Professional Documents
Culture Documents
0 Economic Review
An Analysis of Ethereum’s Proof of Stake Incentive Model
Tanner Hoban1
and
Thomas Borgers1
1
About the Authors: Tanner Hoban and Thomas Borgers both work in Corporate Development at
ConsenSys.
Table of Contents
1. Executive Summary 5
2. Introduction 8
3. Background 9
Ethereum 2.0 Roadmap 10
5. Economics of Eth2.0 15
Participation 15
Rewards 15
Penalties 17
Slashing 17
Costs 18
Takeaways 19
7. Network Yields 29
Illustrating Network Outputs Using Base Assumptions 29
Network Average Net Yield 30
Comparing Net Yields 31
Revenue Yield Sources 33
WWIII Model 35
Using Narrower Parameters 36
Low ETH Price Analysis 39
Takeaways 40
2
Ethereum 2.0 Economic Review
Bibliography 87
3
Ethereum 2.0 Economic Review
Disclosures 101
4
Ethereum 2.0 Economic Review
1. Executive Summary
The Ethereum 2.0 network upgrade is an ambitious and gradual shift towards a Proof-of-Stake
consensus algorithm and incentive system, which has far-reaching implications on the economic
properties of the network. The design of the system is complex — the incentive mechanism
rewards honest network participants for validating transactions and finalizing historical states of
the network, while penalizing offline and malicious validators. In this paper, we define, measure,
and analyze Eth2’s cryptoeconomic security using a detailed economic model of the network
and new economic evaluation tools.
First, to support an economic review, we constructed an economic model, built in Excel, for
interpreting outputs of the system under current specifications and for select scenarios. Over the
course of this project, we incrementally developed and leveraged this model to articulate
expectations and form data-driven conclusions on validator revenues, costs, yields, and network
issuance. The Eth2 system is reliant on nearly 100 variables that have a material impact on
these outputs. With this model, we dynamically illustrate validator profitability at varying ETH
prices and total ETH staked, underscoring the variability of impact on network security.
We define a required and sufficient level of economic security in Eth2.0 Phase 0 using a set of
assumptions around the cost to attack the network. The objective is to make attacks costlier
than the potential benefits of an attack and to achieve a similar level of security to the current
Ethereum blockchain (Eth1). We identify two main categories of economic attack vectors, each
with variants and differing levels of risk: Supermajority Attacks and Finality Attacks. In Phase 0,
we are primarily concerned with attacks that aim to sabotage the network; we find the network is
at risk of sustaining such attacks, but are more concerned about further phases. We estimate an
ETH stake rate target of 13.8%, which provides adequate security from potential attacks under
historical ETH price and hashrate conditions.
Security in Eth2 is highly dependent on ETH staked, which itself will be a function of yields. We
form a model to understand the motivation of capital efficient investors, which we term the
Required Serenity Active Validator Yield (RSAVY) model, addressing the risks and costs of
staking and the corresponding required rate of return (RRR). Based on our results, we expect a
required revenue yield (which we use as a proxy for a minimum yield) from validators under an
optimized network (endogenous and exogenous) of 3.3% for validators to consider participation.
Under a more bearish yet stable scenario, this revenue yield requirement increases to 11.6%.
The RSAVY model is leveraged not only to calculate required rate of returns, but also to form a
picture of the network under select scenarios. We apply different parameters in these scenarios
to support our conclusions and recommendations, which are summarized below.
5
Ethereum 2.0 Economic Review
Conclusions:
● Ethereum 2.0’s Proof of Stake is highly complex relative to Proof of Work. Eth2 is a
highly complex and elaborate system. It is elegantly constructed and thoughtfully
designed, but from a validator’s perspective can be difficult to grasp, contributing to a
sense of uncertainty and unpredictability, presenting a practical and narrative barrier for
potential capital efficient validators.
● Security of the network in Eth2 is dependent upon three key variables: ETH
staked, the price of ETH, and volatility. Each of these variables has a direct or indirect
impact on the cost of attacking the network. Total ETH staked is the most controllable
variable, while the price of ETH has a direct and potentially large impact on network
security but is outside the control of the system. Volatility can come from different
sources and impacts both ETH stake and price of ETH indirectly.
● Attacks on Eth2 are easier to scale than on Eth1. In Eth2, the physical and
hardware-driven burdens of network participation recede to essentially minimal hardware
and power consumption. Moreover, the flourishing of DeFi and eventual connectivity to
Eth2 can vastly accelerate and magnify this trend.
● Capital efficient validators are more predictable. While participation from Ethereum
enthusiasts is important for a successful Beacon Chain launch, it is ultimately inadequate
to reach sufficient levels of security. Attracting capital efficient validators will lead to
higher fidelity in targeting a sufficient level of ETH staked.
● Targeting 13.8% ETH staked will match security levels of Eth1 at historical prices.
We calculate that the target ETH stake rate for adequate security under historical price
fluctuations is 13.8%.
● Economies of Scale for validating exist but are reduced at higher ETH prices.
Unlike Proof of Work environments where profitability can only be accomplished by
increasingly large-scale operations, Eth2 validating becomes progressively less
expensive as the price of ETH increases. We generally find the network economics
highly favorable for more decentralized network participation, meeting Eth2’s design
objectives.
● 77.7% of the current ETH supply is in validator ‘qualified’ wallets (holding over 32
ETH). Approximately 86.6mm ETH (77.7% of total supply) is being held by
non-exchange wallets with over 32 ETH. An additional 18.7mm ETH is managed by
exchanges subject to staking services. This is a compelling serviceable addressable
market, and a key objective of the incentive program to maximize network participation
should be to convert these wallets into active validators.
● Eth2 is paying significantly less for security than Eth1. Using current beacon chain
specs and 15.5mm ETH staked (13.8%), we estimate network inflation of 0.55% per
year, far less than the current 4-4.5% from Ethereum’s Proof of Work network.
● Network security is heavily reliant on the price stability of ETH. Our primary concern
with regards to the economic stability and security of Eth2 is the resilience of the network
6
Ethereum 2.0 Economic Review
at low ETH prices. Combined with the ability for an adversary to rapidly scale attacks, we
consider this a cause for concern.
● The lack of liquidity in Phase 0 and 1 might cause unpredictability and
centralization. Given the lack of a two-way bridge between Eth1 and Eth2, and the lack
of transaction capabilities in Phases 0 and 1, we expect a secondary market to form
facilitated through derivatives and centralized exchanges. A high concentration of
validators leveraging these platforms creates centralization risk and unpredictability.
● Beware of Derivative attacks. The Ethereum ecosystem is rapidly evolving and so is
Ether as an asset class, with options volume increasing and unique financial instruments
like “flash loans” being used in malicious exploits. With this momentum, derivatives could
become the favored avenue of attack for adversaries.
Recommendations:
● Increase the Base Reward Factor to at least 128: We acknowledge the implications of
increasing the network’s payment for security, but at a Base Reward Factor of 64, we
believe the network is underpaying for security - and it would be prudent for the network
to err on the side of caution during its phased migration to proof of stake.
● Explore a more dynamic method to changing Rewards in the event of a shock,
such as an ETH price collapse (i.e. explore the implementation of a safety net). We
recommend exploring a more dynamic method for scaling rewards or altering the Base
Reward Factor in the case of network shocks. This could include using threshold
triggers, step functions, or functions related directly to ETH price.
7
Ethereum 2.0 Economic Review
2. Introduction
The Ethereum 2.02 network upgrade, also termed Serenity, represents an ambitious shift to new
technological and crypto-economic foundations for the Ethereum blockchain. Serenity not only
introduces Sharding and a new virtual machine in eWASM, but also marks the gradual shift
towards a Proof-of-Stake consensus algorithm and incentive system, which has far-reaching
implications on the economic properties of the network.
There exists a substantial body of work on Eth2.0’s technological changes and associated
impacts, from research on new primitives and components to the exploration of new attack
vectors and security risks in the system. This is not the focus of this report, and we assume
basic knowledge of Ethereum and its roadmap throughout.
This report is a review of the economic incentive mechanisms underpinning Eth2.0’s Proof of
Stake (PoS) system, and is focused on analyzing Serenity's design from an economic
standpoint, focusing especially on security and stability of the system. The objectives are
two-fold:
1. To describe in plain terms how the system works from an economic point of view, what
behaviors it rewards and penalizes, and the yields validators can expect from
participating in the network.
2. To identify risks derived from the economic parameters of the system under endogenous
permutations and exogenous shocks, and make recommendations to address them.
We find that the Eth2.0 system is highly complex but elegantly constructed and deeply thought
out. In this context, we explore the following key risks:
● Complexity of system design and value proposition
● Uncertainty of Phases 0-1
● Possibility that yields may not incentivize enough ETH staked
● High dependency on the price of ETH
● Frictionless scaling up or down of the number of validators
● Centralization risk in Phase 0 through centralized exchanges and a derivatives
ecosystem
● Finality attacks and extra-protocol attacks
2
Throughout this report, we refer to the blockchain or network Ethereum 2.0 under different names:
Ethereum 2.0, Ethereum 2, Eth2.0, Eth2. When referring to the price of ETH — the cryptocurrency, we
use capitalization. This can also take the form of ETH1 and ETH2 - referring to the ETH generated in the
current Ethereum 1 blockchain vs. the future Ethereum 2.0 chain.
8
Ethereum 2.0 Economic Review
All variables and inputs dealing with the construction of Eth2.0 itself are based on the current
specification at time of writing, v0.12.03. Furthermore, the conclusions of this report are derived
largely from three types of sources:
● A substantial body of research, documentation, blog posts, and other material related to
Eth2.0
● A series of stakeholder interviews comprising the following groups:
○ Eth2 Researchers
○ Eth2 Implementers
○ Pool Operators
○ Staking-as-a-Service Infrastructure Providers
○ Retail investors, users, and enthusiasts
○ Institutional Investors
● An economic model representing Eth2.0 Phase 0
The conclusions from stakeholder interviews are synthesized and included in the report
wherever relevant; they can also be found in Appendix B. The economic model is the foundation
of the scenario analyses represented in charts and figures throughout the report; it can be found
here.
Structurally, we start by providing background (Section 3) for the transition of Eth2.0 as well as
the core design goals and properties of Serenity. The purpose of this report is not to describe in
detail the functionings of the system; as such, we only provide context where directly relevant to
the objectives of the report. Moreover, we focus primarily on Eth2 Phase 0, given its immediacy
and the uncertainty inherent in the following phases. We follow this section by defining a
framework for evaluating security, which serves as the foundation for our analyses. Section 5
then gives an overview of the economics of Eth2.0 Phase 0, covering rewards and penalties,
slashing, and costs of network participation. Section 6 articulates the construction of the
economic model, outlining key assumptions. Section 7 outlines measurements and expectations
for network inflation and yields. Section 8 introduces a required rate of return model to analyze
yields, while Section 9 covers economic attack vectors. Section 10 covers our scenario analyses
around the key economic parameters of the system. We then conclude with recommendations
and potential next steps.
3. Background
From the release of the Ethereum White Paper in late 2013, there have been references and
research efforts aimed at shifting Ethereum’s security model from Proof of Work (PoW) to Proof
3
See Github page.
9
Ethereum 2.0 Economic Review
of Stake,4 motivated by a desire to improve the scalability, throughput, and security of the
system.5
Eth2.0 or Serenity is the network upgrade that activates this shift. Its design goals are
articulated clearly in the Eth2.0 specification:6
● to minimize complexity, even at the cost of some losses in efficiency
● to remain live through major network partitions and when very large portions of nodes go
offline
● to select all components such that they are either quantum secure or can be easily
swapped out for quantum secure counterparts when available
● to utilize crypto and design techniques that allow for a large participation of validators in
total and per unit time
● to allow for a typical consumer laptop with O(C) resources to process/validate O(1)
shards (including any system level validation such as the beacon chain)
We extrapolate from the above three driving objectives that set the frame for our analyses of the
system: security, long-term stability, and decentralization. It should also be noted that the shift to
Ethereum 2 is intended to bring orders of magnitude improvements in performance and
scalability.
