Tether (USDT) sustainability report

NameBlockNodes SAS
Relevant legal entity identifier969500PZJWT3TD1SUI59
Name of the crypto-assetTether
Beginning of the period to which the disclosure relates2025-04-29
End of the period to which the disclosure relates2026-04-29
Energy consumption821016.48879 kWh/a
Renewable energy consumption33.9978243620 %
Energy intensity0.00001 kWh
Scope 1 DLT GHG emission - Controlled0.00000 tCO2e
Scope 2 DLT GHG emission - Purchased1356.05351 tCO2e
GHG intensity0.00000 kgCO2e

Consensus Mechanism

Tether is present on the following networks: Aptos Coin, Avalanche, Celo, Ethereum, Kava, Klaytn, Near Protocol, Solana, Tezos, Tron.

The Aptos blockchain network leverages a robust Proof-of-Stake (PoS) framework, integrated with a Byzantine Fault Tolerant (BFT) consensus protocol, to achieve high transaction throughput, minimal latency, and fortified security. A foundational component of this architecture is Block-STM, a parallel execution engine that allows for the simultaneous processing of multiple transactions. This parallel processing capability is critical for enhancing the network's overall performance and scalability, enabling it to handle a significant volume of operations efficiently. The consensus mechanism operates on a leader-based BFT model, where a specific validator is elected to propose new blocks. Following the proposal, other validators on the network are responsible for validating and subsequently finalizing these transactions. This structured approach ensures that transactions are processed in an orderly yet highly efficient manner.

To further bolster decentralization and mitigate the risk of collusion, Aptos incorporates a dynamic validator rotation system. This mechanism regularly shuffles the set of active validators, preventing any single entity or small group from gaining undue influence over the network's consensus process. A key feature of the Aptos network is its commitment to instant finality. Once transactions are validated by the network's participants, they achieve immediate and irreversible finality. This means that confirmed transactions cannot be altered or reversed, providing users and applications with a high degree of certainty and reliability. The combination of PoS for economic security, BFT for fault tolerance, parallel execution for performance, dynamic rotation for decentralization, and instant finality for reliability positions Aptos as a high-performance and secure blockchain platform designed for scalable applications.

The Avalanche blockchain network implements a sophisticated Proof-of-Stake (PoS) mechanism known as Avalanche Consensus, distinguishing itself from many other PoS protocols by incorporating a novel, subsampling-based approach rather than a traditional Byzantine Fault Tolerant (BFT) consensus. This unique consensus process is built upon three integrated protocols: Snowball, Snowflake, and Avalanche, all working in concert to achieve high throughput, rapid finality, and robust security. The process begins with the Snowball protocol, where each validator randomly samples a small, fixed-size group of other validators. Through repeated polling of these sampled validators, a preference for a particular transaction is established. Validators maintain confidence counters for each transaction, incrementing them as sampled validators express support for their chosen transaction. A transaction is deemed accepted once its confidence counter surpasses a predefined threshold. Building upon Snowball, the Snowflake protocol refines the process by introducing a binary decision system, compelling validators to choose between two conflicting transactions. Binary confidence counters track the preferred binary choice, and once a specific confidence level is attained, the decision becomes final and irreversible. The overarching Avalanche protocol organizes transactions using a Directed Acyclic Graph (DAG) structure. This DAG architecture is crucial for facilitating parallel transaction processing, which significantly enhances the network's overall throughput and efficiency. Transactions are added to the DAG based on their intrinsic dependencies, ensuring a consistent and logical order across the network. Ultimately, validators reach consensus on both the structure and content of this DAG through the iterative application of the Snowball and Snowflake protocols. The Avalanche X-Chain, a component of the broader Avalanche network, also utilizes this Avalanche consensus protocol, emphasizing repeated subsampling of validators to achieve agreement on transactions. Furthermore, networks like Flare integrate the Avalanche Consensus with a Federated Byzantine Agreement (FBA) model to further bolster scalability, security, and decentralization, leveraging a gossip protocol for rapid node communication and transaction confirmation.

The Celo blockchain network operates on a Proof of Stake (PoS) consensus mechanism, a foundational element supporting its decentralized architecture, robust network security, and a governance model that is strongly driven by its community. Central to this mechanism are the validators, who bear the significant responsibilities of proposing and creating new blocks, meticulously validating transactions to ensure their legitimacy, and continuously upholding the overall security and integrity of the network. These validators are not chosen arbitrarily; their selection is critically dependent on the quantity of tokens they hold and commit to stake. This economic commitment serves as a powerful incentive for honest participation and contributes substantially to the network's reliability and resilience against potential attacks. The PoS design inherently positions Celo as a significantly more energy-efficient alternative when compared to energy-intensive Proof of Work systems, aligning with broader sustainability goals in the blockchain space. Further enhancing its decentralized nature, Celo incorporates a unique decentralized governance structure. This empowers its token holders to actively engage in the network's strategic direction by voting on various proposals and proposed modifications to the protocol. This community-driven approach ensures that the network's evolution is reflective of its user base's collective interests, promoting adaptability and responsiveness. The continuous validation and proposal of blocks by a rotating set of staked validators, whose economic interest is aligned with the network's success, creates a self-sustaining and secure environment. Through this system, transaction finality is achieved efficiently, and the network can scale its operations while maintaining high levels of security and user participation, which are critical for its mission of financial inclusion.

The Ethereum blockchain network, following "The Merge" in 2022, operates on a Proof-of-Stake (PoS) consensus mechanism, a significant departure from its previous Proof of Work system. This transition replaced energy-intensive mining with validator staking, aiming to enhance energy efficiency, security, and scalability. In this model, participants willing to secure the network act as validators by staking a minimum of 32 units of the network's native asset (Ether). The network organizes its operations around a precise slot and epoch system. Every 12 seconds, a validator is randomly selected to propose a new block. Following this proposal, other validators on the network verify the integrity and validity of the block. Finalization of transactions, meaning they become irreversible, occurs after approximately two epochs, which translates to about 12.8 minutes, utilizing the Casper-FFG (Friendly Finality Gadget) protocol. The Beacon Chain plays a central role in coordinating the activities of these validators, while the LMD-GHOST (Latest Message Driven-Greedy Heaviest Observed SubTree) fork-choice rule is employed to ensure all network participants agree on the canonical chain, following the branch with the heaviest accumulated validator votes. Validators are economically incentivized for their honest participation in proposing and verifying blocks, but they also face severe penalties, known as slashing, for malicious actions or prolonged inactivity. This PoS framework is designed not only to reduce the network's environmental footprint but also to lay the groundwork for future upgrades, such as Proto-Danksharding, which are intended to further improve transaction efficiency and overall network throughput. The core components like validator selection, block production, and transaction finality are intrinsically tied to the amount of Ether staked, ensuring that participants have a vested interest in the network's security and stability.

The Kava blockchain network employs a robust Proof of Stake (PoS) consensus mechanism, integrated with the Tendermint Core consensus engine, to ensure high levels of security, scalability, and decentralized governance. This architecture is fundamental to how transactions are validated and blocks are finalized on the Kava network. Tendermint Core, which leverages a Practical Byzantine Fault Tolerance (PBFT) based consensus algorithm, is critical for achieving rapid block finality and maintaining consistent transaction validation across the distributed ledger. This means that once a block is committed, it is considered irreversible, providing strong assurances for network participants.

Under the Proof of Stake model, validators on the Kava network are chosen based on the amount of KAVA tokens they have staked or have been delegated by other token holders. The system is configured to have the top 100 nodes, determined by their total bonded stake, responsible for the crucial tasks of validating transactions and proposing new blocks. This selective participation helps streamline the consensus process while still promoting decentralization through a competitive staking environment. To ensure accountability and foster honest participation, the Kava network incorporates a sophisticated slashing mechanism. This system penalizes validators who engage in malicious activities, such as double-signing transactions or experiencing extended periods of downtime, by reducing their staked KAVA tokens. This economic disincentive aligns validators' interests with the overall health and integrity of the network, reinforcing its security posture. The combination of Tendermint Core’s BFT properties and a well-structured PoS model with strong accountability measures makes Kava a resilient and efficient blockchain environment.

Klaytn utilizes a sophisticated consensus mechanism known as a modified Istanbul Byzantine Fault Tolerance (IBFT) algorithm, which operates as a variant of the Proof of Authority (PoA) model. This design is engineered to deliver high transactional performance and ensure immediate transaction finality, meaning that once a block is validated, it is irreversibly settled. This approach significantly enhances the user experience by guaranteeing rapid and secure transaction processing. The core of Klaytn's consensus architecture is structured around several key components. The modified IBFT algorithm is crucial for its ability to provide immediate transaction finality, a feature that distinguishes it from many other blockchain networks by offering instant settlement guarantees. Governance of the Klaytn network is entrusted to the Klaytn Governance Council, a collective body comprising global organizations. This council is pivotal in selecting and overseeing the Consensus Nodes (CNs) that maintain the network's integrity. This council-driven governance model strikes a balance between decentralization and operational efficiency, promoting transparent decision-making. For any block to achieve finality and be added to the blockchain, it must secure signatures from over two-thirds of the council members, a stringent requirement that ensures robust consensus and heightened network security. Furthermore, Klaytn employs a distinctive three-tiered node architecture to optimize its operations. Consensus Nodes (CNs) are the primary validators, responsible for the critical tasks of producing new blocks and validating transactions, thus forming the backbone of the network's security and stability. Supporting the CNs are Proxy Nodes (PNs), which serve as vital intermediaries, facilitating the relay of data between the Consensus Nodes and the wider network. This distributed data relay mechanism aids in managing network traffic and improving overall accessibility. The final tier consists of Endpoint Nodes (ENs), which act as the direct interface for end-users, enabling them to initiate transactions, execute smart contracts, and access the Klaytn network seamlessly. This layered architecture supports Klaytn's objective of combining high performance with a secure and stable operational environment.

