these off-chain transactions, Plasma Chains incorporate a robust fraud-proof mechanism, enabling the challenging and potential reversion of any detected fraudulent activity.
The consensus process on Polygon begins with validators confirming the validity of transactions and subsequently integrating them into blocks. Validators then propose new blocks, with their staked tokens influencing their voting power, and engage in a collective voting process to reach consensus. A new block is officially added to the blockchain upon receiving a majority of votes. A critical security measure is the periodic checkpointing system, where snapshots of the Polygon sidechain's state are regularly submitted to the Ethereum main chain, thereby leveraging Ethereum's inherent security for the finality of Polygon's transactions. The Plasma framework further enables off-chain validation of transactions on child chains, with their final states eventually submitted to the Ethereum main chain, and fraud proofs ready to challenge any suspicious transactions within a specified period, collectively reinforcing Polygon's operational integrity and security.
Incentive Mechanisms and Applicable Fees
SuperVerse is present on the following networks: Avalanche, Base, Ethereum, Polygon.
The Avalanche blockchain network employs a comprehensive system of incentive mechanisms and fees designed to ensure its security, integrity, and efficiency, primarily through its Avalanche Consensus mechanism. Validators, who are critical to the network's operation, are required to stake a certain amount of AVAX tokens. The quantity of staked tokens directly influences their likelihood of being chosen to propose or validate new blocks. In return for their active participation, validators receive rewards, which are calculated proportionally to the amount of AVAX they have staked, as well as their consistent uptime and overall performance in validating transactions. To further decentralize participation, validators can also accept delegations from other token holders. These delegators subsequently share in the earned rewards, thus incentivizing smaller token holders to contribute indirectly to the network's security. The economic incentives for validators extend beyond staking rewards to include block rewards, which are distributed from the inflationary issuance of new AVAX tokens for proposing and validating blocks. Additionally, validators earn a portion of the transaction fees paid by users across the network, covering simple transactions, complex smart contract interactions, and the creation of new assets. Crucially, Avalanche's penalty system differs from some other Proof-of-Stake systems by not employing 'slashing,' which involves the confiscation of staked tokens for misbehavior. Instead, the network relies on the economic disincentive of lost future rewards. Validators who fail to maintain consistent uptime or engage in malicious activities will simply miss out on potential earnings, providing a strong incentive for honest and reliable behavior. The network also imposes clear uptime requirements, where poor performance directly impacts a validator's ability to earn rewards. Fees on the Avalanche blockchain are structured to be dynamic, adjusting based on current network demand and the computational complexity of transactions. This ensures that fees remain equitable and reflect the actual network usage. A significant portion of these transaction fees is 'burned,' meaning they are permanently removed from circulation. This deflationary mechanism helps to offset the inflationary effects of block rewards and aims to enhance the long-term value of AVAX tokens. Fees for deploying and interacting with smart contracts are determined by the required computational resources, promoting efficient resource utilization. Similarly, fees are imposed for creating new assets on the network, a measure designed to deter spam and ensure that network resources are utilized by serious projects. On the Avalanche X-Chain, validator incentives are realized indirectly through the network's overall AVAX issuance, while its transaction fees are fixed and burned to combat spam and progressively reduce the total supply of AVAX.
The Base blockchain, as an Ethereum Layer-2 solution utilizing Optimistic Rollups from the OP Stack, implements incentive mechanisms primarily focused on optimizing transaction costs and ensuring secure asset transfers, leveraging the economic security of its underlying Ethereum L1. A core incentive to use Base is its efficiency in reducing transaction expenses. This is achieved by a sequencer that bundles numerous L2 transactions together, submitting them as a single, consolidated L1 transaction to Ethereum. This process significantly lowers the average transaction cost for individual L2 operations, as the collective L2 transactions share the cost of the single L1 transaction fee, thereby making Base a more economically attractive option compared to direct L1 usage.
