<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:media="http://search.yahoo.com/mrss/"><channel><title><![CDATA[Insights on credit]]></title><description><![CDATA[Stay updated on all things Sprinter. Explore industry insights, trends, and the future of onchain credit.]]></description><link>http://blog.sprinter.tech/</link><image><url>http://blog.sprinter.tech/favicon.png</url><title>Insights on credit</title><link>http://blog.sprinter.tech/</link></image><generator>Ghost 5.69</generator><lastBuildDate>Fri, 01 May 2026 22:12:10 GMT</lastBuildDate><atom:link href="http://blog.sprinter.tech/rss/" rel="self" type="application/rss+xml"/><ttl>60</ttl><item><title><![CDATA[Credit runs on Sprinter]]></title><description><![CDATA[Say hello to a new Sprinter, enhanced from the ground up with new infrastructure, a new identity, and a new level of ambition.]]></description><link>http://blog.sprinter.tech/credit-runs-on-sprinter/</link><guid isPermaLink="false">69aeb9804a37d30b099c9e7c</guid><category><![CDATA[Announcements]]></category><category><![CDATA[credit]]></category><category><![CDATA[DeFi]]></category><category><![CDATA[sprinter]]></category><category><![CDATA[liquidity]]></category><category><![CDATA[ethereum]]></category><dc:creator><![CDATA[Helena Flack]]></dc:creator><pubDate>Mon, 09 Mar 2026 14:50:02 GMT</pubDate><media:content url="http://blog.sprinter.tech/content/images/2026/03/blogpost.png" medium="image"/><content:encoded><![CDATA[<img src="http://blog.sprinter.tech/content/images/2026/03/blogpost.png" alt="Credit runs on Sprinter"><p>We have been quiet, on purpose.</p><p>For the past few months, we have been heads down building towards something bigger, and we are excited to reveal where we have landed.</p><h3 id="the-problem-we-kept-finding">The problem we kept finding</h3><p>Credit has always carried the same promise: the freedom to act before the money catches up, to do more than your current balance allows, to move on your own terms. It is the thing that gives people and businesses real agency in the financial system, and yet the infrastructure behind it has barely changed in 30 years. Terms are rigid because the technology is rigid, rates are expensive because the plumbing is expensive. The promise was real, but the engine behind it was not.</p><p>We have already seen what happens when you rebuild financial architecture from scratch. Stablecoins did it for payments, and overnight they became programmable, global, and structurally cheaper. That same transformation is now possible for credit, and almost nobody is building it.</p><h3 id="how-we-got-here">How we got here</h3><p>Sprinter has been focussed on credit for a while, but we started by solving a different problem. We set out to make crosschain transactions seamless, built solver infrastructure, and it worked. The next step was to take it beyond the solver use-case, and the deeper we went into how people and applications actually move value, the more we kept running into the same gap. Every path eventually led back to credit: the missing layer, the primitive that nobody had built yet, and the one that would unlock the most value if someone did.</p><p>And so we got to work.</p><h3 id="introducing-the-new-sprinter">Introducing the new Sprinter</h3><p>Today we are showing you the first piece of this makeover. A new Sprinter, enhanced from the ground up with new infrastructure, a new identity, and a new level of ambition. All driven by a single conviction.</p><p><strong>Credit runs on Sprinter.</strong></p><p>This is not just a cosmetic rebrand, it reflects a fundamental shift in what Sprinter is and where we are going.</p><p>We are a credit engine. Any application, whether they are building for consumers, businesses, or autonomous agents, can plug in via a single API and offer credit that actually works. That means flexible terms instead of one-size-fits-all, adaptive risk management instead of static rules, and economics that benefit the borrower because the collateral backing every credit line is productive, generating yield that makes credit cheaper by design.</p><p>The complexity stays under the hood, and the end user just gets better credit.</p><h3 id="what%E2%80%99s-next">What&#x2019;s next</h3><p>The new brand is just the beginning. Over the coming weeks, we will be sharing what we have been building behind the scenes, including a major upgrade to our core infrastructure and something entirely new for consumers.</p><p>We are not ready to say more just yet. But if you believe credit is the next great layer of finance to be rebuilt, and that the team that builds the engine will define how it works, then you will want to pay attention to what comes next.</p><p>Explore the new Sprinter, and stay tuned for what&#x2019;s next.</p><p><a href="https://sprinter.tech/?ref=blog.sprinter.tech" rel="noreferrer">sprinter.tech</a>. </p><hr><p>Stay updated on all things Sprinter, and onchain credit, by following us on<strong>&#xA0;<a href="https://x.com/sprinter_ux?ref=blog.sprinter.tech"><strong>X</strong></a></strong>, joining our&#xA0;<a href="https://t.me/sprinter_tech?ref=blog.sprinter.tech" rel="noreferrer"><strong>Telegram</strong></a>, and reading more on our&#xA0;<a href="http://blog.sprinter.tech/" rel="noreferrer"><strong>blog</strong></a>.</p>]]></content:encoded></item><item><title><![CDATA[Part III - Programmable, Usage‑Constrained Credit (Cross‑Chain Solvers and Beyond)]]></title><description><![CDATA[The final part of the series develops a concrete architecture for usage‑constrained credit in crosschain intent fulfillment, then generalizes it to other closed‑loop loans.]]></description><link>http://blog.sprinter.tech/series-beyond-loans-part-3/</link><guid isPermaLink="false">69676e864a37d30b099c9e1e</guid><category><![CDATA[DeFi]]></category><category><![CDATA[UX]]></category><category><![CDATA[sprinter]]></category><category><![CDATA[solvers]]></category><category><![CDATA[liquidity]]></category><category><![CDATA[ethereum]]></category><category><![CDATA[credit]]></category><dc:creator><![CDATA[Nadiem Sissouno]]></dc:creator><pubDate>Thu, 15 Jan 2026 13:56:45 GMT</pubDate><media:content url="http://blog.sprinter.tech/content/images/2026/01/POST.png" medium="image"/><content:encoded><![CDATA[<img src="http://blog.sprinter.tech/content/images/2026/01/POST.png" alt="Part III - Programmable, Usage&#x2011;Constrained Credit (Cross&#x2011;Chain Solvers and Beyond)"><p><em>Part I asked what are we pricing when we quote a rate and answered with expected loss, capital, and margin. Part II focused on&#xA0;mechanism and guarantees. The final part of this series focuses on programmable, usage-constrained credit.</em></p><p>The moment you treat guarantees as code, you can underwrite routes and states rather than people. This part develops a concrete architecture for usage&#x2011;constrained credit in cross&#x2011;chain intent fulfillment, then generalizes it to other closed&#x2011;loop loans.</p><figure class="kg-card kg-image-card"><img src="http://blog.sprinter.tech/content/images/2026/01/Blogpost--Beyond-Loans----Part-3-Table-Design-1.svg" class="kg-image" alt="Part III - Programmable, Usage&#x2011;Constrained Credit (Cross&#x2011;Chain Solvers and Beyond)" loading="lazy" width="1462" height="480"></figure><h3 id="1-the-promise"><strong>1) The promise</strong></h3><p>A solver receives a revolving credit line that can only be spent on executing a specific intent. Funds never touch the solver&#x2019;s externally controlled wallet. At the destination chain, proceeds are swept into a repayment sink that pays the lender first. Only the surplus, if any, can leave the system. Misuse is structurally impossible; underwriting focuses on route risk.</p><h3 id="2-the-flow-in-words"><strong>2) The flow in words</strong></h3><p><strong>Route risk in PD/LGD/EAD terms</strong></p><figure class="kg-card kg-image-card"><img src="http://blog.sprinter.tech/content/images/2026/01/Blogpost--Beyond-Loans----Part-3-Table-Design-2.svg" class="kg-image" alt="Part III - Programmable, Usage&#x2011;Constrained Credit (Cross&#x2011;Chain Solvers and Beyond)" loading="lazy" width="1462" height="508"></figure><p>An intent is posted and claimed (see Fig. 2). The solver locks a bond. The credit vault authorizes the source&#x2011;chain router to fund the route, tagging the bridge transfer so it can only land in the destination&#x2011;side sink. The destination router can call only whitelisted venues. When the trade completes, the sink retains principal, accrued interest, and protocol fees, and emits an attestation back to the source. Upon confirmation, accounting rolls forward and any surplus is released to the solver or shared with the user. If anything fails, timeouts and partial&#x2011;repayment rules determine how bonds are seized and how insurance funds step in.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="http://blog.sprinter.tech/content/images/2026/01/Blogpost--Beyond-Loans----Part-3-Table-Design-3A.svg" class="kg-image" alt="Part III - Programmable, Usage&#x2011;Constrained Credit (Cross&#x2011;Chain Solvers and Beyond)" loading="lazy" width="1889" height="1043"><figcaption><span style="white-space: pre-wrap;">Fig. 2: Stash Credit Flow Sequence</span></figcaption></figure><h3 id="3-why-this-is-credit"><strong>3) Why this is credit</strong></h3><p>No user pre&#x2011;funds the destination; the protocol fronts capital. The rate charged is the price of route risk: bridge failure, stale oracles, thin books, message delays. Loss given default is bounded by the repayment sink, by the solver&#x2019;s bond, and by an insurance pool. Exposure at default is the funded notional during execution. Tightening allowlists, reducing timeouts, and sizing bonds cheapen the rate by cutting expected loss.</p><h3 id="4-from-solvers-to-other-uses"><strong>4) From solvers to other uses</strong></h3><p>Once you have repayment sinks and allowlisted routers, many &#x201C;closed&#x2011;loop&#x201D; credits fall out: merchant payouts where settlement currency must be converted along the way; RWA vaults where incoming cash flows must amortize a facility before any dividends are paid; programmatic capex loans that can buy only specific on&#x2011;chain inventory. The technology is the same; only the whitelists and oracles change.</p><h3 id="5-risks-and-their-honest-names"><strong>5) Risks and their honest names</strong></h3><p>Code cannot erase risk; it only reshapes it. Priority becomes a matter of contract logic rather than contract law. Solvency depends on buffers that reflect finality lags and market depth at the destination. Reversibility is limited to what the mechanism allows; once a sink pays out, the system needs a credible path to recover mis&#x2011;routed funds. These constraints are not bugs&#x2014;they are the design surface.</p><hr><h2 id="conclusion-%E2%80%94-why-this-matters-and-what-to-build-next"><strong>Conclusion &#x2014; Why this matters (and what to build next)</strong></h2><p>We started with rates as prices of risk, moved through mechanisms for moving value while we wait, and ended with guarantees that can be expressed as law or as code. The practical takeaway is simple: separate <strong>pricing</strong> from <strong>plumbing</strong>. Price the thing you actually risk (people, positions, routes); then pick the lightest mechanism that keeps obligations safe&#x2014;ideally one that nets and batches until the boundary, backed by guarantees you can verify. As more cashflows originate on programmable rails, expect guarantees to migrate from paper to code and for non&#x2011;deliverables, repayment sinks, and risk engines to become standard parts of product design.</p><p>If you&#x2019;re building cross-chain intents, routing, or solver infra and want <strong>route-first credit</strong> with real <strong>LP yield</strong>, reach out&#x2014;we&#x2019;re onboarding early partners.&#xA0;</p><figure class="kg-card kg-image-card"><img src="http://blog.sprinter.tech/content/images/2026/01/Blogpost--Beyond-Loans----Part-3-Table-Design-4.svg" class="kg-image" alt="Part III - Programmable, Usage&#x2011;Constrained Credit (Cross&#x2011;Chain Solvers and Beyond)" loading="lazy" width="1462" height="668"></figure><hr><p>Stay updated on all things Sprinter, and onchain credit, by following us on<strong>&#xA0;<a href="https://x.com/sprinter_ux?ref=blog.sprinter.tech"><strong>X</strong></a></strong>, joining our&#xA0;<a href="https://t.me/sprinter_tech?ref=blog.sprinter.tech" rel="noreferrer"><strong>Telegram</strong></a>, and reading more on our&#xA0;<a href="http://blog.sprinter.tech/" rel="noreferrer"><strong>blog</strong></a>.</p><p><strong>Join us to shape the future of onchain credit.</strong></p>]]></content:encoded></item><item><title><![CDATA[Part II - Instant vs. Guaranteed Settlement, Perps, Factoring, and Usage‑Constrained Credit]]></title><description><![CDATA[While we wait for payment, how do we move value safely? For the answer to this, and other questions on credit mechanisms and guarantees, read Part II of our Beyond Loans series. ]]></description><link>http://blog.sprinter.tech/series-beyond-loans-part-2/</link><guid isPermaLink="false">693942854a37d30b099c9de2</guid><category><![CDATA[credit]]></category><category><![CDATA[crosschain]]></category><category><![CDATA[DeFi]]></category><category><![CDATA[Explainers]]></category><category><![CDATA[Research]]></category><category><![CDATA[UX]]></category><category><![CDATA[ethereum]]></category><dc:creator><![CDATA[Nadiem Sissouno]]></dc:creator><pubDate>Wed, 10 Dec 2025 12:58:25 GMT</pubDate><media:content url="http://blog.sprinter.tech/content/images/2025/12/POST.jpg" medium="image"/><content:encoded><![CDATA[<h3 id="tldr"><strong>TL;DR</strong> </h3><img src="http://blog.sprinter.tech/content/images/2025/12/POST.jpg" alt="Part II - Instant vs. Guaranteed Settlement, Perps, Factoring, and Usage&#x2011;Constrained Credit"><p>Some agreements truly need cash now (an <strong>instant/atomic mechanism</strong>). Many others only need guarantees layered on top of slower mechanisms: <strong>priority</strong> of payment, <strong>reversibility</strong> if conditions fail, and <strong>guaranteed solvency</strong> so boundary settlement is safe. Perpetuals are boundary settlement with guaranteed solvency; factoring is DNS with priority and bounded solvency via legal rights. <strong>Non&#x2011;deliverables</strong> show that sometimes there is no asset to deliver at all&#x2014;only a cash difference to compute correctly.</p><h3 id="how-part-ii-differs-from-part-i"><strong>How Part II differs from Part I</strong> </h3><p>Part I asked what are we pricing when we quote a rate?&#x2014;and answered with expected loss, capital, and margin. Part II asks a different question: while we wait for payment, how do we move value safely? The focus here is <strong>mechanism and guarantees</strong>, not rate math.</p><h3 id="1-from-pricing-to-plumbing-two-settlement-modes-through-the-mechanismsguarantees-lens"><strong>1) From pricing to plumbing: two settlement modes (through the mechanisms/guarantees lens)</strong></h3><p>The distinction becomes clearer once you separate when we move money from what makes that timing safe. Instant settlement is the clean room: nothing carries across time. Everything else requires some mix of reversibility, priority, or solvency so that waiting doesn&#x2019;t become reckless. In the following pages we look at two emblematic cases&#x2014;perpetual futures and invoice factoring&#x2014;and a third that hides in plain sight: non&#x2011;deliverables.</p><h3 id="2-perpetuals-boundary-settlement-that-requires-guaranteed-solvency"><strong>2) Perpetuals: boundary settlement that requires guaranteed solvency</strong></h3><p>Perpetual futures DEXs are the cleanest on&#x2011;chain example of boundary settlement. Traders deposit margin before they do anything else. From that moment onward the system tracks profit and loss virtually. No one wires coins to winners on every price tick; the engine simply updates claims and keeps an eye on each account&#x2019;s equity. When equity approaches zero, liquidation fires. Collateral is sold, the position is closed, and the proceeds repay losses. An insurance fund stands behind the residual risk if markets gap too quickly. Real money moves only at the boundary&#x2014;when a trader deposits, withdraws, or closes.</p><p>Seen through our taxonomy, perps use the boundary mechanism, made safe by the guaranteed&#x2011;solvency invariant. In practice that means three things. First, collateral is sized so that the expected loss over liquidation latency is small. Second, liquidation rules are designed to realize collateral quickly, with incentives for keepers to act even in stress. Third, if prevention fails, a pre&#x2011;funded waterfall absorbs what remains. Priority is encoded too: on liquidation and withdrawal the order of payouts is unambiguous, so no one has to litigate after the fact.</p><p>A short example makes this less abstract. Imagine a trader opens a &#x20AC;100,000 notional long with 10&#xD7; leverage on an asset whose price can move five percent in a minute during stress. If it takes thirty seconds to liquidate and the book is thin, the risk engine must assume that prices can move two to three percent before the position is flat. Maintenance margin is therefore set high enough that, after a three percent adverse move plus trading frictions, the collateral still covers the loss. If it does not, the insurance fund steps in, and the protocol later recoups the shortfall from fees. In that story the &#x201C;probability of default&#x201D; is the probability that liquidation fails to keep up; the &#x201C;loss given default&#x201D; is the share of loss that the margin and insurance do not cover; the &#x201C;exposure at default&#x201D; is the position&#x2019;s size at the moment liquidation starts.</p><h3 id="3-factoring-dns-with-priority-and-bounded-solvency"><strong>3) Factoring: DNS with priority and bounded solvency</strong></h3><p>Factoring is a good foil because it lives on paper and in courtrooms rather than in smart contracts, yet the logic is the same. A business sells an invoice to a factor at a discount. The obligation is fixed on day one, but cash moves later, usually on the invoice due date or in a batch. Between those two moments the factor&#x2019;s safety comes from guarantees, not timing. Priority is established by legal assignment and, often, by notifying the buyer to pay the factor directly. Bounded solvency is created by with&#x2011;recourse terms, by trade credit insurance, and by concentration limits that prevent one obligor from dominating the pool.</p><p>Here too, numbers help. Suppose a &#x20AC;100,000 invoice payable in sixty days is sold <strong>without recourse</strong>. The risk&#x2011;free rate for two months is roughly 0.3% annualized. Verification, KYC, and servicing amount to another 0.2%. The buyer&#x2019;s one&#x2011;year probability of default is estimated at 2%; scaled to sixty days that is about 0.33%. If recovery on default would be fifty cents on the euro after costs and delays, <strong>LGD</strong> is 50%. Expected loss over sixty days is therefore 0.33% &#xD7; 50% &#xD7; &#x20AC;100,000 &#x2248; <strong>&#x20AC;165</strong> (0.165%). Add a small capital charge for tail risk&#x2014;say 0.20% over the period&#x2014;and a margin of 0.25%, and the total discount for sixty days lands around <strong>0.915%</strong>, or <strong>&#x20AC;915</strong>. With a <strong>with&#x2011;recourse</strong> structure, effective LGD might fall to 10% because the seller must replace bad paper. The expected loss then drops to about <strong>&#x20AC;33</strong>, and the all&#x2011;in discount shrinks accordingly. (Side note: factors also model <strong>dilution risk</strong>&#x2014;returns, credits, disputes&#x2014;which reduces collectible cash even without default.) The math is simple; what matters is that the price is dominated by the buyer&#x2019;s risk, not the seller&#x2019;s identity.</p><h3 id="4-non%E2%80%91deliverables-when-settlement-is-only-a-number"><strong>4) Non&#x2011;deliverables: when settlement is only a number</strong></h3><p>Many markets never exchange the underlying thing. They compute a cash difference against a reference and pay it in a separate currency. In FX, an NDF on USD/KRW settles in dollars using a published KRW fixing. In commodities and equity indices, cash&#x2011;settled futures do the same. In crypto, most perpetuals are already non&#x2011;deliverable by design: the payoff depends on a price index, and settlement occurs in a stablecoin or common collateral.</p><p>Non&#x2011;deliverables sit comfortably inside both DNS and boundary mechanisms, but they elevate a different risk to the top: <strong>reference price integrity</strong>. If the fixing is manipulated or the oracle lags, a trade that looked fair on paper turns into a transfer of value. Guaranteeing non&#x2011;deliverables therefore means hardening indices (robust venues, time&#x2011;weighted windows, outlier filters), adding dispute or pause windows when feeds diverge, and making payout priority explicit so the right party is made whole first. The absence of custody risk is a gift; the price however is higher data quality requirements.