ESG (Environmental, Social, and Governance) regulations for crypto assets aim to address their environmental impact (e.g., energy-intensive mining), promote transparency, and ensure ethical governance practices to align the crypto industry with broader sustainability and societal goals. These regulations encourage compliance with standards that mitigate risks and foster trust in digital assets.
Name |
Coinmotion Oy |
Relevant legal entity identifier |
743700PZG5RRF7SA4Q58 |
Name of the crypto-asset |
THORChain |
Consensus Mechanism |
THORChain utilizes the Tendermint Byzantine Fault Tolerant (BFT) consensus protocol combined with Proof of Stake (PoS), where validator nodes stake RUNE to secure the network. Core Components of THORChain’s Consensus: 1. Tendermint Consensus Protocol: Byzantine Fault Tolerant (BFT) Algorithm: THORChain uses the Tendermint consensus protocol, a BFT algorithm that enables high-speed and secure consensus across distributed nodes. This protocol is designed to achieve consensus even if some validators behave maliciously, as long as a majority act honestly. 2. Proof of Stake (PoS) Mechanism: Staking Requirements: Validator nodes are required to stake RUNE, the native token of THORChain, to participate in the consensus process. Staking serves as collateral, incentivizing validators to act honestly and discouraging malicious behavior through economic penalties. Validator Rotation: THORChain regularly rotates its validators, ensuring that only the most actively engaged and well-staked nodes maintain validator status. This competitive environment encourages decentralization, as nodes must continuously stake RUNE to secure a spot in the validator set. 3. Slashing for Security: Penalties for Misbehavior: Validators can be penalized (slashed) if they fail to fulfill their responsibilities or act dishonestly. Slashing serves as a deterrent against malicious behavior, ensuring validators remain reliable and maintain the integrity of the network. |
Incentive Mechanisms and Applicable Fees |
THORChain employs staking rewards, transaction fees, and slashing penalties to maintain security and incentivize validator participation. Incentive Mechanisms: 1. Staking Rewards: Rewards for Validators: Validators earn staking rewards for participating in network security and consensus. These rewards are paid in RUNE, THORChain’s native token, and are proportional to the amount staked. This incentivizes nodes to lock up RUNE and remain active in the network. 2. Transaction Fees: Income for Validators: Validators also earn a portion of the transaction fees generated within the network. These fees are distributed among validators as additional rewards, providing an ongoing incentive to process transactions efficiently. 3. Decentralization through Node Rotation: Continuous Staking Competition: The regular rotation of validator nodes means that participants must continuously compete for positions by staking RUNE. This mechanism enhances network security and promotes decentralization, preventing any single entity from dominating the network. 4. Slashing Mechanism: Penalty for Malicious Actions: To maintain network integrity, THORChain employs a slashing mechanism, penalizing validators that act maliciously or fail to meet their responsibilities. This encourages validators to act in the network’s best interest. Applicable Fees: Transaction Fees: Transaction fees on THORChain are paid in RUNE and vary based on network activity and transaction type. These fees help compensate validators and support the network's operational costs. |
Beginning of the period |
2024-06-09 |
End of the period |
2025-06-09 |
Energy consumption |
45990.00000 (kWh/a) |
Energy consumption resources and methodologies |
For the calculation of energy consumptions, the so called “bottom-up” approach is being used. The nodes are considered to be the central factor for the energy consumption of the network. These assumptions are made on the basis of empirical findings through the use of public information sites, open-source crawlers and crawlers developed in-house. The main determinants for estimating the hardware used within the network are the requirements for operating the client software. The energy consumption of the hardware devices was measured in certified test laboratories. When calculating the energy consumption, we used - if available - the Functionally Fungible Group Digital Token Identifier (FFG DTI) to determine all implementations of the asset of question in scope and we update the mappings regulary, based on data of the Digital Token Identifier Foundation. |
Renewable energy consumption |
|
Energy intensity |
(kWh) |
Scope 1 DLT GHG emissions - Controlled |
(tCO2e/a) |
Scope 2 DLT GHG emissions - Purchased |
(tCO2e/a) |
GHG intensity |
(kgCO2e) |
Key energy sources and methodologies |
|
Key GHG sources and methodologies |
|