The NEAR Protocol blockchain network operates on a distinctive consensus mechanism that synergistically combines the principles of Proof of Stake (PoS) with a proprietary innovation known as Doomslug, further enhanced by dynamic sharding through Nightshade. This multi-faceted approach is engineered to deliver high efficiency, rapid transaction finality, and robust security across the network. At its foundation, the system relies on Proof of Stake, where participants, termed validators, secure the network by staking their native NEAR tokens. The greater the stake, coupled with community trust, the higher their probability of being chosen to propose and validate blocks.Doomslug significantly accelerates transaction finality. Unlike single-stage block confirmations, Doomslug introduces a two-stage process. Initially, validators propose new blocks. Finality is achieved swiftly when two-thirds of the participating validators formally approve the proposed block, making confirmed transactions irreversible and preventing potential forks. This rapid finality is crucial for applications demanding near-instant confirmations. Complementing this, NEAR integrates Nightshade, a dynamic sharding technique. Nightshade segments the network into multiple shards, allowing for the parallel processing of transactions. Each shard handles a distinct subset of transactions concurrently, and their respective processing outcomes are then consolidated into a single "snapshot" block. This dynamic sharding is vital for scalability, enabling the network to efficiently manage increasing transaction volumes and user demand without compromising performance.The consensus process also emphasizes decentralization and fairness through epoch rotation. Validators are regularly reshuffled across distinct intervals called epochs. This rotation mechanism ensures a balanced distribution of block proposal opportunities and validation responsibilities among eligible validators, mitigating centralization risks and promoting sustained network resilience. By integrating PoS for economic security, Doomslug for fast finality, and Nightshade for scalable throughput, the NEAR Protocol establishes a high-performance and secure blockchain environment.

The Solana blockchain architecture operates through a hybrid consensus model that integrates Proof of History (PoH) with Proof of Stake (PoS). This combination is designed to optimize transaction throughput and reduce network latency while maintaining a high degree of security. Proof of History functions as a decentralized clock, using a Verifiable Delay Function (VDF) to create a permanent, timestamped record of events. This cryptographic sequence allows the network to agree on the chronological order of transactions without requiring nodes to communicate extensively, thereby solving traditional synchronization bottlenecks found in other distributed ledgers. Parallel to PoH, the Proof of Stake component manages the selection of validators and the finalization of the ledger state. Validators are chosen to act as leaders for specific blocks based on the total quantity of the native network assets they have staked. Users who do not run their own hardware can participate in network security by delegating their assets to existing validators, sharing in the rewards generated by successful block production. The consensus process begins when transactions are broadcast and collected for validation. A designated leader then generates a PoH sequence to order these transactions within a block. Subsequently, other validators in the network verify the integrity of the PoH hashes and the validity of the transactions. Once a sufficient number of signatures are collected, the block is finalized and appended to the blockchain. This dual approach ensures that the network remains resilient against attacks; validators must provide collateral through staking, and any malicious activity, such as producing invalid blocks or double-signing, can result in the loss of staked assets through a process known as slashing. This economic deterrent ensures that participants remain aligned with the network's health and operational standards.

The Tezos blockchain network operates on a Liquid Proof of Stake (LPoS) consensus mechanism, a sophisticated design that integrates flexible staking participation with an innovative on-chain governance model. This core mechanism allows XTZ token holders to contribute to network security by either directly staking their tokens or delegating them to a validator, commonly known as a baker, without transferring ownership of their assets. This delegation feature significantly broadens participation, making network security more accessible. Bakers are central to the network's operations, responsible for creating new blocks (baking) and validating other blocks through endorsement. Their selection is directly proportional to the amount of XTZ staked or delegated to them; a higher stake increases their probability of being chosen for these critical tasks. To bolster network security further, endorsers are randomly selected from the pool of active bakers to validate and approve blocks proposed by other bakers. A distinctive characteristic of Tezos is its self-amendment protocol, which underpins its adaptive on-chain governance. This system empowers XTZ token holders to propose, vote on, and implement network upgrades directly on the blockchain, bypassing the need for disruptive hard forks. This capacity for self-evolution ensures that the Tezos network can continuously adapt and enhance its functionalities based on community and developer input, fostering a highly flexible and resilient blockchain environment that maintains decentralization while enabling consistent improvement.

The Tron blockchain utilizes a Delegated Proof of Stake (DPoS) consensus mechanism, specifically engineered to enhance scalability, boost transaction speeds, and improve energy efficiency compared to alternative consensus models. This system's core relies on token holders actively participating in network governance and security. A primary component of DPoS on Tron involves token holders voting for a select group of delegates known as Super Representatives (SRs). These SRs are crucial for validating transactions and generating new blocks that are then added to the blockchain. The selection process dictates that token holders cast their votes based on their stake in the Tron network, with the top 27 SRs (or potentially more, depending on protocol updates) being chosen to actively engage in the block production cycle. Block production on the Tron network is highly efficient, with SRs taking turns to produce blocks in a rotational manner, ensuring a degree of decentralization and preventing undue influence by any single entity. This rotational system allows the Tron blockchain to achieve rapid block finality, with new blocks being produced approximately every 3 seconds. Such speed enables the network to process thousands of transactions per second, making it suitable for high-throughput applications. Beyond transaction validation, the DPoS framework empowers Tron token holders to participate in vital network decisions. Their voting power is directly proportional to the amount of TRX, Tron’s native token, they hold and choose to stake. This robust governance system allows the community to influence protocol upgrades and changes to the network's operational parameters, fostering an engaged and decentralized decision-making environment. The Super Representatives are fundamental to maintaining the Tron blockchain's security and stability, carrying the responsibility for validating transactions, proposing new blocks, and ensuring overall network functionality, for which they are compensated with block rewards and transaction fees.

Incentive Mechanisms and Applicable Fees

Tether is present on the following networks: Aptos Coin, Avalanche, Celo, Ethereum, Kava, Klaytn, Near Protocol, Solana, Tezos, Tron.

The Aptos blockchain network employs a comprehensive system of incentive mechanisms and applicable fees designed to ensure network security, encourage participation, and maintain operational efficiency. A core incentive for network participants is the validator reward system. Validators, who are crucial for validating transactions and producing new blocks, earn rewards in the network's native token. These rewards are distributed proportionally, reflecting both the amount of tokens staked by the validators themselves and the contributions from their delegators. This direct financial incentive encourages validators to maintain high uptime and act honestly in their network duties.

Further promoting broader participation, Aptos allows for delegator involvement. Token holders who prefer not to operate their own validator nodes can delegate their tokens to existing validators. By doing so, delegators earn a share of the staking rewards, effectively participating in network security and earning passive income without the technical overhead of running a node. To uphold accountability and safeguard network integrity, a slashing mechanism is in place. Validators who engage in malicious activities, such as double-signing transactions, or who experience prolonged inactivity, face penalties that involve the forfeiture of a portion of their staked tokens. This economic disincentive acts as a strong deterrent against dishonest behavior.

Regarding applicable fees, users engaging with the Aptos network are required to pay transaction fees in the native token for sending transactions and interacting with smart contracts. These fees are not static; Aptos features a dynamic fee adjustment system that recalibrates fees based on current network activity and resource utilization. This dynamic approach helps ensure cost efficiency for users and prevents network congestion during periods of high demand. The collected transaction fees are then distributed among validators and their delegators, providing an additional layer of economic incentive for their continued active participation and crucial role in securing the network.

The Avalanche blockchain network employs a comprehensive system of incentive mechanisms and fees designed to ensure its security, integrity, and efficiency, primarily through its Avalanche Consensus mechanism. Validators, who are critical to the network's operation, are required to stake a certain amount of AVAX tokens. The quantity of staked tokens directly influences their likelihood of being chosen to propose or validate new blocks. In return for their active participation, validators receive rewards, which are calculated proportionally to the amount of AVAX they have staked, as well as their consistent uptime and overall performance in validating transactions. To further decentralize participation, validators can also accept delegations from other token holders. These delegators subsequently share in the earned rewards, thus incentivizing smaller token holders to contribute indirectly to the network's security. The economic incentives for validators extend beyond staking rewards to include block rewards, which are distributed from the inflationary issuance of new AVAX tokens for proposing and validating blocks. Additionally, validators earn a portion of the transaction fees paid by users across the network, covering simple transactions, complex smart contract interactions, and the creation of new assets. Crucially, Avalanche's penalty system differs from some other Proof-of-Stake systems by not employing 'slashing,' which involves the confiscation of staked tokens for misbehavior. Instead, the network relies on the economic disincentive of lost future rewards. Validators who fail to maintain consistent uptime or engage in malicious activities will simply miss out on potential earnings, providing a strong incentive for honest and reliable behavior. The network also imposes clear uptime requirements, where poor performance directly impacts a validator's ability to earn rewards. Fees on the Avalanche blockchain are structured to be dynamic, adjusting based on current network demand and the computational complexity of transactions. This ensures that fees remain equitable and reflect the actual network usage. A significant portion of these transaction fees is 'burned,' meaning they are permanently removed from circulation. This deflationary mechanism helps to offset the inflationary effects of block rewards and aims to enhance the long-term value of AVAX tokens. Fees for deploying and interacting with smart contracts are determined by the required computational resources, promoting efficient resource utilization. Similarly, fees are imposed for creating new assets on the network, a measure designed to deter spam and ensure that network resources are utilized by serious projects. On the Avalanche X-Chain, validator incentives are realized indirectly through the network's overall AVAX issuance, while its transaction fees are fixed and burned to combat spam and progressively reduce the total supply of AVAX.