</p><h3 id="5-usage%E2%80%91constrained-credit-programmable-guarantees"><strong>5) Usage&#x2011;constrained credit: programmable guarantees</strong></h3><p>Programmable rails let us bring the guarantees into code. Instead of wiring proceeds to a borrower&#x2019;s free&#x2011;and&#x2011;clear wallet, funds land in contracts that can only do whitelisted things. Proceeds route to the lender&#x2019;s sink first and only then do they flow outward. A borrower never has general&#x2011;purpose custody until the system is made whole. This is the same stack of guarantees&#x2014;priority, solvency, sometimes reversibility&#x2014;implemented as rules rather than paperwork.</p><p>One natural application, which we will develop in Part III, is <strong>cross&#x2011;chain solver credit</strong> (see Fig. 1). A lender fronts capital on one chain so a solver can fulfill an intent on another. The bridge tags the transfer to a repayment sink at the destination. The solver can interact only with approved venues, and the sink sweeps principal and interest before anyone else is paid. The mechanism across domains may be deferred or boundary; what makes it safe are the same guarantees adapted to a world with probabilistic finality and message latency.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="http://blog.sprinter.tech/content/images/2025/12/Blogpost--Beyond-Loans----Part-2-Infographic-A.svg" class="kg-image" alt="Part II - Instant vs. Guaranteed Settlement, Perps, Factoring, and Usage&#x2011;Constrained Credit" loading="lazy" width="1889" height="821"><figcaption><span style="white-space: pre-wrap;">Fig.1: Stash Closed System</span></figcaption></figure><h3 id="case-study-usage-constrained-credit-%E2%80%94-sprinter-stash"><strong>Case study: Usage-constrained credit&#xA0; &#x2014; Sprinter Stash</strong></h3><p>Sprinter Stash connects stablecoin LPs with cross-chain <strong>solvers</strong> who need <strong>instant, zero-collateral</strong> credit to execute intents. Credit never lands in a general-purpose wallet (see Fig. 1); it&#x2019;s spent by allowlisted routers, and <strong>r</strong>epayment is swept to the sink first, before any surplus flows out&#x2014;so misuse isn&#x2019;t possible by design. For LPs, returns come from <strong>solver service fees</strong> plus conservative <strong>passive yield sources</strong>; the protocol treats safety (MPC, audits) and ongoing risk monitoring as first-class concerns. Operationally, Stash hubs on <strong>Base</strong> with satellite pools and automated rebalancing across chains and venues, so solvers don&#x2019;t pre-fund inventory or juggle bridges. In taxonomy terms: non-deliverable, <strong>boundary settlement</strong> for P&amp;L; DNS-like scheduling for fees; <strong>guaranteed priority</strong> and <strong>guaranteed solvency</strong> enforced in code.</p><figure class="kg-card kg-image-card"><img src="http://blog.sprinter.tech/content/images/2025/12/Blogpost--Beyond-Loans----Part-2-Table-Design.svg" class="kg-image" alt="Part II - Instant vs. Guaranteed Settlement, Perps, Factoring, and Usage&#x2011;Constrained Credit" loading="lazy" width="1462" height="660"></figure><h3 id="putting-it-together"><strong>Putting it together</strong></h3><p>Once you split mechanisms from guarantees, design choices become easier to justify. Atomic settlement needs little more than finality. Escrow needs reversibility and, on release, priority. Deferred settlement needs priority and a lender or a solvent payer to span the window. Boundary settlement needs guaranteed solvency, because it trades frequent small transfers for occasional large ones at exits and triggers. CCPs are boundary systems with a professional risk manager in the middle. Non&#x2011;deliverables remove custody but demand pricing integrity. The rest is tuning: which risks dominate expected loss here&#x2014;failure to liquidate, obligor default, oracle error, bridge latency, index manipulation&#x2014;and which guarantee is cheapest to strengthen.</p><hr><p>Stay tuned for Part III of the series &quot;Beyond Loans - Credit as Price, Collateral and Code&quot; and as always, stay updated on all things Sprinter, and onchain credit, by following us on<strong>&#xA0;<a href="https://x.com/sprinter_ux?ref=blog.sprinter.tech"><strong>X</strong></a></strong>, joining our&#xA0;<a href="https://t.me/sprinter_tech?ref=blog.sprinter.tech" rel="noreferrer"><strong>Telegram</strong></a>, and reading more on our&#xA0;<a href="http://blog.sprinter.tech/" rel="noreferrer"><strong>blog</strong></a>.</p><p><strong>Join us to shape the future of onchain credit.</strong></p>]]></content:encoded></item><item><title><![CDATA[Beyond Loans — Credit as Price, Collateral, and Code: Part I]]></title><description><![CDATA[The invisible thread is credit—sometimes explicit, sometimes implicit, sometimes just the promise that when needed, there is cash in the room. This series is about that thread: how we price it, how we secure it, and how code is changing what “settlement” even means.]]></description><link>http://blog.sprinter.tech/series-beyond-loans-part-1/</link><guid isPermaLink="false">691d93a04a37d30b099c9d83</guid><category><![CDATA[DeFi]]></category><category><![CDATA[case study]]></category><category><![CDATA[sprinter]]></category><category><![CDATA[UX]]></category><category><![CDATA[credit]]></category><category><![CDATA[Research]]></category><dc:creator><![CDATA[Nadiem Sissouno]]></dc:creator><pubDate>Wed, 19 Nov 2025 12:26:00 GMT</pubDate><media:content url="http://blog.sprinter.tech/content/images/2025/11/POST-1.jpg" medium="image"/><content:encoded><![CDATA[<h2 id="prologue-a-coffee-a-card-a-perp"><strong>Prologue: A coffee, a card, a perp</strong></h2><img src="http://blog.sprinter.tech/content/images/2025/11/POST-1.jpg" alt="Beyond Loans &#x2014; Credit as Price, Collateral, and Code: Part I"><p>You tap for a coffee. Somewhere, a card network authorizes a payment, your bank promises to fund it later, and the caf&#xE9; gets a message it can trust today. No coins move between you two in that moment; accounting does. That night, a batch closes and money finally travels. A few hours later, an on&#x2011;chain trader opens a perpetual futures position with 10&#xD7; leverage. Again, no assets move between counterparties with every price tick; the system keeps score until a boundary is reached. Same story, different rails. The invisible thread is credit&#x2014;sometimes explicit, sometimes implicit, sometimes just the promise that when needed, there is cash in the room. This series is about that thread: how we price it, how we secure it, and how code is changing what &#x201C;settlement&#x201D; even means.</p><h2 id="part-i-%E2%80%94-pricing-credit-from-rates-to-risk"><strong>Part I &#x2014; Pricing Credit: From Rates to Risk</strong></h2><p><strong>TL;DR</strong> A loan&#x2019;s rate is not a generic &#x201C;fee for borrowing.&#x201D; It is the cash price of uncertainty. Under the hood it combines the time value of money, the lender&#x2019;s own cost of running the product, the <strong>expected loss</strong> from borrowers who won&#x2019;t pay, a return on capital set aside for bad times, and a margin for competition and model error. Change the risk, change the price.</p><p>We can say this without jargon. In plain terms: the rate has five components. The first is the <strong>risk&#x2011;free baseline</strong>&#x2014;what money earns with almost no risk over the same period. The second is <strong>funding and operations</strong>&#x2014;the cost of deposits or wholesale funding, the salaries, the software, the compliance. The third is the <strong>expected loss</strong> from defaults in an average year. Risk teams compute this as <strong>EL = PD &#xD7; LGD &#xD7; EAD</strong>, where PD is the probability of default, LGD is the loss given default after recoveries/collateral, and EAD is the exposure at default. The fourth component is a <strong>capital charge</strong>&#x2014;the return required on capital held for recessions and accidents. The fifth is <strong>margin</strong>.</p><p>A small example makes it concrete. Take a &#x20AC;10,000, one&#x2011;year loan. Suppose the risk&#x2011;free rate for the duration is 3% and running the product costs another 1%. If the risk team believes two out of a hundred similar borrowers will default (PD = 2%) and that, after selling collateral and collecting what can be collected, the average loss is forty cents on the euro (LGD = 40%), then across the whole book the expected loss is 0.02 &#xD7; 0.40 &#xD7; &#x20AC;10,000 = <strong>&#x20AC;80</strong>, or <strong>0.8%</strong> of principal over the year. Add a modest 0.5% for capital and 0.7% for margin and you land near <strong>6.0%</strong>. Now change only one fact: the borrower pledges a car you can seize and sell, so LGD falls to 10%. Expected loss drops to <strong>0.2%</strong> and the fair rate glides toward <strong>5.4%</strong>. Capital charge covers unexpected loss (tails), not the average loss already priced in EL.&#xA0;</p><figure class="kg-card kg-image-card"><img src="http://blog.sprinter.tech/content/images/2025/11/Blogpost--Beyond-Loans----Table-design-1.svg" class="kg-image" alt="Beyond Loans &#x2014; Credit as Price, Collateral, and Code: Part I" loading="lazy" width="1462" height="632"></figure><p>In practice, each ingredient moves for different reasons. <strong>PD</strong> falls when underwriting improves&#x2014;verifiable income, lower debt&#x2011;to&#x2011;income, cleaner payment history. In on&#x2011;chain systems, PD rhymes with the reliability of liquidation: good oracles, healthy order books, a live chain. <strong>LGD</strong> shrinks with real control over cash flows&#x2014;first&#x2011;priority liens and guarantees in TradFi, over&#x2011;collateralization and repayment sinks that get paid before anyone else in DeFi. <strong>EAD</strong> is structural: amortizing loans dwindle over time; revolving lines can peak late; leveraged positions on&#x2011;chain have a special kind of exposure&#x2014;the notional at risk during the seconds it takes to liquidate. A useful rule of thumb in volatile markets is <strong>latency VaR</strong>: expected price move &#xD7; exposure &#xD7; liquidation delay. Maintenance margins should be set so that, even across that delay, losses are still covered&#x2014;or an insurance fund must catch what spills over.</p><p>Two loans with the same expected loss can still deserve different prices because of <strong>tails</strong>. Expected loss is the average. Lenders also hold capital for the unexpected: clustered defaults in a downturn, a frozen bridge, an oracle that goes out of tolerance. That capital expects a return. Futures markets make this explicit with <strong>initial</strong> and <strong>variation margin</strong> plus a default fund; consumer lenders do it implicitly by targeting a return on economic capital. If one pool has fat&#x2011;tailed outcomes and another doesn&#x2019;t, the one with fatter tails will carry a higher capital coat of paint even if the expected&#x2011;loss coat is the same thickness.</p><p>This is where TradFi and DeFi feel different while solving the same equation. TradFi mostly prices <strong>people and paper</strong>: PD is about willingness and ability to pay; LGD is about legal priority and recoveries; EAD follows the contract schedule. DeFi mostly prices <strong>collateral and code</strong>: PD is about whether the liquidation machine keeps up; LGD is the shortfall after selling collateral (plus any insurance); EAD is the notional during liquidation or bridging. Both are trying to make <strong>expected loss small and capital affordable</strong>, just with different levers.</p><p>If you carry one idea forward from Part I, carry this: the rate is a story about <strong>risk that can be measured and moved</strong>. Lower PD by knowing your counterparty or by making misuse structurally impossible. Lower LGD by taking collateral you can truly control or by routing repayments to yourself first. Shape EAD by choosing structures that shrink exposure when it matters. The math is compact; the art is in the design.</p><hr><h2 id="interlude-%E2%80%94-settlement-taxonomy-non%E2%80%91deliverables-and-actor-map"><strong>Interlude &#x2014; Settlement Taxonomy, Non&#x2011;deliverables, and Actor Map</strong></h2><p>Before we compare products, it helps to lock down the language. Settlement has two layers that sit at right angles. The first is the <strong>mechanism</strong>&#x2014;how and when transfers are finalized. The second is the <strong>guarantee</strong>&#x2014;the promises or safeguards that make that timing safe. &#x201C;Guaranteed solvency&#x201D; belongs to the second layer; it isn&#x2019;t a timing rule, it&#x2019;s the property that lets slower or more flexible timing work without creating unpayable obligations.</p><p>On mechanisms: at one end is <strong>instant or atomic settlement</strong>. Value and title change hands together, and if either leg fails, nothing happens. This is delivery&#x2011;versus&#x2011;payment and real&#x2011;time gross settlement: a clean swap with no exposure carried across time. A step away from that is <strong>escrow&#x2011;mediated settlement</strong>. Funds or assets lock immediately but do not release until a condition is proven&#x2014;delivery confirmed, a dispute window expires, an oracle attests to a state. No one extends credit in the meantime; risk is parked in escrow rather than on a counterparty&#x2019;s balance sheet.</p><p>Most day&#x2011;to&#x2011;day finance relies on <strong>deferred net settlement (DNS)</strong>. Obligations are fixed now, but cash moves on a schedule&#x2014;end&#x2011;of&#x2011;day batches, T+2 cycles, month&#x2011;end nets. Because many cash flows point both ways, the system nets them down to smaller transfers. Sometimes a third party layers credit on top&#x2014;card issuers and BNPL firms pay the merchant today and collect from the buyer later&#x2014;but the settlement layer itself is just batching and netting.</p><p>Then there is <strong>event&#x2011;driven or boundary settlement</strong>. Instead of moving cash at every interim event, the system keeps score internally and only moves real money at boundaries such as closing a position or withdrawing funds, or when risk limits are hit and liquidation is required. Timing becomes stochastic&#x2014;the market decides when boundaries are reached&#x2014;but the rules are deterministic: margins, oracles, liquidation incentives, and priority of payouts define what happens when a boundary is crossed. Finally, in markets that concentrate many bilateral trades, <strong>novated CCP settlement</strong> inserts a central counterparty between everyone else&#x2014;becoming buyer to every seller and seller to every buyer&#x2014;and runs multilateral netting with initial/variation margin, default funds, and auctions.</p><p>There is a cousin to these mechanisms that shows up everywhere: <strong>non&#x2011;deliverable agreements</strong>. Some contracts never require transfer of the underlying asset at all; they settle purely in cash off a reference price or index. A non&#x2011;deliverable forward on USD/KRW pays the difference in dollars at maturity; cash&#x2011;settled options and many index futures do the same. On&#x2011;chain, most perpetuals are by design non&#x2011;deliverable&#x2014;the reference is a price index, and the settlement asset is a stablecoin. Non&#x2011;deliverables simplify custody but make <strong>pricing integrity</strong> the critical dependency: if the reference price is wrong, so is the payout. Oracles, dispute windows, and robust indices therefore sit squarely in the guarantee layer.</p><p>Now to guarantees&#x2014;the layer that makes those mechanisms safe. <strong>Finality</strong> means that once a transfer is marked complete, it cannot be unwound except by a fresh transaction or a court order. <strong>Reversibility</strong> is the mirror image for conditional flows: when conditions are not met, value reliably returns to its origin (escrow release, chargebacks, dispute rules). <strong>Priority</strong> fixes who gets paid first; it is a legal assignment in paper systems or a programmed repayment sink on&#x2011;chain. And <strong>guaranteed solvency</strong> is the core invariant behind boundary models: at any boundary event, the system can meet its obligations from posted buffers, liquidation proceeds, and insurance, with any remaining shortfall pre&#x2011;allocated to a funded waterfall rather than pushed onto outsiders.</p><figure class="kg-card kg-image-card"><img src="http://blog.sprinter.tech/content/images/2025/11/Blogpost--Beyond-Loans----Table-design-2.svg" class="kg-image" alt="Beyond Loans &#x2014; Credit as Price, Collateral, and Code: Part I" loading="lazy" width="1462" height="724"></figure><p><strong>Sprinter Stash </strong>in this taxonomy<strong>:</strong> a <strong>non-deliverable, event-driven</strong> credit rail for cross-chain solvers, secured by <strong>guaranteed priority</strong> (repayment sink pays lender first) and <strong>guaranteed solvency</strong> (margin/limits/insurance). It converts LP stablecoin capital into on-demand credit that powers solver routes across chains, with LPs earning real yield from solver fees and safe passive sources.</p><p>With actors, the picture simplifies. We refer to the <strong>payer</strong>, who owes value, and the <strong>payee</strong>, who receives it. Depending on the mechanism, other roles attach: a <strong>lender/credit provider</strong> who advances funds so the payee needn&#x2019;t wait; a <strong>risk engine</strong> that measures exposure and enforces margins and liquidations (a smart contract in DeFi, a CCP in TradFi); an <strong>escrow</strong> or <strong>oracle</strong> that locks value and proves conditions; a <strong>guarantor</strong> or <strong>insurance fund</strong> that absorbs tail events; and a <strong>venue, custodian, or settlement agent</strong> that executes or records transfers. Different combinations of these roles give each mechanism its distinctive risk shape.</p><figure class="kg-card kg-image-card"><img src="http://blog.sprinter.tech/content/images/2025/11/Blogpost--Beyond-Loans----Table-design-3.svg" class="kg-image" alt="Beyond Loans &#x2014; Credit as Price, Collateral, and Code: Part I" loading="lazy" width="1462" height="632"></figure><p>A few practical questions help you choose. If a failed leg right now would cause irreparable harm and there is no credible recourse, you want instant exchange. If you can lock value and wait for proof, escrow buys safety without credit. If your flows are naturally batched and netted by the calendar, deferred settlement is efficient as long as priority is clear and the paying side can remain solvent until the window closes&#x2014;either by its own strength or with a lender standing in. If exposures evolve with every price tick and moving cash that often is impractical, boundary settlement is appropriate, but only when solvency is guaranteed ahead of time and the order of payments at the boundary is indisputable. In markets where many parties face each other simultaneously, a CCP adds the discipline and efficiency of multilateral netting with a single, well&#x2011;capitalized risk manager.</p><figure class="kg-card kg-image-card"><img src="http://blog.sprinter.tech/content/images/2025/11/Blogpost--Beyond-Loans----Table-design-4.svg" class="kg-image" alt="Beyond Loans &#x2014; Credit as Price, Collateral, and Code: Part I" loading="lazy" width="1462" height="716"></figure><hr><p>In conclusion, the answer to the initial question, what we are pricing when we quote a rate, is expected loss, capital, and margin. Join us soon for Part II, which will ask a different question: while we wait for payment, how do we move value safely? </p><hr><p>Make sure to stay tuned on all things Sprinter, and onchain credit, by following us on<strong>&#xA0;<a href="https://x.com/sprinter_ux?ref=blog.sprinter.tech"><strong>X</strong></a></strong>, joining our&#xA0;<a href="https://t.me/sprinter_tech?ref=blog.sprinter.tech" rel="noreferrer"><strong>Telegram</strong></a>, and reading more on our&#xA0;<a href="http://blog.sprinter.tech/" rel="noreferrer"><strong>blog</strong></a>.</p><p><strong>Join us to shape the future of onchain credit.</strong></p>]]></content:encoded></item><item><title><![CDATA[Ready, Set, Stash - The Sprinter  Olympics Begin Tomorrow!]]></title><description><![CDATA[Sprinter Stash’s app will officially go live tomorrow at 12pm CET, unlocking a new way for DeFi participants to earn rewards by contributing USDC liquidity to Sprinter Stash.]]></description><link>http://blog.sprinter.tech/ready-set-stash/</link><guid isPermaLink="false">691483374a37d30b099c9d3c</guid><category><![CDATA[Announcements]]></category><category><![CDATA[crosschain]]></category><category><![CDATA[Interoperability]]></category><category><![CDATA[sprinter]]></category><category><![CDATA[solvers]]></category><category><![CDATA[UX]]></category><category><![CDATA[liquidity]]></category><category><![CDATA[credit]]></category><category><![CDATA[DeFi]]></category><dc:creator><![CDATA[Rob Z]]></dc:creator><pubDate>Wed, 12 Nov 2025 15:48:00 GMT</pubDate><media:content url="http://blog.sprinter.tech/content/images/2025/11/POST-3.png" medium="image"/><content:encoded><![CDATA[<img src="http://blog.sprinter.tech/content/images/2025/11/POST-3.png" alt="Ready, Set, Stash - The Sprinter  Olympics Begin Tomorrow!"