MoreRSS

site iconHackerNoonModify

We are an open and international community of 45,000+ contributing writers publishing stories and expertise for 4+ million curious and insightful monthly readers.
Please copy the RSS to your reader, or quickly subscribe to:

Inoreader Feedly Follow Feedbin Local Reader

Rss preview of Blog of HackerNoon

Ninja Deep Research: The AI Agent Everyone Can Actually Start Using Now

2025-05-10 01:46:37

\ 2025 is heralded as the year of AI agents by venture capitalists, tech giants, and even Time Magazine.

\ Unlike chatbots, AI agents can autonomously complete tasks for you and identify when they’re needed. They use a combination of prompted instructions, reasoning capabilities, and real-time data from the apps and services that you use every day.

\ Imagine you’re preparing for a meeting. With Ninja AI’s Deep Research, for example, you could have it automatically gather your company’s competitor news and generate an in-depth report on key insights and actionable recommendations. You could even enhance this with industry analysis and expert opinions drawn from diverse sources, including files, video, and audio.

\ Sequoia Capital predicted that this year we can expect to see swarms of agents augmenting—rather than cutting out—professionals in these ways. They’re already seeing instances where agents working alongside sales have tripled performance compared to when team members weren’t involved in the process.

\ YC believes that agents will replace SaaS, just as SaaS replaced on-premise software. They see demand for agents following a similar pattern—where individual use for general purposes, like chat, will drive more businesses to adopt them too.

\ With any innovation in its early stages, it can often take time for users to experience practical, everyday benefits. In contrast, applications like Ninja’s Deep Research are already proving they can deliver immediate value across a wide range of needs.

What Is Deep Research and How Does It Work?

Generally, Deep Research creates and executes a plan to search, analyze, and synthesize hundreds of online sources to answer a question. What would take a human hours can instead be completed in tens of minutes.

\ There’s only a handful of options on the market from Ninja, Open AI, Google, Perplexity, Anthropic, and Monica. Each varies when it comes to usage, reliability, and cost. Some cap queries at different amounts, range between $20-$200/mo, or take 30 minutes or more to return an answer. Others can miss information easily found online, have high hallucination rates, and be inconsistent with citations—or do not provide them at all.

\ How Ninja is addressing limitations in the market is by consistently improving its speed, performance, and affordability. Powered by custom, next-generation chips, our Deep Research can handle unlimited queries, delivers instant, expert-level results, and offers a flat-rate membership at $15/mo. It also sets a new standard in the industry with its superior capabilities:

\

  • Refine or Choose from Curated Prompts: Deep Research helps you craft optimal prompts for the best results. The platform includes a prompt improver that automatically enhances your queries by adding key details and expanding context. Additionally, it offers a curated selection of prompts, tailored to fields such as academia, development, finance, marketing, PR/communications, and personal topics.

\

  • Analyzes Multiple Web and File Sources: Once you’ve set up your prompt, Deep Research creates a multi-step plan and dives into hundreds of sources across the internet and files, including video and audio content (e.g., YouTube or podcasts). It can even convert results into custom reports, summaries, itineraries, and more—all in your preferred format.

\ \

\

  • Validate Insights with Confidence: Deep Research makes it easy to verify information with citations and direct links to sources. The platform also shows its reasoning for every step of its plan, whereas a new study found that other models fail to do so 80% of the time.

    \ \ \ \

    \

  • Proven to Surpass Leading AI Models: For every request, Deep Research generates code to precisely locate information,significantly improving accuracy and reducing hallucinations. In fact, it outperformed leading models in the field at minimizing hallucinations, achieving 91.2% accuracy on the SimpleQA test—one of the best proxies for assessing hallucination levels.

    \

\

\

How Millions of Users Are Leveraging Ninja’s Deep Research

Curious about how millions of people are leveraging our Deep Research? Here are just some of the many examples of its diverse use cases:

\

  • Technical: Analyzes system specifications, external documentation, and industry best practices to recommend solutions for software integration, API development, and security protocol enhancements.

    \ Try it in Ninja: Evaluate the system specifications and external documentation for [insert software/product], and recommend best practices for integrating [insert software/technology].

\

  • Marketing: Assesses market trends, competitor strategies, key search terms, and content gaps to inform and optimize campaigns.

    \ Try it in Ninja: Analyze market trends for [insert product/industry], assess competitor strategies, and identify key search terms. Highlight content gaps and suggest improvements to optimize a campaign targeting [insert target audience].

\

  • Product: Synthesizes user interviews, surveys, focus groups, and analytics to create reports on customer demographics, behaviors, motivations, and challenges.

    \ Try it in Ninja: Combine insights from user interviews, surveys, and focus groups to create a report on customer [insert characteristics]. Suggest product improvements for [insert product] based on feedback.

\

  • Sales: Identifies high-potential leads, prospects' pain points and needs, and competitor solutions and pricing to improve outreach and close more deals.

    \ Try it in Ninja: Analyze the [insert industry/sector], identifying high-potential leads and key company pain points and needs. Assess competitor solutions and pricing, then recommend strategies for initiating outreach to engage prospects for [insert product/service].

\

  • Skill Advancement: Improves in specific programming languages, frameworks, or technologies by generating in-depth tutorials, coding exercises, and summaries.

    \ Try it in Ninja: Create a detailed learning path for advancing in [insert programming language/framework/technology]. Provide clear tutorials, practical coding exercises, and concise summaries to reinforce key concepts and skills.

\

  • Product Comparison: Compares features, specifications, performance, and pricing to receive hyper-personalized recommendations.

    \ Try it in Ninja: Compare the features, specifications, performance, and pricing of [insert product 1] and [insert product 2]. Provide a recommendation based on [insert specific needs or criteria], such as [insert feature preference or use case].

\

  • Traveling: Generate itineraries for destinations, accommodations, attractions, activities, or visa requirements based on timeframe, budget, and preferences.

    \ Try it in Ninja: Suggest the best travel dates for a trip to [insert destination] in [insert month], along with four-star accommodation options within a budget range of [insert price range]. Identify visa requirements for [insert nationality] and provide a list of recommended attractions and activities.

    The Future of AI Agents: How Ninja's Paving the Way

So far, there have already been many developments supporting the idea that 2025 will be the year of AI agents.

\ This month, Google announced the Agent2Agent (A2A) protocol, a new system that allows agents to communicate with each other, securely exchange information, and coordinate actions across enterprise platforms and services. The initiative is backed by over 50 major tech companies, including Salesforce, PayPal, Workday, and Cohere.

\ How could this benefit Deep Research use cases? A developer could leverage it to build and optimize applications using collaborative AI agents. One agent could serve as a coding assistant, analyzing and pulling relevant code patterns, while another could access Salesforce’s APIs to automatically sync customer data, update records, or trigger workflows. A third agent could review the implementation, debug the code for errors, and suggest specific fixes.

\ As for whether or not agents will replace SaaS, that question remains. What we do know is that they’re already transforming how we access, learn about, and share information. According to McKinsey, agents can produce high-quality content that reduces review cycle times by 20 to 60%. And unlike previous waves of innovation, you no longer have to wait or pay high prices to take advantage of the tools that power them through Ninja.

\ Beyond Ninja providing access to the world’s best models, we’ve just released APIs for Deep Research and our other SuperAgents. They offer a flexible and cost-effective way to join us in building powerful products with the best performance at the lowest cost. Join Ninja today and experience how it can transform your day-to-day work and applications.

New Purpose-Built Blockchain T-Rex Raises $17 Million to Transform Attention Layer In Web3

2025-05-10 01:26:27

Launching Summer 2025, T-Rex’s built-in distribution engine introduces a radically simple idea: rewarding people seamlessly for doing what they already love online.

\ T-Rex, a purpose-built blockchain for entertainment, content, and cultural virality, today announced a $17 million fundraise and Incubation Fund to revolutionize online content publishing by seamlessly rewarding consumers for everyday interactions on social platforms such as YouTube, TikTok, or X (formerly Twitter) and reshape how consumer-facing decentralized applications (dApps) are discovered, published, distributed and scaled across Web3.

\ Backed by strategic investors including Portal Ventures, North Island Ventures, Framework Ventures, Arbitrum Gaming Ventures, ArkStream Capital, Mindfulness Capital, Hypersphere, SNZ, and Arche Fund, and developed by EVG, Asia’s prominent product builder and publisher, known for driving mass adoption, T-Rex directly addresses the critical “ghost town” and “mercenary users” challenges in blockchain.

\

"Arbitrum Gaming Ventures recognizes the transformative potential of platforms like T-Rex that are expanding Web3 beyond DeFi. EVG's strong regional influence and deep understanding of the Southeast Asian market, projected to reach $7 billion by 2028, provide a strategic gateway for us to significantly scale our footprint within this high-growth region. Combining our robust scaling capabilities with EVG's extensive ecosystem expertise, we are strategically positioned to penetrate the entertainment industry and broader consumer market in a pivotal and rapidly expanding part of the world," said Dan Peng, Partner at Arbitrum Gaming Ventures.

​​

T-Rex leverages Arbitrum’s powerful Layer-2 scaling solution, delivering ultra-fast, secure, and low-cost transactions essential for consumer-scale adoption. Arbitrum Gaming Ventures has specifically identified T-Rex as key to its regional growth strategy.

T-Rex: A New Kind of Blockchain for the Culture-First Internet

UI screenshot: A user earning rewards while browsing YouTube with T-Rex’s browser extension.)

\ While Web3 holds the promise of revolutionary change, the current landscape is fragmented, user-unfriendly and often empty with underutilized dApps. Despite all its innovation, most chains lack real users, real culture, and real reasons to stay. T-Rex flips the model with its simple first principle: stop trying to reinvent user habits and instead enhance them invisibly.

