-
Network Highlight: Human Network
Human Network has been deployed on Symbiotic to secure its threshold Verifiable Oblivious Pseudorandom Function (tVOPRF) network, enabling anyone to derive cryptographic keys, called Human Keys, from human attributes while maintaining privacy and decentralization. This deployment represents a significant milestone in making self-sovereign digital identity both practical and secure. Reshaping Digital Identity Through Shared Security Traditional digital identity systems face a critical weakness
-
Network Highlight: Cycle
Cycle Network is now live on Symbiotic mainnet, enabling cross-chain transactions through Verifiable State Aggregation (VSA). By combining their state aggregation technology with Symbiotic's economic security, Cycle creates a more efficient alternative to traditional bridge architectures, enabling chain abstraction. Cross-Chain State Security Cycle's integration leverages Symbiotic's vaults to enforce correct state verification across chains. Cycle's architecture divides functionality into th
-
Network Highlight: Kalypso by Marlin
Kalypso by Marlin is now live on Symbiotic mainnet, introducing a groundbreaking solution for trust-minimzed AI agent verification. Through Symbiotic's flexible shared security framework, Kalypso dramatically reduces the gas costs of verifying Trusted Execution Environment (TEE) attestations, making verified AI agents economically viable for the first time. Transforming AI Agent Verification AI agents are becoming increasingly prevalent in DeFi and onchain governance, but a critical challenge
-
Network Highlight: bolt by Chainbound
bolt by Chainbound is live on Symbiotic mainnet, introducing credible proposer commitments to Ethereum. Through bolt's unique validator-centric design, validators can make verifiable commitments to include specific transactions in their blocks, backed by the economic security of Symbiotic's vault system. These commitments open the door to new use cases on Ethereum, starting with sub-second preconfirmations. A Fresh Take on Validator-Level Security bolt stands out through its approach to valid
-
Network Highlight: mev-commit from Primev
Ethereum's uncertain transaction finality has long frustrated users and developers. With the launch of mev-commit on Symbiotic, Primev introduces credible commitments that transform how transactions are included in blocks, enabling near-instant confirmation guarantees with reorg resistance for users. The Power of Binding Commitments mev-commit is a peer-to-peer coordination network where block builders make binding commitments about transaction execution. When users submit transactions with p
-
Network Highlight: Hyve DA
HyveDA is deploying its high-performance data availability (DA) solution on Symbiotic, implementing shared security for their 1 GB/s data availability layer. This deployment showcases how specialized infrastructure can leverage Symbiotic's shared security at scale. A New Approach to Data Availability HyveDA's Permissionless DAG (Directed Acyclic Graph) achieves 1 GB/s throughput while maintaining Ethereum-grade security. Unlike traditional DACs which rely on centralized proposers, HyveDA will
-
Network Highlight: Radius Secure Block Building
Maximal Extractable Value (MEV) has become a double-edged sword in blockchain ecosystems. While it generates crucial revenue for validators and rollups, it often comes at users' expense through frontrunning, sandwich attacks, and other predatory strategies. Radius has launched the Secure Block Building (SBB) primitive on Symbiotic to fundamentally change this dynamic. Rethinking MEV Extraction SBB is an individual component for MEV capture that Radius customizes and integrates for each rollup
-
Network Highlight: Hyperlane
Hyperlane has launched on Symbiotic mainnet to bring restaking-secured cross-chain communication to the broader blockchain ecosystem. Their implementation transforms how validator sets are secured for cross-chain messaging, using Symbiotic's vaults to enable capital-efficient economic security while maintaining strong slashing guarantees. Flexible Security Through ISMs Hyperlane uses Interchain Security Modules (ISMs) to verify message authenticity within their interoperability framework. Th