TRON Industry Weekly Report: BTC May Test $93,000 Support Level, Shared Security Protocol Symbiotic Secures Significant Funding
# I. Outlook
## 1. Macroeconomic Summary and Future Predictions
Last week, there were some significant changes in the macroeconomic landscape in the United States. Gold prices fell by more than 1% and experienced a downward trend throughout the week, marking the first weekly decline since the announcement of reciprocal tariffs. Additionally, due to the impact of U.S. tariff policies, several American companies were affected, with Stellantis and General Motors suspending their profit growth forecasts for 2025 on April 30 and April 29, respectively. These signs indicate that the current macroeconomic environment in the U.S. is facing certain challenges.
In the future, the market is still trying to find certain investment opportunities. Furthermore, it is expected that this uncertainty caused by tariffs may affect corporate profit forecasts and could lead to more companies reassessing their annual guidance. At the same time, considering that the IMF recently lowered its global economic growth forecast to 2.8%, this suggests that global economic growth, including that of the U.S., may remain at a lower level for some time.
## 2. Market Movements and Warnings in the Crypto Industry
Last week, the crypto industry experienced several important changes. Bitcoin, despite some volatility, maintained a relatively stable trend, continuing to oscillate at high levels. However, for altcoins, the performance was more divergent, with only a few projects achieving significant price increases, while most remained in a state of oscillating decline.
As we enter this week, market participants should focus on the latest interest rate decision to be announced by the Federal Reserve early Thursday morning, as well as the subsequent remarks by Fed Chair Powell. This interest rate decision and Powell's statements may provide new guidance for future monetary policy paths and become an important indicator affecting global financial markets and crypto asset prices.
3. Industry and Sector Hotspots
Inco has achieved a $5 million lead investment from A16z and Coinbase, utilizing FHE technology for a modular L1 chain; Catalysis is building the first secure abstraction layer, providing developers and node operators with a seamless, unified solution by abstracting the complexity of shared security mechanisms; Symbiotic is a shared security protocol aimed at creating an economically secure market. It allows networks in need of security to obtain security guarantees from parties holding assets for staking, thereby creating an efficient ecosystem.
# II. Market Hotspot Sectors and Potential Projects of the Week
## 1. Performance of Potential Sectors
1.1. How Inco, a modular L1 chain utilizing FHE technology, is achieving Web3 democratization with a $5 million lead investment from A16z and Coinbase
Inco is a modular Layer-1 blockchain that uses fully homomorphic encryption (FHE) to provide confidential computing, enhancing on-chain privacy and scalability for developers and users in the Ethereum ecosystem. Inco focuses on democratizing liquidity access and promoting the adoption of Web3, providing a seamless, privacy-focused experience for creating innovative decentralized applications (dApps) across various domains, including gaming, DeFi, payments, governance, and identity management.
Inco has two core protocols: Inco Lightning and Inco Atlas. Inco Lightning uses trusted execution environments (TEEs) to provide verifiable confidential computing and operates at high speed. It introduces new private data types, operations, and access controls, allowing smart contracts to securely handle sensitive data. There is no need to create a new chain or a new wallet. Developers can start building privacy-preserving decentralized applications (dApps) simply by importing our Solidity library.
Inco Atlas is supported by fully homomorphic encryption (FHE) and multi-party computation (MPC) and is expected to be released in the near future.
++Architecture Overview++
The architecture of Inco consists of four main components that work together to provide confidential computing capabilities:
- Smart Contract Library
- Confidential Compute Nodes
- Decryption Nodes + Callback Relayers
- Client-side JavaScript Library
These components work together to provide developers with a seamless experience, enabling them to build privacy-preserving applications on the blockchain. The system handles encrypted data types, performs confidential computations, and manages secure decryption processes while maintaining compatibility with existing EVM blockchains.
- ++Component Introduction++
Smart Contract Library
This library extends the EVM to support encrypted data types and operations. Deployed on the main chain, it provides the following functionalities:
- Encrypted Data Types: ebool, eaddress, estring, euint32
- Arithmetic Operations: add, e.sub, e.mul
- Comparison Operations: eq, e.le, e.gt
- Conditional Operations: select
- Decryption Operations: asyncDecrypt
This library enables developers to write smart contracts that support encrypted data processing directly without modifying the underlying blockchain.