\ Its core innovation, Proof-of-Engagement (PoE) mechanism, automatically rewards users on apps they already use daily through a privacy-preserving browser extension, turning everyday online actions like watching videos, liking posts, and sharing memes into tangible, valuable digital ownership and offline perks.

\

“Instead of building another blockchain pipe, we’re delivering actual water: engaging content, thriving communities, real-world rewards”, said Allen Ng, Co-Founder of T-Rex and EVG.

\

“Users shouldn’t have to think about crypto until they want to. Our blockchain stays invisible, letting them effortlessly turn their online fun into meaningful rewards. Our vision is to let attention becomes equity, community becomes power and participation becomes currency.”

Radical Simplicity: Web3 That Feels Like TikTok, Not A Crypto Wallet

(UI screenshot: Home Discovery pushing relevant content and dApps to user.) At launch, users simply install T-Rex’s browser extension and continue browsing popular social media platforms. Every interaction is quietly, securely recorded via advanced zero-knowledge tech (zkTLS), and seamlessly turned into rewards, with no wallet or tech jargon required.

\ Creators and projects benefit from instant audience discovery and viral distribution, while end users earn rewards effortlessly, redeemable both digitally and offline, such as cash back at favorite restaurants or exclusive local deals.

\

“The next wave of breakout applications will be defined by distribution, UI / UX, and product differentiation. The team at T-Rex gets this. They're building a protocol that seamlessly onboards social media users and allows them to monetize their data through network rewards. We're excited to back T-Rex as they merge protocol-native network design with clean consumer product expertise," said Evan Fisher, Founder and General Partner of Portal Ventures.

\

“Web3 infrastructure has matured, but it still lacks consumer momentum because only a few use cases resonate with the masses. T-Rex is a strong contender to bridge this gap. By prioritizing culture and abstracting complexity, it offers a path to broad adoption,” said Travis Scher Managing Partner and Co-founder of North Island Ventures.

Incubating the New Digital Metropolis

The $8 million Incubation Fund backed by EVG with support from the Arbitrum Gaming Ventures will accelerate ecosystem growth, offering comprehensive developer support beyond capital, including engineering resources, media partnerships, community activations, premium events, Key Opinion Leader (KOL) networks, and strategic Intellectual Property (IP) applications.

\

“We provide real firepower, not just capital”, Joyce Yim, Co-founder of T-Rex emphasised. “Developers gain immediate user traffic, creators grow loyal audiences effortlessly, and users become not just spectators, but stakeholders in the success of viral content.”

\ Set to launch in Summer 2025, T-Rex’s distribution layer and browser extension create the railroads linking popular online consumer applications such as gaming, music, interactive media, and Web3.

\ From creators rewarding top users with digital assets, to new projects gaining instant discovery, to active users earning a stake, T-Rex’s ecosystem is designed for intuitive use, cultural resonance, and economic empowerment at scale.

About T-Rex

T-Rex is a new blockchain ecosystem purpose-built for consumer-facing applications, designed to transform the Web3 attention layer through its innovative Proof of Engagement (PoE) mechanism.

\ Developed by EVG and backed by leading investors including Arbitrum Gaming Ventures, Framework Ventures, North Island Ventures, and Portal Ventures, T-Rex offers creators and developers a UX-first infrastructure with built-in discovery, rewards, and distribution, enabling the next billion users to engage, earn, and build on-chain.

\ Website: https://trex.xyz/ 

Twitter: https://x.com/TREX_chain 

About EVG

Founded in 2018, EVG is one of APAC’s largest and most active Web3 product builders and publishers.

\ With 200+ engineers and 10+ millions of users, EVG has built a complex of innovative products across consumer infrastructures (e.g Edgen AI, T-Rex), entertainment / culture dApps (e.g Deek, Last Odyssey, LiveArt), and fintech platforms (e.g Aspen Digital). 

\ EVG’s corporate venture arm also owns strategic stakes across 100+ Web3 companies including the likes of Celestia, Wormhole, Berachain, Pudgy Penguins, Abstract, Infinex, Dapper Labs, Animoca Brands, The Sandbox, Stacks, Immutable, Kraken and Dunamu. 

\ Website: https://www.evg.co/

Twitter: https://twitter.com/EVGHQ/ 

Media Contact: [email protected] 

:::tip This story was published as a press release by Chainwire under HackerNoon’s Business Blogging Program.

:::

\ \

The HackerNoon Newsletter: If Youre an Amazon Ring Owner, You May Be an Accidental Spy (5/9/2025)

2025-05-10 00:04:35

How are you, hacker?


🪐 What’s happening in tech today, May 9, 2025?


The HackerNoon Newsletter brings the HackerNoon homepage straight to your inbox. On this day, Uber went public on the New York Stock Exchange in undefined, and we present you with these top quality stories. From Unpacking the IT Gender Gap: Lived Experience and the Path Forward to My Remote Reboot on Upwork and Freelancer.com: 96 Months Later, let’s dive right in.

Unpacking the IT Gender Gap: Lived Experience and the Path Forward


By @ekaterinaandreeva [ 5 Min read ] Why are there so few women in tech, and what can be done to change it? Read More.

If Youre an Amazon Ring Owner, You May Be an Accidental Spy


By @TheMarkup [ 12 Min read ] The Markup analyzed the connection between income and Ring camera usage using a database of Neighbors posts from 2018 to 2020 Read More.

My Remote Reboot on Upwork and Freelancer.com: 96 Months Later


By @nebojsaneshatodorovic [ 4 Min read ] Is it worthy being a freelance newbie in 2025 on Upwork and Freelancer.com? Read More.


🧑‍💻 What happened in your world this week?

It's been said that writing can help consolidate technical knowledge, establish credibility, and contribute to emerging community standards. Feeling stuck? We got you covered ⬇️⬇️⬇️


ANSWER THESE GREATEST INTERVIEW QUESTIONS OF ALL TIME


We hope you enjoy this worth of free reading material. Feel free to forward this email to a nerdy friend who'll love you for it.See you on Planet Internet! With love, The HackerNoon Team ✌️


Analyzing the Distribution of Voting Power in Blockchain

2025-05-09 23:00:08

Table of Links

Abstract/Zusammenfassung

Publications

Acknowledgements

CHAPTER 1: INTRODUCTION

  1. Introduction

    1.1 Overview of thesis contributions

    1.2 Thesis outline

CHAPTER 2: BACKGROUND

2.1 Blockchains & smart contracts

2.2 Transaction prioritization norms

2.3 Transaction prioritization and contention transparency

2.4 Decentralized governance

2.5 Blockchain Scalability with Layer 2.0 Solutions

CHAPTER 3. TRANSACTION PRIORITIZATION NORMS

  1. Transaction Prioritization Norms

    3.1 Methodology

    3.2 Analyzing norm adherence

    3.3 Investigating norm violations

    3.4 Dark-fee transactions

    3.5 Concluding remarks

CHAPTER 4. TRANSACTION PRIORITIZATION AND CONTENTION TRANSPARENCY

  1. Transaction Prioritization and Contention Transparency

    4.1 Methodology

    4.2 On contention transparency

    4.3 On prioritization transparency

    4.4 Concluding remarks

CHAPTER 5. DECENTRALIZED GOVERNANCE

  1. Decentralized Governance

    5.1 Methodology

    5.2 Attacks on governance

    5.3 Compound’s governance

    5.4 Concluding remarks

CHAPTER 6. RELATED WORK

6.1 Transaction prioritization norms

6.2 Transaction prioritization and contention transparency

6.3 Decentralized governance

CHAPTER 7. DISCUSSION, LIMITATIONS & FUTURE WORK

7.1 Transaction ordering

7.2 Transaction transparency

7.3 Voting power distribution to amend smart contracts

Conclusion

\ Appendices

APPENDIX A: Additional Analysis of Transactions Prioritization Norms

APPENDIX B: Additional analysis of transactions prioritization and contention transparency

APPENDIX C: Additional Analysis of Distribution of Voting Power

Bibliography

APPENDIX C: Additional Analysis of Distribution of Voting Power

C.1 Compound proposals categorization

We gathered data from Messari (Messari, 2023) to determine the categories, subcategories, and the level of importance associated with each Compound proposal. Figure C.1 shows the distribution of 101 executed Compound proposals across different categories and subcategories. We show the degree of importance for each proposal according to Messari divided into “low”, “medium”, “high”, and “very high”. As a result, a few proposals categorized as “Parameter Change” and “Security” demonstrate a high level of importance. Furthermore, proposals with the highest level of importance are found within the “Security” category, specifically within the “Mining and Validation” subcategory. This refers to the proposal 64 that was created to fix a bug introduced by proposal #62 (Loewen, 2021a,b).

\ The majority of the proposals (61 proposals, accounting for 60.4%) are related to “Parameter Change” followed by “Team and Operations” and “Token Supply” accounting for 10 (9.9%) each, and “Governance” with 7 (6.93%) proposals. According to the level of importance reported by Messari, out of the total of 101 executed proposals, 51 proposals (50.5%) are classified as low importance, 46 proposals (45.54%) as medium importance, 3 proposals as high importance, and 1 proposal as very high importance.

C.2 Filtering events to construct our Compound data Set

Figure C.1: Categorization of executed proposals. Most of the proposals (60.4%) are related to “Parameter Change”. We also show the importance level (low in green, medium in blue, high in red, and very high in purple color) for each proposal according to Messari (Messari, 2023).

\ Figure C.2: Compound proposals typically reach the quorum after 1.64 days on average.

\ Table C.1: A comparison of voting mechanisms in decentralized governance protocols such as AAVE (AAVE, 2023), Balancer (Balancer.fi, 2023), Compound (Leshner and Hayes, 2019), Convex Finance (Convex, 2023a), Curve (Curve, 2023), Maker (MakerDAO, 2023), and Uniswap (Adams et al., 2021). SC stands for smart contract.

