Psy Protocol Achieves 521,000 TPS on a Live Proof-of-Work Network, Offers $100,000 Bounty to Anyone Who Can Prove the Results Invalid

marsbitОпубліковано о 2026-02-14Востаннє оновлено о 2026-02-14

Hong Kong | February 11, 2026 — Psy Protocol today announced that it has achieved 521,000 transactions per second (TPS) on a live, on-chain verifiable Proof-of-Work (PoW) network. The team stated that this result, achieved without sacrificing decentralization, security, or privacy, surpasses all publicly benchmarked performances of mainstream Proof-of-Stake (PoS) and Proof-of-Work chains to date.

The stress test was conducted on thousands of Google Cloud instances to simulate a high-concurrency, internet-scale operating environment. Every transaction in the benchmark is backed by cryptographic proof, and the complete dataset has been published for independent verification.

To demonstrate confidence in the results, Psy Protocol has publicly posted a $100,000 (US$100,000) bounty, to be awarded to any individual or team that can invalidate this throughput result based on the published proof materials.

"This is not a devnet demo, nor a theoretical projection," said Carter Feldman, Founder and CEO of Psy Protocol. "Every single result is verifiable. If we are wrong, the math will show it—and we will pay $100,000 to the person who shows it."

Why 521,000 TPS Matters Now

High-throughput benchmarks are not uncommon in the crypto industry. Psy Protocol believes this result is structurally significant because of the use-case context it addresses.

Blockchains were originally designed around human transaction patterns: sporadically occurring activities, manual approvals, and low concurrency. However, this model is becoming increasingly mismatched as millions of autonomous AI agents transact, collaborate, and settle at machine speeds continuously in the future.

When networks designed for human-scale usage encounter sustained machine-grade demand, the result is often network congestion, soaring fees, and cascading bottlenecks. Psy Protocol views 521,000 TPS as the "baseline" infrastructure required for a machine-native economy, not a performance ceiling.

How the Architecture Works

Most blockchains require every node to re-execute every transaction, a design that imposes a hard architectural ceiling on throughput. Psy Protocol removes this bottleneck through four synergistic design choices:

  • Parallel State Architecture (PARTH): Each user operates in isolated state partitions. This eliminates global state contention, allowing thousands of state transitions to be processed simultaneously without conflict.
  • Client-Side Proof Generation: Transaction execution and proof generation are performed on the user's device, with sensitive data always remaining under the user's control. Miners are only responsible for verifying and aggregating proofs, not re-executing transactions, thus eliminating redundant computation across the entire network.
  • Recursive Zero-Knowledge Proofs: Individual transaction proofs are recursively folded into a single succinct proof per block. As transaction volume grows, verification costs grow logarithmically rather than linearly, meaning massive throughput increases do not require proportional increases in resources.
  • Horizontal Scaling via Realms: The network scales by adding parallel processing domains ("Realms") and proof aggregation capacity. Throughput increases linearly with added infrastructure, rather than being limited by a fixed architectural cap.

Psy Protocol states that 521,000 TPS reflects the result in the current test configuration; higher throughput is achievable by scaling parallel proof generation capacity.

Verification: Open Data, Verifiable on Consumer Hardware

Because verification relies on succinct recursive proofs rather than full re-execution, Psy Protocol states that any combined proof from the benchmark can be independently verified on consumer-grade hardware—including limited-performance devices like a Raspberry Pi.

The complete test methodology, ZK circuit data, and combined proofs have all been open-sourced and are available at:

https://st8.psy.xyz/explorer

Applications Feasible at This Scale

With sustained throughput exceeding 500,000 TPS, the following new types of on-chain activity become feasible:

  • High-frequency micropayments between autonomous agents
  • Continuous clearing markets with real-time settlement replacing discrete batch settlement
  • High-density coordination among large-scale AI agent swarms operating without human intervention
  • Keyless agent execution via programmable signature circuits, eliminating reliance on human-controlled private keys or third-party custody

About Psy Protocol

Psy Protocol is building a Proof-of-Work smart contract platform for the "agentic internet." Its architecture combines the security and decentralization benefits of Proof-of-Work with the throughput and fee efficiency historically associated with Proof-of-Stake systems. Psy employs a "Proof-of-Useful-Work (PoUW)" consensus model, where miners perform cryptographically productive work—namely, aggregating and verifying zero-knowledge proofs—rather than arbitrary hash puzzle computations.

Пов'язані питання

QWhat is the TPS (Transactions Per Second) achieved by Psy Protocol in a real-world Proof-of-Work network, and what is the bounty offered for disproving this result?

APsy Protocol achieved 521,000 TPS in a real-world, verifiable Proof-of-Work network. They have offered a $100,000 bounty to anyone who can prove this result is invalid based on the published cryptographic proofs.

QAccording to the article, why is achieving 521,000 TPS particularly significant in the current context of blockchain technology?

