Sweat Economy (SWEAT) sustainability report
| Name | BlockNodes SAS |
| Relevant legal entity identifier | 969500PZJWT3TD1SUI59 |
| Name of the crypto-asset | Sweat Economy |
| Beginning of the period to which the disclosure relates | 2025-04-29 |
| End of the period to which the disclosure relates | 2026-04-29 |
| Energy consumption | 437576.78583 kWh/a |
Consensus Mechanism
Sweat Economy is present on the following networks: Aptos Coin, Arbitrum, Avalanche, Base, Binance Smart Chain, Celo, Ethereum, Near Protocol, Optimism, Polygon, Solana, Sui.
The Aptos blockchain network leverages a robust Proof-of-Stake (PoS) framework, integrated with a Byzantine Fault Tolerant (BFT) consensus protocol, to achieve high transaction throughput, minimal latency, and fortified security. A foundational component of this architecture is Block-STM, a parallel execution engine that allows for the simultaneous processing of multiple transactions. This parallel processing capability is critical for enhancing the network's overall performance and scalability, enabling it to handle a significant volume of operations efficiently. The consensus mechanism operates on a leader-based BFT model, where a specific validator is elected to propose new blocks. Following the proposal, other validators on the network are responsible for validating and subsequently finalizing these transactions. This structured approach ensures that transactions are processed in an orderly yet highly efficient manner.
To further bolster decentralization and mitigate the risk of collusion, Aptos incorporates a dynamic validator rotation system. This mechanism regularly shuffles the set of active validators, preventing any single entity or small group from gaining undue influence over the network's consensus process. A key feature of the Aptos network is its commitment to instant finality. Once transactions are validated by the network's participants, they achieve immediate and irreversible finality. This means that confirmed transactions cannot be altered or reversed, providing users and applications with a high degree of certainty and reliability. The combination of PoS for economic security, BFT for fault tolerance, parallel execution for performance, dynamic rotation for decentralization, and instant finality for reliability positions Aptos as a high-performance and secure blockchain platform designed for scalable applications.
Arbitrum, an innovative Layer 2 scaling solution built on top of Ethereum, utilizes an Optimistic Rollup consensus mechanism to significantly enhance transaction scalability and reduce operational costs. This optimistic approach operates on the fundamental assumption that all transactions processed off-chain are valid by default. Consequently, transactions only undergo a rigorous verification process if their validity is explicitly challenged during a specific time window.
The core architecture of the Arbitrum network integrates several key components essential for its functionality. The Sequencer plays a pivotal role by efficiently ordering user transactions and aggregating them into batches, which are then processed off-chain. This mechanism is critical for achieving high transaction throughput and maintaining network efficiency. A Bridge facilitates secure and seamless transfers of assets between the Arbitrum Layer 2 environment and the underlying Ethereum Layer 1 mainnet, ensuring interoperability and leveraging Ethereum's robust security. Safeguarding the network from malicious activities are Fraud Proofs, an interactive verification system designed to detect and invalidate fraudulent transactions.
The transaction verification process unfolds as follows: users first submit their transactions to the Arbitrum Sequencer. The Sequencer orders these transactions, bundles them into batches, and subsequently submits these batches along with a cryptographic "state commitment" to the Ethereum mainnet. A crucial "challenge period" then commences, during which any network validator can initiate a fraud proof if they suspect an invalid state transition. Should a challenge be raised, an iterative dispute resolution protocol is activated to pinpoint the exact fraudulent step. If fraud is confirmed, the system rolls back the incorrect state, and the dishonest party is subjected to penalties. The final, validated state is then executed on the Ethereum blockchain, preserving the rollup's integrity. This combination of off-chain computation, batching, and on-chain fraud detection, as seen in networks built on the Arbitrum Nitro stack like Kinto, enables high transaction volumes at considerably lower fees.
The Avalanche blockchain network implements a sophisticated Proof-of-Stake (PoS) mechanism known as Avalanche Consensus, distinguishing itself from many other PoS protocols by incorporating a novel, subsampling-based approach rather than a traditional Byzantine Fault Tolerant (BFT) consensus. This unique consensus process is built upon three integrated protocols: Snowball, Snowflake, and Avalanche, all working in concert to achieve high throughput, rapid finality, and robust security. The process begins with the Snowball protocol, where each validator randomly samples a small, fixed-size group of other validators. Through repeated polling of these sampled validators, a preference for a particular transaction is established. Validators maintain confidence counters for each transaction, incrementing them as sampled validators express support for their chosen transaction. A transaction is deemed accepted once its confidence counter surpasses a predefined threshold. Building upon Snowball, the Snowflake protocol refines the process by introducing a binary decision system, compelling validators to choose between two conflicting transactions. Binary confidence counters track the preferred binary choice, and once a specific confidence level is attained, the decision becomes final and irreversible. The overarching Avalanche protocol organizes transactions using a Directed Acyclic Graph (DAG) structure. This DAG architecture is crucial for facilitating parallel transaction processing, which significantly enhances the network's overall throughput and efficiency. Transactions are added to the DAG based on their intrinsic dependencies, ensuring a consistent and logical order across the network. Ultimately, validators reach consensus on both the structure and content of this DAG through the iterative application of the Snowball and Snowflake protocols. The Avalanche X-Chain, a component of the broader Avalanche network, also utilizes this Avalanche consensus protocol, emphasizing repeated subsampling of validators to achieve agreement on transactions. Furthermore, networks like Flare integrate the Avalanche Consensus with a Federated Byzantine Agreement (FBA) model to further bolster scalability, security, and decentralization, leveraging a gossip protocol for rapid node communication and transaction confirmation.
Base operates as a Layer-2 (L2) scaling solution built on the Ethereum blockchain, having been developed by Coinbase using Optimism's OP Stack. Critically, Base L2 transactions do not possess an independent consensus mechanism. Instead, their validation is directly linked to and secured by the underlying Ethereum Layer-1 (L1) network. This is achieved through a specialized component known as a sequencer. The sequencer's role is to aggregate multiple L2 transactions into bundles, which are then regularly published to the Ethereum mainnet as a single L1 transaction.
Consequently, all transactions processed on the Base network are indirectly secured by Ethereum's robust Proof-of-Stake (PoS) consensus mechanism once they are recorded on L1. Ethereum's PoS system, established with "The Merge" in 2022, moves away from energy-intensive mining by requiring validators to stake at least 32 ETH. In this system, a validator is randomly selected every 12 seconds to propose a new block, while other validators on the network are responsible for verifying its integrity. The network employs a sophisticated slot and epoch system, with transaction finality typically occurring after two epochs, which translates to approximately 12.8 minutes, utilizing the Casper-FFG protocol. The Beacon Chain is central to coordinating validators, and the LMD-GHOST fork-choice rule ensures the chain adheres to the path with the most accumulated validator votes. Validators are incentivized with rewards for their participation in proposing and verifying blocks, but face stringent penalties, known as slashing, for any malicious actions or prolonged inactivity. This design choice by Ethereum aims to significantly enhance energy efficiency, security, and scalability, with ongoing and future upgrades, such as Proto-Danksharding, further targeting improvements in transaction processing efficiency, thereby benefiting Base as its foundational security layer. Base specifically leverages Optimistic Rollups as part of the OP Stack, meaning transactions are presumed valid unless challenged within a specified period via fault proofs.
The Binance Smart Chain (BSC) network utilizes a hybrid consensus mechanism known as Proof of Staked Authority (PoSA). This innovative approach integrates key elements from both Delegated Proof of Stake (DPoS) and Proof of Authority (PoA) to achieve a balance of high transaction speeds, cost-efficiency, and network security, while striving to maintain a reasonable level of decentralization. The core participants in the PoSA mechanism include Validators, referred to as "Cabinet Members," Delegators, and Candidates.
Validators play a critical role, being responsible for creating new blocks, verifying transactions, and upholding the overall security of the network. To qualify as a validator, an entity must stake a substantial quantity of BNB, which serves as collateral to ensure honest conduct. These validators are selected through a dynamic process that considers both the amount of BNB they have staked and the votes they receive from token holders. At any given time, there are 21 active validators, whose rotation aims to enhance decentralization and security. Delegators are token holders who opt not to operate a validator node themselves but can contribute to network security by delegating their BNB tokens to chosen validators. This delegation bolsters a validator's total stake, increasing their likelihood of being selected for block production. In return, delegators receive a share of the rewards earned by their chosen validators, fostering broader participation in network governance and security. Candidates represent potential validators who have met the minimum BNB staking requirements and are awaiting election into the active validator set through community voting. Their presence ensures a continuous pool of ready-to-serve nodes, contributing to the network's resilience and decentralization.
During the consensus process, validators are chosen based on their accumulated BNB stake and delegator votes. The higher these metrics, the greater the chance of selection for validating transactions and producing new blocks. Once selected, these validators take turns in a PoA-like fashion to produce blocks rapidly and efficiently, validating transactions, adding them to blocks, and broadcasting them across the network. BSC boasts fast block times, typically around 3 seconds, leading to quick transaction finality. This rapid finality is a direct benefit of the efficient PoSA mechanism, which allows validators to reach consensus swiftly. To further ensure network integrity, validators face economic incentives such as slashing, where a portion of their staked BNB can be forfeited if they engage in malicious activities. This mechanism aligns validators' interests with the network's well-being, complementing the rewards they receive for their honest participation.
The Celo blockchain network operates on a Proof of Stake (PoS) consensus mechanism, a foundational element supporting its decentralized architecture, robust network security, and a governance model that is strongly driven by its community. Central to this mechanism are the validators, who bear the significant responsibilities of proposing and creating new blocks, meticulously validating transactions to ensure their legitimacy, and continuously upholding the overall security and integrity of the network. These validators are not chosen arbitrarily; their selection is critically dependent on the quantity of tokens they hold and commit to stake. This economic commitment serves as a powerful incentive for honest participation and contributes substantially to the network's reliability and resilience against potential attacks. The PoS design inherently positions Celo as a significantly more energy-efficient alternative when compared to energy-intensive Proof of Work systems, aligning with broader sustainability goals in the blockchain space. Further enhancing its decentralized nature, Celo incorporates a unique decentralized governance structure. This empowers its token holders to actively engage in the network's strategic direction by voting on various proposals and proposed modifications to the protocol. This community-driven approach ensures that the network's evolution is reflective of its user base's collective interests, promoting adaptability and responsiveness. The continuous validation and proposal of blocks by a rotating set of staked validators, whose economic interest is aligned with the network's success, creates a self-sustaining and secure environment. Through this system, transaction finality is achieved efficiently, and the network can scale its operations while maintaining high levels of security and user participation, which are critical for its mission of financial inclusion.