\ This section describes the details required to filter and collect transactions data that triggered events of interest from any smart contract on the Ethereum blockchain. Before creating a filter, we need the address of our target contract and its Application Binary Interface (ABI). The ABI is a JSON file that specifies the functions available in the contract, their signatures, and the available events. We can retrieve this information by calling the Etherscan API (Etherscan, 2023a). Once we have the contract address and ABI, we can create a filter to track the contract’s activity on the Ethereum blockchain using an important Python library for interacting with Ethereum nodes called Web3.py (web3.py team, 2022) to facilitate the communication with our node’s API.

\ The Web3.py library provides a filtering function called createFilter. This function can be used to filter transactions that triggered events of interest from a specific contract within a range of block numbers. We use this function to efficiently collect all transactions that triggered these events from the Compound (Leshner and Hayes, 2019) smart contract.

C.3 Inferring wallet addresses ownership

We aim to identify the ownership of public wallet addresses on the Ethereum blockchain. Due to the inherent anonymity of blockchain addresses, this proves to be a challenging task as we can only know the owners of an address if the owner chooses to disclose it. However, popular blockchain explorers such as Etherscan (Etherscan, 2023b) often provide information on the top holders of specific cryptocurrencies, which allows us to partially overcome this obstacle.

\ Then, we first obtained the lists of the top 10,000 Ether holders from which there are 290 (2.9%) identified addresses and the top 1000 COMP holders from which there are 82 (8.2%) identified addresses from Etherscan. By comparing these lists to our data set, we were able to identify most of the top COMP holder addresses in our sample. However, this method did not work for the top delegated accounts, as most of them were not included in the list of top COMP holders on Etherscan. This means that most of the delegated accounts does not hold many tokens. Further, we also used the list of top 100 delegated Compound addresses by voting weight available on the Compound website (Compound Labs, Inc., 2022b) from which there are 66 identified addresses.

\ Furthermore, to extend the available identified addresses in our analysis, we obtained the addresses of 2783 identified users from the Sybil-List (Sybil, 2023b), a project maintained by Uniswap that uses cryptographic proofs to verify wallet addresses ownership. By combining the identified addresses from both sources, we were able to obtain the ownership of 3191 inferred public wallet addresses to use in our analysis. We were able to infer 114 (3.41%) out of the 3341 unique addresses in our data set. Considering the top 10 most powerful voters for each proposal (refer to Figure C.3 in §C.5), we were able to infer 67 (50.37%) of the 133 unique addresses. Overall, our methodology allowed us to partially overcome the anonymity of public wallet addresses on the Ethereum blockchain and shed light on the ownership of these addresses in our data set. Finally, as an entity can control more than one address, we grouped the addresses we identified belonging to the same entity together to conduct our analysis.

C.4 Types of existing governance protocols

There are various smart contract applications that utilize decentralized governance protocols for decision-making, including those for lending, decentralized exchanges (DEXes), and stablecoins, among others. An example of such protocols can be found on the Ethereum blockchain, where a number of these applications are available. We have selected some of the most protocols that use decentralized governance for decisionmaking. Table C.1 presents 8 protocols, including Maker Executive and Maker Pooling, which are part of the MakerDAO (MakerDAO, 2023) stablecoin protocol responsible for the DAI token. These protocols use decentralized governance mechanisms, and we characterize them based on whether their votes are cast on- or off-chain, the delegation methods they use, how they aggregate the votes, and how the proposal outcome take effect.

C.5 How voters cast their votes

This section examines how each of the top-10 voters of Compound and Uniswap cast their votes. Some proposals may not have received any votes if they were cancelled before the voting period began. See §5.3.2 for details. Figure C.3 shows how each of the top-10 voters cast their votes in each of the 126 (94.74%) out of 133 Compound proposals.

\ Figure C.4 shows the all votes cast in chronological order per proposal. On average, voters took 1.4 days (with a standard deviation of 0.95 and a median of 1.34 days) to cast their votes after the voting period began.

C.6 Time until reaching the quorum in Compound

For a proposal to pass, it must receive a majority of in favor votes and at least 400,000 (4%) votes in favor from the total supply of Compound tokens. This minimum number of in favor votes is referred to as the quorum and is defined by the Compound Governor Bravo contract.

\ We analyzed how long it takes for these proposals to reach the required quorum. Figure C.2 shows the number of days it took each of the evaluated Compound proposals to reach the quorum. On average, it takes 1.64 days with a standard deviation of 0.72 days for the proposals to reach the quorum. The cumulative distribution function of our results, where 32% take more than 2 days to reach the quorum. The shortest and longest time it took was 0.11 and 3 days, respectively.

\ Figure C.3: Cumulative voting power distribution of the top-10 Compound voters per proposal. On average, proposals required 2.84 voters (std. of 0.97) to reach at least 50% of their total votes. The median was 3 voters, with a range of 1 to 5 votes. This indicates a concentrated amount of voting power. The subtitles indicate the proposal ID and outcome (“E” for executed, “D” for defeated, and “C” for cancelled).

\ Figure C.4: Voting delays for all votes cast per proposal in chronological order of vote. On average, voters took 1.4 days (with a standard deviation of 0.95 and a median of 1.34 days) to cast their votes after the voting period began. The subtitles indicate the proposal ID and outcome (“E” for executed, “D” for defeated, and “C” for cancelled).

\

Bibliography

0x Protocol (2022). 0x: Powering the decentralized exchange of tokens on Ethereum. https://www.0x.org.

\ AAVE (2022). AAVE - Open Source Liquidity Pool. https://aave.com.

\ AAVE (2023). AAVE Economics – Governance. https://docs.aave.com/ aavenomics/governance. Accessed on May 25, 2023.

\ Adams, H., Zinsmeister, N., Salem, M., Keefer, R., and Robinson, D. (2021). Uniswap v3 core.

\ Amico, J. (2023). On crypto governance. https://a16z.com/2021/02/05/oncrypto-governance. Accessed on February 8, 2023.

\ Andrew Hinkes and Joe Ciccolo (2021). OFAC’s Bitcoin Blacklist Could Change Crypto. https://www.coindesk.com/goodbye-fungibility-ofacs-bitcoinblacklist-remake-crypto/.

\ Antonio Pierro, G., Rocha, H., Tonelli, R., and Ducasse, S. (2020). Are the gas prices oracle reliable? a case study using the ethgasstation. In 2020 IEEE International Workshop on Blockchain Oriented Software Engineering (IWBOSE), pages 1–8.

\ Antonopoulos, A. M. (2014). Mastering Bitcoin: unlocking digital cryptocurrencies. O’Reilly Media, Inc.

\ Antonopoulos, A. M. and Wood, G. (2018). Mastering ethereum: building smart contracts and dapps. O’Reilly Media, Inc.

\ AntPool (2022). Prioritize Transaction. https://www.antpool.com/user/ prioritiseTransaction.htm.

\ Arruñada, B. and Garicano, L. (2018). Blockchain: The birth of decentralized governance. Pompeu Fabra University, Economics and Business Working Paper Series, 1608.

\ Asayag, A., Cohen, G., Grayevsky, I., Leshkowitz, M., Rottenstreich, O., Tamari, R., and Yakira, D. (2018). A fair consensus protocol for transaction ordering. In 2018 IEEE 26th International Conference on Network Protocols (ICNP).

\ at Berkeley, B. (2021). Compound proposal 89 - lower proposal threshold to 25k comp. https://compound.finance/governance/proposals/89. Accessed on May 22, 2023.

\ Atzori, M. (2017). Blockchain technology and decentralized governance: Is the state still necessary? Journal of Governance and Regulation/Volume, 6(1).

\ Babel Finance (2021). Economic Daily: Babel Finance Launches Ethereum Mining Pool.

\ Bahack, L. (2013). Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft). CoRR, abs/1312.7013.

\ Baird, L. (2016). The swirlds hashgraph consensus algorithm: Fair, fast, byzantine fault tolerance. Technical Report SWIRLDS-TR-2016, Swirlds, Inc.

\ Balancer.fi (2023). Governance – Balancer. https://docs.balancer.fi/ ecosystem/governance. Accessed on May 25, 2023.

\ Balancerl (2022). Balancer AMM DeFi protocol. https://balancer.fi.

\ Bancor (2022). Bancor: Grow your ETH. https://bancor.network.

\ Basu, S., Easley, D., O’Hara, M., and Sirer, E. G. (2019). Towards a Functional Fee Market for Cryptocurrencies. CoRR, abs/1901.06830.

\ Beck, R., Müller-Bloch, C., and King, J. L. (2018). Governance in the blockchain economy: A framework and research agenda. Journal of the Association for Information Systems, 19(10).

\ Behrens, J. (2017). The origins of liquid democracy. The Liquid Democracy Journal, 5(2).

\ Binance (2023). https://www.binance.com. Accessed on May 25, 2023.

\ Bitcoin Abuse (2020). Bitcoin Abuse. https://www.bitcoinabuse.com/reports. Accessed on March 19, 2020.

\ Bitcoin Wiki (2023a). getblocktemplate. https://en.bitcoin.it/wiki/ Getblocktemplate. Accessed on May 26, 2023.

\ Bitcoin Wiki (2023b). Script. https://en.bitcoin.it/wiki/Script. Accessed on August 3, 2023.

\ BitcoinAbuse (2021). Recently Reported Addresses. https://www.bitcoinabuse. com/reports.

\ bitcoin.org (2023). Bitcoin Core. https://bitcoin.org/en/bitcoin-core. Accessed on May 26, 2023.

