Consensys Terms of use

https://consensys.io/terms-of-use/

IMPORTANT NOTICE: THIS AGREEMENT IS SUBJECT TO BINDING ARBITRATION AND A WAIVER OF CLASS ACTION RIGHTS AS DETAILED IN SECTION 11. PLEASE READ THE AGREEMENT CAREFULLY.

Consensys Software Inc. (“Consensys,” “we,” “us,” or “our”) is the leading blockchain software development company. With a focus on utilizing decentralized technologies, such as Ethereum, our software is powering a revolution in commerce and finance and helping to optimize business processes. Consensys hosts a top level domain website, www.consensys.net, that serves information regarding Consensys and our products and services (collectively, the “Offerings”), as well as sub-domains for our products or services (the top level domain with the sub-domains collectively referred to as the “Site”), which include text, images, audio, code and other materials or third party information.

These Terms of Use (the “Terms,” “Terms of Use” or “Agreement”) contain the terms and conditions that govern your access to and use of the Site and Offerings provided by us and is an agreement between us and you or the entity you represent (“you” or “your”). Please read these Terms of Use carefully before using the Site or Offerings. By using the Site, clicking a button or checkbox to accept or agree to these Terms where that option is made available, clicking a button to use or access any of the Offerings, completing an Order, or,  if earlier, using or otherwise accessing the Offerings (the date on which any of the events listed above occur being the “Effective Date”), you (1) accept and agree to these Terms and any additional terms, rules and conditions of participation issued by Consensys from time to time and (2) consent to the collection, use, disclosure and other handling of information as described in our Privacy Policy. If you do not agree to the Terms or perform any and all obligations you accept under the Terms, then you may not access or use the Offerings.

You represent to us that you are lawfully able to enter into contracts. If you are entering into this Agreement for an entity, such as the company you work for, you represent to us that you have legal authority to bind that entity. Please see Section 13 for definitions of certain capitalized terms used in this Agreement.

In addition, you represent to us that you and your financial institutions, or any party that owns or controls you or your financial institutions, are (1) not subject to sanctions or otherwise designated on any list of prohibited or restricted parties, including but not limited to the lists maintained by the United Nations Security Council, the U.S. Government (i.e., the Specially Designated Nationals List and Foreign Sanctions Evaders List of the U.S. Department of Treasury and the Entity List of the U.S. Department of Commerce), the European Union or its Member States, the United Kingdom, or other applicable government authority and (2) not located in any country subject to a comprehensive sanctions program implemented by the United States.

1. The Offerings.

1.1 Generally. You may access and use the Offerings in accordance with this Agreement. You agree to comply with the terms of this Agreement and all laws, rules and regulations applicable to your use of the Offerings.

1.2 Offerings and Access. Consensys offers a number of Offerings under the Consensys brand or brands owned by us. These include Infura, MetaMask and others. Offerings are generally accessed through the Site or through a third party provider of which we approved, such as the Google Play or Apple App stores, unless otherwise agreed in writing. Some Offerings may require you to create an account with Consensys, enter a valid form of payment, and select a paid plan (a “Paid Plan”), or initiate an Order.

1.3 Third-Party Content and Services. In certain Offerings, including MetaMask Swaps, Bridging, Staking, and Snaps, you may view, have access to, and may use the informational content, products, or services of one or more third parties (“Third Party Content” and “Third Party Services” respectively).  In each such case, you agree that you view, access or use such content and services at your own election.  Your reliance on any Third Party Content and use of Third Party Services in connection with the Offerings is governed on one hand by this Agreement but, on the other, will also generally be subject to separate terms and conditions set forth by the applicable third party content and/or service provider.  Those terms and conditions may involve separate fees and charges or may include disclaimers or risk warnings about reliance on or the accuracy of any information.  Such terms may also apply a privacy policy different than that which Consensys maintains and incorporates into this Agreement.  It is your responsibility to understand the terms and conditions of Third Party Services, including how those service providers use any of your information under their privacy policies.

Third Party Content and Third Party Services are provided for your convenience only.  We do not verify, curate, or control Third Party Content.  We do not control Third Party Services.  As a result, we do not guarantee, endorse, or recommend such content or services to any or all users of the Offerings, or the use of such content or services for any particular purpose.  You access, rely upon or use any Third Party Content or Third Party Service at your own risk.  Consensys disclaims all responsibility and liability for any Losses on account of your reliance upon or use of such content or services.  We have no responsibility for Third Party Content that may be misleading, incomplete, erroneous, offensive, indecent, or otherwise objectionable to you or under the law in your jurisdiction.  The choice to rely on Third Party Content or to use a Third Party Service is your own, and you are solely responsible for ensuring that your reliance or use is in compliance with all applicable laws. Dealing or correspondence with any third party that provides such content or services is solely between you and that third party.  We reserve the right to change, suspend, remove, disable, or impose access restrictions or limits on the use of any Third Party Service at any time without notice.

2. Changes.

2.1 To the Offerings. We may change or discontinue any or all of the Offerings or change or remove functionality of any or all of the Offerings from time to time. We will use commercially reasonable efforts to communicate to you any discontinuation of an Offering through the Site or public communication channels.  If you are on a Paid Plan, we will use commercially reasonable efforts to communicate to you any discontinuation of the Offering at least 30 days in advance of such discontinuation, and we will use commercially reasonable efforts to continue supporting the Offering for up to three months after the discontinuation, except if doing so (a) would pose an information security or intellectual property issue, (b) is economically or technically burdensome, or (c) would create undue risk of us violating the law.

2.2 To this Agreement. We reserve the right, at our sole discretion, to modify or replace any part of this Agreement or any Policies at any time. It is your responsibility to check this Agreement periodically for changes, but we will also use commercially reasonable efforts to communicate any material changes to this Agreement through the Site, email (if you have an account), or public channels. You agree that your continued use of or access to the Offerings following the posting of any changes to this Agreement constitutes acceptance of those changes, whether or not you were checking for changes or actually read the changes.

3. Your Responsibilities.

3.1 Use of the Offerings.  For any Offerings, whether they require that you set up an account with Consensys (such as Diligence) or they do not (such as MetaMask), and except to the extent caused by our breach of this Agreement, (a) you are responsible for all activities that occur with respect to your use of the Offerings, regardless of whether the activities are authorized by you or undertaken by you, your employees or a third party (including your contractors, agents or other End Users), and (b) we and our affiliates are not responsible for unauthorized access to the Offerings or your account, including any access that occurred as a result of fraud, phishing, or other criminal activity perpetrated against you by third parties. You will ensure that your use of the Offerings does not violate any applicable law. 

3.2 Your Security and Backup. You are solely responsible for properly configuring and using the Offerings and otherwise taking appropriate action to secure, protect, and backup your accounts and/or Your Content in a manner that will provide appropriate security and protection, which might include use of encryption.  If you are not able to be responsible for your own account security, or do not want such an obligation, then you should not use the Offerings.  Your obligations under this Agreement include ensuring any available software updates or upgrades to an Offering you are using are promptly installed or implemented, and recording and securely maintaining any passwords or secret recovery phrases that relate to your use of the Offerings.  You acknowledge that certain methods of securing your secret recovery phrase, such as storing it as a digital file on your personal device or on a cloud storage provider, may increase the risk that your account or secret recovery phrase will be compromised.  You further acknowledge that you will not share with us nor any other third party any password or secret recovery phrase that relates to your use of the Offerings, and that we will not be held responsible if you do share any such password or phrase, whether you do so knowingly or unknowingly.  For the avoidance of doubt, we take no responsibility whatsoever for any theft of a secret recovery phrase that involved intrusion into a cloud provider’s data repository.

3.3 Log-In Credentials and API Authentication. To the extent we provide you with log-in credentials and API authentication generated by the Offerings, such log-in credentials and API authentication are for your use only and you will not sell, transfer, or sublicense them to any other entity or person, except that you may disclose your password or private key to your agents and subcontractors performing work on your behalf.

3.4 Applicability to Offerings that facilitate access to addresses on blockchain protocols. For the avoidance of doubt, the terms of this Section 3 are applicable to all Offerings such as MetaMask through which you generate a public/private key pair (which can be thought of as a blockchain account and related password) either with a blockchain protocol directly or with Third Party Offerings, such as decentralized applications.  You are solely responsible for the use and security of these security keys and that we will not be held responsible if you share any keys or secret recovery phrases with anyone else, whether knowingly or unknowingly.

4. Fees and Payment.

4.1 Publicly Available Offerings. Some Offerings may be offered to the public and licensed on a royalty free basis, including Offerings that require a Paid Plan for software licensing fees above a certain threshold of use. These terms apply to all Offerings regardless of whether they require a Paid Plan.

4.2 Offering Fees.  If your use of an Offering does not require an Order or Paid Plan but software licensing fees are charged contemporaneously with your use of the Offering, those fees will be charged as described on the Site or in the user interface of the Offering.  Such fees may be calculated by combining a fee charged by us and a fee charged by a Third Party Offering that provides certain functionality related to the Offering.  For those Offerings which entail an Order or Paid Plan, we calculate and bill fees and charges according to your Order or Paid Plan. For such Offerings, on the first day of each billing period, you will pay us the applicable fees (the “Base Fees”) and any applicable taxes based on the Offerings in the Paid Plan. In addition, for particular Orders, we may issue an invoice to you for all charges above the applicable threshold for your Paid Plan which constitute overage fees for the previous billing period. If you make any other changes to the Offerings during a billing period (for example, upgrading or downgrading your Paid Plan), we will apply any additional charges or credits to the next billing period. We may bill you more frequently for fees accrued at our discretion upon notice to you.  You will pay all fees in U.S. dollars unless the particular Offering specifies a different form of payment or otherwise agreed to by you and us in writing. All amounts payable by you under this Agreement will be paid to us without setoff or counterclaim, and without any deduction or withholding. Fees and charges for any new Offering or new feature of an Offering will be effective when we use commercially reasonable efforts to communicate updated fees and charges through our Site, the interface of the Offering itself, or other public channels or, if you are on a Paid Plan, upon commercially reasonable efforts to notify you directly, but we may expressly state when notifying you that another effective date applies.  We may increase or add new fees and charges for any existing Offerings you are using by using commercially reasonable efforts to notify users of the Offerings through our Site, the interface of the Offering itself, other public channels or, if you are on a Paid Plan, by giving you 30 days’ notice.  Unless otherwise specified in an Order, all Paid Plan amounts due under this Agreement are payable within 30 days following receipt of your invoice.  We may elect to charge you interest at the rate of 1.5% per month (or the highest rate permitted by law, if less) on all late payments.

4.3 Taxes. Each party will be responsible, as required under applicable law, for identifying and paying all taxes and other governmental fees and charges (and any penalties, interest, and other additions thereto) that are imposed on that party upon or with respect to the transactions and payments under this Agreement. All fees payable by you are exclusive taxes unless otherwise noted. We reserve the right to withhold taxes where required.

5. Temporary Suspension; Limiting API Requests.

5.1 Generally. We may suspend your right to access or use any portion or all of the Offerings immediately if we determine:

(a) your use of the Offerings (i) poses a security risk to the Offerings or any third party, (ii) could adversely impact our systems, the Offerings, or the systems of any other user, (iii) could subject us, our affiliates, or any third party to liability, or (iv) could be unlawful;

(b) you are, or any End User is, in breach of this Agreement;

(c) you are in breach of your payment obligations under Section 4 for 30 days or longer; or

(d) for entities, you have ceased to operate in the ordinary course, made an assignment for the benefit of creditors or similar disposition of your assets, or become the subject of any bankruptcy, reorganization, liquidation, dissolution or similar proceeding.

5.2 Effect of Suspension. If we suspend your right to access or use any portion or all of an Offering:

(a) you remain responsible for all fees and charges you incur during the period of suspension; and

(b) you will not be entitled to any fee credits for any period of suspension.

5.3 Limiting API Requests. We retain sole discretion to limit your API requests (“API Requests”) submitted in conjunction with your use of an Offering at any time if your usage of the Offering exceeds the usage threshold specified in your Paid Plan or otherwise on the Site or user interface of the Offering.  Further, excessive API requests, as determined by Consensys in our sole discretion, may result in the temporary or permanent suspension of your access to an account or to your use of the applicable Offering. Consensys is not required but will endeavor, when reasonable, to warn an account owner or user prior to suspension.

6. Term; Termination.

6.1 Term. For Offerings subject to a Paid Plan, the term of this Agreement will commence on the Effective Date and will remain in effect until terminated under this Section 6 or by separate written agreement. Any notice of termination of this Agreement by either party to the other must include a Termination Date that complies with the notice periods in Section 6.2.  For Offerings that are not subject to a Paid Plan, the term of this Agreement will commence on the Effective Date and will remain in effect until you stop accessing or using the Offerings.

6.2 Termination.

(a) Termination for Convenience. If you are not on a Paid Plan, you may terminate this Agreement for any reason by ceasing use of the Offering. For Paid Plans, Consensys may terminate this Agreement for any reason after providing 30 calendar days’ written notice.

(b) Termination for Cause.

(i) By Either Party. Either party may terminate this Agreement for cause if the other party is in material breach of this Agreement and the material breach remains uncured for a period of 30 days from receipt of the other party’s notice of breach.

(ii) By Us. We may also terminate this Agreement for cause immediately (A) if we have the right to suspend under Section 5, (B) if our relationship with a third-party partner who provides software or other technology we use to provide the Offerings expires, terminates, or requires us to change the way we provide the software or other technology as part of the Offerings, or (C) in order to avoid undue risk of violating the law.

6.3 Effect of Termination. Upon the Termination Date:

(i) all your rights under this Agreement immediately terminate; and

(ii) each party remains responsible for all fees and charges it has incurred through the Termination Date and are responsible for any fees and charges it incurs during the post-termination period;

(iii) the terms and conditions of this Agreement shall survive the expiration or termination of this Agreement to the full extent necessary for their enforcement and for the protection of the party in whose favor they operate.  For instance, should this Agreement between you and us terminate, any dispute raised after you stop accessing or using the Offerings will be subject to the applicable provisions of this Agreement if that dispute relates to your prior access or use.

For any use of the Offerings after the Termination Date, the terms of this Agreement will again apply and, if your use is under a Paid Plan, you will pay the applicable fees at the rates under Section 4.

7. Proprietary Rights.

7.1 Your Content. Depending on the Offering, you may share Content with us. Except as provided in this Section 7, we obtain no rights under this Agreement from you (or your licensors) to Your Content; however, you consent to our use of Your Content in any manner that is consistent with the purpose of your use of the Offerings or that otherwise facilitates providing the Offerings to you.

7.2 Offerings License. We or our licensors own all right, title, and interest in and to the Offerings, and all related technology and intellectual property rights. Subject to the terms of this Agreement, we grant you a limited, revocable, non-exclusive, non-sublicensable, non-transferable license to do the following: (a) access and use the Offerings solely in accordance with this Agreement; and (b) copy and use Our Content solely in connection with your permitted use of the Offerings. Except as provided in this Section 7.2, you obtain no rights under this Agreement from us, our affiliates or our licensors to the Offerings, including any related intellectual property rights. Some of Our Content and Third-Party Content may be provided to you under a separate license, such as the Apache License, Version 2.0, or other open source license. In the event of a conflict between this Agreement and any separate license, the separate license will prevail with respect to Our Content or Third-Party Content that is the subject of such separate license.

7.3 License Restrictions. Neither you nor any End User will use the Offerings in any manner or for any purpose other than as expressly permitted by this Agreement. Except for as authorized, neither you nor any End User will, or will attempt to (a) modify, distribute, alter, tamper with, repair, or otherwise create derivative works of any Content included in the Offerings (except to the extent Content included in the Offerings is provided to you under a separate license that expressly permits the creation of derivative works), (b) reverse engineer, disassemble, or decompile the Offerings or apply any other process or procedure to derive the source code of any software included in the Offerings (except to the extent applicable law doesn’t allow this restriction), (c) access or use the Offerings in a way intended to avoid incurring fees or exceeding usage limits or quotas, (d) use scraping techniques to mine or otherwise scrape data except as permitted by a Plan, or (e) resell or sublicense the Offerings unless otherwise agreed in writing. You will not use Our Marks unless you obtain our prior written consent. You will not misrepresent or embellish the relationship between us and you (including by expressing or implying that we support, sponsor, endorse, or contribute to you or your business endeavors). You will not imply any relationship or affiliation between us and you except as expressly permitted by this Agreement.

7.4 Suggestions. If you provide any Suggestions to us or our affiliates, we and our affiliates will be entitled to use the Suggestions without restriction. You hereby irrevocably assign to us all right, title, and interest in and to the Suggestions and agree to provide us any assistance we require to document, perfect, and maintain our rights in the Suggestions.

7.5 U.S. Government Users. If you are a U.S. Government End User, we are licensing the Offerings to you as a “Commercial Item” as that term is defined in the U.S. Code of Federal Regulations (see 48 C.F.R. § 2.101), and the rights we grant you to the Offerings are the same as the rights we grant to all others under these Terms of Use.

8. Indemnification.

8.1 General. 

(a) You will defend, indemnify, and hold harmless us, our affiliates and licensors, and each of their respective employees, officers, directors, and representatives from and against any Losses arising out of or relating to any claim concerning: (a) breach of this Agreement or violation of applicable law by you; or (b) a dispute between you and any of your customers or users. You will reimburse us for reasonable attorneys’ fees and expenses, associated with claims described in (a) and (b) above.

(b) We will defend, indemnify, and hold harmless you and your employees, officers, directors, and representatives from and against any Losses arising out of or relating to any claim concerning our material and intentional breach of this Agreement.  We will reimburse you for reasonable attorneys’ fees and expenses associated with the claims described in this paragraph.

8.2 Intellectual Property.

(a) Subject to the limitations in this Section 8, you will defend Consensys, its affiliates, and their respective employees, officers, and directors against any third-party claim alleging that any of Your Content infringes or misappropriates that third party’s intellectual property rights, and will pay the amount of any adverse final judgment or settlement.

(b) Subject to the limitations in this Section 8 and the limitations in Section 10, we will defend you and your employees, officers, and directors against any third-party claim alleging that the Offerings infringe or misappropriate that third party’s intellectual property rights, and will pay the amount of any adverse final judgment or settlement.  However, we will not be required to spend more than $200,000 pursuant to this Section 8, including without limitation attorneys’ fees, court costs, settlements, judgments, and reimbursement costs.

(c) Neither party will have obligations or liability under this Section 8.2 arising from infringement by you combining the Offerings with any other product, service, software, data, content or method. In addition, we will have no obligations or liability arising from your use of the Offerings after we have notified you to discontinue such use. The remedies provided in this Section 8.2 are the sole and exclusive remedies for any third-party claims of infringement or misappropriation of intellectual property rights by the Offerings or by Your Content.

8.3 Process. In no event will a party agree to any settlement of any claim that involves any commitment, other than the payment of money, without the written consent of the other party.

9. Disclaimers; Risk.

9.1 DISCLAIMER. THE OFFERINGS ARE PROVIDED “AS IS.” EXCEPT TO THE EXTENT PROHIBITED BY LAW, OR TO THE EXTENT ANY STATUTORY RIGHTS APPLY THAT CANNOT BE EXCLUDED, LIMITED OR WAIVED, WE AND OUR AFFILIATES AND LICENSORS (A) MAKE NO REPRESENTATIONS OR WARRANTIES OF ANY KIND, WHETHER EXPRESS, IMPLIED, STATUTORY OR OTHERWISE REGARDING THE OFFERINGS, THE THIRD PARTY CONTENT, OR THE THIRD PARTY SERVICES, AND (B) DISCLAIM ALL WARRANTIES, INCLUDING ANY IMPLIED OR EXPRESS WARRANTIES (I) OF MERCHANTABILITY, SATISFACTORY QUALITY, FITNESS FOR A PARTICULAR PURPOSE, NON-INFRINGEMENT, OR QUIET ENJOYMENT, (II) ARISING OUT OF ANY COURSE OF DEALING OR USAGE OF TRADE, (III) THAT THE OFFERINGS, THIRD PARTY CONTENT, OR THIRD PARTY SERVICE WILL BE UNINTERRUPTED, ERROR FREE OR FREE OF HARMFUL COMPONENTS, AND (IV) THAT ANY CONTENT WILL BE SECURE OR NOT OTHERWISE LOST OR ALTERED.  YOU ACKNOWLEDGE AND AGREE THAT YOU HAVE NOT RELIED AND ARE NOT RELYING UPON ANY REPRESENTATION OR WARRANTY FROM CONSENSYS THAT IS NOT OTHERWISE IN THIS AGREEMENT OR IN A SEPARATE WRITTEN AGREEMENT BETWEEN US, AND YOU AGREE YOU WILL NOT TAKE A POSITION IN ANY PROCEEDING THAT IS INCONSISTENT WITH THIS PROVISION.

9.2 RISKS. OUR OFFERINGS RELY ON EMERGING TECHNOLOGIES, SUCH AS ETHEREUM. SOME OFFERINGS ARE SUBJECT TO INCREASED RISK THROUGH YOUR POTENTIAL MISUSE OF THINGS SUCH AS PUBLIC/PRIVATE KEY CRYPTOGRAPHY, OR FAILING TO PROPERLY UPDATE OR RUN SOFTWARE TO ACCOMMODATE PROTOCOL UPGRADES, LIKE THE TRANSITION TO PROOF OF STAKE CONSENSUS. BY USING THE OFFERINGS YOU EXPLICITLY ACKNOWLEDGE AND ACCEPT THESE HEIGHTENED RISKS.  YOU REPRESENT THAT YOU ARE FINANCIALLY AND TECHNICALLY SOPHISTICATED ENOUGH TO UNDERSTAND THE INHERENT RISKS ASSOCIATED WITH USING CRYPTOGRAPHIC AND BLOCKCHAIN-BASED SYSTEMS AND UPGRADING YOUR SOFTWARE AND PROCESSES TO ACCOMMODATE OFFERING AND PROTOCOL UPGRADES, AND THAT YOU HAVE A WORKING KNOWLEDGE OF THE USAGE AND INTRICACIES OF DIGITAL ASSETS SUCH AS ETHER (ETH) AND OTHER DIGITAL TOKENS, SUCH AS THOSE FOLLOWING THE ERC-20 TOKEN STANDARD.  IN PARTICULAR, YOU UNDERSTAND THAT WE DO NOT OPERATE THE ETHEREUM PROTOCOL OR ANY OTHER BLOCKCHAIN PROTOCOL, COMMUNICATE OR EXECUTE PROTOCOL UPGRADES, OR APPROVE OR PROCESS BLOCKCHAIN TRANSACTIONS ON BEHALF OF YOU.  YOU FURTHER UNDERSTAND THAT BLOCKCHAIN PROTOCOLS PRESENT THEIR OWN RISKS OF USE, THAT SUPPORTING OR PARTICIPATING IN THE PROTOCOL MAY RESULT IN LOSSES IF YOUR PARTICIPATION VIOLATES CERTAIN PROTOCOL RULES, THAT  BLOCKCHAIN-BASED TRANSACTIONS ARE IRREVERSIBLE, THAT YOUR PRIVATE KEY AND SECRET RECOVERY PHRASE MUST BE KEPT SECRET AT ALL TIMES, THAT CONSENSYS WILL NOT STORE A BACKUP OF, NOR WILL BE ABLE TO DISCOVER OR RECOVER, YOUR PRIVATE KEY OR SECRET RECOVERY PHRASE, THAT DIGITALLY COPYING AND STORING YOUR SECRET RECOVERY PHRASE ON A CLOUD STORAGE SYSTEM OR OTHER THIRD PARTY SUPPORTED DATA STORAGE, INCLUDING YOUR PERSONAL DEVICE, MAY INCREASE THE RISK OF LOSS OR THEFT, AND THAT YOU ARE SOLELY RESPONSIBLE FOR ANY APPROVALS OR PERMISSIONS YOU PROVIDE BY CRYPTOGRAPHICALLY SIGNING BLOCKCHAIN MESSAGES OR TRANSACTIONS, ESPECIALLY THOSE RESPONDING TO SOLICITATIONS AND OTHER PROMPTS FROM THIRD PARTIES.

