<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/">
    <channel>
        <title>Felix Lutsch</title>
        <link>https://paragraph.com/@felixlts</link>
        <description>I am an ecosystem builder and researcher writing about crypto infrastructure and the staking economy.
</description>
        <lastBuildDate>Sat, 04 Apr 2026 17:27:19 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>https://github.com/jpmonette/feed</generator>
        <language>en</language>
        <image>
            <title>Felix Lutsch</title>
            <url>https://storage.googleapis.com/papyrus_images/428df4dfd7ee854f619857a1311c8e592060a20fa8c995a57e8dfdb4f000ada6.jpg</url>
            <link>https://paragraph.com/@felixlts</link>
        </image>
        <copyright>All rights reserved</copyright>
        <item>
            <title><![CDATA[Quo Vadis Validation?
]]></title>
            <link>https://paragraph.com/@felixlts/quo-vadis-validation</link>
            <guid>1UJXEaJxhCobxK0fqRIz</guid>
            <pubDate>Mon, 04 Dec 2023 17:36:33 GMT</pubDate>
            <description><![CDATA[Restaking and Shared Security - The Future of Blockchain Infrastructure?This post is based on a keynote I gave on the Staking Summit 2023 during Devconnect Istanbul. As the blockchain ecosystem is expanding and maturing, a variety of different network architectures are emerging. Over the past few years, simple consensus networks with empty blocks turned into complex systems that rely on layers of infrastructure to enable a functioning and interoperable experience for developers and users alik...]]></description>
            <content:encoded><![CDATA[<h2 id="h-restaking-and-shared-security-the-future-of-blockchain-infrastructure" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Restaking and Shared Security - The Future of Blockchain Infrastructure?</h2><p><em>This post is based on a </em><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.youtube.com/watch?v=IlTXST0zRMM"><em>keynote I gave on the Staking Summit 2023</em></a><em> during Devconnect Istanbul.</em></p><p>As the blockchain ecosystem is expanding and maturing, a variety of different network architectures are emerging. Over the past few years, simple consensus networks with empty blocks turned into complex systems that rely on layers of infrastructure to enable a functioning and interoperable experience for developers and users alike.</p><h3 id="h-towards-modularity" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><strong>Towards Modularity</strong></h3><p>A trend towards a modular architecture can be observed both in application-specific blockchain ecosystems like Cosmos, as well as in general purpose smart contract platforms such as Ethereum. Successful applications on Ethereum are historically relying on a variety of additional middlewares to deliver useful products and a superior user experience.</p><p>Examples of such middlewares include oracles (e.g. Chainlink), automation (e.g. Gelato), indexing networks (e.g. The Graph), as well as interoperability protocols (e.g. Wormhole). Such tools take on the form of a separate protocol with its own trust network: a set of rules, operators, and in most cases token economics - or are even provided in a centralised manner. An example of a crypto application that found product-market fit are DeFi money markets such as Aave:</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/6455b47b0d2387dd71301bff986b9dac98a22e68bb15d4ac2e6d0c92a5edf422.png" alt="A high-level representation of the Aave lending protocol liquidation flow; an exemplary interaction of different stacks interacting with each other." blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="">A high-level representation of the Aave lending protocol liquidation flow; an exemplary interaction of different stacks interacting with each other.</figcaption></figure><h2 id="h-the-road-to-restaking" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">The Road to Restaking</h2><p>In addition to middleware, modular architectures can also help scale the throughput of blockchain systems by <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://celestia.org/learn/basics-of-modular-blockchains/modular-and-monolithic-blockchains/">splitting up core functionality across different layers</a> or simply through horizontally scaling (i.e. launching more chains/rollups). This approach stands in contrast to the original “world computer” vision of a single, composable state machine that handles everything. At this point, an integrated, monolithic design is predominantly being pursued by the Solana ecosystem, which seeks to maximise scaling through various hardware- and software-level optimisations.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/7a0da31453af5af31a5c6b0630a03f92289bba9f15be2041bdf2f8d536175b63.png" alt="Monolithic versus modular architectures." blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="">Monolithic versus modular architectures.</figcaption></figure><p>One of the core problems in a modular blockchain paradigm is that you end up with lots of separate trust networks with their own tokens and security assumptions. This is especially a problem since to compromise an application, an attacker would often only need to compromise the network with the least economic security.</p><p>In addition, the complexity of bootstrapping a new trust network and interoperability between them are issues impacting the developer and user experience in the modular paradigm. Thus, we have started to see models emerge that seek to enable developers to leverage the operators of another network in exchange for a fee share and often other incentives. The design space of such shared security models is large and goes back to <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://vitalik.ca/general/2017/12/31/sharding_faq.html">early sharding designs in Ethereum</a> and the <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.polkadot.network/whitepaper/">Polkadot parachain auction model</a>. More recent examples include <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://docs.eigenlayer.xyz/overview/whitepaper">Eigenlayer-championed restaking</a>, <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://medium.com/the-interchain-foundation/comparing-replicated-opt-in-and-mesh-security-a24d67e04b81">Cosmos-based concepts of Interchain Security and Mesh Security</a>, <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://github.com/avalanche-foundation/ACPs/discussions/10#discussioncomment-7373486">Avalanche subnets</a>, as well as <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://blog.astria.org/introducing-astria/">shared sequencing</a>.