\ Blockchain.com (2021). Ethereum Explorer. https://www.blockchain.com/ explorer?view=eth.

\ Blockchair (2023). Ethereum Explorer. https://blockchair.com/ethereum. Accessed on May 25, 2023.

\ BloXroute Labs (2022). BloXroute Labs. https://bloxroute.com.

\ Blum, C. and Zuber, C. I. (2016). Liquid democracy: Potentials, problems, and perspectives. Journal of political philosophy, 24(2).

\ Braiins (2021a). Stratum mining protocol V1. https://braiins.com/stratum-v1. Accessed on May 26, 2023.

\ Braiins (2021b). Stratum mining protocol V2. https://braiins.com/stratum-v2. Accessed on May 26, 2023.

\ Breidenbach, L., Cachin, C., Chan, B., Coventry, A., Ellis, S., Juels, A., Koushanfar, F., Miller, A., Magauran, B., Moroz, D., et al. (2021). Chainlink 2.0: Next steps in the evolution of decentralized oracle networks. Chainlink Labs.

\ BTC.com (2022). BTC.com Transaction Accelerator. https://pushtx.btc.com.

\ Buterin, V., Conner, E., Dudley, R., Slipper, M., Norden, I., and Bakhta, A. (2019a). “EIP-1559: Fee market change for ETH 1.0 chain,” Ethereum Improvement Proposals.

\ Buterin, V., Hitzig, Z., and Weyl, E. G. (2019b). A flexible design for funding public goods. Management Science, 65(11).

\ Capital, P. (2021). Compound proposal 60 - address whitelist for submitting proposals. https://compound.finance/governance/proposals/60. Accessed on May 22, 2023.

\ Carlsten, M., Kalodner, H., Weinberg, S. M., and Narayanan, A. (2016). On the instability of bitcoin without the block reward. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS ’16.

\ Carroll, L. (1884). Principles of parliamentary representation.

\ Chainlink (2022). Decentralized Data Feeds. https://data.chain.link.

\ Chainlink Foundation (2023). What Is Layer 2? https://chain.link/educationhub/what-is-layer-2. Accessed on August 22, 2023.

\ Chapman, J. W. (1971). Rawls’s theory of justice.

\ Chen, X., Papadimitriou, C., and Roughgarden, T. (2019). An axiomatic approach to block rewards. In Proceedings of the 1st ACM Conference on Advances in Financial Technologies, AFT ’19.

\ Chen, Y., Richter, J. I., and Patel, P. C. (2021). Decentralized governance of digital platforms. Journal of Management, 47(5).

\ City, S. (2023). Swarm city. https://swarm.city. Accessed on February 2, 2023.

\ Coin Dance (2021). Bitcoin Nodes Summary. https://coin.dance/nodes.

\ Coinbase (2021). What are miner fees and does Coinbase pay them? https: //help.coinbase.com/en/coinbase/trading-and-funding/pricingand-fees/what-are-miner-fees-and-does-coinbase-pay-them.html.

\ CoinGecko (2023). Compound Tokenomics. https://www.coingecko.com/en/ coins/compound/tokenomics. Accessed on February 2, 2023.

\ CoinMarketCap (2023). Cryptocurrency Prices by Market Cap. https:// coinmarketcap.com. Accessed on May 23, 2023.

\ CoinStaker (2018). Bitcoin CPFP Experience—Bitcoin Child Pays for Parent. https: //www.coinstaker.com/bitcoin-cpfp/.

\ Compound (2022). Compound. https://compound.finance.

\ Compound Labs, Inc. (2022a). Compound Governance. https://docs.compound. finance/governance. Accessed on Dec 10, 2022.

\ Compound Labs, Inc. (2022b). Compound Leaderboard. https://compound. finance/governance/leaderboard. Accessed on Dec 2, 2022.

\ Compound Labs, Inc. (2022c). User Distribution. https://compound.finance/ governance/comp. Accessed on Dec 10, 2022.

\ Convex (2023a). Convex Finance Proposals. https://vote.convexfinance.com/. Accessed on May 25, 2023.

\ Convex (2023b). Voting and Gauge Weights. https://docs.convexfinance.com/ convexfinance/general-information/why-convex/voting-and-gaugeweights. Accessed on May 25, 2023.

\ Curve (2022). Curve.fi. https://curve.fi.

\ Curve (2023). Curve.fi Governance. https://gov.curve.fi. Accessed on April 2, 2023.

\ Daian, P., Goldfeder, S., Kell, T., Li, Y., Zhao, X., Bentov, I., Breidenbach, L., and Juels, A. (2020). Flash boys 2.0: Frontrunning in decentralized exchanges, miner extractable value, and consensus instability. In 2020 IEEE Symposium on Security and Privacy (SP).

\ Daian, P., Kell, T., Miers, I., and Juels, A. (2018). On-Chain Vote Buying and the Rise of Dark DAOs. https://hackingdistributed.com/2018/07/02/on-chainvote-buying. Accessed on December 15, 2022.

\ David Siegel (2013). Understanding The DAO Attack. https://www.coindesk.com/ learn/understanding-the-dao-attack. Accessed on February 16, 2023.

\ Easley, D., O’Hara, M., and Basu, S. (2017). From Mining to Markets: The Evolution of Bitcoin Transaction Fees. SSRN.

\ Easley, D., O’Hara, M., and Basu, S. (2019). From mining to markets: The evolution of bitcoin transaction fees. Journal of Financial Economics.

\ Eden Network (2022). Eden Network. https://www.edennetwork.io/.

\ EigenPhi (2022). EigenPhi Crypto & DeFi Analytics. https://eigenphi.io.

\ Ekblaw, A. and Azaria, A. (2017). MedRec: Medical Data Management on the Blockchain. Viral Communications.

\ Eskandari, S., Moosavi, S., and Clark, J. (2020). Sok: Transparent dishonesty: Frontrunning attacks on blockchain. In Bracciali, A., Clark, J., Pintore, F., Rønne, P. B., and Sala, M., editors, Financial Cryptography and Data Security. Springer International Publishing.

\ Ethereum Foundation (2022a). Proof-of-Stake (PoS). https://ethereum.org/en/ developers/docs/consensus-mechanisms/pos.

\ Ethereum Foundation (2022b). The Merge. https://ethereum.org/en/upgrades/ merge.

\ Ethereum Foundation (2023a). ERC-20 token standard. https://ethereum.org/en/ developers/docs/standards/tokens/erc-20. Accessed on April 10, 2023.

\ Ethereum Foundation (2023b). ERC-721 Non-Fungible token standard. https:// ethereum.org/en/developers/docs/standards/tokens/erc-721.

\ Ethereum Foundation (2023d). Optimistic Rollups. https://ethereum.org/en/ developers/docs/scaling/optimistic-rollups. Accessed on August 23, 2023.

\ Ethermine (2022). Ethermine MEV-Relay. https://ethermine.org/mev-relay.

\ Etherscan (2023a). Etherscan apis documentation – contracts. https://docs. etherscan.io/api-endpoints/contracts. Accessed on May 25, 2023.

\ Etherscan (2023b). Etherscan (ETH) Blockchain Explorer. https://etherscan.io. Accessed on May 25, 2023.

\ Eyal, I. and Sirer, E. G. (2018). Majority is not enough: Bitcoin mining is vulnerable. Commun. ACM.

\ F2Pool (2022). Pushtx. https://www.f2pool.com/pushtx.

\ Feichtinger, R., Fritsch, R., Vonlanthen, Y., and Wattenhofer, R. (2023). The hidden shortcomings of (d)aos – an empirical study of on-chain governance.

\ Fiat, A., Karlin, A., Koutsoupias, E., and Papadimitriou, C. (2019). Energy equilibria in proof-of-work mining. In Proceedings of the 2019 ACM Conference on Economics and Computation, EC ’19.

\ Fisher, R. A. (1992). Statistical Methods for Research Workers. Springer New York.

\ Flashbots (2022a). Flashbots Blocks API. https://blocks.flashbots.net.

\ Flashbots (2022b). Flashbots Docs. https://docs.flashbots.net.

\ Flashbots (2022c). How much hashrate is currently on Flashbots Auction? https://docs.flashbots.net/flashbots-auction/searchers/ faq#how-much-hashrate-is-currently-on-flashbots-auction.

\ Francisco Rodrigues (2022). Maintaining decentralization: Are custody services a threat to DeFi protocols? https://cointelegraph.com/news/maintainingdecentralization-are-custody-services-a-threat-to-defiprotocols. Accessed on April 2, 2023.

\ Fritsch, R., Müller, M., and Wattenhofer, R. (2022). Analyzing voting power in decentralized governance: Who controls daos?

\ Gauntlet (2021). Compound proposal 40 - compound grants program. https:// compound.finance/governance/proposals/40. Accessed on May 25, 2023.

\ Gencer, A. E., Basu, S., Eyal, I., van Renesse, R., and Gün Sirer, E. (2018). Decentralization in Bitcoin and Ethereum Networks. In Financial Cryptography and Data Security 2018.

\ Gervais, A., Karame, G. O., Wüst, K., Glykantzis, V., Ritzdorf, H., and Capkun, S. (2016). On the security and performance of proof of work blockchains. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS ’16.

\ Goldreich, O. and Oren, Y. (1994). Definitions and properties of zero-knowledge proof systems. Journal of Cryptology, 7(1):1–32.

\ Goldwasser, S., Micali, S., and Rackoff, C. (2019). The knowledge complexity of interactive proof-systems. In Providing sound foundations for cryptography: On the work of shafi goldwasser and silvio micali, pages 203–225.

\ Goren, G. and Spiegelman, A. (2019). Mind the mining. In Proceedings of the 2019 ACM Conference on Economics and Computation, EC ’19.