YOU FURTHER UNDERSTAND AND ACCEPT THAT DIGITAL TOKENS PRESENT MARKET VOLATILITY RISK, TECHNICAL SOFTWARE RISKS, REGULATORY RISKS, AND CYBERSECURITY RISKS.  YOU UNDERSTAND THAT THE COST AND SPEED OF A BLOCKCHAIN-BASED SYSTEM IS VARIABLE, THAT COST MAY INCREASE DRAMATICALLY AT ANY TIME, AND THAT COST AND SPEED IS NOT WITHIN THE CAPABILITY OF CONSENSYS TO CONTROL.  YOU UNDERSTAND THAT PROTOCOL UPGRADES MAY INADVERTENTLY CONTAIN BUGS OR SECURITY VULNERABILITIES THAT MAY RESULT IN LOSS OF FUNCTIONALITY AND ULTIMATELY FUNDS.

YOU UNDERSTAND AND ACCEPT THAT CONSENSYS DOES NOT CONTROL ANY BLOCKCHAIN PROTOCOL, NOR DOES CONSENSYS CONTROL ANY SMART CONTRACT THAT IS NOT OTHERWISE OFFERED BY CONSENSYS AS PART OF THE OFFERINGS AND IS NOT ITSELF A THIRD PARTY SERVICE.  YOU UNDERSTAND AND ACCEPT THAT CONSENSYS DOES NOT CONTROL AND IS NOT RESPONSIBLE FOR THE TRANSITION OF ANY BLOCKCHAIN PROTOCOL FROM PROOF OF WORK TO PROOF OF STAKE CONSENSUS OR THE FUNCTIONING OF ANY PROTOCOL AFTER IT UNDERGOES A TECHNICAL UPGRADE.  YOU UNDERSTAND AND ACCEPT THAT CONSENSYS DOES NOT CONTROL AND IS NOT RESPONSIBLE FOR ANY THIRD PARTY SERVICE.  YOU AGREE THAT YOU ALONE, AND NOT CONSENSYS, IS RESPONSIBLE FOR ANY TRANSACTIONS THAT YOU ENGAGE IN WITH REGARD TO SUPPORTING ANY BLOCKCHAIN PROTOCOL WHETHER THROUGH TRANSACTION VALIDATION OR OTHERWISE, OR ANY TRANSACTIONS THAT YOU ENGAGE IN WITH ANY THIRD-PARTY-DEVELOPED SMART CONTRACT OR TOKEN, INCLUDING TOKENS THAT WERE CREATED BY A THIRD PARTY FOR THE PURPOSE OF FRAUDULENTLY MISREPRESENTING AFFILIATION WITH ANY BLOCKCHAIN PROJECT.  YOU AGREE THAT CONSENSYS IS NOT RESPONSIBLE FOR THE REGULATORY STATUS OR TREATMENT IN ANY JURISDICTION OF ANY DIGITAL ASSETS THAT YOU MAY ACCESS OR TRANSACT WITH USING CONSENSYS OFFERINGS.  YOU EXPRESSLY ASSUME FULL RESPONSIBILITY FOR ALL OF THE RISKS OF ACCESSING AND USING THE OFFERINGS TO INTERACT WITH BLOCKCHAIN PROTOCOLS.

10. Limitations of Liability.

10.1 Limitation of Amount. WITH THE EXCEPTION OF CLAIMS RELATING TO A BREACH OF OUR PROPRIETARY RIGHTS AS GOVERNED BY SECTION 7 AND INDEMNIFICATION AS GOVERNED BY SECTION 8, IN NO EVENT SHALL THE AGGREGATE LIABILITY OF EACH PARTY TOGETHER WITH ALL OF ITS AFFILIATES ARISING OUT OF OR RELATED TO THIS AGREEMENT (REGARDLESS OF WHETHER SUCH LIABILITY ARISES FROM NEGLIGENCE OR OTHERWISE) EXCEED THE TOTAL AMOUNT PAID BY YOU HEREUNDER FOR THE OFFERINGS GIVING RISE TO THE LIABILITY IN THE TWELVE MONTHS PRECEDING THE FIRST INCIDENT OUT OF WHICH THE LIABILITY AROSE, OR, IF NO FEES HAVE BEEN PAID, $25,000. THE FOREGOING LIMITATION WILL APPLY WHETHER AN ACTION IS IN CONTRACT OR TORT AND REGARDLESS OF THE THEORY OF LIABILITY, BUT WILL NOT LIMIT YOUR PAYMENT OBLIGATIONS UNDER SECTION 4.  CONSENSYS SHALL HAVE NO LIABILITY TO YOU WITH RESPECT TO ANY OFFERING EXCEPT TO THE EXTENT THAT SUCH DAMAGES ARE DETERMINED BY FINAL JUDGMENT OF A COURT OR ARBITRATOR. 

10.2 Exclusion of Consequential and Related Damages. IN NO EVENT WILL EITHER PARTY OR ITS AFFILIATES HAVE ANY LIABILITY ARISING OUT OF OR RELATED TO THIS AGREEMENT FOR ANY LOST PROFITS, REVENUES, GOODWILL, OR INDIRECT, SPECIAL, INCIDENTAL, CONSEQUENTIAL, COVER, BUSINESS INTERRUPTION OR PUNITIVE DAMAGES, WHETHER AN ACTION IS IN CONTRACT OR TORT AND REGARDLESS OF THE THEORY OF LIABILITY, EVEN IF A PARTY OR ITS AFFILIATES HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES OR IF A PARTY’S OR ITS AFFILIATES’ REMEDY OTHERWISE FAILS OF ITS ESSENTIAL PURPOSE. THE FOREGOING DISCLAIMER WILL NOT APPLY TO THE EXTENT PROHIBITED BY LAW.

11. Binding Arbitration and Class Action Waiver.

PLEASE READ THIS SECTION CAREFULLY – IT MAY SIGNIFICANTLY AFFECT YOUR LEGAL RIGHTS, INCLUDING YOUR RIGHT TO FILE A LAWSUIT IN COURT.

11.1 Binding Arbitration. Any dispute, claim or controversy (“Claim”) relating in any way to this Agreement, the Site, or your use of the Offerings will be resolved by binding arbitration as provided in this Section 11, rather than in court, except that you may assert claims in small claims court if your claims qualify.

11.1.1 If you are located in the United States: This agreement and any dispute or claim (including non-contractual disputes or claims) arising out of or in connection with it or its subject matter or formation shall be governed by and construed in accordance with the laws of the State of Texas. The Federal Arbitration Act and federal arbitration law apply to this Agreement. There is no judge or jury in arbitration, and court review of an arbitration award is limited. However, an arbitrator can award on an individual basis the same damages and relief as a court (including injunctive and declaratory relief or statutory damages), and must follow the terms of this Agreement as a court would. The arbitration will be conducted in accordance with the expedited procedures set forth in the JAMS Comprehensive Arbitration Rules and Procedures (the “Rules”) as those Rules exist on the effective date of this Agreement, including Rules 16.1 and 16.2 of those Rules. The arbitrator’s decision shall be final, binding, and non-appealable. Judgment upon the award may be entered and enforced in any court having jurisdiction. Neither party shall sue the other party other than as provided herein or for enforcement of this clause or of the arbitrator’s award; any such suit may be brought only in a Federal District Court or a Texas state court located in Tarrant County, Texas. The arbitrator, and not any federal, state, or local court, shall have exclusive authority to resolve any dispute relating to the interpretation, applicability, unconscionability, arbitrability, enforceability, or formation of this Agreement including any claim that all or any part of the Agreement is void or voidable.  If for any reason a claim proceeds in court rather than in arbitration we and you waive any right to a jury trial. Notwithstanding the foregoing we and you both agree that you or we may bring suit in court to enjoin infringement or other misuse of intellectual property rights.

11.1.2 If you are located in the United Kingdom: This agreement and any dispute or claim (including non-contractual disputes or claims) arising out of or in connection with it or its subject matter or formation shall be governed by and construed in accordance with the law of England and Wales. Any dispute, claim or controversy relating in any way to this Agreement, the Offerings, your use of the Offerings, or to any products or services licensed or distributed by us will be resolved by binding arbitration as provided in this clause. Prior to commencing any formal arbitration proceedings, parties shall first seek settlement of any claim by mediation in accordance with the LCIA Mediation Rules, which Rules are deemed to be incorporated by reference into this clause. If the dispute is not settled by mediation within 14 days of the commencement of the mediation, or such further period as the parties shall agree in writing, the dispute shall be referred to and finally resolved by arbitration under the LCIA Rules, which are deemed to be incorporated by reference into this clause. The language to be used in the mediation and in the arbitration shall be English. The seat or legal place of arbitration shall be London.

11.1.3 If you are located in any territory that is not specifically enumerated in Sections 11.1.1 or 11.1.2, you may elect for either of Section 11.1.1 or 11.1.2 to apply to you, otherwise this Agreement and any Claim (including non-contractual disputes or claims) arising out of or in connection with it or its subject matter or formation shall be governed by and construed in accordance with the law of Ireland. Any Claim relating in any way to this Agreement, the Offerings, your use of the Offerings, or to any products or services licensed or distributed by us will be resolved by binding arbitration as provided in this clause. Prior to commencing any formal arbitration proceedings, parties shall first seek settlement of any claim by mediation in accordance with the LCIA Mediation Rules, which Rules are deemed to be incorporated by reference into this clause. If the dispute is not settled by mediation within 14 days of the commencement of the mediation, or such further period as the parties shall agree in writing, the Claim shall be referred to and finally resolved by arbitration under the LCIA Rules, which are deemed to be incorporated by reference into this clause. The language to be used in the mediation and in the arbitration shall be English. The seat or legal place of arbitration shall be Dublin, Ireland.

11.2 Class Action Waiver. YOU AND WE AGREE THAT EACH MAY BRING CLAIMS AGAINST THE OTHER ONLY ON AN INDIVIDUAL BASIS, AND NOT AS A PLAINTIFF OR CLASS MEMBER IN ANY PURPORTED CLASS OR REPRESENTATIVE PROCEEDING. YOU AND WE EXPRESSLY WAIVE ANY RIGHT TO FILE A CLASS ACTION OR SEEK RELIEF ON A CLASS BASIS. Unless both you and we agree, no arbitrator or judge may consolidate more than one person’s claims or otherwise preside over any form of a representative or class proceeding. The arbitrator may award injunctive relief only in favor of the individual party seeking relief and only to the extent necessary to provide relief warranted by that party’s individual claim. If a court decides that applicable law precludes enforcement of any of this paragraph’s limitations as to a particular claim for relief, then that claim (and only that claim) must be severed from the arbitration and may be brought in court. If any court or arbitrator determines that the class action waiver set forth in this paragraph is void or unenforceable for any reason or that an arbitration can proceed on a class basis, then the arbitration provision set forth above shall be deemed null and void in its entirety and the parties shall be deemed to have not agreed to arbitrate disputes.

11.3 30-Day Right to Opt Out. You have the right to opt-out and not be bound by the arbitration and class action waiver provisions set forth above by sending written notice of your decision to opt-out to the email address [email protected] with subject line LEGAL OPT OUT. The notice must be sent within 30 days of your first use of the Offerings, otherwise you shall be bound to arbitrate disputes and will be deemed to have agreed to waive any right to pursue a class action in accordance with the terms of those paragraphs. If you opt-out of these provisions, we will also not be bound by them.

12. Miscellaneous.

12.1 Assignment. You will not assign or otherwise transfer this Agreement or any of your rights and obligations under this Agreement, without our prior written consent. Any assignment or transfer in violation of this Section 12.1 will be void. We may assign this Agreement without your consent (a) in connection with a merger, acquisition or sale of all or substantially all of our assets, or (b) to any Affiliate or as part of a corporate reorganization; and effective upon such assignment, the assignee is deemed substituted for us as a party to this Agreement and we are fully released from all of our obligations and duties to perform under this Agreement. Subject to the foregoing, this Agreement will be binding upon, and inure to the benefit of the parties and their respective permitted successors and assigns.

12.2 DAOs. As a blockchain native company, we may interact with and provide certain Offerings to DAOs. Due to the unique nature of DAOs, to the extent the DAO votes in favor of and/or accepts such Offerings from Consensys, the DAO has acknowledged and agreed to these Terms in their entirety.

12.3 Entire Agreement and Modifications. This Agreement incorporates the Policies by reference and is the entire agreement between you and us regarding the subject matter of this Agreement. If the terms of this document are inconsistent with the terms contained in any Policy, the terms contained in this document will control. Any modification to the terms of this Agreement may only be made in writing.

12.4 Force Majeure. Neither party nor their respective affiliates will be liable for any delay or failure to perform any obligation under this Agreement where the delay or failure results from any cause beyond such party’s reasonable control, including but not limited to acts of God, utilities or other telecommunications failures, cyber attacks, earthquake, storms or other elements of nature, pandemics, blockages, embargoes, riots, acts or orders of government, acts of terrorism, or war.

12.5 Export and Sanctions Compliance. In connection with this Agreement, you will comply with all applicable import, re-import, sanctions, anti-boycott, export, and re-export control laws and regulations, including all such laws and regulations that prohibit certain transactions. For clarity, you are solely responsible for compliance related to the manner in which you choose to use the Offerings. You may not use any Offering if you are the subject of U.S. sanctions or of sanctions consistent with U.S. law imposed by the governments of the country where you are using the Offering.

12.6 Independent Contractors; Non-Exclusive Rights. We and you are independent contractors, and this Agreement will not be construed to create a partnership, joint venture, agency, or employment relationship. Neither party, nor any of their respective affiliates, is an agent of the other for any purpose or has the authority to bind the other. Both parties reserve the right (a) to develop or have developed for it products, services, concepts, systems, or techniques that are similar to or compete with the products, services, concepts, systems, or techniques developed or contemplated by the other party, and (b) to assist third party developers or systems integrators who may offer products or services which compete with the other party’s products or services.

12.7 Eligibility. If you are under the age of majority in your jurisdiction of residence, you may use the Site or Offerings only with the consent of or under the supervision of your parent or legal guardian.

NOTICE TO PARENTS AND GUARDIANS: By granting your minor permission to access the Site or Offerings, you agree to these Terms of Use on behalf of your minor. You are responsible for exercising supervision over your minor’s online activities. If you do not agree to these Terms of Use, do not let your minor use the Site or Offerings.

12.8 Language. All communications and notices made or given pursuant to this Agreement must be in the English language. If we provide a translation of the English language version of this Agreement, the English language version of the Agreement will control if there is any conflict.

12.9 Notice.

(a) To You. We may provide any notice to you under this Agreement using commercially reasonable means, including: (i) posting a notice on the Site; (ii) sending a message to the email address then associated with your account; (iii) posting the notice in the interface of the applicable Offering; or (iv) using public communication channels. Notices we provide by posting on the Site or using public communication channels will be effective upon posting, and notices we provide by email will be effective when we send the email. It is your responsibility to keep your email address current to the extent you have an account. You will be deemed to have received any email sent to the email address then associated with your account when we send the email, whether or not you actually receive the email.

(b) To Us. To give us notice under this Agreement, you must contact us by email at [email protected]

12.10 No Third-Party Beneficiaries. Except as otherwise set forth herein, this Agreement does not create any third-party beneficiary rights in any individual or entity that is not a party to this Agreement.

12.11 No Waivers. The failure by us to enforce any provision of this Agreement will not constitute a present or future waiver of such provision nor limit our right to enforce such provision at a later time. All waivers by us must be in writing to be effective.

12.12 Severability. If any portion of this Agreement is held to be invalid or unenforceable, the remaining portions of this Agreement will remain in full force and effect. Any invalid or unenforceable portions will be interpreted to effect and intent of the original portion. If such construction is not possible, the invalid or unenforceable portion will be severed from this Agreement but the rest of the Agreement will remain in full force and effect.

12.13 Notice and Procedure for Making Claims of Copyright Infringement. If you are a copyright owner or agent of the owner, and you believe that your copyright or the copyright of a person on whose behalf you are authorized to act has been infringed, please provide us a written notice at the address below with the following information:

  1. an electronic or physical signature of the person authorized to act on behalf of the owner of the copyright or other intellectual property interest;
  2. a description of the copyrighted work or other intellectual property that you claim has been infringed;
  3. a description of where the material that you claim is infringing is located with respect to the Offerings;
  4. your address, telephone number, and email address;
  5. a statement by you that you have a good faith belief that the disputed use is not authorized by the copyright owner, its agent, or the law;
  6. a statement by you, made under penalty of perjury, that the above information in your notice is accurate and that you are the copyright or intellectual property owner or authorized to act on the copyright or intellectual property owner’s behalf.

You can reach us at:

Email: [email protected]

Subject Line: Copyright Notification Mail

Attention: Copyright ℅

Consensys Software Inc. 

5049 Edwards Ranch Road, Fort Worth, TX  76109

13. Definitions.

“Acceptable Use Policy” means the policy set forth below, as it may be updated by us from time to time. You agree not to, and not to allow third parties to, use the Offerings:

  1. to violate, or encourage the violation of, the legal rights of others (for example, this may include allowing End Users to infringe or misappropriate the intellectual property rights of others in violation of the Digital Millennium Copyright Act);
  2. to engage in, promote or encourage any illegal or infringing content;
  3. for any unlawful, invasive, infringing, defamatory or fraudulent purpose (for example, this may include phishing, creating a pyramid scheme or mirroring a website);
  4. to intentionally distribute viruses, worms, Trojan horses, corrupted files, hoaxes, or other items of a destructive or deceptive nature;
  5. to interfere with the use of the Offerings, or the equipment used to provide the Offerings, by customers, authorized resellers, or other authorized users;
  6. to disable, interfere with or circumvent any aspect of the Offerings (for example, any thresholds or limits);
  7. to generate, distribute, publish or facilitate unsolicited mass email, promotions, advertising or other solicitation; or
  8. to use the Offerings, or any interfaces provided with the Offerings, to access any other product or service in a manner that violates the terms of service of such other product or service.

“API” means an application program interface.

“API Requests” has the meaning set forth in Section 5.3.

“Applicable Threshold” has the meaning set forth in Section 4.2.

“Base Fees” has the meaning set forth in Section 4.2.

“Content” means any data, text, audio, video or images, software (including machine images), and any documentation.

“DAO” means Decentralized Autonomous Organization.

“End User” means any individual or entity that directly or indirectly through another user: (a) accesses or uses Your Content; or (b) otherwise accesses or uses the Offerings under your account. 

“Fees” has the meaning set forth in Section 4.2.

“Losses” means any claims, damages, losses, liabilities, costs, and expenses (including reasonable attorneys’ fees).’

“Our Content” means any software (including machine images), data, text, audio, video, images, or documentation that we offer in connection with the Offerings. 

“Our Marks” means any trademarks, service marks, service or trade names, logos, and other designations of Consensys Software Inc. and their affiliates or licensors that we may make available to you in connection with this Agreement.

“Order” means an order for Offerings executed through an order form directly with Consensys, or through a cloud vendor, such as Amazon Web Services, Microsoft Azure, or Google Cloud.

“Offerings” means each of the products and services, including but not limited to Codefi, Infura, MetaMask, Quorum and any other features, tools, materials, or services offered from time to time, by us or our affiliates. 

“Policies” means the Acceptable Use Policy, Privacy Policy, any supplemental policies or addendums applicable to any Service as provided to you, and any other policy or terms referenced in or incorporated into this Agreement, each as may be updated by us from time to time.

“Privacy Policy” means the privacy policy located at https://consensys.net/privacy-policy (and any successor or related locations designated by us), as it may be updated by us from time to time.

“Service Offerings” means the Services (including associated APIs), Our Content, Our Marks, and any other product or service provided by us under this Agreement. Service Offerings do not include Third-Party Content or Third-Party Services.

“Suggestions” means all suggested improvements to the Service Offerings that you provide to us..

“Term” means the term of this Agreement described in Section 6.1.

“Termination Date” means the effective date of termination provided in accordance with Section 6, in a notice from one party to the other.

“Third-Party Content” means Content made available to you by any third party on the Site or in conjunction with the Offerings.

“Your Content” means content that you or any End User transfers to us for storage or hosting by the Offerings and any computational results that you or any End User derive from the foregoing through your use of the Offerings, excluding however any information submitted to a blockchain protocol for processing.

 

ConsenSys Responds to Discussion Paper by the French Central Bank

https://consensys.net/blog/news/consensys-responds-to-discussion-paper-by-the-french-central-bank/

ConsenSys Software Inc. respectfully submitted a letter in response to the discussion paper by ACPR, a division of the Banque de France, concerning decentralized finance (DeFi) published in April 2023. We are encouraged that they are consulting the crypto ecosystem on these novel and complex issues. As an initial matter, we generally agree with their “disintermediation” framing of the programmable blockchain space and welcome the opportunity to discuss further with them about the innovation in the programmable blockchain ecosystem. It’s important that blockchain native projects take the opportunity to collaborate on the important task of bolstering innovation while mitigating the risks that new technologies may present. Below are several of our responses to their questions.

You can download the full response in pdf here.

Do you have any comments on the definition of DeFi used in the paper? Does the document correctly reflect the real level of decentralization of services?

We agree that the essence of DeFi is replacing the trust between players with the transparency and immutability of computer code, and that this code serves to disintermediate transactions that have traditionally required an intermediary. We also agree that many projects currently remain reliant on project founders, with some intent to eventually decentralize. With legitimate efforts to decentralize, it is critical that regulatory regimes do not construct barriers that explicitly require or practically result in centralization.

Do you have any comments on the description of the risks related to the application layer of DeFi?

We agree that open-source smart contract code, which allows all nefarious actors the opportunity to expose and take advantage of vulnerabilities, ultimately results in more secure applications over time. We further agree that composability is a trade-off, namely that smart contracts calling other smart contracts can greatly increase what transactions are possible but also can proliferate buggy or malicious code if precautions are not taken.  