Confidential Compute Nodes
Confidential compute nodes operate within trusted execution environments (TEEs) and are responsible for executing encrypted computation tasks. Each node has the following functionalities:
- Run Inco's computation binaries in a secure TEE environment
- Handle encrypted operations based on blockchain events
- Verify access control before executing decryption
Decryption Nodes + Callback Relayers
Multiple decryption nodes operate under a TEE consensus mechanism, ensuring the security and verifiability of the decryption process. The entire decryption process is as follows:
- Listen for on-chain decryption requests
- Forward requests to the TEE decryption network
- Collect signed decryption results from the network
- Write the decryption results back to the chain via callback transactions
The on-chain verification mechanism ensures that all decryption proofs come from a trusted set of decryption nodes.
Client-side JavaScript Library
This library provides user-side functionalities to interact with the main chain and the Inco network:
- Encrypt user input data using the network public key
- Handle one-time key and EIP-712 signature generation (for re-encryption requests)
- Locally decrypt and display computation results for users
Through these four components, Inco has built a complete end-to-end privacy-preserving computing framework that is EVM-compatible, enabling Web3 developers to easily implement privacy-preserving dApps.
- ++Decryption Mechanism++
Inco provides two types of decryption mechanisms:
Re-encryption: For Private Viewing of Data
This is suitable for scenarios where users wish to privately view their confidential data:
- The user signs an EIP-712 message to prove ownership of their wallet
- The client generates a temporary key pair (ephemeral keypair)
- The user sends a decryption request containing the signed message and temporary public key
- The decryption node verifies the signature and checks access control
- The decryption node uses the user's provided temporary public key to re-encrypt the data, ensuring that no information is leaked during transmission
- The user uses the temporary private key to locally complete the decryption and view the result
On-chain Decryption (Public Decryption)
This is suitable for scenarios where the decryption results need to be made public on-chain:
- The smart contract calls asyncDecrypt(encryptedValue) to initiate the decryption request
- The decryption network listens for decryption events on the blockchain
- The decryption network queries the Access Control List (ACL) to verify permissions
- Each decryption node decrypts the ciphertext and signs the decryption results
- The callback relayer collects enough signatures and submits the results to the smart contract via callback transactions
- The smart contract verifies these signatures and continues executing logic using the decrypted values
This mechanism is suitable for scenarios that require data to be made public to the entire network, such as on-chain voting results, fair game logic, or public financial information.
++Commentary++
Inco is a modular Layer-1/Layer-2 scaling solution designed with a privacy-first philosophy. Through TEE and future FHE support, it empowers developers to build truly private smart contracts while ensuring EVM compatibility.
It is particularly suitable for Web3 applications that need to handle sensitive data, but attention must still be paid to its reliance on TEE, performance optimization, and the further refinement of decryption governance mechanisms.
1.2. What makes Catalysis, a decentralized protocol aiming to create a secure abstraction layer with $1.25 million in funding, special?
Catalysis is building the first Security Abstraction Layer to aggregate and unify the economic security of various shared security protocols.
By abstracting the complexity of shared security mechanisms, Catalysis provides developers and node operators with a seamless, unified solution to help them build and manage decentralized networks, such as AVS (Active Verification Service), BVS (Base Verification Service), and DVN (Decentralized Verification Network).
++Feature Analysis++
++++
The Catalysis Network is built on three core components:
- Networks: Decentralized services, protocols, and applications (AVS) that utilize shared security for verification and decentralized operation.
In the Catalysis ecosystem, a Network refers to any decentralized protocol that provides custom off-chain operation verification mechanisms. A Network consists of on-chain verification contracts and an off-chain operator network. The off-chain part includes client software run by network operators and verification logic specific to that network.
Operators execute services on behalf of the Network and submit evidence of their execution to the on-chain network contract. Operators play a crucial role in ensuring the integrity of the network:
- If operators perform tasks correctly, the Network can issue rewards;
- If operators engage in malicious behavior, their staked assets may be penalized by the Network (penalty reduction, i.e., slashing).