\ Guidi, B., Michienzi, A., and Ricci, L. (2021). A graph-based socioeconomic analysis of steemit. IEEE Transactions on Computational Social Systems, 8(2).

\ Haig, S. (2022). Balancer ends long governance battle with whale. https:// thedefiant.io/balancer-ve-tokenomics-whale. Accessed on April 28, 2023.

\ Hassan, S. and De Filippi, P. (2021). Decentralized autonomous organization. Internet Policy Review, 10(2).

\ Helen Partz (2021). Second-largest Ethereum mining pool to suspend all operations. Cointelegraph.

\ Hobbes, T. (1651). Leviathan. Project Gutenberg.

\ Huberman, G., Leshno, J. D., and Moallemi, C. (2021). Monopoly without a Monopolist: An Economic Analysis of the Bitcoin Payment System. The Review of Economic Studies.

\ Huillet, M. (2020). Report: Hamas, Iran-Tied Militants Intensify Bitcoin Fundraising Action. https://cointelegraph.com/news/report-hamas-iran-tiedmilitants-intensify-bitcoin-fundraising-action. Accessed on August 2, 2023.

\ Jeff Kauflin and Emily Mason (2022). How Did Sam Bankman-Fried’s Alameda Research Lose So Much Money? https://www.forbes.com/sites/jeffkauflin/ 2022/11/19/how-did-sam-bankman-frieds-alameda-research-loseso-much-money. Accessed on December 2, 2022.

\ Jota Missias (2021). Jota Missias. https://pt.wikipedia.org/wiki/Jota_ Missias.

\ Judmayer, A., Zamyatin, A., Stifter, N., Voyiatzis, A. G., and Weippl, E. (2017). Merged mining: Curse or cure? In Data Privacy Management, Cryptocurrencies and Blockchain Technology.

\ Karame, G. (2016). On the security and scalability of bitcoin’s blockchain. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS ’16.

\ Kelkar, M., Zhang, F., Goldfeder, S., and Juels, A. (2020). Order-fairness for byzantine consensus. In Micciancio, D. and Ristenpart, T., editors, Advances in Cryptology – CRYPTO 2020, pages 451–480, Cham. Springer International Publishing.

\ Kharif, O. (2017). Cryptokitties mania overwhelms ethereum network’s processing. https://www.bloomberg.com/news/articles/2017-12-04/ cryptokitties-quickly-becomes-most-widely-used-ethereum-app.

\ Kiayias, A., Koutsoupias, E., Kyropoulou, M., and Tselekounis, Y. (2016). Blockchain mining games. In Proceedings of the 2016 ACM Conference on Economics and Computation, EC ’16.

\ Kiayias, A. and Lazos, P. (2023). Sok: Blockchain governance.

\ Kiffer, L., Levin, D., and Mislove, A. (2017). Stick a fork in it: Analyzing the ethereum network partition. In Proceedings of the 16th ACM Workshop on Hot Topics in Networks, pages 94–100.

\ Kursawe, K. (2020). Wendy, the good little fairness widget: Achieving order fairness for blockchains. In Proceedings of the 2nd ACM Conference on Advances in Financial Technologies, AFT ’20.

\ kybx86 (2020). Compensation proposal: Distribute comp to affected users in the dai liquidations. https://www.comp.xyz/t/compensation-proposal-distributecomp-to-affected-users-in-the-dai-liquidations. Accessed on February 9, 2023.

\ Labs, C. (2020). Compound proposal 7 - distribute comp to users. https://compound. finance/governance/proposals/7. Accessed on May 22, 2023.

\ Labs, C. (2021). Compound proposal 42 - migration to governor bravo. https:// compound.finance/governance/proposals/42. Accessed on May 22, 2023.

\ Labs, P. (2023a). Ipfs powers the distributed web. https://ipfs.tech. Accessed on February 2, 2023.

\ Labs, S. (2023b). Snapshot. https://snapshot.org. Accessed on February 2, 2023.

\ Lalley, S. P. and Weyl, E. G. (2018). Quadratic voting: How mechanism design can radicalize democracy. AEA Papers and Proceedings, 108.

\ Lavi, R., Sattath, O., and Zohar, A. (2019). Redesigning bitcoin’s fee market. In The World Wide Web Conference, WWW ’19.

\ Lee Mathews (2017). How WannaCry Went From A Windows Bug To An International Incident. https://www.forbes.com/sites/leemathews/2017/05/ 16/wannacry-ransomware-ms17-010.

\ Leshner, R. and Hayes, G. (2019). Compound: The money market protocol.

\ Lev-Ari, K., Spiegelman, A., Keidar, I., and Malkhi, D. (2020). Fairledger: A fair blockchain protocol for financial institutions. In 23rd International Conference on Principles of Distributed Systems (OPODIS 2019). Schloss Dagstuhl-Leibniz-Zentrum für Informatik.

\ Li, J., Yuan, Y., Wang, S., and Wang, F.-Y. (2018). Transaction queuing game in bitcoin blockchain. In 2018 IEEE Intelligent Vehicles Symposium (IV).

\ Liu, C., Liu, H., Cao, Z., Chen, Z., Chen, B., and Roscoe, B. (2018). Reguard: Finding reentrancy bugs in smart contracts. In Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, ICSE ’18.

\ Liu, F., Wang, X., Li, Z., Xu, J., and Gao, Y. (2020). Effective gasprice prediction for carrying out economical ethereum transaction. In 2019 6th International Conference on Dependable Systems and Their Applications (DSA), pages 329–334.

\ Liu, Z., Li, Y., Min, Q., and Chang, M. (2022). User incentive mechanism in blockchainbased online community: An empirical study of steemit. Information & Management, 59(7).

\ Loewen, T. (2021a). Compound proposal 62 - split comp rewards distribution and bug fixes. https://compound.finance/governance/proposals/62. Accessed on May 16, 2023.

\ Loewen, T. (2021b). Compound proposal 64 - fix comp accrual bug. https:// compound.finance/governance/proposals/64. Accessed on May 16, 2023.

\ Lombrozo, E., Lau, J., and Wuille, P. (2015). BIP-141: Segregated Witness (Consensus layer). https://github.com/bitcoin/bips/blob/master/bip-0141. mediawiki. Accessed on May 26, 2023.

\ Luu, L., Velner, Y., Teutsch, J., and Saxena, P. (2017). Smartpool: Practical decentralized pooled mining. In 26th USENIX Security Symposium (USENIX Security 17).

\ MakerDAO (2023). Governance Module – Maker Protocol Technical Docs. https:// docs.makerdao.com/smart-contract-modules/governance-module. Accessed on April 2, 2023.

\ Mars, R., Abid, A., Cheikhrouhou, S., and Kallel, S. (2021). A machine learning approach for gas price prediction in ethereum blockchain. In 2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC), pages 156–165.

\ Martin Ruubel (2018). World’s First Blockchain Platform for Marine Insurance Now in Commercial Use. https://guardtime.com/blog/world-s-firstblockchain-platform-for-marine-insurance-now-in-commercialuse.

\ Matter Labs (2023). zkSync Era basics. https://era.zksync.io/docs/ reference/concepts/zkSync.html. Accessed on August 22, 2023.

\ McCorry, P., Shahandashti, S. F., and Hao, F. (2017). A smart contract for boardroom voting with maximum voter privacy. In Financial Cryptography and Data Security, FC ’17

\ Messari (2023). Messati: Crypto research, data, and tools. https://messari.io. Accessed on May 16, 2023.

\ Messias, J. (2023a). Data sets and scripts used to analyze governance protocols in the Ethereum blockchains. https://github.com/johnnatan-messias/ blockchain-governance.

\ Messias, J. (2023b). Data sets and scripts used to analyze the contention and prioritization transparency in both Bitcoin and Ethereum blockchains. https://github.com/ johnnatan-messias/blockchain-transaction-ordering.

\ Messias, J., Alzayat, M., Chandrasekaran, B., and Gummadi, K. P. (2020). On blockchain commit times: An analysis of how miners choose bitcoin transactions. In KDD Workshop on Smart Data for Blockchain and Distributed Ledger, SDBD ’20.

\ Messias, J., Alzayat, M., Chandrasekaran, B., Gummadi, K. P., Loiseau, P., and Mislove, A. (2021). Selfish & opaque transaction ordering in the bitcoin blockchain: The case for chain neutrality. In Proceedings of the 21st ACM Internet Measurement Conference, IMC ’21, page 320–335, New York, NY, USA. Association for Computing Machinery.

\ Messias, J., Pahari, V., Chandrasekaran, B., Gummadi, K. P., and Loiseau, P. (2023a). Dissecting Bitcoin and Ethereum Transactions: On the Lack of Transaction Contention and Prioritization Transparency in Blockchains. In Proceedings of the Financial Cryptography and Data Security (FC’23).

\ Messias, J., Pahari, V., Chandrasekaran, B., Gummadi, K. P., and Loiseau, P. (2023b). Understanding blockchain governance: Analyzing decentralized voting to amend defi smart contracts.

\ Mike Dalton (2022). Build Finance DAO Suffers Governance Takeover Attack. https://cryptobriefing.com/build-finance-dao-suffersgovernance-takeover-attack. Accessed on February 2, 2023.

\ Mosteller, F. and Fisher, R. A. (1948). Questions and answers. The American Statistician.

\ Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System.

\ Nick Martitsch (2021). Compound Treasury Updates, COMP Bug Fix, Dynamic Risk Parameters. https://compound.substack.com/p/compoundtreasury-updates-comp-bug. Accessed on April 10, 2023.

\ Nikhilesh De (2021). US Treasury Blacklists Bitcoin, Litecoin Addresses of Chinese ‘Drug Kingpins’. https://www.coindesk.com/markets/2019/08/21/ustreasury-blacklists-bitcoin-litecoin-addresses-of-chinesedrug-kingpins/.