The Celo blockchain network employs an incentive model designed to both reward network participants and ensure exceptional accessibility, particularly by maintaining minimal transaction fees for crucial use cases like cross-border payments. This strategy fosters a flexible and user-friendly ecosystem. At the core of its incentive mechanisms, validators receive remuneration from a dual-source system: a portion of transaction fees collected across the network, alongside newly minted tokens. This comprehensive reward structure provides a continuous and strong financial incentive for validators to maintain honest operations, diligently validate transactions, and secure the integrity of the network, thereby ensuring its ongoing reliability. Furthermore, Celo prioritizes user experience through flexible transaction parameters. Users can specify a maximum gas limit for their transactions, acting as a safeguard against excessive charges, especially if a transaction encounters an unexpected failure. They also have the option to adjust the gas price, allowing them to prioritize their transactions for faster processing by offering higher fees if urgency is required. A standout feature of Celo is its innovative payment flexibility, enabling transaction fees to be paid not only in its native asset but also in various ERC-20 tokens. This multi-currency payment option significantly enhances accessibility, especially benefiting individuals who may lack traditional banking services or face hurdles in acquiring specific native blockchain tokens. This approach aligns directly with Celo’s mission to extend blockchain technology to underserved global communities. The network's fee structure is intentionally designed to be minimal, making it an ideal platform for low-cost transactions, particularly those involving international transfers. This emphasis on affordability and flexibility underscores Celo's commitment to creating an inclusive and accessible financial infrastructure.

The Ethereum network's Proof-of-Stake (PoS) system is underpinned by a robust framework of incentive mechanisms and applicable fees, meticulously designed to secure transactions and encourage active, honest participation from validators. Validators, who are essential for the network's operation, commit at least 32 units of the network's native asset (Ether) to secure their role. Their primary incentives include rewards for successfully proposing new blocks, attesting to the validity of other blocks, and participating in sync committees, all of which contribute to the network's integrity and consensus. These rewards are distributed in newly issued Ether, alongside a portion of the transaction fees generated on the network. A key feature of Ethereum's fee structure is the implementation of EIP-1559, which divides transaction fees into two main components. The first is a base fee, which is automatically burned, effectively reducing the overall supply of Ether over time and potentially introducing a deflationary aspect, especially during periods of high network activity. The second is an optional priority fee, also known as a "tip," which users can choose to pay directly to validators to incentivize faster inclusion of their transactions into a block. This dual-fee structure aims to make transaction costs more predictable for users. To enforce honest behavior and prevent malicious activities, the network employs a strict system of economic penalties, including slashing. Validators who engage in dishonest acts or demonstrate extended periods of inactivity risk losing a portion of their staked Ether, providing a powerful deterrent against misconduct and ensuring the long-term security and reliability of the network. This comprehensive system aligns the economic interests of validators with the overall health and security of the Ethereum blockchain.

The Kava blockchain network utilizes a comprehensive system of incentive mechanisms and applicable fees designed to foster network security, encourage active participation from its community, and sustain its ecosystem. This framework creates a symbiotic relationship among validators, delegators, and the network itself, driven by an inflationary token model.

At the core of the incentive structure are the validator rewards. Validators, who are essential for securing the network and processing transactions, are compensated with newly minted KAVA tokens through block rewards, as well as a share of the transaction fees generated on the network. This dual reward system ensures that validators are adequately remunerated for their computational resources and honest efforts. Beyond direct validation, Kava also supports staking rewards for general KAVA token holders. These individuals can delegate their tokens to trusted validators, thereby contributing to the network's security and decentralization, and in return, they earn a proportionate share of the rewards. This delegation mechanism broadens participation in network governance and security beyond those capable of running full validator nodes.

Regarding applicable fees, users engaging in transactions on the Kava network are required to pay fees, which are denominated in KAVA tokens. These transaction fees are then distributed among the active validators and their delegators, forming a vital component of the network's ongoing maintenance and operational funding. Furthermore, Kava operates with an inflation mechanism where new KAVA tokens are periodically minted. These newly created tokens are strategically allocated to fund various ecosystem initiatives, such as the Kava Rise program. This program is instrumental in supporting the network's continuous decentralization efforts, enhancing its security infrastructure, and ensuring the long-term stability and growth of the Kava ecosystem, ultimately aligning the interests of all stakeholders with the network’s prosperity.

Klaytn's operational framework incorporates a comprehensive incentive structure designed to maintain network security, promote sustainability, and foster community development. This mechanism primarily involves the distribution of block rewards and transaction fees to Consensus Nodes (CNs) and several dedicated network funds. Consensus Nodes, which are central to the network's validation process, receive fixed block rewards in KLAY tokens for their efforts in validating and producing blocks. This predictable income stream provides a strong incentive for CNs to remain actively engaged and committed to securing the network. In addition to these fixed rewards, CNs also receive a share of the transaction fees, which users pay in KLAY tokens. These fees are aggregated by the network and then distributed among the CNs, offering further economic support for their crucial role in upholding network security and stability. Beyond the direct compensation for CNs, Klaytn's block reward distribution mechanism is meticulously structured to allocate resources across various stakeholders and initiatives. A specific portion, 10% of each block reward, is directed to the Consensus Node that successfully proposed the block, thereby encouraging continuous and proactive participation. Furthermore, 40% of the block reward is allocated as a staking award to all members of the Klaytn Governance Council who actively stake KLAY, reinforcing network security by rewarding their commitment to the network. To support broader ecosystem growth, 30% of each block reward is channeled into the Klaytn Community Fund (KCF), which is dedicated to facilitating community development, enabling the creation of decentralized applications (dApps), and fostering overall expansion of the ecosystem. The remaining 20% of the block reward is allocated to the Klaytn Foundation Fund (KFF), which provides essential resources for the network's long-term sustainability and future developmental endeavors. Regarding applicable fees, all transaction fees on the Klaytn network are denominated in KLAY tokens. These fees are dynamically calculated based on the gas usage and gas price associated with each transaction. The revenue generated from these fees plays a critical role in supporting the ongoing maintenance of the network, compensating the validators for their services, and contributing to the overall economic viability and sustainability of the Klaytn blockchain.

The NEAR Protocol blockchain network employs a comprehensive suite of economic mechanisms designed to ensure network security, incentivize active participation from its community, and manage resource allocation efficiently. A core incentive is the staking reward system, where validators and delegators are compensated for their role in securing transactions. Validators, selected based on their staked NEAR tokens and community trust, receive a share of newly minted tokens, constituting about 90% of the approximate 5% annual inflation. They earn these rewards for proposing and validating blocks. Similarly, token holders who choose not to operate a full validator node can delegate their NEAR tokens to active validators, thereby contributing to network security and earning rewards proportional to their delegated stake. This delegation model fosters broader participation and strengthens the network's overall decentralization.To uphold network integrity, NEAR Protocol implements a robust slashing mechanism. Validators engaging in malicious activities, such as incorrect validation or dishonest behavior, face economic penalties, including the deduction of a portion of their staked tokens. This serves as a powerful deterrent against harmful actions, ensuring validators operate in the network's best interest. Additionally, the network promotes fairness and prevents undue concentration of power through regular epoch rotations. During these predefined intervals, validators are periodically reshuffled, and new block proposers are selected, maintaining a healthy balance between network performance and decentralization.Regarding applicable fees, the NEAR blockchain charges users for transaction processing and data storage, paid in NEAR tokens. A unique aspect of its fee structure is the burning mechanism for transaction fees, which reduces the total circulating supply of NEAR tokens over time, potentially introducing a deflationary effect. While a portion of these fees is burned, the remaining part is distributed to validators as additional compensation, providing a continuous incentive for network maintenance. Furthermore, the protocol imposes storage fees based on the amount of blockchain space consumed by user accounts, smart contracts, and associated data. Users are required to hold NEAR tokens as a deposit commensurate with their storage usage, which encourages efficient resource management and helps prevent network spam. This dual system of incentives and fees creates a self-sustaining economic model for the NEAR Protocol.