We recognize the importance that data availability plays in DeFi and the crucial role of oracles in that process. Despite their infancy, oracles have proven remarkably efficient and reliable to date, while risks certainly remain. General understanding of oracles and their risks should improve throughout the crypto ecosystem and among policymakers if the proper policies are to be fashioned.

Do you have any comments on the identification of DeFi risks for retail customers?

Everyday users of DeFi applications would be best served by reliable, coherent, and informative disclosures about how a particular protocol works and risks attendant to its use. These would be more easily implemented and policed, and far more effective, than explicit restrictions on the type of transactions in which specific users are permitted to engage.

Do you have any comments on the description of the potential AML/CFT risks of DeFi?

We agree that pseudonymous blockchains do not provide anonymity, as is widely believed. We recognize that illicit activity on-chain, while not remotely comparable in volume or frequency to illicit activity in traditional finance, is a serious matter that requires both public policy and technical solutions to address. We note that the traceability of blockchain transactions has been a boon to law enforcement in their efforts to identify illicit behavior on-chain, but they must use this tool in a way that does not unduly sacrifice the privacy of lawful users, who represent the overwhelming majority of DeFi participants.

Should public blockchains be governed by a framework or by minimum security standards?

Regulating public blockchains by way of implementing certain minimum standards would not achieve the desired security outcomes and would come at the cost of greatly restricting innovation. Additionally, the practical difficulties of imposing jurisdictionally-determined standards on otherwise global ecosystems should not be ignored and would render any such framework either ineffective or, worse, counterproductive.

Like the approach taken with the broader internet, and communication channels more generally, regulation should not focus on the underlying blockchain technology infrastructure, but on commercial applications built on blockchains. The best approach to ensure reliable, secure, and resilient blockchains is to encourage software development, diversity of software offerings, and organic incentive structures.

Should public players directly manage the blockchains that provide the infrastructure for DeFi operations?

Having a centrally managed blockchain defeats the purpose of a distributed ledger and the data integrity, accessibility, and ownership that comes from distributing the data updating and maintenance function and placing ownership in the hands of users, nor providers. Such a framework would completely undermine a blockchain’s central purpose, resulting in a more complex system that can be much less efficient than a hub-and-spoke model while not providing any real benefit. A government-supervised blockchain network is unlikely to be able to compete with any alternative that operates under and evolves according to market forces.

Policymakers could, of course, create and manage a blockchain and assess for themselves how successful they might be if they put this strategy into action on a grander scale. Alternatively, policymakers could begin participating in public blockchains like Ethereum now, and test whether participating in such a system rather than attempting to run an independent one is a better approach.

Is a certification mechanism an effective solution to determine the scope of “safe” smart contracts (for a given state of knowledge)?

At ConsenSys, we believe in the value of auditing smart contracts and have built a successful line of business around that belief. We have seen first hand the positive impact that proofing and auditing can have on end users of applications. We also recognize that auditing is a finite supply service and can be beyond the reach of some projects, at least initially, or simply be out of reach due to very high demand.  

We are not in favor of requiring all smart contracts, regardless of use case, being subject to such certification requirements, nor are we supportive that all developers should be required to get one. What we would never be able to support is a regime that purports to limit the deployment and use of free, open source contracts that are akin to free, open source software that is liberally licensed and accessible on a public code repository. Any regulation that would have the effect of, let alone seek to, chill the development and deployment of freely usable software tools would be very negatively received by the public and particularly the software developer ecosystem, and rightly so. 

Who should set the security standards for smart contracts and why?

While regulators and policymakers can play an important role as collaborator in any process, the best result would be achieved if the ecosystem itself established any and all technical standards that would come to form one or more ecosystem-wide benchmarks. The participants in the space have the highest technical expertise and the most practical experience with the subject matter and are thus in a far greater position to set standards. The best role for regulators in such a scenario is to collaborate on a road map and to facilitate ecosystem participation and cooperation in such an effort.

Do you have any comments on the description made of the risks inherent in the decentralized oracle model?

We note at the outset that the risks outlined in the discussion paper regarding decentralized oracles, namely the risk of collusion, incentive to tamper, and risks of a highly automated system, are also risks that a centralized oracle presents, and even perhaps to a more troubling degree.

Setting that aside, the problem with obligating oracle providers to comply with a certification system, at least at the current moment, is that oracle technology is still in its infancy. With that said, oracles can be seen in some sense as an intermediary, ones that connect real-world information with blockchain data structures. Their reliability, accuracy, and transparency are crucial. Policymakers should become very familiar with these protocols, and expect that, if regulation of these information providers is indeed necessary, the path to implementing regulation should be incremental and involve considerable collaboration with the space.

What requirements should apply to intermediaries facilitating access to DeFi?

Any regulatory requirements should be limited to those services that do more than serve as purpose-agnostic tools that allow users to safeguard their own data and conduct transactions on their own. Just as it would be entirely inappropriate and overly burdensome to require web browsers like Chrome and Safari to screen, monitor, advise, and warn their users for all manner of dangers as they browsed the web, it would be unreasonable to place requirements on open source software tools to do the same in the context of a blockchain network.

Should the same rules apply to all intermediaries in DeFi (including, where appropriate, decentralised web interfaces)?

Web interfaces, such as unhosted wallets, are not intermediaries in DeFi. They are software tools that the users of DeFi (those actually moving their own funds and interacting with the on-chain smart contracts) use on their own to compose their transactions, read the data structure, and send signed transaction messages to the blockchain.  

As the discussion paper itself recognizes, DeFi can be thought of as disintermediated finance, where the traditional counterparty or middle man is replaced by a system which offers you access to code that you can use on your own to execute transactions for yourself. That purpose-agnostic software makes this system more accessible to people who are not comfortable using a command line interface does not render that software package an intermediary in any sense. 

To the extent that some interfaces offer other services, including information aggregation or curation, or access to off-chain computer programs that facilitate on-chain transactions, a one-size fits all approach to rules makes very little sense, given the variability in what the services are and how they impact the user.

ConsenSys Partners with Web3 Labs for Quorum Support

https://consensys.net/blog/news/consensys-partners-with-web3-labs-for-quorum-support/

ConsenSys has partnered with Web3 Labs to ensure enterprise support for Quorum and Hyperledger Besu is ongoing. As we sharpen our focus on core value drivers, we’re pleased to have an industry-leading partner to offer enterprise support for Quorum and Hyperledger Besu. 

Enterprise interest in Ethereum as a platform for transparently managing digital assets has never been stronger. Post-Merge, the Ethereum ecosystem is on the cusp of delivering significant scalability improvements at both Layer 1 and Layer 2, opening new opportunities for businesses to explore blockchain. Against this backdrop, new approaches will inevitably emerge to meet the constellation of needs from both web2 and web3 companies, but for many regulated customers, the value of private-permissioned networks remains strong. 

Web3 Labs is a leading blockchain strategy and technology company specialising in decentralised financial infrastructure solutions, providing commercial support for enterprise Hyperledger Besu and Quorum networks. Their Sirato platform provides data and analytics for blockchains, providing realtime and historical insights to your network.

Web3 Labs offers: 

  • Production grade SLA – multiple tiers of support designed to meet your unique needs from development to production. 
  • Direct line to engineers – no raising issues on GitHub, communicate directly with engineers on the platform most conducive to your business. 
  • Personalized support – streamline deployments, resolve issues, and help your technology strategy evolve to meet your business needs. 
  • Long-term support – ongoing support and maintenance aligned with your release cycles for Quorum and Hyperledger Besu. 

To get in touch with the Web3Labs team, reach out at [email protected] 

ConsenSys Partners With Sports Illustrated Tickets To Launch ‘Box Office’

https://consensys.net/blog/press-release/consensys-partners-with-sports-illustrated-tickets-to-launch-box-office/

New York, NY, – May 2, 2023 SI Tickets, the fan-first ticketing site from Sports Illustrated, today announced the launch of “Box Office by SI Tickets,” an innovative, self-service event management and primary ticketing solution built in partnership with web3 leader ConsenSys and powered by Polygon’s blockchain technology. Box Office is the first global platform to combine a complete NFT ticket solution for events of any size with visibility and adjacency to traditional, non-NFT tickets alongside the biggest in sports, concert and theater on the SI Tickets marketplace.

Box Office delivers a seamless, turnkey experience that gives owners, organizers and hosts the ability to create, manage and promote a fully scalable, paid or free ticketed live sporting event, performance or function fueled by the trusted Sports Illustrated Tickets platform.

As part of Box Office, SI Tickets and ConsenSys are partnering to debut the all-new Super Ticket™, an NFT ticket solution that empowers event hosts to remain connected to their attendees like never before. Through highlights, collectibles, exclusive offers, loyalty benefits, and more, the Super Ticket™ unlocks engagement opportunities between hosts and attendees before, during, and after events.  

“From the moment we launched our global event marketplace, which now boasts 50 million tickets to over 250,000 sports, concerts and shows, we have been preparing to enter and disrupt the primary ticket market,” said David Lane, CEO, SI Tickets. “Blockchain is the future of ticketing, and now owners, promoters, hosts and attendees have access to an advanced ticketing experience that transforms the antiquated barcode into engaging and collectible content.

“We are excited about powering the Sports Illustrated Tickets Box Office with our web3 tools and infrastructure. It is thrilling to see disruptive web3 technology gaining traction through new use cases like NFT ticketing,” said Johnna Powell, Global Co-head at ConsenSys NFT. “We believe the partnership with SI Tickets will make it easier for owners, promoters, and facilitators to create a fan experience that reaches previously unseen levels of engagement.”

Additionally, Box Office benefits partners with pricing that’s up to 50 percent lower than the competition and the ability for hosts and/or performers to earn a share of resale revenues. Every ticket purchased receives free credits toward any sports, concerts and theater on SITickets.com.

“The existing self-service event management sites haven’t evolved fast enough, as they can only list events and provide software to scan a barcode,” continued Lane. “With Box Office, games, shows and conferences of all sizes can now achieve a superior and more cost-effective solution that includes unmatched visibility on a global marketplace, no hardware costs, free credits for their attendees and Sports Illustrated Tickets as their partner.”

Box Office by SI Tickets will team up with a wide variety of owners, organizers and vendors across sports, health and fitness; concerts, comedy and nightlife; industry functions; and philanthropy and faith. Currently, SI Tickets is launching with everything from youth football, basketball, hockey, cheer and dance competitions to fashion shows and live music bars.

“Blockchain technology offers significant benefits for consumers, particularly ticketing, including enhancing payment security, and eliminating scalping and fraud,” said Brian Trunzo, Head of Business Development, North America, for Polygon Labs. “Box Office is an important step towards further consumer adoption.”

Media Contact: [email protected]

About ConsenSys

ConsenSys is a leading Ethereum and decentralized protocols software company. We enable developers, enterprises, and people worldwide to build next-generation applications, launch modern financial infrastructure, and access the decentralized web. Our product suite, composed of Infura, Quorum, Codefi, MetaMask, MetaMask Institutional, Truffle, Diligence, and our NFT platform, serves millions of users, supports billions of blockchain-based queries for our clients, and has handled billions of dollars in digital assets. Ethereum is the largest programmable blockchain in the world, leading in business adoption, developer community, and DeFi activity. On this trusted, open-source foundation, we are building the digital economy of tomorrow. To explore our products and solutions, visit https://consensys.net/.

About SI Tickets

First launched in June 2021, SI Tickets by Sports Illustrated puts the fan experience first. In addition to charging zero ($0) transaction fees on any purchase, SI Tickets also guarantees a 100-percent refund if an event is canceled for any reason. The marketplace has over $2.5 billion of inventory and more than 50 million tickets to over 250,000 sports, concerts and theater productions. SI Tickets also operates Box Office, an innovative, self-service event management and blockchain-backed primary ticketing solution. Box Office is the first global platform to combine a complete NFT ticket solution for events of any size with visibility and adjacency to traditional, non-NFT tickets alongside the aforementioned SI Tickets marketplace.  

For more information, visit www.sitickets.com, or download the app on iOS and Android.

About Polygon Labs:

Polygon Labs develops Ethereum scaling solutions for Polygon protocols. Polygon Labs engages with other ecosystem developers to help make available scalable, affordable, secure and sustainable blockchain infrastructure for Web3. Polygon Labs has initially developed a growing suite of protocols for developers to gain easy access to major scaling solutions, including layer 2s (zero-knowledge rollups), sidechains, app-specific chains and data availability protocols. Scaling solutions that Polygon Labs initially developed have seen widespread adoption with tens of thousands of decentralized apps, unique addresses exceeding 235 million, over 1.28 million smart contracts created and 2.64 billion total transactions processed since inception. The existing Polygon network is home for some of the biggest Web3 projects, such as Aave, Uniswap, and OpenSea, and well-known enterprises, including Robinhood, Stripe and Adobe. Polygon Labs is carbon neutral with the goal of leading Web3 in becoming carbon negative. 

Privacy Policy

https://consensys.net/privacy-policy/

This privacy policy (“Policy”) describes how ConsenSys Software Inc. (“Company”, “we”, “our”, or “us”) collects, uses, shares, and stores personal information of users of its websites, https://consensys.net/, https://metamask.io/, https://infura.io/, https://consensys.net/quorum/https://diligence.consensys.net/ and https://codefi.consensys.net/  (the “Sites”). This Policy applies to the Sites, applications, products and services (collectively, “Services”) on or in which it is posted, linked, or referenced. 

By using the Services, you accept the terms of this Policy and our Terms of Use, and consent to our collection, use, disclosure, and retention of your information as described in this Policy.  If you have not done so already, please also review our terms of use. The terms of use contain provisions that limit our liability to you and require you to resolve any dispute with us on an individual basis and not as part of any class or representative action. IF YOU DO NOT AGREE WITH ANY PART OF THIS PRIVACY POLICY OR OUR TERMS OF USE, THEN PLEASE DO NOT USE ANY OF THE SERVICES.

 

WHAT WE COLLECT

We get information about you in a range of ways. 

Information You Give Us. Information we collect from you may include:

  • Identity information, such as your first name, last name, username or similar identifier, title, date of birth and gender;
  • Contact information, such as your postal address, email address and telephone number;
  • Profile information, such as your username and password, interests, preferences, feedback and survey responses;
  • Feedback and correspondence, such as information you provide in your responses to surveys, when you participate in market research activities, report a problem with Service, receive customer support or otherwise correspond with us;
  • Financial information, such as your credit card or other payment card details;
  • Transaction information, such details about purchases you make through the Service and billing details;
  • Usage information, such as information about how you use the Service and interact with us;
  • Marketing information, such as your preferences for receiving marketing communications and details about how you engage with them;
  • Financial information, such as bank account number and bank routing number; financial assets holdings; and
  • Technical information, such as your Ethereum wallet address, application programming interface (API)-key and network information regarding transactions.

Information collected by Infura when you use Infura as your default RPC provider in MetaMask. https://metamask.io/ (“MetaMask”) and https://infura.io/ (“Infura”) are both products offered by the Company and Infura is the default Remote Procedure Call (RPC) provider in MetaMask. When you use Infura as your default RPC provider in MetaMask, Infura will collect your IP address and your Ethereum wallet address when you send a transaction. However, if you’re using your own Ethereum node or a third party RPC provider with MetaMask, then neither Infura nor MetaMask will collect your IP address or Ethereum wallet address (but you should be aware your information will be subject to whatever information collection performed by the RPC provider you are using and their terms regarding such collection).

Further Information You Give Us In Relation to the Codefi Site and Codefi Services. Further information we collect from you in relation to https://codefi.consensys.net/ (the “Codefi Site”) and Codefi Services may include:

  • Further identity information, such as your country of birth, nationality, social security number, place of birth, employer and occupation;
  • Passport and/or photo ID for identity verification purposes; 
  • Information required to comply with anti-money laundering (AML) laws and know-your-customer (KYC) requirements (such as nationality and place of birth); 
  • Source of funds for participating in token launches; and
  • Information that you give us in relation to your purchased token holdings, such as earnings received from staking, and the number of tokens in your wallet.

Information We Get From Others. We may get information about you from other third party sources and we may add this to information we get from your use of the Services. Such information may include:

  • Registration using Single Sign-On Account: When registering some user accounts (e.g. with the Codefi Site), you also have the option of using a single sign-on account (“SSO”). With an SSO, you can sign up for various different services and platforms with a single account. Some of our Sites currently offer you the opportunity to use the SSO services offered by  Google, LLC, Amphitheatre Parkway, Mountain View, CA 94043, USA (“Google”). Google’s Privacy Policy and Terms of Use apply to the registration and use of the Google SSO service, see https://policies.google.com/privacy/. Please note that the registration for and the use of SSO services are subject to the Google privacy policy and terms of use, which are beyond our control.

Information Automatically Collected. We may automatically record certain information about how you use our Sites (we refer to this information as “Log Data“). Log Data may include information such as a user’s Internet Protocol (IP) address, device and browser type, operating system, the pages or features of our Sites to which a user browsed and the time spent on those pages or features, the frequency with which the Sites are used by a user, search terms, the links on our Sites that a user clicked on or used, and other statistics. We use this information to administer the Service and we analyze (and may engage third parties to analyze) this information to improve and enhance the Service by expanding its features and functionality and tailoring it to our users’ needs and preferences.

We may use cookies, local storage or similar technologies to analyze trends, administer the Sites, track users’ movements around the Sites, and to gather demographic information about our user base as a whole. Users can control the use of cookies and local storage at the individual browser level. For more information, please see our Cookies Policy.

We also may use Google Analytics to help us offer you an optimized user experience.  You can find more information about Google Analytics’ use of your personal data here: https://www.google.com/analytics/terms/us.html. Please note that Metamask does not use Google Analytics in its wallet.

We use Segment, an event tracking tool, in some of our Services in order to better understand how you are using the Sites. You can find more information about Segment’s use of your personal data here: https://segment.com/docs/legal/privacy/.

We also use Mixpanel in some of our Services in order to better understand how you are using the Sites. You can find more information about Mixpanel’s use of your personal data here: https://mixpanel.com/legal/privacy-policy/.

We use Hotjar in some of our Services in order to better understand our users’ needs and to optimize this service and experience. Hotjar is a technology service that helps us better understand our users experience (e.g. how much time they spend on which pages, which links they choose to click, what users do and don’t like, etc.) and this enables us to build and maintain our service with user feedback. Hotjar uses cookies and other technologies to collect data on our users’ behavior and their devices (in particular device’s IP address (captured and stored only in anonymized form), device screen size, device type (unique device identifiers), browser information, geographic location (country only), preferred language used to display our Sites). Hotjar stores this information in a pseudonymized user profile. Neither Hotjar nor we will ever use this information to identify individual users or to match it with further data on an individual user. For further details, please see Hotjar’s privacy policy by clicking on this link. Please note that Metamask does not use Hotjar.

Tracking Technologies Generally

Regular cookies may generally be disabled or removed by tools available as part of most commercial browsers, and in some instances blocked in the future by selecting certain settings. For more information, please see our Cookies Policy.

Google Analytics

You may exercise choices regarding the use of cookies from Google Analytics by going to https://tools.google.com/dlpage/gaoptout/ and downloading the Google Analytics Opt-out Browser Add-on.

 

COOKIES

You can set your browser to refuse all or some browser cookies, or to alert you when websites set or access cookies. If you disable or refuse cookies, please note that some parts of the Sites may become inaccessible or not function properly. For more information about the cookies we use, please see our Cookies Policy.

Information we will never collect. We will never ask you to share your private keys or wallet seed. Never trust anyone or any site that asks you to enter your private keys or wallet seed.

 

USE OF PERSONAL INFORMATION

To provide our service

We will use your personal information in the following ways:

  • To enable you to access and use the Services
  • To provide and deliver products and services that you may request.
  • To process and complete transactions, and send you related information, including purchase confirmations and invoices
  • To send information, including confirmations, technical notices, updates, security alerts, and support and administrative messages.

To comply with law

We use your personal information as we believe necessary or appropriate to comply with applicable laws (including anti-money laundering (AML) laws and know-your-customer (KYC) requirements), lawful requests and legal process, such as to respond to subpoenas or requests from government authorities.  

To communicate with you

We use your personal information to communicate about promotions, upcoming events, and other news about products and services offered by us and our selected partners.

To optimize our platform

In order to optimize your user experience, we may use your personal information to operate, maintain, and improve our Services. We may also use your information to respond to your comments and questions regarding the Services, and to provide you and other users with general customer service. 

With your consent

We may use or share your personal information with your consent, such as when you consent to let us post your testimonials or endorsements on our Sites, you instruct us to take a specific action with respect to your personal information, or you opt into third party marketing communications.

For compliance, fraud prevention, and safety

We may use your personal information to protect, investigate, and deter against fraudulent, unauthorized, or illegal activity.

 

SHARING OF PERSONAL INFORMATION

We do not share the personal information that you provide us with other organizations without your express consent, except as described in this Privacy Policy. We disclose personal information to third parties under the following circumstances:

  • Affiliates. We may disclose your personal information to our subsidiaries and corporate affiliates (i.e. our family of companies that are related by common ownership or control) for purposes consistent with this Privacy Policy.
  • Business Transfers. We may share personal information when we do a business deal, or negotiate a business deal, involving the sale or transfer of all or a part of our business or assets. These deals can include any merger, financing, acquisition, or bankruptcy transaction or proceeding.
  • Compliance with Laws and Law Enforcement; Protection and Safety. We may share personal information for legal, protection, and safety purposes.
    • We may share information to comply with laws, including KYC and AML requirements.
    • We may share information to respond to lawful requests and legal processes.
    • We may share information to protect the rights and property of the Company, our agents, customers, and others. This includes enforcing our agreements, policies, and terms of use.
    • We may share information in an emergency. This includes protecting the safety of our employees and agents, our customers, or any person.
  • Professional Advisors and Service Providers. We may share information with those who need it to do work for us. These recipients may include third party companies and individuals to administer and provide the Service on our behalf (such as bill and credit card payment processing, customer support, hosting, email delivery and database management services), as well as lawyers, bankers, auditors, and insurers.
  • Other. You may permit us to share your personal information with other companies or entities of your choosing. Those uses will be subject to the privacy policies of the recipient entity or entities.

We may also share aggregated and/or anonymized data with others for their own uses.

 

INTERNATIONAL TRANSFER

The Company has offices outside of the EU and has affiliates and service providers in the United States and in other countries. Your personal information may be transferred to or from the United States or other locations outside of your state, province, country or other governmental jurisdiction where privacy laws may not be as protective as those in your jurisdiction.

EU users should read the important information provided  below about transfer of personal information outside of the European Economic Area (EEA).

 

HOW INFORMATION IS SECURED 

We retain information we collect as long as it is necessary and relevant to fulfill the purposes outlined in this privacy policy. In addition, we retain personal information to comply with applicable law where required, prevent fraud, resolve disputes, troubleshoot problems, assist with any investigation, enforce our Terms of Use, and other actions permitted by law. To determine the appropriate retention period for personal information, we consider the amount, nature, and sensitivity of the personal information, the potential risk of harm from unauthorized use or disclosure of your personal information, the purposes for which we process your personal information and whether we can achieve those purposes through other means, and the applicable legal requirements.