</p><p>At the deepest level, these approaches are comparable and try to achieve a similar outcome, which is lowering the cost of operation and increasing security for application developers by widening the scope of work and adding additional commitments required by node operators to sign off on. Broadly, there exist two ways of how protocols can delegate additional labor to operators:</p><h3 id="h-forced" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><strong>Forced</strong></h3><p>A protocol can require operators to operate additional infrastructure (e.g. additional execution layers or middlewares) in order to be able to participate. This article refers to such additional infrastructure as “sub-networks”. An early practical example of this pattern in the crypto space was the Terra network, where validators had to run additional oracle middleware binaries to the consensus binaries already in place. This is also the approach taken by the initial implementation of <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://medium.com/the-interchain-foundation/comparing-replicated-opt-in-and-mesh-security-a24d67e04b81">Interchain (Replicated) Security</a>, where - following a successful governance vote - the entire validator set of a Cosmos chain (with some caveats) has to run and opt into additional slashing penalties concerning a separate so-called consumer chain. Forced approaches lower flexibility and increase the infrastructure cost and strain on node operators. They also provide benefits for interoperability between sub-networks, as well as serve as a value accrual mechanism for the main network token, which is why they are a popular design.</p><h3 id="h-opt-in" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><strong>Opt-in</strong></h3><p>The protocol may allow node operators to opt into specific sub-networks or define specific roles that they can opt into. With this method flexibility for node operators is maintained, thus allowing for improvements in efficiency and allowing for broader participation increasing decentralisation. On the other hand, there are implications for sub-network interoperability and security assumptions in general. Eigenlayer restaking is the prime example of an opt-in design that seeks to expand the functionality provided by Ethereum node operators.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/10a3785f23a1480bacb6f5010daafa8a6d4553051dd7b25df16124c68b3a062f.png" alt="Visualising the different approaches of labor aggregation. In forced models, all 3 operators need to operate infrastructure for network A and B to receive rewards. In an opt-in design like restaking, operators choose the networks/roles they support, in this example operator 1 opts into network B&amp;C, while operator 2 opts into network A&amp;B (AVS in Eigenlayer terminology)." blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="">Visualising the different approaches of labor aggregation. In forced models, all 3 operators need to operate infrastructure for network A and B to receive rewards. In an opt-in design like restaking, operators choose the networks/roles they support, in this example operator 1 opts into network B&amp;C, while operator 2 opts into network A&amp;B (AVS in Eigenlayer terminology).</figcaption></figure><h3 id="h-the-operator-perspective" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0">The Operator Perspective</h3><p>As we have seen, the emerging modular ecosystem has enabled fast paced innovation and brought powerful applications to the crypto space. This expanding ecosystem leads to complex network topologies that present various tradeoffs to infrastructure providers who need to make decisions on which networks they support based on their available resources and network-specific cost and risk/reward calculations.</p><p>In the following, I will be exploring the trade-offs inherent in shared security models from the perspective of two types of infrastructure operators: solo stakers and professional staking provider companies.</p><h3 id="h-the-solo-staker-view" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0">The Solo Staker View</h3><p>Solo stakers are defined as individuals that want to participate in securing networks they support by running infrastructure on their own setup and predominantly with their own tokens.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/0ad188457ff825fbfc40e4809db24c763969563b49522315448bc27f9ba71566.png" alt="The solo staker view of shared security models." blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="">The solo staker view of shared security models.</figcaption></figure><h3 id="h-the-staking-provider-view" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0">The Staking Provider View</h3><p>Professional staking providers are incorporated for-profit entities that operate infrastructure for a variety of Proof-of-Stake networks and rely on delegations from token holders such as foundations, institutional investors, and retail token holders, as well as aggregators such as liquid staking protocols.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/ed6db64bb71104ff904a58352224723221f7a240a561b388c71ac4def393b7e8.png" alt="The staking provider view of shared security models." blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="">The staking provider view of shared security models.</figcaption></figure><h2 id="h-conclusion" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Conclusion</h2><p>To avoid fragmentation of security, the crypto ecosystem has conceptualised different models of sharing security between blockchain networks. Opt-in models like restaking provide flexibility by allowing operators to specialise and to make more granular economic decisions, while in forced models the network at large is making choices for all of its underlying operators.</p><p>This flexibility may help to bring about a more diverse and decentralised ecosystem on the one hand because it becomes feasible for smaller operators to take part and, on the other hand, larger operators are able to provide differentiated staking products based on their sub-network curation.</p><p>Finally, liquid (re)staking protocols and other aggregators could in the future play a coordinating role of assigning labor to operators seeking to provide the optimal user experience and risk-adjusted returns to token holders by abstracting away the complexity of sub-network and operator choice.</p>]]></content:encoded>