The Ethereum blockchain network, following "The Merge" in 2022, operates on a Proof-of-Stake (PoS) consensus mechanism, a significant departure from its previous Proof of Work system. This transition replaced energy-intensive mining with validator staking, aiming to enhance energy efficiency, security, and scalability. In this model, participants willing to secure the network act as validators by staking a minimum of 32 units of the network's native asset (Ether). The network organizes its operations around a precise slot and epoch system. Every 12 seconds, a validator is randomly selected to propose a new block. Following this proposal, other validators on the network verify the integrity and validity of the block. Finalization of transactions, meaning they become irreversible, occurs after approximately two epochs, which translates to about 12.8 minutes, utilizing the Casper-FFG (Friendly Finality Gadget) protocol. The Beacon Chain plays a central role in coordinating the activities of these validators, while the LMD-GHOST (Latest Message Driven-Greedy Heaviest Observed SubTree) fork-choice rule is employed to ensure all network participants agree on the canonical chain, following the branch with the heaviest accumulated validator votes. Validators are economically incentivized for their honest participation in proposing and verifying blocks, but they also face severe penalties, known as slashing, for malicious actions or prolonged inactivity. This PoS framework is designed not only to reduce the network's environmental footprint but also to lay the groundwork for future upgrades, such as Proto-Danksharding, which are intended to further improve transaction efficiency and overall network throughput. The core components like validator selection, block production, and transaction finality are intrinsically tied to the amount of Ether staked, ensuring that participants have a vested interest in the network's security and stability.
The NEAR Protocol blockchain network operates on a distinctive consensus mechanism that synergistically combines the principles of Proof of Stake (PoS) with a proprietary innovation known as Doomslug, further enhanced by dynamic sharding through Nightshade. This multi-faceted approach is engineered to deliver high efficiency, rapid transaction finality, and robust security across the network. At its foundation, the system relies on Proof of Stake, where participants, termed validators, secure the network by staking their native NEAR tokens. The greater the stake, coupled with community trust, the higher their probability of being chosen to propose and validate blocks.Doomslug significantly accelerates transaction finality. Unlike single-stage block confirmations, Doomslug introduces a two-stage process. Initially, validators propose new blocks. Finality is achieved swiftly when two-thirds of the participating validators formally approve the proposed block, making confirmed transactions irreversible and preventing potential forks. This rapid finality is crucial for applications demanding near-instant confirmations. Complementing this, NEAR integrates Nightshade, a dynamic sharding technique. Nightshade segments the network into multiple shards, allowing for the parallel processing of transactions. Each shard handles a distinct subset of transactions concurrently, and their respective processing outcomes are then consolidated into a single "snapshot" block. This dynamic sharding is vital for scalability, enabling the network to efficiently manage increasing transaction volumes and user demand without compromising performance.The consensus process also emphasizes decentralization and fairness through epoch rotation. Validators are regularly reshuffled across distinct intervals called epochs. This rotation mechanism ensures a balanced distribution of block proposal opportunities and validation responsibilities among eligible validators, mitigating centralization risks and promoting sustained network resilience. By integrating PoS for economic security, Doomslug for fast finality, and Nightshade for scalable throughput, the NEAR Protocol establishes a high-performance and secure blockchain environment.
Optimism operates as a Layer 2 scaling solution for the Ethereum network, designed to boost transaction throughput and minimize costs by utilizing Optimistic Rollups while inheriting the robust security features of the underlying Ethereum main chain. The system is built upon several core components. At its heart are Optimistic Rollups, where transactions are batched into "rollup blocks" and processed off-chain. The resulting state commitments, which represent the collective outcome of these off-chain operations, are then periodically committed to the Ethereum main chain.
Key to Optimism's functionality are the "Sequencers." These entities are tasked with collecting and ordering transactions into batches. Following processing, sequencers update the Layer 2 state and transmit these updates to Ethereum. Specifically, they construct and execute Layer 2 blocks, which are subsequently posted as calldata on the Ethereum mainnet. This involves publishing a cryptographic hash of the state root and the associated transaction data. This aggregation method efficiently combines numerous Layer 2 transactions into a single Layer 1 transaction, significantly reducing the average cost per transaction.
A defining characteristic of Optimistic Rollups is its "Fraud Proof" mechanism. Transactions are initially presumed valid, facilitating rapid finality. However, a critical "challenge period" allows any network participant to submit a fraud proof if they detect an invalid transaction. If a challenge is initiated, an "interactive verification game" unfolds, meticulously breaking down the disputed transaction into granular steps to pinpoint any fraudulent activity. Should fraud be conclusively proven, the invalid state is reverted, and the dishonest sequencer or actor is penalized, typically by forfeiting their staked collateral. A batch achieves finality and its state updates become permanent only after the challenge period expires without any successful fraud proofs. This design ensures that Optimism leverages Ethereum's underlying Proof-of-Stake consensus, thereby securing all Layer 2 transactions once they are enshrined on the Layer 1 network.
The Polygon blockchain network, originally known as Matic Network, operates as a Layer 2 scaling solution for Ethereum, leveraging a sophisticated hybrid consensus mechanism to enhance scalability, ensure security, and maintain decentralization. The foundational elements of its consensus protocol are built upon a combination of Proof of Stake (PoS) and Plasma Chains. Within the PoS framework, validators are selected based on the number of MATIC tokens they have staked, with a larger stake increasing their probability of being chosen to validate transactions and produce new blocks. This system also allows MATIC token holders who prefer not to run their own validator nodes to delegate their tokens to trusted validators, thereby earning a share of the rewards and actively contributing to the network's overall security and decentralization.
Supplementing PoS, Polygon utilizes Plasma Chains, which serve as a framework for establishing child chains that run in parallel with the main Ethereum chain. These child chains facilitate off-chain transaction processing, significantly improving transaction throughput and reducing congestion on the Ethereum mainnet by committing only the final, aggregated state back to Ethereum. To uphold the integrity and security of these off-chain transactions, Plasma Chains incorporate a robust fraud-proof mechanism, enabling the challenging and potential reversion of any detected fraudulent activity.
The consensus process on Polygon begins with validators confirming the validity of transactions and subsequently integrating them into blocks. Validators then propose new blocks, with their staked tokens influencing their voting power, and engage in a collective voting process to reach consensus. A new block is officially added to the blockchain upon receiving a majority of votes. A critical security measure is the periodic checkpointing system, where snapshots of the Polygon sidechain's state are regularly submitted to the Ethereum main chain, thereby leveraging Ethereum's inherent security for the finality of Polygon's transactions. The Plasma framework further enables off-chain validation of transactions on child chains, with their final states eventually submitted to the Ethereum main chain, and fraud proofs ready to challenge any suspicious transactions within a specified period, collectively reinforcing Polygon's operational integrity and security.
The Solana blockchain architecture operates through a hybrid consensus model that integrates Proof of History (PoH) with Proof of Stake (PoS). This combination is designed to optimize transaction throughput and reduce network latency while maintaining a high degree of security. Proof of History functions as a decentralized clock, using a Verifiable Delay Function (VDF) to create a permanent, timestamped record of events. This cryptographic sequence allows the network to agree on the chronological order of transactions without requiring nodes to communicate extensively, thereby solving traditional synchronization bottlenecks found in other distributed ledgers. Parallel to PoH, the Proof of Stake component manages the selection of validators and the finalization of the ledger state. Validators are chosen to act as leaders for specific blocks based on the total quantity of the native network assets they have staked. Users who do not run their own hardware can participate in network security by delegating their assets to existing validators, sharing in the rewards generated by successful block production. The consensus process begins when transactions are broadcast and collected for validation. A designated leader then generates a PoH sequence to order these transactions within a block. Subsequently, other validators in the network verify the integrity of the PoH hashes and the validity of the transactions. Once a sufficient number of signatures are collected, the block is finalized and appended to the blockchain. This dual approach ensures that the network remains resilient against attacks; validators must provide collateral through staking, and any malicious activity, such as producing invalid blocks or double-signing, can result in the loss of staked assets through a process known as slashing. This economic deterrent ensures that participants remain aligned with the network's health and operational standards.
The Sui blockchain network employs a sophisticated Byzantine Fault Tolerant (BFT) consensus mechanism, specifically optimized for achieving high transaction throughput and minimal latency. At its core is the Mysten Consensus Protocol, an advanced evolution of Practical Byzantine Fault Tolerance (pBFT). A distinguishing feature of Sui’s design is its leaderless architecture, which deviates from traditional BFT models that often rely on a single leader to propose blocks. Instead, multiple validators can simultaneously propose blocks, thereby significantly enhancing network efficiency and mitigating risks associated with potential leader failures or targeted attacks. This parallel processing capability is crucial, allowing transactions to be executed concurrently across various cores and threads. This design choice maximizes the network's processing capacity, leading to faster transaction confirmations and superior scalability compared to systems with sequential processing.
Transaction validation on Sui is handled by validators who receive requests directly from clients. Each transaction undergoes rigorous checks, including digital signature verification and adherence to network rules. Crucially, validators can process these transactions in parallel, a contrast to many other blockchain networks that enforce a strict, leader-driven sequence. The network further benefits from an optimistic execution approach, where non-contentious and independent transactions can be processed without requiring full consensus upfront. This "optimistic consensus" significantly reduces transaction latency for many common use cases, enabling near-instant finality in most scenarios. For a transaction to achieve finality, the Sui system mandates only three rounds of communication among validators. This streamlined communication protocol contributes directly to the network's low-latency consensus and rapid transaction confirmation times, ensuring both scalability and robust security. The system is also designed with strong fault tolerance, capable of maintaining the integrity of its consensus process even if up to one-third of its validators are faulty or behave maliciously. This robust BFT implementation underpins Sui’s capacity for efficient and secure operations.
Incentive Mechanisms and Applicable Fees
Sweat Economy is present on the following networks: Aptos Coin, Arbitrum, Avalanche, Base, Binance Smart Chain, Celo, Ethereum, Near Protocol, Optimism, Polygon, Solana, Sui.
The Aptos blockchain network employs a comprehensive system of incentive mechanisms and applicable fees designed to ensure network security, encourage participation, and maintain operational efficiency. A core incentive for network participants is the validator reward system. Validators, who are crucial for validating transactions and producing new blocks, earn rewards in the network's native token. These rewards are distributed proportionally, reflecting both the amount of tokens staked by the validators themselves and the contributions from their delegators. This direct financial incentive encourages validators to maintain high uptime and act honestly in their network duties.
Further promoting broader participation, Aptos allows for delegator involvement. Token holders who prefer not to operate their own validator nodes can delegate their tokens to existing validators. By doing so, delegators earn a share of the staking rewards, effectively participating in network security and earning passive income without the technical overhead of running a node. To uphold accountability and safeguard network integrity, a slashing mechanism is in place. Validators who engage in malicious activities, such as double-signing transactions, or who experience prolonged inactivity, face penalties that involve the forfeiture of a portion of their staked tokens. This economic disincentive acts as a strong deterrent against dishonest behavior.
Regarding applicable fees, users engaging with the Aptos network are required to pay transaction fees in the native token for sending transactions and interacting with smart contracts. These fees are not static; Aptos features a dynamic fee adjustment system that recalibrates fees based on current network activity and resource utilization. This dynamic approach helps ensure cost efficiency for users and prevents network congestion during periods of high demand. The collected transaction fees are then distributed among validators and their delegators, providing an additional layer of economic incentive for their continued active participation and crucial role in securing the network.