In some circumstances we may anonymize your personal information (so that it can no longer be associated with you) in which case we may use this information indefinitely without further notice to you.

We employ industry standard security measures designed to protect the security of all information submitted through the Services. However, the security of information transmitted through the internet can never be guaranteed. We are not responsible for any interception or interruption of any communications through the internet or for changes to or losses of data. Users of the Services are responsible for maintaining the security of any password, biometrics, user ID or other form of authentication involved in obtaining access to password protected or secure areas of any of our digital services. In order to protect you and your data, we may suspend your use of any of the Services, without notice, pending an investigation, if any breach of security is suspected.

 

INFORMATION CHOICES AND CHANGES

Accessing, Updating, Correcting, and Deleting your Information

You may access information that you have voluntarily provided through your account on the Services, and to review, correct, or delete it by sending a request to [email protected] You can request to change contact choices, opt-out of our sharing with others, and update your personal information and preferences.

 

ELIGIBILITY

If you are under the age of majority in your jurisdiction of residence, you may use the Services only with the consent of or under the supervision of your parent or legal guardian. Consistent with the requirements of the Children’s Online Privacy Protection Act (COPPA), if we learn that we have received any information directly from a child under age 13 without first receiving his or her parent’s verified consent, we will use that information only to respond directly to that child (or his or her parent or legal guardian) to inform the child that he or she cannot use the Sites and subsequently we will delete that information.

 

MARKETING COMMUNICATIONS AND SHARING

You may instruct us not to use your contact information to contact you regarding services, promotions, surveys and special events that might appeal to your interests by contacting us using the information below. You can also opt out by following the instructions located at the bottom of any commercial emails messages you may receive.

Please note that, regardless of your request, we may still use and share certain information as permitted by applicable law. For example, you may not opt out of certain operational emails, such as those reflecting our relationship or transactions with you, or important notifications regarding the Services we are providing to you, such as service-related announcements (e.g., if our Services are temporarily suspended for maintenance).

Or, if you have downloaded our mobile application and enabled push notifications on your mobile device, we may send you alerts and notifications through push notifications, for example, to communicate status updates on our Services. However, you may choose to disable these notifications (except for the initial notification intended to verify your identity).

 

THIRD PARTY LINKS AND WEBSITES

This Privacy Notice does not address, and we are not responsible for, the privacy practices of any third parties, including those that operate websites to which our Sites link. The inclusion of a link on our Sites does not imply that we or our affiliates endorse the practices of the linked website. 

 

CO-BRANDED WEBSITES

In the event that our Sites link to other websites that include our branding, this Privacy Notice does not apply to those other websites. Visitors to those websites are advised to carefully read the notices on those individual websites.

 

CHANGES TO THIS PRIVACY POLICY

We may change this privacy policy at any time. We encourage you to periodically review this page for the latest information on our privacy practices. If we make any changes, we will change the Last Updated date above.

Any modifications to this Privacy Policy will be effective upon our posting of the new terms and/or upon implementation of the changes to the Sites (or as otherwise indicated at the time of posting). In all cases, your continued use of the Sites or Services after the posting of any modified Privacy Policy indicates your acceptance of the terms of the modified Privacy Policy.

 

DATA PROTECTION OFFICER

We have appointed a Data Protection Officer based on professional qualities and expert knowledge of data protection law and practices. The Data Protection Officer is tasked with ensuring that we always comply with our responsibilities under applicable data protection legislation.

Contact details of the Data Protection Officer:

Email: [email protected],

or write to the DPO:

FAO Data Protection Officer

ConsenSys Software Inc.

49 Bogart Street

NY 11206

USA

 

CONTACT US

We welcome your comments or questions about this Policy, and you may contact us at: 

Email: [email protected]

or write to us at:

ConsenSys Software Inc.

49 Bogart Street

NY 11206

USA

 

NOTICE TO CALIFORNIA RESIDENTS

Under California Civil Code Section 1789.3, California users are entitled to the following consumer rights notice: California residents may reach the Complaint Assistance Unit of the Division of Consumer Services of the California Department of Consumer Affairs by mail at 1625 North Market Blvd., Sacramento, CA 95834, or by telephone at (916) 445-1254 or (800) 952-5210.

This section provides additional details about the personal information we collect about California consumers and the rights afforded to them under the California Consumer Privacy Act or “CCPA.”

For more details about the personal information we collect from you, please see the “What We Collect” section above. We collect this information for the business and commercial purposes described in the “Use of Personal Information” section above. We share this information with the categories of third parties described in the “Sharing of Personal Information” section above. Company does not sell (as such term is defined in the CCPA) the personal information we collect (and will not sell it without providing a right to opt out). Please refer to our Cookies Policy for more information regarding the types of third-party cookies, if any, that we use.

Subject to certain limitations, the CCPA provides California consumers the right to request to know more details about the categories or specific pieces of personal information we collect (including how we use and disclose this information), to delete their personal information, to opt out of any “sales” that may be occurring, and to not be discriminated against for exercising these rights.

California consumers may make a request pursuant to their rights under the CCPA by contacting us at [email protected] Please note that you must verify your identity and request before further action is taken. As a part of this process, government identification may be required. Consistent with California law, you may designate an authorized agent to make a request on your behalf. In order to designate an authorized agent to make a request on your behalf, you must provide a valid power of attorney, the requester’s valid government issued identification, and the authorized agent’s valid government issued identification.

 

NOTICE TO EU DATA SUBJECTS

Personal Information

With respect to EU data subjects, “personal information,” as used in this Privacy Policy, is equivalent to “personal data” as defined in the European Union General Data Protection Regulation (GDPR). 

Sensitive Data

Some of the information you provide us may constitute sensitive data as defined in the GDPR (also referred to as special categories of personal data), including identification of your race or ethnicity on government-issued identification documents.

Legal Bases for Processing

We only use your personal information as permitted by law. We are required to inform you of the legal bases of our processing of your personal information, which are described in the table below. If you have questions about the legal bases under which we process your personal information, contact us at [email protected].

Processing PurposeLegal Basis
To provide our serviceOur processing of your personal information is necessary to perform the contract governing our provision of the Services or to take steps that you request prior to signing up for the Service.
To communicate with you

To optimize our platform

For compliance, fraud prevention, and safety

To provide our service

These processing activities constitute our legitimate interests. We make sure we consider and balance any potential impacts on you (both positive and negative) and your rights before we process your personal information for our legitimate interests. We do not use your personal information for activities where our interests are overridden by any adverse impact on you (unless we have your consent or are otherwise required or permitted to by law).
To comply with lawWe use your personal information to comply with applicable laws and our legal obligations, including anti-money laundering (AML) laws and know-your-customer (KYC) requirements.
With your consentWhere our use of your personal information is based upon your consent, you have the right to withdraw it anytime in the manner indicated in the Service or by contacting us at [email protected]

Use for New Purposes

We may use your personal information for reasons not described in this Privacy Policy, where we are permitted by law to do so and where the reason is compatible with the purpose for which we collected it. If we need to use your personal information for an unrelated purpose, we will notify you and explain the applicable legal basis for that use. If we have relied upon your consent for a particular use of your personal information, we will seek your consent for any unrelated purpose.

Your Rights

Under the GDPR, you have certain rights regarding your personal information. You may ask us to take the following actions in relation to your personal information that we hold:

  • Opt-out. Stop sending you direct marketing communications which you have previously consented to receive. We may continue to send you Service-related and other non-marketing communications.
  • Access. Provide you with information about our processing of your personal information and give you access to your personal information.
  • Correct. Update or correct inaccuracies in your personal information.
  • Delete. Delete your personal information.
  • Transfer. Transfer a machine-readable copy of your personal information to you or a third party of your choice.
  • Restrict. Restrict the processing of your personal information.
  • Object. Object to our reliance on our legitimate interests as the basis of our processing of your personal information that impacts your rights.

You can submit these requests by email to [email protected] We may request specific information from you to help us confirm your identity and process your request. Applicable law may require or permit us to decline your request. If we decline your request, we will tell you why, subject to legal restrictions. If you would like to submit a complaint about our use of your personal information or response to your requests regarding your personal information, you may contact us at [email protected] or submit a complaint to the data protection regulator in your jurisdiction. You can find your data protection regulator here.

Cross-Border Data Transfer

Please be aware that your personal data will be transferred to, processed, and stored in the United States. Data protection laws in the U.S. may be different from those in your country of residence. You consent to the transfer of your information, including personal information, to the U.S. as set forth in this Privacy Policy by visiting our Sites or using our service.

Whenever we transfer your personal information out of the EEA to the U.S. or countries not deemed by the European Commission to provide an adequate level of personal information protection, the transfer will be based on a data transfer mechanism recognized by the European Commission as providing adequate protection for personal information.

Please contact us if you want further information on the specific mechanism used by us when transferring your personal information out of the EEA.

Terms of Use

https://consensys.net/terms-of-use/

IMPORTANT NOTICE: THIS AGREEMENT IS SUBJECT TO BINDING ARBITRATION AND A WAIVER OF CLASS ACTION RIGHTS AS DETAILED IN SECTION 11. PLEASE READ THE AGREEMENT CAREFULLY.

ConsenSys Software Inc. (“ConsenSys,” “we,” “us,” or “our”) is the leading blockchain software development company. With a focus on utilizing decentralized technologies, such as Ethereum, our software is powering a revolution in commerce and finance and helping to optimize business processes. ConsenSys hosts a top level domain website, www.consensys.net, that serves information regarding ConsenSys and our Offerings, as defined below, as well as sub-domains for our products or services (the top level domain with the sub-domains collectively referred to as the “Site”), which include text, images, audio, code and other materials or third party information. 

These Terms of Use (the “Terms,” “Terms of Use” or “Agreement”) contain the terms and conditions that govern your access to and use of the Site and Offerings provided by us and is an agreement between us and you or the entity you represent (“you” or “your”). Please read these Terms of Use carefully before using the Site or Offerings. By using the Site, clicking a button or checkbox to accept or agree to these Terms where that option is made available, clicking a button to use or access any of the Offerings, completing an Order, or,  if earlier, using or otherwise accessing the Offerings (the date on which any of the events listed above occur being the “Effective Date”), you (1) accept and agree to these Terms and any additional terms, rules and conditions of participation issued by ConsenSys from time to time and (2) consent to the collection, use, disclosure and other handling of information as described in our Privacy Policy. If you do not agree to the Terms or perform any and all obligations you accept under the Terms, then you may not access or use the Offerings. 

You represent to us that you are lawfully able to enter into contracts. If you are entering into this Agreement for an entity, such as the company you work for, you represent to us that you have legal authority to bind that entity. Please see Section 13 for definitions of certain capitalized terms used in this Agreement.

In addition, you represent to us that you and your financial institutions, or any party that owns or controls you or your financial institutions, are (1) not subject to sanctions or otherwise designated on any list of prohibited or restricted parties, including but not limited to the lists maintained by the United Nations Security Council, the U.S. Government (i.e., the Specially Designated Nationals List and Foreign Sanctions Evaders List of the U.S. Department of Treasury and the Entity List of the U.S. Department of Commerce), the European Union or its Member States, or other applicable government authority and (2) not located in any country subject to a comprehensive sanctions program implemented by the United States.

1. The Offerings.

1.1 Generally. You may access and use the Offerings in accordance with this Agreement. You agree to comply with the terms of this Agreement and all laws, rules and regulations applicable to your use of the Offerings.

1.2 Offerings and Access. ConsenSys offers a number of products and services, each an “Offering”, under the ConsenSys brand or brands owned by us. These include Codefi, Quorum, Infura, MetaMask and others. Offerings are generally accessed through the Site or through a third party provider of which we approved, such as the Google Play or Apple App Store, unless otherwise agreed in writing. Some Offerings may require you to create an account, enter a valid form of payment, and select a paid plan (a “Paid Plan”), or initiate an Order. 

1.3 Third-Party Content. In certain Offerings, Third-Party Content may be used by you at your election. Third-Party Content is governed by this Agreement and, if applicable, separate terms and conditions accompanying such Third-Party Content, which terms and conditions may include separate fees and charges.

1.4 Third-Party Offerings. When you use our Offerings, you may also be using the products or services of one or more third parties. Your use of these third party offerings may be subject to the separate policies, terms of use, and fees of these third parties.

2. Changes.

2.1 To the Offerings. We may change or discontinue any or all of the Offerings or change or remove functionality of any or all of the Offerings from time to time. We will use commercially reasonable efforts to communicate to you any material change or discontinuation of an Offering through the Site or public communication channels.  If you are on a Paid Plan, we will use commercially reasonable efforts to communicate to you  any material changes to or discontinuation of the Offering at least 30 days in advance of such change, and we will use commercially reasonable efforts to continue supporting the previous version of the Offering for up to three months after the change or discontinuation, except if doing so (a) would pose an information security or intellectual property issue, (b) is economically or technically burdensome, or (c) would create undue risk of us violating the law.

2.2 To this Agreement. We reserve the right, at our sole discretion, to modify or replace any part of this Agreement or any Policies at any time. It is your responsibility to check this Agreement periodically for changes, but we will also use commercially reasonable efforts to communicate any material changes to this Agreement through the Site or other public channels. Your continued use of or access to the Offerings following the posting of any changes to this Agreement constitutes acceptance of those changes.

3. Your Responsibilities.

3.1 Your Accounts.  For those Offerings that require an account, and except to the extent caused by our breach of this Agreement, (a) you are responsible for all activities that occur under your account, regardless of whether the activities are authorized by you or undertaken by you, your employees or a third party (including your contractors, agents or other End Users), and (b) we and our affiliates are not responsible for unauthorized access to your account, including any access that occurred as a result of fraud, phishing, or other criminal activity perpetrated by third parties.  

3.2 Your Use. You are responsible for all activities that occur through your use of those Offerings that do not require an account, except to the extent caused by our breach of this Agreement, regardless of whether the activities are authorized by you or undertaken by you, your employees or a third party (including your contractors, agents or other End Users).  We and our affiliates are not responsible for unauthorized access that may occur during your use of the Offerings, including any access that occurred as a result of fraud, phishing, or other criminal activity perpetrated by third parties.  You will ensure that your use of the Offerings does not violate any applicable law.  

3.3 Your Security and Backup. You are solely responsible for properly configuring and using the Offerings and otherwise taking appropriate action to secure, protect and backup your accounts and/or Your Content in a manner that will provide appropriate security and protection, which might include use of encryption.  This includes your obligation under this Agreement to record and securely maintain any passwords or backup security phrases (i.e. “seed” phrases) that relate to your use of the Offerings. You acknowledge that you will not share with us nor any other third party any password or backup/seed phrase that relates to your use of the Offerings, and that we will not be held responsible if you do share any such phrase or password.

3.4 Log-In Credentials and API Authentication. To the extent we provide you with log-in credentials and API authentication generated by the Offerings, such log-in credentials and API authentication are for your use only and you will not sell, transfer or sublicense them to any other entity or person, except that you may disclose your password or private key to your agents and subcontractors performing work on your behalf.

3.5 Applicability to MetaMask Offerings. For the avoidance of doubt, the terms of this Section 3 are applicable to all Offerings, including MetaMask and any accounts you create through MetaMask with Third Party Offerings, such as decentralized applications, or blockchain-based accounts themselves.

4. Fees and Payment.

4.1 Publicly Available Offerings. Some Offerings may be offered to the public and licensed on a royalty free basis, including Offerings that require a Paid Plan for software licensing fees above a certain threshold of use. 

4.2 Offering Fees.  If your use of an Offering does not require an Order or Paid Plan but software licensing fees are charged contemporaneously with your use of the Offering, those fees will be charged as described on the Site or in the user interface of the Offering.  Such fees may be calculated by combining a fee charged by us and a fee charged by a Third Party Offering that provides certain functionality related to the Offering.  For those Offerings which entail an Order or Paid Plan, we calculate and bill fees and charges according to your Order or Paid Plan. For such Offerings, on the first day of each billing period, you will pay us the applicable fees (the “Base Fees”) and any applicable taxes based on the Offerings in the Paid Plan. In addition, we may, for particular Orders, issue an invoice to you for all charges above the applicable threshold for your Paid Plan which constitute overage fees for the previous billing period. If you make any other changes to the Offerings during a billing period (e.g. upgrading or downgrading your Paid Plan), we will apply any additional charges or credits to the next billing period. We may bill you more frequently for fees accrued at our discretion upon notice to you.  You will pay all fees in U.S. dollars unless the particular Offering specifies a different form of payment or otherwise agreed to in writing. All amounts payable by you under this Agreement will be paid to us without setoff or counterclaim, and without any deduction or withholding. Fees and charges for any new Offering or new feature of an Offering will be effective when we use commercially reasonable efforts to communicate updated fees and charges through our Site or other public channels or, if you are on a Paid Plan, upon commercially reasonable efforts to notify you, unless we expressly state otherwise in a notice. We may increase or add new fees and charges for any existing Offerings you are using by using commercially reasonable efforts to notify users of the Offerings through our Site or other public channels or, if you are on a Paid Plan, by giving you at least 30 days’ prior notice.  Unless otherwise specified in an Order, if you are on a Paid Plan, all amounts due under this Agreement are payable within thirty (30) days following receipt of your invoice.  We may elect to charge you interest at the rate of 1.5% per month (or the highest rate permitted by law, if less) on all late payments.

4.3 Taxes. Each party will be responsible, as required under applicable law, for identifying and paying all taxes and other governmental fees and charges (and any penalties, interest, and other additions thereto) that are imposed on that party upon or with respect to the transactions and payments under this Agreement. All fees payable by you are exclusive taxes unless otherwise noted. We reserve the right to withhold taxes where required.

5. Temporary Suspension; Limiting API Requests.

5.1 Generally. We may suspend your right to access or use any portion or all of the Offerings immediately if we determine:

(a) your use of the Offerings (i) poses a security risk to the Offerings or any third party, (ii) could adversely impact our systems, the Offerings or the systems of any other user, (iii) could subject us, our affiliates, or any third party to liability, or (iv) could be unlawful;

(b) you are, or any End User is, in breach of this Agreement;

(c) you are in breach of your payment obligations under Section 4 and such breach continues for 30 days or longer; or

(d) for entities, you have ceased to operate in the ordinary course, made an assignment for the benefit of creditors or similar disposition of your assets, or become the subject of any bankruptcy, reorganization, liquidation, dissolution or similar proceeding.

5.2 Effect of Suspension. If we suspend your right to access or use any portion or all of the Offerings:

(a) you remain responsible for all fees and charges you incur during the period of suspension; and

(b) you will not be entitled to any fee credits for any period of suspension.

5.3 Limiting API Requests. If applicable to a particular Offering, we retain sole discretion to limit your usage of the Offerings (including without limitation by limiting the number of API requests you may submit (“API Requests”)) at any time if your usage of the Offerings exceeds the usage threshold specified in your Paid Plan.   

6. Term; Termination.

6.1 Term. For Offerings subject to a Paid Plan, the term of this Agreement will commence on the Effective Date and will remain in effect until terminated under this Section 6. Any notice of termination of this Agreement by either party to the other must include a Termination Date that complies with the notice periods in Section 6.2.  For Offerings that are not subject to a Paid Plan, the term of this Agreement will commence on the Effective Date and will remain in effect until you stop accessing or using the Offerings. 

6.2 Termination.

(a) Termination for Convenience. If you are not on a Paid Plan, you may terminate this Agreement for any reason by ceasing use of the Offering. If you are on a Paid Plan, each party may terminate this Agreement for any reason by giving the other party at least 30 days’ written notice, subject to the provisions in Section 6.2(b).

(b) Termination for Cause.

(i) By Either Party. Either party may terminate this Agreement for cause if the other party is in material breach of this Agreement and the material breach remains uncured for a period of 30 days from receipt of notice by the other party. 

(ii) By Us. We may also terminate this Agreement immediately (A) for cause if we have the right to suspend under Section 5, (B) if our relationship with a third-party partner who provides software or other technology we use to provide the Offerings expires, terminates or requires us to change the way we provide the software or other technology as part of the Offerings, or (C) in order to avoid undue risk of violating the law.

6.3 Effect of Termination. Upon the Termination Date:

(i) all your rights under this Agreement immediately terminate; and

(ii) each party remains responsible for all fees and charges it has incurred through the Termination Date and are responsible for any fees and charges it incurs during the post-termination period;

(iii) the terms and conditions of this Agreement shall survive the expiration or termination of this Agreement to the full extent necessary for their enforcement and for the protection of the party in whose favor they operate.  For instance, despite this Agreement between you and us terminating, any dispute raised after you stop accessing or using the Offerings will be subject to the applicable provisions of this Agreement if that dispute relates to your prior access or use.

For any use of the Offerings after the Termination Date, the terms of this Agreement will again apply and, if your use is under a Paid Plan, you will pay the applicable fees at the rates under Section 4.

7. Proprietary Rights.

7.1 Your Content. Depending on the Offering, you may share Content with us. Except as provided in this Section 7, we obtain no rights under this Agreement from you (or your licensors) to Your Content. You consent to our use of Your Content to provide the Offerings to you.

7.2 Offerings License. We or our licensors own all right, title, and interest in and to the Offerings, and all related technology and intellectual property rights. Subject to the terms of this Agreement, we grant you a limited, revocable, non-exclusive, non-sublicensable, non-transferable license to do the following: (a) access and use the Offerings solely in accordance with this Agreement; and (b) copy and use Our Content solely in connection with your permitted use of the Offerings. Except as provided in this Section 7.2, you obtain no rights under this Agreement from us, our affiliates or our licensors to the Offerings, including any related intellectual property rights. Some of Our Content and Third-Party Content may be provided to you under a separate license, such as the Apache License, Version 2.0, or other open source license. In the event of a conflict between this Agreement and any separate license, the separate license will prevail with respect to Our Content or Third-Party Content that is the subject of such separate license.

7.3 License Restrictions. Neither you nor any End User will use the Offerings in any manner or for any purpose other than as expressly permitted by this Agreement. Except for as authorized, neither you nor any End User will, or will attempt to (a) modify, distribute, alter, tamper with, repair, or otherwise create derivative works of any Content included in the Offerings (except to the extent Content included in the Offerings is provided to you under a separate license that expressly permits the creation of derivative works), (b) reverse engineer, disassemble, or decompile the Offerings or apply any other process or procedure to derive the source code of any software included in the Offerings (except to the extent applicable law doesn’t allow this restriction), (c) access or use the Offerings in a way intended to avoid incurring fees or exceeding usage limits or quotas, (d) use scraping techniques to mine or otherwise scrape data except as permitted by a Plan, or (e) resell or sublicense the Offerings unless otherwise agreed in writing. You will not use Our Marks unless you obtain our prior written consent. You will not misrepresent or embellish the relationship between us and you (including by expressing or implying that we support, sponsor, endorse, or contribute to you or your business endeavors). You will not imply any relationship or affiliation between us and you except as expressly permitted by this Agreement.