Different re-staking ecosystems refer to these Networks by different names:
EigenLayer: Autonomous Verifiable Service (AVS)
Symbiotic: Network
Satlayer: Bitcoin Validated Service (BVS)
Jito: Node Consensus Network (NCN)
Kernel: Dynamic Validation Network (DVN)
Node Operators: Entities that run network software and perform verification tasks, using the Catalysis tech stack to ensure network security through re-staking protocols.
Node operators are the backbone of the Catalysis Network. They are the "engines" running the AVS infrastructure, providing economic security for the entire network.
Catalysis brings significant advantages to node operators by streamlining the management of AVS infrastructure across multiple re-staking platforms, making operations more efficient. With the Catalyst-CLI tool, operators can seamlessly manage their AVS configurations through a unified interface. This integrated solution eliminates the need to deploy infrastructure separately for each platform, saving a significant amount of time and effort.
A key advantage of Catalysis is its substantial reduction in DevOps engineering costs, which not only lowers development expenses but also enables node operators to easily scale their AVS management capabilities, supporting thousands of services with minimal additional investment.
Moreover, Catalysis allows node operators of all sizes to participate in the operation of AVS infrastructure, no longer exclusive to large institutions. This inclusivity enhances the decentralization of the node operator pool, effectively addressing the increasingly prominent centralization issues in the current re-staking ecosystem.
- Re-staking Protocols: Also known as shared security protocols, allow stakers to re-stake assets (such as LSTs, ERC-20 tokens, etc.) to provide security guarantees for network verification. These protocols act like a market, connecting networks, node operators, and stakers.
Shared Security Protocols (SSPs) create a market for economic security, enabling decentralized networks to obtain security guarantees from stakers.
They serve as a coordinating layer, connecting three core participants:
- Stakers → Provide economic security by delegating assets and maximizing returns.
- Node Operators → Run network infrastructure and expand into high-value decentralized service areas.
- Networks → Obtain security guarantees through re-staked assets.
Catalysis brings significant advantages to shared security protocols by aggregating demand and acting as a distribution channel, creating a more competitive and equitable environment for these platforms. One key feature is that Catalysis breaks down barriers between platforms, allowing various re-staking protocols to compete fairly based on their product advantages in cost and performance. This also creates opportunities for emerging protocols to rise.
Catalysis encourages more projects to deploy as Networks by simplifying the onboarding process, thereby promoting the development of the entire ecosystem. As more Networks are attracted, both Network teams and SSPs can benefit from the increasing participation, achieving a win-win situation.
In addition to driving adoption rates, Catalysis also helps SSPs provide better functionalities and more reliable economic security guarantees, making their platforms more attractive to Networks seeking robust security. The influx of high-quality Networks further enhances the robustness and value of these protocols, laying a solid foundation for building a vibrant and competitive ecosystem in the future.
++Commentary++
Catalysis is a highly innovative coordinating protocol dedicated to bridging and optimizing the multi-chain re-staking ecosystem. Its greatest highlight is enhancing the scalability, manageability, and decentralization of AVS, while opening new growth channels for SSPs. Although it still faces challenges in technology and ecosystem building, its design philosophy aligns with the key pain points and future trends in the current re-staking field, demonstrating strong development potential.
## 2. Detailed Overview of Projects to Watch This Week
2.1. A Detailed Look at How Symbiotic, a Shared Security Protocol Backed by Pantera, Coinbase, and Aave with $29 million in Funding, Attracts VC Attention
++Introduction++
Symbiotic is a shared security protocol aimed at creating an economically secure market. It enables networks in need of security to obtain security guarantees from parties holding assets for staking, thereby creating an efficient ecosystem where staking can be shared and utilized across multiple networks. Through its flexible architecture, staking providers can maximize their returns while networks can obtain the security guarantees they require.
++Architecture Overview++
- Core Participants
- Stakers - Entities that provide assets to earn rewards through staking deposits. They can be individual token holders, institutions, or liquidity (re)staking protocols. Stakers deposit funds into a dedicated smart contract (staking vault) managed by curators, who are responsible for managing delegation decisions.
- Networks - Systems that require economic security to operate safely. These can be Layer 1 blockchains, Layer 2 solutions, or other decentralized systems that need staking-based security guarantees.