Arbitrum One, serving as a Layer 2 scaling solution for Ethereum, incorporates a sophisticated array of incentive mechanisms to guarantee the ongoing security and integrity of its network. Central to this framework are the Validators and Sequencers. Sequencers are entrusted with the vital task of ordering user transactions and compiling them into batches for efficient off-chain processing, playing a critical role in optimizing network throughput and speed. Validators, conversely, actively monitor the Sequencers' activities, meticulously verifying state transitions and ensuring that only valid transactions are included in the batches. Both Sequencers and Validators are motivated through economic rewards, primarily derived from collected transaction fees and potentially other protocol-specific incentives, contingent on their honest and efficient performance.
Arbitrum’s security model is heavily reliant on its Fraud Proofs system. Transactions processed off-chain are initially given an "assumption of validity," which enables swift transaction finality and higher throughput. However, a predefined "challenge period" is established, during which any network participant can submit a fraud proof to contest the validity of a transaction. This acts as a powerful deterrent against malicious behavior. If a challenge is successfully brought forward, an interactive verification process is initiated to precisely identify and confirm any fraudulent activity. In instances where fraud is proven, the invalid transaction is reversed, and the dishonest actor faces economic penalties, which may include the slashing of staked tokens or other forms of financial disincentive. This balanced system of rewards for honest participation and strict penalties for malicious actions aligns participants' interests with the overall health and security of the Arbitrum network.
The Applicable Fees on the Arbitrum One blockchain are structured to be cost-effective. Users pay Layer 2 Fees for transactions executed on the Arbitrum network, which are typically significantly lower than those on the Ethereum mainnet due to reduced computational load. A specific "Arbitrum Transaction Fee" is applied to each transaction processed by the sequencer, covering the costs of processing and batch inclusion. Additionally, L1 Data Fees are incurred when batches of Layer 2 state updates are periodically posted as calldata to the Ethereum mainnet. This fee covers the requisite gas costs on Ethereum. A key economic benefit is "cost sharing," where the fixed expenses of submitting these state updates to Ethereum are distributed across multiple transactions within a batch, substantially lowering the per-transaction cost for users. For example, protocols leveraging the Arbitrum stack, such as Kinto, utilize ETH for transaction fee payments.
The Avalanche blockchain network employs a comprehensive system of incentive mechanisms and fees designed to ensure its security, integrity, and efficiency, primarily through its Avalanche Consensus mechanism. Validators, who are critical to the network's operation, are required to stake a certain amount of AVAX tokens. The quantity of staked tokens directly influences their likelihood of being chosen to propose or validate new blocks. In return for their active participation, validators receive rewards, which are calculated proportionally to the amount of AVAX they have staked, as well as their consistent uptime and overall performance in validating transactions. To further decentralize participation, validators can also accept delegations from other token holders. These delegators subsequently share in the earned rewards, thus incentivizing smaller token holders to contribute indirectly to the network's security. The economic incentives for validators extend beyond staking rewards to include block rewards, which are distributed from the inflationary issuance of new AVAX tokens for proposing and validating blocks. Additionally, validators earn a portion of the transaction fees paid by users across the network, covering simple transactions, complex smart contract interactions, and the creation of new assets. Crucially, Avalanche's penalty system differs from some other Proof-of-Stake systems by not employing 'slashing,' which involves the confiscation of staked tokens for misbehavior. Instead, the network relies on the economic disincentive of lost future rewards. Validators who fail to maintain consistent uptime or engage in malicious activities will simply miss out on potential earnings, providing a strong incentive for honest and reliable behavior. The network also imposes clear uptime requirements, where poor performance directly impacts a validator's ability to earn rewards. Fees on the Avalanche blockchain are structured to be dynamic, adjusting based on current network demand and the computational complexity of transactions. This ensures that fees remain equitable and reflect the actual network usage. A significant portion of these transaction fees is 'burned,' meaning they are permanently removed from circulation. This deflationary mechanism helps to offset the inflationary effects of block rewards and aims to enhance the long-term value of AVAX tokens. Fees for deploying and interacting with smart contracts are determined by the required computational resources, promoting efficient resource utilization. Similarly, fees are imposed for creating new assets on the network, a measure designed to deter spam and ensure that network resources are utilized by serious projects. On the Avalanche X-Chain, validator incentives are realized indirectly through the network's overall AVAX issuance, while its transaction fees are fixed and burned to combat spam and progressively reduce the total supply of AVAX.
The Base blockchain, as an Ethereum Layer-2 solution utilizing Optimistic Rollups from the OP Stack, implements incentive mechanisms primarily focused on optimizing transaction costs and ensuring secure asset transfers, leveraging the economic security of its underlying Ethereum L1. A core incentive to use Base is its efficiency in reducing transaction expenses. This is achieved by a sequencer that bundles numerous L2 transactions together, submitting them as a single, consolidated L1 transaction to Ethereum. This process significantly lowers the average transaction cost for individual L2 operations, as the collective L2 transactions share the cost of the single L1 transaction fee, thereby making Base a more economically attractive option compared to direct L1 usage.
For the secure movement of crypto-assets between Base and Ethereum, a specialized smart contract on the Ethereum network is employed. Since Base, as an L2, does not manage its own consensus for fund withdrawals, an additional mechanism is in place to guarantee that only legitimate funds can be moved off the L2. When a user initiates a withdrawal request on Ethereum's L1, a predetermined challenge period begins. During this window, any other network participant has the opportunity to submit a "fault proof" if they detect a fraudulent withdrawal attempt, triggering a dispute resolution process. This entire system is strategically designed with economic incentives to encourage honest behavior and deter malicious activities, although specific details of these economic incentives for fault proof submission are not explicitly outlined beyond the general principle.
Furthermore, Base inherits and benefits from the robust incentive structure of Ethereum’s Proof-of-Stake (PoS) system, which indirectly secures Base transactions. Ethereum validators, by staking a minimum of 32 ETH, are rewarded for proposing and attesting to valid blocks, as well as for participating in sync committees. These rewards are distributed through newly issued ETH and a portion of transaction fees. Under the EIP-1559 fee model, transaction fees comprise a base fee, which is algorithmically burned to manage supply, and an optional priority fee (or 'tip') paid directly to validators. To maintain network integrity, validators face economic penalties, known as slashing, if they engage in malicious conduct or fail to perform their duties. This comprehensive incentive framework ensures strong security alignment for Base by reinforcing reliable validator behavior on its underlying L1.
The Binance Smart Chain (BSC) network employs a robust system of incentive mechanisms and applicable fees, primarily built around its Proof of Staked Authority (PoSA) consensus, designed to secure the network, encourage participation, and maintain operational efficiency. This system ensures that validators, delegators, and other participants are economically motivated to act in the network's best interest.
Validators on BSC, often referred to as "Cabinet Members," are critical to the network's operation. They are incentivized through staking rewards, which include a combination of transaction fees and newly generated block rewards. To become a validator, a significant amount of BNB must be staked. Their selection for block production is determined by the total BNB staked, encompassing both their own stake and delegated tokens, as well as the votes received from delegators. This competitive selection process motivates validators to attract delegators and maintain high performance. Delegators, in turn, are crucial for supporting network decentralization and security. By delegating their BNB to validators, they increase the validators' total stake, enhancing their chances of selection. In exchange, delegators receive a share of the rewards earned by their chosen validators, fostering active community involvement. The system also includes a pool of Candidates, nodes that have staked BNB and are ready to become active validators, ensuring a robust and resilient network of potential participants. Economic security is further reinforced through slashing mechanisms, where validators found engaging in malicious behavior or failing to perform their duties face penalties, including the forfeiture of a portion of their staked BNB. The opportunity cost of locking up BNB also provides a strong economic incentive for all participants to act honestly.
BSC is known for its low transaction fees, which are paid in BNB. These fees are vital for network maintenance and compensate validators for processing transactions. The fee structure is dynamic, adjusting based on network congestion and transaction complexity, though it is designed to remain significantly lower than on some other major blockchain networks, such as the Ethereum mainnet. In addition to transaction fees, validators receive block rewards, further incentivizing their role in maintaining and processing network activity. BSC also supports cross-chain compatibility, enabling asset transfers between Binance Chain and Binance Smart Chain, which incur minimal fees to facilitate a seamless user experience. Furthermore, interacting with and deploying smart contracts on BSC involves fees based on the computational resources required. These smart contract fees are also paid in BNB and are structured to be cost-effective, encouraging developers to build and innovate on the BSC platform.
The Celo blockchain network employs an incentive model designed to both reward network participants and ensure exceptional accessibility, particularly by maintaining minimal transaction fees for crucial use cases like cross-border payments. This strategy fosters a flexible and user-friendly ecosystem. At the core of its incentive mechanisms, validators receive remuneration from a dual-source system: a portion of transaction fees collected across the network, alongside newly minted tokens. This comprehensive reward structure provides a continuous and strong financial incentive for validators to maintain honest operations, diligently validate transactions, and secure the integrity of the network, thereby ensuring its ongoing reliability. Furthermore, Celo prioritizes user experience through flexible transaction parameters. Users can specify a maximum gas limit for their transactions, acting as a safeguard against excessive charges, especially if a transaction encounters an unexpected failure. They also have the option to adjust the gas price, allowing them to prioritize their transactions for faster processing by offering higher fees if urgency is required. A standout feature of Celo is its innovative payment flexibility, enabling transaction fees to be paid not only in its native asset but also in various ERC-20 tokens. This multi-currency payment option significantly enhances accessibility, especially benefiting individuals who may lack traditional banking services or face hurdles in acquiring specific native blockchain tokens. This approach aligns directly with Celo’s mission to extend blockchain technology to underserved global communities. The network's fee structure is intentionally designed to be minimal, making it an ideal platform for low-cost transactions, particularly those involving international transfers. This emphasis on affordability and flexibility underscores Celo's commitment to creating an inclusive and accessible financial infrastructure.
The Ethereum network's Proof-of-Stake (PoS) system is underpinned by a robust framework of incentive mechanisms and applicable fees, meticulously designed to secure transactions and encourage active, honest participation from validators. Validators, who are essential for the network's operation, commit at least 32 units of the network's native asset (Ether) to secure their role. Their primary incentives include rewards for successfully proposing new blocks, attesting to the validity of other blocks, and participating in sync committees, all of which contribute to the network's integrity and consensus. These rewards are distributed in newly issued Ether, alongside a portion of the transaction fees generated on the network. A key feature of Ethereum's fee structure is the implementation of EIP-1559, which divides transaction fees into two main components. The first is a base fee, which is automatically burned, effectively reducing the overall supply of Ether over time and potentially introducing a deflationary aspect, especially during periods of high network activity. The second is an optional priority fee, also known as a "tip," which users can choose to pay directly to validators to incentivize faster inclusion of their transactions into a block. This dual-fee structure aims to make transaction costs more predictable for users. To enforce honest behavior and prevent malicious activities, the network employs a strict system of economic penalties, including slashing. Validators who engage in dishonest acts or demonstrate extended periods of inactivity risk losing a portion of their staked Ether, providing a powerful deterrent against misconduct and ensuring the long-term security and reliability of the network. This comprehensive system aligns the economic interests of validators with the overall health and security of the Ethereum blockchain.