><p>Sprinter Stash&#x2019;s app will officially <strong>go live</strong> <strong>tomorrow at 12pm CET</strong>, unlocking a new way for DeFi participants to earn rewards by contributing USDC liquidity to Sprinter Stash.</p><p>But this isn&#x2019;t just about staking and waiting. It&#x2019;s a chance to be part of the next wave of crosschain liquidity infrastructure &#x2014; and earn real rewards for doing so. For those who jump in early, the benefits get even better.</p><h3 id="how-it-works">How it works</h3><p>Sprinter Stash is a dynamic liquidity layer designed to power crosschain execution within the Sprinter protocol. Liquidity providers deposit USDC into the protocol through an intuitive interface, selecting the chain they want to deposit from and locking their funds for a chosen duration.</p><p>Once deposited, Stash takes over, algorithmically distributing and rebalancing liquidity across supported chains based on live solver demand. This allows solvers to borrow credit on destination chains without collateral, enabling instant, capital-efficient execution across the ecosystem.</p><p>When a transaction is filled, the borrowed funds are repaid on the source chain. From there, profits flow back to LPs, who earn from a combination of solver fees, passive yield, and Stash points.</p><p>It&#x2019;s liquidity that works harder &#x2014; and smarter.</p><h3 id="introducing-stash-points-the-sprinter-olympics-%F0%9F%8F%85">Introducing Stash Points &amp; The Sprinter Olympics &#x1F3C5;</h3><p>When Stash goes live tomorrow, the race to rewards begins! We will be kicking off a series of events as part of the Sprinter Olympics, where you can earn <strong>Stash Points</strong>, a new rewards system that tracks your contributions across the Sprinter ecosystem.</p><p>The first event will be <strong>The 100M Stash,</strong> where you can earn Stash Points by depositing USDC into Sprinter Stash and locking your liquidity for a chosen duration. Stash points will be distributed 1:1, for every $1 staked, you receive 1 Stash point.</p><p>More ways to earn will be revealed in the coming weeks, in addition to the leaderboard going live soon - so keep stacking points and we&#x2019;ll see who&#x2019;s leading the race.</p><h3 id="early-lps-get-a-head-start-%F0%9F%8F%83%E2%80%8D%E2%99%82%EF%B8%8F">Early LPs get a head start &#x1F3C3;&#x200D;&#x2642;&#xFE0F;</h3><p>Sprinter Stash rewards liquidity providers with points, and yield that scales based on how long you lock your funds. The longer you commit, the higher your multiplier, starting at 0.4x for a 3-month lock, up to a generous 2.2x for a 12-month commitment.</p><p>And for early adopters, there&#x2019;s an additional reason to act fast: deposits made within the first 48 hours of each milestone unlock a <strong>100% SPRNT bonus</strong> on your USDC deposit, on top of your regular rewards. No extra steps required &#x2014; just show up early, and your bonus will be automatically applied.</p><p>To kick things off, we&#x2019;re rewarding our earliest Stashers with both <strong>base multipliers</strong> and <strong>bonus points</strong>.</p><p><strong>Base Multipliers</strong></p><p>Lock your liquidity and earn more Stash points based on your commitment:</p><ul><li><strong>3-Month Lock</strong> &#x2192; 0.4x Stash points</li><li><strong>6-Month Lock</strong> &#x2192; 1.0x Stash points</li><li><strong>12-Month Lock</strong> &#x2192; 2.2x Stash points</li></ul><p><strong>Bonus rewards (First 48 Hours)</strong></p><p>Deposit USDC in the first <strong>48 hours</strong> of each milestone and you&#x2019;ll receive a <strong>100% bonus</strong> on your USDC deposit, in Stash points &#x2014; no extra steps needed.</p><h3 id="how-to-stash">How to Stash</h3><p>Sprinter Stash gives LPs access to dynamic, multichain rewards - powered by solver activity and protocol incentives.</p><p>Here&#x2019;s how it flows:</p><ol><li>Visit <a href="https://app.sprinter.tech/stash?ref=blog.sprinter.tech" rel="noreferrer">https://app.sprinter.tech/stash</a> </li><li><strong>Connect your wallet &amp; select a chain. </strong>Deposit USDC directly into Sprinter Stash.</li><li><strong>Choose your Stash lockup. </strong>You can lock your Stash for 3 months, 6 or 12. (Or you can chose not to lock and just earn the APY).</li><li><strong>Stash allocates liquidity across chains. </strong>Liquidity is algorithmically rebalanced to meet solver demand in real time.</li><li><strong>Solvers use credit instantly. </strong>Solvers borrow on destination chains without collateral to execute trades and arbitrage opportunities cross-chain.</li><li><strong>Settlement &amp; rewards. </strong>Once filled, funds are repaid on the source chain. Profits flow back to LPs as APY, solver and strategy fees.</li></ol><p>You earn from:</p><ul><li><strong>Solver fees</strong></li><li><strong>Strategy fees</strong></li><li><strong>Multi-dimentional Passive yield</strong></li><li><strong>Sprinter incentives &amp; Stash Points</strong></li></ul><hr><h3 id="the-final-countdown">The Final Countdown</h3><p>Sprinter Stash goes live at 12pm CET, tomorrow Thursday 13th November. The early bird count down starts then. Staking early means maximizing your rewards, both with <strong>boosted multipliers</strong> and <strong>exclusive bonus rewards</strong> for early birds.</p><p>Connect your wallet. Multiply your rewards. Power the future of crosschain DeFi.</p><p>The Sprint has officially begun &#x1F3C1;</p><hr><p>Join the Sprint and follow us on<strong>&#xA0;<a href="https://x.com/sprinter_ux?ref=blog.sprinter.tech"><strong>X</strong></a></strong>, joining our&#xA0;<a href="https://t.me/sprinter_tech?ref=blog.sprinter.tech" rel="noreferrer"><strong>Telegram</strong></a>, and reading more on our&#xA0;<a href="https://sprinter.tech/?ref=blog.sprinter.tech" rel="noreferrer"><strong>website</strong></a><strong>. </strong></p>]]></content:encoded></item><item><title><![CDATA[Introducing Sprinter Stash: Real Yield for LPs, Credit for DeFi.]]></title><description><![CDATA[Sprinter Stash is a new onchain credit protocol that powers the next-generation of use cases, from solver credit lines to trading, whilst rewarding LPs with sustainable, risk-managed stablecoin yield. ]]></description><link>http://blog.sprinter.tech/introducing-sprinter-stash/</link><guid isPermaLink="false">691309c44a37d30b099c9cdf</guid><category><![CDATA[Announcements]]></category><category><![CDATA[crosschain]]></category><category><![CDATA[sprinter]]></category><category><![CDATA[solvers]]></category><category><![CDATA[UX]]></category><dc:creator><![CDATA[Alex Mueller]]></dc:creator><pubDate>Tue, 11 Nov 2025 14:18:08 GMT</pubDate><media:content url="http://blog.sprinter.tech/content/images/2025/11/Introduction-6.png" medium="image"/><content:encoded><![CDATA[<img src="http://blog.sprinter.tech/content/images/2025/11/Introduction-6.png" alt="Introducing Sprinter Stash: Real Yield for LPs, Credit for DeFi."><p><em>Going live later this week, Sprinter Stash welcomes a new era of credit and sustainable yield for decentralized finance.</em></p><p>The next frontier in crypto is credit. While stablecoins, tokenization and DeFi brought trillions of USD in assets on chain, market efficiency and UX still lack behind.</p><p>Sprinter Stash is a new onchain credit protocol that powers the next-generation of use cases, from solver credit lines to trading, whilst rewarding <strong>LPs with sustainable, risk-managed stablecoin yield</strong>. Stash provides zero-collateral credit, so solvers don&#x2019;t need capital, users don&#x2019;t need to touch bridges, and dApps get instant fills.</p><p>Our first supported venues: Intent protocols and wallets. But this is just the beginning.</p><h2 id="the-challenges-centralization-and-barriers-to-entry"><strong>The Challenges: Centralization and Barriers to Entry</strong></h2><p>As DeFi has evolved toward intent-based architecture and crosschain composability, <strong>a new class of infrastructure actors,</strong> solvers, has emerged. Solvers translate user intent into action, often across multiple chains and assets. But their growth is being stifled by one persistent bottleneck: <strong>capital</strong>.</p><p>While protocols may be decentralized in architecture, the execution layer remains heavily centralized, controlled by a small number of entities that have the <strong>liquidity, operational scale, and risk infrastructure</strong> to operate effectively.</p><p><strong>The Result?</strong></p><ul><li><strong>Limited competition and centralization risk</strong> in solver-based ecosystems</li><li><strong>High barriers to entry</strong> for new builders and crosschain DeFi applications</li><li><strong>Liquidity fragmentation</strong> across chains and protocols, reducing overall efficiency.</li></ul><p>At the core of the problem lies the <strong>cost, access, and management of the required capital crosschain.</strong> Solvers must not only source capital across multiple chains, but also manage inventory risk, price volatility, and bridge friction&#x2014;all before earning any return.</p><p><strong>More specifically:</strong></p><ul><li><strong>Access &amp; Cost of Capital:</strong> Participants need cost-efficient access to liquidity across chains in order to compete on execution. For most, this capital must be pre-funded, siloed, or actively bridged&#x2014;making operations complex and expensive.</li><li><strong>Inventory Risk &amp; Fragmentation:</strong> Managing funds across chains introduces exposure to volatile assets, impermanent loss, and idle capital. Without sophisticated infrastructure, this risk often outweighs potential returns.</li></ul><p>While leading market makers have already built the required crosschain infrastructure, <strong>the majority of the market still lacks access to these capabilities.</strong></p><p>Unlocking <strong>shared, risk-managed liquidity</strong> will not only broaden participation but also increase resilience, decentralization, and innovation across the DeFi stack.</p><h2 id="what-is-sprinter-stash"><strong>What is Sprinter Stash?</strong></h2><p>Sprinter Stash is a <strong>credit-based liquidity protocol</strong> that connects <strong>stablecoin LPs</strong> with crosschain actors like solvers and strategists and bridges the gap between passive capital and high-frequency, crosschain demand.</p><ul><li><strong>For Liquidity Providers:</strong> Sprinter Stash offers <strong>risk-managed stablecoin yield</strong> from real protocol usage and solver borrowing</li><li><strong>For DeFi (Solvers and soon others):</strong> Stash provides cheap and managed crosschain liquidity via <strong>zero-collateral credit</strong>, abstracting away the need for pre-funded, siloed liquidity</li></ul><p>By bridging the gap between <strong>capital and execution</strong>, Sprinter Stash enhances <strong>liquidity efficiency, reduces fragmentation, and accelerates DeFi adoption.</strong> Stash&#x2019;s native chain will be BASE, with satellite pools on every other chain.</p><h2 id="why-sprinter-stash"><strong>Why Sprinter Stash?</strong></h2><h3 id="for-liquidity-providers"><strong>For Liquidity Providers</strong></h3><p>Sprinter Stash is for liquidity providers looking for an attractive yield opportunity based on a new DeFi primitive:</p><ul><li><strong>High Yield &amp; Low Risk:</strong> Sprinter Stash utilizes multiple yield sources to maximize capital efficiency and returns: LPs earn from service fees paid by solvers to access credit as well as proven passive yield sources (such as lending protocols) ensuring low risk. Stashing (staking) earns additional rewards.</li><li><strong>Secure &amp; Credible:</strong> MPC-secured multi-party threshold signing, risk mitigation mechanisms, and <a href="https://github.com/sprintertech/sprinter-stash-contracts/blob/main/audits/VAR_Sygma_labs_Sprinter_liquidity_250212-final.pdf?ref=blog.sprinter.tech">smart contract audits by Veridise</a> and <a href="https://cantina.xyz/portfolio/fe3c634c-d06d-47c2-a70a-f19d2f820f58?ref=blog.sprinter.tech">Spearbit/Cantina</a> make Sprinter Stash a secure platform. Built in partnership with ChainSafe, a team with 7+ years of industry expertise across core protocol development, standardization/ EIPs and security audits /council work.</li></ul><h3 id="for-crosschain-defi"><strong>For Crosschain DeFi</strong></h3><p>Sprinter Stash enables capital-efficient crosschain execution by removing the need for pre-funded liquidity pools or collateralized loans. Liquidity is automatically managed across chains via a variety of rebalancing and netting protocols. At launch, <strong>Stash</strong> initially supports solvers filling orders in:</p><ul><li><a href="https://across.to/?ref=blog.sprinter.tech" rel="noreferrer">Across</a></li><li><a href="https://li.fi/?ref=blog.sprinter.tech" rel="noreferrer">LiFi Intents</a></li><li><a href="https://mayan.finance/?ref=blog.sprinter.tech" rel="noreferrer">Mayan Finance</a></li><li><a href="https://www.rhinestone.dev/?ref=blog.sprinter.tech" rel="noreferrer">Rhinestone</a></li></ul><p>Solvers can use Stash credit lines to borrow and fill &#x2014; creating faster, more competitive intent execution. Sprinter Stash credit is designed to <strong>scale beyond solving itself</strong>. Over the next weeks and months, we&#x2019;ll expand credit and collateral types to further increase efficiency in DeFi for traders, Portfolio Managers and Strategists.</p><h2 id="how-sprinter-stash-works"><strong>How Sprinter Stash Works</strong></h2><ol><li><strong>Liquidity Providers deposit USDC on Base from any chain into the protocol&#x2019;s liquidity hub</strong> - Receiving spUSDC-LP tokens in return. Liquidity is then managed across the pools on supported chains.</li><li><strong>Solvers access liquidity instantly, without collateral</strong> &#x2013; Solvers are executing their fills through Stash. After a fill is completed via credit, Stash receives the deposited funds on the source chain repaying the credit and keeping profits for LPs and solvers. Stash works as a closed credit system where the MPC validates all intents to be filled and ensure credit will be repayed.</li><li><strong>LPs earn dynamic rewards</strong> &#x2013; Yield is optimized through a combination of base yield from supply in lending protocols, such as Aave, and yield from solver borrow fees. LPs are also eligible to earn staking rewards in the form of SPRNT emissions, with higher multipliers for longer locks in addition to bonus incentives for earlybirds.</li></ol><p>By bringing together liquidity providers and solvers Sprinter Stash creates a more efficient and scalable solver environment for the entire DeFi ecosystem. Stash launches with supported:</p><ul><li><strong>Destination Networks</strong> - Base, Arbitrum, Optimism</li><li><strong>Tokens</strong> - DAI, ETH/WETH, USDT, WBTC</li><li><strong>Protocols</strong> - Any EVM crosschain bridge/ swap protocol such as 1inch Fusion+, Across, Debridge Liquidity Network, Everclear, Mayan.Finance with many more upcoming</li><li><strong>Rebalancing/ Inventory Management</strong> - CCTP, native Bridges, Everclear.</li></ul><h2 id="the-future-of-onchain-credit-is-here"><strong>The Future of Onchain Credit is Here</strong></h2><p>Crypto&#x2019;s next evolution depends on seamless <strong>liquidity movement across chains</strong>. Sprinter Stash isn&#x2019;t just another liquidity protocol, it&#x2019;s a credit layer that makes crosschain transactions faster, more capital-efficient, and scalable.</p><p>With <strong>low-risk, high-reward liquidity pools</strong> for LPs and <strong>zero-collateral liquidity access for solvers</strong>, Sprinter Stash is reshaping the way liquidity moves in DeFi and beyond.</p><p>Stash goes live later this week, stay updated on how you can participate, and how you can earn rewards by following us on<strong> <a href="https://x.com/sprinter_ux?ref=blog.sprinter.tech"><strong>X</strong></a></strong>, joining our <a href="https://t.me/sprinter_tech?ref=blog.sprinter.tech" rel="noreferrer"><strong>Telegram</strong></a>, and reading more on our <a href="https://sprinter.tech/?ref=blog.sprinter.tech" rel="noreferrer"><strong>website</strong></a>. </p><p><strong>Join us to shape the future of onchain credit.</strong></p><hr><p>&#x1F4EC; Are you building a solver, PM system, or DeFi infra that needs crosschain liquidity? Reach out to us on <a href="https://x.com/sprinter_ux?ref=blog.sprinter.tech">X</a> or <a href="https://t.me/sprinter_tech?ref=blog.sprinter.tech" rel="noreferrer">Telegram</a>. We&#x2019;re onboarding early partners now.</p>]]></content:encoded></item><item><title><![CDATA[Building Economic Trust in Solver-Based Networks – Part 3: Reclaiming Efficient Markets]]></title><description><![CDATA[<p>This article is based on the talk &#x2018;Rethinking Competition in Solver-Based Networks&#x2019; given at Protocol Berg in Berlin June 13th 2025. (Watch it <a href="https://www.youtube.com/watch?v=VkCcCdD_DQk&amp;ref=blog.sprinter.tech" rel="noreferrer">here</a>)</p><p>In <a href="http://blog.sprinter.tech/building-economic-trust-in-solver-based-networks-part-2/" rel="noreferrer">Part 2</a>,&#xA0; we looked under the hood of real-world solver networks like CoW Protocol and Across. What we found was clear:</p><ul><li>A</li></ul>]]></description><link>http://blog.sprinter.tech/building-economic-trust-in-solver-based-networks-part-3/</link><guid isPermaLink="false">68a6fba24a37d30b099c96d2</guid><category><![CDATA[crosschain]]></category><category><![CDATA[Interoperability]]></category><category><![CDATA[solvers]]></category><category><![CDATA[sprinter]]></category><category><![CDATA[UX]]></category><category><![CDATA[Research]]></category><dc:creator><![CDATA[Alex Mueller]]></dc:creator><pubDate>Thu, 21 Aug 2025 11:14:54 GMT</pubDate><media:content url="http://blog.sprinter.tech/content/images/2025/08/POST.jpg" medium="image"/><content:encoded><![CDATA[<img src="http://blog.sprinter.tech/content/images/2025/08/POST.jpg" alt="Building Economic Trust in Solver-Based Networks &#x2013; Part 3: Reclaiming Efficient Markets"><p>This article is based on the talk &#x2018;Rethinking Competition in Solver-Based Networks&#x2019; given at Protocol Berg in Berlin June 13th 2025. (Watch it <a href="https://www.youtube.com/watch?v=VkCcCdD_DQk&amp;ref=blog.sprinter.tech" rel="noreferrer">here</a>)</p><p>In <a href="http://blog.sprinter.tech/building-economic-trust-in-solver-based-networks-part-2/" rel="noreferrer">Part 2</a>,&#xA0; we looked under the hood of real-world solver networks like CoW Protocol and Across. What we found was clear:</p><ul><li>A handful of solvers dominate execution and rewards</li><li>Most solvers operate at a loss or barely break even</li><li>Centralization is driven not by better algorithms &#x2014; but by access to private liquidity, infra scale, and privileged flows</li></ul><p>The current landscape is one where <strong>the appearance of competition masks the erosion of trust</strong>. And the longer these patterns persist, the harder it becomes for new solvers &#x2014; or new ideas &#x2014; to emerge. So what do we do now?</p><h3 id="groundhog-dayhaven%E2%80%99t-we-seen-this-before"><strong>Groundhog Day - Haven&#x2019;t we seen this before?</strong></h3><p>Before proposing solutions, it makes sense to take a look into areas that that have dealt/ are dealing with similar challenges:</p><ol><li><strong>Traditional Finance (TradFi)</strong>, which has spent decades regulating against market dominance and conflict of interest.</li><li><strong>Ethereum block building</strong>, where similar centralizing forces are playing out &#x2014; but where responses like PBS (Proposer-Builder Separation) - in the form of Buildernnet or ePBS -&#xA0; are emerging.</li></ol><h3 id="regulation-as-a-curator-of-free-markets-%E2%80%94-and-a-blueprint-for-built-in-accountability"><strong>Regulation as a Curator of Free Markets &#x2014; and a Blueprint for Built-In Accountability</strong></h3><p>When we hear &#x201C;regulation,&#x201D; it&#x2019;s easy to associate it with bureaucracy or red tape. But in healthy market systems, regulation plays a subtler, more foundational role: it curates freedom by keeping markets open, contestable, and fair. In TradFi, regulatory frameworks evolved to prevent dominant players from entrenching themselves, to reduce information asymmetries, and to ensure that coordination doesn&#x2019;t become control. These functions are just as relevant in the architecture of intent-based DeFi protocols.</p><p>In traditional finance, antitrust law limits monopolistic behavior and enforces market contestability. It ensures that even the most powerful market makers or brokers can&#x2019;t lock out newcomers by cornering access to liquidity or exploiting exclusive relationships. In DeFi, dominant solvers &#x2014; equipped with deep capital, private liquidity, and privileged venue access &#x2014; can create very similar exclusionary dynamics. If left unchecked, a few actors could dominate the intent landscape &#x2014; not because they offer the best service, but because they&#x2019;ve captured key infrastructure.