- Operators - Professional entities that maintain network infrastructure, responsible for running validators, nodes, or other required systems. Operators receive staking allocations based on their responsibilities and are responsible for the operation of the network.
- Links Between Participants
The three core participants - stakers, networks, and operators - are connected through a complex infrastructure layer. The core connection is the staking vault, which serves as the primary interface between all participants.
Symbiotic coordinates and manages interactions within this ecosystem in the following ways:
- Allows stakers to deposit their assets into the staking vault, where curators manage delegation strategies and approve qualified operators.
- Facilitates network access to security by linking networks with the staking vault and its associated staking.
- Allows operators to receive staking allocations through curator-managed staking vaults to perform their network duties.
This interconnected system is monitored by resolvers, which verify activities and ensure the security of all connections.
- System Relationships
The Symbiotic protocol facilitates several key interactions between participants, creating a robust and efficient security market. Here’s how these key components work together:
- Staking Account Management
- Stakers deposit their assets into the vault
- Each vault is managed by a curator, who controls the staking allocations
- Curators delegate staking to qualified operators, who are responsible for running network infrastructure
- A vault can serve multiple networks simultaneously, enabling efficient staking allocation among different operators
The staking delegation system has the following important features:
- Assets remain securely locked in the vault and do not actually transfer
- Staking delegation is conducted solely through an accounting system
- Assets can only leave the vault through:
- Withdrawals by the original staker
- Verification penalty events from the network
- Network Operations
Networks use multiple vaults simultaneously, allowing them to aggregate security from different sources. This flexible architecture enables operators to accumulate staking across different vaults while networks can calculate their total staking by combining delegations from different vault sources.
- Penalty Process
- Networks can initiate penalties (slashing) against operators by interacting with the vaults holding their staked assets
- If operators have stakes in multiple vaults, networks can choose from which vaults to impose penalties
- Resolvers act as validators of penalty events and have veto power
- Resolvers can be automated contracts, penalty committees, dispute resolution frameworks, multi-signature wallets, or DAO governance systems. Networks and vault curators agree on which resolvers (or none at all) to use and the terms of penalties. During the penalty process, networks choose from which vaults to impose penalties, and resolvers review events and can veto invalid penalty attempts.
++Technical Details++
- ++Collateral++
Collateral is a concept introduced by Symbiotic aimed at achieving capital efficiency and scalability by allowing assets used to secure the Symbiotic network to be held outside the Symbiotic protocol (e.g., in DeFi positions on other networks).
Symbiotic achieves this by separating the slashing operation of assets from the underlying assets themselves, similar to the tokenized representation of creating underlying staking positions with liquid staking tokens. Technically, the collateral assets in Symbiotic are ERC-20 tokens with extended functionalities that can handle situations if slashing events occur. In other words, if a collateral token is intended to support a slashing mechanism, it should be able to create a Burner contract responsible for correctly destroying that asset.
For example:
- If the asset is an ETH liquid staking token (LST), it can be used as collateral as long as a Burner contract can be created to extract ETH from the Beacon chain and destroy it.
- If the asset is a native governance token, it can be used as collateral since the Burner can be implemented as a "black hole" contract or address.
Symbiotic allows collateral tokens to be deposited into vaults, which will guarantee assets delegated to operators in the Symbiotic network. The vaults define acceptable collateral assets and their Burners (if the vault supports slashing mechanisms), and networks need to accept these and other vault terms, such as slashing limits, to receive staking.
- ++Vaults++
Vaults are the delegation and re-staking management layer of Symbiotic. They handle three key parts of the Symbiotic economy:
- Accounting: Vaults manage deposits, withdrawals, and slashing operations of collateral assets, and subsequently handle their underlying assets.
- Delegation Strategies: Vault deployers/owners define delegation and re-staking strategies, delegating to operators in the Symbiotic network, which must choose to accept these strategies.
- Slashing Handling: Vaults provide a mechanism to maintain the economic security guarantees of the network through slashing operations.
Vaults are configurable and can be deployed in an immutable pre-configured manner, or a designated owner can be specified to allow updates to vault parameters. Vaults are expected to be used by operators and curators (such as crypto institutions or liquid (re)staking protocols) to create differentiated products, such as:
- Operator-Specific Vaults: Operators can create vaults that re-stake collateral assets into their infrastructure, suitable for any configured network. An operator can create multiple vaults with different configurations to serve their clients without additional node infrastructure.