The NEAR Protocol blockchain network employs a comprehensive suite of economic mechanisms designed to ensure network security, incentivize active participation from its community, and manage resource allocation efficiently. A core incentive is the staking reward system, where validators and delegators are compensated for their role in securing transactions. Validators, selected based on their staked NEAR tokens and community trust, receive a share of newly minted tokens, constituting about 90% of the approximate 5% annual inflation. They earn these rewards for proposing and validating blocks. Similarly, token holders who choose not to operate a full validator node can delegate their NEAR tokens to active validators, thereby contributing to network security and earning rewards proportional to their delegated stake. This delegation model fosters broader participation and strengthens the network's overall decentralization.To uphold network integrity, NEAR Protocol implements a robust slashing mechanism. Validators engaging in malicious activities, such as incorrect validation or dishonest behavior, face economic penalties, including the deduction of a portion of their staked tokens. This serves as a powerful deterrent against harmful actions, ensuring validators operate in the network's best interest. Additionally, the network promotes fairness and prevents undue concentration of power through regular epoch rotations. During these predefined intervals, validators are periodically reshuffled, and new block proposers are selected, maintaining a healthy balance between network performance and decentralization.Regarding applicable fees, the NEAR blockchain charges users for transaction processing and data storage, paid in NEAR tokens. A unique aspect of its fee structure is the burning mechanism for transaction fees, which reduces the total circulating supply of NEAR tokens over time, potentially introducing a deflationary effect. While a portion of these fees is burned, the remaining part is distributed to validators as additional compensation, providing a continuous incentive for network maintenance. Furthermore, the protocol imposes storage fees based on the amount of blockchain space consumed by user accounts, smart contracts, and associated data. Users are required to hold NEAR tokens as a deposit commensurate with their storage usage, which encourages efficient resource management and helps prevent network spam. This dual system of incentives and fees creates a self-sustaining economic model for the NEAR Protocol.
Optimism, functioning as an Ethereum Layer 2 scaling solution, employs Optimistic Rollups to implement a sophisticated array of incentive mechanisms and fee structures. These are meticulously designed to guarantee network security, operational efficiency, and cost-effectiveness, with a primary objective to significantly increase transaction throughput and lower costs compared to the Ethereum mainnet, all while preserving decentralization and robust security.
Sequencers are central to this model, responsible for collecting, ordering, and batching transactions off-chain, thereby optimizing the processing flow. Their economic incentive stems directly from the transaction fees they accrue from users, which drives them to process transactions swiftly and accurately. This expedited processing is crucial for the network’s overall speed and responsiveness.
A pivotal incentive mechanism is embedded within the validator and "Fraud Proofs" system. Transactions on Optimism are optimistically assumed to be valid, which inherently allows for quicker confirmation times. To prevent and address potential malicious activities, a "challenge mechanism" is in place. During a predefined challenge window, any network participant, including designated validators, can submit a fraud proof if an invalid transaction is detected. Successful challengers are rewarded for their diligence in identifying and substantiating fraudulent transactions. This reward system economically encourages active and continuous network monitoring, thus bolstering the overall security posture of the rollup. Conversely, "Economic Penalties" serve as a powerful deterrent. If a sequencer includes an invalid transaction that is subsequently and successfully challenged, they face financial repercussions, such as the loss of a portion of their staked collateral. Similarly, any form of inactivity or misbehavior by sequencers or validators can lead to penalties and the forfeiture of potential rewards, aligning participant actions with the network's best interests.
Optimism’s fee structure encompasses several categories. "Layer 2 Transaction Fees," paid by users for transactions processed on the Layer 2 network, are notably lower than those on the Ethereum mainnet due to the reduced computational load. The bundling of multiple transactions into a single batch significantly enhances this cost efficiency. Additionally, "L1 Data Fees" are incurred when state updates from Layer 2 transactions are periodically posted to the Ethereum mainnet as calldata. This fee covers the underlying gas costs on Ethereum, but these expenses are distributed across numerous transactions within a batch, further reducing individual transaction burdens. Lastly, "Smart Contract Fees" apply to the deployment and interaction with smart contracts on Optimism, calculated based on the computational resources consumed, ensuring charges are proportional to resource usage.
The Polygon network employs a robust set of incentive mechanisms and a distinct fee structure, combining its Proof of Stake (PoS) consensus with the Plasma framework to ensure network security, encourage active participation, and maintain transaction integrity. Validators play a crucial role, securing the network by staking MATIC tokens. Their selection for validating transactions and producing new blocks is directly influenced by the quantity of tokens they have staked. In exchange for their services, validators receive rewards in the form of newly minted MATIC tokens and a portion of the transaction fees. They are responsible for proposing and voting on new blocks, with incentives structured to promote honest and efficient operation, while also deterring misconduct through potential penalties. A key security feature involves validators periodically submitting checkpoints of the Polygon sidechain to the Ethereum main chain, which leverages Ethereum's established robustness to guarantee the finality of Polygon's transactions.
Delegators, who are token holders opting not to operate their own validator nodes, can delegate their MATIC tokens to trusted validators. This delegation allows them to earn a share of the rewards distributed to their chosen validators, fostering broader community participation in securing the network and enhancing its decentralization. The economic security of Polygon is further reinforced by a slashing mechanism, which penalizes validators for malicious actions, such as double-signing transactions or extended periods of inactivity. Slashing entails the forfeiture of a portion of their staked tokens, serving as a powerful deterrent against dishonest behavior. Additionally, validators are required to bond a substantial amount of MATIC, ensuring they have a significant financial interest in upholding the network's integrity.
Regarding the fee structure, one of Polygon's significant advantages is its remarkably low transaction fees compared to the Ethereum main chain. These fees, paid in MATIC tokens, are designed to be affordable, thereby encouraging high transaction throughput and widespread user adoption. While fees on Polygon can exhibit dynamic variations based on network congestion and transaction complexity, they consistently remain considerably lower than those on Ethereum, making Polygon an attractive option for users and developers. Deploying and interacting with smart contracts on Polygon also incurs fees, which are determined by the computational resources required. These smart contract fees are also paid in MATIC and are substantially lower than on Ethereum, offering a cost-effective environment for developing and maintaining decentralized applications (dApps). Furthermore, the Plasma framework facilitates off-chain processing for state transfers and withdrawals, with associated fees also paid in MATIC, collectively contributing to a reduced overall cost of utilizing the network.
Incentives within the Solana blockchain network are structured to ensure high performance and decentralized security. The primary participants are validators and delegators, both of whom receive financial compensation for their roles in maintaining the ledger. Validators are rewarded for successfully producing and verifying blocks. These rewards are distributed in the network's native asset and are determined by the validator's overall stake and historical performance. Furthermore, validators receive a portion of the transaction fees associated with the data processed in their blocks, which encourages them to maximize efficiency and maintain uptime. Token holders who prefer not to operate complex infrastructure can delegate their stake to professional validators. This delegation model facilitates a more inclusive security environment, as delegators earn a percentage of the rewards proportional to their contribution, thereby decentralizing the control of the network. Security is further enforced through economic penalties. The network employs a slashing mechanism where a portion of a validator's staked assets is confiscated if they engage in dishonest behavior or fail to meet network requirements, such as remaining offline for extended periods. This introduces an opportunity cost for all participants, ensuring they remain committed to honest operations. Regarding the cost of using the network, the fee structure is designed to be highly competitive and predictable. Users pay transaction fees to compensate for the computational power and bandwidth consumed by nodes. These fees are notably low, facilitating high-volume usage. In addition to transaction costs, the network implements rent fees for data storage. This unique mechanism charges for the persistence of data on the blockchain, discouraging the inefficient use of state storage and prompting developers to prune unnecessary data. Finally, smart contract execution fees are calculated based on the specific resource intensity of the code, ensuring that participants pay a fair rate for the network resources they utilize.
The Sui blockchain network employs a comprehensive set of security and economic incentive mechanisms designed to ensure robust participation and network integrity. Central to these incentives are the validators, who play a critical role in the consensus process. Validators are required to stake SUI tokens as collateral to participate in transaction validation and network security. In return for their honest efforts, they are compensated with rewards. To uphold network security and promote honest behavior, Sui incorporates a "slashing" mechanism. This means validators can face penalties, including the forfeiture or "slashing" of a portion of their staked SUI tokens, if they engage in malicious activities such as double-signing transactions or failing to perform their validation duties correctly. This economic disincentive acts as a powerful deterrent against misconduct.
Beyond active validators, the Sui network encourages broader community participation through a delegation system. SUI token holders who may not have the technical capacity or desire to run a validator node themselves can delegate their tokens to trusted validators. In exchange for their delegated stake, these token holders receive a share of the rewards earned by the validators, fostering widespread involvement in securing the network.
Regarding the financial aspects of network operation, users on the Sui blockchain incur transaction fees for the processing and confirmation of their activities. These fees are paid to the validators, compensating them for the computational resources expended. All transaction fees are denominated in SUI tokens, which serves as the native cryptocurrency for the Sui blockchain. The network also implements a dynamic fee model, meaning that transaction costs are not fixed but adjust according to prevailing network demand and the intrinsic complexity of the transaction being processed. This adaptive fee structure aims to efficiently manage network congestion and resource allocation, ensuring that costs remain responsive to actual usage and demand.
Energy consumption sources and methodologies
Sweat Economy is present on the following networks: Aptos Coin, Arbitrum, Avalanche, Base, Binance Smart Chain, Celo, Ethereum, Near Protocol, Optimism, Polygon, Solana, Sui.
The methodology for calculating the energy consumption of the Aptos network, like other digital ledger technologies (DLTs), employs a 'bottom-up' approach, focusing primarily on the energy consumption of individual nodes within the network. This comprehensive method aggregates energy usage across various components contributing to the network's operation. The core assumption underpinning this calculation is that the nodes represent the most significant factor in the network's overall energy footprint. These estimations are built upon empirical data gathered from diverse sources, including publicly available information sites, as well as both open-source and proprietary in-house crawlers.
A critical determinant in assessing hardware energy consumption involves identifying the specific hardware required to run the client software for the network. The energy consumption profiles of these hardware devices are meticulously measured in certified test laboratories, ensuring accuracy in the base data. When conducting these calculations, if available, the Functionally Fungible Group Digital Token Identifier (FFG DTI) is utilized to accurately identify all implementations of the crypto-asset within scope. These mappings are regularly updated, drawing data from the Digital Token Identifier Foundation, to maintain the most current and precise attribution.
Information concerning the specific hardware deployed across the network and the total number of participants is derived from assumptions. These assumptions are subjected to rigorous verification efforts using empirical data to ensure their best possible accuracy. A general principle guiding these assumptions is that network participants are largely economically rational actors. Furthermore, adopting a precautionary stance, in instances of doubt, conservative estimates are applied, meaning higher figures are used for potential adverse impacts to ensure a robust and responsible assessment of energy consumption.
The methodology employed for calculating the energy consumption attributed to the Arbitrum network adopts a "bottom-up" approach, systematically assessing individual operational components to arrive at an aggregate consumption figure. Within this framework, network nodes are identified as the central and most significant contributors to the network's overall energy footprint. The foundational assumptions underpinning these calculations are derived from empirical findings, which are compiled through the extensive use of publicly available information sites, proprietary in-house crawlers developed by the assessors, and various open-source data collection tools.