\ Noda, S., Okumura, K., and Hashimoto, Y. (2020). An economic analysis of difficulty adjustment algorithms in proof-of-work blockchain systems. In Proceedings of the 21st ACM Conference on Economics and Computation, EC ’20.

\ Offchain Labs (2023). A gentle introduction to Arbitrum. https://docs.arbitrum. io/intro. Accessed on August 22, 2023.

\ Omni Layer (2020). Omni Protocol Specification. https://github.com/OmniLayer/ spec/blob/master/OmniSpecification.adoc. Accessed on August 3, 2023.

\ Omni Layer (2023). Omni Layer: An open-source, fully-decentralized asset platform on the Bitcoin Blockchain. https://www.omnilayer.org. Accessed on August 1, 2023.

\ OpenZeppelin (2023). Security audits - compound. https://blog.openzeppelin. com/?s=compound. Accessed on May 22, 2023.

\ Optimism Foundation (2023). Optimism. https://www.optimism.io. Accessed on August 22, 2023.

\ Orda, A. and Rottenstreich, O. (2019). Enforcing fairness in blockchain transaction ordering. In 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC).

\ Pass, R., Seeman, L., and Shelat, A. (2017). Analysis of the blockchain protocol in asynchronous networks. In Advances in Cryptology – EUROCRYPT 2017.

\ Pass, R. and Shi, E. (2017). Fruitchains: A fair blockchain. In Proceedings of the ACM Symposium on Principles of Distributed Computing, PODC ’17.

\ Paul R. La Monica (2019). Bitcoin’s march to $10,000 propelled by Facebook and the Fed. https://edition.cnn.com/2019/06/21/investing/bitcoinprice-increase/.

\ Perez, D., Werner, S. M., Xu, J., and Livshits, B. (2021). Liquidations: Defi on a knife-edge. In Financial Cryptography and Data Security, FC ’21.

\ Philipp Schmidt (2015). Certificates, Reputation, and the Blockchain. https: //medium.com/mit-media-lab/certificates-reputation-and-theblockchain-aee03622426f.

\ Pilkington, M. (2016). Blockchain Technology: Principles and Applications. In Research handbook on digital transformations. Available at SSRN: https://ssrn.com/abstract=2662660.

\ Poolin (2022). Transaction Accelerator. https://pushtx.com.

\ Provenance (2015). Blockchain: the solution for transparency in product supply chains. https://www.provenance.org/whitepaper.

\ Qin, K., Zhou, L., and Gervais, A. (2022). Quantifying blockchain extractable value: How dark is the forest? In 2022 IEEE Symposium on Security and Privacy (SP).

\ Qin, K., Zhou, L., Livshits, B., and Gervais, A. (2021). Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit. In Financial Cryptography and Data Security, FC ’21.

\ Reijers, W., O’Brolcháin, F., and Haynes, P. (2016). Governance in blockchain technologies & social contract theories. Ledger, 1.

\ Research, A. (2020a). Compound proposal 13 - set wbtc collateral factor to 65%. https: //compound.finance/governance/proposals/13. Accessed on May 22, 2023.

\ Research, A. (2020b). Compound proposal 14 - set wbtc collateral factor to 65%. https: //compound.finance/governance/proposals/14. Accessed on May 22, 2023.

\ Research, A. (2020c). Compound proposal 16 - set wbtc collateral factor to 40%. https: //compound.finance/governance/proposals/16. Accessed on May 22, 2023.

\ Rikken, O., Janssen, M., and Kwee, Z. (2019). Governance challenges of blockchain and decentralized autonomous organizations. Information Polity, 24(4).

\ Robert Hackett (2017). Walmart and 9 Food Giants Team Up on IBM Blockchain Plans. http://fortune.com/2017/08/22/walmart-blockchainibm-food-nestle-unilever-tyson-dole.

\ Romiti, M., Judmayer, A., Zamyatin, A., and Haslhofer, B. (2019). A deep dive into bitcoin mining pools: An empirical analysis of mining shares.

\ Roughgarden, T. (2021). Transaction fee mechanism design for the ethereum blockchain: An economic analysis of eip-1559. In Proceedings of the 2021 ACM Conference on Economics and Computation, EC ’21.

\ Rousseau, J.-J. (1920). The social contract: & discourses. Number 660. JM Dent & Sons.

\ Sam Kessler (2022). Binance Becomes Second-Largest Voting Entity on Uniswap DAO. https://www.coindesk.com/tech/2022/10/19/binance-becomessecond-largest-voting-entity-on-uniswap-dao. Accessed on April 2, 2023.

\ Sasson, E. B., Chiesa, A., Garman, C., Green, M., Miers, I., Tromer, E., and Virza, M. (2014). Zerocash: Decentralized anonymous payments from bitcoin. In 2014 IEEE symposium on security and privacy. IEEE.

\ Scam Alert (2020). Scam Alert - Cryptocurrency Crime Fighters. https://scamalert.io. Accessed on March 19, 2020.

\ Scikit Learn (2023). Cosine Similarity. https://scikit-learn.org/stable/ modules/generated/sklearn.metrics.pairwise.cosine_similarity. html. Accessed on April 10, 2023.

\ Sharma, T., Kwon, Y., Pongmala, K., Wang, H., Miller, A., Song, D., and Wang, Y. (2023). Unpacking how decentralized autonomous organizations (daos) work in practice.

\ Shaurya Malwa (2022). Binance Denies Allegations It Intends to Use Users’ Uniswap Tokens for Voting. https://www.coindesk.com/tech/2022/10/20/binancedenies-allegations-that-it-intends-to-use-users-uniswaptokens-for-voting.

\ Sheera Frenkel and Nathaniel Popper and Kate Conger and David E. Sanger (2020). A Brazen Online Attack Targets V.I.P. Twitter Users in a Bitcoin Scam. https://www.nytimes.com/2020/07/15/technology/twitterhack-bill-gates-elon-musk.html.

\ Sheera Frenkel, Mark Scott and Paul Mozur (2017). Mystery of Motive for a Ransomware Attack: Money, Mayhem or a Message? https: //www.nytimes.com/2017/06/28/business/ramsonware-hackerscybersecurity-petya-impact.html.

\ Siddiqui, S., Vanahalli, G., and Gujar, S. (2020). Bitcoinf: Achieving fairness for bitcoin in transaction fee only model. In Proceedings of the 19th International Conference on Autonomous Agents and MultiAgent Systems, AAMAS ’20.

\ Solidity Team (2023). Solidity programming language. https://soliditylang.org. Accessed on January 18, 2023.

\ Sompolinsky, Y. and Zohar, A. (2015). Secure high-rate transaction processing in bitcoin. In Financial Cryptography and Data Security, FC ’15.

\ SparkPool (2021). Taichi Network. https://taichi.network.

\ Strehle, E. and Ante, L. (2020). Exclusive mining of blockchain transactions. In In Scientific Reports 2020-Conference proceedings of the Scientific Track of the Blockchain Autumn School 2020.

\ Sukernik (2021). Auditing Compound Protocol. https://www.comp.xyz/t/ auditing-compound-protocol/2543. Accessed on April 10, 2023.

\ SushiSwap (2022). Decentralized Exchange Made For Everybody. https://www. sushi.com.

\ Sybil (2023a). Introducing Sybil. https://blog.uniswap.org/sybil. Accessed on May 19, 2023.

\ Sybil (2023b). Sybil – Top delegated addresses. https://sybil.org. Accessed on February 2, 2023.

\ team, T. T. (2022). Compound proposal 84 - trueusd market upgrades. https:// compound.finance/governance/proposals/84. Accessed on February 2, 2023.

\ Tether (2023). Tether USDT token. https://tether.to/en. Accessed on August 2, 2023.

\ Thurman, A. (2022). Tron’s justin sun accused of ‘governance attack’ on defi lender compound. https://www.coindesk.com/tech/2022/02/04/trons-justinsun-accused-of-governance-attack-on-defi-lender-compound. Accessed on February 2, 2023.

\ Torres, C. F., Camino, R., and State, R. (2021). Frontrunner jones and the raiders of the dark forest: An empirical study of frontrunning on the ethereum blockchain. In 30th USENIX Security Symposium.

\ TrueUSD (2023). Trueusd. https://www.trueusd.com. Accessed on February 2, 2023.

\ Tsabary, I. and Eyal, I. (2018). The gap game. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS ’18.

\ Turksonmez, K., Furtak, M., Wittie, M. P., and Millman, D. L. (2021). Two ways gas price oracles miss the mark. In 2021 IEEE International Conference on Omni-Layer Intelligent Systems (COINS), pages 1–7.

\ Uniswap (2022). Uniswap Protocol. https://uniswap.org.

\ Uniswap (2023). Uniswap Decentralized Trading Protocol. https://uniswap.org. Accessed on May 23, 2023.

\ Uniswap Labs (2023). Governance – Uniswap Protocol. https://uniswap.org/ governance. Accessed on April 2, 2023.

\ Van Saberhagen, N. (2013). Cryptonote v2.0.

\ Vasek, M., Thornton, M., and Moore, T. (2014). Empirical analysis of denial-of-service attacks in the bitcoin ecosystem. In Financial Cryptography and Data Security, FC ’14.

\ ViaBTC (2022). Transaction Accelerator. https://www.viabtc.com/tools/ txaccelerator.

\ web3.py team, T. (2022). Web3.py documentation. https://web3py.readthedocs. io/en/v5. Accessed on December 12, 2022.

\ Weintraub, B., Torres, C. F., Nita-Rotaru, C., and State, R. (2022). A Flash(bot) in the Pan: Measuring Maximal Extractable Value in Private Pools. In Proceedings of the ACM Internet Measurement Conference (IMC’22).