- Curated Multi-Operator Vaults: Configured to re-stake networks and delegation strategies as a diverse set of operators. Curated vaults can also set custom slashing limits to restrict the amount of collateral assets that specific operators or networks can be slashed. These committed terms need to be accepted by the networks that will accept the management services provided by the vaults.
- Immutable Pre-configured Vaults: Vaults can be deployed using pre-configured rules that cannot be updated, providing additional protection for users who do not wish to accept the risk of vault managers being able to add additional re-staking networks or otherwise change configurations.
The vault contract consists of three main modules:
Accounting Module (Vault) This module is responsible for handling the financial affairs of the vault, including:
- Processing user deposits and tracking balances
- Managing withdrawal requests and claims
- Implementing periodic slashing accounting
All operations are conducted within a single predefined collateral token.
Limits and Delegation Logic Module (Delegator) The Delegator is responsible for handling the distribution of vault funds between networks and operators. It achieves this by:
- Allowing networks to execute staking gating (i.e., how much staking the network is prepared to receive from that vault) without implementation on the network side
- Handling the operator's actions on staking allocations
- Providing staking allocation data at any given point in time
Slashing Logic Module (Slasher) The slashing module is responsible for executing penalties. Its functions include:
- Verifying the validity of slashing requests
- Implementing different slashing logic processes (e.g., immediate slashing and veto slashing)
Interactions Between Modules
The vault module does not directly interact with other modules. However, it serves as a connection registry for other modules.
Delegation Module utilizes deposit information from the vault. This data is crucial for determining accurate staking limits and ensuring that the slashing process aligns with the current state of the vault.
When a slashing event is triggered, the slashing module queries the delegation module for relevant operator and network staking allocation information. This information is used to verify whether the proposed slashing amount exceeds the allocated staking. The slashing module then interacts with the vault to proceed with the destruction operation of the slashed funds.
- ++Counterparties++
In Symbiotic, we define Networks as any protocol that requires a decentralized infrastructure network to provide cryptoeconomic services, such as processing verification and ordering transactions, providing off-chain data to applications in the cryptoeconomy, or ensuring user interactions across networks.
Decentralized infrastructure networks can flexibly leverage Symbiotic to obtain security through operators and economic support. In some cases, protocols may consist of multiple sub-networks, each taking on different infrastructure roles. The modular design of the Symbiotic protocol allows developers of these protocols to define the rules participants need to choose to join, accommodating any of these sub-networks.
++Conclusion++
The advantages of Symbiotic lie in its flexibility, decentralization, security, and customizability. By introducing modular design and cross-network collateral asset management, Symbiotic provides an efficient and scalable solution for decentralized infrastructure networks. However, the complexity of its system, risk management challenges, and cross-protocol compatibility issues cannot be overlooked. Developers and operators need to fully understand the interactions and potential risks of each module when using Symbiotic to maximize its advantages and avoid possible operational errors.
# III. Industry Data Analysis
1. Overall Market Performance
1.1 Spot BTC & ETH ETF
As of November 1 (Eastern Time), the total net outflow of Ethereum spot ETFs was $10.9256 million.
1.2. Price Trends of Spot BTC vs ETH
BTC
Analysis
Last week, BTC entered a period of weak upward momentum after a volume-reduced rebound to around $98,000. The subsequent pullback below the short-term support of $95,800 indicates that the 4H level upward pattern has been damaged. The current trend is expected to enter a narrow oscillation range of $93,000 to $97,000 in the first half of this week, and in the latter half, it may break below $93,000 due to fundamental stimuli, continuing to seek support at the lower boundary of the $91,500 range.
If fundamental indicators continue to suggest high inflation, the probability of a further decline to $88,700 will increase. Therefore, users are reminded to pay attention to the risks of sharp fluctuations brought by non-farm payroll data this week.