Incentives within the Solana blockchain network are structured to ensure high performance and decentralized security. The primary participants are validators and delegators, both of whom receive financial compensation for their roles in maintaining the ledger. Validators are rewarded for successfully producing and verifying blocks. These rewards are distributed in the network's native asset and are determined by the validator's overall stake and historical performance. Furthermore, validators receive a portion of the transaction fees associated with the data processed in their blocks, which encourages them to maximize efficiency and maintain uptime. Token holders who prefer not to operate complex infrastructure can delegate their stake to professional validators. This delegation model facilitates a more inclusive security environment, as delegators earn a percentage of the rewards proportional to their contribution, thereby decentralizing the control of the network. Security is further enforced through economic penalties. The network employs a slashing mechanism where a portion of a validator's staked assets is confiscated if they engage in dishonest behavior or fail to meet network requirements, such as remaining offline for extended periods. This introduces an opportunity cost for all participants, ensuring they remain committed to honest operations. Regarding the cost of using the network, the fee structure is designed to be highly competitive and predictable. Users pay transaction fees to compensate for the computational power and bandwidth consumed by nodes. These fees are notably low, facilitating high-volume usage. In addition to transaction costs, the network implements rent fees for data storage. This unique mechanism charges for the persistence of data on the blockchain, discouraging the inefficient use of state storage and prompting developers to prune unnecessary data. Finally, smart contract execution fees are calculated based on the specific resource intensity of the code, ensuring that participants pay a fair rate for the network resources they utilize.

The Tezos network is designed with a comprehensive set of incentive mechanisms and fee structures aimed at promoting active participation, ensuring robust security, and supporting the network's long-term sustainability. Key among these incentives are the rewards provided for baking and endorsing. Bakers, who perform the essential function of creating new blocks, receive XTZ tokens as compensation for their efforts. Similarly, endorsers, tasked with validating and approving blocks proposed by others, are also rewarded in XTZ. This dual reward system encourages consistent and honest engagement from all network participants. To further enhance inclusivity, Tezos offers delegation incentives, allowing XTZ holders who prefer not to run a full validator node to delegate their tokens to an active baker. In return, these delegators earn a share of the baker’s rewards, democratizing access to network participation and strengthening overall security. To safeguard network integrity, bakers are required to post a security deposit, or bond, in XTZ. This collateral is subject to forfeiture if a baker engages in malicious activities, thereby creating a strong financial deterrent against dishonest behavior and aligning bakers' interests with the health of the network. Regarding fees, users initiating transactions, such as transferring funds or interacting with smart contracts, pay transaction fees in XTZ. These fees are then distributed to bakers and endorsers, providing additional economic motivation for their critical validation and security services. The network also employs an inflationary reward model, periodically creating and distributing new XTZ tokens to bakers and endorsers. This model fosters continuous participation and network security while managing token availability over time through a gradual increase in supply.

The Tron blockchain implements a comprehensive set of incentive mechanisms, underpinned by its Delegated Proof of Stake (DPoS) consensus model, designed to ensure network security, encourage participation, and maintain operational efficiency. Central to this system are the Super Representatives (SRs), who are directly rewarded for their critical roles. SRs, elected by TRX token holders, receive block rewards in the form of newly minted TRX tokens for each block they successfully produce. Additionally, they are compensated with transaction fees for validating and incorporating transactions into these blocks, providing a continuous income stream that incentivizes efficient transaction processing. Further incentivizing network engagement, Tron encourages token holders to stake their TRX and vote for SRs. This delegation of voting power allows SRs to earn rewards, and in turn, delegators—those who stake their tokens and vote—can also receive a share of these block rewards and transaction fees. This shared reward structure fosters broad participation in network security and governance, as increased staking leads to greater voting power and potential rewards. SRs are also motivated by reputation and the necessity of consistent, efficient block production to maintain their elected status. Regarding applicable fees, users on the Tron network incur several types of charges, primarily paid in TRX tokens. Transaction fees are mandatory for processing transactions, and their cost fluctuates based on the transaction's complexity and the current network demand. These fees are distributed among the Super Representatives. Additionally, Tron charges storage fees for data stored on the blockchain, including smart contracts and tokens, requiring users to pay in TRX. The network also employs a resource model where staking TRX tokens grants users access to essential network resources like bandwidth and energy. This innovative resource system effectively manages network capacity and demand, optimizing performance and user experience by allowing resource acquisition through staking.

Energy consumption sources and methodologies

Tether is present on the following networks: Aptos Coin, Avalanche, Celo, Ethereum, Kava, Klaytn, Near Protocol, Solana, Tezos, Tron.

The methodology for calculating the energy consumption of the Aptos network, like other digital ledger technologies (DLTs), employs a 'bottom-up' approach, focusing primarily on the energy consumption of individual nodes within the network. This comprehensive method aggregates energy usage across various components contributing to the network's operation. The core assumption underpinning this calculation is that the nodes represent the most significant factor in the network's overall energy footprint. These estimations are built upon empirical data gathered from diverse sources, including publicly available information sites, as well as both open-source and proprietary in-house crawlers.

A critical determinant in assessing hardware energy consumption involves identifying the specific hardware required to run the client software for the network. The energy consumption profiles of these hardware devices are meticulously measured in certified test laboratories, ensuring accuracy in the base data. When conducting these calculations, if available, the Functionally Fungible Group Digital Token Identifier (FFG DTI) is utilized to accurately identify all implementations of the crypto-asset within scope. These mappings are regularly updated, drawing data from the Digital Token Identifier Foundation, to maintain the most current and precise attribution.

Information concerning the specific hardware deployed across the network and the total number of participants is derived from assumptions. These assumptions are subjected to rigorous verification efforts using empirical data to ensure their best possible accuracy. A general principle guiding these assumptions is that network participants are largely economically rational actors. Furthermore, adopting a precautionary stance, in instances of doubt, conservative estimates are applied, meaning higher figures are used for potential adverse impacts to ensure a robust and responsible assessment of energy consumption.

The methodology for assessing the Avalanche network's energy consumption is founded on a 'bottom-up' approach, where individual nodes are identified as the primary contributors to the network's overall energy footprint. This comprehensive calculation aggregates energy usage across various interconnected components of the network. The assumptions underpinning these calculations are derived from extensive empirical findings, utilizing a combination of publicly available information sites, sophisticated open-source crawlers, and proprietary in-house developed crawlers. A key aspect of this methodology involves estimating the hardware deployed within the network. This estimation is primarily driven by the technical specifications and operational requirements for running the client software, which dictates the type and performance of necessary hardware devices. The energy consumption profiles of these identified hardware devices are meticulously measured in certified test laboratories to ensure accuracy. To ensure a broad and precise scope, the Functionally Fungible Group Digital Token Identifier (FFG DTI) is leveraged, whenever available, to pinpoint all relevant implementations of the crypto-asset under consideration. These mappings are regularly updated based on current data provided by the Digital Token Identifier Foundation. The data regarding specific hardware usage and the total number of network participants is based on empirically verified assumptions, consistently updated with best-effort validation. A foundational assumption in this model is that network participants generally behave in an economically rational manner. Furthermore, adhering to a precautionary principle, any uncertainties or doubts during the estimation process lead to conservative assumptions, specifically by making higher estimates for potential adverse environmental impacts. When determining the energy consumption attributable to a specific token within the Avalanche ecosystem, the energy consumption of the entire Avalanche network (including subnets like Avalanche X-Chain) is calculated first. Subsequently, a fraction of this total network energy is allocated to the token, proportional to its activity and footprint within the network. This detailed, multi-layered approach aims to provide a robust and conservative estimate of the energy consumption associated with the Avalanche blockchain.

The methodology for calculating the Celo blockchain network's energy consumption primarily utilizes a "bottom-up" approach. This detailed methodology considers network nodes as the central and most significant factor contributing to the overall energy footprint. The underlying assumptions of this calculation are derived from extensive empirical findings, gathered through a combination of publicly available information sites, advanced open-source crawlers, and proprietary in-house developed crawling tools. A key determinant in estimating the hardware deployed within the network is the specific computational requirements necessary to operate the client software. To ensure accuracy, the energy consumption of these various hardware devices is meticulously measured in certified test laboratories. In this calculation framework, the Functionally Fungible Group Digital Token Identifier (FFG DTI) is employed, whenever available, to comprehensively identify all relevant implementations of the crypto-asset within scope. These mappings are consistently updated to reflect the latest data provided by the Digital Token Identifier Foundation, ensuring the most current and accurate representation. Information pertaining to the types of hardware used and the total number of participants in the network relies on assumptions. These assumptions are rigorously verified through best-effort empirical data analysis. Generally, network participants are presumed to act in an economically rational manner. Adhering to a precautionary principle, in situations of uncertainty, estimations for potential adverse impacts are always biased towards higher, more conservative figures. While specific token energy consumption may aggregate data from multiple networks where the token is active, the core methodology for determining a network's energy consumption remains consistent with this node-centric, bottom-up framework.

The methodology for calculating the Ethereum network's energy consumption primarily employs a "bottom-up" approach, which focuses on the energy demands of individual nodes that are central to the network's operation. These nodes are considered the fundamental factor driving the network's overall energy use. The assumptions underpinning these calculations are derived from empirical data gathered through a variety of sources, including public information sites, open-source crawlers, and proprietary in-house crawlers developed for this purpose. A critical step in this methodology involves determining the hardware used within the network, primarily by assessing the computational and other requirements necessary to run the client software. The energy consumption characteristics of these identified hardware devices are then rigorously measured in certified test laboratories to ensure accuracy. When quantifying the energy consumption for the network, the Functionally Fungible Group Digital Token Identifier (FFG DTI) is utilized, when available, to identify all implementations of the asset in scope, with mappings regularly updated based on data from the Digital Token Identifier Foundation. The information regarding the specific hardware deployed and the total number of participants in the network relies on assumptions that are diligently verified using empirical data whenever possible. Generally, participants are presumed to act in an economically rational manner. Furthermore, adhering to a precautionary principle, if there is any doubt in estimations, conservative assumptions are made, meaning higher estimates are used for potential adverse impacts to ensure a comprehensive and cautious assessment of energy consumption.