\ Whale Alert (2021). Scam Alert - Cryptocurrency Crime Fighters. https://scamalert.io.

\ Wood, G. (2016). Polkadot: Vision for a heterogeneous multi-chain framework.

\ Wood, G. et al. (2014). Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper.

\ Xia, P., Zhang, L., and Li, F. (2015). Learning similarity with cosine similarity ensemble. Information sciences, 307.

\ Yahoo Finance (2023a). Ethereum USD (BTC-USD), Price, Value, News, and History. https://finance.yahoo.com/quote/BTC-USD/history?p=BTC-USD. Accessed on August 3, 2023.

\ Yahoo Finance (2023b). Ethereum USD (ETH-USD), Price, Value, News, and History. https://finance.yahoo.com/quote/ETH-USD/history?p=ETH-USD. Accessed on January 17, 2023.

\ Zack Voell and William Foxley (2020a). https://www.coindesk.com/markets/ 2020/09/04/alameda-research-claimed-nearly-70-of-wrappedbitcoin-minted-in-august. Accessed on April 10, 2023.

\ Zack Voell and William Foxley (2020b). Alameda Research Claimed Nearly 70% of Wrapped Bitcoin Minted in August. https://www.coindesk.com/markets/ 2020/09/04/alameda-research-claimed-nearly-70-of-wrappedbitcoin-minted-in-august.

\ Zhang, R. and Preneel, B. (2019). Lay down the common metrics: Evaluating proof-ofwork consensus protocols’ security. In 2019 IEEE Symposium on Security and Privacy (SP).

\ Zhou, L., Qin, K., Torres, C. F., Le, D. V., and Gervais, A. (2021). High-frequency trading on decentralized on-chain exchanges. In 2021 IEEE Symposium on Security and Privacy (SP), pages 428–445.

\ Zhou, L., Xiong, X., Ernstberger, J., Chaliasos, S., Wang, Z., Wang, Y., Qin, K., Wattenhofer, R., Song, D., and Gervais, A. (2023). Sok: Decentralized finance (defi) attacks. In 2023 IEEE Symposium on Security and Privacy (SP).

\ Zwitter, A. and Hazenberg, J. (2020). Decentralized network governance: blockchain technology and the future of regulation. Frontiers in Blockchain, 3.

\

:::info Author:

(1) Johnnatan Messias Peixoto Afonso

:::


:::info This paper is available on arxiv under CC BY 4.0 DEED license.

:::

\

What Happens When You Pay to Speed Up a Crypto Transaction?

2025-05-09 22:00:08

Table of Links

Abstract/Zusammenfassung

Publications

Acknowledgements

CHAPTER 1: INTRODUCTION

  1. Introduction

    1.1 Overview of thesis contributions

    1.2 Thesis outline

CHAPTER 2: BACKGROUND

2.1 Blockchains & smart contracts

2.2 Transaction prioritization norms

2.3 Transaction prioritization and contention transparency

2.4 Decentralized governance

2.5 Blockchain Scalability with Layer 2.0 Solutions

CHAPTER 3. TRANSACTION PRIORITIZATION NORMS

  1. Transaction Prioritization Norms

    3.1 Methodology

    3.2 Analyzing norm adherence

    3.3 Investigating norm violations

    3.4 Dark-fee transactions

    3.5 Concluding remarks

CHAPTER 4. TRANSACTION PRIORITIZATION AND CONTENTION TRANSPARENCY

  1. Transaction Prioritization and Contention Transparency

    4.1 Methodology

    4.2 On contention transparency

    4.3 On prioritization transparency

    4.4 Concluding remarks

CHAPTER 5. DECENTRALIZED GOVERNANCE

  1. Decentralized Governance

    5.1 Methodology

    5.2 Attacks on governance

    5.3 Compound’s governance

    5.4 Concluding remarks

CHAPTER 6. RELATED WORK

6.1 Transaction prioritization norms

6.2 Transaction prioritization and contention transparency

6.3 Decentralized governance

CHAPTER 7. DISCUSSION, LIMITATIONS & FUTURE WORK

7.1 Transaction ordering

7.2 Transaction transparency

7.3 Voting power distribution to amend smart contracts

Conclusion

\ Appendices

APPENDIX A: Additional Analysis of Transactions Prioritization Norms

APPENDIX B: Additional analysis of transactions prioritization and contention transparency

APPENDIX C: Additional Analysis of Distribution of Voting Power

Bibliography

APPENDIX B: Additional analysis of transactions prioritization and contention transparency

B.1 Ethereum private transaction experiment

We conducted 4 active experiments where we issued 8 Ethereum transactions; half issued publicly and the other half privately through a private-channel network known as Taichi Network (SparkPool, 2021). Table B.1 summarizes the transactions in our experiment. Spark Pool and Babel Pool included all private transactions (2 transactions each) sent directly to these miners through Taichi Network.

B.2 Liquidation with Chainlink oracle updates

In AAVE, of 1154 bundles, 994 (86.14%) include one Chainlink oracle update followed by a liquidation. There are 52 (4.51%) with two oracle updates followed by liquidations. Out of 1301 oracle updates bundled with liquidations, 282 (21.68%) are USDC-ETH, 203 (15.60%) are USDT-ETH, 169 (12.99%) are DAI-ETH, 70 (5.38%) are SUSD-ETH, and 60 (4.61%) are LINK-ETH. In Compound, of 641 bundles, 548 (85.49%) contain one Chainlink oracle update followed by one liquidation, while 39 (6.08%) include two oracle updates followed by liquidations. Out of 751 oracle updates bundled with liquidations, 311 (41.41%) are ETH-USD, 128 (17.04%) are BTC-USD, and 53 (7.06%) are UNI-USD.

\ Table B.1: We conducted 4 active experiments in Ethereum by simultaneously accelerating transactions privately and publicly via Taichi Network. Private transactions were included only by Spark Pool and Babel Pool. If we rank these mining pools according to their hash-rate, they account for 27.72% of the total Ethereum hash-rate.

\ Figure B.1: Monthly Bitcoin hash rate over the 3-year period.

B.3 Hashing rates of mining pools

Per Figure B.1, the hash rates of Bitcoin mining pools such as BTC.com, F2Pool, and AntPool alone accounted for almost half the total hash rate of the network around May 2018, and roughly a year later, i.e., from March 2019, together with Poolin the four mining pools alone represent more than 50% of the total network hash rate. At the end of 2020, new MPOs, e.g., Lubian.com and Binance Pool, started mining Bitcoin, which help improve the decentralization of Bitcoin. However, BTC.com, F2Pool, AntPool, and Poolin still account for almost half of the hash rates showing that a few mining pools control a considerable portion of the Bitcoin hash rate.

\ Hash rates of Ethereum mining pools, in contrast to Bitcoin, do not show a high variance (see Figure B.2). We also observed that Spark Pool, the second-largest Ethereum mining pool, suspended their mining services on September 30, 2021, due to regulatory requirements in response to Chinese authorities (Helen Partz, 2021).

\ Figure B.2: Weekly Ethereum hash rate from Sept 8th, 2021, to Jun 30th, 2022.

\ Table B.2: We conduct 10 transaction acceleration experiments in Bitcoin. If we rank the miners whose included these transactions based on their daily hash-rate power as (D) and weekly hash-rate power as (W), together these mining pools corresponds to a hash-rate power of (D: 55.2%; W: 56%).

B.4 Bitcoin transaction acceleration experiment

We ran an active Bitcoin transaction acceleration experiment where we paid 205 EUR to ViaBTC (ViaBTC, 2022) to accelerated 10 transactions from 10 different snapshots of our Mempool. To select these transactions, we checked whether the Mempool was congested (i.e., having more transactions waiting for inclusion than the next block would be able to include), with its size being at least 8 MB. Then, we considered only transactions with low fee rates—less than or equal to 2 sat-per-byte—to ensure that these transactions would be highly unlikely to be included soon in a subsequent block. Next, we sorted the remaining transactions by size to limit the experiment cost as the acceleration-service costs grow proportional to the transaction size. Finally, we select the transaction with the smallest size in bytes for our active experiment.

\ Most of these 10 accelerated transactions were included nearly in the next block, demonstrating the acceleration efficiency. Also, these transactions were wrongly positioned in the block: They appeared, for instance, at the top of the block, i.e., higher

\ Figure B.3: Active vs. others experiment: Bitcoin mining pools in the active experiment (i.e., mining pools that included transactions accelerated by ourselves) increased their hash rate in 2020. Together, they accounted for more than 55% of the overall hash rate. The plot shows the weekly average percentage of the mining pool’s hash-rate over 3 years.

\ than the non-accelerated transactions, showing that miners indeed prioritized them (see Table 4.3). Further, we observed that although we had only accelerated transactions via ViaBTC, other top mining pools were also involved in confirming the accelerated transactions.

\ Table B.2 shows the transactions used in our experiments. At the time we conducted our experiments, if we rank the miners whose included these transactions based on their daily hash-rate power as (D) and weekly hash-rate power as (W), we would have Huobi (D: 8.1%; W: 9.3%), Binance (D: 9.6%; W: 10.3%), F2Pool (D: 19.9%; W: 18.7%), AntPool (D: 12.5%; W: 10.6%), ViaBTC (D: 5.1%; W: 7.1%). Together these mining pools corresponds to a hash-rate power of (D: 55.2%; W: 56%). Figures B.3 and B.4 show the hash-rate of mining pools in the active experiment and considering the passive experiment (inferred to be accelerated by BTC.com API), respectively.