4
In the Ethereum white paper, Vitalik Buterin notes that “in the future, it is likely that Ethereum will switch
to a proof-of-stake model for security”. For an insightful and revealing look into the early thinking around
Proof of Stake development, we recommend Vlad Zamfir’s 5-part “The History of Casper” series, starting
with Part 1.
5
Eth2.0 aims to provide an optimal solution to the “Scalability Trilemma”. See “Sharding FAQ” on Github.
Also note there are other reasons for shifting to Proof of Stake, such as accessibility and reduced
environmental impact.
6
See Eth2.0 spec on Github.
10
Ethereum 2.0 Economic Review
Phase 0 introduces the Beacon Chain, which serves as the root chain for all Eth2.0
shards (starting in Phase 1). In Phase 0, the Beacon chain acts as the heartbeat of the
entire system, setting the cadence for the blockchain on a rhythm of slots (the equivalent
of present-day blocks, roughly every 12 seconds) and epochs (a set of 32 consecutive
slots, roughly every 6.4 minutes). It is responsible for “managing validators and their
stakes; nominating the chosen block proposer for each shard at each step; organising
validators into committees to vote on the proposed blocks; applying the consensus rules;
applying rewards and penalties to validators; and being an anchor point on which the
shards register their states to facilitate cross-shard transactions.”7
Phase 1 introduces sharding, with an initial set of 64 shards that operate in parallel to
the Beacon chain through a system of crosslinks. “Phase 1 is primarily concerned with
the construction, validity, and consensus on the data of these shard chains. Phase 1
does not specify shard chain state execution or account balances.”8 In short, Phase 1
adds a data layer that acts as a test of the system’s full sharding infrastructure.
Phase 2 adds execution to the data layer with execution environments in every shard.
As such, “Shard chains transition from simple data containers to a structured chain state
and Smart Contracts will be reintroduced. Each shard will manage a virtual machine
based on eWASM.”9
As mentioned previously, we will focus primarily on Phase 0 for the remainder of this report.
What is important to note is that this first phase introduces several new paradigms from an
economic standpoint:
7
See “State of Ethereum Protocol #2: The Beacon Chain” by Ben Edgington for more details on the
Beacon chain.
8
See Eric Conor’s “Ethereum 2.0 Phases” on Ethhub.io.
9
Ibid. We also note that it is possible that shards could contain execution environments based on different
types of VMs, such as the EVM.
11
Ethereum 2.0 Economic Review
Proof of Stake - As stated in the Ethereum PoS FAQ, “Proof of Stake (PoS) is a category of
consensus algorithms for public blockchains that depend on a validator's economic stake in the
network.”10 PoS changes the cost profile of validation; it lowers the barrier to entry for direct
participation in Ethereum’s consensus (block proposing and voting) to a minimum of 32 ETH11
plus a relatively inexpensive setup for validation (through hardware, cloud, or a third-party
service); this should have the effect of reducing centralization through economies of scale. It
makes it far more costly to execute 51%-style attacks by introducing slashing, where attackers
get their stakes slashed for malicious behavior. PoS also requires validators to lock up their
stake for a minimum period of time, which has an impact on how validators think of opportunity
cost of participation. In Phase 0, this is particularly severe, as the stake and the generated
rewards are locked up until Phase 2.12
Economic Finality - Whereas Ethereum today, like Bitcoin, relies on probabilistic finality, Eth2.0
aims for stronger economic guarantees around block finalization. “Economic finality is the idea
that once a block is finalized… then the only way that at any point in the future the canonical
history will contain a conflicting block is if a large number of people are willing to burn very large
amounts of money.”13 In other words, once blocks are final (which typically happens at epoch
N+2 in Eth2.0), they are prohibitively expensive to revert from an attacker’s standpoint. This has
the effect of reducing the risk profile for most well-known attacks in a PoW context; it also
introduces attack vectors centered around preventing or delaying finality, which we discuss in
Section 9.
New ETH - In Phase 0, validators are required to lock up their ETH stakes until the merging of
Eth2.0 with the current Ethereum chain; all rewards generated are also locked until Phase 2,
when accounts are introduced and the current Ethereum chain is merged in. As a result, this
has the effect of segregating the ETH created on Eth2 from the ETH on the PoW chain. The
new ETH is thus non-transferrable and not usable until Phase 2. This dynamic creates strong
incentives for a derivatives market around ETH2 (which we expect will be dominated by
exchanges), which can introduce new extra-protocol attack vectors (explored in Section 9).
Lastly, it is important to note that Phase 0 is introduced in parallel to the current Ethereum PoW
chain, commonly referred to as the Eth1 chain. This means that any issuance on Eth2 is
incremental to the Eth1 Ether generated through PoW mining.
10
See Ethereum “Proof of Stake FAQ” on Github.
11
Lower if a validator stakes indirectly, e.g. via staking pools or exchanges.
12
We explore this further in Section 8.
13
Ibid.
12
Ethereum 2.0 Economic Review
Assumptions
Eth2.0 is a highly complex and dynamic system; it is thus necessary and important to make
certain assumptions around the behavior of actors in the system and the exogenous forces that
can impact its security model. We assume:
● that the majority of actors are economically rational; that is, that actors, particularly
malicious actors, are motivated by personal economic gain.14
● that the price of ETH is highly volatile.
● that the security model of Eth2.0 must be at least as secure in aggregate as that of Eth1,
given that Serenity is a network upgrade to Eth1.
● that an “attack” refers to an attempt by a malicious attacker to corrupt, manipulate, or
censor the Beacon chain (in Phase 0) or one shard (in Phase 1 and beyond) for the
purpose of personal financial gain.
With that in mind, we define a required and sufficient level of economic security in Eth2.0 Phase
0 as meeting the following two criteria:15
1. The cost of attack of the Beacon chain must be equal to or greater than the economic
gain derived from the attack.
2. The cost of attack of the Beacon chain must be equal to or greater than the cost of an
equal or corresponding attack on the Eth1 chain.16
Where :
● C ET H2 is the cost of attack in Eth2
● C ET H1 is the cost of an equivalent or corresponding attack in Eth1.
14
We recognize that a large number of participants, particularly in phase 0, are not necessarily
economically motivated; in Section 8 we refer to these participants as yield-apathetic.
15
Note we do not consider this framework as a formal definition or mathematical proof of security; rather,
we consider this a useful, albeit simplified, model for security, allowing us to form broad conclusions about
the system.
16
As indicated in Section 9, it is difficult to always find equivalent or corresponding attacks across Eth1
and Eth2, as some attacks are original to PoS systems.
13
Ethereum 2.0 Economic Review
The definition above suggests security is dependent on C ET H2 being high. This cost is itself
primarily dependent on two factors: the price, multiplied by the quantity of ETH staked.
Price is dependent on money supply, velocity of money, and market speculation. While a highly
inflationary system could have a serious impact on the price, this is not a primary concern in this
case, as network inflation (including ETH1 inflation) is roughly 4%-5%17 and is only set to
decrease with time. Velocity of money is difficult to extrapolate; however, as explored further in
Section 8, we expect velocity to be lower when long-term holders18 hold large quantities of ETH;
in other words, the more long-term holders hold ETH, the less that ETH changes hands, which
creates upward pressure on ETH price (assuming demand remains high). Lastly, we can
assume the price will depend significantly on speculation and perceived future demand of the
system19. Both of these forces are difficult to influence directly through Eth2.0’s economic
parameters.
The quantity of ETH staked is more directly influenced by the system’s parameters, and
depends primarily on net validator yield and the opportunity cost of that yield, as we measure
later in this paper. The net validator yield is based on the gross yield, or ‘revenue yield,’
determined primarily by the system’s Base Reward Factor (see following section); as well as the
cost of validating. The opportunity cost captures the notion that capital efficient (i.e.
economically incentivized) validators choosing to validate on Eth2.0 are making a risk/reward
decision between Eth2.0 staking and other ways to allocate their capital (they could, for
example, choose to place their ETH in Defi products). In Section 8, we go into more detail
around yield expectations and required rate of return.20
In Section 10, we use the security framework above and run scenario analyses to determine
how changes in key parameters, as well as external shocks, impact the security of the system.
To understand the impact of these parameters, it is important to have an understanding of
Eth2.0’s incentive system.
17
Supply inflation of approximately 3.8% on ETH1 plus approximately 0.1-1.0% on ETH2.
18
This includes and primarily refers to institutional investors, as well as “whales”.
19
Usage of the system requires paying gas fees in ETH, meaning increased usage increases demand for
ETH to pay for that usage.
20
We note that there is a prevalent assumption that the Eth2.0 staking yield should be treated as the
risk-free rate for the Ethereum (or even cryptocurrency) ecosystem. We do not ascribe to this view, as
there is too much uncertainty around the economics of the system at present, and in any case, we would
need to factor in a technical risk premium for validation (including faulty setups, slashing, etc.) and an
illiquidity premium from the lockup period from Phase 0.
14
Ethereum 2.0 Economic Review
5. Economics of Eth2.0
Eth2.0’s Proof of Stake system relies on an incentive mechanism that encourages honest
behavior and high uptime while penalizing malicious behavior. We will not spend substantial
time detailing the mechanisms given the existing body of work.21 We will, however, extract the
key factors and insights as they relate to our economic analysis.
Participation
Becoming a validator in Eth2.0 requires locking up at least 32 ETH. A validator represents one
discrete chunk of 32 ETH, and every additional validator requires another discrete 32 ETH. To
lock up their stake, the validator must send ETH to the deposit contract on the ETH1 chain.
Importantly, this transaction is a one-way transfer; the “ETH consumed by the deposit contract is
no longer usable on Ethereum 1.0”.22 As we will explore in a later Section, this represents a
significant impediment to investment from institutional investors, along with the Phase 0 lockup
requirement.
Once the ETH is sent to the deposit contract, the validator is entered into a queue in the Eth2.0
Beacon Chain and eventually begins validating blocks at designated slots in every epoch. As a
refresher, the PoS blockchain is divided into epochs, which themselves are made up of 32 slots,
during which validators vote on new blocks. In simple terms, validators are shuffled randomly
into committees of equal size (with a minimum of 128 validators) at every epoch in such a way
that each validator is in exactly one committee and votes exactly once per epoch (effectively
they are allocated to one committee in one slot every epoch).
Validators are then incentivized to honestly participate in the validating process through a
system of three major incentives: rewards, penalties, and slashing. The system is designed to
incentivize honest behavior and consistent uptime, without enforcing draconian penalties for
minor offenses (sometimes out of the user’s control), such as going offline a few days.
Rewards
Validators are rewarded for honest and consistent validation at every epoch. Before diving into
the types of rewards, a short aside on the finalization process of the chain: epochs are
processed and finalized according to a combination of the LMD GHOST and Casper FFG fork
choice rules, as described in the Gasper paper.23 As such, epochs are first justified and then
finalized on a timeline of checkpoints, which refer to the blocks at the first slot of an epoch. A
validator at a certain epoch has a few responsibilities to ensure this process runs smoothly.
21
See Appendix A for resources that provide a more detailed look.
22
See “Ethereum 2.0 Phase 0 -- Deposit Contract” on Github.
23
See “Combining Ghost and Casper” paper.
15
Ethereum 2.0 Economic Review
Namely, the validator, during their assigned slot in an epoch, must attest to (ie. vote for) the last
justified checkpoint (called the source), the latest epoch checkpoint (called the target), and the
current head of the chain (the block that has just been proposed). The former two votes are part
of the FFG finality rules, while the head vote stems from the LMD GHOST rule. If a justified
checkpoint receives a ⅔ supermajority vote, it becomes finalized; similarly, “when an epoch
ends, if its [latest] checkpoint has garnered a ⅔ supermajority, the checkpoint gets justified.”24
Lastly, while validators must attest once per epoch, they are also occasionally pseudorandomly
selected to propose blocks; when this happens, they must propose a block at their designated
slot and provide an attestation as well.
