ESG (Environmental, Social, and Governance) regulations for crypto assets aim to address their environmental impact (e.g., energy-intensive mining), promote transparency, and ensure ethical governance practices to align the crypto industry with broader sustainability and societal goals. These regulations encourage compliance with standards that mitigate risks and foster trust in digital assets.
Name |
Coinmotion Oy |
Relevant legal entity identifier |
743700PZG5RRF7SA4Q58 |
Name of the crypto-asset |
Gnosis |
Consensus Mechanism |
Gnosis Chain – Consensus Mechanism Gnosis Chain employs a dual-layer structure to balance scalability and security, using Proof of Stake (PoS) for its core consensus and transaction finality. Core Components: Two-Layer Structure Layer 1: Gnosis Beacon Chain The Gnosis Beacon Chain operates on a Proof of Stake (PoS) mechanism, acting as the security and consensus backbone. Validators stake GNO tokens on the Beacon Chain and validate transactions, ensuring network security and finality. Layer 2: Gnosis xDai Chain Gnosis xDai Chain processes transactions and dApp interactions, providing high-speed, low-cost transactions. Layer 2 transaction data is finalized on the Gnosis Beacon Chain, creating an integrated framework where Layer 1 ensures security and finality, and Layer 2 enhances scalability. Validator Role and Staking Validators on the Gnosis Beacon Chain stake GNO tokens and participate in consensus by validating blocks. This setup ensures that validators have an economic interest in maintaining the security and integrity of both the Beacon Chain (Layer 1) and the xDai Chain (Layer 2). Cross-Layer Security Transactions on Layer 2 are ultimately finalized on Layer 1, providing security and finality to all activities on the Gnosis Chain. This architecture allows Gnosis Chain to combine the speed and cost efficiency of Layer 2 with the security guarantees of a PoS-secured Layer 1, making it suitable for both high-frequency applications and secure asset management. |
Incentive Mechanisms and Applicable Fees |
The Gnosis Chain’s incentive and fee models encourage both validator participation and network accessibility, using a dual-token system to maintain low transaction costs and effective staking rewards. Incentive Mechanisms: Staking Rewards for Validators GNO Rewards: Validators earn staking rewards in GNO tokens for their participation in consensus and securing the network. Delegation Model: GNO holders who do not operate validator nodes can delegate their GNO tokens to validators, allowing them to share in staking rewards and encouraging broader participation in network security. Dual-Token Model GNO: Used for staking, governance, and validator rewards, GNO aligns long-term network security incentives with token holders’ economic interests. xDai: Serves as the primary transaction currency, providing stable and low-cost transactions. The use of a stable token (xDai) for fees minimizes volatility and offers predictable costs for users and developers. Applicable Fees: Transaction Fees in xDai Users pay transaction fees in xDai, the stable fee token, making costs affordable and predictable. This model is especially suited for high-frequency applications and dApps where low transaction fees are essential. xDai transaction fees are redistributed to validators as part of their compensation, aligning their rewards with network activity. Delegated Staking Rewards Through delegated staking, GNO holders can earn a share of staking rewards by delegating their tokens to active validators, promoting user participation in network security without requiring direct involvement in consensus operations. |
Beginning of the period |
2024-06-09 |
End of the period |
2025-06-09 |
Energy consumption |
104594.40000 (kWh/a) |
Energy consumption resources and methodologies |
For the calculation of energy consumptions, the so called “bottom-up” approach is being used. The nodes are considered to be the central factor for the energy consumption of the network. These assumptions are made on the basis of empirical findings through the use of public information sites, open-source crawlers and crawlers developed in-house. The main determinants for estimating the hardware used within the network are the requirements for operating the client software. The energy consumption of the hardware devices was measured in certified test laboratories. When calculating the energy consumption, we used - if available - the Functionally Fungible Group Digital Token Identifier (FFG DTI) to determine all implementations of the asset of question in scope and we update the mappings regulary, based on data of the Digital Token Identifier Foundation. |
Renewable energy consumption |
|
Energy intensity |
(kWh) |
Scope 1 DLT GHG emissions - Controlled |
(tCO2e/a) |
Scope 2 DLT GHG emissions - Purchased |
(tCO2e/a) |
GHG intensity |
(kgCO2e) |
Key energy sources and methodologies |
|
Key GHG sources and methodologies |
|