For the secure movement of crypto-assets between Base and Ethereum, a specialized smart contract on the Ethereum network is employed. Since Base, as an L2, does not manage its own consensus for fund withdrawals, an additional mechanism is in place to guarantee that only legitimate funds can be moved off the L2. When a user initiates a withdrawal request on Ethereum's L1, a predetermined challenge period begins. During this window, any other network participant has the opportunity to submit a "fault proof" if they detect a fraudulent withdrawal attempt, triggering a dispute resolution process. This entire system is strategically designed with economic incentives to encourage honest behavior and deter malicious activities, although specific details of these economic incentives for fault proof submission are not explicitly outlined beyond the general principle.
Furthermore, Base inherits and benefits from the robust incentive structure of Ethereum’s Proof-of-Stake (PoS) system, which indirectly secures Base transactions. Ethereum validators, by staking a minimum of 32 ETH, are rewarded for proposing and attesting to valid blocks, as well as for participating in sync committees. These rewards are distributed through newly issued ETH and a portion of transaction fees. Under the EIP-1559 fee model, transaction fees comprise a base fee, which is algorithmically burned to manage supply, and an optional priority fee (or 'tip') paid directly to validators. To maintain network integrity, validators face economic penalties, known as slashing, if they engage in malicious conduct or fail to perform their duties. This comprehensive incentive framework ensures strong security alignment for Base by reinforcing reliable validator behavior on its underlying L1.
The Ethereum network's Proof-of-Stake (PoS) system is underpinned by a robust framework of incentive mechanisms and applicable fees, meticulously designed to secure transactions and encourage active, honest participation from validators. Validators, who are essential for the network's operation, commit at least 32 units of the network's native asset (Ether) to secure their role. Their primary incentives include rewards for successfully proposing new blocks, attesting to the validity of other blocks, and participating in sync committees, all of which contribute to the network's integrity and consensus. These rewards are distributed in newly issued Ether, alongside a portion of the transaction fees generated on the network. A key feature of Ethereum's fee structure is the implementation of EIP-1559, which divides transaction fees into two main components. The first is a base fee, which is automatically burned, effectively reducing the overall supply of Ether over time and potentially introducing a deflationary aspect, especially during periods of high network activity. The second is an optional priority fee, also known as a "tip," which users can choose to pay directly to validators to incentivize faster inclusion of their transactions into a block. This dual-fee structure aims to make transaction costs more predictable for users. To enforce honest behavior and prevent malicious activities, the network employs a strict system of economic penalties, including slashing. Validators who engage in dishonest acts or demonstrate extended periods of inactivity risk losing a portion of their staked Ether, providing a powerful deterrent against misconduct and ensuring the long-term security and reliability of the network. This comprehensive system aligns the economic interests of validators with the overall health and security of the Ethereum blockchain.
The Polygon network employs a robust set of incentive mechanisms and a distinct fee structure, combining its Proof of Stake (PoS) consensus with the Plasma framework to ensure network security, encourage active participation, and maintain transaction integrity. Validators play a crucial role, securing the network by staking MATIC tokens. Their selection for validating transactions and producing new blocks is directly influenced by the quantity of tokens they have staked. In exchange for their services, validators receive rewards in the form of newly minted MATIC tokens and a portion of the transaction fees. They are responsible for proposing and voting on new blocks, with incentives structured to promote honest and efficient operation, while also deterring misconduct through potential penalties. A key security feature involves validators periodically submitting checkpoints of the Polygon sidechain to the Ethereum main chain, which leverages Ethereum's established robustness to guarantee the finality of Polygon's transactions.
Delegators, who are token holders opting not to operate their own validator nodes, can delegate their MATIC tokens to trusted validators. This delegation allows them to earn a share of the rewards distributed to their chosen validators, fostering broader community participation in securing the network and enhancing its decentralization. The economic security of Polygon is further reinforced by a slashing mechanism, which penalizes validators for malicious actions, such as double-signing transactions or extended periods of inactivity. Slashing entails the forfeiture of a portion of their staked tokens, serving as a powerful deterrent against dishonest behavior. Additionally, validators are required to bond a substantial amount of MATIC, ensuring they have a significant financial interest in upholding the network's integrity.