</p><p>Structural separation is another legacy from TradFi that DeFi should take seriously. Regulations like MiFID II or the Glass-Steagall Act were introduced to prevent financial institutions from bundling roles in ways that created conflicts of interest. Yet today&#x2019;s solvers often handle quoting, routing, simulation, and settlement &#x2014; consolidating everything into a single opaque stack. Without protocol-level design nudges toward modularity, this consolidation becomes a bottleneck for competition and innovation.</p><p>Information asymmetry is another fundamental challenge. In traditional markets, mechanisms like the SIP feed (which ensures everyone sees the same market data) or IEX&#x2019;s latency equalization are there to curb unfair advantages. In DeFi, fast access to off-chain liquidity or exclusive CEX integrations often determine who wins. Techniques like commit-reveal quoting or shared liquidity indexes can act as DeFi-native forms of latency equalization &#x2014; not to slow anyone down, but to ensure fair visibility and access.</p><p>Regulatory structures also aim to prevent hidden subsidies and backdoor privileges. A trading firm with zero-fee access or CEX credit lines can offer better quotes than competitors &#x2014; but not necessarily in a sustainable or transparent way. Without clear disclosures or leveling mechanisms, such advantages distort what should be an open market for intents.</p><p>Regulation in TradFi doesn&#x2019;t just police bad actors &#x2014; it provides the public infrastructure that makes trust possible. Whether it&#x2019;s licensing regimes, capital requirements, or transparency standards, these mechanisms shift trust from actors to systems. That&#x2019;s the same direction intent-based protocols should be heading. Verifiable execution, shared mempools, and neutral auction mechanisms are the scaffolding for economic trust.</p><p>Traditionally, this has operated through ex post oversight: regulation governs outcomes and enforces fairness through audits, reporting, and supervisory enforcement &#x2014; typically applied after the fact. To enable this, regulators rely on institutionalized self-regulation: firms are expected not only to follow rules, but to build validation systems that demonstrate adherence.</p><p>In crypto, we often talk about &#x201C;transparency&#x201D; or &#x201C;public data&#x201D; &#x2014; but that alone doesn&#x2019;t constitute regulation. What makes crypto special is the ability to replace institutional self-regulation with cryptographic and protocol-level guarantees. In other words: programmed validation and contestability, applied in near real timeIn intent-based systems, some regulatory functions may be taken up by protocol governance &#x2014; curating incentives, enforcing fairness standards, and protecting market structure. But it&apos;s not obvious that this is the right or only place for such functions. Depending on how the ecosystem evolves, these roles might live at other layers: in L1 intent standards, shared execution infrastructure, or inter-protocol coordination bodies.</p><p>Right now, what&#x2019;s more important than the location of these responsibilities is that they exist &#x2014; and that they are designed to manage the same systemic risks TradFi regulators once addressed: monopolistic behavior, structural opacity, and exclusionary access.</p><p>Yet implementing these checks is hard when protocols face conflicting incentives. Rules that promote sustainability &#x2014; like quote visibility, fair access to liquidity, or solver diversity &#x2014; may reduce competitiveness in the short term. And since each protocol competes for orderflow, few are willing to make the first move. That&#x2019;s how we end up in a kind of regulatory coordination failure &#x2014; what might be called crypto&#x2019;s Three-Body Problem.</p><p>&#x201C;Crypto&#x2019;s Three-Body Problem&#x201D; is about balancing decentralization, efficiency, and user protection &#x2014; in systems with no central coordinator and no agreed-upon arbiter.</p><p>&#x2014;<a href="https://otherinter.net/research/three-body-problem/?ref=blog.sprinter.tech"> Other Internet</a></p><figure class="kg-card kg-image-card"><img src="http://blog.sprinter.tech/content/images/2025/08/Mechanism.svg" class="kg-image" alt="Building Economic Trust in Solver-Based Networks &#x2013; Part 3: Reclaiming Efficient Markets" loading="lazy" width="1462" height="696"></figure><h3 id="ethereum-block-production-solvers-have-been-here-before"><strong>Ethereum Block Production: Solvers Have Been Here Before</strong></h3><p>Block builders operate in a competitive environment that closely mirrors the dynamics of solver-based networks. Over the past two years builder competition has become increasingly concentrated. A small handful of builders now consistently win the majority of blocks &#x2014; not necessarily due to better algorithms, but because of privileged access to private order flow, tight vertical integration with wallets and searchers, and advanced infrastructure for simulation and bid submission.</p><p>This centralization trend accelerated following Ethereum&#x2019;s transition to Proof-of-Stake and the introduction of MEV-Boost in late 2022. While MEV-Boost formally separated block proposers from builders, it also allowed builders to aggregate transaction flow and extract maximum value from it. By mid-2024, just a few builders &#x2014; including rsync-builder, Titan, and beaverbuild &#x2014; were responsible for over 80% of blocks on MEV-Boost relays.</p><p>At the same time, wallet integrations such as <a href="https://www.flashbots.net/?ref=blog.sprinter.tech" rel="noreferrer">Flashbots</a> Protect and MEV Blocker began funnelling user transactions directly to preferred builders, reinforcing a feedback loop of exclusive flow and execution dominance.</p><figure class="kg-card kg-image-card"><img src="http://blog.sprinter.tech/content/images/2025/08/Alpha-Source.svg" class="kg-image" alt="Building Economic Trust in Solver-Based Networks &#x2013; Part 3: Reclaiming Efficient Markets" loading="lazy" width="1462" height="696"></figure><p>Protocol extensions like <strong>PBS (Proposer-Builder Separation)</strong> and initiatives like <strong>Buildernet </strong>aim to address this by modularizing the builder role and enforcing more neutral execution, but implementation is still evolving. Solver networks may face the same questions &#x2014; and may require similar architectural interventions.</p><h3 id="pillars-of-decentralized-solving-shared-infrastructure-as-a-competitive-equalizer"><strong>Pillars of Decentralized Solving: Shared Infrastructure as a Competitive Equalizer</strong></h3><p>Today, solving intent-based protocols is expensive &#x2014; not just in capital, but in engineering. Each solver team builds and maintains its own infrastructure for liquidity discovery, route computation, quote evaluation, and execution. This duplication is wasteful, but more importantly, it creates steep barriers to entry. Only well-capitalized teams can afford to compete.</p><p>One way forward is to rethink what infrastructure needs to be private &#x2014; and what could be public.</p><p>Protocols could establish shared primitives like a public liquidity index, a common routing and quoting library, and neutral relay layers. These wouldn&#x2019;t remove competition, but they&#x2019;d refocus it. Rather than everyone solving the same baseline engineering problem, competition would center on strategy, specialization, and responsiveness.</p><p>Baseline execution could be governed via SLA-style mechanisms, where any party can execute a route under a quality-guaranteed model. Solvers who contribute better or faster routes on top of the shared baseline could earn discovery premiums, rather than having to maintain end-to-end infra to capture value.</p><p>This isn&#x2019;t just a novel design idea &#x2014; it echoes lessons from TradFi but also systemically important infrastructure.</p><p>In traditional finance, public infrastructure plays a central role in keeping markets fair and contestable. From consolidated price feeds (like SIP in the US) to clearing networks and neutral auction venues, the goal is always the same: to prevent dominant players from winning by controlling the rails.</p><p>DeFi protocols can follow suit. Shared solving infrastructure, if developed as a public good, levels the playing field and ensures that solver success is based on skill rather than privileged access, exclusive deals, or opaque vertical integration.</p><p>It also enables functional role separation, another staple of well-regulated markets. In TradFi, exchanges, market makers, and clearing agents are structurally distinct because bundling them leads to conflicts of interest. In DeFi, solvers are increasingly full-stack: they route, quote, simulate, settle &#x2014; and increasingly even control the frontend. That consolidation poses systemic risks.</p><p>The solution isn&#x2019;t to ban vertical integration, but to offer credible public alternatives. Shared fee estimators, liquidity indexes, and quoting interfaces make it possible for small or specialized teams to participate, and make it harder for any one actor to dominate.</p><p>Just as TradFi uses antitrust tools to protect market structure, DeFi protocols should treat shared infrastructure as a strategic defence: not just for efficiency, but to preserve contestability and innovation in the long run.</p><figure class="kg-card kg-image-card"><img src="http://blog.sprinter.tech/content/images/2025/08/Component.svg" class="kg-image" alt="Building Economic Trust in Solver-Based Networks &#x2013; Part 3: Reclaiming Efficient Markets" loading="lazy" width="1462" height="544"></figure><h3 id="role-separation-unbundling-routing-quoting-and-execution"><strong>Role Separation: Unbundling Routing, Quoting, and Execution</strong></h3><p>Vertical integration &#x2014; where solvers handle quoting, routing, and execution end-to-end &#x2014; creates a larger surface for centralization and limits ecosystem diversity. By decoupling these roles, protocols can encourage a more modular architecture where each component evolves independently, can be benchmarked transparently, and reused across implementations.</p><p>Rather than allowing solvers to perform all functions in a single opaque stack, protocols can define distinct competitive models tailored to each role:</p><figure class="kg-card kg-image-card"><img src="http://blog.sprinter.tech/content/images/2025/08/Function.svg" class="kg-image" alt="Building Economic Trust in Solver-Based Networks &#x2013; Part 3: Reclaiming Efficient Markets" loading="lazy" width="1462" height="600"></figure><p>This role-based separation helps shift the competitive dynamic away from resource-driven dominance and toward open, strategy-based participation &#x2014; strengthening decentralization and long-term protocol resilience.</p><h3 id="shared-liquidity-index-removing-duplicated-discovery-efforts"><strong>Shared Liquidity Index: Removing duplicated discovery efforts</strong></h3><p>Today, solvers compete largely on the basis of their internal infrastructure &#x2014; the speed and accuracy with which they can discover and model fragmented liquidity across venues. This is very inefficient as it creates a lot of duplicated work, without tangible market improvements. A shared Liquidity Index levels the playing field by making real-time market data <strong>a network/chain-level public good</strong>.</p><p>Instead of requiring each solver to maintain its own integrations, liquidity sources themselves &#x2014; such as AMMs, PMMs and other RFQ venues &#x2014; publish updates (price curves, token pairs, sizes) into a shared registry. These updates can be signed messages or on-chain events and are consumed by all solvers equally.</p><p>This reduces infrastructure overhead, improves transparency, and aligns with the ethos of DeFi: composability and openness.</p><h3 id="public-liquidity-only-redirecting-private-liquidity-to-public-interfaces"><strong>Public Liquidity Only: Redirecting Private Liquidity to Public Interfaces</strong></h3><p>Access to private liquidity &#x2014; whether through private market makers, prime brokers, or exclusive RFQ endpoints &#x2014; remains one of the most significant advantages for solvers today. To mitigate this, protocols can build on the concept of a shared liquidity index by requiring that all liquidity sources be accessible to all participating solvers and published through the shared index. This would incentivize private liquidity providers to route their flow through the same public interfaces used by AMMs and open RFQ venues, leveling the playing field and reinforcing transparency.</p><h3 id="reclaiming-efficient-markets-from-infrastructure-to-trust">Reclaiming Efficient Markets: From Infrastructure to Trust</h3><p>Intent-based protocols promised to unlock more expressive, user-centric coordination &#x2014; but that promise is increasingly at risk. As in block production and TradFi before it, consolidation in solver networks is driven less by superior performance and more by control over infrastructure, liquidity, and privileged access. The appearance of competition masks a deeper structural imbalance.</p><p>What history teaches us &#x2014; from antitrust enforcement to Ethereum&#x2019;s own builder ecosystem &#x2014; is that markets do not remain open by default. Contestability must be engineered. Protocols must choose to embed fairness into their architecture: through shared infrastructure, unbundled roles, and neutral access layers that prevent vertical dominance.</p><p>Just as TradFi regulation evolved to preserve competitive integrity, intent-based DeFi must develop its own mechanisms &#x2014; not to impose bureaucracy, but to encode openness. This is about moving from trust in actors to trust in systems: systems that are auditable, modular, and resistant to capture.</p><p>The path forward is not about eliminating competition &#x2014; it&#x2019;s about re-aligning it. When baseline infrastructure is shared, differentiation moves to strategy, responsiveness, and innovation &#x2014; not relationship-driven advantages. That&#x2019;s how new solvers enter, new ideas thrive, and trust in the ecosystem grows stronger over time.</p><h3 id="thank-you">Thank You</h3><p>A huge thanks to the teams at <a href="flashbots.net" rel="noreferrer">Flashbots</a>, <a href="https://barterswap.xyz/?ref=blog.sprinter.tech" rel="noreferrer">Barter</a>, <a href="https://li.fi/?ref=blog.sprinter.tech" rel="noreferrer">Li.Fi</a> &amp; <a href="https://www.propellerheads.xyz/?ref=blog.sprinter.tech" rel="noreferrer">Propeller Heads</a> for the discussions and inspiration!</p><p>If you&#x2019;re a solver, protocol designer, or researcher, we&#x2019;d love to hear your thoughts and keep the dialogue going!</p><p><strong>Join us on our mission to shape the future of crosschain!</strong></p><p>&#x1F3C3;&#x200D;&#x2642;&#xFE0F; Follow us on <a href="https://x.com/sprinter_ux?ref=blog.buildwithsygma.com">X</a></p><p>&#x1F3C3;Visit us at <a href="sprinter.tech" rel="noreferrer">sprinter.tech</a></p>]]></content:encoded></item><item><title><![CDATA[Building Economic Trust in Solver-Based Networks – Part 2: The State of Competition]]></title><description><![CDATA[This post explores how today's competition models in solver-based protocols are evolving — and in some cases, replicating the same centralization dynamics we hoped to escape. ]]></description><link>http://blog.sprinter.tech/building-economic-trust-in-solver-based-networks-part-2/</link><guid isPermaLink="false">686fb9364a37d30b099c8838</guid><category><![CDATA[Research]]></category><category><![CDATA[crosschain]]></category><category><![CDATA[sprinter]]></category><category><![CDATA[solvers]]></category><dc:creator><![CDATA[Alex Mueller]]></dc:creator><pubDate>Thu, 10 Jul 2025 14:33:28 GMT</pubDate><media:content url="http://blog.sprinter.tech/content/images/2025/07/POST.png" medium="image"/><content:encoded><![CDATA[<img src="http://blog.sprinter.tech/content/images/2025/07/POST.png" alt="Building Economic Trust in Solver-Based Networks &#x2013; Part 2: The State of Competition"><p>This article is based on the talk &#x2018;<a href="https://watch.protocol.berlin/65a90bf47932ebe436ba9351/playlists/6854101390bd41297b511acc?video=6855593390bd41297b2e32ee&amp;ref=blog.sprinter.tech">Rethinking Competition in Solver-Based Networks</a>&#x2019; given at Protocol Berg in Berlin, June 13th 2025. </p><p>In <a href="http://blog.sprinter.tech/building-economic-trust-in-solver-based-networks-part-1/">Part 1</a>, we introduced the concept of economic trust as a necessary complement to cryptographic trust in solver-based networks. We argued that economic trust is not just about verifying code or signatures, it&#x2019;s about trusting systems of incentives, access, and enforcement to produce outcomes that are fair, resilient, and decentralized.</p><p>But trust doesn&#x2019;t emerge in a vacuum. It is shaped, in large part, by the <strong>market structures</strong> in which solvers operate. In Part 2, we explore how today&apos;s competition models in solver-based protocols are evolving &#x2014; and in some cases, replicating the same centralization dynamics we hoped to escape.&#xA0;</p><h3 id="the-rising-costs-of-being-a-solver"><strong>The Rising Costs of Being a Solver</strong></h3><p>Solving typically unfolds in five key steps. While the general structure holds across intent types, the specifics, especially around execution and risk, can vary significantly. First, let&#x2019;s walk through the common process. Then we&#x2019;ll compare how it applies across different solving contexts:</p><figure class="kg-card kg-image-card"><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXdQZDF8HfdG2u2WdLG9NPWrAaB1YUYJRL6V5VjbikJkjkbKQtalzBYbr0kmjgslbjS0OmPjCJHcKC0w0_BSjOuukbHMu-I639TwbuGxpoPS_s5ThtDkt1pFlj18hv8fls7ucUM-nQ?key=iYtAB4LMUgeLhG-XP1zsbw" class="kg-image" alt="Building Economic Trust in Solver-Based Networks &#x2013; Part 2: The State of Competition" loading="lazy" width="624" height="703"></figure><p>Each of these tasks requires building out and maintaining infrastructure: real-time data ingestion, fast simulation engines, and tightly coupled onchain/offchain orchestration. Therefore running a production-grade solver is no longer a weekend project - assuming you want to capture at least 1% of relevant order flow.&#xA0;</p><p>Based on our own experience and discussions with numerous solver teams across different protocols, we estimate that costs for operating a production-grade solver typically range from <strong>$13,000 to $26,000/month</strong>. And that&#x2019;s before accounting for penalties, slashing, or capital lock-ups.</p><h3 id="the-state-of-solver-competition-case-studies-from-the-field"><strong>The State of Solver-Competition: Case Studies from the Field</strong></h3><p>Let&#x2019;s look at two prominent protocols: <a href="https://cow.fi/?ref=blog.sprinter.tech"><strong>CoW Protocol</strong></a> and <a href="https://across.to/?ref=blog.sprinter.tech"><strong>Across</strong></a>.&#xA0;</p><figure class="kg-card kg-image-card"><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXdO008GrRikg9Mr9rZMxFfNHGALu8zI-zUiFI9IU4QgUE_EL8UBwHk1MKSwBObZk0Yto-yHHTz2VUG5app7TiGdD-G6ol63Opckuq64zbEXMeK8azKiMMNYcOrvLdHKBN5nR0FiRA?key=iYtAB4LMUgeLhG-XP1zsbw" class="kg-image" alt="Building Economic Trust in Solver-Based Networks &#x2013; Part 2: The State of Competition" loading="lazy" width="624" height="385"></figure><p>We analyzed profits and solver participation for both for the first four months of 2025 based on the available on-chain data (mostly Dune) and anonymized the solver names.&#xA0;</p><h3 id="cow-swap-%E2%80%93-trading-volume-rewards">CoW Swap &#x2013; Trading Volume &amp; Rewards</h3><p></p><figure class="kg-card kg-image-card"><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXenZV1A7eiTtI2AennPiccV1eD8vjkEVQU-_okCBEjTwYl8yiIq9JQUiBHpU6tCEBKQRayxWbdJYQgDRVE7IjF3fOUhmHmA4zMmOT1f0nIMNA-zWZrNh-OM-GfeVAgRKx1r2H0R?key=iYtAB4LMUgeLhG-XP1zsbw" class="kg-image" alt="Building Economic Trust in Solver-Based Networks &#x2013; Part 2: The State of Competition" loading="lazy" width="296" height="334"></figure><figure class="kg-card kg-image-card"><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXclvocvBOfDPzrVusCjlWUkL3AFpYuJKeTOmnM5uqFwHkqMJA1EOFOBTza4G-KwfrkhJJkoa7ZsrZwmRItgGFS3CTCcvyeC6_tmKDCPgOxY9Csx_r0qwxEgPnOhyhzXUdXQQqi8OQ?key=iYtAB4LMUgeLhG-XP1zsbw" class="kg-image" alt="Building Economic Trust in Solver-Based Networks &#x2013; Part 2: The State of Competition" loading="lazy" width="299" height="335"></figure><p>The data shows that out of 28 total solvers active on CoW Protocol, only 12 handled more than 1% of trading volume in the first four months of 2025. Remarkably, just three solvers account for over 50% of all volume, underscoring a steep concentration of execution power.&#xA0;</p><p>The rewards picture is even more top-heavy. Among the top three solvers, one stands out as an outlier&#x2014;capturing nearly 50% of all rewards.</p><p>It&#x2019;s important to note, that the reported rewards here are pure protocol rewards as reported by CoW and solvers might have other sources of revenue from arbitrage and/ or positive slippage for example that we are going to analyze at a future time.