The methodology for assessing the energy consumption of the Kava blockchain network, when evaluated as part of a broader crypto-asset's footprint (such as a token that exists across multiple DLTs), primarily employs a "bottom-up" approach. This comprehensive strategy considers the fundamental components contributing to the network's energy usage, with nodes identified as the primary drivers of consumption. The process relies on a blend of empirical findings, drawing data from publicly available information sites, proprietary in-house crawlers, and open-source crawling tools. These resources are leveraged to gather detailed insights into the operational characteristics of the network.

Key to this methodology is the estimation of hardware utilization within the network. This is primarily determined by analyzing the minimum and recommended requirements for operating the client software that powers the nodes. Once hardware specifications are identified, their respective energy consumption rates are measured under controlled conditions in certified test laboratories, ensuring accuracy and reliability. When calculating the energy consumption attributable to specific crypto-assets, such as a token like KAVA that may be deployed on multiple networks, the Functionally Fungible Group Digital Token Identifier (FFG DTI) is utilized where available. This identifier helps in scoping all implementations of the asset across different DLTs, with mappings regularly updated by the Digital Token Identifier Foundation. The data concerning the hardware and the number of participants within the network is built upon assumptions, which are diligently verified through empirical data and a general presumption of economically rational behavior among participants. A conservative precautionary principle is applied, leading to higher estimates for potential adverse impacts in situations of uncertainty, ensuring a robust and cautious assessment of the Kava network's energy footprint. While the energy consumption of the KAVA token considers its presence on various networks, the underlying methodology for assessing the Kava blockchain network's own operations focuses on its native nodes and infrastructure.

The methodology employed for calculating the energy consumption associated with digital assets, including those on the Klaytn network, utilizes a "bottom-up" approach, which identifies the various components contributing to the overall energy footprint. Central to this approach is the recognition that network nodes represent the primary factor driving energy consumption within the blockchain infrastructure. The underlying assumptions for these calculations are derived from extensive empirical findings, gathered through the use of public information sites, as well as both open-source and proprietary crawlers developed in-house. These tools systematically collect data to inform the energy assessment. A critical aspect of this methodology involves estimating the hardware utilized across the network. The main criteria for this estimation are the specific requirements necessary to operate the client software of the network. To ensure accuracy, the energy consumption of these identified hardware devices is rigorously measured in certified test laboratories, providing precise data points for the calculations. When determining the scope of assets for energy consumption calculations, the Functionally Fungible Group Digital Token Identifier (FFG DTI) is leveraged where available. This identifier helps in accurately identifying all implementations of the asset under consideration, with these mappings being regularly updated based on data provided by the Digital Token Identifier Foundation. The information concerning both the hardware deployed and the total number of participants active within the network is based on assumptions that undergo diligent verification against empirical data. It is generally assumed that participants in the network behave in a largely economically rational manner. Adopting a precautionary principle, conservative estimates are applied in situations of uncertainty, meaning higher figures are used when estimating potential adverse impacts to ensure a robust and cautious assessment of energy consumption. For any given crypto-asset, its energy consumption is derived as a fraction of the total energy consumption of the underlying network, such as Klaytn, with this fraction being determined by the asset's specific activity within that network.

The methodology for assessing the energy consumption of the NEAR Protocol network relies on a "bottom-up" approach, meticulously aggregating data across its various operational components. This method primarily considers the network's nodes as the central contributors to overall energy usage. The fundamental assumptions underpinning these calculations are derived from empirical findings obtained through a combination of public information sources, proprietary in-house crawlers, and publicly available open-source crawlers. These tools are instrumental in gathering essential data about the network's operational footprint.A critical determinant in estimating the hardware deployed within the network is the specific computational requirements necessary to run the client software. Based on these identified requirements, the energy consumption of the corresponding hardware devices is rigorously measured in certified test laboratories. This ensures accuracy and consistency in energy attribution. Furthermore, when calculating energy consumption, the Functionally Fungible Group Digital Token Identifier (FFG DTI) is utilized, where available, to precisely identify and encompass all relevant implementations of any crypto-asset within the network's scope. These mappings are regularly updated, leveraging data from the Digital Token Identifier Foundation, to maintain current and accurate representations.The information pertaining to the hardware used and the total number of participants in the network is built upon assumptions, which are diligently verified using the best available empirical data. A general underlying premise is that network participants are largely economically rational actors. In adherence to a precautionary principle, conservative estimations are favored when uncertainties arise, leading to higher projected adverse impacts to ensure a robust and responsible assessment of energy consumption. This comprehensive methodology allows for a detailed and conservative estimation of the NEAR Protocol network's energy footprint.

To calculate the energy consumption of the Solana blockchain network, a "bottom-up" methodology is utilized, placing the network nodes at the center of the analysis. This approach relies on identifying the number of active participants and the specific hardware requirements necessary to run the network's client software. Data collection involves a variety of sources, including open-source web crawlers, internal monitoring tools developed by the legal entities, and public information websites. By analyzing these data points, researchers can estimate the hardware profiles of the various nodes operating globally. To ensure accuracy, the energy consumption of typical hardware devices is measured within certified laboratory environments, providing a baseline for the power usage of each node. Furthermore, the methodology incorporates data from the Digital Token Identifier Foundation to map all implementations of the assets within the network's scope. When specific hardware data is not directly observable, assumptions are made based on the principle of economic rationality, assuming participants optimize their setups for cost-efficiency while meeting software specifications. In instances of uncertainty, a precautionary principle is applied, favoring conservative estimates that likely overstate the environmental impact rather than underestimating it. This ensures that the reported energy footprint represents a credible upper bound of actual consumption. The total network consumption is determined by aggregating the energy needs of all identified nodes, accounting for both the computational requirements of processing transactions and the energy consumed by hardware in an idle or supportive state. This rigorous framework allows for a comprehensive assessment of the network’s total power requirements over a defined reporting period, providing a transparent view of the operational costs associated with maintaining the distributed ledger's infrastructure.

The energy consumption of the Tezos blockchain network is quantified through a comprehensive "bottom-up" methodology that aggregates energy usage across its various operational components. This approach identifies individual nodes as the primary contributors to the network's overall energy footprint. The foundational assumptions for these calculations are derived from empirical data, which is gathered using a combination of public information sources, open-source crawlers, and specialized in-house crawling technologies. A critical step in estimating the hardware used within the network involves determining the technical specifications required to operate the Tezos client software. The energy consumption profiles of these identified hardware devices are then precisely measured in certified test laboratories to ensure accuracy. To achieve a holistic scope, the Functionally Fungible Group Digital Token Identifier (FFG DTI) is utilized, when available, to identify all relevant implementations of the crypto-asset. These mappings are consistently updated based on data from the Digital Token Identifier Foundation, reflecting the dynamic evolution of the network. Information concerning the hardware deployed and the number of participants in the network is based on assumptions rigorously verified with empirical data. Participants are generally presumed to act with economic rationality. As a precautionary principle, in situations of uncertainty, estimates for potential adverse impacts are conservatively adjusted upwards. When determining the energy consumption of a token present on networks like Tezos, the energy consumption of each relevant network is calculated first. A fraction of this network energy is then attributed to the specific token based on its activity within that network. One of the sources utilized for these calculations is tzStats.

The methodology for calculating the energy consumption of the Tron blockchain network primarily adopts a "bottom-up" approach, which aggregates energy usage across multiple individual components of the network. The central assumption underpinning this calculation is that the nodes constitute the predominant factor in the network's overall energy consumption. The estimations for hardware utilized within the network are derived from the operational requirements of the client software. These assumptions are meticulously formulated based on empirical findings gathered through the deployment of various data collection tools, including public information sites, open-source crawlers, and proprietary in-house developed crawlers. The energy consumption data for the specific hardware devices identified is obtained through measurements conducted in certified test laboratories, ensuring a high degree of accuracy and reliability. When determining the scope of assets for energy consumption calculations, the Functionally Fungible Group Digital Token Identifier (FFG DTI) is employed whenever available to identify all relevant implementations of the crypto-asset within the network. These FFG DTI mappings are routinely updated using data from the Digital Token Identifier Foundation, ensuring the methodology remains current and comprehensive. The information related to the hardware in use and the total number of network participants is based on assumptions that undergo rigorous verification through empirical data. A general principle assumes participants are largely economically rational. Furthermore, a precautionary principle is applied, favoring conservative estimates (i.e., higher estimates for potential adverse impacts) when any doubt or uncertainty exists in the data or assumptions. No direct external links were provided within the source material for this section's methodologies or data sources.

Key energy sources and methodologies

Tether is present on the following networks: Aptos Coin, Avalanche, Celo, Ethereum, Kava, Klaytn, Near Protocol, Solana, Tezos, Tron.