With this context in mind, there are six types of rewards available per epoch, including
whistleblower rewards, based on the order of operations of epoch processing:
● The source vote: An FFG vote on the last justified epoch block
● The target vote: An FFG vote on the latest epoch checkpoint block
● The head vote: LMD GHOST vote on chain head (ie. current block)
● The Proposer incentive: an incentive that is given to the proposer of a new block once
that block is finalized
● The Attester incentive: an incentive rewarding the timely inclusion of an attestation in
the chain (this incentive depreciates for every slot it has not been included in the chain)
● The whistleblower reward: “a reward for providing a proof that a proposer or attester
has violated a slashing condition.”25 While this reward is typically split between the
reporter and the proposer who includes the proof in a newly proposed block, in Phase 0
the reward is entirely awarded to the proposer.
Aside from the whistleblower reward, all other rewards are based on a concept called the “base
reward,” which is derived from the following formula:26
Where:
● Effective balance is an individual validator’s current effective balance27
● BASE_REWARD_FACTOR is a constant that effectively determines the magnitude of
rewards for validators
● Total balance is the sum of the effective balances of all validators
24
See “The Beacon Chain Ethereum 2.0 Explainer You Need to Read First” by Joseph Chow.
25
See “Eth2 Annotated Spec” by Ben Edgington.
26
See “Rewards and Penalties on Ethereum 2.0 [Phase 0]” by ConsenSys Codefi for a more detailed
explainer around the base reward and how it contributes to each type of incentive. For an understanding
of the rationale behind the base reward model and its distribution, see Vitalik Buterin’s “Serenity Design
Rationale”.
27
For an explainer of effective balance vs. active balance, see “Understanding Validator Effective
Balance” by Jim McDonald.
16
Ethereum 2.0 Economic Review
Importantly, the constant that has the largest impact on the rewards, and thus on expected
yields and network influence, is the BASE_REWARD_FACTOR. Shifting this variable up or
down will have effects on the amount of ETH staked, as explored in Section 10.
Penalties
When validators run their validator clients according to specification on machines that meet the
suggested requirements, while maintaining high uptime, they should only worry about the
rewards outlined above and see a steady stream of ETH rewards accumulating over time.
However, if a validator fails to meet their responsibilities (as described above), they will incur
penalties that are proportional to the rewards they would have obtained for executing on those
responsibilities. Given this penalization model, the penalties are largely aimed at validators who
are active but are offline (as opposed to slashing, which penalizes malicious behavior). In short,
validators receive penalties equivalent to the base reward w hen they fail to attest to the source,
target, and head in each of the first three votes described above.
Inactivity Leak
There is one special condition to mention with regards to penalties: if the chain is unable to
finalize for a period of 4 epochs, it enters an “inactivity leak” mode. In this mode, validators that
are offline and/or not voting are hit with an inactivity penalty that increases quadratically for
every checkpoint that is not finalized. The intention of this mechanism is to address a scenario
where a large number of validators (e.g. 1/3 of validators) go offline - the dreaded “WWIII”
scenario. The leak mode then increases the ratio of online to total validators above 2/3, so the
chain can start finalizing again.
Slashing
Whereas penalties are mainly intended to incentivize honest validators to stay online and
maintain their clients, slashing is primarily designed to make it prohibitively expensive to attack
the Eth2.0 chain. There are three ways to get slashed:
1. Double proposal: a proposer proposes two separate blocks
2. Surround voting: an attester makes an FFG vote that surrounds or is surrounded by a
previous FFG vote they made, making it unclear which version of reality they are
attesting to.29
3. Double target vote: an attester casts a vote for two separate target blocks at the same
epoch.
28
Once for the source vote, once for the target vote, once for the head vote, and once split between the
proposer and attester incentives.
29
See “The Beacon Chain Ethereum 2.0 Explainer You Need to Read First” by Joseph Chow.
17
Ethereum 2.0 Economic Review
When a validator gets slashed, a few things happen: first, the validator is forced to exit the
chain, ensuring any attack cannot be repeated; and second, the validator’s stake is penalized,
ranging from 0.5 ETH to the total value of the stake, depending on how many other validators
have been slashed. Hence, the magnitude of each individual slashing is proportional to the
correlation of all slashed stakes, making it extremely expensive for validators to coordinate
large-scale attacks. For example, “if ⅓ of all validators commit a slashable offence in a similar
period of time, they lose their entire balance.”30
It is worth noting that “in all these cases, the offender needs to be caught in order for the
slashing process to be triggered.”31 This is where whistleblowers are rewarded, as described
above.
Costs
The rewards, penalties, and slashings described represent the system’s mechanisms for
incentivizing proper validator behavior and regulating ETH issuance in the network. This is one
side of the yield equation from the user or validator perspective. The other side corresponds to
the costs to interact with Eth2.0. Becoming a validator for Eth2.0 requires running a client, which
can be done by the validator or can be delegated to a third party service, typically for a fee.
Structurally, the client software is split into two components: the beacon node and the validator
client. The beacon node is responsible for talking to the network of nodes and maintains a view
of the Beacon Chain. Validator clients, on the other hand, handle the logic of the validation —
proposing and attesting to blocks, and can support one or more “validators,” ie. stakes of 32
ETH. Based on interviews with Ethereum Foundation researchers and client teams, we estimate
that each beacon node could potentially handle up to one thousand validator clients. This is an
important consideration, as it broadens access to validation; but it also means economies of
scale are possible for large validators.
Deployment Types
Costs of participation in validation will depend on the type of deployment selected by the
validator, with certain deployment types suiting some validator profiles more than others. There
are broadly three categories of ways to participate in Eth2 validation, with several hybrid
possibilities at the intersections:
Do it Yourself (DIY): Compared to Eth1 mining, validation in Eth2 is far less resource-intensive
and does not require specialized equipment (such as ASICS and highly optimized mining
30
Ibid.
31
See “Rewards and Penalties on Ethereum 2.0 [Phase 0]” by Herman Junge and Tim Lowe.
18
Ethereum 2.0 Economic Review
facilities), reflecting the stated design goal of maximizing decentralization. As a result, individual
validators can choose to run the software themselves, either on hardware or a cloud setup.
● Hardware: validating on Eth2.0 requires running the Eth2.0 client as well as an Eth1
client, given that the Eth1 chain runs in parallel. While an often-touted goal of Eth2.0 is
to enable validation on devices as inexpensive as a Raspberry Pi, it is still unclear, given
the lack of multi-client testnets, that such a setup would meet requirements.32 Other,
more suitable options include a dedicated desktop computer, a server, or a dedicated
node service (e.g. DappNode or Avado). Importantly, the systems should be dedicated
for the purpose of validation to minimize risk of interruption, and precautions should be
taken for electricity and internet disruptions.
● Cloud: validation can also be performed through cloud deployments on any major cloud
provider (e.g. AWS, Azure, etc.). We estimate requirements in the following Section.
Staking-as-a-Service (StaaS): On the other end of the spectrum, validators may prefer to
delegate staking responsibilities to a StaaS provider. We expect this option to come in several
flavors. On one hand, a validator may want to be fully serviced; others may prefer custodying
their stake with a custodian while connecting in via API to run their own validator client. We
anticipate two prominent trends for StaaS: popular exchanges offering StaaS for their retail
clients, accepting stakes of all sizes (this will likely represent a significant gateway to staking for
many retail users); and institutional investors and large ETH holders opting for StaaS to reduce
technical and balance sheet risk. While fees for retail clients via exchanges might be quickly
commoditized and trend lower, based on interviews with infrastructure providers, we expect fees
for institutional solutions to range between 10% and 15% of earnings.
Staking Pools: A common model for Eth1 mining for individuals who do not run large-scale
mining operations is to participate in a mining pool. Similarly, staking pools will exist for Eth2.0
participation. While the DIY models above are all reserved for validators who have 32 ETH or
more, Staking Pools can accommodate validators who have less than 32 ETH and want to
participate in a decentralized way (as opposed to relying on centralized exchanges). We expect
several forms of staking pools and different methods of participation here as well. For example,
Rocket Pool, one of the more prominent near-fully decentralized pools built for Eth2, will
function as a marketplace for staking, with demand-side users enabled to pool their stakes, and
supply-side node operators performing validation on behalf of those stakes. We expect pools to
charge similar, although slightly lower rates than StaaS providers.
Takeaways
In sum, from a validator perspective, there are a few key endogenous parameters and
exogenous forces that have substantial impact on the economics of the network. In terms of
32
At the time of writing, we are seeing several validators use Raspberry Pis in testnets such as Witti and
Altona.
19
Ethereum 2.0 Economic Review
Overview
We constructed a detailed economic model, built in Excel, for the purpose of analyzing the
mechanics of the incentive system of Eth2 more rigorously. Over the course of this project, we
developed and leveraged this model to articulate expectations and form data-driven conclusions
on validator revenues, costs, yields, and network issuance. The Eth2 system is complex —
reliant on nearly 100 variables that have a material impact on these outputs — and the system
is pre-launch, leading to the inevitability of estimation in the model. However, nearly all of the
assumptions made in this analysis are supported by ecosystem user surveys, Eth2 forums (e.g.
Github), stakeholder interviews, and/or conversations with the Ethereum Foundation. In this
section, we walk through how the model was architected and lay out the default assumptions, or
“Base Assumptions,” and its outputs, used in formation of our scenario analyses in Section 10.
Control Panel: A panel of input cells for core network assumptions alongside dynamic charts
and tables for quick analysis of underlying network variables.
Eth2 Models: Models that replicate the algorithm of the Eth2 network incentivization system to
calculate validator yields for different deployments under two different economic environments.
● Annualized Model: An Eth2 Model designed to simulate annualized economic
conditions of Eth2 under steady state33; forms the basis of inputs into dynamic data
tables based on total ETH staked into the network and the price of ETH. The Annualized
Model is not chronological, meaning the engine of the model is driven by variables that
are analyzed on a (such as validator rewards and costs) per-epoch basis and then
annualized, multiplying outputs by 82,180 (epochs per year).
● WWIII Model: An Eth2 Model built to replicate the inactivity penalties resulting from a
delay in finality caused by more than 1/3rd of validators being offline, such as in a
“WWIII” event. The WWIII model is chronological, with each row representing a new
33
We consider “steady state” to be one where normal, non-malicious conditions apply to key variables,
such as the % of online validators (sufficient to avoid leak mode), the number slashings per epoch (low
enough not to have a significant impact on total rewards), and the price of ETH (stable enough not to
cause market panics that could have effects on ETH staked).
20
Ethereum 2.0 Economic Review
epoch. This model can be used for more than analyzing the scenario of a WWIII event,
such as a simplified attack simulation.
Data & Analysis: Assumptions and conclusions from the Eth2 models as well as other analyses
formed for the purpose of this project.
● Data Tables: Detailed X and Y variable data tables extracted from the Annualized Model
to simplify charting and data analysis in Control Panel tab.
● Issuance Inflation Analysis: Breaks down total annualized issuance based on type of
rewards, penalties, and slashings.
● Total Supply Analysis: Calculates and illustrates total supply issuance and total dollars
spent on security for Ethereum, including both Eth1 and Eth2.
● Variables & Model Assumptions: A list of endogenous and exogenous variables
referenced in the Eth2 models that form the basis of the majority of inputs throughout the
model; these are currently set to the latest Eth2 specification at time of writing but can be
easily changed to modify the specs of the system.
● ETH1 Transaction & Gas Analysis: An analysis supporting the underlying assumptions
of ‘Avg. Number of Tx per Day’ and ‘Avg. Amount of Gas per Tx’ for EIP 1559.
● Required Rate of Return: Input and output breakdown of the assumptions driving the
Required Serenity Active Validator Yield (RSAVY) model (described in detail in Section
8).
● BTC ETH Analysis: Compares the relationship between the price of ETH and BTC for
calculating beta in the RSAVY model.
● Cost of Attack Analysis: Calculates the cost to execute an attack on Eth2’s Proof of
Stake network versus the cost to execute a 51% attack on the Eth1 Proof of Work
network, with X-axis reflecting different levels of ETH price.
Cost Analysis: We deeply researched the anticipated costs of validating across each type of
validator environment. Inferring the revenue-net yield spread is imperative to grasp the efficacy
and resilience of an incentive system that is highly dependent upon price to remain stable.
● Costs of Validating: Calculated inputs and outputs of the validator costs which drive the
assumptions in the Eth2 models.
● Infra Costs: Global analysis of infrastructure costs, including average internet service
provider costs and electricity prices weighted by Eth1 nodes.