&#xA0;</p><figure class="kg-card kg-image-card"><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXeEdVPlgwvOex91F6yPBC2cB2cy0WgTH_-sDUV_feo4LI9zv2uuXAUqCIC2xzdn6fnOZPq34fDVvJS5GuNsG8TlyYTeZKVjSSbHyi4ALIwld6CNEF8SPaML1Qrz9p3XEwFhkHHibw?key=iYtAB4LMUgeLhG-XP1zsbw" class="kg-image" alt="Building Economic Trust in Solver-Based Networks &#x2013; Part 2: The State of Competition" loading="lazy" width="520" height="394"></figure><p>The chart plots the share of ideal rewards captured by each solver over the analysis period. The x-axis shows individual solver identities (anonymized), while the y-axis reflects the percentage of ideal rewards successfully captured. Ideal rewards refer to the maximum reward available to a solver upon winning an auction, assuming optimal execution and successful settlement. The green band reflects, based on the cost estimations above - the survival zone of solvers where we assume solvers to be able to cover their costs.&#xA0;</p><p>In response to community feedback, we refined our analysis by including quote rewards, which account for a non-trivial share of income for some solvers. We highlight in yellow those solvers whose position shifts into the estimated survival zone due to these rewards. While this adjustment does improve the outlook for a few actors the broader distribution remains consistent: a handful of solvers extract most of the rewards, and the rest remain under persistent pressure. The underlying asymmetry tied to access to liquidity, inventory, and infrastructure<strong> </strong>continues to dominate.</p><figure class="kg-card kg-image-card"><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXfvEvpDHS9vRwqK7cFhLo8wMXoEKgh5qVqQmuT4s3ZX0eeZOh8DZgpAyRiuOMI3atwvGOHBtR64CQ94EfhxSrSMtSC6VEIMgsxz7vxXbuTT76RY7Mxnxe4cuVd5yzutxeVgxbiTpQ?key=iYtAB4LMUgeLhG-XP1zsbw" class="kg-image" alt="Building Economic Trust in Solver-Based Networks &#x2013; Part 2: The State of Competition" loading="lazy" width="520" height="395"></figure><p></p><p>Based on observed auction behaviour, we identify four strategic solver archetypes:&#xA0;</p><ul><li><strong>Noisy Solvers (Grey):</strong> Characterized by sporadic participation and inconsistent performance. These solvers likely operate with limited alpha, generic heuristics, or outdated strategies. Their wins are infrequent and appear more random than targeted. This group likely includes altruistic solvers motivated by non-monetary goals&#x2014;such as providing backstop liquidity or supporting specific protocols&#x2014;as well as lean independent teams operating with minimal costs. From a systemic perspective they are unlikely to reliably challenge the pricing of top solvers, particularly those with scale, capital, and privileged liquidity access.</li><li><strong>Optimizers (Orange):</strong> Solvers who focus on onchain liquidity and routing, attempting to win a high number of auctions by offering attractive prices. This comes at the cost of higher settlement risk &#x2014; particularly in cases of volatile public liquidity.</li><li><strong>Multi-Strategy Solvers (Olive): </strong>These solvers balance selectivity and infrastructure sophistication. Likely using private liquidity in certain paths or fallback strategies, they maintain lower failure rates while staying close to break-even. Their approach appears to be about survival through efficiency, not dominance.</li><li><strong>Vertically Integrated Solvers (Green):</strong> A class of full-stack operators combining deep capital, internal inventory, CEX connectivity, and minimal reliance on public liquidity. These solvers win selectively, capturing high-value intents where they can extract the full spread with low failure risk. Their edge often stems from privileged relationships &#x2014; including low or zero trading fees, direct CEX access, or even preferential credit lines &#x2014; and may extend to alignment with builders or validators, further consolidating control.</li></ul><p>The chart clearly shows a two class solver landscape &#x2014; where access to privileged liquidity separates the top performers from the rest of the competition.</p><p>After presenting this analysis, we received valuable feedback from the CoW Protocol community, specifically pointing to nuances in solver profitability and strategy that are not fully captured in our current data lens. A few key points:</p><ul><li><strong>Cost models vary widely</strong>: Some solvers operate lean, even part-time, while others resemble prop trading firms with significant infrastructure budgets. This means our baseline cost estimates likely represent an upper-middle range.</li><li><strong>Profit beyond protocol rewards</strong>: Solvers with alpha on certain routes or privileged liquidity access may extract profit outside of the reward mechanism. For example, quoting strategies, retained slippage, profits from arbitrage or optimized flow execution could yield additional margins not visible in reward capture metrics.</li><li><strong>Survivorship bias &amp; persistence</strong>: While charts show stark reward concentration, the long-term presence of many solvers suggests some are sustainably profitable in ways not directly observable from public reward data alone.</li></ul><p><strong>Our response to this:&#xA0;</strong></p><p>We fully agree that solver strategies and infrastructure vary widely, and that profitability can be augmented through alpha extraction, preferential liquidity access, and cross-protocol optimization that are not fully captured by our analysis.</p><p>Furthermore it&#x2019;s a bit simplistic to infer profitability from rewards alone, especially in a landscape where short-term losses may be accepted to build positioning/ reputation or gain market share. That said, comparisons to ultra-lean solver or one person setups &#x2014; while valid, should be made with caution. These operations may indeed exist and succeed today, but they are often idiosyncratic, difficult to replicate, and may not scale sustainably in a competitive or professionalizing ecosystem. Designing protocol dynamics with these edge cases as the baseline risks underestimating the infrastructure investment required for a resilient and diverse solver set.However, we believe reward capture data reveals behavioral clusters that hint at distinct operational solver archetypes as we have described above. We see this clustering as useful for interpreting solver strategies&#x2014;beyond binary profitability metrics. We&#x2019;re continuing to refine our methodology and welcome more collaborative insight from teams active in the space.</p><h3 id="across-protocol%E2%80%93-trading-volume-rewards">Across Protocol&#x2013; Trading Volume &amp; Rewards</h3><figure class="kg-card kg-image-card"><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXd6QHMN6cyYsZwSP5QVd75K_Da-MJLuu2xSxU-cn_DvwZsGXWDgW84FZL7z7jlCNA4MBhpH8o323nnmC8l-nZuApDsaijHssBJKLVf2BR5CTsbUI8s0gxhE_YVFXrEM9X69dmS9fg?key=iYtAB4LMUgeLhG-XP1zsbw" class="kg-image" alt="Building Economic Trust in Solver-Based Networks &#x2013; Part 2: The State of Competition" loading="lazy" width="307" height="344"></figure><figure class="kg-card kg-image-card"><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXd2mKhp6i7Ugk_yvC5LiKLYGZwlctmGwHZaGA6SHHYAPzjzMM0YGmI9cZJ6w3LVTfhkdx4omrX0pmA5qdCOnYqbu5mHIh-dBK2uIchQy2k3pzuTKa1-Y66lRs4GDZn9gZ_1Im6c?key=iYtAB4LMUgeLhG-XP1zsbw" class="kg-image" alt="Building Economic Trust in Solver-Based Networks &#x2013; Part 2: The State of Competition" loading="lazy" width="307" height="343"></figure><p>The chart provides a view of solvers and their respective share of volume and rewards (revenue) in the first four months of 2025. What we observe:</p><ul><li><strong>$4.6 billion USD</strong> in total volume, <strong>10 out of 78 solvers</strong> process at least 1% of this volume.</li><li><strong>&apos;Nessus&apos;</strong>, the solver operated by the team behind Across, covers the largest share of the bridge volume. This solver does not really take part in competition: it waits for other solvers to fill and only steps in as a last resort. That this solver is capturing roughly half of the volume might indicate that there are not enough incentives for other solvers to capture this volume and/ or hold the required inventory needed.</li><li>The rewards distribution broadly mirrors the volume curve: <strong>a few solvers dominate</strong>, while most only contribute minimally to the overall economic activity.</li></ul><figure class="kg-card kg-image-card"><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXcFobFX3_F84-mlg1IJapLc8bR4Y-jlZYlO8RknJho2j7WASSRF1E4qWpNlvJiZRpz3_Jdslnv_3MOJXPBgLqs-N2E3Q8scedTtpQfJ5MBThzLIdgEqUt1I0pj8oN4sFw3QQ0_qMQ?key=iYtAB4LMUgeLhG-XP1zsbw" class="kg-image" alt="Building Economic Trust in Solver-Based Networks &#x2013; Part 2: The State of Competition" loading="lazy" width="517" height="395"></figure><p>This chart examines for participating solvers the bridge volume in Millions handled as well as the achieved revenue rate (in basis points - bps) for that volume. The green band reflects, based on the cost estimations above - the survival zone of solvers where we assume solvers to be able to cover their costs. Furthermore the solver dot size indicated the amount of available inventory in US Dollars.</p><p><strong>What we observe:</strong></p><ul><li>Out of 78 total solvers,<strong>&#xA0;5 to 10&#xA0; solvers are profitable under the cost assumptions&#xA0; made&#xA0;</strong>&#x2014; one of which is external (Lichas).</li><li>The top-performing external solver &#x2018;Lichas&#x2019; benefits from <strong>significantly more liquidity</strong>&#x2014;holding over <strong>$3.7 million USD</strong> in inventory, compared to less than $600k for most peers.This liquidity advantage enables economies of scale as it substantially reduces rebalancing costs and enables to fill more tokens and larger orders.</li></ul><p>After publishing our analysis, we received valuable feedback from the Across team, particularly around solver costs, data assumptions, and the broader ecosystem structure. Below we respond to some of the key points raised:</p><p><strong>Cost Assumptions</strong></p><p>We agree that the cost to run an Across solver is likely on the lower end or even below the mentioned range of&#xA0; $13,000&#x2013;$26,000/month, particularly compared to more complex solving environments like CoW Protocol. A number of lean, one-person solver setups exist and in some cases are quite profitable. However, our goal was to show the spectrum of operational complexity across different solver networks, with CoW and Across representing two useful endpoints.</p><p>From a systemic perspective, relying on one-person solvers is risky, kind of like in the Uber model: great at first when market expansion is incentivized, but not necessarily sustainable once incentives and costs normalize. And realistically, most indie teams won&#x2019;t be able to beat professional top solvers long-term</p><p><strong>Clarifications on Methodology used</strong></p><ul><li><strong>Reward BPS</strong>: Our revenue rates account for gas costs, but not failed transactions. Including failure-related costs (especially for fills without reimbursements) would likely worsen the outlook for some solvers. We also tracked priority fees, and noticed that some solvers pay up to 25% of potential revenue in tips&#x2014;an often-overlooked factor.</li><li><strong>Inventory Sizing</strong>: To estimate solver liquidity, we sampled wallet balances over time. For each solver, we used the maximum sustained balance (held for at least x consecutive days) to approximate minimum accessible capital. This method is imperfect&#x2014;it misses private rebalancing strategies, shared capital pools, and non-transparent funding sources&#x2014;but gives a directional sense of who holds inventory advantage.</li><li><strong>Rebalancing Costs</strong>: These are a critical missing component. Due to a lack of standardized reporting or public visibility, we didn&#x2019;t include them. If better heuristics or tools emerge, we&#x2019;d love to incorporate them into future versions.</li><li><strong>Solver Landscape: </strong>Across&apos;s high number of solvers relative to CoW is likely a direct function of <strong>low entry barriers and permissionless participation</strong>. This is a strength, but also means a long tail of solvers may remain economically unviable over time. In contrast, CoW&#x2019;s permissioned structure and high bond requirements create natural gatekeeping and lead to a more concentrated solver set.</li></ul><p><strong>Potential Future Research</strong></p><ul><li><strong>Inferred cost</strong>, i.e. asking what cost level would make X% of solvers profitable based on observed rewards. We&#x2019;re exploring this approach, but it depends heavily on improving our underlying cost and revenue models.</li></ul><h3 id="summary-what-we%E2%80%99ve-learned-from-cow-and-across"><strong>Summary: What We&#x2019;ve Learned from CoW and Across</strong></h3><p>Analyzing CoW Protocol and Across side by side highlights several structural realities of today&#x2019;s solver markets:</p><ul><li><strong>Winner-takes-all dynamics</strong>: A small number of top solvers dominate volume and rewards.</li><li><strong>Most professional solvers aren&#x2019;t profitable</strong>: While user welfare improves, margins remain thin for the majority of participants. Solving is largely a reputation game and solvers are looking for other areas of revenue such as Arbitrage/MEV, Solver Infrastructure or privatizing orderflow via dedicated Swap APIs.</li><li><strong>Liquidity access is key</strong>: The biggest centralizing forces are capital requirements and access to non-public liquidity&#x2014;far more than logic or latency.</li><li><strong>Protocol-level improvements are underway</strong>, but current adjustments are unlikely to shift the underlying incentives in a meaningful way.</li></ul><p>These findings underscore the need to design not just for user welfare, but for contestability, sustainability, and long-term resilience.&#xA0;</p><p>Looking ahead, Part 3 will explore potential solutions to these challenges by drawing insights from traditional finance and the ethereum builder landscape, to help build more resilient, fair, and sustainable solver-based networks.</p><hr><h3 id="thank-you"><strong>Thank You</strong></h3><p>We&#x2019;re incredibly grateful to the teams at <strong>Across</strong> and <strong>CoW Protocol</strong> for their thoughtful, constructive feedback. Their openness, technical insight, and willingness to engage critically helped surface important nuances we couldn&#x2019;t have captured alone.</p><p>The goal here isn&#x2019;t to discredit the involved protocols or present a final or definitive model, but to <strong>kickstart a deeper conversation around solver economics, sustainability, and protocol design</strong>. We hope it encourages more open data, better tooling, and ultimately, healthier competition across the ecosystem.</p><p>If you&#x2019;re a solver, protocol designer, or researcher, we&#x2019;d love to hear your thoughts and keep the dialogue going!</p><p><strong>Join us on our mission to shape the future of crosschain!</strong></p><p>&#x1F3C3;&#x200D;&#x2642;&#xFE0F; Follow us on&#xA0;<a href="https://x.com/sprinter_ux?ref=blog.buildwithsygma.com">X</a></p><p>&#x1F3C3;Visit us at&#xA0;<a href="https://sprinter.tech/?ref=blog.sprinter.tech">Sprinter.tech</a></p>]]></content:encoded></item><item><title><![CDATA[Building Economic Trust in Solver-Based Networks – Part 1]]></title><description><![CDATA[<h3 id="what-is-economic-trust-and-why-does-solver-based-execution-need-it"><strong>What is Economic Trust, and why does Solver-Based Execution need it?</strong></h3><p>As intent-based DeFi architectures evolve, the role of <strong>solvers</strong>&#x2014;the agents responsible for fulfilling user intents&#x2014;has become increasingly central. Solvers compete to route trades, bridge assets, or bundle transactions across chains. They are the execution layer</p>]]></description><link>http://blog.sprinter.tech/building-economic-trust-in-solver-based-networks-part-1/</link><guid isPermaLink="false">680a426c4a37d30b099c879b</guid><dc:creator><![CDATA[Alex Mueller]]></dc:creator><pubDate>Thu, 24 Apr 2025 17:03:30 GMT</pubDate><media:content url="http://blog.sprinter.tech/content/images/2025/04/POST-1.png" medium="image"/><content:encoded><![CDATA[<h3 id="what-is-economic-trust-and-why-does-solver-based-execution-need-it"><strong>What is Economic Trust, and why does Solver-Based Execution need it?</strong></h3><img src="http://blog.sprinter.tech/content/images/2025/04/POST-1.png" alt="Building Economic Trust in Solver-Based Networks &#x2013; Part 1"><p>As intent-based DeFi architectures evolve, the role of <strong>solvers</strong>&#x2014;the agents responsible for fulfilling user intents&#x2014;has become increasingly central. Solvers compete to route trades, bridge assets, or bundle transactions across chains. They are the execution layer behind the abstraction.</p><p>Yet, despite the innovation, a fundamental question emerges: <strong>Can we trust these systems&#x2014;not just cryptographically, but economically?</strong></p><p>In this article, we&#x2019;ll define what <strong>economic trust</strong> means in solver-based networks, why it&apos;s essential, and how we can build it. We&#x2019;ll start by introducing a six-part framework for understanding trust in DeFi execution systems, then explore how systems in traditional finance approach economic trust.&#xA0;</p><hr><h3 id="what-is-economic-trust"><strong>What is Economic Trust?</strong></h3><p>In cryptographic systems, we trust code: smart contracts do exactly what they&#x2019;re programmed to do. But when it comes to <strong>solvers</strong>, we&#x2019;re relying on off-chain actors to behave in economically fair and competitive ways&#x2014;choosing optimal paths, pricing honestly, and not abusing their privileged execution role.</p><p>So, what is <strong>economic trust</strong>?</p><p><strong>Economic trust is the confidence that a system of incentives, rules, and access will consistently produce fair, competitive, and efficient outcomes&#x2014;even when participants act in their own self-interest.</strong></p><p>This is particularly important in <strong>solver-based systems</strong>, where:</p><ul><li>Users can&apos;t directly verify how execution decisions were made</li><li>Solvers may selectively fulfill only profitable trades</li><li>Protocols may design auction systems or selection mechanisms that advantage certain players</li></ul><p>If trust breaks down, so does participation. Users leave. Solvers centralize. Protocols become brittle.</p><hr><h3 id="the-six-dimensions-of-economic-trust"><strong>The Six Dimensions of Economic Trust</strong></h3><p>To build solver networks that scale and remain fair, we need more than just open APIs or auction systems&#x2014;we need to design around <strong>six interlocking dimensions</strong> that together create a foundation of economic trust.</p><p></p><style>
  .table-container {
    overflow-x: auto;
    -webkit-overflow-scrolling: touch;
    margin: 1rem 0;
  }

  .styled-table {
    width: 100%;
    border-collapse: collapse;
    font-family: sans-serif;
    font-size: 16px;
    min-width: 600px;
  }

  .styled-table thead {
    background-color: #f2f2f2;
  }

  .styled-table th,
  .styled-table td {
    border: 1px solid #ddd;
    padding: 12px;
    text-align: left;
    vertical-align: top;
  }

  .styled-table th {
    font-weight: bold;
  }
</style>

<div class="table-container">
  <table class="styled-table">
    <thead>
      <tr>
        <th>Aspect</th>
        <th>Description</th>
        <th>Why It Matters</th>
      </tr>
    </thead>
    <tbody>
      <tr>
        <td>Access</td>
        <td>Who can participate as a solver? Is entry permissioned or open?</td>
        <td>Prevents gatekeeping and concentration of power.</td>
      </tr>
      <tr>
        <td>Regulate</td>
        <td>How is behavior governed? Are rules explicit and visible?</td>
        <td>Ensures predictability, reduces reliance on social trust.</td>
      </tr>
      <tr>
        <td>Execution</td>
        <td>Are solvers executing honestly and efficiently?</td>
        <td>Builds confidence, prevents extractive behavior.</td>
      </tr>
      <tr>
        <td>Outcome</td>
        <td>Are users receiving fair pricing, low slippage?</td>
        <td>Aligns incentives between solvers and users.</td>
      </tr>
      <tr>
        <td>Risk</td>
        <td>Who bears risks (slippage, volatility)?</td>
        <td>Encourages sustainable competition.</td>
      </tr>
      <tr>
        <td>Incentive Align.</td>
        <td>Are solvers rewarded for good behavior and penalized for manipulation?</td>
        <td>Reinforces economic trust loop.</td>
      </tr>
    </tbody>
  </table>