The methodology for determining the key energy sources utilized by the Aptos network, and by extension the proportion of renewable energy, begins with precisely identifying the geographical locations of its operational nodes. This intricate process involves the systematic use of public information sources, coupled with advanced open-source and proprietary in-house crawlers, to pinpoint where these nodes are situated. In scenarios where direct geographical information for specific nodes is unavailable or insufficient, the methodology intelligently references comparable DLT networks. These reference networks are carefully chosen based on their similarities in incentivization structures and consensus mechanisms, providing a proxy for estimating energy source mixes.

Once the geographical data for the nodes is established, it is then meticulously integrated with publicly available energy mix data provided by 'Our World in Data.' This comprehensive dataset offers detailed insights into the energy generation profiles across various regions, allowing for an informed estimation of the renewable energy proportion powering the network's operations. The energy intensity metric, which quantifies the energy cost per additional transaction, is calculated as the marginal energy cost associated with processing just one more transaction. This provides a granular view of the energy efficiency.

The data sources for renewable energy usage, which are crucial for this assessment, include a range of reputable publications such as Ember (2025) and the Energy Institute's Statistical Review of World Energy (2024). These sources are heavily processed by Our World in Data to generate the 'Share of electricity generated by renewables' dataset, which is directly referenced. Users seeking to explore this data further can consult the original source: Share of electricity generated by renewables - Ember and Energy Institute. This robust approach ensures that energy consumption and renewable energy integration are assessed with the highest possible degree of transparency and accuracy.

The methodology for determining the key energy sources and the proportion of renewable energy utilized by the Avalanche blockchain network relies on a multi-pronged approach that integrates geographical data with energy mix statistics. To ascertain the percentage of renewable energy consumption, the initial step involves accurately identifying the geographical locations of the network's nodes. This crucial data is gathered through a combination of public information sites, advanced open-source crawlers, and proprietary in-house crawlers developed specifically for this purpose. In instances where comprehensive geographical distribution information for the nodes is not readily available, the methodology pivots to utilizing 'reference networks.' These reference networks are carefully selected for their comparability to Avalanche in terms of their incentivization structures and underlying consensus mechanisms, ensuring that the estimated renewable energy mix remains relevant and reflective of similar blockchain operations. Once the geographical data for the nodes (either directly identified or inferred from reference networks) is compiled, this geo-information is meticulously merged with comprehensive public data sets on electricity generation. A primary source for this integration is the data provided by Our World in Data, which offers detailed insights into the global energy landscape. The energy intensity of the network is then calculated as the marginal energy cost incurred for processing one additional transaction. This granular measurement provides a precise understanding of the energy overhead per unit of network activity. The specific datasets and sources referenced for this methodology include: Ember (2025) and the Energy Institute - Statistical Review of World Energy (2024), both of which undergo significant processing by Our World in Data. The dataset titled “Share of electricity generated by renewables – Ember and Energy Institute” is a key input, comprising original data from Ember’s “Yearly Electricity Data Europe” and “Yearly Electricity Data,” alongside the Energy Institute’s “Statistical Review of World Energy.” This information is publicly accessible at Share of electricity generated by renewables – Ember and Energy Institute.

The determination of key energy sources and the proportion of renewable energy utilized by the Celo blockchain network involves a structured and multi-faceted methodology. The initial critical step is to accurately identify the geographical locations of the network's operational nodes. This identification process leverages a variety of data sources, including readily available public information sites, sophisticated open-source crawlers, and proprietary in-house developed crawlers, all working in concert to pinpoint the physical distribution of the network infrastructure. In scenarios where precise geographical information regarding the nodes is not sufficiently available, the methodology resorts to using reference networks. These chosen reference networks are carefully selected based on their structural comparability, specifically in terms of their incentive mechanisms and underlying consensus protocols, ensuring that the energy profile is as relevant as possible. Once geographical data is established, whether directly or through reference, this information is then meticulously merged with comprehensive public data sets provided by Our World in Data. This integration allows for a contextual understanding of the energy mix and renewable energy penetration in the regions where Celo's nodes are operational. A crucial metric derived from this analysis is the energy intensity, which is precisely calculated as the marginal energy cost associated with processing one additional transaction on the network. This provides a granular insight into the energy efficiency per unit of activity. For further details on the underlying data sources concerning renewable electricity generation, interested parties can refer to the comprehensive datasets compiled by Ember and the Energy Institute, accessible via Share of electricity generated by renewables - Ember and Energy Institute. This meticulous approach ensures a transparent and empirically grounded assessment of the network's energy profile.

To ascertain the proportion of renewable energy utilized by the Ethereum network, a specific set of methodologies is applied. The initial step involves pinpointing the geographical locations of the network's nodes. This crucial geo-information is gathered through various means, including publicly available information sites, as well as both open-source and internally developed crawlers designed to scan the network. In instances where comprehensive geographical data for nodes is not directly accessible, the analysis resorts to leveraging "reference networks." These are comparable networks chosen for their similar incentivization structures and consensus mechanisms, providing a proxy for node distribution. Once the geo-information is established, it is then integrated and cross-referenced with public data obtained from "Our World in Data." This comprehensive dataset offers insights into the energy mixes and renewable energy penetration across different regions globally. The final calculation of energy intensity is defined as the marginal energy cost incurred for processing one additional transaction on the network. This approach allows for an estimation of the energy footprint associated with scaling the network's transactional volume. For detailed information and the underlying data sources on the share of electricity generated by renewables, relevant information can be found through sources such as Ember (2025) and the Energy Institute - Statistical Review of World Energy (2024), with further processing by Our World in Data, accessible via Share of electricity generated by renewables – Ember and Energy Institute.

To ascertain the key energy sources and their associated methodologies for the Kava blockchain network, a detailed assessment is undertaken, focusing on understanding the energy mix powering the underlying infrastructure. This process begins with efforts to pinpoint the geographical locations of the network's nodes. Data for this localization is sourced from a combination of public information platforms, advanced open-source crawlers, and specialized in-house developed crawling tools. The precise geographical distribution of nodes is critical because it directly influences the type of electricity grid they draw power from.

In instances where comprehensive geographical information regarding node distribution is not fully available, the methodology strategically incorporates data from reference networks. These reference networks are carefully selected based on their structural comparability to the Kava network, particularly concerning their incentivization frameworks and consensus mechanisms. This ensures that the energy characteristics of the reference networks provide a relevant proxy for Kava's operational profile. Once the geographical data is established, it is meticulously integrated with extensive public data on electricity generation from renowned sources like Our World in Data. This integration allows for the calculation of the proportion of renewable energy contributing to the network's power consumption. The energy intensity, a crucial metric, is then determined by calculating the marginal energy cost associated with processing one additional transaction on the network. This provides an understanding of the energy footprint per unit of activity.

Sources for electricity generation data typically include datasets such as Ember (2025) and the Energy Institute's Statistical Review of World Energy (2024), both of which are heavily processed by Our World in Data. This rigorous approach, combining direct node location data with broader energy statistics, aims to provide a transparent and accurate picture of the energy sources powering the Kava network and its environmental implications.

For more information, refer to Share of electricity generated by renewables - Ember and Energy Institute.

The methodology for determining the proportion of renewable energy utilized by the Klaytn blockchain network is a multi-faceted process that relies on a combination of data collection and analytical techniques. Initially, efforts are focused on identifying the geographical locations of the network's nodes. This crucial data is sourced through various channels, including public information sites, as well as advanced open-source and proprietary crawlers designed to scan the network for relevant details. Should comprehensive information regarding the precise geographic distribution of all nodes be unavailable, the methodology incorporates a fallback mechanism. In such instances, the assessment refers to comparable reference networks whose incentivization structures and consensus mechanisms closely mirror those of Klaytn. This comparative analysis helps to derive reasonable estimates for renewable energy integration. Once the geo-information for the nodes is established, it is systematically integrated with publicly available data from reputable sources, notably Our World in Data. This integration allows for a robust estimation of the renewable energy mix powering the network's operations. The calculation of energy intensity is a key component of this methodology, defined as the marginal energy cost incurred with respect to processing one additional transaction on the network. This metric provides insight into the energy efficiency of the network on a per-transaction basis. The foundational data for estimating the share of electricity generated by renewables, particularly for the merging of geo-information, is extensively processed by Our World in Data, drawing from original datasets such as "Yearly Electricity Data Europe" and "Yearly Electricity Data" from Ember, and the "Statistical Review of World Energy" from the Energy Institute. This comprehensive approach ensures a thorough and well-supported assessment of renewable energy usage within the network. Our World in Data - Share of electricity generated by renewables

To accurately determine the proportion of renewable energy utilized by the NEAR Protocol network, a systematic methodology is employed focusing on the geographic distribution of its operational nodes. The initial step involves identifying the precise locations of these nodes using a combination of public information sites, advanced open-source crawlers, and internally developed specialized crawlers. This comprehensive data collection ensures a broad and accurate understanding of the physical presence of the network's infrastructure.In instances where precise geographic information for certain nodes might be unavailable, the methodology incorporates a fallback mechanism. It leverages data from reference networks that are deemed comparable to NEAR Protocol in terms of their incentivization structures and underlying consensus mechanisms. This comparative analysis helps to fill data gaps and provide a reasonable proxy for renewable energy usage in such cases.Once the geographical data for the nodes is established, this geo-information is meticulously integrated with publicly available datasets from reputable sources, notably "Our World in Data." This integration allows for the correlation of node locations with regional energy grid compositions and the prevalence of renewable energy sources in those areas. The final aspect of this methodology involves calculating the energy intensity of the network. This is defined as the marginal energy cost incurred with respect to processing one additional transaction on the NEAR Protocol blockchain. This metric provides a granular view of the energy efficiency per unit of network activity. For detailed information regarding the underlying energy data, the following sources are utilized: Share of electricity generated by renewables – Ember and Energy Institute. This rigorous approach ensures a transparent and verifiable assessment of renewable energy integration within the network's operations.