● Survey Results: Summary of survey data from ConsenSys34 and Lighthouse35 used to
make assumptions for weights of validator environments used in the models.
● Eth1 Cost of Attack Assumptions: cost data and assumptions around Ethereum
mining hardware.
34
See “Ethereum 2.0 Ecosystem Staking Report” by ConsenSys Insights
35
See “Ethereum Lighthouse: Chasing Serenity” survey report by Empire Ventures.
21
Ethereum 2.0 Economic Review
To complete a full economic analysis, more assumptions were required to illustrate the behavior
of validators and capture network usage for burned ETH in EIP1559. Importantly, validator
uptime can impact the inclusion delays, which in turn has an impact on yields. We separate
validator uptime based on three primary factors: internet uptime, power uptime, and technical
uptime. These assumptions are key to validator yields, but also unknown until monitoring of a
post-launch network is possible, which is why these variables are adjustable factors in the
Control Panel. For most of these assumptions, inputs are based on our research and
stakeholder interviews. EIP1559 - Avg. Gas per Transaction (average of Eth1 network over past
six months per ‘ETH1 Transactions & Gas Analysis’ tab) and EIP1559 - Avg. Transactions per
Day (average of Eth1 network over past six months) leverage historical network assumptions.
For the purpose of defining our base assumption set, we turned off EIP1559; however, we
22
Ethereum 2.0 Economic Review
analyze the economic impact of EIP1559 in Section 10 in a scenario analysis. For this paper,
we use these metrics as the base assumptions unless stated otherwise.
Last, we make assumptions on costs to validate. Depending on the amount of ETH staked and
the price of ETH, cost of validating can subtract multiple points off of net yields (we label the
delta between revenue yields and net yields as the revenue-net yield spread). As shown in
Exhibit 4, the lower the price of ETH and the less ETH staked, the higher the revenue-net yield
spread.
23
Ethereum 2.0 Economic Review
The breakdown of validator environments reflects the results of user surveys and stakeholder
interviews, which in turn reaffirm our intuition that in Phase 0, the validator base will be made up
primarily of ETH enthusiasts and long-term holders - these will be largely divided into retail
users and “whales”. The former are more likely to stake with their own hardware or low-fee
mechanisms via their primary exchange; the latter are more likely to use staking services or, in
some cases, set up their own hardware or cloud setups, depending on the individual’s tolerance
for centralized solutions.
For two of the above models (StaaS - Full, StaaS - Pool), costs are directly incurred by the
StaaS provider, who in turn are expected to charge a fee to the validators. Based on
stakeholder interviews and ConsenSys Insights survey results, we estimate fees for StaaS
providers around 15% and fees for Pools around 12%. A third model, StaaS - Self-Custodied,
refers to a setup where validators participate in validation themselves without running a beacon
node, instead connecting to a beacon node provider via API. In this case, we expect a lower fee
(around 5%) and a minimal hardware or cloud setup, given the reduced hardware requirements
for pure validation.
24
Ethereum 2.0 Economic Review
The other models described require setting up hardware or a cloud environment. We make a
number of assumptions around each environment. For both, we use Prysmatic Labs’
Recommended Specifications for guidance — although we expect these to be higher than
required:36
● Processor: Intel Core i7–4770 or AMD FX-8310 or better
● Memory: 8GB RAM
● Storage: 100GB available space SSD
● Internet: Broadband connection
Hardware
There are three major cost components for running nodes on hardware: the cost of the machine
itself (depreciated over time), electricity costs, and bandwidth costs.
The machine hardware represents by far the largest portion of hardware costs. There are
several options that conform to the recommended specifications; however, through interviews
with the three Ethereum client teams and survey results, we focus on four hardware types: a
Raspberry Pi 4b, a desktop computer, a server, and a dedicated node service (e.g. Dappnode).
38
Each of the four machines chosen meet the recommended specifications except the
Raspberry Pi, which meets minimum specifications. We expect distribution of these machines to
quickly adapt to performance. Each machine’s average price is then weighted by its expected
distribution and depreciated over a period of 36 months. Finally, we discount this number
according to our assumption of who will require new hardware; we expect this number to be
relatively high given the benefits of operating nodes on dedicated hardware.
Electricity costs depend on local electricity provider costs and wattage of the hardware used.
We estimate global electricity costs by weighting average country-level costs by the current
geographical distribution of ethereum nodes (an imperfect but indicative measure). Average
wattage per machine running at full load is weighted by the distribution of machines.
36
See “Installing Prysm on macOS” for more details. Note these recommendations refer to the Topaz
testnet, and may change by the time of the Phase 0 launch. Prysmatic also outlines a minimum set of
requirements, but we err on the conservative side. Sigma Prime also provides a useful set of benchmarks
here.
37
See Sigma Prime “Database Configuration”.
38
Note we do not include laptop computers, as we received feedback in several interviews suggesting the
unsuitability of laptops for staying on at full load constantly, including issues handling heat.
25
Ethereum 2.0 Economic Review
Bandwidth costs are dependent on local ISP costs, and are only relevant for validators requiring
new or dedicated routers.39 We estimate bandwidth costs according to geographic distribution of
ethereum nodes, similarly to electricity costs.
The average cost per machine assuming only one validator averages out to $18.94 per month.
This is effectively the cost floor. Based on our estimates of validators per individual running
hardware deployments, we estimate an average cost per validator of $9.47 per month.
Cloud
Cloud providers such as AWS and Azure can be used to run validator client software. We use
AWS calculator estimates to derive an average monthly cost per server of $37.38. We use this
number for our analyses, though we suspect - based on interviews - that we could lower this
number to around $20-$30 over time. We expect cloud deployment users to run many
validators, and this brings the global average cloud cost per validator down to $1.87 per month
(assuming 20 validators).
Importantly, it should be noted that the yields we calculate in the model based on the above cost
profiles are weighted averages across all validator types. As a result, the yields do not
necessarily correspond to what an individual validator should expect for a particular number of
validator clients. For example, the fewer validators one runs, the higher the cost per validator
and the lower the net yield one can expect.
39
We assume the vast majority of validators already have internet access.
26
Ethereum 2.0 Economic Review
Exhibit 5: Base Assumptions in Control Panel - Variables for All Economic Models
The number of validators per individual is based on an extrapolation of user survey data from
ConsenSys Insights and Lighthouse. The distribution of validators is also extrapolated from
these user surveys and reflects our best estimate for Phase 0. We do expect the distribution to
change fairly quickly as staking derivatives (covered later) become more prevalent and users
shift to StaaS-style services. Distribution parameters can be tweaked within the accompanying
economic model.
27
Ethereum 2.0 Economic Review
Total ETH staked numbers are percentages (1%, 2.5%, 5%, 7.5%, 10%, 13.8%, 20%, 25%, 30%)
of total ETH supply of 112mm with the exception of Tier 1, which represents the level of ETH
staked required for genesis. While total ETH staked can certainly exceed these levels, we use
this range for understanding the sensitivity of gross and net yields within the scope we see
reasonable and achievable. We provide more context on achievability of ETH staked levels
throughout this paper.
In our base assumptions, as well as over the course of this paper, we use an ETH price of $200,
representing the median price of Ether since March 2020 when we began this project. For
context, over the last 18 months, the price of ETH has fluctuated approximately between
$100-$300.
28
Ethereum 2.0 Economic Review
7. Network Yields
40
We include more detailed net yields and revenue-net yield spreads in Appendix C.
29
Ethereum 2.0 Economic Review
41
Refers to the network average across all deployment types. For deployment type-level averages, see
Appendix C.
30
Ethereum 2.0 Economic Review
31
Ethereum 2.0 Economic Review
Exhibit 12: Yields of Validator Environments at 33.6mm (30%) Total ETH Staked
The reader will notice a substantial change in revenue yields as ETH staked increases as well
as clear yield differences in deployment types, which become particularly important as the price
of ETH decreases.
32
Ethereum 2.0 Economic Review
Exhibit 14: The (Minimal) Shift in Rewards as Total ETH Staked Scales
33
Ethereum 2.0 Economic Review
Exhibit 15: Annual Issuance at 0.524mm Total ETH Staked (Genesis Requirement)
34
Ethereum 2.0 Economic Review
WWIII Model
The exhibits below illustrate the network issuance conditions under scenarios with low levels of
online validators. The shape of the curves reflects an accelerating inactivity penalty, which is
then progressively negated by lower active balances of the validators which the inactivity
penalty impacts. After 30 days, the offline validators are completely exited from the chain. The
below charts illustrate the design of the inactivity penalty, which reduces ETH from inactive
validators, thus increasing the percentage of ETH staked from online validators. Assuming
stability in the number of online/offline validators, eventually the ETH staked from online
validators exceeds ⅔ again, reaching finality. This event occurs after 22 days if 50% are online,
and 30 days if only ⅓ of validators are online.
Exhibit 17: Network Inflation vs. Network Inactivity Leak at 50% of Validators Online
35
Ethereum 2.0 Economic Review
Exhibit 18: Network Inflation vs. Network Inactivity Leak at 33.3% of Validators Online
36
Ethereum 2.0 Economic Review
37
Ethereum 2.0 Economic Review
38
Ethereum 2.0 Economic Review
39
Ethereum 2.0 Economic Review
Takeaways
From these outputs, we conclude:
● High Yields at the Minimum ETH Staked for Genesis: The revenue yield at the
minimum ETH staked requirement for genesis (524,288 ETH staked) equates to
approximately 21.8%. At this amount, network average net yields range from 14.4% to
20.5% between ETH prices of $25 to $1,500 and total network issuance of 0.10%.
These are very attractive yields when compared to traditional yield-bearing instruments,
ranging near yields of high yield bonds (Triple-C Rated Corporate Debt yielding 14.7% at
the time of this writing42), but the lack of liquidity and volatility of the underlying asset
might make capital efficient validators hesitate to hold the underlying asset (ETH locked
up in Eth2) directly. (We address the genesis level of ETH staked in our scenario
analysis.)
● Significant Reliance on Stable ETH Price: As indicated by the revenue-net yield
spreads, net yields tumble when the price of ETH falls below roughly $100,
42
See High Yield Bond ICE Data Services on WSJ
40
Ethereum 2.0 Economic Review
demonstrating the level of resilience of the network on ETH price. In contrast, yields
begin to show little movement above a price point of $500, with costs plateauing as a
percentage of total rewards. The lack of ETH price resilience is a major concern and
potential attack vector for adversaries (e.g. forcing a flash crash of the network
destabilizing validator yields).
● StaaS Providers Offer Stability to End Validators by Taking on Fixed Costs of
Validating: StaaS could significantly derisk the impact on validators’ yields if fees are
represented as a percentage of validator rewards (which, as mentioned prior, is how cost
assumptions account for StaaS business models). StaaS providers make more profit as
the price of ETH increases because costs remain fixed while collected revenues (in
USD) would increase. On the other hand, StaaS providers would also bear the brunt of
the low ETH yield ‘cliff’ (see below for definition). Sustained levels of low ETH (less than
$100, depending on what the StaaS charges) could cost StaaS providers millions of
dollars in infrastructure and production engineering expenses, forcing the exit of their
clients (i.e. the validators) and/or their business. Reviewing StaaS policies when StaaS
products are launched with regards to discretion over funds or floors may shed light on a
potential sudden exit of validators once a certain price threshold is met.
● The Network is Cost Effective but Economies of Scale (May) Still Apply: Relative to
PoW networks, where margins are stretched thin and only large scale, capital-intensive
infrastructure (e.g. bulk order ASICs or GPUs and complex power systems) can make
mining profitable, economies of scale in the Eth2 PoS network decrease in magnitude as
ETH price increases. For illustrative purposes, we categorize ETH prices into three
gradated regions: Cliff, Economies of Scale, and Stability. The “Cliff” region represents
extreme volatility in yields due to falling ETH prices. The “Economies of Scale” region is
where larger scale environments have a clear cost advantage. This is because validators
can run several thousand validators on the same deployment setup as a validator
running only one validator; and, at this ETH price range, the difference between gross
and net yields is still relatively important (vs. the “stability” range). At “Stability” levels,
gross yields (regardless of scale) fall closely in-line with net yields. There is a price
threshold at the Stability level where there is an economic advantage to running one’s
own validator environment - supporting an incentive for greater decentralization.