</div><p>These dimensions give us a <strong>systematic lens</strong> through which we can analyze how protocols enable&#x2014;or inhibit&#x2014;economic trust. In the rest of this article and the series ahead, we&#x2019;ll explore each one in more depth&#x2014;starting with access</p><hr><h3 id="how-traditional-finance-handles-economic-trust"><strong>How Traditional Finance Handles Economic Trust</strong></h3><p>Traditional finance has spent decades developing frameworks to enforce trust and fairness&#x2014;both through law and structure. While this is by no means perfect, we believe that there is a lot to learn from existing systems in terms of things that have worked/ did not work.</p><p>In TradFi:</p><ul><li><strong>Market access is regulated</strong>: You must be licensed to participate. Capital requirements, compliance procedures, and approvals ensure that all participants meet a minimum bar.</li><li><strong>Roles are functionally separated</strong>: Custodians, brokers, exchanges, and clearinghouses are distinct entities. This reduces conflicts of interest and prevents single actors from dominating the flow of assets or information.</li><li><strong>Behavior is governed by rules and norms</strong>: From circuit breakers to disclosure requirements to best execution laws, a combination of <strong>explicit regulation</strong> and <strong>industry-wide standards</strong> help ensure participants act fairly&#x2014;even when incentives differ.</li></ul><p>These mechanisms form the foundation of <strong>economic trust</strong> in traditional markets. But they come at a cost: <strong>gated access</strong>,<strong> high compliance burdens, and limited transparency.</strong></p><hr><h3 id="what%E2%80%99s-next"><strong>What&#x2019;s Next?</strong></h3><p>DeFi gives us an opportunity to reimagine these safeguards using <strong>programmable, transparent, and permissionless infrastructure</strong>.&#xA0;</p><p>This new infrastructure allows us to transition from a system where market access is gated and rules are defined ex ante by legal and regulatory institutions, to one that is open and inclusive&#x2014;where access no longer needs to be restricted upfront, because behavior and rules can be enforced in situ through programmable constraints applied at every transaction.</p><figure class="kg-card kg-image-card"><img src="http://blog.sprinter.tech/content/images/2025/04/diagram.svg" class="kg-image" alt="Building Economic Trust in Solver-Based Networks &#x2013; Part 1" loading="lazy" width="1400" height="449"></figure><p>In the next part of the series we start with the first and most foundational dimension: <strong>Access</strong>.</p><hr><p><strong>Join us on our mission to shape the future of crosschain!</strong></p><p>&#x1F3C3;&#x200D;&#x2642;&#xFE0F; Follow us on&#xA0;<a href="https://x.com/sprinter_ux?ref=blog.buildwithsygma.com">X/Twitter</a></p><p>&#x1F3C3;Visit us at&#xA0;<a href="https://sprinter.tech/?ref=blog.sprinter.tech">Sprinter.tech</a></p>]]></content:encoded></item><item><title><![CDATA[The 10,000-Account Problem: The Realities of Building Onchain with MPC and AA Today]]></title><description><![CDATA[<p><em>This post is not meant to be an introduction to these concepts, rather a deeper look at the current state of affairs with the needs of developers in mind. If you want a primer, check out this</em>&#xA0;<a href="https://blog.getpara.com/what-is-mpc/?ref=blog.sprinter.tech" rel="noopener noreferrer"><em>MPC Intro</em>&#xA0;</a><em>and this</em>&#xA0;<a href="https://blog.getpara.com/mpc-vs-aa-the-facts/?ref=blog.sprinter.tech" rel="noopener noreferrer"><em>Account Abstraction resource</em></a><em>.</em></p><h2 id="the-evolution-of-embedded-wallets"><strong>The Evolution of</strong></h2>]]></description><link>http://blog.sprinter.tech/the-10-000-account-problem-the-realities-of-building-onchain-with-mpc-and-aa-today/</link><guid isPermaLink="false">67c6a5454a37d30b099c86db</guid><category><![CDATA[Opinions]]></category><dc:creator><![CDATA[Gregory Markou]]></dc:creator><pubDate>Tue, 04 Mar 2025 00:00:00 GMT</pubDate><media:content url="http://blog.sprinter.tech/content/images/2025/03/photo_2025-03-04-17.29.19-3.jpeg" medium="image"/><content:encoded><![CDATA[<img src="http://blog.sprinter.tech/content/images/2025/03/photo_2025-03-04-17.29.19-3.jpeg" alt="The 10,000-Account Problem: The Realities of Building Onchain with MPC and AA Today"><p><em>This post is not meant to be an introduction to these concepts, rather a deeper look at the current state of affairs with the needs of developers in mind. If you want a primer, check out this</em>&#xA0;<a href="https://blog.getpara.com/what-is-mpc/?ref=blog.sprinter.tech" rel="noopener noreferrer"><em>MPC Intro</em>&#xA0;</a><em>and this</em>&#xA0;<a href="https://blog.getpara.com/mpc-vs-aa-the-facts/?ref=blog.sprinter.tech" rel="noopener noreferrer"><em>Account Abstraction resource</em></a><em>.</em></p><h2 id="the-evolution-of-embedded-wallets"><strong>The Evolution of Embedded Wallets</strong></h2><p>The rapidly evolving embedded wallet space has significantly improved user experience for both users and developers, completely improving the onboarding process for newcomers. Today, embedded wallets provide seamless onboarding, allowing users to access crypto apps without needing to manage private keys directly.</p><p><strong>As embedded wallets scale, distinguishing between authentication and authorization becomes essential.</strong>&#xA0;Technologies like&#xA0;<a href="https://blog.usecapsule.com/what-is-mpc/?ref=blog.sprinter.tech" rel="noreferrer">MPC and Shamir Secret Sharing</a>&#xA0;have come into the focus as the primary technology embedded wallets use to make their underlying wallet infrastructure more secure and resistant to hacks.</p><p>Many apps have adopted embedded wallets, increasing the prevalence of MPC wallets and their onchain complement,&#xA0;<a href="https://blog.getpara.com/mpc-vs-aa-the-facts/?ref=blog.sprinter.tech">account abstraction</a>&#xA0;(AA) wallets.</p><p>Despite significant advancements, new UX tools can create security gaps and confusion about how to use these tools effectively together. A&#xA0;<a href="https://x.com/0xCygaar/status/1891948692204368122?ref=blog.sprinter.tech">recent wallet-as-a-service exploit</a>&#xA0;underscored the importance of&#xA0;<a href="https://blog.getpara.com/introducing-transaction-permissions/?ref=blog.sprinter.tech" rel="noreferrer">secure practices</a>&#xA0;for generating, storing, and signing with embedded wallet signers</p><h2 id="the-core-issues-association-and-fragmentation"><strong>The Core Issues: Association and Fragmentation</strong></h2><p>The core issues fall into 2 main themes: association and fragmentation. Let&apos;s get into it.</p><h2 id="1-signer-association">1. Signer Association</h2><p>The absence of a standardized association mechanism between AA wallets and MPC signers has resulted in several challenges.&#xA0;<strong>Currently, there&apos;s no reliable way to determine whether an AA wallet is already paired with an MPC signer&#x2014;or vice versa&#x2014;before integration.</strong></p><p>From the start, this uncertainty forces developers to decide upfront whether the AA wallet or the MPC signer should serve as the user&apos;s primary wallet, leading to inconsistent implementation across platforms.</p><p>A lack of clear direction means developers often resort to workarounds such as obscuring wallet addresses or choosing which &#x2018;account&#x2019; address to display to the user as their wallet and associated public key. When developers must resort to these user experience trade-offs, the security and usability of the application suffers.</p><h3 id="fragmented-signers"><strong>Fragmented Signers</strong></h3><p>Account abstraction aims to improve wallet user experience, but its adoption has been hampered by embedded wallet walled gardens.</p><p>One key challenge is the variation in how embedded wallets are implemented. For example, some providers issue one new embedded key for each application a user interacts with, creating silo&#x2019;d embedded wallets. Others (like&#xA0;<a href="https://blog.getpara.com/introducing-wallet-portability/?ref=blog.sprinter.tech">Para</a>), enable universal embedded wallets where the same wallet can be reused everywhere.&#xA0;<strong>App-specific embedded wallets per app vs. a universal embedded wallet for every app strongly influences UX.</strong></p><p><strong>Security is another major implementation concern</strong>, as developers can struggle with multi-signer management. Some developers simply add multiple owners to an account, which necessitates complex permission systems or forces an all-or-nothing approach to access management.</p><h2 id="2the-rediscovery-problem">2.The (re)Discovery Problem</h2><p>When users are confronted with a cluttered interface filled with multiple wallet choices (especially multiple wallets from multiple apps), the process of identifying and selecting the right wallet becomes&#xA0;<a href="https://medium.com/walletconnect/web3modal-v3-0-beta-simple-intuitive-wallet-login-to-enhance-your-apps-ux-406b3e300c0a?ref=blog.sprinter.tech" rel="noreferrer">overwhelming</a>. With smart accounts and silo&#x2019;d embedded wallets, this problem is exacerbated.</p><p>Many users end up with separate smart accounts for each application due to inadequate rediscovery mechanisms. Smart accounts created with one provider may not be&#xA0;<a href="https://blog.getpara.com/mpc-vs-aa-the-facts/?ref=blog.sprinter.tech">compatible</a>&#xA0;with those generated using another.</p><h2 id="3-on-and-offchain-permissions">3. On and Offchain Permissions</h2><p>Permissions are tough, and interfaces are challenging to get right for every type of use case. Thankfully, we can blend both onchain, and offchain permissions seamlessly into a unified experience.</p><p><a href="https://ethereum-magicians.org/t/erc-7715-grant-permissions-from-wallets/20100?ref=blog.sprinter.tech" rel="noreferrer">ERC-7715</a>&#xA0;offers a unique to have wallets sign overtop of permissions, granting other keys (not just&#xA0;<a href="https://en.wikipedia.org/wiki/Elliptic_Curve_Digital_Signature_Algorithm?ref=blog.sprinter.tech" rel="noreferrer">ECDSA</a>&#xA0;&#x1F440;) to have the ability to sign on-behalf of an account. Effectively, 7715 resembles a JWT token. Users sign off on what an application can do with their account, all offchain, then the app co-signs every action against the JWT which is enforced onchain. This pattern is beautiful because it resembles what developers are used to (JWTs!) with the security that you expect from self-custody. Applications specific permissions, that are verifiable onchain.</p><p>However, not all permissions make sense to encode onchain &#x2013;&#xA0;driving demand for offchain policy and permissioning systems.</p><p><a href="https://blog.getpara.com/introducing-transaction-permissions/?ref=blog.sprinter.tech" rel="noreferrer">Offchain permissions</a>&#xA0;bring the convenience of multi-chain scalability, privacy, and easy upgradeability &#x2013; however, they are very difficult to enforce in most traditional models. Put simply, any EOA wallet that has a permission layer requires intensive trust, as gaining possession of the private key (if held in a browser or enclave) is sufficient to bypass any permission controls that may be implemented.</p><p>This is where&#xA0;<a href="https://blog.getpara.com/what-is-mpc/?ref=blog.sprinter.tech#:~:text=what%20you%E2%80%99re%20using.-,Distributed%20MPC,-2/2%20MPC" rel="noreferrer">Distributed MPC</a>&#xA0;comes in. Because keyshares are never recombined, there is a clear layer at which to enforce permissions. Further,&#xA0;<a href="https://blog.getpara.com/introducing-transaction-permissions/?ref=blog.sprinter.tech">proactive refreshing</a>&#xA0;enables differentiated key shards per-app - reducing the risk of least-common-denominator app compromise.</p><p><strong>These two innovations give rise to cross-chain and cross-app signers</strong>, all while keeping transparent guarantees signing access and minimizing key access.</p><h2 id="4-cross-chain-compatibility">4. Cross-Chain Compatibility</h2><p>The challenges of fragmentation are further amplified when considering cross-chain compatibility.&#xA0;<strong>Users often forget to deploy their wallets across multiple chains</strong>, leading to discrepancies in smart contract wallet addresses.</p><p>Additionally, there is no guarantee that the same signers will be available on every chain because&#xA0;<a href="https://docs.alchemy.com/docs/create2-an-alternative-to-deriving-contract-addresses?ref=blog.sprinter.tech" rel="noreferrer">CREATE2</a>&#xA0;is not fully future-proof, making it difficult to maintain a consistent cross-chain experience. If an application does not exist on both chains and the signer is scoped to a specific domain, users may find themselves at an impasse with no clear solution for accessing their funds across chains.</p><p>While AA may offer a seamless wallet experience on one blockchain, the requirements and constraints of another chain&#x2019;s VM can require significant modifications or even result in incompatibility.</p><p>To mitigate this, most teams need to adopt an&#xA0;<strong>MPC cross-chain signer + AA per-chain structure</strong>&#xA0;which can be difficult to manage (see Section 1). The story isn&#x2019;t over at signing. To make the experience go the extra mile when building cross-chain, or even intent based applications, you need a&#xA0;<a href="http://blog.sprinter.tech/solvers-into-a-world-of-intents/" rel="noreferrer">solver</a>. With all the components we&#x2019;ve described above, providing&#xA0;<a href="http://blog.sprinter.tech/understanding-chain-abstraction/" rel="noreferrer">clean delegation to a solver</a>&#xA0;on your behalf (safely), enables beautiful UX for everyone.</p><h2 id="the-end-game">The End Game</h2><p>Making a decision today is still incredibly difficult. We&#x2019;ve found that developers can get around these nuances by using:</p><ul><li>A universal (cross-app, cross-chain, and fully portable) embedded wallet as an MPC signer that can be associated with account abstracted wallets on different chains/L2s</li><li>The MPC signer as the canonical cross-chain public address for the user to limit funds loss</li></ul><p><strong>The ideal end game will need to look like:</strong></p><ul><li>A universal way to associate AA wallets with MPC signers. This should solve the signer problem, x-chain problem, and discovery</li><li>Better standardization across AA specs per chain per VMs</li></ul><p><em>We&#x2019;re excited to work together towards a unified approach to UX.  If you&#x2019;re committed to reducing fragmentation, and want to talk solvers</em>&#xA0;<a href="hello@sprinter.tech" rel="noreferrer"><em>we&#x2019;d love to chat</em></a><em>!</em></p><p><em>About our Authors:<strong>&#xA0;<a href="https://x.com/gregthegreek?ref=blog.sprinter.tech" rel="noreferrer"><em>Greg</em></a></strong></em>&#xA0;<em>is the Founder of</em>&#xA0;<a href="https://chainsafe.io/?ref=blog.sprinter.tech" rel="noreferrer"><em>Chainsafe</em></a>&#xA0;<em>and</em>&#xA0;<a href="https://sprinter.tech/?ref=blog.sprinter.tech" rel="noreferrer"><em>Sprinter</em></a><em>.</em>&#xA0;<a href="https://x.com/_nityas?ref=blog.sprinter.tech" rel="noreferrer"><em>Nitya</em></a>&#xA0;<em>is the Founder of Para.</em></p>]]></content:encoded></item><item><title><![CDATA[Solvers: Into a world of intents]]></title><description><![CDATA[Solvers translate complex blockchain tasks into seamless experiences, mitigating issues like MEV and fragmented ecosystems. As essential players, they ensure transactions are executed efficiently, making blockchain tech more accessible and practical.]]></description><link>http://blog.sprinter.tech/solvers-into-a-world-of-intents/</link><guid isPermaLink="false">67589a1bbc3cf1fd4cc0bf1a</guid><category><![CDATA[Explainers]]></category><dc:creator><![CDATA[Ben Adar]]></dc:creator><pubDate>Wed, 11 Dec 2024 14:21:37 GMT</pubDate><media:content url="http://blog.sprinter.tech/content/images/2024/12/Frame-1734.png" medium="image"/><content:encoded><![CDATA[<img src="http://blog.sprinter.tech/content/images/2024/12/Frame-1734.png" alt="Solvers: Into a world of intents"><p>Blockchain technology promised a decentralized and transparent future, yet for many, it still feels out of reach&#x2014;complicated, costly, and inaccessible. Obstacles like Maximal Extractable Value (MEV) and fragmented ecosystems have transformed what should be seamless interactions into frustrating, time-consuming, and expensive processes.</p><p>But this is just the beginning&#x2014;we&apos;re still writing the narrative. And in this chapter, Solvers are one of the main characters.</p><p>By interpreting user intents&#x2014;simple statements of desired outcomes&#x2014;and executing them with precision, the solver ecosystem is bridging the gap between blockchain technology&apos;s potential and its practical use.</p><h2 id="what-are-solvers">What are solvers?</h2><p>Solvers are sophisticated optimization entities that handle the intricate details of onchain interactions, freeing the user to focus on their goals. Acting as intermediaries, solvers evaluate execution pathways, reduce inefficiencies, and enhance user outcomes.</p><p>For example, if you want to swap ETH for USDC at the best price, a solver will analyze all available decentralized exchanges, calculate fees, and execute the trade efficiently. Similarly, if you need to transfer assets between Ethereum and Polygon, a solver will identify the optimal bridge and handle the complexities of execution, saving time and reducing errors.</p><p>By abstracting the complexities of blockchain transactions, solvers translate users&apos; complex intents&#x2014;such as swapping tokens or transferring assets&#x2014;into actionable steps that prioritize optimal outcomes.</p><h2 id="intent-based-systems">Intent-based systems</h2><p>At the core of a solver network lies the concept of intents. The web3 community is discovering the potential of intent-based systems to shift the burden of complexity away from the user, allowing them to focus on their goals without navigating technical intricacies.</p><blockquote><strong>Intents are signed messages that only define an acceptable end state and potential constraints.</strong> They don&apos;t define &quot;how&quot; this end state is achieved. Finding the best &quot;how&quot; is outsourced to a specialized actor, called a solver. &#x2014; <a href="https://perridonventures.xyz/publications/redefining-blockchain-interactions-the-crucial-role-of-solvers-in-an-Intent-focussed-future?ref=blog.sprinter.tech">Redefining Blockchain Interactions</a></blockquote><p>While intent solutions simplify blockchain interactions, challenges like fragmentation and a lack of composability across protocols remain significant barriers to realizing their full potential.</p><h2 id="solvers-vs-searchers">Solvers vs searchers</h2><p>Maximal Extractable Value (MEV) has been a persistent challenge in blockchain networks. Searchers&#x2014;entities that reorder, include, or exclude transactions for profit&#x2014;often operate at users&#x2019; expense, exploiting vulnerabilities and increasing costs through practices like front-running and sandwich attacks.</p><p>Solvers, in contrast, focus on optimizing user outcomes. They compete in intent-solving auctions to provide better prices, mitigate MEV risks, and deliver value-added services. Interestingly, the skills and expertise required for searching and solving are quite similar, making teams with a background in MEV searching particularly <a href="https://cow.fi/learn/mev-bots-switch-from-searcher-to-solver?ref=blog.sprinter.tech">effective as solvers</a>. Many top solvers started as searchers, leveraging their deep understanding of MEV dynamics and optimization to deliver user-focused solutions. However, solvers are not immune to financial incentives, and their behaviour is influenced by the competitive market of the wider solver ecosystem. Addressing risks like centralization and the principal-agent problem is crucial for maintaining user trust.</p><h2 id="what-do-solvers-do">What do solvers do?</h2><p>The role of solvers is expanding rapidly, driven by the growing adoption of intent-centric models. Acting as market participants, solvers match potentially complex intents with counterparties and chart the most efficient paths to fulfill them. In return, solvers earn fees for their services, creating a symbiotic relationship between users and the ecosystem.</p><h3 id="execution-quality">Execution quality</h3><p>Solvers improve execution quality by finding optimal routes for complex intents. In some cases, intents are matched directly through mechanisms like <a href="https://blog.cow.fi/what-are-cows-on-cow-swap-e72baaa4678a?ref=blog.sprinter.tech">coincidence of wants or ring trades</a>, which eliminate fees and slippage. However, these scenarios are rare. Batch auctions, like those implemented by CoW Swap, aggregate intents over time, enabling solvers to compete for the best execution paths.</p><p>Despite these advancements, a significant challenge persists&#x2014;the lack of composability between systems. Intents on UniswapX currently can&apos;t interact with those on CoW Swap, limiting a solver&apos;s ability to fully optimize transactions across platforms. The push toward generalized intent networks aims to overcome this hurdle, unlocking cross-protocol composability for solvers.