A crucial step in estimating energy consumption involves accurately determining the specific hardware devices utilized within the network. This determination is made by evaluating the technical requirements necessary for operating the client software pertinent to the Arbitrum network. Once these hardware profiles are established, their corresponding energy consumption rates are precisely measured under controlled conditions in certified test laboratories, ensuring a high degree of accuracy and reliability for the baseline data. To ensure a comprehensive and accurate scope, particularly when accounting for diverse implementations of crypto-assets across different networks, the Functionally Fungible Group Digital Token Identifier (FFG DTI) is employed whenever such an identifier is available. This tool assists in clearly delineating all relevant instances of an asset, with these mappings consistently updated based on data provided by the Digital Token Identifier Foundation.
Furthermore, the methodology relies on specific assumptions regarding the type of hardware deployed and the estimated number of active participants within the network. These assumptions are subjected to continuous validation using best-effort empirical data. A general guiding principle in these estimations is the presumption that network participants act in a largely economically rational manner. In accordance with a precautionary principle, conservative estimates are applied whenever there is uncertainty, typically resulting in higher assessments of potential adverse environmental impacts. When quantifying the energy consumption for a particular crypto-asset operating on Arbitrum, a proportionate fraction of the overall network's energy consumption is allocated to that asset, based on its observed activity within the Arbitrum ecosystem. The source documents do not provide any direct external links related to this methodology.
The methodology for assessing the Avalanche network's energy consumption is founded on a 'bottom-up' approach, where individual nodes are identified as the primary contributors to the network's overall energy footprint. This comprehensive calculation aggregates energy usage across various interconnected components of the network. The assumptions underpinning these calculations are derived from extensive empirical findings, utilizing a combination of publicly available information sites, sophisticated open-source crawlers, and proprietary in-house developed crawlers. A key aspect of this methodology involves estimating the hardware deployed within the network. This estimation is primarily driven by the technical specifications and operational requirements for running the client software, which dictates the type and performance of necessary hardware devices. The energy consumption profiles of these identified hardware devices are meticulously measured in certified test laboratories to ensure accuracy. To ensure a broad and precise scope, the Functionally Fungible Group Digital Token Identifier (FFG DTI) is leveraged, whenever available, to pinpoint all relevant implementations of the crypto-asset under consideration. These mappings are regularly updated based on current data provided by the Digital Token Identifier Foundation. The data regarding specific hardware usage and the total number of network participants is based on empirically verified assumptions, consistently updated with best-effort validation. A foundational assumption in this model is that network participants generally behave in an economically rational manner. Furthermore, adhering to a precautionary principle, any uncertainties or doubts during the estimation process lead to conservative assumptions, specifically by making higher estimates for potential adverse environmental impacts. When determining the energy consumption attributable to a specific token within the Avalanche ecosystem, the energy consumption of the entire Avalanche network (including subnets like Avalanche X-Chain) is calculated first. Subsequently, a fraction of this total network energy is allocated to the token, proportional to its activity and footprint within the network. This detailed, multi-layered approach aims to provide a robust and conservative estimate of the energy consumption associated with the Avalanche blockchain.
The energy consumption calculation for the Base blockchain network is meticulously performed using a "bottom-up" approach, where individual nodes are identified as the primary contributors to the network's overall energy footprint. This methodology is based on empirical data collected from a variety of sources, including publicly available information sites, dedicated open-source crawlers, and proprietary in-house crawling tools. The fundamental aspect of estimating hardware usage within the network involves determining the minimum requirements necessary to operate the client software. The energy consumption profiles of the specific hardware devices identified are obtained from measurements conducted in certified test laboratories, ensuring a high degree of accuracy in these foundational figures.
In the process of calculating network energy consumption, the Functionally Fungible Group Digital Token Identifier (FFG DTI) is utilized when available, serving to identify and encompass all relevant implementations of a crypto-asset within the scope of analysis. These mappings are regularly updated, drawing on data provided by the Digital Token Identifier Foundation. However, the source documents do not provide specific URLs for the public information sites, open-source crawlers, or the Digital Token Identifier Foundation, preventing direct external linking within this summary.
The methodology also incorporates assumptions regarding the hardware deployed and the number of participants operating within the network. These assumptions are rigorously verified with "best effort" against empirical data to ensure their realism and accuracy. A key underlying principle is the assumption that network participants generally act in a "largely economically rational" manner. Furthermore, to adhere to a precautionary principle, conservative estimates are applied in situations of uncertainty, leading to higher projected impacts to mitigate underestimation risks. For a specific token on Base, a fraction of the network’s total energy consumption is attributed, based on the token's activity within the network.
The methodology for calculating the energy consumption of the Binance Smart Chain (BSC) network, which then serves as a basis for attributing a fraction of energy to tokens operating on it, primarily utilizes a "bottom-up" approach. This method focuses on the individual components of the network to aggregate a comprehensive energy profile. The central factor in this calculation is identified as the network nodes themselves.
Assumptions regarding the hardware used within the BSC network are derived from extensive empirical findings. These findings are gathered through a combination of public information sites, sophisticated open-source crawlers, and proprietary in-house developed crawlers. The primary determinants for estimating the specific hardware deployed are the technical requirements necessary to operate the client software of the network. To ensure accuracy, the energy consumption of these identified hardware devices is rigorously measured in certified test laboratories. This precise measurement allows for a detailed understanding of the power demands of the operational infrastructure.
For the comprehensive identification of all implementations of an asset within scope, the Functionally Fungible Group Digital Token Identifier (FFG DTI) is employed, where available. The mappings associated with the FFG DTI are regularly updated based on data provided by the Digital Token Identifier Foundation. The information regarding both the hardware in use and the total number of participants active within the network is based on assumptions that undergo best-effort verification using empirical data. Generally, participants are presumed to be largely economically rational in their decision-making. As a precautionary principle, in situations of uncertainty, assumptions tend to err on the conservative side, meaning higher estimates are made for potential adverse impacts. When determining the energy consumption for a specific token that operates on BSC, the initial step involves calculating the energy consumption of the entire Binance Smart Chain network. Following this, a fraction of the total network energy consumption is attributed to the particular crypto-asset, a fraction determined by the asset's specific activity within the network.
The methodology for calculating the Celo blockchain network's energy consumption primarily utilizes a "bottom-up" approach. This detailed methodology considers network nodes as the central and most significant factor contributing to the overall energy footprint. The underlying assumptions of this calculation are derived from extensive empirical findings, gathered through a combination of publicly available information sites, advanced open-source crawlers, and proprietary in-house developed crawling tools. A key determinant in estimating the hardware deployed within the network is the specific computational requirements necessary to operate the client software. To ensure accuracy, the energy consumption of these various hardware devices is meticulously measured in certified test laboratories. In this calculation framework, the Functionally Fungible Group Digital Token Identifier (FFG DTI) is employed, whenever available, to comprehensively identify all relevant implementations of the crypto-asset within scope. These mappings are consistently updated to reflect the latest data provided by the Digital Token Identifier Foundation, ensuring the most current and accurate representation. Information pertaining to the types of hardware used and the total number of participants in the network relies on assumptions. These assumptions are rigorously verified through best-effort empirical data analysis. Generally, network participants are presumed to act in an economically rational manner. Adhering to a precautionary principle, in situations of uncertainty, estimations for potential adverse impacts are always biased towards higher, more conservative figures. While specific token energy consumption may aggregate data from multiple networks where the token is active, the core methodology for determining a network's energy consumption remains consistent with this node-centric, bottom-up framework.
The methodology for calculating the Ethereum network's energy consumption primarily employs a "bottom-up" approach, which focuses on the energy demands of individual nodes that are central to the network's operation. These nodes are considered the fundamental factor driving the network's overall energy use. The assumptions underpinning these calculations are derived from empirical data gathered through a variety of sources, including public information sites, open-source crawlers, and proprietary in-house crawlers developed for this purpose. A critical step in this methodology involves determining the hardware used within the network, primarily by assessing the computational and other requirements necessary to run the client software. The energy consumption characteristics of these identified hardware devices are then rigorously measured in certified test laboratories to ensure accuracy. When quantifying the energy consumption for the network, the Functionally Fungible Group Digital Token Identifier (FFG DTI) is utilized, when available, to identify all implementations of the asset in scope, with mappings regularly updated based on data from the Digital Token Identifier Foundation. The information regarding the specific hardware deployed and the total number of participants in the network relies on assumptions that are diligently verified using empirical data whenever possible. Generally, participants are presumed to act in an economically rational manner. Furthermore, adhering to a precautionary principle, if there is any doubt in estimations, conservative assumptions are made, meaning higher estimates are used for potential adverse impacts to ensure a comprehensive and cautious assessment of energy consumption.
The methodology for assessing the energy consumption of the NEAR Protocol network relies on a "bottom-up" approach, meticulously aggregating data across its various operational components. This method primarily considers the network's nodes as the central contributors to overall energy usage. The fundamental assumptions underpinning these calculations are derived from empirical findings obtained through a combination of public information sources, proprietary in-house crawlers, and publicly available open-source crawlers. These tools are instrumental in gathering essential data about the network's operational footprint.A critical determinant in estimating the hardware deployed within the network is the specific computational requirements necessary to run the client software. Based on these identified requirements, the energy consumption of the corresponding hardware devices is rigorously measured in certified test laboratories. This ensures accuracy and consistency in energy attribution. Furthermore, when calculating energy consumption, the Functionally Fungible Group Digital Token Identifier (FFG DTI) is utilized, where available, to precisely identify and encompass all relevant implementations of any crypto-asset within the network's scope. These mappings are regularly updated, leveraging data from the Digital Token Identifier Foundation, to maintain current and accurate representations.The information pertaining to the hardware used and the total number of participants in the network is built upon assumptions, which are diligently verified using the best available empirical data. A general underlying premise is that network participants are largely economically rational actors. In adherence to a precautionary principle, conservative estimations are favored when uncertainties arise, leading to higher projected adverse impacts to ensure a robust and responsible assessment of energy consumption. This comprehensive methodology allows for a detailed and conservative estimation of the NEAR Protocol network's energy footprint.
The energy consumption profile of the Optimism blockchain network, being a Layer 2 scaling solution for Ethereum, is not isolated but rather intricately integrated with and aggregated within the broader Ethereum ecosystem. Its energy usage also includes the demands of its own specialized operational components. The general approach for calculating the energy consumption of such networks, including Optimism, typically involves a "bottom-up" methodology. This method primarily identifies network nodes—which, in Optimism’s context, encompass sequencers and any participants involved in the fraud proof mechanisms—as the principal contributors to the network's energy footprint.
Energy consumption estimations are built upon empirical data gathered from diverse sources, including publicly available information, open-source crawling tools, and internal proprietary crawlers. A key determinant in these calculations is the hardware used across the network, with particular emphasis on the specific requirements for running the client software on participating nodes. The energy consumption of these hardware devices is precisely measured in certified testing laboratories. To ensure a comprehensive assessment, the Functionally Fungible Group Digital Token Identifier (FFG DTI) is utilized, where applicable, to identify all implementations of a given asset across various networks, with these mappings consistently updated using data from the Digital Token Identifier Foundation.