Regarding the fee structure, one of Polygon's significant advantages is its remarkably low transaction fees compared to the Ethereum main chain. These fees, paid in MATIC tokens, are designed to be affordable, thereby encouraging high transaction throughput and widespread user adoption. While fees on Polygon can exhibit dynamic variations based on network congestion and transaction complexity, they consistently remain considerably lower than those on Ethereum, making Polygon an attractive option for users and developers. Deploying and interacting with smart contracts on Polygon also incurs fees, which are determined by the computational resources required. These smart contract fees are also paid in MATIC and are substantially lower than on Ethereum, offering a cost-effective environment for developing and maintaining decentralized applications (dApps). Furthermore, the Plasma framework facilitates off-chain processing for state transfers and withdrawals, with associated fees also paid in MATIC, collectively contributing to a reduced overall cost of utilizing the network.
Energy consumption sources and methodologies
SuperVerse is present on the following networks: Avalanche, Base, Ethereum, Polygon.
The methodology for assessing the Avalanche network's energy consumption is founded on a 'bottom-up' approach, where individual nodes are identified as the primary contributors to the network's overall energy footprint. This comprehensive calculation aggregates energy usage across various interconnected components of the network. The assumptions underpinning these calculations are derived from extensive empirical findings, utilizing a combination of publicly available information sites, sophisticated open-source crawlers, and proprietary in-house developed crawlers. A key aspect of this methodology involves estimating the hardware deployed within the network. This estimation is primarily driven by the technical specifications and operational requirements for running the client software, which dictates the type and performance of necessary hardware devices. The energy consumption profiles of these identified hardware devices are meticulously measured in certified test laboratories to ensure accuracy. To ensure a broad and precise scope, the Functionally Fungible Group Digital Token Identifier (FFG DTI) is leveraged, whenever available, to pinpoint all relevant implementations of the crypto-asset under consideration. These mappings are regularly updated based on current data provided by the Digital Token Identifier Foundation. The data regarding specific hardware usage and the total number of network participants is based on empirically verified assumptions, consistently updated with best-effort validation. A foundational assumption in this model is that network participants generally behave in an economically rational manner. Furthermore, adhering to a precautionary principle, any uncertainties or doubts during the estimation process lead to conservative assumptions, specifically by making higher estimates for potential adverse environmental impacts. When determining the energy consumption attributable to a specific token within the Avalanche ecosystem, the energy consumption of the entire Avalanche network (including subnets like Avalanche X-Chain) is calculated first. Subsequently, a fraction of this total network energy is allocated to the token, proportional to its activity and footprint within the network. This detailed, multi-layered approach aims to provide a robust and conservative estimate of the energy consumption associated with the Avalanche blockchain.
The energy consumption calculation for the Base blockchain network is meticulously performed using a "bottom-up" approach, where individual nodes are identified as the primary contributors to the network's overall energy footprint. This methodology is based on empirical data collected from a variety of sources, including publicly available information sites, dedicated open-source crawlers, and proprietary in-house crawling tools. The fundamental aspect of estimating hardware usage within the network involves determining the minimum requirements necessary to operate the client software. The energy consumption profiles of the specific hardware devices identified are obtained from measurements conducted in certified test laboratories, ensuring a high degree of accuracy in these foundational figures.
In the process of calculating network energy consumption, the Functionally Fungible Group Digital Token Identifier (FFG DTI) is utilized when available, serving to identify and encompass all relevant implementations of a crypto-asset within the scope of analysis. These mappings are regularly updated, drawing on data provided by the Digital Token Identifier Foundation. However, the source documents do not provide specific URLs for the public information sites, open-source crawlers, or the Digital Token Identifier Foundation, preventing direct external linking within this summary.
The methodology also incorporates assumptions regarding the hardware deployed and the number of participants operating within the network. These assumptions are rigorously verified with "best effort" against empirical data to ensure their realism and accuracy. A key underlying principle is the assumption that network participants generally act in a "largely economically rational" manner. Furthermore, to adhere to a precautionary principle, conservative estimates are applied in situations of uncertainty, leading to higher projected impacts to mitigate underestimation risks. For a specific token on Base, a fraction of the network’s total energy consumption is attributed, based on the token's activity within the network.