</p><h3 id="simplifying-user-experiences">Simplifying user experiences</h3><p>Interacting with blockchain platforms often feels like navigating a maze. Achieving optimal results requires users to juggle token markets, compare exchange rates, avoid MEV attacks, and manage transaction fees. For many, this complexity creates friction that limits participation. Solvers offer a solution by removing these barriers, focusing on the user&apos;s desired outcomes, and handling the complexity behind the scenes.</p><p>Take Bob, a casual investor looking to convert 2 ETH into a portfolio of smaller tokens: 50% into LINK, 30% into UNI, and 20% into AAVE. Without solvers, Bob would need to:</p><ol><li>Check prices for each token manually on exchanges like Uniswap or SushiSwap.</li><li>Split his ETH into exact portions, factoring in slippage and gas costs for each trade.</li><li>Execute three separate transactions, each incurring fees.</li><li>Monitor market conditions to ensure fair prices for every swap.</li></ol><p>This process is time-intensive, costly, and prone to errors&#x2014;making it an uphill battle for users like Bob.</p><p>With solvers, Bob expresses his intent&#x2014;&quot;Convert 2 ETH into a portfolio of LINK (50%), UNI (30%), and AAVE (20%).&quot; While Bob&apos;s goal is technically a complex intent, for a human, it&apos;s the simplest way to express his needs. The solver then analyzes multiple DEXs, optimizes execution, and batches the transactions for minimal transaction fees, creating the portfolio seamlessly.</p><p>By focusing on intent execution and interpretation, solvers make blockchain interactions accessible for everyday users&#x2014;no advanced technical knowledge or financial expertise required.</p><h2 id="how-do-they-operate">How do they operate?</h2><p>The solver&apos;s role goes beyond simple execution&#x2014;they combine technical expertise, advanced algorithms, and robust infrastructure to deliver seamless, efficient and optimized execution.</p><h3 id="onchain-routing">Onchain routing</h3><p>Solvers shine when it comes to creating efficient pathways for onchain transactions, focusing on reducing gas costs, minimizing slippage, and avoiding network congestion. By interacting with decentralized exchanges (DEXs), liquidity pools, and other protocols, solvers identify the most advantageous execution routes.</p><p>However, current systems, like UniswapX or CoW Swap, often lack composability, preventing intents from interacting across platforms. This limits a solver&apos;s ability to optimize transactions through rare mechanisms like coincidence of wants or ring trades. Generalized intent networks aim to address these limitations, unlocking full composability for solvers and enhancing execution quality.</p><h3 id="offchain-liquidity-management">Offchain liquidity management</h3><p>Some Solvers extend their capabilities beyond onchain activity by tapping into off-chain liquidity sources, adding flexibility and improving transaction pricing.</p><p>Through access to private order flows and external liquidity providers, Solvers can deliver competitive pricing that often surpasses what is achievable onchain.</p><p>Private order flows help minimize market price impact, especially for large trades. Solvers working with institutional-grade liquidity providers can execute substantial transactions discreetly, preventing adverse effects on market prices. However, accessing these flows is rare and often strategically cumbersome.</p><h3 id="crosschain-execution">Crosschain execution</h3><p>A user who wants to swap tokens on Ethereum and receive assets on Polygon can use a solver to identify the optimal bridge, handle the transfer, and ensure they get their desired asset with minimal delays.</p><p>Solvers orchestrate transactions across multiple blockchains, ensuring seamless interoperability for users. This involves bridging assets, dynamically managing crosschain liquidity, and delivering fast, reliable settlements across networks. In a fragmented rollup-centric future, solvers act as an abstraction layer, mitigating UX challenges and improving transaction reliability.</p><p>By dynamically managing liquidity across chains, solvers effectively mitigate risks from fragmented markets, creating a smooth, efficient user experience.</p><h3 id="latency-optimization">Latency optimization</h3><p>In blockchain transactions, timing is everything. To stay competitive, solvers optimize for low-latency processing, especially in MEV-sensitive scenarios. This involves minimizing delays in pathfinding, securing liquidity, and submitting transactions faster than competitors.</p><p>Latency optimization is particularly crucial in high-frequency scenarios like MEV mitigation. In these contexts, even a fraction of a second can determine whether a solver successfully fulfills an intent. By prioritizing speed and precision, solvers deliver timely and efficient execution.</p><h3 id="competitions-among-solvers">Competitions among solvers</h3><p>Auctions are key to ensuring users receive the best possible execution quality.</p><p>Batch auctions&#x2014;like those implemented by CoW Swap&#x2014;aggregate user intents over time, allowing solvers to compete to fulfill them. Solvers place bids based on their anticipated returns, factoring in potential profits from MEV mitigation or gas savings. This process encourages the solver ecosystem to optimize their strategies to deliver superior outcomes.</p><p>Another auction format, the Dutch auction, dynamically adjusts pricing based on demand, fostering efficient competition while aligning incentives with user outcomes. Unlike traditional order flow auctions, these mechanisms prioritize delivering optimized execution directly to users rather than offering refunds based on auction bids.</p><p>These mechanisms align incentives with user outcomes, but centralization risks persist. Reduced competition in the solver ecosystem could lead to extractive behaviour and diminished benefits for users. Encouraging diversity among solvers and adopting accountability frameworks is extremely important in mitigating these risks.</p><h2 id="addressing-risks-and-challenges">Addressing risks and challenges</h2><p>As generalized intent systems become a reality, solvers will unlock new levels of efficiency and interoperability. However, challenges such as centralization risks, reduced competition, and censorship resistance must be addressed.</p><p>While solvers promise significant improvements in onchain interactions, their growing dominance raises concerns. Centralization among solvers could amplify risks like reduced competition and extractive behaviour. Accountability frameworks and decentralized governance structures will play a vital role in mitigating these risks.</p><p>Moreover, encouraging ecosystem-wide standards for intents will enhance solver participation, competition, and execution quality. This approach aligns incentives across stakeholders and ensures that solvers empower users without compromising the decentralized ethos of web3.</p><p>By focusing on execution efficiency, mitigating MEV risks, and simplifying user interactions, solvers are making blockchain more accessible and user-friendly. However, achieving this vision requires ongoing innovation and collaboration across the ecosystem.</p><h2 id="the-next-chapter-for-solvers">The next chapter for solvers</h2><p>Solvers are more than just a technical upgrade&#x2014;they&#x2019;re a shift in how we engage with blockchains. By abstracting complexity and delivering seamless user experiences, solvers are rewriting what&#x2019;s possible onchain. However, their potential is only as strong as the ecosystem supporting them.</p><p>The path forward isn&#x2019;t just about fixing risks&#x2014;it&#x2019;s about setting the stage for a more collaborative and open onchain future. Centralization concerns, governance gaps, and interoperability challenges are hurdles, but they&#x2019;re also opportunities to build better systems.</p><p>With the adoption of standardized intent-based systems and diverse solver participation, the ecosystem will push past these obstacles and unlock a more inclusive, decentralized web3.</p><p>This isn&#x2019;t just a tech story&#x2014;it&#x2019;s a community-driven evolution. As solvers reshape blockchain interactions, their success depends on collective effort. Developers, researchers, and users alike must come together to ensure solvers aren&#x2019;t just functional but transformational.</p><p>The real win? A blockchain experience that&#x2019;s intuitive, fair, and powerful enough to empower anyone, anywhere. With solvers, we&#x2019;re not just building systems&#x2014;we&#x2019;re building a future where blockchain feels effortless and accessible to all.</p><h3 id="join-sprinter%E2%80%99s-run-club">Join Sprinter&#x2019;s run club</h3><p>Set your application apart and embrace the multichain ecosystem.&#xA0;<br><br>&#x1F3C3;&#x200D;&#x2642;&#xFE0F; Follow us on <a href="https://x.com/sprinter_ux?ref=blog.buildwithsygma.com">X/Twitter</a></p><p>&#x1F3C3;Visit us at <a href="https://sprinter.tech/?ref=blog.sprinter.tech">Sprinter.tech</a></p><figure class="kg-card kg-bookmark-card"><a class="kg-bookmark-container" href="https://sprinter.tech/?ref=blog.sprinter.tech"><div class="kg-bookmark-content"><div class="kg-bookmark-title">Sprinter</div><div class="kg-bookmark-description">Sprinter is a suite of tools for developers building multi-chain consumer applications that want to give the best experience for their end user. An end-to-end toolkit that provides chain abstraction, bridging, and cross chain contract call, all out of the box.&#x201D;</div><div class="kg-bookmark-metadata"><img class="kg-bookmark-icon" src="https://cdn.prod.website-files.com/672a2d21b571130516c1b0e2/672a3bdf49bf1110eb6ab32f_ORANGE_32PX-01.png" alt="Solvers: Into a world of intents"></div></div><div class="kg-bookmark-thumbnail"><img src="https://cdn.prod.website-files.com/672a2d21b571130516c1b0e2/672ca66622441a39ad47b2e4_sprinter-meta.png" alt="Solvers: Into a world of intents"></div></a></figure>]]></content:encoded></item><item><title><![CDATA[Understanding Chain Abstraction: The catalyst for effortless web3 experiences]]></title><description><![CDATA[Navigating web3 shouldn’t be complicated. Simplify cross-chain interactions and make blockchain as intuitive as web2 with Sprinter and Sygma, offering a fast, seamless, full-stack approach to chain abstraction.]]></description><link>http://blog.sprinter.tech/understanding-chain-abstraction/</link><guid isPermaLink="false">66e1dfacbc3cf1fd4cc0be0d</guid><category><![CDATA[Explainers]]></category><dc:creator><![CDATA[Ben Adar]]></dc:creator><pubDate>Fri, 13 Sep 2024 17:13:43 GMT</pubDate><media:content url="http://blog.sprinter.tech/content/images/2024/09/Frame--6-.png" medium="image"/><content:encoded><![CDATA[<figure class="kg-card kg-bookmark-card"><a class="kg-bookmark-container" href="https://www.sprinter.tech/?ref=blog.sprinter.tech"><div class="kg-bookmark-content"><div class="kg-bookmark-title">Sprinter</div><div class="kg-bookmark-description">Sprinter is a suite of tools for developers building multi-chain consumer applications that want to give the best experience for their end user. An end-to-end toolkit that provides chain abstraction, bridging, and cross chain contract call, all out of the box.&#x201D;</div><div class="kg-bookmark-metadata"><img class="kg-bookmark-icon" src="https://cdn.prod.website-files.com/672a2d21b571130516c1b0e2/672a3bdf49bf1110eb6ab32f_ORANGE_32PX-01.png" alt="Understanding Chain Abstraction: The catalyst for effortless web3 experiences"></div></div><div class="kg-bookmark-thumbnail"><img src="https://cdn.prod.website-files.com/672a2d21b571130516c1b0e2/672ca66622441a39ad47b2e4_sprinter-meta.png" alt="Understanding Chain Abstraction: The catalyst for effortless web3 experiences"></div></a></figure><h2 id="the-need-for-the-abstract">The need for the abstract</h2><img src="http://blog.sprinter.tech/content/images/2024/09/Frame--6-.png" alt="Understanding Chain Abstraction: The catalyst for effortless web3 experiences"><p>Once introduced, personal computers required users to be a bit tech-savvy. It was nothing too major, just knowledge of how to use the terminal and eventually some HTML skills if you wanted to build a website, but mostly, it was straightforward.&#xA0;</p><p>As technology evolved and the Internet established itself as a global infrastructure, the user experience (UX) evolved along with it. Computers became easier, and those clunky UXs became cleaner. When we use our computers today, whether a smartphone, laptop, desktop, or even smart fridge, we encounter a UX that has become familiar. The goal was, and still is, to make it easy and intuitive. You want a user to enter your app or website and immediately know what they&#x2019;re doing.&#xA0;</p><p>When we look at the differences between web1 and web2, one of the most obvious is the UX. It took decades of protocols, innovations, failures, and eventually, standards to reach the user-friendly Internet we know today. However, the user experience takes a step back when we look at the differences between web2 and web3.</p><p>It wasn&#x2019;t improved simplicity that led the web3 revolution&#x2014;it was the paradigm-shifting cypherpunk dream we were all holding onto. We didn&#x2019;t care that it looked ugly and was complicated to use. We wanted freedom and protection from centralized and malicious actors. But in all honesty, we are entering a new stage of web3&#x2014;one that&apos;s gearing up for mainstream adoption.</p><p>So, what should be the goal here? In my mind, it&apos;s simple. If we want users to use web3, we need to make it easy. For everyone to benefit from the freedom, transparency, and security that web3 provides, we need to mirror some level of web2 UX.</p><blockquote>&quot;We&apos;re building applications that use blockchain.&quot;<br>- Greg Markou, CPO/Co-Founder of ChainSafe &amp; Sprinter</blockquote><figure class="kg-card kg-embed-card"><div><blockquote class="twitter-tweet"><p lang="en" dir="ltr">Watch Greg go at EthCC! &#x1F3A4;<br>&#x201C;We need to stop thinking that we&#x2019;re building blockchain applications, because we&#x2019;re not.<br>We&#x2019;re building applications that use blockchain.&#x201D; &#x1F3D7;&#xFE0F;&#x26D3;&#xFE0F;<br><br>Join the waitlist for <a href="https://twitter.com/sprinter_ux?ref_src=twsrc%5Etfw&amp;ref=blog.sprinter.tech">@sprinter_ux</a>&#x1F447;<a href="https://t.co/DI30hWNBqE?ref=blog.sprinter.tech">https://t.co/DI30hWNBqE</a> <a href="https://t.co/J3d7MHJ6Lv?ref=blog.sprinter.tech">pic.twitter.com/J3d7MHJ6Lv</a></p>&#x2014; Sygma (@buildwithsygma) <a href="https://twitter.com/buildwithsygma/status/1816851863112765679?ref_src=twsrc%5Etfw&amp;ref=blog.sprinter.tech">July 26, 2024</a></blockquote>
<script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></div></figure><h2 id="chain-abstraction">Chain abstraction</h2><p>Chain abstraction is all about simplifying the user&apos;s web3 experience. Users shouldn&apos;t have to worry about which network they&apos;re on, which currency they&#x2019;re using, or how to transfer tokens between them. It provides users with a familiar experience. Imagine a unified interface connecting you to web3 with zero interruptions and no distractions.</p><p>Like the leap from web1 to web2, chain abstraction means turning complex web3 navigation into something as intuitive as the simplest website.</p><h3 id="how-are-we-making-this-happen">How are we making this happen?</h3><p><strong>Layer 2 enhancements and Infrastructure solutions</strong><br>Layer 2 solutions like rollups and state channels are increasingly being adopted to overcome the limitations of primary blockchain layers, expedite transactions, and reduce costs.</p><p>Solutions like ZK-rollups consolidate multiple transactions off the primary chain and validate them through cryptographic proofs, ensuring their accuracy and security. Infra solutions like decentralized oracles and cross-chain messaging protocols are crucial in facilitating fluid communication and interactions across diverse blockchain networks&#x200B;.</p><p><strong>Intent-based design</strong><br>Intent-based protocols are crucial in simplifying user interactions within the blockchain space. By focusing on the user&apos;s goals (intentions) rather than the underlying blockchain mechanics, these designs allow for more intuitive and accessible applications.</p><p>By automating the decision-making process behind transactions, intent-based systems can dynamically choose the most efficient execution paths, improving the speed and cost of operations across multiple chains.</p><p><strong>Universal accounts and liquidity</strong><br>A universal account (a unified interface) simplifies blockchain interactions by allowing a single account to operate across multiple chains. This simplification aids in managing wallets across networks and utilizes universal liquidity to facilitate transactions without the cumbersome process of manual bridging.</p><p>This setup not only boosts user convenience but also enhances the efficiency of asset management and transfer across the blockchain landscape&#x200B;.</p><figure class="kg-card kg-image-card"><img src="http://blog.sprinter.tech/content/images/2024/09/download--2--1.png" class="kg-image" alt="Understanding Chain Abstraction: The catalyst for effortless web3 experiences" loading="lazy" width="500" height="500"></figure><h2 id="key-eips-changing-the-landscape">Key EIPs changing the landscape</h2><ul><li><a href="https://eip.tools/eip/4337?ref=blog.buildwithsygma.com"><strong>EIP-4337</strong></a>: Account Abstraction</li><li><a href="https://eips.ethereum.org/EIPS/eip-7555?ref=blog.buildwithsygma.com"><strong>EIP-7555</strong></a>: SSO Login&#xA0;</li><li><a href="https://eip.tools/eip/7715?ref=blog.buildwithsygma.com"><strong>EIP-7715</strong></a>: Delegating permissions to embedded wallets</li></ul><p>These EIPs focus on how wallets interact with the application layer and tie back into chain-agnostic protocols.</p><p>The big game-changer for web3 applications is<a href="https://eip.tools/eip/7715?ref=blog.buildwithsygma.com"> EIP-7715</a>:&#xA0;</p><ul><li>Allows tagging embedded wallets with permissions</li><li>Enables off-chain-based signatures for delegating actions</li><li>Users can potentially sign up to 20 transactions on L2s without realizing</li><li>Removes the need for one button click per transaction</li><li>Allows applications to control the signing experience</li></ul><p>Standardization is key to the success of future web3 development. Without it, we risk creating siloed solutions rather than fostering interoperability.</p><p>EIP-4337, for example, left a lot of gaps, which is why we&#x2019;re seeing a real need for standardization in the space now. We care deeply about it because, without a solid framework, we risk creating more fragmentation among chain abstraction providers.</p><p>That&#x2019;s why we&#x2019;re not just sitting on the sidelines. We&#x2019;ve had a direct hand in shaping these standards&#x2014;we even co-authored EIP-7555&#x2014;and are working closely with the key groups involved to ensure that everything comes together consistently and collaboratively.</p><h2 id="benefits-of-chain-abstraction">Benefits of chain abstraction</h2><p><strong>Promoting seamless multi-chain operations</strong><br>A decentralized application (dapp) could facilitate effortless interactions across diverse networks with some level of abstraction, allowing transactions and data transfers to flow smoothly between networks without the typical barriers.&#xA0;</p><p>Whether you&apos;re managing assets, deploying smart contracts, or integrating services, chain abstraction ensures that these activities are straightforward.</p><p><strong>Empowering developers with simplified tooling</strong><br>One major hurdle in web3 development is the steep learning curve associated with different blockchain protocols.</p><p>Chain abstraction could remove this complexity by offering a unified development environment. Developers should be able to create dapps using a single, consistent set of tools, APIs, and smart contracts across multiple networks.</p><p><strong>Enhancing the user experience</strong><br>Users should be able to engage with dapps with the same ease and familiarity as web2 interfaces without needing to understand the technicalities of blockchain technology.&#xA0;</p><p>Simplifying web3 UX is critical to broadening adoption and fostering a more inclusive, less fragmented digital economy.</p><p><strong>Increasing flexibility and scalability</strong><br>In a chain abstracted system, enterprises and developers wouldn&apos;t be tied to a single blockchain, allowing them to leverage the strengths of various networks for different aspects of their operations.</p><p>Added flexibility supports scalability, enabling a business to expand its web3 strategy without being constrained by the limitations of any particular protocol.</p><p><strong>Bolstering security and reliability</strong><br>By distributing operations across multiple networks, cross-chain applications would enjoy enhanced security and reliability.&#xA0;</p><p>Imagine a robust framework where, even if one network faces downtime or security issues, the system can seamlessly switch to another, ensuring uninterrupted service.</p><h2 id="what-is-the-cake-framework">What is the CAKE framework?