Moreover, data pertaining to the deployed hardware configurations and the number of active participants in the network relies on certain assumptions. These assumptions undergo rigorous verification through empirical data whenever possible. A general tenet guiding these assumptions is the presumption of economically rational behavior among network participants. As a precautionary measure, especially in instances of data ambiguity or incompleteness, estimates for adverse impacts, such as energy consumption, are deliberately made on the conservative side, meaning higher values are chosen to account for potential underestimations. For any specific crypto-asset operating on Optimism, its allocated energy consumption is determined as a fraction of the network’s total energy, proportional to that asset's activity within the network, thereby providing a robust, albeit estimated, understanding of its energy demands.
The methodology for assessing the Polygon network's energy consumption is primarily based on a comprehensive "bottom-up" approach, which identifies the various nodes as the fundamental contributors to the network's overall energy footprint. This detailed calculation relies on empirical data collected from diverse sources, including publicly available information platforms, open-source crawlers, and proprietary in-house developed crawlers. The key factors for estimating the hardware utilized across the network are determined by the specific requirements for operating the client software. To ensure the accuracy of these estimations, the energy consumption of the identified hardware devices is precisely measured in certified test laboratories.
An integral part of this energy accounting involves the use of the Functionally Fungible Group Digital Token Identifier (FFG DTI). This identifier is employed to accurately determine and encompass all implementations of the crypto-asset relevant to the scope of analysis. The mappings derived from the FFG DTI are regularly updated, drawing upon data from the Digital Token Identifier Foundation to maintain their currency and reliability. Information concerning the specific hardware deployed and the total number of participants within the network is based on assumptions that undergo rigorous, best-effort verification using available empirical data. It is generally assumed that participants in the network behave in a largely economically rational manner. Adhering to a precautionary principle, in situations where uncertainties exist, estimates for potential adverse impacts are conservatively adjusted upwards, ensuring a robust and cautious assessment.
Crucially, due to Polygon's architectural design as a Layer 2 scaling solution for Ethereum, its energy consumption calculation incorporates a shared security model. Consequently, a proportional share of the Ethereum network's energy consumption is also attributed to Polygon, acknowledging Ethereum's foundational role in providing security to the Layer 2 solution. This specific proportion of Ethereum's energy usage is quantitatively determined based on the gas consumption on the Ethereum network. While the documents mention reliance on "public information sites" and the "Digital Token Identifier Foundation" for data, they do not provide specific URLs for these external resources.
To calculate the energy consumption of the Solana blockchain network, a "bottom-up" methodology is utilized, placing the network nodes at the center of the analysis. This approach relies on identifying the number of active participants and the specific hardware requirements necessary to run the network's client software. Data collection involves a variety of sources, including open-source web crawlers, internal monitoring tools developed by the legal entities, and public information websites. By analyzing these data points, researchers can estimate the hardware profiles of the various nodes operating globally. To ensure accuracy, the energy consumption of typical hardware devices is measured within certified laboratory environments, providing a baseline for the power usage of each node. Furthermore, the methodology incorporates data from the Digital Token Identifier Foundation to map all implementations of the assets within the network's scope. When specific hardware data is not directly observable, assumptions are made based on the principle of economic rationality, assuming participants optimize their setups for cost-efficiency while meeting software specifications. In instances of uncertainty, a precautionary principle is applied, favoring conservative estimates that likely overstate the environmental impact rather than underestimating it. This ensures that the reported energy footprint represents a credible upper bound of actual consumption. The total network consumption is determined by aggregating the energy needs of all identified nodes, accounting for both the computational requirements of processing transactions and the energy consumed by hardware in an idle or supportive state. This rigorous framework allows for a comprehensive assessment of the network’s total power requirements over a defined reporting period, providing a transparent view of the operational costs associated with maintaining the distributed ledger's infrastructure.
The energy consumption of the Sui blockchain network is determined through a meticulous "bottom-up" methodological approach, which aggregates data across various operational components. This method considers the nodes as the primary contributors to the network's overall energy footprint. The underlying assumptions for these calculations are derived from empirical findings, gathered through the utilization of public information sites, proprietary in-house crawlers, and open-source crawlers. These tools collectively aid in collecting comprehensive data on the network's infrastructure and activity.
A critical aspect of estimating hardware usage within the network involves analyzing the specific requirements for running the client software. This forms the basis for inferring the types and quantities of hardware devices deployed across the network. The energy consumption of these identified hardware devices is then accurately measured in certified test laboratories, ensuring precision in the energy assessments. For a holistic calculation of energy consumption, the Functionally Fungible Group Digital Token Identifier (FFG DTI) is employed, where available, to identify all relevant implementations of the crypto-asset within scope. These mappings are regularly updated, leveraging data provided by the Digital Token Identifier Foundation, to maintain accuracy and completeness.
Furthermore, the information regarding the specific hardware utilized and the total number of participants in the network relies on assumptions. These assumptions are meticulously verified with best effort, drawing upon empirical data to ensure their robustness. Participants within the ecosystem are generally presumed to act with economic rationality. In adherence to a precautionary principle, whenever there is uncertainty, estimates for potential adverse impacts, such as higher energy consumption figures, are made conservatively. This approach ensures that the reported energy consumption reflects a cautious and robust assessment of the network's environmental impact. To attribute energy consumption to a specific token on the network, the overall energy consumption of the entire Sui network is first calculated, and then a fraction of this total is assigned to the token based on its activity within that network.
Key energy sources and methodologies
Sweat Economy is present on the following networks: Aptos Coin, Avalanche, Binance Smart Chain, Celo, Ethereum, Near Protocol, Optimism, Polygon, Solana, Sui.
The methodology for determining the key energy sources utilized by the Aptos network, and by extension the proportion of renewable energy, begins with precisely identifying the geographical locations of its operational nodes. This intricate process involves the systematic use of public information sources, coupled with advanced open-source and proprietary in-house crawlers, to pinpoint where these nodes are situated. In scenarios where direct geographical information for specific nodes is unavailable or insufficient, the methodology intelligently references comparable DLT networks. These reference networks are carefully chosen based on their similarities in incentivization structures and consensus mechanisms, providing a proxy for estimating energy source mixes.
Once the geographical data for the nodes is established, it is then meticulously integrated with publicly available energy mix data provided by 'Our World in Data.' This comprehensive dataset offers detailed insights into the energy generation profiles across various regions, allowing for an informed estimation of the renewable energy proportion powering the network's operations. The energy intensity metric, which quantifies the energy cost per additional transaction, is calculated as the marginal energy cost associated with processing just one more transaction. This provides a granular view of the energy efficiency.
The data sources for renewable energy usage, which are crucial for this assessment, include a range of reputable publications such as Ember (2025) and the Energy Institute's Statistical Review of World Energy (2024). These sources are heavily processed by Our World in Data to generate the 'Share of electricity generated by renewables' dataset, which is directly referenced. Users seeking to explore this data further can consult the original source: Share of electricity generated by renewables - Ember and Energy Institute. This robust approach ensures that energy consumption and renewable energy integration are assessed with the highest possible degree of transparency and accuracy.
The methodology for determining the key energy sources and the proportion of renewable energy utilized by the Avalanche blockchain network relies on a multi-pronged approach that integrates geographical data with energy mix statistics. To ascertain the percentage of renewable energy consumption, the initial step involves accurately identifying the geographical locations of the network's nodes. This crucial data is gathered through a combination of public information sites, advanced open-source crawlers, and proprietary in-house crawlers developed specifically for this purpose. In instances where comprehensive geographical distribution information for the nodes is not readily available, the methodology pivots to utilizing 'reference networks.' These reference networks are carefully selected for their comparability to Avalanche in terms of their incentivization structures and underlying consensus mechanisms, ensuring that the estimated renewable energy mix remains relevant and reflective of similar blockchain operations. Once the geographical data for the nodes (either directly identified or inferred from reference networks) is compiled, this geo-information is meticulously merged with comprehensive public data sets on electricity generation. A primary source for this integration is the data provided by Our World in Data, which offers detailed insights into the global energy landscape. The energy intensity of the network is then calculated as the marginal energy cost incurred for processing one additional transaction. This granular measurement provides a precise understanding of the energy overhead per unit of network activity. The specific datasets and sources referenced for this methodology include: Ember (2025) and the Energy Institute - Statistical Review of World Energy (2024), both of which undergo significant processing by Our World in Data. The dataset titled “Share of electricity generated by renewables – Ember and Energy Institute” is a key input, comprising original data from Ember’s “Yearly Electricity Data Europe” and “Yearly Electricity Data,” alongside the Energy Institute’s “Statistical Review of World Energy.” This information is publicly accessible at Share of electricity generated by renewables – Ember and Energy Institute.
To ascertain the proportion of renewable energy utilized by the Binance Smart Chain (BSC) network, a detailed methodology focuses on identifying the geographical distribution of its operational nodes. This process begins with leveraging a variety of data sources, including public information websites, general open-source crawlers, and specialized in-house developed crawlers. These tools collectively help pinpoint the physical locations where the network's nodes are hosted. The precise geographic distribution of these nodes is a crucial piece of information for accurately assessing renewable energy integration.
In instances where comprehensive information regarding the geographic distribution of nodes is unavailable or insufficient, the methodology incorporates a fallback mechanism. This involves using reference networks that exhibit comparable characteristics in terms of their incentivization structures and underlying consensus mechanisms. By analyzing the renewable energy usage patterns of these similar networks, an informed estimate can be made for BSC. Once geographical data for the nodes (either direct or inferred from reference networks) is established, this geo-information is meticulously merged with publicly accessible data from Our World in Data. This external dataset provides crucial insights into the share of electricity generated by renewables globally, drawing from sources like Ember (2025) and the Energy Institute’s Statistical Review of World Energy (2024). The integration of this data allows for a granular understanding of the renewable energy mix at the node locations.
Furthermore, the energy intensity of the network is calculated as the marginal energy cost with respect to one additional transaction. This metric quantifies the energy expenditure incurred for each incremental transaction processed on the network, providing a measure of its operational efficiency from an energy perspective. The consistent use of reputable public data sources and a robust methodology ensures transparency and accuracy in reporting the renewable energy profile of the Binance Smart Chain network.
The determination of key energy sources and the proportion of renewable energy utilized by the Celo blockchain network involves a structured and multi-faceted methodology. The initial critical step is to accurately identify the geographical locations of the network's operational nodes. This identification process leverages a variety of data sources, including readily available public information sites, sophisticated open-source crawlers, and proprietary in-house developed crawlers, all working in concert to pinpoint the physical distribution of the network infrastructure. In scenarios where precise geographical information regarding the nodes is not sufficiently available, the methodology resorts to using reference networks. These chosen reference networks are carefully selected based on their structural comparability, specifically in terms of their incentive mechanisms and underlying consensus protocols, ensuring that the energy profile is as relevant as possible. Once geographical data is established, whether directly or through reference, this information is then meticulously merged with comprehensive public data sets provided by Our World in Data. This integration allows for a contextual understanding of the energy mix and renewable energy penetration in the regions where Celo's nodes are operational. A crucial metric derived from this analysis is the energy intensity, which is precisely calculated as the marginal energy cost associated with processing one additional transaction on the network. This provides a granular insight into the energy efficiency per unit of activity. For further details on the underlying data sources concerning renewable electricity generation, interested parties can refer to the comprehensive datasets compiled by Ember and the Energy Institute, accessible via Share of electricity generated by renewables - Ember and Energy Institute. This meticulous approach ensures a transparent and empirically grounded assessment of the network's energy profile.