AIt is significant because it addresses the future need for a 'machine-native economy.' Traditional blockchains designed for sporadic human transactions are inadequate for the continuous, high-speed transactions of millions of autonomous AI agents. This result represents a baseline for the infrastructure required to support such activity without congestion or high fees.

QName two of the four key architectural designs that Psy Protocol uses to remove the throughput bottleneck found in most blockchains.

ATwo of the four designs are: 1. Parallel State Architecture (PARTH), which isolates state partitions to eliminate global state contention, and 2. Client-side proof generation, where users execute transactions and generate proofs on their own devices, so miners only verify and aggregate proofs instead of re-executing transactions.

QHow can the results of Psy Protocol's benchmark test be independently verified, and what kind of hardware is sufficient for this verification?

AThe results can be independently verified using the complete test methodology, ZK circuit data, and composite proofs that have been open-sourced. This verification can be performed on consumer-grade hardware, including limited devices like a Raspberry Pi, because it relies on verifying succinct recursive proofs rather than fully re-executing all transactions.

QWhat type of consensus model does Psy Protocol use, and what useful work do the miners perform instead of solving arbitrary hash puzzles?

APsy Protocol uses a Proof-of-Useful-Work (PoUW) consensus model. Instead of performing arbitrary hash calculations, miners perform cryptographically productive work by aggregating and verifying zero-knowledge proofs.

Пов'язані матеріали

From Theft to Re-entry: How Was $292 Million "Laundered"?

A sophisticated crypto laundering operation was executed following the $292 million hack of Kelp DAO on April 18. The attack, attributed to the North Korean Lazarus group, began with anonymous infrastructure preparation using Tornado Cash to fund wallets untraceably. The hacker exploited a vulnerability in Kelp’s cross-chain bridge, stealing 116,500 rsETH. To avoid crashing the market, the attacker used Aave and Compound as laundering tools—depositing the stolen rsETH as collateral to borrow $190 million in clean, liquid ETH. This move triggered a bank run on Aave, causing an $8 billion drop in TVL. After consolidating funds, the attacker fragmented them across hundreds of wallets to evade detection. A major breakpoint was THORChain, where over $460 million in volume—30 times its usual activity—was processed in 24 hours, converting ETH into Bitcoin. This shift to Bitcoin’s UTXO model exponentially increased tracing complexity by shattering funds into countless untraceable fragments. The final destination was Tron-based USDT, the primary channel for illicit crypto flows. From there, funds were cashed out via OTC brokers in China and Southeast Asia, using unlicensed underground banks and UnionPay networks outside Western sanctions scope. Ultimately, the laundered money supports North Korea’s weapons programs, which rely heavily on crypto hacking for foreign currency. The incident underscores structural challenges in DeFi: its openness, composability, and lack of central control make such laundering not just possible, but inherently difficult to prevent.

marsbit29 хв тому

From Theft to Re-entry: How Was $292 Million "Laundered"?

marsbit29 хв тому

Google and Amazon Simultaneously Invest Heavily in a Competitor: The Most Absurd Business Logic of the AI Era Is Becoming Reality

In a span of four days, Amazon announced an additional $25 billion investment, and Google pledged up to $40 billion—both direct competitors pouring over $65 billion into the same AI startup, Anthropic. Rather than a typical venture capital move, this signals the latest escalation in the cloud wars. The core of the deal is not equity but compute pre-orders: Anthropic must spend the majority of these funds on AWS and Google Cloud services and chips, effectively locking in massive future compute consumption. This reflects a shift in cloud market dynamics—enterprises now choose cloud providers based on which hosts the best AI models, not just price or stability. With OpenAI deeply tied to Microsoft, Anthropic’s Claude has become the only viable strategic asset for Google and Amazon to remain competitive. Anthropic’s annualized revenue has surged to $30 billion, and it is expanding into verticals like biotech, positioning itself as a cross-industry AI infrastructure layer. However, this funding comes with constraints: Anthropic’s independence is challenged as it balances two rival investors, its safety-first narrative faces pressure from regulatory scrutiny, and its path to IPO introduces new financial pressures. Globally, this accelerates a "tri-polar" closed-loop structure in AI infrastructure, with Microsoft-OpenAI, Google-Anthropic, and Amazon-Anthropic forming exclusive model-cloud alliances. In contrast, China’s landscape differs—investments like Alibaba and Tencent backing open-source model firm DeepSeek reflect a more decoupled approach, though closed-source models from major cloud providers still dominate. The $65 billion bet is ultimately about securing a seat at the table in an AI-defined future—where missing the model layer means losing the cloud war.

marsbit6 год тому

Google and Amazon Simultaneously Invest Heavily in a Competitor: The Most Absurd Business Logic of the AI Era Is Becoming Reality

marsbit6 год тому

Торгівля

Спот
Ф'ючерси
活动图片