Canopy Network Docs
  • 👋Welcome to Canopy
    • Overview
    • What is Canopy?
      • Introduction
      • Why Canopy?
        • Blockchain 101
        • Background
        • Industry State
        • Seeding the Future
        • Comparables
          • Ethereum
          • Tendermint
          • Polkadot
          • Avalanche
          • Rollups
      • Core Features
        • Peer-To-Peer Security
        • Progressive Sovereignty
        • Capital Efficient Restaking
        • Composable Architecture
        • One-Way Interoperability
        • Built-In Liquidity
        • Chain Halt Rescue
        • NestBFT
          • PoS Is Trusted
          • PoAge Is Trustless
          • VRF Leader Election
        • Checkpoints as a Service
        • United Governance
      • Tokenomics
        • CNPY
        • Staking
        • DAO Treasury Fund
        • Recursive Rewards
        • Subsidies
      • Who is Canopy for?
        • New Blockchains
        • Existing Ecosystems
        • Token Participants
    • How does Canopy work?
      • Utility
      • Consensus
      • P2P
      • State Machine
      • Storage
      • Specifications
        • CLI
        • RPC
        • Config
        • Governance Params
        • Nested Chain IDs
  • ⚒️Build
    • Build a new L1
      • Introduction
      • Building
        • Application
        • Governance
        • Testing
        • Upgrading
      • Governance
        • Straw Polling
        • Proposals
    • Connect an external chain
      • Introduction
      • Building
        • Connecting
        • Testing
        • Upgrading
      • Governance
        • Straw Polling
  • 👨‍💻Node Runner
    • Setup
    • Install
    • Configure
    • Manage
    • Debug
    • Validate
      • Get CNPY
      • Plugins Config
      • Stake
      • Manage
      • Slashing
    • Govern
  • 💪Participate
    • How To Get CNPY
    • What to do with CNPY
      • Manage
      • Earn
      • Subsidize
      • Govern
Powered by GitBook
On this page
  • Blockchains...
  • — have the "Cold Start" problem:
  • Dependent Applications:
  • Problematic Impact:
  • Not enough Security Roots:
  1. Welcome to Canopy
  2. What is Canopy?
  3. Why Canopy?

Background

PreviousBlockchain 101NextIndustry State

Last updated 1 month ago

Blockchains...

In 2009, Bitcoin created the first blockchain that implemented a peer-to-peer digital payment network. This system was foundational and marked the beginning of the "Web3" industry.

— have the "Cold Start" problem:

While revolutionary, implementing blockchain technology is high barrier in practice:

  • It must to be expensive to 'takeover' the network - typically requiring fundraising

  • The tech is complex and requires deep understanding to avoid execution failures

  • Adoption requires a rich ecosystem with developer tooling and liquidity paths

  • The operation requires diverse, experienced Validators to avoid centralization

  • The chain needs interoperability features to avoid community isolation

To read more about the challenges of building an L1 - checkout:

Dependent Applications:

In 2013, Ethereum attempted to solve the difficulties of building a blockchain by introducing a network that could support digital accounts capable of executing 'code' and storing 'state'. This innovation enabled the creation of apps hosted on blockchain, commonly known as dApps or Smart Contracts.

Ethereum was able to make blockchain technology more accessible to developers by abstracting away challenges involved with launching a L1.

👉 In doing so - it became the first Security Root: a chain that provides consensus, security, and communication for Nested apps.

For a more comprehensive history: Checkout the in our paper

Problematic Impact:

However, Ethereum's success had some unintended consequences to the industry:

  • ⚠️ dependent apps were accepted as decentralized 'enough' - despite reliance on host chains

  • ⚠️ security greatly centralized as Ethereum is one of few security roots

  • ⚠️ innovation was directed at dependent apps instead of independent networks

  • ⚠️ sovereign blockchains became increasingly rare

  • ⚠️ layered architecture became the default paradigm

  • ⚠️ hosts protocols trapping projects in their ecosystem became the norm

Not enough Security Roots:

The critical failure of 2017 ultimately led to the creation of layered technology (L2s/Rollups) which are dependent frameworks that host dApps to offload the weight of new applications.

However, dApps and layered technology are not acceptable choices for a builder because:

  • ❌ can be censored by the host protocol

  • ❌ are controlled by the host (centralized governance)

  • ❌ lack autonomy (dependent on the host)

  • ❌ have single points of failure (host protocol / sequencer)

  • ❌ lose value to the host protocols (leak value to host)

  • ❌ lack native interoperability with external ecosystems

  • ❌ are trapped (escape requires a ground-up rebuild)

  • ❌ limited scalability (constrained by the host)

These flaws expose a fundamental question: What makes a dApp or Rollup better than a Web2 application?

The industry ignores that dApps, Rollups, and L2s lack decentralization and sovereignty - at least not in a meaningful way that differentiates them from Web2 in practice.

🚨 IMPORTANT: These weaknesses are not just theoretical:

Because Ethereum exists as the one of few security roots for Web3, it quickly ran into scalability issues. These issues exploded in 2017 when a overwhelmed the network, bringing Ethereum and its apps to a halt.

⚠ CryptoKitties was not an isolated incident! Checkout the full story in the

Hint: Checkout to see the importance of these shortcomings!

Read about the

👋
The cost of independence
history section
game about cats
Canopy whitepaper
Blockchain 101
Ethereum censorship of Tornado Cash in 2022