7.4 Suggestions. If you provide any Suggestions to us or our affiliates, we and our affiliates will be entitled to use the Suggestions without restriction. You hereby irrevocably assign to us all right, title, and interest in and to the Suggestions and agree to provide us any assistance we require to document, perfect, and maintain our rights in the Suggestions.

7.5 U.S. Government Users. If you are a U.S. Government End User, we are licensing the Offerings to you as a “Commercial Item” as that term is defined in the U.S. Code of Federal Regulations (see 48 C.F.R. § 2.101), and the rights we grant you to the Offerings are the same as the rights we grant to all others under these Terms of Use.

8. Indemnification.

8.1 General. 

(a) You will defend, indemnify, and hold harmless us, our affiliates and licensors, and each of their respective employees, officers, directors, and representatives from and against any Losses arising out of or relating to any claim concerning: (a) breach of this Agreement or violation of applicable law by you; and (b) a dispute between you and any of your customers or users. You will reimburse us for reasonable attorneys’ fees and expenses, associated with claims described in (a) and (b) above.

(b) We will defend, indemnify, and hold harmless you and your employees, officers, directors, and representatives from and against any Losses arising out of or relating to any claim concerning our material and intentional breach of this Agreement.  We will reimburse you for reasonable attorneys’ fees and expenses associated with the claims described in this paragraph.

8.2 Intellectual Property.

(a) Subject to the limitations in this Section 8, you will defend ConsenSys, its affiliates, and their respective employees, officers, and directors against any third-party claim alleging that any of Your Content infringes or misappropriates that third party’s intellectual property rights, and will pay the amount of any adverse final judgment or settlement.

(b) Subject to the limitations in this Section 8 and the limitations in Section 10, we will defend you and your employees, officers, and directors against any third-party claim alleging that the Offerings infringe or misappropriate that third party’s intellectual property rights, and will pay the amount of any adverse final judgment or settlement.  However, we will not be required to spend more than $200,000 pursuant to this Section 8, including without limitation attorneys’ fees, court costs, settlements, judgments, and reimbursement costs.

(c) Neither party will have obligations or liability under this Section 8.2 arising from infringement by you combining the Offerings with any other product, service, software, data, content or method. In addition, we will have no obligations or liability arising from your use of the Offerings after we have notified you to discontinue such use. The remedies provided in this Section 8.2 are the sole and exclusive remedies for any third-party claims of infringement or misappropriation of intellectual property rights by the Offerings or by Your Content.

8.3 Process. In no event will a party agree to any settlement of any claim that involves any commitment, other than the payment of money, without the written consent of the other party.

9. Disclaimers; Risk.

9.1 DISCLAIMER. THE OFFERINGS ARE PROVIDED “AS IS.” EXCEPT TO THE EXTENT PROHIBITED BY LAW, OR TO THE EXTENT ANY STATUTORY RIGHTS APPLY THAT CANNOT BE EXCLUDED, LIMITED OR WAIVED, WE AND OUR AFFILIATES AND LICENSORS (A) MAKE NO REPRESENTATIONS OR WARRANTIES OF ANY KIND, WHETHER EXPRESS, IMPLIED, STATUTORY OR OTHERWISE REGARDING THE OFFERINGS OR THE THIRD-PARTY CONTENT, AND (B) DISCLAIM ALL WARRANTIES, INCLUDING ANY IMPLIED OR EXPRESS WARRANTIES (I) OF MERCHANTABILITY, SATISFACTORY QUALITY, FITNESS FOR A PARTICULAR PURPOSE, NON-INFRINGEMENT, OR QUIET ENJOYMENT, (II) ARISING OUT OF ANY COURSE OF DEALING OR USAGE OF TRADE, (III) THAT THE OFFERINGS OR THIRD-PARTY CONTENT WILL BE UNINTERRUPTED, ERROR FREE OR FREE OF HARMFUL COMPONENTS, AND (IV) THAT ANY CONTENT WILL BE SECURE OR NOT OTHERWISE LOST OR ALTERED.

9.2 RISKS. OUR OFFERINGS RELY ON EMERGING TECHNOLOGIES, SUCH AS ETHEREUM. SOME OFFERINGS ARE SUBJECT TO INCREASED RISK THROUGH YOUR POTENTIAL MISUSE OF THINGS SUCH AS PUBLIC/PRIVATE KEY CRYPTOGRAPHY, OR FAILING TO PROPERLY UPDATE OR RUN SOFTWARE TO ACCOMMODATE PROTOCOL UPGRADES, LIKE THE TRANSITION TO PROOF OF STAKE CONSENSUS. BY USING THE OFFERINGS YOU EXPLICITLY ACKNOWLEDGE AND ACCEPT THESE HEIGHTENED RISKS.  YOU REPRESENT THAT YOU ARE FINANCIALLY AND TECHNICALLY SOPHISTICATED ENOUGH TO UNDERSTAND THE INHERENT RISKS ASSOCIATED WITH USING CRYPTOGRAPHIC AND BLOCKCHAIN-BASED SYSTEMS AND UPGRADING YOUR SOFTWARE AND PROCESSES TO ACCOMMODATE PROTOCOL UPGRADES, AND THAT YOU HAVE A WORKING KNOWLEDGE OF THE USAGE AND INTRICACIES OF DIGITAL ASSETS SUCH AS ETHER (ETH) AND OTHER DIGITAL TOKENS, SUCH AS THOSE FOLLOWING THE ERC-20 TOKEN STANDARD.  IN PARTICULAR, YOU UNDERSTAND THAT WE DO NOT OPERATE THE ETHEREUM PROTOCOL OR ANY OTHER BLOCKCHAIN PROTOCOL, COMMUNICATE OR EXECUTE PROTOCOL UPGRADES, OR APPROVE OR PROCESS BLOCKCHAIN TRANSACTIONS ON BEHALF OF YOU.  YOU FURTHER UNDERSTAND THAT BLOCKCHAIN PROTOCOLS PRESENT THEIR OWN RISKS OF USE, THAT SUPPORTING OR PARTICIPATING IN THE PROTOCOL MAY RESULT IN LOSSES IF YOUR PARTICIPATION VIOLATES CERTAIN PROTOCOL RULES, THAT  BLOCKCHAIN-BASED TRANSACTIONS ARE IRREVERSIBLE, THAT YOUR PRIVATE KEY AND BACKUP SEED PHRASE MUST BE KEPT SECRET AT ALL TIMES, THAT CONSENSYS WILL NOT STORE A BACKUP OF, NOR WILL BE ABLE TO DISCOVER OR RECOVER, YOUR PRIVATE KEY OR BACKUP SEED PHRASE, AND THAT YOU ARE SOLELY RESPONSIBLE FOR ANY APPROVALS OR PERMISSIONS YOU PROVIDE BY CRYPTOGRAPHICALLY SIGNING BLOCKCHAIN MESSAGES OR TRANSACTIONS.

YOU FURTHER UNDERSTAND AND ACCEPT THAT DIGITAL TOKENS PRESENT MARKET VOLATILITY RISK, TECHNICAL SOFTWARE RISKS, REGULATORY RISKS, AND CYBERSECURITY RISKS.  YOU UNDERSTAND THAT THE COST AND SPEED OF A BLOCKCHAIN-BASED SYSTEM IS VARIABLE, THAT COST MAY INCREASE DRAMATICALLY AT ANY TIME, AND THAT COST AND SPEED IS NOT WITHIN THE CAPABILITY OF CONSENSYS TO CONTROL.  YOU UNDERSTAND THAT PROTOCOL UPGRADES MAY INADVERTENTLY CONTAIN BUGS OR SECURITY VULNERABILITIES THAT MAY RESULT IN LOSS OF FUNCTIONALITY AND ULTIMATELY FUNDS.

YOU UNDERSTAND AND ACCEPT THAT CONSENSYS DOES NOT CONTROL ANY BLOCKCHAIN PROTOCOL, NOR DOES CONSENSYS CONTROL ANY SMART CONTRACT THAT IS NOT OTHERWISE OFFERED BY CONSENSYS AS PART OF THE OFFERINGS.  YOU UNDERSTAND AND ACCEPT THAT CONSENSYS DOES NOT CONTROL AND IS NOT RESPONSIBLE FOR THE TRANSITION OF ANY BLOCKCHAIN PROTOCOL FROM PROOF OF WORK TO PROOF OF STAKE CONSENSUS.  YOU AGREE THAT YOU ALONE, AND NOT CONSENSYS, IS RESPONSIBLE FOR ANY TRANSACTIONS THAT YOU ENGAGE IN WITH REGARD TO SUPPORTING ANY BLOCKCHAIN PROTOCOL WHETHER THROUGH TRANSACTION VALIDATION OR OTHERWISE, OR ANY TRANSACTIONS THAT YOU ENGAGE IN WITHANY THIRD-PARTY-DEVELOPED SMART CONTRACT OR TOKEN, INCLUDING TOKENS THAT WERE CREATED BY A THIRD PARTY FOR THE PURPOSE OF FRAUDULENTLY MISREPRESENTING AFFILIATION WITH ANY BLOCKCHAIN PROJECT.  YOU AGREE THAT CONSENSYS IS NOT RESPONSIBLE FOR THE REGULATORY STATUS OR TREATMENT OF ANY DIGITAL ASSETS THAT YOU MAY ACCESS OR TRANSACT WITH USING CONSENSYS OFFERINGS.  YOU EXPRESSLY ASSUME FULL RESPONSIBILITY FOR ALL OF THE RISKS OF ACCESSING AND USING THE OFFERINGS TO INTERACT WITH BLOCKCHAIN PROTOCOLS. 

10. Limitations of Liability.

10.1 Limitation of Liability. WITH THE EXCEPTION OF CLAIMS RELATING TO A BREACH OF OUR PROPRIETARY RIGHTS AS GOVERNED BY SECTION 7 AND INTELLECTUAL PROPERTY CLAIMS AS GOVERNED BY SECTION 8, IN NO EVENT SHALL THE AGGREGATE LIABILITY OF EACH PARTY TOGETHER WITH ALL OF ITS AFFILIATES ARISING OUT OF OR RELATED TO THIS AGREEMENT EXCEED THE TOTAL AMOUNT PAID BY YOU HEREUNDER FOR THE OFFERINGS GIVING RISE TO THE LIABILITY IN THE TWELVE MONTHS PRECEDING THE FIRST INCIDENT OUT OF WHICH THE LIABILITY AROSE, OR, IF NO FEES HAVE BEEN PAID, $25,000. THE FOREGOING LIMITATION WILL APPLY WHETHER AN ACTION IS IN CONTRACT OR TORT AND REGARDLESS OF THE THEORY OF LIABILITY, BUT WILL NOT LIMIT YOUR PAYMENT OBLIGATIONS UNDER SECTION 4. 

10.2 Exclusion of Consequential and Related Damages. IN NO EVENT WILL EITHER PARTY OR ITS AFFILIATES HAVE ANY LIABILITY ARISING OUT OF OR RELATED TO THIS AGREEMENT FOR ANY LOST PROFITS, REVENUES, GOODWILL, OR INDIRECT, SPECIAL, INCIDENTAL, CONSEQUENTIAL, COVER, BUSINESS INTERRUPTION OR PUNITIVE DAMAGES, WHETHER AN ACTION IS IN CONTRACT OR TORT AND REGARDLESS OF THE THEORY OF LIABILITY, EVEN IF A PARTY OR ITS AFFILIATES HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES OR IF A PARTY’S OR ITS AFFILIATES’ REMEDY OTHERWISE FAILS OF ITS ESSENTIAL PURPOSE. THE FOREGOING DISCLAIMER WILL NOT APPLY TO THE EXTENT PROHIBITED BY LAW.

11. Binding Arbitration and Class Action Waiver.

PLEASE READ THIS SECTION CAREFULLY – IT MAY SIGNIFICANTLY AFFECT YOUR LEGAL RIGHTS, INCLUDING YOUR RIGHT TO FILE A LAWSUIT IN COURT.

11.1 Binding Arbitration. Any dispute, claim or controversy (“Claim”) relating in any way to this Agreement, the Site, or your use of the Offerings will be resolved by binding arbitration as provided in this Section 11, rather than in court, except that you may assert claims in small claims court if your claims qualify.

11.1.1 If you are located in the United States: This agreement and any dispute or claim (including non-contractual disputes or claims) arising out of or in connection with it or its subject matter or formation shall be governed by and construed in accordance with the laws of the State of New York. The Federal Arbitration Act and federal arbitration law apply to this Agreement. There is no judge or jury in arbitration, and court review of an arbitration award is limited. However, an arbitrator can award on an individual basis the same damages and relief as a court (including injunctive and declaratory relief or statutory damages), and must follow the terms of this Agreement as a court would. The arbitration will be conducted in accordance with the expedited procedures set forth in the JAMS Comprehensive Arbitration Rules and Procedures (the “Rules”) as those Rules exist on the effective date of this Agreement, including Rules 16.1 and 16.2 of those Rules. The arbitrator’s decision shall be final, binding, and non-appealable. Judgment upon the award may be entered and enforced in any court having jurisdiction. Neither party shall sue the other party other than as provided herein or for enforcement of this clause or of the arbitrator’s award; any such suit may be brought only in a Federal District Court or a New York state court located in New York County, New York. The arbitrator, and not any federal, state, or local court, shall have exclusive authority to resolve any dispute relating to the interpretation, applicability, unconscionability, arbitrability, enforceability, or formation of this Agreement including any claim that all or any part of the Agreement is void or voidable.  If for any reason a claim proceeds in court rather than in arbitration we and you waive any right to a jury trial. Notwithstanding the foregoing we and you both agree that you or we may bring suit in court to enjoin infringement or other misuse of intellectual property rights. 

11.1.2 If you are located in the United Kingdom: This agreement and any dispute or claim (including non-contractual disputes or claims) arising out of or in connection with it or its subject matter or formation shall be governed by and construed in accordance with the law of England and Wales. Any dispute, claim or controversy relating in any way to this Agreement, the Offerings, your use of the Offerings, or to any products or services licensed or distributed by us will be resolved by binding arbitration as provided in this clause. Prior to commencing any formal arbitration proceedings, parties shall first seek settlement of any claim by mediation in accordance with the LCIA Mediation Rules, which Rules are deemed to be incorporated by reference into this clause. If the dispute is not settled by mediation within 14 days of the commencement of the mediation, or such further period as the parties shall agree in writing, the dispute shall be referred to and finally resolved by arbitration under the LCIA Rules, which are deemed to be incorporated by reference into this clause. The language to be used in the mediation and in the arbitration shall be English. The seat or legal place of arbitration shall be London.

11.1.3 If you are located in any territory that is not specifically enumerated in Sections 11.1.1 or 11.1.2, you may elect for either of Section 11.1.1 or 11.1.2 to apply to you, otherwise this Agreement and any Claim (including non-contractual disputes or claims) arising out of or in connection with it or its subject matter or formation shall be governed by and construed in accordance with the law of Ireland. Any Claim relating in any way to this Agreement, the Offerings, your use of the Offerings, or to any products or services licensed or distributed by us will be resolved by binding arbitration as provided in this clause. Prior to commencing any formal arbitration proceedings, parties shall first seek settlement of any claim by mediation in accordance with the LCIA Mediation Rules, which Rules are deemed to be incorporated by reference into this clause. If the dispute is not settled by mediation within 14 days of the commencement of the mediation, or such further period as the parties shall agree in writing, the Claim shall be referred to and finally resolved by arbitration under the LCIA Rules, which are deemed to be incorporated by reference into this clause. The language to be used in the mediation and in the arbitration shall be English. The seat or legal place of arbitration shall be Dublin, Ireland.

11.2 Class Action Waiver. YOU AND WE AGREE THAT EACH MAY BRING CLAIMS AGAINST THE OTHER ONLY ON AN INDIVIDUAL BASIS, AND NOT AS A PLAINTIFF OR CLASS MEMBER IN ANY PURPORTED CLASS OR REPRESENTATIVE PROCEEDING. YOU AND WE EXPRESSLY WAIVE ANY RIGHT TO FILE A CLASS ACTION OR SEEK RELIEF ON A CLASS BASIS. Unless both you and we agree, no arbitrator or judge may consolidate more than one person’s claims or otherwise preside over any form of a representative or class proceeding. The arbitrator may award injunctive relief only in favor of the individual party seeking relief and only to the extent necessary to provide relief warranted by that party’s individual claim. If a court decides that applicable law precludes enforcement of any of this paragraph’s limitations as to a particular claim for relief, then that claim (and only that claim) must be severed from the arbitration and may be brought in court. If any court or arbitrator determines that the class action waiver set forth in this paragraph is void or unenforceable for any reason or that an arbitration can proceed on a class basis, then the arbitration provision set forth above shall be deemed null and void in its entirety and the parties shall be deemed to have not agreed to arbitrate disputes.

11.3 30-Day Right to Opt Out. You have the right to opt-out and not be bound by the arbitration and class action waiver provisions set forth above by sending written notice of your decision to opt-out to the email address [email protected] with subject line LEGAL OPT OUT. The notice must be sent within 30 days of your first use of the Offerings, otherwise you shall be bound to arbitrate disputes and will be deemed to have agreed to waive any right to pursue a class action in accordance with the terms of those paragraphs. If you opt-out of these provisions, we will also not be bound by them.

12. Miscellaneous.

12.1 Assignment. You will not assign or otherwise transfer this Agreement or any of your rights and obligations under this Agreement, without our prior written consent. Any assignment or transfer in violation of this Section 12.1 will be void. We may assign this Agreement without your consent (a) in connection with a merger, acquisition or sale of all or substantially all of our assets, or (b) to any Affiliate or as part of a corporate reorganization; and effective upon such assignment, the assignee is deemed substituted for us as a party to this Agreement and we are fully released from all of our obligations and duties to perform under this Agreement. Subject to the foregoing, this Agreement will be binding upon, and inure to the benefit of the parties and their respective permitted successors and assigns.

12.2 DAOs. As a blockchain native company, we may interact with and provide certain Offerings to DAOs. Due to the unique nature of DAOs, to the extent the DAO votes in favor of and/or accepts such Offerings from ConsenSys, the DAO has acknowledged and agreed to these Terms in their entirety.

12.2 Entire Agreement and Modifications. This Agreement incorporates the Policies by reference and is the entire agreement between you and us regarding the subject matter of this Agreement. If the terms of this document are inconsistent with the terms contained in any Policy, the terms contained in this document will control. Any modification to the terms of this Agreement may only be made in writing.

12.3 Force Majeure. Neither party nor their respective affiliates will be liable for any delay or failure to perform any obligation under this Agreement where the delay or failure results from any cause beyond such party’s reasonable control, including but not limited to acts of God, utilities or other telecommunications failures, cyber attacks, earthquake, storms or other elements of nature, pandemics, blockages, embargoes, riots, acts or orders of government, acts of terrorism, or war.

12.4 Export and Sanctions Compliance. In connection with this Agreement, you will comply with all applicable import, re-import, sanctions, anti-boycott, export, and re-export control laws and regulations, including all such laws and regulations that may apply. For clarity, you are solely responsible for compliance related to the manner in which you choose to use the Offerings. You may not use any Offering if you are the subject of U.S. sanctions or of sanctions consistent with U.S. law imposed by the governments of the country where you are using the Offering. 

12.5 Independent Contractors; Non-Exclusive Rights. We and you are independent contractors, and this Agreement will not be construed to create a partnership, joint venture, agency, or employment relationship. Neither party, nor any of their respective affiliates, is an agent of the other for any purpose or has the authority to bind the other. Both parties reserve the right (a) to develop or have developed for it products, services, concepts, systems, or techniques that are similar to or compete with the products, services, concepts, systems, or techniques developed or contemplated by the other party, and (b) to assist third party developers or systems integrators who may offer products or services which compete with the other party’s products or services.

12.6 Eligibility. If you are under the age of majority in your jurisdiction of residence, you may use the Site or Offerings only with the consent of or under the supervision of your parent or legal guardian.

NOTICE TO PARENTS AND GUARDIANS: By granting your minor permission to access the Site or Offerings, you agree to these Terms of Use on behalf of your minor. You are responsible for exercising supervision over your minor’s online activities. If you do not agree to these Terms of Use, do not let your minor use the Site or Offerings.

12.7 Language. All communications and notices made or given pursuant to this Agreement must be in the English language. If we provide a translation of the English language version of this Agreement, the English language version of the Agreement will control if there is any conflict.

12.8 Notice.

(a) To You. We may provide any notice to you under this Agreement using commercially reasonable means, including: (i) posting a notice on the Site; (ii) sending a message to the email address then associated with your account; or (iii) using public communication channels . Notices we provide by posting on the Site or using public communication channels will be effective upon posting, and notices we provide by email will be effective when we send the email. It is your responsibility to keep your email address current to the extent you have an account. You will be deemed to have received any email sent to the email address then associated with your account when we send the email, whether or not you actually receive the email.

(b) To Us. To give us notice under this Agreement, you must contact us by email at [email protected] 

12.9 No Third-Party Beneficiaries. Except as otherwise set forth herein, this Agreement does not create any third-party beneficiary rights in any individual or entity that is not a party to this Agreement.

12.10 No Waivers. The failure by us to enforce any provision of this Agreement will not constitute a present or future waiver of such provision nor limit our right to enforce such provision at a later time. All waivers by us must be in writing to be effective.

12.11 Severability. If any portion of this Agreement is held to be invalid or unenforceable, the remaining portions of this Agreement will remain in full force and effect. Any invalid or unenforceable portions will be interpreted to effect and intent of the original portion. If such construction is not possible, the invalid or unenforceable portion will be severed from this Agreement but the rest of the Agreement will remain in full force and effect.

12.12 Notice and Procedure for Making Claims of Copyright Infringement. If you are a copyright owner or agent of the owner, and you believe that your copyright or the copyright of a person on whose behalf you are authorized to act has been infringed, please provide us a written notice at the address below with the following information:

  1. an electronic or physical signature of the person authorized to act on behalf of the owner of the copyright or other intellectual property interest;
  2. a description of the copyrighted work or other intellectual property that you claim has been infringed;
  3. a description of where the material that you claim is infringing is located with respect to the Offerings;
  4. your address, telephone number, and email address;
  5. a statement by you that you have a good faith belief that the disputed use is not authorized by the copyright owner, its agent, or the law;
  6. a statement by you, made under penalty of perjury, that the above information in your notice is accurate and that you are the copyright or intellectual property owner or authorized to act on the copyright or intellectual property owner’s behalf.

You can reach us at:

Email: [email protected]

Subject Line: Copyright Notification Mail

Attention: Copyright ℅

ConsenSys Software Inc. 