\ Furthermore, BTC.com (BTC.com, 2022), one of the leading Bitcoin mining pools, provides transaction acceleration services and allows users to verify if transactions have been accelerated through their platform or partner services. From our dataset, we selected those with a SPPE greater than or equal to 1% (12,983,282 transactions in total) and checked if they were said to be accelerated by BTC.com’s API. Of these transactions, 14,104 were found to have been accelerated. Our findings also show that transaction acceleration services are becoming quite common among Bitcoin mining pools (as shown in Figure B.5). Between 2018 and April 2019, only BTC.com and F2Pool alone accounted for most of the accelerated transactions. However, as of December 2020, we see that BTC.com accounts for a very small fraction of accelerated transactions, with AntPool, Huobi, and F2Pool accounting for most of the accelerated transactions.

\ Figure B.4: Passive + active vs. others experiment: Bitcoin mining pools in the active experiment (i.e., mining pools that included transactions accelerated by ourselves) and passive experiment (mining pools that included transactions inferred to be accelerated using the BTC.com API) increased their hash rate in 2020. The plot shows the weekly average percentage of the mining pool’s hash-rate over 3 years.

\ Figure B.5: The plot shows the monthly average percentage of accelerated Bitcoin transactions inclusion by each mining pool over 3 years. Transaction acceleration services or simply Front-running as a Services (FRaaS) are becoming popular across all mining pools.

\

:::info Author:

(1) Johnnatan Messias Peixoto Afonso

:::


:::info This paper is available on arxiv under CC BY 4.0 DEED license.

:::

\

What Happens When Blockchain Miners Cheat the System

2025-05-09 21:00:02

Table of Links

Abstract/Zusammenfassung

Publications

Acknowledgements

CHAPTER 1: INTRODUCTION

  1. Introduction

    1.1 Overview of thesis contributions

    1.2 Thesis outline

CHAPTER 2: BACKGROUND

2.1 Blockchains & smart contracts

2.2 Transaction prioritization norms

2.3 Transaction prioritization and contention transparency

2.4 Decentralized governance

2.5 Blockchain Scalability with Layer 2.0 Solutions

CHAPTER 3. TRANSACTION PRIORITIZATION NORMS

  1. Transaction Prioritization Norms

    3.1 Methodology

    3.2 Analyzing norm adherence

    3.3 Investigating norm violations

    3.4 Dark-fee transactions

    3.5 Concluding remarks

CHAPTER 4. TRANSACTION PRIORITIZATION AND CONTENTION TRANSPARENCY

  1. Transaction Prioritization and Contention Transparency

    4.1 Methodology

    4.2 On contention transparency

    4.3 On prioritization transparency

    4.4 Concluding remarks

CHAPTER 5. DECENTRALIZED GOVERNANCE

  1. Decentralized Governance

    5.1 Methodology

    5.2 Attacks on governance

    5.3 Compound’s governance

    5.4 Concluding remarks

CHAPTER 6. RELATED WORK

6.1 Transaction prioritization norms

6.2 Transaction prioritization and contention transparency

6.3 Decentralized governance

CHAPTER 7. DISCUSSION, LIMITATIONS & FUTURE WORK

7.1 Transaction ordering

7.2 Transaction transparency

7.3 Voting power distribution to amend smart contracts

Conclusion

\ Appendices

APPENDIX A: Additional Analysis of Transactions Prioritization Norms

APPENDIX B: Additional analysis of transactions prioritization and contention transparency

APPENDIX C: Additional Analysis of Distribution of Voting Power

Bibliography

Conclusion

In this thesis, we adopted a data-driven approach to examine fairness within blockchain contexts, focusing on three key aspects: (i) Fairness in ordering; (ii) Fairness in transparency; and (iii) Fairness in voting power to amend smart contract applications.

\ Our findings reveal a discrepancy between assumed prioritization norms and actual practices within the blockchain community. In particular, miners often deviate from these norms by prioritizing transactions that serve their own interests or friendly miners. This contradicts the principle of exclusively fee-based prioritization.

\ Through active experiments, we have uncovered instances of miner collusion involving dark-fee transactions. These transactions provide miners with off-chain incentives in a non-transparent manner, contributing to a lack of transparency in the ecosystem. These fees are kept private between the miner and the issuer of a particular transaction, even after the transaction is confirmed on the blockchain. This exacerbates the challenge of accurately estimating fees. As a result, transaction issuers struggle to determine appropriate fees because they do not have a complete view of all transaction fees being offered.

\ In addition, blockchain applications, or smart contracts, are often amended by governance protocols. These protocols aim to distribute decision-making power among participants. However, we show that the concentration of voting power based on token ownership skews the dynamics of decision-making. A small subset of participants with a significant token stake wields disproportionate influence, allowing them to shape proposals and votes in line with their self-interest. This practice undermines the true decentralization of decision-making power in the blockchain ecosystem.

\ We believe that our findings provide valuable insights for designing new and more fair blockchains. Additionally, to ensure the reproducibility of our results, we have made the code and data sets used in this thesis publicly available (Messias, 2023a,b).

APPENDIX A: Additional Analysis of Transactions Prioritization Norms

A.1 Congestion in Mempool of data set B

Congestion in Mempool is typical not only in A (as discussed in §3.2.1), but also in B. Indeed, Figure A.1 reveals a huge variance in Mempool congestion, much higher than that observed in A. Mempool size fluctuations in B are, for instance, approximately three times higher than that in A (with the size of unconfirmed transactions at one point in time exceeding almost 50 times the maximum block size). Around June 22nd, there was a surge in Bitcoin price following the announcements of Facebook’s Libra[21] and another surge around June 25th after the news of US dollar depreciation (Paul R. La Monica, 2019). These price surges significantly increased the number of transaction issued, which in turn introduced delays. As a consequence, at times, Mempool in B takes much longer duration than in A to be drained of all transactions.

A.2 Significance of transaction fees

Table A.1 shows the contribution of transaction fees towards miners’ revenue across all blocks mined from 2016 to 2020. In 2018, fees accounted for an average of 3.19% of miners’ total revenue per block; in 2019 and 2020 were 2.75% and 6.29%, respectively. However, if we consider only blocks mined from May 2020 (i.e., blocks with a mining reward of 6.25 BTC), the fees account for, on average, 8.90% with an std. of 6.54% in total. Therefore, revenue from transaction fees is increasing (Easley et al., 2017), and it tends to continue.

\ Figure A.1: Mempool size from B as a function of time.

\ Table A.1: Miners’ relative revenue from transaction fees (expressed as a percentage of the total revenue) across all blocks mined from 2016 until the end of 2020.

A.3 Transaction fee rates across mining pools

A.4 On fee rates and congestion

In Figure A.3, we show the fee rates of transactions observed in 4 different bins or congestion levels in data set B. Each bin in the plot corresponds to a specific level of congestion identified by the Mempool size: lower than 1 MB (no congestion), in (1, 2] MB (lowest congestion), in (2, 4] MB, and higher than 4 MB (highest congestion). Fee rates at high congestion levels are strictly higher (in distribution, and hence also on average)

\ Figure A.2: Distributions of fee rates for transactions committed by the top-5 mining pools in data set A.

\ Figure A.3: Distribution of fee rates for transactions in data set B issued at different congestion levels clearly indicate that users incentivize miners through transaction fees.

\ than those at low congestion levels. Users, therefore, increase transaction fees to mitigate the delays incurred during congestion.

\

\ Figure A.4: Distributions of transaction-commit delays in data set B for different transaction fee rates.

\ Figure A.5: Distribution of blocks mined and transactions confirmed by different MPOs during the Twitter Scam attack from July 14th to August 9th, 2020.

A.5 Child-Pays-For-Parent (CPFP) Transactions

\ Figure A.6: Fee price comparison between the transaction fee and the acceleration services from an snapshot of our Mempool on November 24th, 2020. Acceleration service provided by BTC.com is on average 566.3 times higher (4734.67 of std.) and on median 116.64 times higher than the Bitcoin transaction fees. The minimum is 0.54, the 25-perc is 51.64, and the 75-perc and the maximum are 351.8 and 428,800, respectively.

A.6 Miners’ behavior during the scam

To examine the miners’ behavior during the Twitter scam attack from July 14th to August 9 th, 2020, we selected all blocks mined (3697 in total, containing 8,318,621 issued transactions) during this time period from our data set C. If we rank the MPOs responsible for these blocks by the number of blocks (B) mined (or, essentially, the approximate hashing capacity h), the top five MPOs (refer Figure A.5) turn out to be Poolin (B: 565; h: 15.28%), F2Pool (B: 536; h: 14.5%), BTC.com (B: 424; h: 11.47%), AntPool (B: 404; h: 10.93%), and Huobi (B: 353; h: 9.55%)

A.7 Transaction-acceleration fees

In this experiment, we compare the transaction-acceleration fee with the typical transaction fees in Bitcoin. To this end, we retrieved a snapshot containing 26,332 unconfirmed transactions from our node’s Mempool on November 24th 2020 at 10:08:41 UTC. Then, for each transaction, we searched its respective transaction accelerator price (or acceleration fee) via the acceleration service provided by BTC.com (BTC.com, 2022). We inferred the acceleration fees for 23,341 (88.64%) out of the 26,332 unconfirmed transactions. Figure A.6 shows the CDF of both the Bitcoin transaction fees and the acceleration fees provided by BTC.com. Acceleration fee is on average 566.3 times higher (4734.67 of std.) and on median 116.64 times higher than the Bitcoin transaction fees. At the time of this experiment, 1 BTC was worth 18,875.10 USD.

\

:::info Author:

(1) Johnnatan Messias Peixoto Afonso

:::


:::info This paper is available on arxiv under CC BY 4.0 DEED license.

:::

[21] On June 18th, Facebook announced its cryptocurrency, Libra, which was later renamed to Diem. https://www.diem.com