The determination of energy sources for the Solana blockchain network involves a sophisticated geolocation mapping of the global node infrastructure. By utilizing internal and open-source crawlers, the physical locations of validator nodes are identified. Once the geographic distribution is established, this information is cross-referenced with regional energy data to calculate the percentage of renewable energy utilized by the network. For regions where specific node data is unavailable, researchers utilize reference networks that share similar consensus mechanisms and incentive structures as proxies to estimate the geographic spread of the infrastructure. The primary data source for these regional energy profiles is the Share of electricity generated by renewables dataset provided by Our World in Data, which incorporates research from Ember and the Energy Institute. This dataset provides yearly electricity data that allows for a granular assessment of how much of the network's power is derived from wind, solar, hydro, and other renewable sources. In addition to the total percentage of green energy, the methodology focuses on energy intensity, which is defined as the marginal energy cost required to process a single additional transaction on the network. This figure helps quantify the efficiency of the blockchain's resource usage relative to its utility. By integrating global energy statistics with real-time node distribution data, the network can report a more accurate picture of its sustainability, currently indicating that a significant portion of its operational energy comes from renewable sources, reflecting the broader global transition toward cleaner power grids.

The methodology for assessing the key energy sources and the proportion of renewable energy contributing to the Tezos network's operation involves a multi-faceted data collection and analytical process. To determine the extent of renewable energy utilization, the geographical locations of the network's nodes are first pinpointed. This identification relies on an analysis of public information sources, alongside the application of both open-source and proprietary in-house crawlers. In scenarios where direct geographical distribution data for nodes is not available, the methodology employs reference networks. These reference networks are carefully chosen for their structural similarities to Tezos, especially in terms of their incentivization frameworks and consensus mechanisms, ensuring that their energy consumption characteristics serve as a comparable proxy. The gathered geographical information is then integrated with extensive public datasets provided by "Our World in Data," a recognized source for global statistical and environmental information. This data integration facilitates a thorough evaluation of the energy mix powering the nodes. Furthermore, the energy intensity of the Tezos network is quantified, calculated as the marginal energy cost associated with processing each additional transaction. The foundational data for this analysis is drawn from reports such as Ember (2025) and the Energy Institute's Statistical Review of World Energy (2024), with significant data processing contributed by Our World in Data. Specifically, the "Share of electricity generated by renewables" dataset from these sources is instrumental in assessing Tezos's reliance on sustainable energy options. More details can be found via Share of electricity generated by renewables - Ember and Energy Institute.

To ascertain the proportion of renewable energy utilized by the Tron blockchain network, a comprehensive methodology is employed that primarily focuses on determining the geographical locations of its operational nodes. This critical geo-information is obtained through various data collection methods, including the use of public information sites, sophisticated open-source crawlers, and specialized crawlers developed in-house. These tools allow for a detailed mapping of where the network's infrastructure is physically situated. In instances where specific geographic distribution data for the nodes is unavailable, the methodology prudently relies on reference networks. These reference networks are carefully selected based on their comparability to Tron in terms of their incentivization structures and underlying consensus mechanisms, ensuring that the estimated renewable energy usage remains relevant and indicative despite data gaps. Once the geographical data is established, it is then meticulously merged with extensive public information derived from "Our World in Data." This integration allows for a robust assessment of the energy mix, including the share of renewable electricity, at the determined node locations. "Our World in Data" aggregates and processes data from reputable sources such as Ember's "Yearly Electricity Data Europe" and "Yearly Electricity Data," as well as the Energy Institute's "Statistical Review of World Energy." The energy intensity of the network is calculated as the marginal energy cost with respect to one additional transaction, providing a metric for the energy efficiency of each individual operation on the blockchain. The primary data source for the share of electricity generated by renewables, which informs this calculation, is available via Share of electricity generated by renewables – Ember and Energy Institute.

Key GHG sources and methodologies

Tether is present on the following networks: Aptos Coin, Avalanche, Celo, Ethereum, Kava, Klaytn, Near Protocol, Solana, Tezos, Tron.

The methodology for quantifying Greenhouse Gas (GHG) emissions attributable to the Aptos network relies on a detailed analysis that starts with identifying the geographical locations of its network nodes. Similar to energy source determination, this involves extensive data collection using public information sites, alongside specialized open-source and in-house developed crawlers. Should specific geographical data for nodes be incomplete, the approach mandates the use of reference networks that exhibit comparable incentivization frameworks and consensus mechanisms. This ensures that a reasonable estimation of the emission profile can still be achieved, even when direct information is scarce.

Upon obtaining the geographical distribution of nodes, this geo-information is subsequently integrated with publicly accessible data from 'Our World in Data.' This critical step allows for the correlation of node locations with regional carbon intensity of electricity generation, thereby enabling the calculation of associated GHG emissions. The overall GHG intensity is then calculated as the marginal emission generated by each additional transaction. This provides a precise measure of the environmental impact per unit of network activity, highlighting the efficiency of the network's operations from an emissions perspective.

The primary data sources underpinning these GHG emission calculations are contributions from Ember (2025) and the Energy Institute's Statistical Review of World Energy (2024), which undergo significant processing by Our World in Data. Specifically, the 'Carbon intensity of electricity generation' dataset is utilized for these estimations. Further details and the original data can be found at: Carbon intensity of electricity generation - Ember and Energy Institute. This information is licensed under CC BY 4.0, emphasizing its open and verifiable nature.

The methodology employed to determine the Greenhouse Gas (GHG) emissions associated with the Avalanche blockchain network involves a detailed process of locating network infrastructure and integrating this geographical data with carbon intensity statistics. The initial step is to precisely identify the locations of the network's nodes, a task accomplished through the diligent use of public information sites, sophisticated open-source crawlers, and specialized in-house crawlers. This geographical mapping is fundamental to understanding the specific energy grids from which the nodes draw their power. In situations where direct geographical information on node distribution is insufficient, the methodology relies on 'reference networks.' These are selected based on their structural similarities to Avalanche, particularly concerning their incentivization mechanisms and consensus protocols, ensuring that the estimates are as representative as possible. The collected geo-information, whether direct or inferred, is then carefully integrated with public data regarding the carbon intensity of electricity generation. A significant source for this critical data is Our World in Data, which provides comprehensive global information on electricity generation’s carbon footprint. The GHG intensity of the network is quantified as the marginal emission generated per additional transaction processed. This metric allows for a precise evaluation of the environmental impact as network activity scales. The foundational data and citations for this methodology include: Ember (2025) and the Energy Institute - Statistical Review of World Energy (2024), which have been extensively processed by Our World in Data. The specific dataset used is titled “Carbon intensity of electricity generation – Ember and Energy Institute,” drawing original data from Ember’s “Yearly Electricity Data Europe” and “Yearly Electricity Data,” as well as the Energy Institute’s “Statistical Review of World Energy.” This crucial resource for carbon intensity data is available under a CC BY 4.0 license at Carbon intensity of electricity generation – Ember and Energy Institute.

The methodology for assessing the key Greenhouse Gas (GHG) sources and calculating emissions for the Celo blockchain network mirrors the rigorous approach applied to energy consumption analysis. A fundamental step involves precisely identifying the geographical locations of the network's nodes. This process relies on a combination of publicly accessible information sites, advanced open-source crawling tools, and specialized in-house developed crawlers designed to map the physical footprint of the network. Should direct geographical data for all nodes be unavailable or insufficient, the methodology wisely employs a strategy of leveraging reference networks. These alternative networks are carefully chosen for their strong comparability in terms of both their incentive structures and their core consensus mechanisms, ensuring that the environmental impact assessment remains pertinent. Following the collection of geographical data, whether directly or through comparative analysis, this information is integrated with extensive public data available from Our World in Data. This integration is essential for contextualizing the carbon footprint in relation to the energy sources used in the identified locations. The GHG intensity of the network is then determined, calculated as the marginal emission produced for each additional transaction processed. This metric offers valuable insight into the environmental impact per unit of network activity. For detailed information regarding the carbon intensity of electricity generation, a primary source for this data, stakeholders can consult the relevant datasets published by Ember and the Energy Institute, which are available through Carbon intensity of electricity generation - Ember and Energy Institute. This methodology ensures a comprehensive and transparent evaluation of the network's environmental performance concerning GHG emissions.