49 Bogart Street Suite 22 Brooklyn, NY 11206

13. Definitions.

“Acceptable Use Policy” means the policy set forth below, as it may be updated by us from time to time. You agree not to, and not to allow third parties to, use the Offerings:

  1. to violate, or encourage the violation of, the legal rights of others (for example, this may include allowing End Users to infringe or misappropriate the intellectual property rights of others in violation of the Digital Millennium Copyright Act);
  2. to engage in, promote or encourage any illegal or infringing content;
  3. for any unlawful, invasive, infringing, defamatory or fraudulent purpose (for example, this may include phishing, creating a pyramid scheme or mirroring a website);
  4. to intentionally distribute viruses, worms, Trojan horses, corrupted files, hoaxes, or other items of a destructive or deceptive nature;
  5. to interfere with the use of the Offerings, or the equipment used to provide the Offerings, by customers, authorized resellers, or other authorized users;
  6. to disable, interfere with or circumvent any aspect of the Offerings (for example, any thresholds or limits);
  7. to generate, distribute, publish or facilitate unsolicited mass email, promotions, advertising or other solicitation; or
  8. to use the Offerings, or any interfaces provided with the Offerings, to access any other product or service in a manner that violates the terms of service of such other product or service.

“API” means an application program interface.

“API Requests” has the meaning set forth in Section 5.3.

“Applicable Threshold” has the meaning set forth in Section 4.2.

“Base Fees” has the meaning set forth in Section 4.2.

“Content” means any data, text, audio, video or images, software (including machine images), and any documentation.

“DAO” means Decentralized Autonomous Organization.

“End User” means any individual or entity that directly or indirectly through another user: (a) accesses or uses Your Content; or (b) otherwise accesses or uses the Offerings under your account. 

“Fees” has the meaning set forth in Section 4.2.

“Losses” means any claims, damages, losses, liabilities, costs, and expenses (including reasonable attorneys’ fees).’

“Our Content” means any software (including machine images), data, text, audio, video, images, or documentation that we offer in connection with the Offerings. 

“Our Marks” means any trademarks, service marks, service or trade names, logos, and other designations of ConsenSys Software Inc. and their affiliates or licensors that we may make available to you in connection with this Agreement.

“Order” means an order for Offerings executed through an order form directly with ConsenSys, or through a cloud vendor, such as Amazon Web Services, Microsoft Azure, or Google Cloud.

“Offerings” means each of the products and services, including but not limited to Codefi, Infura, MetaMask, Quorum and any other features, tools, materials, or services offered from time to time, by us or our affiliates. 

“Policies” means the Acceptable Use Policy, Privacy Policy, any supplemental policies or addendums applicable to any Service as provided to you, and any other policy or terms referenced in or incorporated into this Agreement, each as may be updated by us from time to time.

“Privacy Policy” means the privacy policy located at https://consensys.net/privacy-policy (and any successor or related locations designated by us), as it may be updated by us from time to time.

“Service Offerings” means the Services (including associated APIs), Our Content, Our Marks, and any other product or service provided by us under this Agreement. Service Offerings do not include Third-Party Content or Third-Party Services.

“Suggestions” means all suggested improvements to the Service Offerings that you provide to us..

“Term” means the term of this Agreement described in Section 6.1.

“Termination Date” means the effective date of termination provided in accordance with Section 6, in a notice from one party to the other.

“Third-Party Content” means Content made available to you by any third party on the Site or in conjunction with the Offerings.

“Your Content” means content that you or any End User transfers to us, storage or hosting by the Offerings in connection with account and any computational results that you or any End User derive from the foregoing through their use of the Offerings, excluding however any information submitted to a blockchain protocol for processing. 

 

Superchief Gallery NFT & MetaMask Present IRL Web3 Education at The Oculus at Westfield World Trade Center

https://consensys.net/blog/press-release/superchief-gallery-nft-metamask-present-irl-web3-education/

New York, NY, April 17, 2023 –  MetaMask, the world’s leading self-custody Web3 wallet developed by ConsenSys is proud to announce Web3 educational programming at The Oculus at the Westfield World Trade Center in partnership with Superchief Gallery NFT, the world’s first IRL NFT gallery. As part of the partnership, approximately 300 students from marginalized & underrepresented communities in New York will receive an in-person Web3 education curriculum aimed at creating an accessible future.

By partnering with community organizers, Superchief Gallery will provide a safe and inclusive environment for Web3 learning. Meanwhile, the 400,000+ daily visitors at the Westfield World Trade Center will have access to Superchief Gallery NFT, powered by The Canvas, augmented by educational content made in collaboration with MetaMask. All of this content will be available for free online at Superchief’s website.

This initiative will host its first class on Saturday, April 29th and will provide a unique learning opportunity for those interested in safely exploring the world of non-fungible tokens (NFTs) and the innovative technology that powers them. These are the first steps towards a goal of uniting the Web3 community under the banner of education built specifically to serve marginalized and underrepresented groups.

The first program will include a Guest Lecture on the culture, opportunity and ethos of Web3 by Elise Swopes. Elise Swopes is a celebrated artist and founder of Sunrise Art Club, a community and agency dedicated to women of color in Web3. 

“Early access to technology has become a key component of economic success, and we at Superchief believe that this is an opportunity to prioritize underserved communities and create balance in the space” said Edward Zipco, Co-founder & Director of Superchief Gallery NFT). 

“We’re thrilled to partner with Superchief Gallery NFT to provide web3 education to underrepresented communities in New York City with MetaMask Learn. At MetaMask, we believe web3 gives individuals and communities power like never before to create and disseminate digital value. This initiative is a crucial step towards that goal. We’re excited to see the impact this program will have on the participants and the larger Web3 community.”, James Beck, Director of Communications and Content at ConsenSys added

With billions of dollars already traded via NFTs to date, and over a trillion in crypto overall, this is the most impactful way we can support the community and witness the creation of a new global financial & cultural ecosystem.

MetaMask will be sharing educational resources alongside Superchief Gallery NFT, to provide guests with a comprehensive understanding of how to safely get started in Web3, as well as the role that NFTs play in the world of digital art and collectibles. 

The 2023 program will cover everything from the basics of safety and security to examples of how those in the creative arts and others are finding opportunities in Web3. The full course will be streamed to a global audience on Youtube and other streaming social media apps.

Attendees can expect a hands-on experience as they get the opportunity to create a temporary crypto wallet with the guidance and oversight of an educator. This unique course will give attendees an opportunity to ask questions and learn the process so they can create their own wallet at home, now provided with the knowledge and skills to safely explore Web3 further.

For more information and to register for this event, please visit Superchief Gallery’s website.

And for a chance to preview MetaMask’s educational information online before the event, please visit MetaMask’s LEARN website: learn.metamask.io 

Media Contacts: [email protected], [email protected],  

About ConsenSys

ConsenSys is a leading Ethereum and decentralized protocols software company. We enable developers, enterprises, and people worldwide to build next-generation applications, launch modern financial infrastructure, and access the decentralized web. Our product suite, composed of Infura, Quorum, Codefi, MetaMask, Truffle, Diligence and our NFT platform, serves millions of users, supports billions of blockchain-based queries for our clients, and has handled billions of dollars in digital assets. Ethereum is the largest programmable blockchain in the world, leading in business adoption, developer community, and DeFi activity. On this trusted, open source foundation, we are building the digital economy of tomorrow. To explore our products and solutions, visit http://consensys.net/.

About Superchief Gallery NFT
As a part of the international underground art community, Edward Zipco & Bill Dunleavy founded Superchief Gallery in 2012. On March 25th, 2021, Superchief Gallery NFT opened its doors in New York City, establishing itself as the World’s First Physical / IRL NFT Gallery.

Since opening, Superchief Gallery NFT has proudly worked with Christie’s Auction House on their first ever CryptoPunk Auction, produced the first ever IRL NFT events for Opensea, MakersPlace, Foundation, CNN, UNICEF, The United Nations, The Ukraine, NFTLA, and many more.

Superchief Gallery has a history of uniting the underground art scene and providing access to opportunities to the betterment of our extended community. As our opportunities have grown alongside our knowledge and network within web 3, we wish to follow that ethos further and unite our new community under the banner of education, focused with intention towards inclusivity of the marginalized groups who are missing from Web3.

FAQ: Customer Support Data Security Incident

https://consensys.net/blog/news/faq-customer-support-data-security-incident/?utm_source=rss&utm_medium=rss&utm_campaign=faq-customer-support-data-security-incident

A cyber-security incident targeted a third-party service provider that provides technical customer support services to ConsenSys.

The incident was limited to a certain number of users who submitted personal data to MetaMask customer support during the period August 1 2021 to February 10 2023. 

It is important to note that the MetaMask browser extension and mobile app security were not affected by this incident. MetaMask users are unaffected if they did not submit personal data to MetaMask customer support ticketing system. 

Frequently Asked Questions

Can you describe how the incident happened?

A third-party service provider that provides customer support ticketing services to ConsenSys was the target of a cyber-security incident. The incident occurred when unauthorised actors gained access to the third-party service provider’s systems. As a result of this incident, MetaMask users who submitted personal data to our customer support may have had that data accessed by an unauthorised third party. 

What type of data was accessed?

MetaMask support requests limited personal data necessary to provide the support function (e.g. email address). MetaMask support tickets include a free text-field, so while we request limited personal data, users at their own discretion may input any information, which depending on the submission, may constitute personal data (including, potentially: economic or financial information, name, surname, date of birth, phone number, and postal address). Again, this type of personal data is not personal data we request as part of providing support services.

How many users were affected?

The incident was limited to users who submitted personal data to MetaMask customer support using the third-party customer support ticketing services. Due to limited data collection, we cannot technically identify each individual user whose data may have been accessed. As a result, a notice was sent to all users who contacted MetaMask customer support during the affected period. We estimate that approximately 7,000 users worldwide were affected by the incident.

What measures have we taken to ensure this won’t happen again? Are you looking at other potential attack vectors and reconsidering our approach to those?

In relation to this incident, the following steps have been taken:

  • We have taken steps to stop the unauthorised access. The threat is no longer on-going. 
  • We have reported the matter to the Data Protection Commission of Ireland and the Information Commissioner’s Office of the UK.
  • We continue to liaise and work with our service provider who has engaged with an experienced incident response IT, cyber security, and forensics team to investigate the incident.
  • We are putting further measures in place in order to address and mitigate known or possible adverse effects.
  • We are constantly looking at ways to improve our existing measures to meet the highest level of security and data privacy.

How can users be confident that their data is safe with MetaMask in future?

The security of the MetaMask browser extension and mobile app was not affected by this incident. The incident was limited to a third-party provider of technical customer support ticketing services used by MetaMask. MetaMask users who did not submit personal data to MetaMask customer support using these ticketing services are unaffected. ConsenSys completed a comprehensive forensic investigation into the incident and implemented measures to prevent similar incidents from happening in the future. In addition, ConsenSys is currently engaged in implementing an enhanced third-party risk management program across its services. Protecting the privacy of our users and the safety of your data is at the core of this enhanced program.

What can potentially affected users do to protect themselves? What should I do if I suspect a phishing attempt? 

As always, we ask that you be extremely vigilant for any suspicious activity and unsolicited contacts which may be made to you by phone, text, email or instant message. If you are suspicious of any request or message, do not open it and do not reply or click any links but delete it. Please make us aware of suspicious requests and messages by reporting them here.

We wish to remind you, as ConsenSys frequently repeats through its public channels, that any request for your secret recovery phrase should be treated as suspicious and ignored. We will never ask you for your secret recovery phrase. Never in any circumstances provide your secret recovery phrase to any third party.

The breach has been reported to which regulators?

The Data Protection Commission of Ireland and the Information Commissioner’s Office in the UK.

How many users were potentially affected?

Approximately 7,000 users of customer support had their tickets accessed during the time period of the incident, which is a small percentage of the users who used customer support during that time.

When was this issue first reported? 

August 2021. 

How long were the users’ data at risk? 

Between August 2021 and February 2023. 

If you have any additional questions please contact [email protected].

Media Contacts: [email protected]

ConsenSys’ Marketing Campaign celebrating The Merge Wins the MUSE Creative Award

https://consensys.net/blog/news/consensys-marketing-campaign-celebrating-the-merge-wins-the-muse-creative-award-2/

The Merge was one of the most impactful technology shifts since the formation of the internet.  It transformed the most used blockchain, Ethereum, into an almost net-zero technology, reducing its electricity consumption by over 99.98% overnight. The Merge was an incredible technical feat, but one that was difficult for mass audiences to understand.

ConsenSys identified an opportunity to educate audiences, elevate its brand, and establish a defiantly optimistic global narrative to surround this historic moment through a multi-channel marketing campaign around three core aspects of The Merge: sustainability, security, and future scalability. “Ethereum, Evolved” was born out of a vision to spread awareness of The Merge and celebrate the decentralized developer community who brought it to life. 

It has been six months since The Merge, and we are thrilled to announce that our campaign “Ethereum, Evolved” has been honored with the platinum MUSE Creative Award (their highest award!) in the Integrated Marketing Campaign category. This recognition fills us with immense pride and motivation to continue pushing the boundaries of creativity and excellence in our field. 

The MUSE Creative Award is composed of a series of competitions which are organized to honor excellence in various fields. This year, the competition received over 6,300 entries from across the globe. The Muse Creative Award is hosted by the International Awards Associate (IAA), which ensures that these competitions are accessible and fair, in order to guarantee recognition only goes to those who truly deserve the accolade.

Thank you to MUSE, and especially to the amazing team behind this project for their outstanding work in highlighting the progress of the Ethereum ecosystem.

ConsenSys’ “Ethereum Evolved” campaign

Through a multi-channel marketing campaign driving a simple narrative around three core aspects of The Merge: sustainability, security and future scalability, we were able to educate mainstream audiences about this pivotal moment for Ethereum.

These narrative seeds set up subsequent campaign messaging, brought to life by our hero video, social assets, and targeted paid placements.

A robust organic media plan, including social, blog-based content, and global PR outreach which secured +200 pieces of media coverage, spread our message far and wide. To reach non-web3 audiences, we ran a full-page ad in the Wall Street Journal, stopping readers mid-flip while inviting them to celebrate The Merge along with us.

All media drove to the Merge Hub, an interactive experience showcasing the three pillar benefits of the Merge through rich, informational content, and inviting users to claim their very own celebratory Merge NFT. The Merge Hub garnered over 600k visits during the campaign with 184k coming on Merge Day alone.

Our Regenesis NFT collection was based on the three core narrative pillars and included a free, open edition, a commemorative edition airdropped to core Ethereum developers, and a bespoke art piece, minted in block one and position one of proof-of-stake Ethereum, making it the network’s first sustainable 1-of-1 NFT ever. The NFT collection went on to become the largest NFT drop in history and 2nd most distributed collection ever.

In the end, our efforts elevated the ConsenSys brand, educated audiences, and shaped global narratives about The Merge all while demonstrating new ways to engage audiences through the power of web3.

Consensys Staking: Diverse Stakers, One Solution

https://consensys.net/blog/news/consensys-staking-diverse-stakers-one-solution/

The importance of staking in the Ethereum ecosystem cannot be overstated. As the Ethereum blockchain moved to the Proof of Stake consensus mechanism with the Merge in September 2022, staking became the activity that ensured the robustness of the ecosystem. 

The more nodes that contribute to validating transactions and adding blocks to the Ethereum network, the more decentralized and secure the blockchain becomes. In return for reinforcing the security of the network, validators earn staking rewards.

Contributing to the security of the Ethereum network is a priority for ConsenSys, the leading Ethereum and decentralized protocols software company. ConsenSys is therefore thrilled to introduce an updated and expanded version of its staking offering. 

With over 17,000 Ethereum validators, and over $1B in total value locked to date, Codefi Staking is relaunching as ConsenSys Staking.

We aim to unlock the collaborative power of web3 communities by enabling everyone to gain a stake in decentralized networks. Our mission is to make staking accessible to everyone—by offering embedded and rich staking experiences that are highly secure, reliable and performant.

What is Consensys Staking?

ConsenSys Staking helps web3 participants earn rewards for securing the Ethereum network. We run your validators safely and effectively, so that you collect rewards and reduce risks of slashing and downtime. 

Over the coming months, we will diversify where stakers can access our services. Today, we offer direct to validator staking experiences with a web application and an API, and also contribute to staking experiences from other platforms as MetaMask Institutional (MMI) and Lido. Users have loved and trusted ConsenSys’ industry-leading products for years, and can now safely extend that trust to ETH staking.

Why Stake with Consensys Staking?

Security and reliability are core components of our staking offering. 

Our proven track record demonstrates without a doubt that users can trust us when choosing to stake with us: 

  • Our staking solutions have been in production since the launch of the Beacon Chain in 2020
  • Our validators have never been slashed, ever—thanks to the tools and processes in place to monitor, evaluate and mitigate our risks, in coordination with the ConsenSys security team.
  • We have a participation rate upward of 99.9% for the validators we operate, indicating stable product uptime.
  • Our infrastructure is non-custodial and distributed across multiple clouds, regions, and validator clients. This prevents threats that may lead to a correlated outage across the staking ecosystem. 
  • We have a SOC 2 Type I and II certification and are working on ISO20001.
  • With real-time monitoring capability, users can consistently monitor validator performance. 
  • We are the creators of industry-leading applications such as:
    • MetaMask: The leading web3 wallet. MetaMask enables users to self-custody their crypto and manage their stake.
    • Infura: The most powerful suite of blockchain APIs and dev tools. The software behind Ethereum node operation since 2015.
    • Teku: An open-source institutional-grade client. The software behind Ethereum’s validators.
    • Our developers have also contributed significantly to the Ethereum core protocol

Users across the ecosystem know, use, and trust these applications, and use them to stake their ETH.

ConsenSys Staking is also self-serviceable, i.e. users can find answers to most of their questions within the product experience, without contacting us. Still, if they contact us, we offer 24/7 customer and technical support to ensure minimal service disruption.

How to Stake with Consensys Staking?

There are multiple ways that you can stake with ConsenSys Staking.

Stake through MetaMask Institutional: Organizations can choose to stake their ETH with any of the four staking providers available on the platform–ConsenSys, Allnodes, Blockdaemon, and Kiln–using MetaMask Institutional. Through our significantly simplified staking experience, organizations can choose a staking provider based on criteria such as validator performance and fees. Users need to stake a minimum of 32 ETH to stake through MMI. 

Stake through the Consensys Staking application: Users can connect their wallet to stake ETH directly through their MetaMask wallet, or any other wallet supported by Wallet Connect. If they choose to stake through ConsenSys Staking application, they need a minimum of 32 ETH.  

Stake using the Consensys Staking API: Users can integrate the Consensys Staking API into their application to build their own staking interface and experience.

Stake through Lido: Consensys Staking is one of the 30 providers that make up Lido’s ETH staking offering. Lido’s algorithm allocates users’ stakes to the validator operators with the smallest shares within Lido’s available validators. 

Why does SOC2 Certification Matter?

We are one of the first staking operators to acquire SOC 2 Type II certification—having received it in October 2022, issued by an independent American Institute of CPAs (AICPA) accredited auditor. A SOC 2 Type 2 report is an internal controls report capturing how a company safeguards customer data and how well those controls are operating. It is the industry security standard for Software as a Service Providers.

As one of the first staking operators in the industry to achieve this standard certification, ConsenSys Staking has voluntarily met the five trust service criteria of Security, Availability, Processing Integrity, Confidentiality and Privacy developed by the AICPA over a 12 month audit. 

These measures help raise staker confidence in our services.

ConsenSys Launches the First Marketplace for Institutional Staking on MetaMask Institutional, in Partnership with Allnodes, Blockdaemon, and Kiln

https://consensys.net/blog/press-release/consensys-launches-the-first-marketplace-for-institutional-staking-on-metamask-institutional-in-partnership-with-allnodes-blockdaemon-and-kiln/

  • MetaMask Institutional, in partnership with Allnodes, Blockdaemon, and Kiln, has launched the first institutional-staking marketplace, bringing together staking providers and offering simple, one-click staking to institutions. The marketplace will also include ConsenSys’ own staking product.
  • The new marketplace aims to bring more organizations into web3 and boost Ethereum network security by simplifying ETH staking. So far, the total amount of staked ETH has reached 17.7 million since the Merge.
  • The upcoming Shanghai/Capella Update will enable staked ETH withdrawals, which could drive further institutional adoption by offering greater asset flexibility and control.
  • MetaMask Institutional is simultaneously launching advanced capabilities including institutional controls, portfolio management, digital asset monitoring with built-in P&L and performance attribution, and in-depth transaction reporting— to redefine the institutional web3 experience in a more powerful web3 portfolio dashboard. These new features will go-live on March 27th.

Paris, France, March 22, 2023 — Today, MetaMask Institutional, the web3 wallet for organizations developed by ConsenSys, and the first multi-custodial institutional web3 offering on the market, launched its institutional staking marketplace in partnership with Allnodes, Blockdaemon, and Kiln. The marketplace will also leverage ConsenSys’ own technology with ConsenSys Staking (formerly Codefi Staking). This first-of-its-kind platform is designed to simplify and provide unrivaled access to institutional staking. The nuances and complexity of institutional staking can deter companies looking to participate. MetaMask Institutional’s marketplace will level the playing field by bringing together these best-in-class partners to provide institutions with a simple one-click staking experience.

Choosing the right vendor for institutional staking can be complicated due to the differences in the fees charged, terms and conditions, rebates, and reporting standards. In addition, various staking providers offer different benefits to institutions, ranging from differences in infrastructure (multi-cloud, multi-region, and multi-client) to certifications (SOC2 Type 2 and ISO 27001). MetaMask Institutional’s staking marketplace will reduce this complexity by streamlining access to top-tier staking providers; offering standardized terms and conditions, institutional-grade reporting; and a simplified staking experience—to facilitate broader institutional web3 participation.

Staking promises to be an increasingly crucial foundation of the crypto industry. In September 2022, the Ethereum Merge delivered several significant improvements, including transitioning the world’s second-largest cryptocurrency (ETH) from Proof-of-Work to Proof-of-Stake and reducing the network’s carbon footprint by 99.95%. The upcoming Shanghai/Capella Upgrade is expected in March/April 2023 and will enable withdrawals of staked ETH. Since the Merge, the total amount of staked ETH has grown by 4 million, reaching a current total of approximately 17.7 million. In anticipation of the upgrade, Ethereum staking could experience a further surge in institutional adoption as it will offer greater flexibility and control over assets.

This marketplace launch comes just two months after MetaMask launched staking functionality for users, marking a significant step forward in the platform’s offerings for individual and institutional investors.

“The Ethereum Merge last year was one of the most profound accomplishments in the history of Crypto—resulting in increased economic security, reduced energy costs, and client diversity. With withdrawals coming soon, we believe institutional demand to secure the world’s computer will surge. We are delighted to work with these ‘best-in-breed’ staking partners. We believe MetaMask Institutional can play a unique role in providing unrivaled and seamless staking access to all organizations,” said MetaMask Institutional Product Lead Johann Bornman.

On the side of staking service providers—Engaging with institutions requires multiple custodial integrations. It also means institutions are bound by the provider their custodian has chosen. However, MetaMask Institutional today is integrated with 11 custody and self-custody platforms globally. This allows institutions seamless and unrivaled access to staking providers.