ETH
Analysis
Although ETH continued to operate along the upper half of the rising channel last week, it has shown clear signs of stagnation under the strong resistance of $1,870. Despite the price still being supported by the mid-track of the channel, the upward momentum is gradually depleting. Even if a rebound is organized later, the probability of effectively breaking through $1,870 or even testing the second resistance at $1,960 is low. Conversely, if the fundamentals weaken, the likelihood of the trend breaking below the mid-track and approaching the support near $1,700 is higher. However, regardless of the situation, the current rising channel pattern has not been damaged, so users can still operate based on the support and resistance of the upper, middle, and lower tracks.
1.3. Fear & Greed Index
2. Public Chain Data
2.1. BTC Layer 2 Summary
Analysis
- Stacks "Nakamoto Upgrade": Enhancing Bitcoin Layer 2 Performance
The key upgrade of the Stacks network—Nakamoto Upgrade—is scheduled to officially launch between May 15 and May 29, 2025. Key changes include:
- Improved Transaction Finality: Transactions on Stacks will achieve 100% finality on the Bitcoin main chain, with security consistent with Bitcoin itself, making it nearly impossible to roll back.
- Significant Throughput Increase: Block times will be reduced from 10-30 minutes to approximately 5 seconds, greatly accelerating transaction speeds and on-chain interaction experiences.
- Launch of sBTC: A new asset, sBTC, pegged 1:1 to Bitcoin, will be launched, allowing Bitcoin to seamlessly participate in smart contracts and DeFi applications on Stacks.
This upgrade aims to establish Stacks as a native Bitcoin smart contract platform, further enhancing its scalability and programmability.
- B² Network Token Generation Event (TGE)
On April 30, 2025, the Binance wallet platform held a TGE event for the B² Network (B2) Layer 2 solution. This network is based on ZK-Rollup technology and features:
- Scalability and Low Costs: Aiming to increase the processing capacity of the Bitcoin network by 300 times while reducing transaction costs by 50 times.
- EVM Compatibility: Supports the Ethereum Virtual Machine (EVM), allowing for the deployment of smart contracts and dApps, expanding ecosystem flexibility.
- Cross-chain and Ecosystem Integration: Collaborating with platforms like UniRouter and Particle Network to enhance cross-chain interoperability and user engagement.
The TGE event received widespread attention from the market, with 8.4 million B2 tokens allocated for future ecosystem incentives.
2.2. EVM & Non-EVM Layer 1 Summary
Analysis
Ethereum Ecosystem Upgrade
- Pectra Upgrade: Ethereum is implementing the Pectra upgrade, aimed at improving wallet infrastructure and addressing broader ecosystem challenges. This upgrade will redefine user interactions with Ethereum by enhancing chain abstraction and simplifying wallet experiences to improve user experience.
- Uniswap Labs Launches Unichain: Uniswap Labs has launched "Unichain," a Layer 2 solution aimed at enhancing user experience and addressing fragmentation issues on Ethereum. Unichain introduces "Rollup-Boost," a new block building mechanism designed to accelerate transaction speeds and reduce MEV (Maximum Extractable Value) through a fair priority gas auction model. However, as of now, the project's appeal remains limited.
- Telos zkEVM Development
- SNARKtor Integration: The Telos Foundation announced its plan to integrate SNARKtor into zkEVM, expected to be completed by the end of 2025. This technology will leverage hardware acceleration for Rollup operations on Ethereum, enhancing scalability and efficiency.
- Ondo Chain Launch
- Institutional-grade Blockchain: Ondo Finance has launched Ondo Chain, a Layer 1 PoS (Proof of Stake) blockchain that combines the openness of public chains with the compliance and security features of permissioned chains. This infrastructure aims to enable the tokenization of real-world assets for large-scale applications.
Non-EVM Layer 1 Highlights
- Agoric's Interoperability Breakthrough
- JavaScript Integration: Agoric simplifies blockchain development by integrating the widely used programming language JavaScript into its platform. This approach attracts a broader range of developers, fostering a more inclusive Web3 ecosystem.
- Cross-chain Enhancements: The platform's Orchestration API reduces cross-chain USDC transfer times from 16 minutes to 2 minutes. Additionally, collaborations with Native and Union facilitate trustless bridging between Cosmos and major EVM chains like Ethereum and Arbitrum.
- Polkadot's 2025 Roadmap
- EVM and Solidity Support: Polkadot's 2025 roadmap includes support for EVM and Solidity, enhancing compatibility with Ethereum-based projects.