            <author>felixlts@newsletter.paragraph.com (Felix Lutsch)</author>
            <enclosure url="https://storage.googleapis.com/papyrus_images/400b3f4e78930f85071745e68cabdfa24984dcf912df34667ae33c21cca6d1e4.png" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[MEV: The Final Frontier of Staking Economics?]]></title>
            <link>https://paragraph.com/@felixlts/mev-the-final-frontier-of-staking-economics</link>
            <guid>0xZL08Mx4uPIL1UZlNyC</guid>
            <pubDate>Wed, 16 Nov 2022 18:26:52 GMT</pubDate>
            <description><![CDATA[A core enabler for the growth of crypto networks has historically been the issuance of new tokens to compensate active participants. From the Bitcoin block reward, to the distribution of inflated tokens to stakers in Proof-of-Stake, to yield farming enabling DeFi protocols to bootstrap liquidity. All these protocols usually have in common that token incentives are targeted to be temporary; distributed to bootstrap the protocol. Usually there is a fee - or at least an expectation - that a prot...]]></description>
            <content:encoded><![CDATA[<p>A core enabler for the growth of crypto networks has historically been the issuance of new tokens to compensate active participants. From the Bitcoin block reward, to the distribution of inflated tokens to stakers in Proof-of-Stake, to yield farming enabling DeFi protocols to bootstrap liquidity. </p><p>All these protocols usually have in common that token incentives are targeted to be temporary; distributed to bootstrap the protocol. Usually there is a fee - or at least an expectation - that a protocol is or will charge for the services it provides to users. These fees are expected to at some point compensate participants and reduce the need for dilution to pay for the services validators and their delegators, or - in DeFi protocols - other parties such as liquidity providers, provide. </p><p>In the past, the most common place these earnings have been expected to come from in smart contract networks was from gas fees paid to execute computation on the network. But improved scalability and the impact of high fees on the user experience have put this model somewhat into question. If networks can scale enough to serve all of their users’ needs, do they have to keep block space artificially scarce to create a sustainable business model? </p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/5ba45108df5a055ad99df2b2da3a4e517acdeefb81587e24c399bc74b10675bb.png" alt="Staking Economics 101." blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="">Staking Economics 101.</figcaption></figure><p>Enter <strong>MEV</strong>; a relatively recent phenomenon in the crypto space. The realization that there exist opportunities for block proposers to profit from inserting or reordering transactions in their blocks. Examples include e.g. arbitrage transactions balancing prices between DEXes, or - more exploitative - front-running DEX users. MEV as a research field is experiencing a rapid evolution.</p><p>At a high-level it looks as if leading protocol teams and the ecosystem at large are on a trajectory towards minimizing negative externalities and implementing solutions to create markets and mechanisms that ultimately aim to redistribute profits from these activities to network participants.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/79b86feefde441012710e8be1adafcea6b4199690c5e69bfb8369a76b389d658.png" alt="Current MEV extraction solution landscape." blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="">Current MEV extraction solution landscape.</figcaption></figure><p>Such a form of redistribution suggests that some of the yield required to ultimately pay for network security could be expected to come from MEV. In practice, currently most networks still rely mostly on token issuance to pay for network security. But a look at the data shows that there is a trajectory towards this narrative, especially in a more mature ecosystem such as Ethereum, where a lot of liquidity and activity take place.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/7b9b5198e75def2d150fc689b3180a694a158f9057b178aa0dd8e4015cfa814a.png" alt="Composition of Staking Rewards on notable Proof-of-Stake networks (Data from Nov &apos;22. Note: 50% of fees on ETH and SOL are lowering the effective issuance)" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="">Composition of Staking Rewards on notable Proof-of-Stake networks (Data from Nov &apos;22. Note: 50% of fees on ETH and SOL are lowering the effective issuance)</figcaption></figure><p>I presented on this topic at the Staking Summit hosted by Staking Rewards in November in Lisbon, listen to the full recording (starts at 1:24:44 below and find the associated slides <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://docdro.id/3LPE2u4">here</a>.</p><div data-type="youtube" videoId="-7AaOp7gw5M">
      <div class="youtube-player" data-id="-7AaOp7gw5M" style="background-image: url('https://i.ytimg.com/vi/-7AaOp7gw5M/hqdefault.jpg'); background-size: cover; background-position: center">
        <a href="https://www.youtube.com/watch?v=-7AaOp7gw5M">
          <img src="{{DOMAIN}}/editor/youtube/play.png" class="play"/>
        </a>
      </div></div><hr><p><em>Part of the above post was part of Chorus One’s Quarterly Insights research, a report we send out to our partners to keep them up-to-date. Sign up for it </em><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://chorus.one/research/quarterly-insights"><em>here</em></a><em> and reach out through </em><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://chorus.one"><em>https://chorus.one</em></a><em> to learn more!</em></p>]]></content:encoded>
            <author>felixlts@newsletter.paragraph.com (Felix Lutsch)</author>
            <enclosure url="https://storage.googleapis.com/papyrus_images/d306eaf10499a6853b8be7c9f9d4c2a17a1feb20a1a6eb4958e4baa7f62ca54c.png" length="0" type="image/png"/>
        </item>
    </channel>
</rss>