41
Ethereum 2.0 Economic Review
Exhibit 27: Network Average Net Yield at 0.524mm ETH Staked (Genesis), Charting the Three
Region Yield Analysis
The revenue-net yield spread stabilizes at approximately 1% for the network average validator
toward the higher end of ETH prices, primarily due to the fixed % fee for StaaS validators.
Self-managed environments, such as DIY environments, approach a near-0% spread.
42
Ethereum 2.0 Economic Review
Exhibit 28: Network Average Yield at 10mm ETH Staked, Charting Three Region Yield Analysis
At a higher amount of ETH staked, the revenue-net yield spread stabilizes at approximately 0.3%.
In this section, we have shown the impact of the network’s parameters on network issuance,
gross yields, and net yields under various conditions. In particular, we have shown how
sensitive the yields are to price and ETH staked. However, given the importance of yields in
attracting ETH staked, it is useful to understand how Eth2 yields compare; in other words, we
need an objective method of evaluating Eth2 yields to understand their expected impact on
validators’ decision making when allocating capital, and the resulting impact on network
security.
43
Ethereum 2.0 Economic Review
Background
The objective of any incentive program or mechanism is to reward a participant or a group of
participants for behavior that is beneficial to a network or organization (in the case of Eth2, the
network’s security). Incentive program productivity is typically driven by a monetary incentive,
but validator motivations in Eth2 are likely to be more nuanced. For instance, yield insensitive
enthusiasts or long-time crypto holders might spin up a validator environment as a hobby or out
of a sense of duty (for other incentive programs like sales commission structures, it's not often
someone sells products/services as a hobby). For this reason, we segment the profiles of
validators into two types: capital efficient participants that desire a return on investment net of
risk; and partakers that are apathetic to yields. For the latter, there could be non-monetary
motivational factors driving participation, such as the health and decentralization of the network,
but attempting to measure these motivating factors into a desired yield would be arbitrary.
Importantly, yield apathetic validators are also limited in number.
The most stringent and yield-sensitive participants in the validator pool are capital efficient
investors who weigh risk-reward ratios, and serve as a more predictable foundation of
contributors to network security. The incentive mechanism will need to support yield-sensitive
validators when yield-apathetic validators hit their capacity. In this section, we formulate a
model, called the Required Serenity Active Validator Yield (RSAVY) model, to assess the
required rate of return for yield-sensitive validators. We note, given the nuances above, this
model only applies when the calculated required rate of return falls below the resulting yield
derived by the full participation of yield insensitive validators (see Exhibit 29).
44
Ethereum 2.0 Economic Review
Exhibit 29: Applying the Model Measuring the Network’s Required Yield
The total investment from yield-apathetic validators is limited in size, but measuring this
threshold is difficult. For context, there are currently approximately 118,700 Ethereum wallets
that hold more than 32 ETH (see Exhibit 31), with an average of 886.8 ETH per wallet.43
Subtracting 18.7mm ETH from exchange wallets,44 86.6mm ETH, or 77.7% of total ETH supply,
is in a ‘staking qualified’ wallet. For example, if we assume a 10% share of staking qualified
wallets stake their ETH, the total amounts to 8.7mm ETH staked on the network, or 7.8% of the
network. In addition, validator pools or fractionalized validator environments could expand this
43
Analysis by Nansen.ai
44
See GlassNode
45
Ethereum 2.0 Economic Review
‘addressable market’ (and potentially yield apathetic participants); however, in any case, the
arbitrary motivations of this group of validators and their resulting unpredictability on total ETH
staked should not be relied upon for the security of the network. In other words, for the most
secure and stable network, the incentive program should be designed for an objective and
predictable group of validators, for which forecasting can be more easily quantified. The size of
the pool of qualified wallets (holding over 32 ETH) is certainly (and compellingly) sufficient, but
focus should be on growing the validator share of this qualified pool.
We envision individual interest in validating to grow if the economics are lucrative — supporting
the design goal of network decentralization. We aim to further understand the motivations
behind this profile of validator.
46
Ethereum 2.0 Economic Review
We interviewed four stakeholders in the crypto and blockchain industry who are institutional
investors or serve institutional stakeholders with custody, trading, and/or digital asset research.
A digital asset analyst from a leading financial institution indicated that their clients’ interest in
digital assets is driven by the following:
● Crypto is an asset that has historically been uncorrelated with any other asset class (see
Exhibit 32). According to Fidelity Digital Assets,45 80% of their survey of institutional
investors find something appealing about digital assets, with the most significant reason
(36% of respondents) being their property as an uncorrelated asset. According to
Modern Portfolio Theory,46 an uncorrelated asset lowers portfolio risk. This would in turn
increase portfolios’ Sharpe Ratios,47 or risk-adjusted returns.
● An investment in digital assets will be viewed and managed similarly to a venture capital
investment where high usage of the network and/or its narrative will support a higher
asset price. They either see the investment going to zero or having an asymmetrical
upside.
45
See Fidelity Digital Assets Institutional Survey Report
46
Theory pioneered by Harry Markowitz in the 1952 Journal of Finance publication, “Portfolio Selection,”
on the optimization of expected return given a level of market risk; adopted globally by portfolio and asset
managers
47
A formula of expected return over standard deviation, or risk, measuring the risk-reward ratio.
47
Ethereum 2.0 Economic Review
Exhibit 32: Correlation Matrix of Crypto, S&P 500, VIX, Gold, and 10yr Treasuries
As confirmed by our stakeholder interviews, we assume it is easier for the average institutional
investor (and we believe it is noncontroversial to assume the same for retail investors) to
familiarize themselves with the narrative of Bitcoin than that of Ethereum. Bitcoin serves as the
gateway asset to the crypto landscape and has become the benchmark digital asset. Despite
the different narratives, Bitcoin and Ether are still highly correlated (see Exhibit 32).
Why is interest in Bitcoin important with regards to the potential motivations for staking of capital
efficient validators? This group of potential validators will always compare the alternative and
explore opportunity costs. According to the Fidelity Digital Assets survey, 91% of institutional
investors surveyed are interested in exposure to digital assets and expect to allocate on
average 0.5% of their portfolios to digital assets over the next five years. Reverting back to
Modern Portfolio Theory and Exhibit 32, digital assets are correlated with each other, but
uncorrelated with any other traditional asset class. When assessing allocating some of their
0.5% digital asset portfolio designation, capital efficient investors are likely to default to the
easy-to-grasp Bitcoin narrative as the benchmark when comparing opportunity costs. The
investment narrative then shifts from Ether versus Bitcoin to Ether plus staking versus Bitcoin.
This might make the return on investment more compelling, but it depends on the risks (i.e.
48
Ethereum 2.0 Economic Review
standard deviations according to Sharpe Ratio) of Ether versus Bitcoin as well as the risks and
costs of staking. We quantify these risks in the Required Serenity Active Validator Yield model.
Where:
● Rv = revenue yield of validator
● Rf = risk free rate
Pa − Pb
● C iT = cost of illiquidity at time T (i.e. the spread at end of investment), or (P a + P b)/2 where
P a = price of ask and P b = price of bid at time T, which is divided by the maximum of 1
or the expected holding period (in years)
Covar (Rb, Re)
● β b = beta, or V ar (Rb) , of the returns of the staked asset and its benchmark (e.g.
Bitcoin and Ether, respectively), minus one to account for the difference in volatility risk
between the assets
● Rbm = expected return of underlying asset benchmark, e.g. Bitcoin
● C bmi = cost of illiquidity of underlying asset benchmark at time T
● Da = discount (negative value) / premium (positive value) of the derivative, if applicable
● β d = yield beta of returns of lending opportunity cost, such as a DeFi benchmark,
against average network validator net returns; yield beta is the slope of a plot of the
benchmark’s yields and the underlying asset’s yields
● Rdm = expected return on DeFi benchmark
● C y = the cost of validating
49
Ethereum 2.0 Economic Review
We note this structure is driven by several assumptions. The RSAVY model assumes risk of the
platform from an ongoing concern basis is factored into the beta of the underlying asset’s
required return, or the opportunity cost of investing in the benchmark. For example, consistently
higher levels of volatility relative to the underlying asset’s benchmark would indicate
idiosyncratic risk of the asset. The model also assumes the asset purchased to stake and
validate is only one asset (for now, Ether), which given the rate of innovation in the
decentralized finance industry, could be subject to change. Furthermore, the model assumes
the underlying asset’s benchmark has a stable level of correlation with the asset itself. If the
benchmark and the underlying asset become negatively correlated due to a decoupling
narrative and beta approaches zero or below, the model indicates a new benchmark with
relatively higher correlation should be applied instead.
Lastly, we note that the required rate of return is from the investor’s perspective. An investor
might access the yield through an intermediary, such as a centralized exchange product or a
tokenized ETH2 instrument. The discount / premium of a derivative is a variable of the RSAVY
model applicable only if the capital provider’s method of gaining access to validating yields is
through a derivative instrument.
The RSAVY model does, however, account for many shifting variables of the network, including
a change to the underlying asset’s benchmark and its lending return benchmark. An alternative
to the process of validating is lending the asset on a protocol-driven finance platform for variable
yield. It is important to note if there is more demand in these networks, which there likely will be
if the arbitrage opportunity of DeFi/staking is considerable, DeFi yields would increase,
indicating a potential shift in capital to the highest risk-adjusted yield, as has been investigated
previously by Tarun Chitra.48 In this case, as well as in the case of the other benchmarking
variables, beta captures the relevance of this event in the future. Given the network has not
launched yet and we do not have data to support a statistically significant conclusion, the model
is structured to support future hypotheses.
48
See “Competitive equilibria between staking and on-chain lending” by Tarun Chitra.
50
Ethereum 2.0 Economic Review
Beta is a measure of volatility and price movement relative to a benchmark. If the average daily
returns of DeFi yields are significantly more volatile than the daily returns of validating, then beta
will be less than one, making the DeFi yields variable less relevant and impactful to expected
return. Beta can only apply to the variables with returns. For comparing penalties or slashes
against a benchmark (i.e. the network), we calculate the amount of stake impacted by expected
events against the network average. If a Staking-as-a-Service provider’s penalty rate is greater
than the network average (i.e. the benchmark), the expected variability of the validator
environment should be greater than one multiplied by the network’s average cost of penalties,
reflecting the appropriate benchmark-driven risk adjustment of penalties in the validator’s
expected return.
51
Ethereum 2.0 Economic Review
49
See Coinmarketcap ETH
50
See Coinmarketcap BTCUSD
51
See Fred Wilson - The Hit Rate
52
Ethereum 2.0 Economic Review
Exhibit 34: Time Plot of Last Twelve Months Beta of ETH and BTC
52
See DeFi Score - Compound
53
Ethereum 2.0 Economic Review
yield consistently below 10bps over the past year. In both bull and bear cases, we assume a
yield beta of one, assuming high correlation and similar risk profiles. We envision demand for
borrowing ETH will increase with opportunities to arbitrage validator yields. That said, we
conservatively use a benchmark return in line with the past twelve months high of 10bps for the
bull case and 2% for the bear case.
54
Ethereum 2.0 Economic Review
Opportunity Cost of Lending High demand for borrowing No change in demand for
ETH for arbitrage borrowing ETH
Cost of Validating 1mm ETH staked at current 5mm ETH staked at current
prices (network avg. cost) prices (network avg. cost)
Risk of Penalties/Slashing 90% of validators online with 98% of validators online with
few inclusion delays; minimal inclusion delays;
clients/nodes interoperate clients/nodes interoperate
flawlessly flawlessly
Takeaways
In summary, we expect the total pool of yield-apathetic validators to be limited in size;
concurrently, capital efficient validators are motivated primarily by economic factors. In other
words, capital efficient investors require a certain rate of return to invest their capital in staking
vs. allocating capital in other ways. Based on our results, we expect an optimized network yield
(which we use as a proxy for a minimum yield) of 3.3% for these validators to invest. Under a
more bearish yet stable scenario, this yield requirement goes up to 11.6%. This required rate of
return takes into account several parameters in addition to the usual RRR formula, including the
55
Ethereum 2.0 Economic Review
cost of illiquidity, the cost of validating, the cost of penalties and slashings, as well as the
opportunity cost of validating.