To ascertain the proportion of renewable energy utilized by the Ethereum network, a specific set of methodologies is applied. The initial step involves pinpointing the geographical locations of the network's nodes. This crucial geo-information is gathered through various means, including publicly available information sites, as well as both open-source and internally developed crawlers designed to scan the network. In instances where comprehensive geographical data for nodes is not directly accessible, the analysis resorts to leveraging "reference networks." These are comparable networks chosen for their similar incentivization structures and consensus mechanisms, providing a proxy for node distribution. Once the geo-information is established, it is then integrated and cross-referenced with public data obtained from "Our World in Data." This comprehensive dataset offers insights into the energy mixes and renewable energy penetration across different regions globally. The final calculation of energy intensity is defined as the marginal energy cost incurred for processing one additional transaction on the network. This approach allows for an estimation of the energy footprint associated with scaling the network's transactional volume. For detailed information and the underlying data sources on the share of electricity generated by renewables, relevant information can be found through sources such as Ember (2025) and the Energy Institute - Statistical Review of World Energy (2024), with further processing by Our World in Data, accessible via Share of electricity generated by renewables – Ember and Energy Institute.
To accurately determine the proportion of renewable energy utilized by the NEAR Protocol network, a systematic methodology is employed focusing on the geographic distribution of its operational nodes. The initial step involves identifying the precise locations of these nodes using a combination of public information sites, advanced open-source crawlers, and internally developed specialized crawlers. This comprehensive data collection ensures a broad and accurate understanding of the physical presence of the network's infrastructure.In instances where precise geographic information for certain nodes might be unavailable, the methodology incorporates a fallback mechanism. It leverages data from reference networks that are deemed comparable to NEAR Protocol in terms of their incentivization structures and underlying consensus mechanisms. This comparative analysis helps to fill data gaps and provide a reasonable proxy for renewable energy usage in such cases.Once the geographical data for the nodes is established, this geo-information is meticulously integrated with publicly available datasets from reputable sources, notably "Our World in Data." This integration allows for the correlation of node locations with regional energy grid compositions and the prevalence of renewable energy sources in those areas. The final aspect of this methodology involves calculating the energy intensity of the network. This is defined as the marginal energy cost incurred with respect to processing one additional transaction on the NEAR Protocol blockchain. This metric provides a granular view of the energy efficiency per unit of network activity. For detailed information regarding the underlying energy data, the following sources are utilized: Share of electricity generated by renewables – Ember and Energy Institute. This rigorous approach ensures a transparent and verifiable assessment of renewable energy integration within the network's operations.
For the Optimism blockchain network, the notion of "key energy sources" primarily refers to the specific operational components that draw electrical power, consistent with its design as a Layer 2 solution built atop Ethereum. Optimism's energy requirements are inherently linked to the power needed to operate the hardware and infrastructure that support its sequencers. These sequencers are critical for processing and batching transactions off-chain. Additionally, the network of participants, including validators and challengers involved in the fraud proof mechanism, also contribute to the energy expenditure. Since Optimism derives its ultimate security from the Ethereum main chain, the energy consumption associated with Ethereum's underlying Proof-of-Stake validators also indirectly feeds into Optimism's overall energy footprint. While the provided documents do not specify the precise geographical locations or the specific types of power grids (e.g., renewable versus fossil fuel sources) that supply energy to these components, the functional "sources" of energy consumption are fundamentally the computational resources and networking equipment that constitute these operational nodes.
The methodology for quantifying this energy consumption adheres to a meticulous "bottom-up" approach. This process begins by identifying the exact hardware components, such as servers, processors, and associated networking gear, necessary to run the Optimism network's client software. The power draw of these individual hardware devices is typically ascertained through precise measurements conducted in certified test laboratories. The total estimated energy expenditure is then derived by multiplying the measured power consumption of these devices by their estimated operational duration and the assumed number of active participating nodes or sequencers. The Functionally Fungible Group Digital Token Identifier (FFG DTI) is employed to ensure that all relevant instances and implementations of crypto-assets within the network are accurately identified for a comprehensive measurement. Data concerning hardware utilization and the number of network participants are based on empirically verified assumptions, generally assuming economically rational behavior among participants. In situations where data is uncertain, a conservative estimation approach is applied, resulting in higher reported energy impact figures to mitigate any potential underestimations. This framework systematically accounts for the energy consumed by Optimism's operational infrastructure and its interaction with Ethereum's Layer 1, even in the absence of granular details about specific energy grid mixes.
The available documentation details the methodologies for calculating the Polygon network's energy consumption, but it does not explicitly identify the key energy sources (e.g., renewable vs. non-renewable electricity, specific grid mixes) that power its underlying infrastructure. Instead, the focus is on the methodology of consumption assessment. The energy calculation employs a "bottom-up" approach, which considers individual nodes as the primary units of energy consumption within the network. This methodology draws on empirical findings from various data points, including public information sites, open-source crawlers, and proprietary in-house developed crawlers, to estimate the hardware utilized across the network.
The primary determinants for estimating the hardware's energy usage are the computational requirements for running the client software. The energy consumption of these specific hardware devices is meticulously measured and verified in certified test laboratories to ensure precise data collection. To accurately scope all relevant implementations of the crypto-asset for energy calculation, the Functionally Fungible Group Digital Token Identifier (FFG DTI) is utilized, with its mappings regularly updated through data from the Digital Token Identifier Foundation. Assumptions regarding the hardware in operation and the total count of network participants are diligently verified against empirical data, operating under the premise that participants are largely economically rational. In line with a precautionary principle, any uncertainties default to conservative estimates, leaning towards higher figures for potential adverse impacts.
Significantly, as Polygon functions as a Layer 2 scaling solution for Ethereum, its energy consumption calculation also integrates a portion of the Ethereum network's energy usage. This inclusion acknowledges Ethereum's fundamental role in providing security to Polygon. The specific proportion attributed is determined by the gas consumption on the Ethereum network, ensuring a comprehensive view of Polygon's energy demand, considering its reliance on the main Layer 1 chain. While these methodologies provide a clear framework for quantifying energy use, specific details regarding the actual sources of this energy are not elaborated upon in the provided documents, nor are any direct links to external documents specifying these sources or methodologies furnished.
The determination of energy sources for the Solana blockchain network involves a sophisticated geolocation mapping of the global node infrastructure. By utilizing internal and open-source crawlers, the physical locations of validator nodes are identified. Once the geographic distribution is established, this information is cross-referenced with regional energy data to calculate the percentage of renewable energy utilized by the network. For regions where specific node data is unavailable, researchers utilize reference networks that share similar consensus mechanisms and incentive structures as proxies to estimate the geographic spread of the infrastructure. The primary data source for these regional energy profiles is the Share of electricity generated by renewables dataset provided by Our World in Data, which incorporates research from Ember and the Energy Institute. This dataset provides yearly electricity data that allows for a granular assessment of how much of the network's power is derived from wind, solar, hydro, and other renewable sources. In addition to the total percentage of green energy, the methodology focuses on energy intensity, which is defined as the marginal energy cost required to process a single additional transaction on the network. This figure helps quantify the efficiency of the blockchain's resource usage relative to its utility. By integrating global energy statistics with real-time node distribution data, the network can report a more accurate picture of its sustainability, currently indicating that a significant portion of its operational energy comes from renewable sources, reflecting the broader global transition toward cleaner power grids.
The methodology for determining the proportion of renewable energy utilized by the Sui blockchain network involves a detailed process focused on identifying the geographical distribution of its operational nodes. This identification is achieved through a combination of public information sources, custom-developed in-house crawlers, and various open-source data collection tools. In instances where specific geographic information about the nodes is not readily available, the methodology pivots to referencing comparable blockchain networks. These reference networks are carefully selected based on similarities in their incentivization structures and consensus mechanisms, providing a proxy for estimating the node locations when direct data is absent.
Once the geo-information regarding node locations is established, it is then meticulously integrated with publicly available data sourced from "Our World in Data". This integration allows for a comprehensive assessment of the energy mix supporting the network's operations. The energy intensity, which measures the environmental impact per unit of activity, is computed as the marginal energy cost associated with processing one additional transaction on the network. This metric provides insight into the incremental energy footprint of network operations. The data utilized for these calculations is derived from authoritative sources, including Ember (2025) and the Energy Institute – Statistical Review of World Energy (2024), with further processing by Our World in Data. Specifically, the dataset titled "Share of electricity generated by renewables - Ember and Energy Institute" is retrieved from [Our World in Data](https://ourworldindata.org/grapher/share-electricity-ren ewables). This systematic approach ensures that the renewable energy assessment is grounded in verifiable data and rigorous analytical methods, reflecting a commitment to transparent reporting of the network's energy profile.
Key GHG sources and methodologies
Sweat Economy is present on the following networks: Aptos Coin, Avalanche, Binance Smart Chain, Celo, Ethereum, Near Protocol, Polygon, Solana, Sui.
The methodology for quantifying Greenhouse Gas (GHG) emissions attributable to the Aptos network relies on a detailed analysis that starts with identifying the geographical locations of its network nodes. Similar to energy source determination, this involves extensive data collection using public information sites, alongside specialized open-source and in-house developed crawlers. Should specific geographical data for nodes be incomplete, the approach mandates the use of reference networks that exhibit comparable incentivization frameworks and consensus mechanisms. This ensures that a reasonable estimation of the emission profile can still be achieved, even when direct information is scarce.
Upon obtaining the geographical distribution of nodes, this geo-information is subsequently integrated with publicly accessible data from 'Our World in Data.' This critical step allows for the correlation of node locations with regional carbon intensity of electricity generation, thereby enabling the calculation of associated GHG emissions. The overall GHG intensity is then calculated as the marginal emission generated by each additional transaction. This provides a precise measure of the environmental impact per unit of network activity, highlighting the efficiency of the network's operations from an emissions perspective.
The primary data sources underpinning these GHG emission calculations are contributions from Ember (2025) and the Energy Institute's Statistical Review of World Energy (2024), which undergo significant processing by Our World in Data. Specifically, the 'Carbon intensity of electricity generation' dataset is utilized for these estimations. Further details and the original data can be found at: Carbon intensity of electricity generation - Ember and Energy Institute. This information is licensed under CC BY 4.0, emphasizing its open and verifiable nature.