</h2><p>The CAKE framework provides a modular, composable approach to blockchain systems, focusing on improving interoperability and enhancing user experience in a multi-chain environment.</p><figure class="kg-card kg-image-card"><img src="https://blog.chainsafe.io/content/images/2024/09/w-640-quality-90-fit-scale-down--1-.png" class="kg-image" alt="Understanding Chain Abstraction: The catalyst for effortless web3 experiences" loading="lazy" width="640" height="790"></figure><p>The framework addresses the complexities of interacting with multiple blockchain networks, such as managing different wallets, navigating cross-chain communication, and optimizing transaction workflows. It&apos;s divided into four distinct layers, all of which are necessary elements for seamless multi-chain interactions.</p><p>Laying the groundwork for a standardized approach to cross-chain interactions. A clear, modular structure empowers developers to build on a consistent foundation, promoting uniformity and interoperability among diverse blockchain systems.</p><p>This initiative marks a significant step towards creating a unified experience, setting the stage for broader adoption and more seamless interactions across networks.</p><figure class="kg-card kg-bookmark-card"><a class="kg-bookmark-container" href="https://frontier.tech/cake-working-group?ref=blog.sprinter.tech"><div class="kg-bookmark-content"><div class="kg-bookmark-title">CAKE Working Group</div><div class="kg-bookmark-description">The Cake Working Group is a industry collaboration to accelerate the development and adoption of Chain Abstraction through the CAKE framework. The cake is real.</div><div class="kg-bookmark-metadata"><img class="kg-bookmark-icon" src="https://assets.super.so/9582c39c-e502-4558-868f-20c2097e132c/uploads/favicon/2cc70793-53cd-4e50-a5ef-c30dd85bdfd9.png" alt="Understanding Chain Abstraction: The catalyst for effortless web3 experiences"><span class="kg-bookmark-author">CAKE Working Group</span></div></div><div class="kg-bookmark-thumbnail"><img src="https://assets.super.so/9582c39c-e502-4558-868f-20c2097e132c/uploads/cover/1552ab11-6743-46a3-8380-af822a6620c8.png" alt="Understanding Chain Abstraction: The catalyst for effortless web3 experiences"></div></a></figure><p>By abstracting the technical complexities and optimizing multi-chain operations, we&apos;re stepping closer to a more connected and seamless blockchain ecosystem. This shift towards user-friendly blockchain solutions holds the promise of broadening adoption and fostering a digital environment where innovation and inclusivity can thrive.</p><p>Together, we are paving the way for a future where blockchain&apos;s potential is fully realized, making it as straightforward and intuitive as using any conventional online service.</p><hr><h2 id="join-sprinter%E2%80%99s-run-club">Join Sprinter&#x2019;s run club</h2><p>Set your application apart and embrace the multichain ecosystem.&#xA0;</p><p>&#x1F3C3;&#x200D;&#x2640;&#xFE0F;Keep up with Sprinter!<a href="https://x.com/sprinter_ux?ref=blog.buildwithsygma.com"> Follow us on X/Twitter</a>.</p><p>&#x1F3C3;&#x200D;&#x2642;&#xFE0F;Want Sprinter in your tech stack?<a href="https://www.sprinter.box/?ref=blog.buildwithsygma.com"> Join the waitlist here</a>.</p>]]></content:encoded></item><item><title><![CDATA[Sygma X Electron Labs: Integrating Spectre for Cost-Efficient ZK-Proof Aggregation]]></title><description><![CDATA[Sygma and Electron Labs are integrating Spectre into Quantum, reducing Ethereum gas costs for proof verifications. This partnership enhances scalability, privacy, and cost-efficiency, driving secure interoperability and widespread use.]]></description><link>http://blog.sprinter.tech/sygma-electron-labs-integration/</link><guid isPermaLink="false">669531a7bc3cf1fd4cc0bd47</guid><category><![CDATA[Announcements]]></category><dc:creator><![CDATA[Ben Adar]]></dc:creator><pubDate>Mon, 15 Jul 2024 16:16:51 GMT</pubDate><media:content url="http://blog.sprinter.tech/content/images/2024/07/Frame-1--6-.png" medium="image"/><content:encoded><![CDATA[<div class="kg-card kg-callout-card kg-callout-card-accent"><div class="kg-callout-emoji">&#x1F4E2;</div><div class="kg-callout-text"><b><strong style="white-space: pre-wrap;">Important Update:</strong></b><br>Sygma has evolved into&#xA0;<b><strong style="white-space: pre-wrap;">Sprinter</strong></b>, shifting from traditional bridging to&#xA0;<b><strong style="white-space: pre-wrap;">solvers and intent-centric infrastructure</strong></b>. While these posts reference Sygma, the core mission has expanded&#x2014;Sprinter now focuses on optimizing cross-chain execution through solver-driven and intent-centric tools.</div></div><img src="http://blog.sprinter.tech/content/images/2024/07/Frame-1--6-.png" alt="Sygma X Electron Labs: Integrating Spectre for Cost-Efficient ZK-Proof Aggregation"><p>Together with <a href="https://electronlabs.org/about?ref=blog.sprinter.tech">Electron Labs</a>, Sygma is integrating <a href="https://docs.buildwithsygma.com/tailoredsecurity/spectre/intro/?ref=blog.sprinter.tech">Spectre</a> into Electron&#x2019;s Universal Proof Aggregation layer, <a href="http://testnet.superproof.ai/quantum?ref=blog.sprinter.tech">Quantum</a>, enhancing the accessibility of verifiable cross-chain states, while reducing gas costs on Ethereum.</p><p>Spectre is Sygma&#x2019;s blockchain coprocessor, enhancing on-chain computations with off-chain zero-knowledge proofs for speed and security. As part of Sygma&apos;s <a href="https://docs.buildwithsygma.com/protocol/tailoredsecurity/?ref=blog.sprinter.tech">tailored security</a> approach, Spectre integrates seamlessly to enhance scalability and privacy while maintaining trustlessness. It is currently on testnet, with the mainnet launch coming soon.&#xA0;</p><p>By incorporating Spectre into its aggregation process, Electron Labs will significantly lower the gas costs associated with proof verifications on Ethereum for Spectre users. The cost of verifying a single proof, traditionally around 300,000 gas, would be reduced to about 8,000 gas.</p><blockquote>&#x201C;Super excited to partner with the Electron Team! The integration of our uniquely secure consensus and storage proofs into Quantum ZK agglayer will enable Sygma and other users of Spectre to drastically reduce costs for secure interoperability&#x201D;<br>&#x2013; Alex M, VP Product of ChainSafe, Sygma Core Contributor&#xA0;</blockquote><h2 id="how-this-will-look"><strong>How this will look:</strong></h2><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXd_9Z-HZRJwbw_MsJry7f-GiSaWb1qSa_UAUg4H2IY2Z9vcrCdWukibsDx2VebiOB9ZYZDBRW4hsPvmYeMxM2vSs5ljdxSmgmkf7hIb33W9Y8D1qIPWnm4f35OSUD91FVur1Na-_IT-0pjYng6ljbg6Jru8?key=myaOvIWnNrrjd5h0fgeAgQ" class="kg-image" alt="Sygma X Electron Labs: Integrating Spectre for Cost-Efficient ZK-Proof Aggregation" loading="lazy" width="563" height="316"><figcaption><span style="white-space: pre-wrap;">1) Sygma generates a proof using Spectre. 2) Sygma sends the proof to Electron&#x2019;s Superproof. 3) The Superproof aggregates it together with other proofs. 4) The new aggregated proof, or Superproof, is submitted and verified onchain. 5) Sygma then calls the Electron smart contract to check if the proof was verified.</span></figcaption></figure><p>This integration optimizes cost efficiency and streamlines the Ethereum verification process, making it more accessible and sustainable for widespread use.</p><h2 id="electron-labs">Electron Labs:</h2><p>Electron is building a one-of-a-kind Superprover that is a Universal ZK-Proof Aggregator, enabling value creation of $10bn / year. Aiming to become the de facto engine for ZK-proof aggregation on Ethereum, their flagship product, Quantum, is live and currently aggregating protocols such as Scroll, Worldcoin, Loopring, and DeGate on testnet, cutting costs by 85% per proof.</p><blockquote>&#x201C;This partnership will enhance the suite of companies planning to use the Quantum ZK agglayer, reducing the costs for all by 1/n&#x201D; <br>&#x2013; Garvit Goel, CEO of Electron Labs</blockquote><p><a href="https://electronlabs.org/?ref=blog.sprinter.tech">Website</a> | <a href="https://testnet.superproof.ai/quantum?ref=blog.sprinter.tech">Quantum Testnet</a> | <a href="https://x.com/labs_electron?ref=blog.sprinter.tech">Twitter</a> | <a href="https://t.me/zkElectron?ref=blog.sprinter.tech">Telegram</a> </p><hr><h2 id="build-with-sygma">Build with Sygma</h2><p>Visit us at <a href="http://buildwithsygma.com/?ref=blog.buildwithsygma.com">buildwithsygma.com</a> &#x1F6E0;&#xFE0F;</p><p>Next-generation composability and interoperability will provide applications with the features they need. Whatever solution projects have in mind, Sygma gives you the power to deploy multi-chain infrastructure quickly, lowering the entry barrier for developers and users.</p><p>Check out <a href="https://docs.buildwithsygma.com/?ref=blog.buildwithsygma.com">our documentation</a> or <a href="https://github.com/sygmaprotocol?ref=blog.buildwithsygma.com">GitHub</a> to get started.</p><p>Have a question? Hop into <a href="https://discord.com/invite/Qdf6GyNB5J?ref=blog.buildwithsygma.com">our Discord</a> &#x1F44B;</p><p><a href="https://twitter.com/buildwithsygma?ref=blog.buildwithsygma.com">Twitter</a> | <a href="https://www.youtube.com/@buildwithsygma?ref=blog.buildwithsygma.com">YouTube</a></p>]]></content:encoded></item><item><title><![CDATA[Tangle X Sygma: Integrating Sygma into the Tangle Network]]></title><description><![CDATA[Sygma is being integrated into the Tangle Network, providing full interoperability with all EVM-based chains and the Polkadot ecosystem.]]></description><link>http://blog.sprinter.tech/tangle-x-sygma-integrating-sygma-into-the-tangle-network/</link><guid isPermaLink="false">6669bf7abc3cf1fd4cc0bca7</guid><category><![CDATA[Announcements]]></category><dc:creator><![CDATA[Ben Adar]]></dc:creator><pubDate>Wed, 12 Jun 2024 15:33:21 GMT</pubDate><media:content url="http://blog.sprinter.tech/content/images/2024/06/Frame--4-.png" medium="image"/><content:encoded><![CDATA[<div class="kg-card kg-callout-card kg-callout-card-accent"><div class="kg-callout-emoji">&#x1F4E2;</div><div class="kg-callout-text"><b><strong style="white-space: pre-wrap;">Important Update:</strong></b><br>Sygma has evolved into&#xA0;<b><strong style="white-space: pre-wrap;">Sprinter</strong></b>, shifting from traditional bridging to&#xA0;<b><strong style="white-space: pre-wrap;">solvers and intent-centric infrastructure</strong></b>. While these posts reference Sygma, the core mission has expanded&#x2014;Sprinter now focuses on optimizing cross-chain execution through solver-driven and intent-centric tools.</div></div><img src="http://blog.sprinter.tech/content/images/2024/06/Frame--4-.png" alt="Tangle X Sygma: Integrating Sygma into the Tangle Network"><p>Sygma is thrilled to announce that we are integrating the Sygma Protocol directly into the <a href="https://www.tangle.tools/?ref=blog.sprinter.tech">Tangle Network</a>. This venture marks another step forward in Sygma&#x2019;s mission of expanding network interoperability.</p><p>Following the integration, Tangle will have full interoperability with all EVM-based chains and the Polkadot ecosystem. Future connections will also be easily implemented through the Sygma framework, allowing Tangle to tap into new networks as they emerge.</p><h2 id="what-is-tangle">What is Tangle?&#xA0;</h2><p>The Tangle Network is a blockchain platform that provides secure, decentralized services to and from its community of code-contributing developers. Tangle uses advanced cryptographic techniques and a unique re-staking mechanism, offering a modular infrastructure to benefit developers, restakers and off chain service operators.</p><p>Tangle&apos;s modular design lets developers build and combine service components called Blueprints, such as oracles, bridges, and zero-knowledge applications.</p><p>Developers can earn rewards by contributing Blueprints, while operators earn by staking assets and providing validator services. Tangle ensures that staked assets from any ecosystem are used efficiently, offering rewards based on secured value.</p><h2 id="how-will-sygma-enhance-tangle">How will Sygma enhance Tangle?</h2><p>With a focus on seamless cross-chain communication and asset transfers, Integrating Sygma into Tangle will unlock:</p><ul><li><a href="https://docs.buildwithsygma.com/protocol/tailoredsecurity?ref=blog.sprinter.tech"><strong>Secure External Interactions</strong></a>: Sygma uses advanced cryptographic techniques to ensure integrity and confidentiality in cross-chain communications. Furthermore, Sygma will facilitate seamless interactions between Tangle and other blockchain networks.&#xA0;</li><li><a href="https://docs.buildwithsygma.com/protocol/generic?ref=blog.sprinter.tech"><strong>Cross-Chain Asset Transfers</strong></a>: Sygma enables the cross-chain transfer of assets between Tangle, <a href="https://docs.buildwithsygma.com/protocol/ecosystem/substrate?ref=blog.sprinter.tech">Polkadot</a>, and <a href="https://docs.buildwithsygma.com/protocol/ecosystem/evm?ref=blog.sprinter.tech">EVM chains</a>, expanding Tangle&#x2019;s user base and the effectiveness of apps developed with its infrastructure.&#xA0;</li><li><a href="https://docs.buildwithsygma.com/resources/github-repositories?ref=blog.sprinter.tech"><strong>Enhanced Developer Functionality</strong></a>: This feature will expand the functionality and <a href="https://docs.tangle.tools/developers/usecases?ref=blog.sprinter.tech">use cases</a> available to developers building on Tangle.</li></ul><p>As part of this partnership, the Sygma team will actively participate in the development, integration, testing, security auditing, and ongoing maintenance/support needed for the project.</p><p>We are committed to working closely with the Tangle team to address challenges and optimize the system&#x2019;s performance and security.</p><p>We aim to ensure a smooth, secure, and successful integration process.</p><h2 id="looking-ahead">Looking Ahead</h2><p>We are excited to play a pivotal role in enhancing Tangle&#x2019;s cross-chain capabilities. This integration marks a significant step towards making Tangle an interoperable and future-proof ecosystem. We look forward to an engaging and fruitful collaboration with the Tangle community!</p><h2 id="build-with-sygma">Build with Sygma</h2><p>Visit us at <a href="http://buildwithsygma.com/?ref=blog.buildwithsygma.com">buildwithsygma.com</a> &#x1F6E0;&#xFE0F;</p><p>Next-generation composability and interoperability will provide applications with the features they need. Whatever solution projects have in mind, Sygma gives you the power to deploy multi-chain infrastructure quickly, lowering the entry barrier for developers and users.</p><p>Check out <a href="https://docs.buildwithsygma.com/?ref=blog.buildwithsygma.com">our documentation</a> or <a href="https://github.com/sygmaprotocol?ref=blog.buildwithsygma.com">GitHub</a> to get started.</p><p>Have a question? Hop into <a href="https://discord.com/invite/Qdf6GyNB5J?ref=blog.buildwithsygma.com">our Discord</a> &#x1F44B;</p><p><a href="https://twitter.com/buildwithsygma?ref=blog.buildwithsygma.com">Twitter</a> | <a href="https://www.youtube.com/@buildwithsygma?ref=blog.buildwithsygma.com">YouTube</a></p>]]></content:encoded></item><item><title><![CDATA[Sygma x LayerEdge: Building an MPC bridge for Bitcoin]]></title><description><![CDATA[The first trust-minimized Bitcoin bridge, allowing users to transfer their BTC and inscriptions directly between Bitcoin and LayerEdge.]]></description><link>http://blog.sprinter.tech/sygma-x-layeredge-building-an-mpc-bridge-for-bitcoin/</link><guid isPermaLink="false">665897c2bc3cf1fd4cc0bc77</guid><category><![CDATA[Announcements]]></category><dc:creator><![CDATA[Ben Adar]]></dc:creator><pubDate>Thu, 30 May 2024 16:24:48 GMT</pubDate><media:content url="http://blog.sprinter.tech/content/images/2024/05/Untitled.jpeg" medium="image"/><content:encoded><![CDATA[<div class="kg-card kg-callout-card kg-callout-card-accent"><div class="kg-callout-emoji">&#x1F4E2;</div><div class="kg-callout-text"><b><strong style="white-space: pre-wrap;">Important Update:</strong></b><br>Sygma has evolved into&#xA0;<b><strong style="white-space: pre-wrap;">Sprinter</strong></b>, shifting from traditional bridging to&#xA0;<b><strong style="white-space: pre-wrap;">solvers and intent-centric infrastructure</strong></b>. While these posts reference Sygma, the core mission has expanded&#x2014;Sprinter now focuses on optimizing cross-chain execution through solver-driven and intent-centric tools.</div></div><img src="http://blog.sprinter.tech/content/images/2024/05/Untitled.jpeg" alt="Sygma x LayerEdge: Building an MPC bridge for Bitcoin"><p>Sygma is teaming up with LayerEdge to create the first hybrid trust minimized multi-party computation (MPC) based bridge for Bitcoin. The bridge will allow users to transfer their BTC and inscriptions directly between Bitcoin and LayerEdge.</p><h2 id="the-first-trust-minimized-bitcoin-bridge">The first trust-minimized Bitcoin bridge</h2><p>To prevent a single entity from controlling the critical signing key, the bridge uses a federated MPC approach for validating bridging requests. The key is created collectively through a secure ceremony by multiple relayer agents, so it never gets fully assembled in one place, avoiding vulnerabilities and single points of failure.</p><p>Instead of relying on traditional methods, like multi-sigs, relayers participate in the MPC ceremony for each bridging event. This method allows distributed computation on secret inputs without revealing outputs, providing a secure foundation for cross-chain transactions and data transfers.&#xA0;</p><p>The current relayers include <a href="https://chainsafe.io/?ref=blog.sprinter.tech">ChainSafe</a>, <a href="https://bwarelabs.com/?ref=blog.sprinter.tech">Bware</a>, <a href="https://phala.network/?ref=blog.sprinter.tech">Phala</a>, <a href="https://blockops.network/?ref=blog.sprinter.tech">Blockops</a>, <a href="https://buildwithsygma.com/?ref=blog.sprinter.tech">Sygma</a>, &amp; <a href="https://layeredge.foundation/?ref=blog.sprinter.tech">LayerEdge Foundation</a>.</p><figure class="kg-card kg-image-card"><img src="http://blog.sprinter.tech/content/images/2024/05/pasted-image-0--3-.png" class="kg-image" alt="Sygma x LayerEdge: Building an MPC bridge for Bitcoin" loading="lazy" width="1400" height="788" srcset="http://blog.sprinter.tech/content/images/size/w600/2024/05/pasted-image-0--3-.png 600w, http://blog.sprinter.tech/content/images/size/w1000/2024/05/pasted-image-0--3-.png 1000w, http://blog.sprinter.tech/content/images/2024/05/pasted-image-0--3-.png 1400w" sizes="(min-width: 720px) 720px"></figure><h3 id="layeredge">LayerEdge</h3><p>LayerEdge uses Bitcoin&apos;s built-in security to support BTCFi for native assets and inscriptions, creating a utility-driven ecosystem. As an Optimistic Rollup on Bitcoin, LayerEdge improves functionality with its unique Hybrid Modular Data Availability (DA) layer, ensuring data is verified and validated directly on Bitcoin. This Hybrid Modular DA also allows other Bitcoin Layer 2 solutions to use Bitcoin for data verification and validation while storing data on any existing DA layer. This method strengthens data integrity and offers flexibility for different data storage needs.</p><h3 id="sygma">Sygma</h3><p>Sygma is a cross-consensus interoperability protocol, enabling general message passing, asset transfers, non-fungible tokens, and decentralized finance. Sygma&#x2019;s initial framework, <a href="https://github.com/ChainSafe/chainbridge-core?ref=blog.sprinter.tech">Chainbridge</a>, was also the chosen bridge behind the launch of Avalanche&#x2019;s official<a href="https://medium.com/avalancheavax/the-avalanche-ethereum-bridge-what-you-need-to-know-b450d2ece03c?ref=blog.sprinter.tech"> Avalanche-Ethereum bridge</a>. With a focus on increasing interoperability, Sygma aims to enable users to leverage the unique benefits of multiple networks.</p><p>Our collaboration with LayerEdge marks a significant step forward in Sygma&#x2019;s mission of enhancing interoperability by improving the security and efficiency of cross-chain transactions within the Bitcoin ecosystem.</p><hr><h2 id="build-with-sygma">Build with Sygma</h2><p><strong>Visit us at</strong> <a href="http://buildwithsygma.com/?ref=blog.buildwithsygma.com">buildwithsygma.com</a> &#x1F6E0;&#xFE0F;<br><br>Next-generation composability and interoperability will provide applications with the features they need. Whatever solution projects have in mind, Sygma gives you the power to deploy multi-chain infrastructure quickly, lowering the entry barrier for developers and users.</p><p>Check out <a href="https://docs.buildwithsygma.com/?ref=blog.buildwithsygma.com">our documentation</a> or <a href="https://github.com/sygmaprotocol?ref=blog.buildwithsygma.com">GitHub</a> to get started.</p><p>Have a question? Hop into <a href="https://discord.com/invite/Qdf6GyNB5J?ref=blog.buildwithsygma.com">our Discord</a> &#x1F44B;</p><p><a href="https://twitter.com/buildwithsygma?ref=blog.buildwithsygma.com">Twitter</a> | <a href="https://www.youtube.com/@buildwithsygma?ref=blog.buildwithsygma.com">YouTube</a> </p>]]></content:encoded></item></channel></rss>