Given a RRR range of between 3.3%-11.6%, this suggests that once a threshold of ETH staked
is reached and yields decrease, the return on staking will no longer be attractive for
yield-sensitive investors. The question this leads to is whether that threshold is at a high enough
rate of ETH staked to provide sufficient guarantees around the security of the system. To
understand this, we look at different economic attack vectors, which enable us to find a required
ETH staked rate.
Supermajority Attacks
The first attack is what we consider the closest counterpart to a 51% attack in PoW blockchains
like Eth1. As opposed to PoW security models, finalization of the PoS chain in Eth2 requires a
⅔ majority of validators to vote on checkpoints. Because Eth2 relies on pseudorandom shuffling
of validators into committees for security, there are strong security guarantees against
supermajority control by individuals with less than ⅔ of the validating ETH stake. For example,
we can show with a binomial distribution that, sampling from a large enough validator set (at
least the 16,384 validators required for the beacon chain launch) where a validator controls ⅓ of
the validating stake, there is a one in one trillion chance that the validator obtains a
supermajority.54 This property holds even at larger stakes of ETH, effectively making it
near-impossible to corrupt the consensus mechanism up to ⅔ of all validating stake.
As a result, the naive form of the Supermajority Attack is to simply acquire and stake ⅔ of the
total ETH staked, or to collude with other validators to accomplish the same result. By obtaining
control of a supermajority of the stake, a validator could hypothetically execute a double-spend
53
For resources on these types of attacks, refer to Appendix A.
54
For a more detailed explanation, see the “Sharding FAQ” Github Page as well as Chih-Chieng Liang’s
“Minimum Committee Size Explained”. The latter is helpful in that the binomial distribution formula is
adapted for the ⅔ supermajority requirement.
56
Ethereum 2.0 Economic Review
in later phases of Eth2 by censoring whistleblowers. In Phase 0, however, given the lack of
transactions between addresses and the lack of withdrawals, this attack is likely not profitable.
A more sophisticated version of this attack would involve bribery, where validators are
incentivized to vote for blocks proposed by the attacker through a smart contract mechanism
that distributes rewards that are slightly higher than the system’s rewards. In Phase 0, this could
not happen on Eth2, but an attacker could leverage Eth1 to disburse payments to validators
who post signed receipts of their attestations on the Eth2 blockchain. For example, if a validator
wants to gain 10% more control of the ETH staked on Eth2, they could offer 10x the amount of
rewards issued on Eth2 to validators who attest to their blocks, up to 10% of validators. Doing
this for one whole day, at an average ETH price of $200, would only cost the validator between
$90,000 (assuming only 1mm ETH already staked) and $500,000 (assuming 33.6mm ETH
already staked), which is far less expensive than the cost of acquiring the additional 10% of
ETH at that price. There are, of course, several challenges to this approach - from the
dependency on a central actor in Eth1 to the emotional motivations of many Eth2 Phase 0
participants, who are not expected to be as easily swayed by bribes. In later phases, however, it
may be feasible to offer higher bribes (on the order of 100x rewards) with smart contract
mechanisms for disbursement inside of Eth2 for shorter periods of time. At $200, 33.6mm ETH
already staked, and 100x rewards over three hours, the cost would be around $630,000.
In Phase 0, we can say with confidence that a supermajority attack does not satisfy condition 1,
as there is no way to successfully execute a double spend attack (or, for that matter, any kind of
transaction). Moreover, by simply accumulating 2/3 of the rewards and censoring
whistleblowers, it would take several years to make up the amount of money spent to acquire
the supermajority stake - assuming the price of ETH stays constant. Not only is it unlikely that
the price of ETH stays constant given the attack (we would expect it to crash), but by all
accounts, validators would fork the Eth2 chain to freeze out the attacker.
57
Ethereum 2.0 Economic Review
Once transactions and smart contracts are enabled in Eth2, this attack could feasibly become
more of a concern, as a double spend could potentially be quickly executed.55 To gauge the
relative difficulty of such an attack at that stage, we consider the second clause.
55
As noted by Danny Ryan of the Ethereum Foundation, even in cases where double spends are
finalized, fully executing a double spend attack is still a network coordination problem, and is arguably
more difficult to pull off in PoS systems than PoW chains.
58
Ethereum 2.0 Economic Review
In Exhibit 37, we show the cost of attack of a 51% attack in Eth1, which we compare to the cost
of a supermajority attack in Eth2 in Exhibit 36. We model the Eth1 attack cost against network
hash rate;56 we estimate the relevant range to be 100,000 GH/s to 250,000 GH/s, as the
Ethereum hash rate over the last 2.5 years has oscillated between those endpoints.57 Because
of the close relationship between price and security in Eth2’s PoS model, the reader will notice
that at low prices of ETH, it is typically much cheaper to execute a supermajority attack on Eth2
than to execute a 51% attack on Eth1.58 At $200 ETH, nearly 4mm ETH (~3.5% of ETH supply)
is required to achieve the same security as Eth1 with 100,000 GH/s hash rate. At $50, that
number is about 15mm (~13.4% of ETH supply).
Exhibit 38: Cost of Supermajority Attack in Eth2 Contrasted with 51% Attack in Eth1
56
To model cost of attack, we make certain assumptions around the cost of setting up and operating
mining hardware, which can be found in the accompanying Excel model. These assumptions can be
modified by the reader. Importantly, we make a naive base assumption that the attacker purchases GPU
hardware from the open market (rather than from existing miners) and the necessary surrounding
infrastructure to execute the attack. We considered schemes where an attacker would rent hashpower,
but conclude that there is not enough rentable hashpower to depend on this approach. We do, however,
believe that an attacker could find cheaper ways to purchase hardware (e.g. at a discount from
unprofitable miners) or combine purchasing and renting to execute an attack. We leave this optimization
problem for further research.
57
See CoinMetrics Network Data Charts for Ethereum.
58
We should note that in this discussion we do not consider the upward pressure on ETH that is likely
from the purchase of a large amount of ETH. It is possible that attacks become harder as more ETH is
purchased and ETH price increases. On the other hand, according to Messari, the liquid market cap of
ETH is nearly $26B and the “24hr Real Vol” is close to $1B, while it would only take a fraction of this
amount to accumulate enough ETH to cause an attack.
59
Ethereum 2.0 Economic Review
Red cells represent conditions where Eth2 Supermajority attacks are cheaper to execute
compared to 51% attacks in Eth1.
Once again, in Phase 0 this is not expected to be a major concern. However, starting in Phase
2, assuming the presence of a DeFi ecosystem on Eth2 or some level of cross-chain linkages
with the existing DeFi ecosystem on Eth1, we can envision large-scale borrowing contributing to
launch supermajority attacks on Eth2. As opposed to Eth1’s PoW system, where mounting
enough hash power to perform a 51% attack may take many months — and would thus likely be
easier to detect — amassing stake through borrowing and becoming a validator can be
accomplished in a much shorter amount of time.
Exhibit 39: Cost of Attack of Eth1 Networks (assumes 200k GH/s rate) vs. Eth2 Networks at an
ETH price of $200
60
Ethereum 2.0 Economic Review
In summary, in Phase 0, condition 1 of the framework is not satisfied while condition 2 can be
satisfied at certain prices of ETH and total ETH staked. In later phases, we expect both
conditions could be satisfied, although we expect both price and ETH staked to increase in later
phases, when there is more certainty around the security properties of the network and an
ability to extract gains from the system.
As a result, we emphasize the need for a sufficient amount of ETH staked in the system to
ensure high difficulty of successful attacks. This, in turn, we expect will be a function of the
expected yields for stakers, as noted in the previous section. According to Exhibit 38 and the
underlying data tables in our model, if we assume the minimum ETH price since 2018 ($82.83)59
and the average hash rate since the Constantinople hard fork (172,486 GH/s)60, we obtain a
cost of attack that suggests a minimum requirement of 13.8% ETH stake rate, which we term
our ETH stake rate target.
Finality Attacks
This second category of attacks is original to PoS systems, and is directly tied to their finality
properties. Whereas PoW systems are probabilistically deterministic, PoS can offer economic
finality; however, with that property comes new attacks that are possible in Eth2. The Eth2 PoS
59
See Coinmarketcap.
60
See Coin Metrics. We choose the Constantinople hard fork as the relevant time frame given the
reduction in ETH mining rewards from 3 ETH to 2 ETH, which we expect has a long-term impact on hash
rate. The hard fork occurred on February 28, 2019.
61
Ethereum 2.0 Economic Review
consensus algorithm is designed with a strong ⅔ honest majority assumption in mind. This does
not mean that the system cannot operate without an honest supermajority, but that is the
threshold where finality is challenged. We already know that a supermajority attack requires a ⅔
malicious validator stake (under naive conditions); yet in the space between ⅓ and ⅔ of stake, a
validator can execute a finality attack. We look at a few variants of this attack.
In the most naive and least destructive form of this attack, an attacker controls just over ⅓ of the
validating stake and decides to keep the validators offline or effectively not to participate in the
consensus. By doing so, the chain can no longer finalize, as it relies on a ⅔ supermajority for
finality. As mentioned previously, after 4 epochs in this state, the chain enters leak mode, where
inactivity penalties are dealt to the offline validators. These penalties increase quadratically until
offline validators hit an effective balance of 16 ETH and are forced to exit the chain. Once the
offline validators are hit with a penalty, they immediately lose their ⅓ share of total stake, and
the chain can resume finalizing. For our purposes, we will assume the attacker has 41.67% of
the ETH staked under control, which should allow for about one week of non-finality.
From this behavior we expect the attacker can gain in two ways. First, by preventing finalization,
attestations cannot reach supermajority and blocks cannot be finalized, which means that block
rewards tied to finalization are not allocated. Second, we expect the inactivity leak to create
downward pressure on the ETH price. Both of these factors, particularly at already low prices of
ETH, could lead to unprofitable conditions for validators and discourage them from participating
in validation,61 forcing them to exit their own stakes.62 This outcome has two results: first, by
reducing the price and ETH staked, the attacker can now execute a supermajority attack at a
lower cost of attack. In Exhibit 41, we take a starting price assumption of $200 ETH at 2mm
ETH staked. One can see that if there is enough downward pressure on price and staked ETH,
the cost of executing a finality attack followed by a supermajority attack is lower than just
executing a supermajority attack.
61
See “Discouragement Attacks” by Vitalik Buterin.
62
We note that exiting stakes is complicated by the queue mechanics embedded in Eth2 PoS. If a large
number of validators decided to exit at the same time, it could take several months for all validators to
fully exit.
62
Ethereum 2.0 Economic Review
The second result brings us to a variant of the finality attack; in this case, the attacker uses
extra-protocol mechanisms to gain from the attack. More specifically, we refer back to our
expectation that Phase 0, given the lack of a two-way bridge between Eth2 and Eth1 and the
inability to extract staking rewards, will engender a burgeoning derivatives ecosystem. Not only
do we expect new ETH generated by Eth2 to be tokenized and traded (at a discount), we also
expect an options ecosystem to develop. In this case, an attacker could purchase put options on
Eth2 ETH - assuming a certain option price - and use a finality attack to cause downward
pressure on the price of ETH, gaining from the spread. This attack makes at least two
substantial assumptions: a large enough options trading ecosystem to purchase several
hundreds of thousands of options contracts; and options prices that make sense from a
profitability standpoint. Today, this first assumption would be challenging, given global daily ETH
options volumes mostly hover around the high single digit millions USD.63 The second
assumption is extremely difficult to price, given the unpredictability and volatility of the
underlying asset.
63
See Skew market data.
63
Ethereum 2.0 Economic Review
Exhibit 42: Cost of Finality Attack Only vs. Cost of Attack on ETH1
Assumes attacker controls 41.67% of ETH stake; at $200 ETH, the system is susceptible to
finality attacks at ETH staked under 7.5mm.
Extra-protocol attacks, as noted above, depend primarily on the existing options environment.