The methodology for determining the Greenhouse Gas (GHG) emissions of the Ethereum network closely mirrors the approach used for energy consumption, focusing on identifying emission sources and their quantification. The initial and fundamental step involves precisely identifying the geographical locations of the network's operational nodes. This data collection is facilitated through a combination of publicly available information, as well as specialized open-source and proprietary crawlers designed to actively discover and map node distributions across the globe. Should there be an absence of specific geographic information for the nodes, the analysis intelligently defaults to utilizing "reference networks." These are carefully selected networks that exhibit comparable characteristics in terms of their incentivization structures and consensus mechanisms, providing a basis for estimating the geographic spread when direct data is unavailable. This collected geo-information is then meticulously integrated with publicly accessible data from "Our World in Data." This integration allows for the application of regional carbon intensity factors to the estimated energy consumption, thereby enabling the calculation of associated GHG emissions. The overall GHG intensity is quantified as the marginal emission generated per additional transaction processed on the network, offering a metric for the environmental impact of increased network activity. For detailed information and original data regarding the carbon intensity of electricity generation, sources include Ember (2025) and the Energy Institute - Statistical Review of World Energy (2024), processed by Our World in Data, available at Carbon intensity of electricity generation – Ember and Energy Institute. This resource is licensed under CC BY 4.0.

The methodology for determining the Greenhouse Gas (GHG) emissions attributable to the Kava blockchain network is closely integrated with the energy consumption assessment, building on the foundation of understanding its operational energy profile. The primary step involves accurately identifying the geographical distribution of the network's nodes, as the carbon intensity of electricity varies significantly across different regions. This geographical data is acquired through a combination of public information sites, sophisticated open-source crawlers, and specialized in-house crawling technologies.

Where direct geographic data for all nodes is insufficient, the methodology employs a pragmatic approach by utilizing reference networks. These selected reference networks share similar incentivization structures and consensus mechanisms with Kava, ensuring their GHG emission profiles serve as appropriate benchmarks. The geo-information, whether directly obtained or inferred from reference networks, is then systematically merged with comprehensive public data on the carbon intensity of electricity generation. This crucial data is often sourced from established entities such as Our World in Data, which processes information from key energy reports.

The calculation of GHG emissions then proceeds by factoring in the energy consumption data, the identified energy sources, and their corresponding carbon intensities. A critical metric derived from this analysis is the GHG intensity, which quantifies the marginal emissions produced for each additional transaction processed on the network. This granular measurement provides insight into the environmental impact per unit of network activity. Key data sources for carbon intensity typically include processed data from Ember (2025) and the Energy Institute's Statistical Review of World Energy (2024) as aggregated by Our World in Data. This multi-faceted approach aims to offer a transparent and accurate representation of the Kava network's carbon footprint, facilitating informed assessment of its environmental performance.

For more detailed information on carbon intensity, refer to Carbon intensity of electricity generation - Ember and Energy Institute.

The methodology for assessing the Greenhouse Gas (GHG) emissions attributable to the Klaytn blockchain network is built upon a detailed process that begins with pinpointing the geographical locations of its operational nodes. This foundational data is diligently collected from a variety of sources, including publicly accessible information sites, alongside specialized open-source and internally developed crawlers designed for network analysis. In scenarios where complete geographic distribution data for all nodes cannot be precisely ascertained, the assessment employs a comparative approach. It refers to established reference networks that exhibit similar incentive structures and consensus mechanisms to Klaytn, allowing for an informed estimation of emission factors. The geo-spatial information obtained is then integrated with comprehensive public data sets, prominently featuring information from Our World in Data. This critical step enables the accurate calculation of GHG emissions by correlating node locations with regional carbon intensity metrics of electricity generation. The overall GHG intensity of the network is quantified as the marginal emission generated per additional transaction. This metric offers a granular perspective on the environmental impact of individual network operations. The underlying data for the carbon intensity of electricity generation, which is integral to these calculations, is rigorously processed by Our World in Data. This data draws from authoritative sources such as Ember's "Yearly Electricity Data Europe" and "Yearly Electricity Data," as well as the Energy Institute's "Statistical Review of World Energy." This robust data integration ensures a credible and transparent evaluation of the network's carbon footprint. The methodology aims to provide a clear understanding of the environmental implications of Klaytn's activities by accounting for its energy consumption and associated emissions comprehensively. Our World in Data - Carbon intensity of electricity generation

The assessment of Greenhouse Gas (GHG) Emissions for the NEAR Protocol network follows a structured methodology that prioritizes the precise geographical identification of its operational nodes. This process begins by actively determining the locations of all network nodes, utilizing a combination of publicly accessible information sites, sophisticated open-source crawling tools, and specialized crawlers developed in-house. This multi-pronged data acquisition strategy aims to gather comprehensive location data for the network's infrastructure.Should specific geographic distribution data for certain nodes prove unobtainable, the methodology incorporates the use of reference networks. These are carefully selected based on their similarity to the NEAR Protocol in terms of their incentive structures and consensus mechanisms, allowing for an informed estimation of GHG emissions in the absence of direct data. This comparative approach ensures that even with limited direct information, a credible assessment can still be made.The collected geo-information is subsequently integrated with extensive public datasets, prominently featuring data from "Our World in Data." This integration enables the cross-referencing of node locations with regional carbon intensity data of electricity generation, providing a basis for calculating the associated GHG emissions. A crucial metric derived from this methodology is the GHG intensity, which quantifies the marginal emission attributable to processing one additional transaction on the NEAR Protocol network. This metric offers insights into the environmental footprint per unit of network activity. For detailed data on carbon intensity, the following resource is referenced: Carbon intensity of electricity generation – Ember and Energy Institute. This rigorous and transparent methodology underpins the network's efforts to measure and report its environmental impact.

Quantifying the greenhouse gas (GHG) emissions of the Solana blockchain network requires a methodology focused on carbon intensity and the geographic footprint of its decentralized nodes. Similar to the energy source analysis, the process begins by locating active nodes using a combination of public data and specialized web crawling technology. This geographic information is critical because the carbon footprint of electricity varies significantly between different jurisdictions depending on their local power generation mix. For nodes that cannot be precisely located, the analysis uses data from comparable blockchain networks to ensure the estimation remains as complete as possible. The carbon intensity of the electricity used by these nodes is derived from the Carbon intensity of electricity generation dataset, accessible via Our World in Data. This dataset, which is licensed under CC BY 4.0, provides essential metrics on the amount of CO2 equivalent emitted per kilowatt-hour of electricity produced in various countries. By merging node locations with these carbon intensity values, the network can calculate its Scope 2 emissions, which represent the indirect emissions from the generation of purchased electricity. The methodology also focuses on GHG intensity, measuring the marginal emissions generated by one additional transaction on the blockchain. This allows for a performance-based assessment of the network's environmental impact. The results are typically reported in tonnes of CO2 equivalent (tCO2e), providing a standardized metric that allows for comparison with other industries and financial systems. This data-driven approach ensures that the network’s environmental disclosures are rooted in empirical global energy statistics and verifiable infrastructure data.

The quantification of Greenhouse Gas (GHG) emissions attributable to the Tezos network employs a systematic methodology, akin to the approach for energy consumption analysis. This process begins by identifying the geographical locations of the operational nodes within the Tezos network. This crucial geographical intelligence is compiled through diligent scrutiny of public information, supplemented by the deployment of open-source and internally developed crawlers designed to gather precise location data. In situations where specific geographical distribution data for nodes cannot be obtained, the methodology resorts to a comparative analysis, substituting the missing information with data from carefully selected reference networks. These reference networks are chosen based on their structural and operational similarities to Tezos, particularly in their incentive frameworks and consensus mechanisms, ensuring the relevance of their environmental impact profiles. The collected geographical insights are then thoroughly integrated with publicly accessible environmental data from "Our World in Data." This integration is vital for correlating node locations with regional electricity generation characteristics, which directly influence GHG emission calculations. A key metric in this assessment is the GHG intensity, which is defined as the marginal emission produced per additional transaction processed on the Tezos blockchain, offering insight into the environmental impact on a per-transaction basis. The primary data sources underpinning these calculations are significant reports from Ember (2025) and the Energy Institute's Statistical Review of World Energy (2024), with extensive data processing conducted by "Our World in Data." Notably, the "Carbon intensity of electricity generation" dataset from these sources is pivotal for determining the emissions factor associated with the electricity consumed by the network, and it is licensed under CC BY 4.0. Further information is available through Carbon intensity of electricity generation - Ember and Energy Institute.

The methodology for determining Greenhouse Gas (GHG) Emissions associated with the Tron blockchain network mirrors the approach used for energy consumption, by first establishing the geographical locations of the network's operating nodes. This crucial geographical information is diligently identified using a combination of public information sites, various open-source crawlers, and proprietary in-house developed crawlers. In situations where precise geographic distribution data for the nodes is not directly accessible, the assessment methodology intelligently falls back on employing reference networks. These selected reference networks are chosen specifically for their comparable incentivization structures and consensus mechanisms to Tron, ensuring that the GHG emission estimates remain relevant and methodologically sound. Upon the successful determination of node locations, this geo-information is then integrated with publicly available data sourced from "Our World in Data." This comprehensive database, which processes contributions from entities such as Ember and the Energy Institute’s Statistical Review of World Energy, provides essential insights into the carbon intensity of electricity generation across different regions. The process facilitates a robust calculation of the network's overall GHG emissions. The intensity of these emissions is calculated as the marginal emission with respect to processing one additional transaction on the blockchain. This metric offers a nuanced understanding of the environmental footprint per unit of network activity. The key data source utilized for the carbon intensity of electricity generation is accessible through Carbon intensity of electricity generation – Ember and Energy Institute. This source is licensed under CC BY 4.0.