The methodology for calculating the Ethereum network's energy consumption primarily employs a "bottom-up" approach, which focuses on the energy demands of individual nodes that are central to the network's operation. These nodes are considered the fundamental factor driving the network's overall energy use. The assumptions underpinning these calculations are derived from empirical data gathered through a variety of sources, including public information sites, open-source crawlers, and proprietary in-house crawlers developed for this purpose. A critical step in this methodology involves determining the hardware used within the network, primarily by assessing the computational and other requirements necessary to run the client software. The energy consumption characteristics of these identified hardware devices are then rigorously measured in certified test laboratories to ensure accuracy. When quantifying the energy consumption for the network, the Functionally Fungible Group Digital Token Identifier (FFG DTI) is utilized, when available, to identify all implementations of the asset in scope, with mappings regularly updated based on data from the Digital Token Identifier Foundation. The information regarding the specific hardware deployed and the total number of participants in the network relies on assumptions that are diligently verified using empirical data whenever possible. Generally, participants are presumed to act in an economically rational manner. Furthermore, adhering to a precautionary principle, if there is any doubt in estimations, conservative assumptions are made, meaning higher estimates are used for potential adverse impacts to ensure a comprehensive and cautious assessment of energy consumption.
The methodology for assessing the Polygon network's energy consumption is primarily based on a comprehensive "bottom-up" approach, which identifies the various nodes as the fundamental contributors to the network's overall energy footprint. This detailed calculation relies on empirical data collected from diverse sources, including publicly available information platforms, open-source crawlers, and proprietary in-house developed crawlers. The key factors for estimating the hardware utilized across the network are determined by the specific requirements for operating the client software. To ensure the accuracy of these estimations, the energy consumption of the identified hardware devices is precisely measured in certified test laboratories.
An integral part of this energy accounting involves the use of the Functionally Fungible Group Digital Token Identifier (FFG DTI). This identifier is employed to accurately determine and encompass all implementations of the crypto-asset relevant to the scope of analysis. The mappings derived from the FFG DTI are regularly updated, drawing upon data from the Digital Token Identifier Foundation to maintain their currency and reliability. Information concerning the specific hardware deployed and the total number of participants within the network is based on assumptions that undergo rigorous, best-effort verification using available empirical data. It is generally assumed that participants in the network behave in a largely economically rational manner. Adhering to a precautionary principle, in situations where uncertainties exist, estimates for potential adverse impacts are conservatively adjusted upwards, ensuring a robust and cautious assessment.
Crucially, due to Polygon's architectural design as a Layer 2 scaling solution for Ethereum, its energy consumption calculation incorporates a shared security model. Consequently, a proportional share of the Ethereum network's energy consumption is also attributed to Polygon, acknowledging Ethereum's foundational role in providing security to the Layer 2 solution. This specific proportion of Ethereum's energy usage is quantitatively determined based on the gas consumption on the Ethereum network. While the documents mention reliance on "public information sites" and the "Digital Token Identifier Foundation" for data, they do not provide specific URLs for these external resources.
Key energy sources and methodologies
SuperVerse is present on the following networks: Avalanche, Ethereum, Polygon.
The methodology for determining the key energy sources and the proportion of renewable energy utilized by the Avalanche blockchain network relies on a multi-pronged approach that integrates geographical data with energy mix statistics. To ascertain the percentage of renewable energy consumption, the initial step involves accurately identifying the geographical locations of the network's nodes. This crucial data is gathered through a combination of public information sites, advanced open-source crawlers, and proprietary in-house crawlers developed specifically for this purpose. In instances where comprehensive geographical distribution information for the nodes is not readily available, the methodology pivots to utilizing 'reference networks.' These reference networks are carefully selected for their comparability to Avalanche in terms of their incentivization structures and underlying consensus mechanisms, ensuring that the estimated renewable energy mix remains relevant and reflective of similar blockchain operations. Once the geographical data for the nodes (either directly identified or inferred from reference networks) is compiled, this geo-information is meticulously merged with comprehensive public data sets on electricity generation. A primary source for this integration is the data provided by Our World in Data, which offers detailed insights into the global energy landscape. The energy intensity of the network is then calculated as the marginal energy cost incurred for processing one additional transaction. This granular measurement provides a precise understanding of the energy overhead per unit of network activity. The specific datasets and sources referenced for this methodology include: Ember (2025) and the Energy Institute - Statistical Review of World Energy (2024), both of which undergo significant processing by Our World in Data. The dataset titled “Share of electricity generated by renewables – Ember and Energy Institute” is a key input, comprising original data from Ember’s “Yearly Electricity Data Europe” and “Yearly Electricity Data,” alongside the Energy Institute’s “Statistical Review of World Energy.” This information is publicly accessible at Share of electricity generated by renewables – Ember and Energy Institute.