The methodology employed to determine the Greenhouse Gas (GHG) emissions associated with the Avalanche blockchain network involves a detailed process of locating network infrastructure and integrating this geographical data with carbon intensity statistics. The initial step is to precisely identify the locations of the network's nodes, a task accomplished through the diligent use of public information sites, sophisticated open-source crawlers, and specialized in-house crawlers. This geographical mapping is fundamental to understanding the specific energy grids from which the nodes draw their power. In situations where direct geographical information on node distribution is insufficient, the methodology relies on 'reference networks.' These are selected based on their structural similarities to Avalanche, particularly concerning their incentivization mechanisms and consensus protocols, ensuring that the estimates are as representative as possible. The collected geo-information, whether direct or inferred, is then carefully integrated with public data regarding the carbon intensity of electricity generation. A significant source for this critical data is Our World in Data, which provides comprehensive global information on electricity generation’s carbon footprint. The GHG intensity of the network is quantified as the marginal emission generated per additional transaction processed. This metric allows for a precise evaluation of the environmental impact as network activity scales. The foundational data and citations for this methodology include: Ember (2025) and the Energy Institute - Statistical Review of World Energy (2024), which have been extensively processed by Our World in Data. The specific dataset used is titled “Carbon intensity of electricity generation – Ember and Energy Institute,” drawing original data from Ember’s “Yearly Electricity Data Europe” and “Yearly Electricity Data,” as well as the Energy Institute’s “Statistical Review of World Energy.” This crucial resource for carbon intensity data is available under a CC BY 4.0 license at Carbon intensity of electricity generation – Ember and Energy Institute.
The methodology for determining the Greenhouse Gas (GHG) Emissions associated with the Binance Smart Chain (BSC) network, much like the energy consumption assessment, places a strong emphasis on geographically situating its operational nodes. The initial step involves identifying the physical locations of these nodes, which is achieved through a combination of public information sites, open-source crawlers, and specialized in-house developed crawlers. Accurately mapping these locations is fundamental, as regional electricity mixes and their associated carbon footprints vary significantly.
In situations where detailed geographical information for all nodes is not readily available, the methodology incorporates a pragmatic approach. This involves utilizing reference networks that share similar characteristics, specifically in their incentivization structures and consensus mechanisms. By studying these comparable networks, reasonable inferences can be made about the likely geographic distribution and, consequently, the emissions profile of BSC's nodes. Once the geographic data is gathered or estimated, it is then meticulously integrated with publicly available information from Our World in Data. This authoritative dataset provides critical data on the carbon intensity of electricity generation across various regions, compiling information from sources such as Ember (2025) and the Energy Institute’s Statistical Review of World Energy (2024).
This integration allows for the calculation of GHG emissions based on the electricity consumption at specific node locations and the carbon intensity of those regional grids. The intensity of GHG emissions for the network is specifically calculated as the marginal emission with respect to one additional transaction. This metric quantifies the increase in GHG emissions for each incremental transaction processed on the network, offering a direct measure of its environmental impact per unit of activity. The entire process adheres to a principle of transparency, utilizing established external data sources and a consistent approach to ensure the reported GHG emissions are as accurate and comprehensive as possible, always acknowledging that the data from Our World in Data is licensed under CC BY 4.0.
The methodology for assessing the key Greenhouse Gas (GHG) sources and calculating emissions for the Celo blockchain network mirrors the rigorous approach applied to energy consumption analysis. A fundamental step involves precisely identifying the geographical locations of the network's nodes. This process relies on a combination of publicly accessible information sites, advanced open-source crawling tools, and specialized in-house developed crawlers designed to map the physical footprint of the network. Should direct geographical data for all nodes be unavailable or insufficient, the methodology wisely employs a strategy of leveraging reference networks. These alternative networks are carefully chosen for their strong comparability in terms of both their incentive structures and their core consensus mechanisms, ensuring that the environmental impact assessment remains pertinent. Following the collection of geographical data, whether directly or through comparative analysis, this information is integrated with extensive public data available from Our World in Data. This integration is essential for contextualizing the carbon footprint in relation to the energy sources used in the identified locations. The GHG intensity of the network is then determined, calculated as the marginal emission produced for each additional transaction processed. This metric offers valuable insight into the environmental impact per unit of network activity. For detailed information regarding the carbon intensity of electricity generation, a primary source for this data, stakeholders can consult the relevant datasets published by Ember and the Energy Institute, which are available through Carbon intensity of electricity generation - Ember and Energy Institute. This methodology ensures a comprehensive and transparent evaluation of the network's environmental performance concerning GHG emissions.
The methodology for determining the Greenhouse Gas (GHG) emissions of the Ethereum network closely mirrors the approach used for energy consumption, focusing on identifying emission sources and their quantification. The initial and fundamental step involves precisely identifying the geographical locations of the network's operational nodes. This data collection is facilitated through a combination of publicly available information, as well as specialized open-source and proprietary crawlers designed to actively discover and map node distributions across the globe. Should there be an absence of specific geographic information for the nodes, the analysis intelligently defaults to utilizing "reference networks." These are carefully selected networks that exhibit comparable characteristics in terms of their incentivization structures and consensus mechanisms, providing a basis for estimating the geographic spread when direct data is unavailable. This collected geo-information is then meticulously integrated with publicly accessible data from "Our World in Data." This integration allows for the application of regional carbon intensity factors to the estimated energy consumption, thereby enabling the calculation of associated GHG emissions. The overall GHG intensity is quantified as the marginal emission generated per additional transaction processed on the network, offering a metric for the environmental impact of increased network activity. For detailed information and original data regarding the carbon intensity of electricity generation, sources include Ember (2025) and the Energy Institute - Statistical Review of World Energy (2024), processed by Our World in Data, available at Carbon intensity of electricity generation – Ember and Energy Institute. This resource is licensed under CC BY 4.0.
The assessment of Greenhouse Gas (GHG) Emissions for the NEAR Protocol network follows a structured methodology that prioritizes the precise geographical identification of its operational nodes. This process begins by actively determining the locations of all network nodes, utilizing a combination of publicly accessible information sites, sophisticated open-source crawling tools, and specialized crawlers developed in-house. This multi-pronged data acquisition strategy aims to gather comprehensive location data for the network's infrastructure.Should specific geographic distribution data for certain nodes prove unobtainable, the methodology incorporates the use of reference networks. These are carefully selected based on their similarity to the NEAR Protocol in terms of their incentive structures and consensus mechanisms, allowing for an informed estimation of GHG emissions in the absence of direct data. This comparative approach ensures that even with limited direct information, a credible assessment can still be made.The collected geo-information is subsequently integrated with extensive public datasets, prominently featuring data from "Our World in Data." This integration enables the cross-referencing of node locations with regional carbon intensity data of electricity generation, providing a basis for calculating the associated GHG emissions. A crucial metric derived from this methodology is the GHG intensity, which quantifies the marginal emission attributable to processing one additional transaction on the NEAR Protocol network. This metric offers insights into the environmental footprint per unit of network activity. For detailed data on carbon intensity, the following resource is referenced: Carbon intensity of electricity generation – Ember and Energy Institute. This rigorous and transparent methodology underpins the network's efforts to measure and report its environmental impact.
The provided documents offer comprehensive details regarding the methodologies for calculating the energy consumption of the Polygon blockchain network, which are predicated on a "bottom-up" approach focusing on node energy demand, hardware requirements, and the integration of a proportion of Ethereum's energy consumption due to Polygon's Layer 2 architecture. This framework is robust for quantifying electrical energy usage. However, when addressing the topic of key Greenhouse Gas (GHG) sources and their associated methodologies, the provided information is notably insufficient. The documents do not contain any specific data or discussions pertaining to the direct or indirect GHG emissions generated by the Polygon network's operations.
Crucially, there is no mention of the types of emissions (e.g., Scope 1 for direct emissions, Scope 2 for indirect emissions from purchased electricity, or Scope 3 for other indirect emissions within the value chain), nor any dedicated methodologies for calculating, monitoring, or reporting these GHG emissions. The absence of information on the energy mix that powers the network's validators and underlying infrastructure – whether it is predominantly from renewable sources, fossil fuels, or a specific national grid mix – makes it impossible to determine the carbon intensity of the energy consumed. Without such details, a comprehensive assessment of GHG sources cannot be made.
While the methodology for energy consumption includes a "precautionary principle" to make higher estimates for "adverse impacts," these impacts are not explicitly defined or quantified in terms of GHG emissions. There is no information provided on specific conversion factors used to translate energy consumption into carbon dioxide equivalents or other greenhouse gases. The documents do not offer any external links or references to dedicated environmental impact assessments or GHG reporting standards followed by the Polygon network. Consequently, based solely on the provided information, it is not possible to identify the key GHG sources or the specific methodologies employed for their quantification within the Polygon ecosystem.
Quantifying the greenhouse gas (GHG) emissions of the Solana blockchain network requires a methodology focused on carbon intensity and the geographic footprint of its decentralized nodes. Similar to the energy source analysis, the process begins by locating active nodes using a combination of public data and specialized web crawling technology. This geographic information is critical because the carbon footprint of electricity varies significantly between different jurisdictions depending on their local power generation mix. For nodes that cannot be precisely located, the analysis uses data from comparable blockchain networks to ensure the estimation remains as complete as possible. The carbon intensity of the electricity used by these nodes is derived from the Carbon intensity of electricity generation dataset, accessible via Our World in Data. This dataset, which is licensed under CC BY 4.0, provides essential metrics on the amount of CO2 equivalent emitted per kilowatt-hour of electricity produced in various countries. By merging node locations with these carbon intensity values, the network can calculate its Scope 2 emissions, which represent the indirect emissions from the generation of purchased electricity. The methodology also focuses on GHG intensity, measuring the marginal emissions generated by one additional transaction on the blockchain. This allows for a performance-based assessment of the network's environmental impact. The results are typically reported in tonnes of CO2 equivalent (tCO2e), providing a standardized metric that allows for comparison with other industries and financial systems. This data-driven approach ensures that the network’s environmental disclosures are rooted in empirical global energy statistics and verifiable infrastructure data.
The methodology for quantifying Greenhouse Gas (GHG) Emissions attributable to the Sui blockchain network is systematically designed, beginning with the precise determination of the physical locations of the network's operational nodes. This critical geographic data is gathered through a combination of publicly accessible information sites, internally developed crawlers, and various open-source data collection mechanisms. Should direct information on the geographical distribution of these nodes prove unavailable, the assessment relies on data from reference networks. These alternative networks are chosen for their structural similarities, particularly concerning their incentivization mechanisms and consensus protocols, allowing for a reasonable estimation of node locations.
Following the acquisition of node location data, this geo-information is subsequently integrated with relevant public data from "Our World in Data". This merging of datasets facilitates a robust calculation of the network's GHG emissions. A key metric in this assessment is the GHG intensity, which is defined as the marginal emission produced per additional transaction processed on the network. This provides a granular understanding of the environmental impact of each unit of network activity. The foundational data for these emissions calculations is sourced from reputable entities such as Ember (2025) and the Energy Institute - Statistical Review of World Energy (2024), with further analytical processing undertaken by Our World in Data. Specifically, the dataset employed for this purpose is "Carbon intensity of electricity generation - Ember and Energy Institute", which can be accessed via Our World in Data. This dataset is made available under a CC BY 4.0 license. This comprehensive methodology ensures a transparent and empirically-backed evaluation of the Sui network’s carbon footprint.