As noted in Exhibit 43 below, under certain put option prices and ETH price reductions, it is
possible to make a profit, breaking condition 1, and this is even possible in Phase 0. Moreover,
while condition 2 is less directly relevant, it also breaks in this scenario if compared to a 51%
attack.
64
Ethereum 2.0 Economic Review
Exhibit 43: Analysis of Amount of Capital Required to Break Even in Purchasing Out of the
Money Puts and Subsequently Selling After Finality Attack
65
Ethereum 2.0 Economic Review
Note: At the time of this writing, and according to Deribit, $100S Puts at T = 49 days trading at vega of 1.0464
We should note that, like supermajority attacks, finality attacks can also be enhanced through
bribery. Finally, we expect several variants of the above attacks to be possible, and we
encourage further exploration along these lines, particularly in terms of formally defining the
parameters under which security breaks in non-naive scenarios.
Takeaways
● In Phase 0, we are primarily concerned with attacks that aim to sabotage the network;
we find the network is at risk of sustaining such attacks, but are less concerned about
their long-term impact. One key attack to look out for in Phase 0 is an extra-protocol
finality attack.
● In later phases, economically rational attackers can pull off brute-force economic attacks
less expensively than in Eth1 under low ETH price and ETH staked scenarios.
● We believe the system should be architected to sustain the most destructive economic
attacks; as a result, it should be able to bear supermajority attacks at low prices of ETH.
We calculate that the target ETH stake rate to sustain such attacks is 13.8%. We should
note that for further security under drastic conditions - such as an extreme drop in price,
higher levels of ETH staked should be targeted.
64
See options pricing on Deribit exchange.
66
Ethereum 2.0 Economic Review
In the proceeding scenario analyses, we follow the following structure to assess each scenario:
67
Ethereum 2.0 Economic Review
instructive to obtain a view of the network at its most elementary state and form a bookend for
our scenarios.
Adjustments
There are no adjustments to the base assumptions in this scenario.
Network Assumptions
Assumption Comp - Bear Case Scenario 1
Opportunity Cost of Lending High demand for borrowing High demand for borrowing
ETH for arbitrage ETH for arbitrage
65
Assumption based on small size of asset pool (ETH staked).
68
Ethereum 2.0 Economic Review
Given the low level of ETH staked implied in this scenario, there is a concern around security of
the network, from supermajority and finality attacks. However, we expect the high yield to attract
capital efficient validators.
Scenario Background
In Section 9, we derived an ETH Stake Rate Target for the network’s ETH stake rate of 13.8%.
In this scenario, we obtain a view of the network under this ETH stake rate without making any
other adjustments.
69
Ethereum 2.0 Economic Review
Adjustments
There are no adjustments to the base assumptions in this scenario.
Network Assumptions
Assumption Comp - Bull Case Scenario 2
We see the RSAVY model’s Bull Case as a highly optimized state of the network; this scenario
falls very close to in-line with this Case and is centered around achieving adequate security. To
achieve it, we believe it will require the participation of capital efficient validators, most likely
taking the form of institutional investors. With that, we expect a few requirements to apply,
including full liquidity, low volatility, and low opportunity costs.
70
Ethereum 2.0 Economic Review
Adjustments
We increase the base reward factor from 64 to 128.
71
Ethereum 2.0 Economic Review
Network Assumptions
Assumption Comp - Bull Case Scenario 3
Liquidity Very liquid secondary markets Slightly less liquidity than Bull
Case
Opportunity Cost of Lending No change in demand for High demand for borrowing
borrowing ETH ETH for arbitrage
At the expense of 56 basis points of network inflation per year, or roughly 627,000 ETH
(~$125mm at $200 ETH), we believe the higher yield levels make our ETH stake rate target of
15.5mm ETH more achievable than under the current specs. At a base reward factor of 128,
there is far more leeway for abrupt and large changes to occur to the network, such as an
increase in volatility due to a protocol change, less liquidity given the amount in circulation, and
the likelihood of competitive yield alternatives to arise. Given the low downside of this scenario,
we find this adjustment particularly compelling.
72
Ethereum 2.0 Economic Review
73
Ethereum 2.0 Economic Review
On-chain transferability limitations do not expel every possibility of beacon chain asset liquidity,
however. Centralized exchanges as well as asset managers can offer intra-platform tradability
and/or structure derivative instruments. We believe these structured products will be a much
more attractive opportunity to capital efficient ETH holders than running a complex validator
environment, suggesting a much larger allocation of network validators into the ‘StaaS - Full’
environment relative to what was indicated in user surveys we referenced to determine validator
allocation — which impacts yield in our model. In other words, increasing the number of capital
efficient validators, which we see as a requirement to get to the target ETH stake rate, will
require a shift to a larger proportion of fully managed StaaS validators. In this scenario, we
make adjustments to reflect this change.
Adjustments
We adjust the share of validator environments to the following:
Pool - Hardware 5% 2%
Pool - Cloud 2% 1%
StaaS - Self-Custodied 8% 2%
Network Assumptions
Assumption Comp - Bull Case Scenario 4
74
Ethereum 2.0 Economic Review
Risk of Penalties/Slashing 98% of validators online with Slightly lower risk than Bull
minimal inclusion delays; Case
clients/nodes interoperate
flawlessly
Other than a marginal impact to net yields, a dramatic shift to the model’s allocation of validators
to fully managed StaaS environments has very little detrimental effect to the economic outputs
of the network. In fact, even at an ETH price of $25, validator environments are still profitable at
15.5mm total ETH staked in the network, unlike the prior validator allocation. This change in
profitability occurs because the costs are shifted to the infrastructure providers; while costs to
the end-user (the validator) are represented as a percentage of total rewards, infrastructure
providers bear the fixed costs of validating, which could damage StaaS profitability and
longer-term sustainability. Our key takeaway from this scenario is that StaaS providers add
significant benefit and downside protection to the end validator, suggesting the contribution of
more stability and, critically, liquidity. We see centralization risk playing a factor, particularly if
ETH drops into the Cliff region and StaaS providers incur extended losses, forcing them to
shutter and exit their customers’ stakes. Centralization risk also increases the potential impacts
of key mismanagement or hacking exploits (e.g., an attacker could hack an exchange and have
try to obtain access to private keys, causing a large potential threat to the system.
75
Ethereum 2.0 Economic Review
76
Ethereum 2.0 Economic Review
Exhibit 48: Yields by Total ETH Staked under a StaaS Driven Network
77
Ethereum 2.0 Economic Review
Adjustments
We turn on EIP1559 in the model, enabling gas burned and tips to miners. We set the number
of transactions (tx) per day to 6,880,780 (~80 tx/s), meaning 10x more gas used and around 1.1
ETH per epoch (91,885 ETH per year) in tips to validators (assumed at 0.5 gwei on average per
transaction).
Network Assumptions
Assumption Comp - Bull Case Scenario 5
78
Ethereum 2.0 Economic Review
79
Ethereum 2.0 Economic Review
Exhibit 50: Yields by Total ETH Staked with 10x the Number of Transactions
Scaling the Ethereum network has always been a primary focus for the community. Successfully
achieving scale will unlock many use cases on the network, but could also fundamentally
reshape how the network pays for security with EIP1559. Scaling ETH by 10x to 80 on-chain
transactions per second halves issuance at the Target ETH Staked amount, and slightly
increases yields. The impact at these levels are somewhat material, but the impact of EIP1559
reaches a tipping point in the mid-100s of transactions per second (still assuming 1 gwei, which
is a conservative estimate) when the protocol could operate without any network incentives and
still achieve the security at desired levels (below in Exhibit 51, we illustrate network metrics at
100x current transaction levels, or 800 transactions per second). We are encouraged by the
idea and potential cost savings the network could incur, but adoption would need to drastically
increase to reach this material level of impact on the network economics.
80
Ethereum 2.0 Economic Review
Exhibit 51: The Large Shift in Network Metrics at 100x Current Transaction Levels Supported by
EIP1559
81
Ethereum 2.0 Economic Review
around the system’s risks and a sense of unpredictability around the system’s outcomes and
future development. Moreover, this unpredictability, coupled with the phasing of Eth2 into at
least three phases, presents a narrative problem for Ethereum relative to other crypto-assets,
which cannot be overlooked given the system’s dependence on price — which is market driven
— for security. This sentiment was strongly echoed by institutional stakeholders we interviewed.
In short, the complexity and uncertainty surrounding Eth2 presents a barrier for potential capital
efficient validators.
Security of the network is dependent upon three key variables: ETH staked, the price of
ETH, and volatility.
Each of these variables has a direct or indirect impact on the cost of attacking the network. Total
ETH staked is the most controllable variable, with the main lever being the incentive mechanism
centered around the BASE_REWARD_FACTOR: the higher the incentives, the higher the yield,
and the more attractive it is to stake ETH. The price of ETH, on the other hand, has a direct and
potentially large impact on network security but is outside the control of the system. That being
said, certain forces can create upward price pressure; for example, if ETH is held mostly by
long-term holders, we would expect velocity to decrease. Moreover, high yields from Eth2
staking could push ETH holders to shift their ETH from Eth1 to Eth2, decreasing the circulating
supply of ETH. However, the positive impact to security from this shift could eventually be
balanced by the likely increase in volatility as a result. Volatility, our third key variable, can come
from different sources and impacts both ETH staked (through required rate of return, as
demonstrated in the RSAVY model) and price of ETH. An optimal balance between scarcity and
volatility could theoretically be defined as the maximum marginal security per ETH minted. We
encourage further exploration of this marginal security theory to augment decision making
around network economics, which can be supplemented by tools such as RSAVY and Validator
Duration (Appendix D).
82
Ethereum 2.0 Economic Review
Targeting 13.8% ETH staked will match security levels of Eth1 at historical price levels.
We believe the system should be architected to sustain the most destructive economic attacks;
as a result, it should be able to bear supermajority attacks at low prices of ETH. We calculate
that the target ETH to sustain such attacks is 13.8%.
Economic Positives
Economies of Scale for validating exist but decrease at higher ETH prices.
Unlike Proof of Work environments where profitability can only be accomplished by increasingly
large-scale operations, Eth2 validating gradates into an inexpensive operation relative to
revenues as the price of ETH increases. The deltas of profitabilities between scaled cloud
environments operating hundreds of validators, staking as a service providers, and the
individual validator using select hardware close in on 0 as ETH exceeds $1,000. Irrespective of
price, there are also minor economies of scale for large scale validators, as potentially
thousands of validators can be run from the same beacon node; however, we view these as too
minor to represent a real competitive edge. In general, we find the network economics highly
favorable for more decentralized network participation, meeting Eth2’s design objectives.
77.7% of the current ETH supply is in validator ‘qualified’ wallets (holding over 32 ETH).
Approximately 86.6mm ETH is being held by non-exchange wallets with over 32 ETH. Another
18.7mm ETH is managed by exchanges, which might offer staking services. This is a
compelling serviceable addressable market. Focus of the incentive mechanism should be
converting this share of qualified ETH into staked ETH.
83
Ethereum 2.0 Economic Review
Exhibit 53: Amount Ethereum Network Has Spent on Security (Through Supply Inflation
Multiplied by Average ETH Price)
84
Ethereum 2.0 Economic Review
Economic Concerns
Network security is heavily reliant on the price stability of ETH.
Our primary concern with regards to the economic stability and security of Eth2 is the resilience
of the network at low ETH prices. Profitability diminishes, which could force validators to exit,
further diminishing security. The cost to attack the network also directly and materially
decreases, impacting the total ETH price and total ETH staked, and causing uncertainty for the
validators that remain. Combining this low ETH price impact with the ability for an adversary to
rapidly scale an attack on Eth2 creates cause for concern.
The lack of liquidity in Phase 0 and 1 might cause unpredictability and centralization.
Given the lack of a two-way bridge between Eth1 and Eth2, and the lack of transaction
capabilities in Phases 0 and 1, we expect staking to appeal to only a subset of the total
addressable market for validators in these first phases. Derivatives and centralized exchanges
could provide a secondary market, which might be more compelling for investors looking to gain
exposure without incurring roadmap risk or other uncertainty. A high concentration of validators
leveraging these platforms creates centralization risk and unpredictability — both from
commercial policies and how Staking-as-a-Service providers might react to uneconomical
conditions (e.g. low ETH price).