To ascertain the proportion of renewable energy utilized by the Ethereum network, a specific set of methodologies is applied. The initial step involves pinpointing the geographical locations of the network's nodes. This crucial geo-information is gathered through various means, including publicly available information sites, as well as both open-source and internally developed crawlers designed to scan the network. In instances where comprehensive geographical data for nodes is not directly accessible, the analysis resorts to leveraging "reference networks." These are comparable networks chosen for their similar incentivization structures and consensus mechanisms, providing a proxy for node distribution. Once the geo-information is established, it is then integrated and cross-referenced with public data obtained from "Our World in Data." This comprehensive dataset offers insights into the energy mixes and renewable energy penetration across different regions globally. The final calculation of energy intensity is defined as the marginal energy cost incurred for processing one additional transaction on the network. This approach allows for an estimation of the energy footprint associated with scaling the network's transactional volume. For detailed information and the underlying data sources on the share of electricity generated by renewables, relevant information can be found through sources such as Ember (2025) and the Energy Institute - Statistical Review of World Energy (2024), with further processing by Our World in Data, accessible via Share of electricity generated by renewables – Ember and Energy Institute.
The available documentation details the methodologies for calculating the Polygon network's energy consumption, but it does not explicitly identify the key energy sources (e.g., renewable vs. non-renewable electricity, specific grid mixes) that power its underlying infrastructure. Instead, the focus is on the methodology of consumption assessment. The energy calculation employs a "bottom-up" approach, which considers individual nodes as the primary units of energy consumption within the network. This methodology draws on empirical findings from various data points, including public information sites, open-source crawlers, and proprietary in-house developed crawlers, to estimate the hardware utilized across the network.
The primary determinants for estimating the hardware's energy usage are the computational requirements for running the client software. The energy consumption of these specific hardware devices is meticulously measured and verified in certified test laboratories to ensure precise data collection. To accurately scope all relevant implementations of the crypto-asset for energy calculation, the Functionally Fungible Group Digital Token Identifier (FFG DTI) is utilized, with its mappings regularly updated through data from the Digital Token Identifier Foundation. Assumptions regarding the hardware in operation and the total count of network participants are diligently verified against empirical data, operating under the premise that participants are largely economically rational. In line with a precautionary principle, any uncertainties default to conservative estimates, leaning towards higher figures for potential adverse impacts.
Significantly, as Polygon functions as a Layer 2 scaling solution for Ethereum, its energy consumption calculation also integrates a portion of the Ethereum network's energy usage. This inclusion acknowledges Ethereum's fundamental role in providing security to Polygon. The specific proportion attributed is determined by the gas consumption on the Ethereum network, ensuring a comprehensive view of Polygon's energy demand, considering its reliance on the main Layer 1 chain. While these methodologies provide a clear framework for quantifying energy use, specific details regarding the actual sources of this energy are not elaborated upon in the provided documents, nor are any direct links to external documents specifying these sources or methodologies furnished.
Key GHG sources and methodologies
SuperVerse is present on the following networks: Avalanche, Ethereum, Polygon.