- XCM v5 and Elastic Scaling: The introduction of XCM v5 aims to improve cross-chain messaging, while a multi-core architecture will increase processing capacity to meet growing on-chain demands.
- SPID-Chain's Interoperability Solution
- DAG-based Architecture: SPID-Chain adopts a Directed Acyclic Graph (DAG) structure, facilitating seamless integration between multiple blockchains. This design enhances interoperability and scalability within the Web3 ecosystem.
2.3. EVM Layer 2 Summary
Analysis
Ethereum Pectra Upgrade Approaches: The Pectra hard fork for Ethereum is scheduled to go live on the mainnet on May 7. This upgrade will enhance Layer 2 throughput, support more transaction processing, and optimize Blob data storage mechanisms to lower transaction costs. Additionally, the Historical State Expiry feature will be enabled to alleviate node storage pressure.
Celo Completes Migration to Ethereum Layer 2: Celo has successfully migrated from an independent Layer 1 blockchain to the Ethereum Layer 2 network, adopting Optimism's OP Stack and EigenDA protocol. This transition enhances its security, scalability, and interoperability with the Ethereum ecosystem.
DTVM Smart Contract Execution Framework Released: The research team has launched the DeTerministic Virtual Machine (DTVM) framework, aimed at addressing performance and determinism issues in smart contract execution. This framework is compatible with EVM ABI and supports multi-language development, such as Solidity, Rust, and Go, significantly improving execution efficiency.
# IV. Macroeconomic Data Review and Key Data Release Points for Next Week
The U.S. GDP for the first quarter of 2025 contracted at an annualized rate of 0.3% (actual year-on-year growth rate of 2%), marking the first negative growth in three years, primarily dragged down by a surge in imports and a marginal weakening of consumption. Expectations of tariffs led companies to "rush imports," causing the annualized rate of imports to soar by 41.3%, and the drag from net exports on GDP expanded to 0.9 percentage points.
This week (May 5 - May 9), important macro data release points include:
May 8: U.S. Federal Reserve interest rate decision (upper limit) as of May 7.
# V. Regulatory Policies
European Union (EU)
Establishment of the "Anti-Money Laundering Authority" (AMLA)
- April 28, 2025: The EU published a statement detailing the background, governance structure, and extensive regulatory powers of AMLA. AMLA will officially begin operations in January 2028.
- AMLA will coordinate the regulatory authorities of member states, directly supervise high-risk entities, and establish binding technical standards to ensure a unified AML/CFT regulatory framework across Europe.
United Kingdom (UK)
Regulatory Draft for Crypto Exchanges and Dealers
- April 29, 2025: The UK government proposed a legislative draft under the Financial Services and Markets Act 2000, which for the first time includes cryptocurrency exchanges, dealers, and brokers under regulatory oversight, requiring them to comply with transparency, consumer protection, and operational resilience requirements.
Exemption Rules for Stablecoin Issuers
- April 29, 2025: Chancellor of the Exchequer Rachel Reeves announced that the UK will only require "local stablecoin issuers" to obtain approval from the Financial Conduct Authority (FCA), while overseas issuers will be exempt, aligning with proposed regulations in the U.S.
Treasury Releases Draft of the "Crypto Asset Order"
- April 29, 2025: The UK Treasury released a draft titled "2000 Financial Services and Markets Act (Regulatory Activities and Miscellaneous Provisions) (Crypto Assets) Order 2025," accompanied by a policy statement.
- This draft aims to bring crypto asset-related activities under regulatory oversight, requiring service providers and issuers to undergo suitability assessments, comply with prudential regulatory requirements, and be subject to sanctions authority granted by the FCA.
United States (USA)
SEC Clarifies Disclosure Requirements for Crypto Asset Securities
- April 29, 2025: The U.S. Securities and Exchange Commission (SEC) issued a statement from its Division of Corporation Finance, clarifying that issuers of crypto asset securities must disclose detailed information, including network development progress, governance structures, and token holder rights (such as dividends, profit sharing, voting rights, etc.).
- This disclosure guideline aims to standardize market practices, enhance investor protection, and reduce legal uncertainties in the token issuance process.