“We are excited to announce our collaboration with ConsenSys to launch the world’s first institutional staking marketplace on MetaMask Institutional,” said Konstantin Boyko-Romanovsky, CEO and founder of Allnodes. “By leveraging our resilient and high-performance node infrastructure with ConsenSys’s intuitive user interface, institution-grade security, and extensive range of services, we aim to bring more people into the space and drive the growth of the Web3 ecosystem.”

“Blockdaemon is committed to securely connecting institutions to crypto and DeFi with ever-increasing ease and simplicity. Metamask’s new Institutional Marketplace is an excellent way to experience how automated protocol solutions can incentivize institutions to participate in securing the Ethereum network,” said Konstantin Richter, Blockdaemon Founder and CEO. “We couldn’t be prouder to be one of the partners to bring Metamask’s Institutional Marketplace to life.”

“Our mission at Kiln is to make enterprise-grade staking seamless and secure for everyone. We are delighted to integrate Kiln’s ETH staking platform with MetaMask Institutional’s product and network. This integration allows enterprise customers worldwide to help secure the Ethereum network and be rewarded for it. It’s a great milestone to meet an ever-increasing demand as the Shanghai upgrade approaches.” Laszlo Szabo, co-founder and CEO of Kiln

In addition to the marketplace, MetaMask Institutional is introducing a more powerful Web3 Portfolio Dashboard, offering a range of cutting-edge tools that will enable organizations to better manage how they interact with web3. MetaMask Institutional’s Web3 Portfolio dashboard will offer institutional controls, portfolio management, digital asset monitoring, and transaction reporting, all in one place. These new features will go-live on March 27th.

With these features, organizations will be able to swap across different EVM chains. The platform also allows for digital asset monitoring, including profit & loss and performance attribution for all ERC-20 tokens and the ten most prominent DeFi protocols. It also allows tracking NFTs and bundle accounts to manage portfolios across team members and organizations. Additionally, the platform’s advanced transaction classification and reporting features provide detailed information on holdings and transactions, making it easy for users to reconcile their transaction history with their fund admins. Finally, the platform’s institutional controls, including multi-custodial organization and user management, enables organizations to automate onboarding, see organization-wide portfolio views, and transact as a team, providing unparalleled convenience and flexibility to institutional investors.

For more information on MetaMask Institutional’s institutional staking marketplace and web3 portfolio dashboard, interested parties can request access to the platform here.

Media Contacts: [email protected] 

About ConsenSys

ConsenSys is a leading Ethereum and decentralized protocols software company. We enable developers, enterprises, and people worldwide to build next-generation applications, launch modern financial infrastructure, and access the decentralized web. Our product suite, composed of Infura, Quorum, MetaMask, Truffle, Diligence, and our NFT platform, serves millions of users, supports billions of blockchain-based queries for our clients, and has handled billions of dollars in digital assets. Ethereum is the largest programmable blockchain in the world, leading in business adoption, developer community, and DeFi activity. On this trusted, open source foundation, we are building the digital economy of tomorrow. To explore our products and solutions, visit http://consensys.net/.

About Allnodes

Since 2017, Allnodes.com has been an industry leader in non-custodial staking and blockchain node infrastructure for both retail and institutional investors. With headquarters in the United States and team members worldwide, Allnodes promotes the adoption of Proof Of Stake with straightforward flat fee pricing, data centers all over the globe, and an easy-to-use user interface that allows users to host blockchain nodes or stake directly to the networks on over 65 protocols in less than 2 minutes.

About Blockdaemon

Blockdaemon powers the blockchain economy with its suite of industry leading infrastructure solutions. We are a globally established, single integration partner for accessing premier blockchain networks. We provide integrated business solutions to exchanges, custodians, crypto platforms, financial institutions and developers using our end-to-end suite of blockchain tools, including dedicated nodes, APIs, staking, liquid staking, MPC tech, and more. Blockdaemon provides its customers with the confidence to quickly and easily scale without compromising security or compliance. 

About Kiln

Kiln is the leading enterprise-grade staking platform, enabling institutional customers to stake assets, and to whitelabel staking functionality into their offering. Our platform is API-first and enables fully automated validators, rewards, data and commission management.

ConsenSys and MoonPay Join Forces to Empower Nigerian Users With Easy Access to Crypto Directly in MetaMask

https://consensys.net/blog/press-release/consensys-and-moonpay-join-forces-to-empower-nigerian-users-with-easy-access-to-crypto-directly-in-metamask/

Lagos, Nigeria, March 21, 2023 — Today, ConsenSys,  a market-leading Web3 company, revealed that MetaMask, the world’s leading self-custody wallet, and MoonPay, the leading web3 infrastructure company, have expanded their offering in Nigeria. Users of MetaMask in Nigeria can now use instant bank transfers to purchase crypto directly within the MetaMask mobile app and the Portfolio Dapp, resulting in a more seamless experience that is cheaper, faster, and more efficient.

Buying and selling crypto in Nigeria can be challenging, with an estimated 90% of attempts to buy crypto using a credit/debit card declining. However, adding more localized payment methods, such as instant bank transfers, will improve the situation, enabling Nigerian users to access web3 more efficiently and obtain tokens conveniently without setting up an account with a centralized crypto exchange. This will reduce decline rates and provide a user-friendly experience.

We are committed to providing seamless experiences for users in Africa, starting with Nigeria and expanding the rollout of this feature to Kenya, Botswana, and South Africa in the coming month. Our collaboration with MoonPay is a step towards achieving this goal by providing users with a more convenient on-ramp experience in these countries.

The growing popularity of MetaMask in Nigeria is a testament to the increasing adoption of crypto in the country and the potential for further expansion of digital assets in Africa.

The Chainalysis 2022 Global Crypto Adoption Index shows Nigeria has been climbing the charts regarding grassroots crypto adoption. Almost 12.4 million people, 5.7% of Nigeria’s population, are estimated to own crypto assets. In addition, Nigeria is among MetaMask’s top markets globally, ranking third in mobile active users. It is also among the top ten countries regarding visitors to metamask.io. 

“This is an essential next step in a critical market that has embraced crypto and web3 but faces serious challenges when using fiat to crypto on-ramp. We are reducing friction and bringing down barriers to keep supporting Nigerians as they onboard into web3,” said Lorenzo Santos, Senior Product Manager at MetaMask. 

“Our partnership with MetaMask will enable us to provide Nigerian users with Bank Transfers, a widely used payment method across Nigerian e-commerce businesses. We hope this integration opens the doors for Nigerians to fund their self-custody wallet through a simplified user experience,” added Zeeshan Feroz, Chief Product & Strategy Officer of MoonPay.

A widely accepted and real-time payment infrastructure obstacle for crypto transactions in Nigeria would boost the Nigerian crypto market. With this integration, the complexity of purchasing crypto, especially in Nigeria, is replaced with an easy solution. Furthermore, MetaMask users can become their own bank through self-custody, directly controlling their assets. 

To fund your MetaMask wallet with MoonPay in Nigeria: 

  • Login to the MetaMask mobile app or Portfolio Dapp. 
  • Click or tap the Buy button, select Nigeria as your region, then choose Instant Bank Transfer. 
  • Enter the amount desired and the token you wish to purchase 
  • Select the MoonPay quote 
  • Checkout inside MoonPay widget
  • Done! You have successfully bought crypto directly in MetaMask and can now explore web3 easily.  

Media contact: [email protected]  and [email protected]

ABOUT CONSENSYS

ConsenSys is a leading Ethereum and decentralized protocols software company. We enable developers, enterprises, and people worldwide to build next-generation applications, launch modern financial infrastructure, and access the decentralized web. Our product suite, composed of Infura, Quorum, Codefi, MetaMask, MetaMask Institutional, Truffle, Diligence, and our NFT platform, serves millions of users, supports billions of blockchain-based queries for our clients, and has handled billions of dollars in digital assets. Ethereum is the largest programmable blockchain in the world, leading in business adoption, the developer community, and DeFi activity. On this trusted, open-source foundation, we are building the digital economy of tomorrow. To explore our products and solutions, visit https://consensys.net/.

ABOUT MOONPAY

MoonPay is the world’s leading Web3 infrastructure company. We are transforming the modern customer experience by building end-to-end solutions for payments, custody, world class design, and enterprise-scale digital asset and smart contracts minting. Many of the world’s most iconic brands rely on MoonPay to power their Web3 strategies and ideas. We are active in more than 160 countries and are trusted by over 500 partners, including leading wallets, exchanges, and commercial brands. For more information, visit: www.moonpay.com

The Latest Release of Hyperledger Besu Helps Test The Merge On Any Platform | ConsenSys

https://consensys.net/blog/news/the-latest-release-of-besu-helps-test-the-merge-on-any-platform/

Hyperledger Besu has released version 22.4.2 to help test the Merge on any platform. This update brings native Hyperledger Besu support for Intel x86 on Mac, Linux, Windows, Mac M1, and Linux ARM 64. Native support for the various cryptographic libraries within Besu means less configuration challenges and more performance for users on different platforms.

We are eager to get Hyperledger Besu in the hands of stakers with hardware that they can test in anticipation for the Merge. Stakers using Intel x86 on Mac, Linux, Windows, Mac M1 ARM64, and Linux ARM 64 can also take advantage of crypto native libraries that are compiled for performance. The rest of the dependencies leverage the Java code within Hyperledger Besu. 

We are happy to share positive results on low-powered devices using ARM and will continue to optimize these platforms for individual and institutional stakers who wish to participate in the Ethereum network without requiring an expensive set-up and – thanks to Proof of Stake – without costly GPUs.

Technical specs required by platform

Below are the minimum specs for Hyperledger Besu on each platform and we recommend using a dedicated machine or VM with these specs:

PlatformMinimum SpecRecommended Spec
Intel x862-core CPU, 8GB RAM4-core CPU, 16-32GB RAM
Mac M1Mac M1, 8GB RAMMac M1/2 (Pro, Max), 16GB RAM
AWS (or another cloud provider)t3.large instance (2vCPU, 8GB)m6gd.2xlarge (8 vCPU, 32GB)
Linux ARM 64 (RasPi, other) RasPi 4 8GB Rock5 16GB 

We strongly encourage you to use the recommended specs. Consensus clients are lighter, but not free. If you are planning on running a consensus client alongside Hyperledger Besu, you will need additional overhead.

Make sure you have the appropriate amount of storage on your machine. With Bonsai, our recommended storage format, you will need an order of ~650GB of storage for the blockchain data after a Snap sync at time of writing. Be sure to allot additional storage for your set-up as it runs and as the Ethereum world-state grows. Although Bonsai is designed to keep state bloat low and implicitly prune, we anticipate an order of 30GB state growth per month on mainnet using Bonsai. Always leave room on your box for the consensus-layer client which currently uses the order of 50GB. 

Get started staking and testing the Merge

With the provided specs in mind, you can follow the Hyperledger Besu Developer Quickstart Guide to build and deploy Hyperledger Besu. Eth-Docker also has great guides on how to quickly deploy and test with just Docker images here. If you want to stake, but don’t have 32 ETH to spare, you can follow this guide to get setup with RocketPool

Let us know how your staking set-up is going! Make sure to take advantage of Bonsai Tries to keep storage requirements low and to have your machine stay lean over time with zero pruning and low state bloat. Reach out to us on Discord and Twitter to share your results and provide your feedback to our team. 

Want to get involved in #TestingTheMerge? Try out your setup on the Ropsten testnet. Happy Staking!

ConsenSys core devs share insights from the Edelweis Interop ahead of the Shanghai Upgrade | ConsenSys

https://consensys.net/blog/news/consensys-core-devs-share-insights-from-the-edelweis-interop-ahead-of-the-shanghai-upgrade/

Ethereum’s roadmap is often called ambitious, thorough, and profound. Ensuring the network is scalable is one of the key expected outcomes of the roadmap and two important upgrades have been made to the network to this end. First, the launch of the Beacon Chain in December 2020 that ran as a parallel Ethereum state on a Proof of Stake (PoS) consensus mechanism, until it merged with the execution layer in September 2022, popularly known as the Merge, the second upgrade and a historic milestone in Ethereum’s history. As part of the roadmap, the next major release is the Shanghai Upgrade, scheduled sometime in early Q2 of this year.

The Shanghai Upgrade will enable stakers and validators to withdraw the ETH that’s been locked in the execution and consensus layers of the Ethereum network since the switch to the PoS consensus mechanism. 

Ethereum core devs, Ben Edgington, Mikhail Kalinin, and Matt Nelson from ConsenSys met last week as part of a group of 100 Ethereum developers and researchers at the Edelweiss Interop in chilly Austria to prepare for the upgrade. Here’s what we learned from them on how to prepare for Ethereum’s next big upgrade. 

Q&A with core devs about the Shanghai Upgrade implications

Define the Shanghai Upgrade and its primary objective. 

Ben: Strictly, our next upgrade is called Shanghai–Capella. On this occasion we will be simultaneously upgrading both Ethereum’s execution layer (via the Shanghai upgrade) and Ethereum’s consensus layer (via the Capella upgrade).

The main goal is to enable withdrawals from the Beacon Chain. This includes both accrued rewards for stakers who wish to continue staking, and full withdrawals for stakers who wish to exit. Some other minor updates to the EVM (Ethereum Virtual Machine) are included, but the big goal is to enable staking withdrawals.

What was the purpose of the Edelweiss Interop? Who attended? 

Ben: Edelweiss is the third in a series of interop events (also known as “lock-ins”) that have proved to be very productive for the Ethereum core development teams. Our first took place in Ontario in September 2019, and involved around 30 devs from the consensus client teams. In October 2021, about 60 members of both the consensus and execution layer teams gathered in Greece for the Amphora workshop at which we prototyped the Merge. And, last month, 100 Ethereum core devs met at a remote resort in Austria to work on ironing out the final wrinkles in Shanghai–Capella, and standing up a test network for EIP-4844, which will be the next upgrade after Shanghai.

These events have proved to be exceptionally valuable. We develop our software and protocols in a distributed, decentralised way, but fundamentally it all needs to interoperate seamlessly. Gathering in-person at strategic moments to plug everything together substantially reduces the friction of working remotely, not least time zone lag. Being in the same room allows us to share information and iterate on difficult challenges much more rapidly.

One thing I love about these events is the enormous energy levels. It’s not always evident in the grind of day-to-day remote work, or while discussing minutiae on the core devs calls. But the Ethereum core devs are an incredible bunch: I find the buzz of cooperation and the sheer number of brilliant ideas floating around when we gather deeply encouraging and motivating.

Matt: Echoing Ben’s points, these events really speed up the time-to-delivery of crucial upgrades for Ethereum. While the topics in this case were focused around Shanghai-Capella and the next upgrades after that, many research areas were discussed. Following the Merge, the Ethereum protocol opened the flood-gates for changes in areas like scaling, censorship-resistance, user experience, and more. 

Being in person allows different groups to accelerate the designs of upgrades like changes to the EVM with EOF (EVM object format), statelessness and history expiry of the chain, and more user-facing topics like light Ethereum clients and account abstraction. The brain trust at this workshop was just incredible.

What scope of work was completed? 

Matt: EIP-4844, the beginning of a set of work known as sharding, is off to an exciting start. This EIP [Ethereum Improvement Proposal] is intended to help scale rollups and reduce costs for users on Layer 2 by storing data more effectively and cheaply on Ethereum for its rollups. The various client teams came to the workshop with most of the functionality completed. So, our goal was to set up local development networks where clients like Besu, Teku, Geth, Prysm, can all talk to each other, sync the chain, reach consensus, and, critically, share the data-blobs needed for this type of sharding.

The devnet was a success, with most clients participating, able to sync and validate blocks and blobs. Often, the key part of these interop events is just that: [to ensure] client interoperability. 

With the dev-net proceeding somewhat smoothly, the core devs are becoming more and more confident in mainnet EIP-4844 in the coming months.

People have been staking ETH since the launch of the Beacon Chain in December 2020 and there’s currently over 16M ETH, worth $25.3B, locked. What is the importance of staking withdrawals for the ecosystem that the Shanghai Upgrade enables? 

Matt: I hope that withdrawals will continue to drive demand for Ether and securing of the chain through staking. With the ability to un-stake ETH, those that may have wanted to stake, but were worried about the lock-up could now get involved. This may drive more demand for ETH to stake and see more validators staking on the network. Withdrawals might start with a short downtick in numbers as validators that want to exit their entire stake for a variety of reasons withdraw. Ultimately, the security in knowing one can exit their entire stake will likely drive more participation.

Another key component here is decentralization. One of the initial problems with staking was that once the stake was put up by a user, it was often locked or “stuck.” Users that value decentralization, but who staked with a centralized provider for one reason or another, could not move to a new provider prior to withdrawals. I hope that with withdrawals enabled, more users will choose options that have the long-term health of Ethereum in mind, and not just the centralized option (which is often the easiest).

After withdrawals, I hope to see competition on the staking side of things that focuses on user experience and decentralization, not just centralized providers giving the best returns and UX. I think this will be a hot area as users can freely move their stake from one service to another that is most in-line with their values. Choice is always good!

Mikhail: It’s a guarantee of getting locked funds back implemented in the code. Trust of the stakers in the Ethereum ecosystem enabled us to activate features gradually as they were implemented and step up to the PoS three years earlier than withdrawals were available. We appreciate users’ confidence and continue to work on Ethereum enhancements.

Will all validators be able to withdraw their staked ETH after the upgrade? 

Ben: There are two options: (1) continue to stake your 32 ETH, but have all your rewards [everything above 32 ETH] regularly paid out to your Ethereum account, or (2) exit from staking and have your whole stake and rewards paid out to your account.

These options only apply to validators that have 0x01 withdrawal credentials. Around 311K validators still have the old-style 0x00/BLS credentials and will need to send a message via their node to change to 0x01 before their withdrawals can happen.

What work was done to enable validators to switch their withdrawal key to ETH1 withdrawal credential? 

Ben: For most of the 311K validators still on old-style 0x00 credentials there is absolutely no hurry to change the withdrawal credentials to 0x01. I don’t plan to do this myself until weeks after the upgrade. Nevertheless, we do anticipate something of a rush, so we spent a lot of time testing how the network handles huge amounts of these credential change messages being launched at once, and client teams were able to agree on various strategies to control the impact of the extra load.

Some work was also done on the staking CLI tool to make it easier for stakers to create these withdrawal credential change messages. This is the same tool that many of us used to generate our original stakes, so should be somewhat familiar.

Why was EIP-4844 delayed in this upgrade?

Ben: In short, because it was not ready in time. There is a strong sense in the community that we must not delay the ability for stakers to withdraw their ETH, so we agreed a while ago to implement EIP-4844 in a fast follow-on upgrade. We are still iterating the design of EIP-4844 and made solid progress at the Edelweiss workshop. For example, we discussed a new design for how data blobs will be propagated around the network that might be friendlier to solo stakers.

Mikhail: EIP-4844 is a complex task which involves a lot of research, benchmarking and testing. Including it in Shanghai fork will delay [the latter’s] delivery, so our decision was to fulfill the promise we made in the Merge.

What can stakers and validators do to prepare for the Shanghai Upgrade?

Matt: Validators should make sure to check on their withdrawal credentials as mentioned by Ben above, especially those with 0x00 credentials. Solo-stakers should also follow closely their execution and consensus client upgrade cycles. Users will need to upgrade their staking software in order to enable withdrawals and to follow the chain after the Shanghai-Capella forks. Client teams like Besu and Teku share this information on Twitter and Discord

Additionally, stakers wishing to test out the functionality should stay tuned to the EthStaker community and Ethereum Foundation announcements. The Core Devs will be launching long-lived test nets where users can safely “practice” the withdrawals process. At some point before the hard fork upgrades, client teams will upgrade the Goerli and Sepolia test-nets with the Shanghai-Capella upgrades. Users may also test on these test-nets to ensure everything works without issue. As above, these will require client software updates to enable, so stay tuned.

The Ethereum Foundation also hosts community calls to provide useful information on upcoming upgrades and changes. This is a great venue for stakers and users to directly ask questions of core devs.

What comes after the Shanghai Upgrade

ConsenSys has been dedicated to the advancement of the Ethereum protocol since it was founded. We’ve contributed our people, products, and resources to drive its evolution – from proposing the executable Beacon Chain, to developing two Ethereum clients, Besu and Teku.

The next step, and an important one for scalability, in the Ethereum roadmap is the EIP-4844 upgrade, which is a first step towards sharding or data-sampling. Ethereum’s long-term plan for huge scalability is to introduce ways to verify huge amounts of data without overloading individual validating nodes. EIP-4844 implements some of the key new cryptographic work that’s needed to do this, while providing some intermediate level scaling. In future we will build on this to provide massive scalability at Ethereum’s base layer while continuing to support radical decentralization.

Keep up with the Ethereum roadmap on the ConsenSys Merge Hub

How Proof of Stake Will Make ETH Ultra-Sound Money | ConsenSys

https://consensys.net/blog/news/how-proof-of-stake-will-make-eth-ultra-sound-money/

Justin Drake of the Ethereum Foundation and Ben Edgington, Teku Product Lead at ConsenSys are both deeply involved in the Merge, Ethereum’s transition to Proof of Stake.

Justin Drake is widely known across the Ethereum ecosystem for his research that informed the Merge specifications. Today he’s focused on security and thinking through the potential attacks Ethereum could be vulnerable to post-Merge.

Ben Edgington has also been part of building “Ethereum 2.0” since it was just a vision; you can read all about that in his Devs Behind the Merge profile. You may already know Ben from his blog, What’s new in Eth2, where he’s been posting bi-weekly updates about the Merge for the last 3.5 years. 

ConsenSys Community Lead, Francesco Andreoli caught up with both of them at Devconnect to get their insight into how Proof of Stake will upgrade Ethereum and position ETH to become more sound and secure money. Check out their discussion in the below video to learn about: 

  • What is ultra-sound money? 
  • How the updated economics of Ethereum post-Merge will secure the network and its native token, ETH, as an improved foundation for DeFi protocols.   
  • How ETH issuance will change as new supply is minted to cover the energy costs incurred by validators. Post-Merge we’re entering a world of decreasing ETH supply. 
  • How with Proof of Stake Ethereum’s security will come directly from the value of staked ETH. As supply decreases, demand for ETH as collateral will grow. 
How the Merge will make ETH sound and secure money
Keep up with Merge and Proof of Stake updates

For regular updates and news on the Merge, visit the ConsenSys Merge Knowledge Base, where you’ll also find Ethereum 2.0 archives with key milestones achieved and other essential resources for developers.

The Merge Is Done. What’s Next for the Ethereum Ecosystem? | ConsenSys

https://consensys.net/blog/news/the-merge-is-done-whats-next-for-the-ethereum-ecosystem/

Just after 3am in the morning on September 15th, 2022 the Ethereum community made history. After seven years of relentless work across this ecosystem, the Ethereum Merge was successfully completed. Ethereum is now using Proof of Stake and its implications for not only the blockchain, but the world are profound: the merge will reduce the worldwide electricity consumption by 0.2%. No other technology in history has reduced its energy usage to this extent. From darkness, to twilight, the new dawn of Ethereum starts today. We at ConsenSys will forever cherish this moment with gratitude and hope. 