The methodology employed to determine the Greenhouse Gas (GHG) emissions associated with the Avalanche blockchain network involves a detailed process of locating network infrastructure and integrating this geographical data with carbon intensity statistics. The initial step is to precisely identify the locations of the network's nodes, a task accomplished through the diligent use of public information sites, sophisticated open-source crawlers, and specialized in-house crawlers. This geographical mapping is fundamental to understanding the specific energy grids from which the nodes draw their power. In situations where direct geographical information on node distribution is insufficient, the methodology relies on 'reference networks.' These are selected based on their structural similarities to Avalanche, particularly concerning their incentivization mechanisms and consensus protocols, ensuring that the estimates are as representative as possible. The collected geo-information, whether direct or inferred, is then carefully integrated with public data regarding the carbon intensity of electricity generation. A significant source for this critical data is Our World in Data, which provides comprehensive global information on electricity generation’s carbon footprint. The GHG intensity of the network is quantified as the marginal emission generated per additional transaction processed. This metric allows for a precise evaluation of the environmental impact as network activity scales. The foundational data and citations for this methodology include: Ember (2025) and the Energy Institute - Statistical Review of World Energy (2024), which have been extensively processed by Our World in Data. The specific dataset used is titled “Carbon intensity of electricity generation – Ember and Energy Institute,” drawing original data from Ember’s “Yearly Electricity Data Europe” and “Yearly Electricity Data,” as well as the Energy Institute’s “Statistical Review of World Energy.” This crucial resource for carbon intensity data is available under a CC BY 4.0 license at Carbon intensity of electricity generation – Ember and Energy Institute.
The methodology for determining the Greenhouse Gas (GHG) emissions of the Ethereum network closely mirrors the approach used for energy consumption, focusing on identifying emission sources and their quantification. The initial and fundamental step involves precisely identifying the geographical locations of the network's operational nodes. This data collection is facilitated through a combination of publicly available information, as well as specialized open-source and proprietary crawlers designed to actively discover and map node distributions across the globe. Should there be an absence of specific geographic information for the nodes, the analysis intelligently defaults to utilizing "reference networks." These are carefully selected networks that exhibit comparable characteristics in terms of their incentivization structures and consensus mechanisms, providing a basis for estimating the geographic spread when direct data is unavailable. This collected geo-information is then meticulously integrated with publicly accessible data from "Our World in Data." This integration allows for the application of regional carbon intensity factors to the estimated energy consumption, thereby enabling the calculation of associated GHG emissions. The overall GHG intensity is quantified as the marginal emission generated per additional transaction processed on the network, offering a metric for the environmental impact of increased network activity. For detailed information and original data regarding the carbon intensity of electricity generation, sources include Ember (2025) and the Energy Institute - Statistical Review of World Energy (2024), processed by Our World in Data, available at Carbon intensity of electricity generation – Ember and Energy Institute. This resource is licensed under CC BY 4.0.
The provided documents offer comprehensive details regarding the methodologies for calculating the energy consumption of the Polygon blockchain network, which are predicated on a "bottom-up" approach focusing on node energy demand, hardware requirements, and the integration of a proportion of Ethereum's energy consumption due to Polygon's Layer 2 architecture. This framework is robust for quantifying electrical energy usage. However, when addressing the topic of key Greenhouse Gas (GHG) sources and their associated methodologies, the provided information is notably insufficient. The documents do not contain any specific data or discussions pertaining to the direct or indirect GHG emissions generated by the Polygon network's operations.
Crucially, there is no mention of the types of emissions (e.g., Scope 1 for direct emissions, Scope 2 for indirect emissions from purchased electricity, or Scope 3 for other indirect emissions within the value chain), nor any dedicated methodologies for calculating, monitoring, or reporting these GHG emissions. The absence of information on the energy mix that powers the network's validators and underlying infrastructure – whether it is predominantly from renewable sources, fossil fuels, or a specific national grid mix – makes it impossible to determine the carbon intensity of the energy consumed. Without such details, a comprehensive assessment of GHG sources cannot be made.
While the methodology for energy consumption includes a "precautionary principle" to make higher estimates for "adverse impacts," these impacts are not explicitly defined or quantified in terms of GHG emissions. There is no information provided on specific conversion factors used to translate energy consumption into carbon dioxide equivalents or other greenhouse gases. The documents do not offer any external links or references to dedicated environmental impact assessments or GHG reporting standards followed by the Polygon network. Consequently, based solely on the provided information, it is not possible to identify the key GHG sources or the specific methodologies employed for their quantification within the Polygon ecosystem.