Recommendations
Increase the Base Reward Factor to at least 128.
In spec v0.12, the Base Reward Factor is set to 64. To reach our ETH stake target of 13.8%,
the network would need to be in an optimal state with negligible risk, costs, or opportunity costs
for validators to consider the investment an efficient one. We acknowledge the implications of
increasing the network’s payment for security, but at a Base Reward Factor of 64, we believe
66
See DeFi Pulse
85
Ethereum 2.0 Economic Review
the network is underpaying for security - and it would be prudent for the network to err on the
side of caution during its phased migration to proof of stake, particularly as we find the
additional issuance implied well within the bounds of reasonable inflation.
Explore a more dynamic method to changing the Base Reward Factor in the event of a
shock, such as an ETH price collapse (i.e. explore the implementation of a safety net).
As mentioned in the Economic Concerns section, the primary state of economic distress in our
view is when ETH price falters and the network takes a moment to reset and stabilize at a
healthy level of ETH staked. The network is prone to vulnerability during this time. We
recommend exploring a more dynamic method for scaling rewards or altering the Base Reward
Factor in the case of network shocks. For example, one could consider setting threshold triggers
in the case of a mass exit, where the queue for exiting validators is a factor in changing base
rewards. Alternatively, one could consider a step change function (based on levels of ETH
staked) to maximize yields up to the ETH stake target we identify above, while reducing yields
substantially beyond that point. Lastly, one could even consider an incentive function that is not
exclusively tied to ETH staked or validators, but rather price itself. This of course introduces
oracle dependence risks, but we encourage further exploration of this topic. In any case, we
recommend using Phases 0 and 1 to further test the incentive mechanism and staying agile and
open to future changes in rewards structure to respond to new data points.
Finally, we reiterate that, given the complexity of the system, further analyses and more
dynamic models (e.g. Agent-Based Models) could help identify further attack vectors and
economic risks. We encourage the continuation of these analyses and hope this paper can
serve as a helpful starting point for further research along these lines.
86
Ethereum 2.0 Economic Review
Bibliography
Vlad Zamfir, “The History of Casper — Part 1”, Medium, December 6, 2016,
https://medium.com/@Vlad_Zamfir/the-history-of-casper-part-1-59233819c9a9.
Ben Edgington, “State of Ethereum Protocol #2: The Beacon Chain,” Medium, October 26,
2018,
https://media.consensys.net/state-of-ethereum-protocol-2-the-beacon-chain-c6b6a9a69129.
Vitalik Buterin, Diego Hernandez, Thor Kamphefner, Khiem Pham, Zhi Qiao, Danny Ryan,
Juhyeok Sin, Ying Wang, and Yan X Zhang, “Combining GHOST and Casper,” Github, October
31, 2019, https://github.com/ethereum/research/blob/master/papers/ffg%2Bghost/paper.pdf.
Joseph Chow, “The Beacon Chain Ethereum 2.0 explainer you need to read first,” Ethos.dev,
May 23, 2020, https://ethos.dev/beacon-chain/.
Herman Junge, “Rewards and Penalties on Ethereum 2.0 [Phase 0],” ConsenSys Codefi, March
2, 2020, https://codefi.consensys.net/blog/rewards-and-penalties-on-ethereum-20-phase-0.
87
Ethereum 2.0 Economic Review
Jim McDonald, “Understanding Validator Effective Balance,” Attestant, November 28, 2019,
https://www.attestant.io/posts/understanding-validator-effective-balance/.
Tarun Chitra, “Competitive equilibria between staking and on-chain lending,” February 4, 2020,
https://arxiv.org/abs/2001.00919.
Fred Wilson, “The Hit Rate,” AVC, September 15, 2019, https://avc.com/2019/09/the-hit-rate/.
Chih-Cheng Liang, “Minimum Committee Size Explained,” Medium, July 12, 2019,
https://medium.com/@chihchengliang/minimum-committee-size-explained-67047111fa20.
88
Ethereum 2.0 Economic Review
Validator Costs
● Prysmatic Labs, “Installing Prsym on macOS”
● Sigma Prime Benchmarks
Attack Vectors
● See the Ethereum Wiki for the Nothing at stake (and other well-known attacks)
● Discouragement Attacks
● Ethresear.ch
User Surveys
● ConsenSys Insights “Ethereum 2.0 Staking Ecosystem Report”
● Empire Ventures “Ethereum Lighthouse: Chasing Serenity”
89
Ethereum 2.0 Economic Review
We have summarized the learnings from these interviews into a few recurring themes and
patterns that came up across interviews. These learnings are integrated into our conclusions
within the main paper.
Summary of Themes
Eth2 Objectives
● From Researchers and Client teams, we heard:
○ Security is the biggest goal
○ Building a client that is correct, stable, and reliable
○ There are three main goals for the client: Security, Performance, Usability
● An infrastructure provider representative suggested that the goal of Phase 0 shouldn’t be
to overemphasize security but rather to hook people into Ethereum 2 and bootstrap the
network by building stickiness
90
Ethereum 2.0 Economic Review
high, with the highest cost coming from detecting surrounding attestations (one of the
slashable offenses).
● There were multiple concerns raised around finality and the possibility of stalling the
network. From one researcher: there’s still a way to stay on the sideline (ie. online but
not attesting) and, once there’s a fork, fight to keep forks alive rather than GHOST
choosing one of the forks.
● Similarly, one client team mentioned skipping slots in an effort to penalize others (by
skipping slots, others are robbed of their potential incentives from attestations). This
team mentioned that with around 10% of validator control, an attacker could start doing
interesting things with the network.
91
Ethereum 2.0 Economic Review
● Rocket Pool suggested that given testnet results, a validator could get away with a
relatively cheap hardware setup with minimal CPU specs, 2GB RAM, and a SSD hard
drive. For cloud, an EC2 instance with 2-4 CPUs, 2GB RAM, and 200GB storage would
suffice.
● Sigma Prime pointed to the results of their UX survey, which suggested many individuals
expect to be able to run validators on a raspberry pi. However, while the team estimated
that it was possible to run a beacon node on a Raspberry pi with several thousand
validators, they cautioned that tests are required on multi-client testnets as well as
adversarial conditions. The number of validators on the network also has an impact: the
more validators, the more messages and the larger the state size. Other individuals
recommended staying away from a Raspberry pi and using a desktop computer instead.
Validator Fees
● In our interviews, some individuals estimated staking pool fees to start around 12%, with
that percentage subject to change based on supply and demand.
● Staking as a Service providers indicated a possible fee of around 15%.
● Two individuals on the infrastructure as a service side posited a belief that validator fees
would trend toward zero over time — in other words, become commoditized.
Institutional Demand
● In terms of crypto asset demand, two asset managers indicated that so far, the demand
from investors is still exclusive to BTC.
● The investors that show interest in crypto and serve as clients of the asset managers we
spoke to are crypto natives, first movers (family offices, financial advisors, large scale
institutions), and global macro hedge funds. Family offices and HNWIs are the initial
clients given their risk appetite.
● These investors categorize BTC and crypto more broadly under two groups:
○ As an alternative asset that can improve the risk-reward of a portfolio (improve its
information ratio)
○ As a VC-type bet with asymmetric upside; essentially an option-style bet
● Investors in this group will allocate no more than 0.5% - 2% of their portfolio to BTC.
● With regards to ETH as an asset class, some family offices show interest in learning
about ETH. They are not, however, interested in the state of the network or any
technological properties of the protocol, and have expressed confusion around the
transition to Eth2 and the uncertainty around the success and timeline of that transition.
In contrast, the narrative of BTC as an uncorrelated store of value asset is easier to
grasp. Lastly, ETH doesn’t have support from incumbent institutions in the same way
Bitcoin does; for example, there are no ETH futures on Bakkt or CME.
● Capital efficiency is important; even when it comes to BTC, institutions are thinking about
how to put that capital to work. One asset manager stated that investors’ decisions were
all about opportunity cost, with the following questions coming up in conversation: would
92
Ethereum 2.0 Economic Review
we not make more money trading money actively? What about lending it out? What
about a different crypto asset? What is the cost of locking up one asset and what’s the
cost of taking it out?
● With regards to staking, two asset managers expressed that realistically, very few
institutions are going to be comfortable enough to stake assets; however, there is more
of a possibility if it staking is packaged in a product they’re more familiar with, like a
derivative. Another individual mentioned that no investor is going to be ok locking up
ETH for at least 2 years, particularly when running a fund with a time horizon; there is
too much risk and no liquidity. One asset manager mentioned that staking had rarely
come up in client conversations.
● There are signs that derivative products will be made available, echoed by infrastructure
providers. For example, pools or exchanges may mints new tokens that reflect balances
on Eth2.
● One individual stated that large institutional investors are motivated by the monetary
incentive; they don’t care about PoS vs. PoW, they make decisions based on yield and
risk.
● Referring again to the uncertainty of the Eth2 timeline, one individual mentioned that
investors would prefer to prioritize other assets with higher yields in the short term while
waiting for more clarity on Eth2.
93
Ethereum 2.0 Economic Review
Cost Assumptions
Exhibit 54: Validator Cost Assumptions
94
Ethereum 2.0 Economic Review
DIY - Hardware
Exhibit 55: Net Yields
DIY - Cloud
Exhibit 57: Net Yields
95
Ethereum 2.0 Economic Review
Pool - StaaS
Exhibit 59: Net Yields
96
Ethereum 2.0 Economic Review
Pool - Hardware
Exhibit 61: Net Yields
Pool - Cloud
Exhibit 63: Net Yields
97
Ethereum 2.0 Economic Review
StaaS - Full
Exhibit 65: Net Yields
98
Ethereum 2.0 Economic Review
StaaS - Self-Custodied
Exhibit 67: Net Yields
99
Ethereum 2.0 Economic Review
Validator Duration
Duration is the time, in years, which it would take for cash flows from a yield-generating asset to
return the principal of the investment. Validator duration can have different interpretations
depending on the asset used in the model. For example, if the principal amount is the
underlying staked asset, or Ether, then it equates to the time for the validator to receive a net
yield as cash flow to reach the minimum effective balance requirements to stake another
validator, a metric which could delineate the magnitude of perceived risks from validators on the
network (the lower the variables in RSAVY model, higher the duration). Alternatively, and more
illustrative in our view, the duration of net yield cash flows against a benchmark asset/index, or
‘benchmark duration,’ should articulate the price sensitivities to changes in yield.
Pb
Dvb = Rv x P e
Where:
Dvb = validator duration against benchmark asset
P b = price of benchmark, e.g. Bitcoin
P e = price of underlying staked asset, e.g. Ether
Rv = net yield on validator environment
The relationship between yield and price of the underlying asset is important for modeling and
scenario analyzing the projected investment return of a yielding asset. Interpreting the
benchmark duration, a drop in the underlying assets price might imply higher volatility of the
asset, thus more risk and a higher required rate of a return. For assessing the sustainable
economics of the Eth2 network, the benchmark duration could support assumptions on the
theoretical stability of adjusting the base reward factor. We envision this economic evaluation
method being useful as a tool when measuring and comparing against actual data.
100
Ethereum 2.0 Economic Review
Disclosures
The authors of this research were compensated in the form of a grant by MolochDAO to perform
an economic review of Ethereum 2.0. Compensation was not received on any basis contingent
upon expressing a positive opinion in this report.
This report is not investment advice. The above references an opinion and is for information
purposes only. The authors are not recommending to trade, invest, or stake in ETH or any
tokens, entities, or companies based solely upon this information. Furthermore, the authors are
not recommending to participate as a validator on the Ethereum network. Any investment
involves substantial risks, including but not limited to pricing volatility, inadequate liquidity, and
the potential complete loss of principal. Seek a duly licensed professional for investment advice.
The information contained in this document may include forward-looking statements. These
statements are not guarantees of future performance and undue reliance should not be placed
on them. Such forward-looking statements necessarily involve known and unknown risks and
uncertainties, which may cause actual results in future periods to differ materially from any
projections of result expressed or implied by such forward-looking statements. It can be
expected that some or all of such forward-looking assumptions will not materialize or will vary
significantly from actual results.
101