We are grateful to the core devs like Ben Edington, Mikhail Kalinin, Adrian Sutton, and others from the Ethereum Foundation and around the world who persistently saw the transition to Proof of Stake through. And while congratulations are in order, the Merge is also the beginning of a new phase of Ethereum’s development. In this blog we describe what’s next for Ethereum’s protocol development.

At EthCC in Paris this past July, Vitalik explained the next phases of making Ethereum more scalable, private, and secure  — upgrades he’s calling the Surge, Verge, Purge, and Splurge. (Nice alliteration, Vitalik.) Below is a diagram of the Ethereum protocol development roadmap shared by Vitalik in this tweet that outlines each upgrade: 

Each of these upgrades will not necessarily follow one after the other. They are fairly independent and are being worked on in parallel. The order of rollout of these upgrades has not yet been decided, but the work is happening simultaneously as you read this. 

According to Vitalik, after these upgrades, Ethereum will be capable of processing “100k TPS”. He also said that each phase will be 55% done post-merge. 

Let’s review each phase in detail to sustain today’s momentum. 

The Merge 

TLDR: This just happened! Ethereum now confirms transactions with a Proof of Stake (PoS) consensus mechanism. 

PoS reduces Ethereum’s energy consumption by ~99.98%, making the blockchain more sustainable as we move towards mass decentralization. This is important because as the network grows, it must be environmentally sustainable and now, it is. 

The merge will also make Ethereum more scalable by introducing sharding for improved throughput. 

The transition to PoS also improves security by allowing individual validators – anyone with an internet connection and an ETH balance – to stake from home and validate a portion of the network. This shift in approach makes ETH a more secure collateral foundation for individual and institutional users alike. 

To keep learning about the implications of the Merge you can visit the ConsenSys Merge Knowledge Base

The Surge

TLDR: Post-merge Ethereum’s scalability will be greatly improved by sharding. 

Now that Ethereum runs on a PoS consensus mechanism, builders will be able to start using a form of data partitioning to improve throughput, called sharding. Sharding is a horizontal scaling technique common among other major database providers. 

Sharding involves splitting a blockchain into multiple pieces, or “shards,” and storing them in different places. Here is a visual example of sharding on the Beacon Chain: 

No alt text provided for this image
Source: https://ethereum.org/en/upgrades/sharding/

By storing the data across different networks, the computational burden of Ethereum is reduced which improves latency and allows the network to process a larger volume of transactions, faster: 

The Verge

TLDR: Storage is optimized through Verkle Trees that can increase validators on the network. 

What Vitalik was referring to with “The Verge” is that PoS transitions data storage systems from Merkle trees to Verkle trees. These are the database patterns that provide pathways to all the data on the Ethereum blockchain. 

Verkle trees serve the same function as Merkle trees – store a large amount of data for someone else to verify who has the root of the tree. What makes Verkle trees special is that they are more efficient in proof size which in turn reduces node size. This reduction allows for stateless clients to finally be viable. Stateless client execution is a major upgrade to layer one blockchains like Ethereum and will provide the ability to validate execution blocks without having a full account state. 

This will make validation more scalable, faster, easier to set up, and further decentralize the network, because more validators can join now that they will not have to store extensive amounts of data to participate. 

The Purge

TLDR: Excess historical data will be purged.

This reduces network congestion and hard drive space requirements for validators.

Similar to the verge, the purge cuts down the amount of space you have to have on your hard drive to participate in the network. This upgrade simplifies the Ethereum protocol over time by eliminating the need for nodes to store historical data and thus technical debt. Here is a visual example of this upgrade’s network process: 

No alt text provided for this image

As you can see, not all nodes have to permanently store all of the historical blocks. Instead, clients will stop storing historical data that is more than one year old. This means that hardware requirements for nodes will decrease and the bandwidth of the network will reduce.

The Splurge

TLDR: With the transition to PoS successfully implemented, the bulk of the work is done. 

Now there’s time to work on what Vitalik calls “the fun stuff.” This involves smaller updates and maintenance to ensure everything runs smoothly. These are miscellaneous upgrades that should simplify the use of Ethereum and make it more accessible to an average user.

Ethereum 2025

As Ethereum’s transaction capabilities increase, so does its potential to be a major global settlement layer for finance and different types of information. By 2025, Ethereum will look more like a cluster of layer 2 blockchains, data availability protocols, and side-chains or other Layer 1 blockchains. However, execution, consensus, and data shards will still stay within the Ethereum mainnet.

All of the layer 2 options around it will create bridges and proofs to the mainnet execution layer. The purpose of having L2s is to link the security and certainty of mined TXs back into Ethereum mainnet. Meaning that Ethereum acts as a settlement for all these chains.

The below visual created by, emkoscp, illustrates what Ethereum could look like in 2025: 

In 2025 Ethereum will be a global settlement layer for different transactions and assets. The execution, consensus, and data shards will still stay within the Ethereum mainnet.  All of the layer 2 options around it will create bridges and proofs to the mainnet execution layer. I like this diagram because it actually describes the type of solution by seeing what the arrows connect to.  The whole point of having L2s is to link the security and certainty of mined TXs back into Ethereum mainnet. Meaning that Ethereum acts as a settlement for all these chains.
Source: https://www.reddit.com/r/ethereum/comments/pgcacb/a_vision_of_ethereum_2025/

Top left: Validium architecture has separate external data (so data isn’t stored on mainnet), but uses zero-knowledge proofs to bridge information.

Bottom left: Side-chains like Polygon’s Matic network and alternative layer ones like Solana will bridge to the execution layer by creating wrapped tokens or trusting a relay to convert tokens to mainnet or viceversa.

Top right: Rollups at the top are both connecting to the execution layer, saving data into the data shards, and executing transactions. Examples of live rollups today are Optimism and Arbitrum.

Bottom right: Volitions, which are fairly new, are similar to ZK-rollups, but commit state roots and proofs to Ethereum. Unlike a ZK-rollups that also post transaction call data exclusively to Ethereum, a volition lets users choose their alternate data availability solution. This means that all users and applications can share the same state root.

Long live Ethereum 

Just after 3am in the morning on September 15th, 2022 the Ethereum community made history. Now more than ever there is so much to look forward to in this ecosystem and while we can’t say when all these upgrades will happen, we can say we believe they will, because we believe in the future of the Ethereum blockchain. Long live Ethereum!

Visit the ConsenSys Merge Knowledge Base to keep learning about PoS. 

Devs Behind The Merge: Mikhail Kalinin | ConsenSys

https://consensys.net/blog/news/devs-behind-the-merge-mikhail-kalinin-lead-researcher-at-consensys-rd/

For me the Merge began in 2015, a month before the launch of Ethereum mainnet. At that distant time, I had joined a small startup and was working on one of the first Ethereum clients. After the startup closed, I started prototyping Hybrid Casper FFG for a Java client with Dmitry Shmatko, where we met Danny Ryan for the first time.

Forming the first Beacon Chain working group

I didn’t know it at the time, but we were forming the original Beacon Chain team and were granted permission by the Ethereum Foundation (EF) to continue our work on a fully featured Beacon Chain client in Java. With the progress on what was then called “Eth2,” the first Merge designs authored by Vitalik began to appear. At that time, the plan was to make the Ethereum mainnet one of 64 shards.After working for a year, a big event took place for our  work on Beacon Chain during the Fall of 2019.

Interop Lock-In

Seven teams working on Beacon Chain clients gathered together in Canada for an offsite called, Interop Lock-In with the goal of meeting in person and advancing our work as a team.

During the week we spent together at Interop Lock-In, we made a huge step towards delivering the Beacon Chain. Thanks to Joe, as well as Johnny Rhea and Ben Edgington, the entire team joined ConsenSys and formed the TXRX R&D team under Joe’s leadership. I would like to express my gratitude to Joe, Johnny, and Ben for their efforts to bring our teams together, and a special thanks to the Ethereum Foundation for their support over the year and a half leading up to this event. It was a lot of fun and very productive!

From then on at ConsenSys R&D, I was under the excellent guidance of Joe Delong and began to work closely on the Merge. I immediately love the idea, because I had deep knowledge on both mainnet and the Beacon Chain that I’d learned while working on the clients of these networks. The value of upgrading Ethereum to PoS, the complexity of the design, and the challenges associated with it greatly fueled my interest and curiosity.

The first forms of PoS

By the time I started working on Merge, several articles had been written on this topic; good examples are posts by Vitalik Buterin and Alex Stokes. At that time, there was an idea to use the Beacon Chain as a Finality gadget for mainnet and the analysis of this design was my first work on a given topic. There was also an idea of a direct transition to PoS as well, bypassing the Finality gadget stage published by Vitalik.

As a result of my initial research, I decided to create a prototype on Teku, in which one of the Eth2 shards was used to store data of the Execution chain. At the same time, Danny Ryan published an article on the separation of concerns between execution and consensus clients. Guillaume Ballet helped a lot with the prototype by creating Catalyst – the first prototype of the Execution Layer client. By this time, we started to have regular calls on the Merge, mostly to coordinate our efforts. The prototype was created and we moved on.

The roll-up centric roadmap & Beacon Chain launch

After some time, Vitalik published the Rollup-centric roadmap that started to make sense, because of the progress on rollups and the Merge, which moved us away from the idea of executable shards.

In one of the channels we used back in those days, we discussed the idea of moving an execution payload from a shard to the Beacon Chain. With this idea in mind, I published the Executable Beacon Chain Proposal, with key points that are included in the current design of Merge today.

Almost simultaneously with this proposal, the deposit contract was deployed and the Beacon Chain was launched! After publishing the proposal, I updated the Teku prototype, and consequently created the first prototype of the Consensus Layer clients. Next, Guillaume and I presented the Executable Beacon Chain and post-Merge client architecture at the R&D workshop hosted by the Ethereum Foundation.

There was a concern from Martin and Peter from the Geth team on plans to deprecate mainnet at the Merge, which would break an invariant of serving the chain’s history and significantly affect client sync algorithms. 

After the presentation, the idea of simply replacing the PoW consensus engine with the Beacon Chain and leaving everything else as it is came to my mind. I discussed this idea with Danny and Tim on one of the calls. There was a general consensus that this approach was reasonable, and starting from that moment, a high-level design of PoS Ethereum was settled upon.down. A huge amount of work on figuring out the details and writing specifications came next. 

Contributing to Merge specs

I will never forget my first major spec contribution. At the same time, Vitalik published the Quick merge proposal, which described the mechanism of transition to PoS that gave us the Terminal Total Difficulty as the only correct trigger to upgrade the network. I adjusted my version of the Consensus specs with Vitalik’s work, and we had a nearly final version of the entire design, including the Merge transition itself that allowed  for a seamless transition to PoS. This was a very important UX goal that we had from the very beginning.

Next was Rayonism, with Diederik Loerakker (Proto) behind the idea of this project, whom we all know for his outstanding contribution to the specification and design of the Beacon Chain. 

Proto created many tools and spent a lot of his time working on Rayonism, which resulted in the launch of the first multi-client devnet. I am very grateful to him for this project, starting from picking up the name, continuing with the development coordination, his work on the tooling, block explorer, and monitor fork patches, and just for the great working atmosphere we had there. It was an exhausting two weeks, but the result paid off all the efforts. The most important outcome of this project was participation of all Consensus layer  and Execution layer client teams. For the first time the Merge specs and design got so much attention from client developers, who made first prototypes of their client’s feedback on the Merge. The initial version of the Engine API allowing both types of CL clients to communicate with each other were also designed during Rayonism.

After Rayonism, work on Merge began to develop like a snowball, involving more and more developers and community attention. In the summer of 2021, a lot of work was done on the specifications. EIP-3675  was the first one with my co-authorship and Engine API specifications were also written during that time. Also, my teammate Dmitry Shmatko published his analysis on Terminal total difficulty as a trigger for the Merge upgrade on Mainnet.

Regrouping in Greece

Then, we had the Amphora Interop meet up  in Greece. By that time two years had passed  since Interop Lock-In in Canada and it was great to again gather all in one place to take a step towards one of the biggest and the most important goals in the history of Ethereum. There were a lot of new faces, great talks and an exciting atmosphere. I am very grateful to sponsors, organizers, and participants who made that meet up happen. In the evening of the last day of the event the first persistent devnet was launched – a great result of a week of rapid spec and software development. I would like to say special thanks to Parithosh Jayanthi and Proto who worked on the testnet infrastructure setup that we still use today to launch various devenets and testnets. Also, Matt Garnett’s Mergemock and general Merge testing effort started by Marius are other great outcomes of the Amphora week. 

After the interop, we accomplished the Kintsugi testnet and currently are at the end of the Kiln sprints. And now, when the specification is considered final and only allows minor changes, or critical fixes, when EIPs are in the Review stage we will be ready to start forking existing testnets and means the Merge is coming! I am very excited and looking forward to it!

From R&D to real impact

My story of working on Merge is an example of true diversification and decentralization of work on an R&D project. This is the right way of doing sophisticated projects that involve a huge amount of complexity in a living ecosystem worth billions of dollars. 

It’s important that diversification be reflected by mentioning the names of the developers and researchers who’ve contributed to the Merge in one way or another in my blog. But even more of these names remain outside the scope of this document. To those unnamed, thank you for your work!

Thank you for your support

It’s been a long journey and I am very grateful to all those who’ve helped me develop my passion about the Merge into an incredible project with an even greater purpose, which is near to be shipped!

Many thanks to ConsenSys R&D who have enabled me to do this work from day one, supported me, and encouraged me in every possible way.

In particular, I want to thank  my team for the numerous discussions, brainstorms, and diverse support and to the Ethereum Foundation Researchers, who have been a huge help for the Merge project along the way. 

Let’s Merge!

For regular updates and news on the Merge, visit the ConsenSys Merge Knowledge Base, where you’ll also find Eth2 archives with key milestones achieved and other essential resources for developers.

ConsenSys Acquires HAL to Augment Infura’s Blockchain Notification and Automation Capabilities

https://consensys.net/blog/press-release/consensys-acquires-hal-to-augment-infuras-blockchain-notification-and-automation-capabilities/

New York, February 21st, 2023 — Today, ConsenSys announced the acquisition of HAL, a no-code blockchain development tooling platform that helps individuals and organizations query and automate blockchain data. With this acquisition, Infura, the world’s leading Web3 API provider from ConsenSys, will extend capabilities in its developer stack by using the strong configurable webhooks/notification service built by HAL. This integration will allow developers to create alerts and notifications at the protocol level for various signals.

HAL is a blockchain data listening and automation platform with automated workflow tools (i.e. notifications) across email, Discord, Slack, Telegram, and Twitter including:

  • Digital assets trading: Track wallet, liquidity levels, tokens and NFT prices, relevant swaps, and collateral health
  • Decentralized governance: Boost DAOs’ engagement through notifying the community about upcoming voting.
  • Blockchain compliance: Track crypto activities for tax purposes and push data from blockchains to centralized IT systems.

“Infura has been investing in tools and features that will strengthen the developer experience and fill the gaps in the building process. Enabling developers a seamless end-to-end experience is a key goal and one of the most important trends is low code / no code solutions. Hal is a great fit for Infura as it allows users to access more than 40+ higher level APIs for blockchain / on-chain listening and signals”, said Eleazar Galano, co-founder of Infura. “This integration means a step forward in Infura’s plan to evolve beyond the leading RPC provider and become a leader in blockchain development tools,” Galano added.

The announcement signals a major step in the acceleration of ConsenSys’ vision to continue developing its core product suite and building better systems for a decentralized future. 

The acquisition of HAL by ConsenSys comes just one year after the company acquired MyCrypto to team up with the market-leading Web3 wallet, MetaMask. The plan is for HAL to build on the user experience improvements that have come in the wake of the MyCrypto acquisition and enable MetaMask to offer a dynamic, personalized notification system, which should help drive engagement throughout the ecosystem. 

In ’22 and ’23 ConsenSys has witnessed modularization, growth, and maturation of the Ethereum ecosystem. The company continues to be on the lookout for strong acquisition opportunities and is actively tracking many of the most exciting projects in the space in niches like wallet security, account abstraction, various aspects of MEV, Layer 2 scalability, privacy, Web3 Components (e.g. identity, verifiable credentials, NFTs) and more.

The 10 talented HAL employees joining ConsenSys team will bring their experience in low-code/no-code development solutions to bolster the Infura product suite. This will extend Infura’s capabilities in higher order APIs, while offering a new level of composability for developers to create “recipes” for notifications which can be helpful for their team or users. In sum, HAL will provide Infura with unique technical expertise on designing and implementing effective blockchain automation and notification solutions.

“Since day one, we believed bridging Web3 and Web2 is paramount to improve blockchain user experience, reach less technical people, scale blockchain to mass adoption and fulfill the trustless, people-empowering Web3 vision we are all excited about,” said Marco De Rossi, President and co-founder at HAL. “Joining our efforts with ConsenSys is the way to tremendously accelerate the impact of HAL technology by bringing it to millions of users,” De Rossi added. 

Contact: [email protected]

ABOUT CONSENSYS

ConsenSys is a leading Ethereum and decentralized protocols software company. We enable developers, enterprises, and people worldwide to build next-generation applications, launch modern financial infrastructure, and access the decentralized web. Our product suite, composed of Infura, Quorum, Codefi, MetaMask, MetaMask Institutional, Truffle, Diligence, and our NFT platform, serves millions of users, supports billions of blockchain-based queries for our clients, and has handled billions of dollars in digital assets. Ethereum is the largest programmable blockchain in the world, leading in business adoption, developer community, and DeFi activity. On this trusted, open-source foundation, we are building the digital economy of tomorrow. To explore our products and solutions, visit https://consensys.net/.

ABOUT HAL

HAL.xyz is a low-to-no-code platform that helps individuals and organizations to query and automate blockchain data. HAL is transforming the digital assets journey. Listen. Automate. Notify. For trading, governance, compliance and security. HAL’s seed investors include CoinFund, Eden Block, Brevan Howard, Animoca Brands, Gerstenbrot, Hashkey, imToken, SkyVision, Wintermute, Julien Bouteloup and Bitcoin.com.

Related Posts ( 2 )

ConsenSys partners with Mercuryo to offer seamless crypto purchases within MetaMask

https://consensys.net/blog/press-release/consensys-partners-with-mercuryo-to-offer-seamless-crypto-purchases-within-metamask/

London, United Kingdom, February 16, 2023 – ConsenSys, a market-leading Web3 company and Mercuryo, a leading crypto payments company, have announced an integration within MetaMask that will allow MetaMask users to bypass mainstream exchanges and buy crypto tokens with bank cards, Apple Pay, and various bank transfer methods directly in their wallets. This aims to simplify purchasing digital assets thanks to instant checkouts and easier user onboarding.

Inspired primarily by users with little experience in crypto, the partnership would also benefit those looking for a quick and easy way to restock their portfolio. As a result, MetaMask users will be able to buy popular tokens and coins and with two dozen fiat currencies. 

Petr Kozyakov, CEO of Mercuryo, comments:
“Collaborations with market leaders like MetaMask are an exciting opportunity for Mercuryo to help more people experience cryptocurrencies in the easiest way possible. Instead of opening yet another new account at one of the exchanges, the users can manage their digital assets on a single platform. We always put customers and their convenience first when enhancing business services with our products.”

Purchasing crypto tokens can often be time-consuming, requiring identity verification and clearing banking details. Mercuryo’s product streamlines this process by allowing MetaMask users to purchase up to €699 in crypto in 5 easy steps without needing full identity verification. To purchase crypto through MetaMask, users need to log in to the app, tap on “Buy” and select the payment method, input the desired amount and token, review quotes and choose one from Mercuryo, and complete the transaction by following the link to the Mercuryo website.

Since launching in 2016, MetaMask has been on a mission to democratize access to the decentralized web and ensure easy access to cryptocurrency by providing on-ramp functionality with well-established payment providers, varying by region. The MetaMask and Mercuryo push is the latest in a series of integrations aiming to improve and diversify user payment options.

“Our integration with Mercuryo helps streamline onboarding and the process of acquiring digital assets, including the option to purchase up to €699 in crypto without complex identity verification,” said Lorenzo Santos, Product Manager for MetaMask. “This enables our users to seamlessly explore the Web3 ecosystem, including NFT marketplaces, play-and-earn games, decentralized autonomous organizations (DAOs), decentralized finance (DeFi) applications, and metaverse worlds.”

Fiat currencies supported:

  • EUR – Euro
  • USD – US dollar
  • GBP – British pound
  • TRY – Turkish lira
  • JPY – Japanese yen
  • BRL – Brazilian real
  • NGN – Nigerian Naira
  • VND – Vietnamese Dong
  • MXN – Mexican Peso
  • KRW – South Korean won
  • PLN – Polish zloty
  • SEK – Swedish krona
  • CHF – Swiss franc
  • CAD – Canadian dollar
  • CZK – Czech koruna
  • DKK – Danish krone
  • BGN – Bulgarian lev
  • HKD – Hong Kong dollar
  • AUD – Australian dollar

Crypto currencies supported:

  • Ethereum (ETH)
  • Basic Attention Token (BAT ERC-20)
  • Tether (USDT ERC-20)
  • OKB (OKB) (ERC-20)
  • Dai (DAI). (ERC-20)
  • Toncoin (TON)
  • Binance coin (BNB BEP20)
  • Binance USD (BUSD BEP20)
  • 1inch token (1INCH BEP20)
  • Avalanche (AVAX C-Chain network)
  • Polygon (MATIC)
  • USDC (USDC TRC-20)
  • Fantom (FTM)
  • Dogecoin (DOGE)
  • Decentraland (MANA ERC-20)
  • The Sandbox (SAND ERC-20)
  • Curve DAO Token (CRV ERC-20)
  • DYDX (DYDX ERC-20)

Media contact: [email protected]  and [email protected]

About ConsenSys
ConsenSys is a leading Ethereum and decentralized protocols software company. We enable developers, enterprises, and people worldwide to build next-generation applications, launch modern financial infrastructure, and access the decentralized web. Our product suite, composed of Infura, Quorum, Codefi, MetaMask, MetaMask Institutional, Truffle, Diligence, and our NFT platform, serves millions of users, supports billions of blockchain-based queries for our clients, and has handled billions of dollars in digital assets. Ethereum is the largest programmable blockchain in the world, leading in business adoption, developer community, and DeFi activity. On this trusted, open-source foundation, we are building the digital economy of tomorrow. To explore our products and solutions, visit https://consensys.net/.

About Mercuryo
Mercuryo is a global payments infrastructure platform, reinventing the ease of making payments by providing businesses from both the fiat and crypto worlds with a wide range of financial services and products, accessible through single API integration. Since its inception in 2018, Mercuryo has been developing a holistic fintech platform with several products including BaaS (Banking-as-a-Service), CaaS (Crypto-as-a-Service), On-Off Ramps, Pay In-Out; and secured partnerships with over 200 crypto companies, working with leading industry players such as Trust Wallet, Ledger, Trezor, 1inch, Gate.io, Nexo, OKX, Bitcoin.com and Bybit.