The Race Is On to Replace Ethereum’s Most Centralized Layer

“If we don’t stop relying on Infura, the vision of ethereum failed.”

That’s how Afri Schoedon, release manager for the Parity Ethereum client, described one of ethereum’s most popular – and controversial – technologies on Twitter in October.

Infura handles around 13 billion code request per day and provides a way for developers to connect to ethereum without having to run a full node. And while the exact usage stats aren’t public, by creating a simpler method for interfacing with the network, it’s said to underpin the majority of decentralized applications in the ethereum ecosystem.

But here’s the thing: Infura is operated by a single provider – the ethereum development studio ConsenSys – and relies on cloud servers hosted by Amazon. As such, concerns exist that the service represents a single point of failure for the entire network.

“If every single dapp in the world is pointed to Infura, and we decided to turn that off, then we could, and the dapps would stop working. That’s the concern and that’s a valid concern,” Michael Wuehler, the co-founder of Infura, told CoinDesk in an interview.

While many of the projects recognize the importance of Infura’s contribution to ethereum – referring to the service as a pillar that holds up the developer community today – many, like Schoedon, feel that steps must be taken to seek a decentralized alternative.

“There is no point in having dapps connecting through Metamask to a blockchain hosted by someone else,” Schoedon tweeted.

And Schoedon isn’t alone in his interpretation. Rather, he’s met by a host of new efforts to dethrone Infura as the go-to connection point for developers linking their decentralized applications to ethereum.

For example, new full node incentivizations schemes like VIP node, Dappnode and D-Node seek to provide different kinds of alternatives.

Equally, infrastructure minimizing efforts such as light clients are gaining traction, as well as experimental software restructuring like Turbo Geth. And according to developers, what’s at stake is the very decentralization of the ethereum ecosystem itself.

“One of the issues that we’re facing in the space today is that decentralized application development is happening through centralized services,” Yalor Mewn, communications officer for Dappnode, a node incentivization scheme, told CoinDesk, adding:

“We are building all of this infrastructure on top of a bottleneck.”

An imperfect tool

Currently, there’s a total of 11,803 ethereum full nodes according to available data.

Speaking to CoinDesk, Wuehler said Infura accounts for somewhere between 5 and 10 percent of the nodes. Yet because the Infura nodes are highly reliable – under 24 hour maintenance – they’re accounting for a disproportionate amount of traffic.

“[We’re] effectively supporting the entire ethereum dapp ecosystem with the RPC traffic,” Wuehler said.

And that’s partially because, as of the time of writing, a full archive node is said to take over 1 terabyte of data – beyond what a conventional laptop can store. For developers, as well as users, this means that the storage requirements are frequently outsourced to companies that have the means to manage that kind of infrastructure.

“The way Infura works is they host their own full nodes and they open up an [interface] to allow you to easily access those full nodes,” Aidan Hyman, CEO and co-founder of ethereum research and development startup Chainsafe, told CoinDesk.

For example, developers frequently opt for Infura as a way to focus their efforts on software, while users are often drawn to in-browser tool Metamask to hold their cryptocurrency. And both route through the ConsenSys full nodes.

“Any dapp that uses Metamask also inherently depends on Infura (knowingly, or not). In that sense, nearly all dapps potentially depend on Infura,” Wuehler told CoinDesk.

The impact of this is that developers and users are less likely to run full nodes, meaning that the number of full nodes supporting the network decline. As the risk that Infura might become a single point of failure, there are other repercussions to a lack of full nodes as well.

Running a full node, for example, allows users and developers to keep much of their sensitive activity local, while Infura accumulates combinations of data from its users such as wallet address and IP locations.

“Privacy is an issue,” ‘Dapplion,’ the pseudonymous developer behind Infura replacement project Dappnode, told CoinDesk, adding:

“And Infura is hosted on Amazon. So what if Amazon says ‘You know what? Infura no more, just fuck off.’ Most of the dapps would be unusable.”

True decentralization

As such, several efforts are trying to find a viable and usable alternative.

For example, Parity Technologies has released a new code library for light client development, dubbed LightJS. Parity hopes that it will encourage developers to build light clients rather than relying on Infura as a service.

And that’s because, while they promise to be much less hardware and storage intensive, light clients are intended to maintain the same degree as decentralization as running a full node.

“Ideally, what we will see is less and less dapps connecting to Infura, and they will use a light client instead to achieve true decentralization,” Parity developer Amaury Martiny told CoinDesk.

The Turbo Geth project by Alexey Akhunov also seeks to completely restructure how ethereum software clients handle storage. In the latest version of the software rewrite, he’s decreased the storage requirements down to a fifth of its current size.

And several projects, such as Dappnode, D-node, and VIP node, target the underlying incentive layer to encourage more people to run a full node. And that’s because currently, unlike the miners that secure transactions on ethereum, full nodes are not rewarded in any way.

But VIP node, working on a grant that has been given by the Ethereum Foundation, uses the identifier with which full nodes connect to ethereum to dole out rewards to nodes that are online, that are paid through a subscription from developers wishing to use the service.

Another project, named D-Node, also creates a market between developers and node operators, but tries to decentralize the economic relationship between those actors as well.

To do this, D-Node uses a decentralized autonomous organization, or DAO. An initiative by Toronto-based startup Chainsafe, D-node was conceived in May at ethereum hackathon ETH Buenos Aires and is funded through a grant by the Ethereum Community Fund.

“The idea that we can build these structures in a decentralized way that allows for the democratization of power dynamics in economic systems,” said Hyman.

Finally, Dappnode, founded by blockchain developer Jordi Baylina, takes a different approach by allowing developers to set up a local network that is designed in such the way that it is easy to engage in dapp deployment.

“Someone sets it up the Dappnode and gives access to his family, his friends, a trusted circle of person-to-person connections that you have a trust bond. And then just with a couple clicks, as hard as it is to connect to Infura, you will connect to Dappnode,” leading developer Dapplion told CoinDesk.

On the horizon

Several of these projects – such as VIP node and Turbo Geth – also receive funding from Infura itself.

One of ethereum’s largest startups – the company behind Infura – Consensys is also funding a project, named Incubator, by which is trying to reduce Metamask dependance on Infura on its gateway to ethereum. Infura itself is also trying to diversify the number of cloud providers it relies on, so that it’s not purely reliant on Amazon, according to Wuehler.

“Our efforts are mainly about continually trying to push more and more decentralization into the way that our technology stack is delivered,” he told CoinDesk.

According to Wuehler, Infura’s popularity is due to a quirk inside the ethereum platform itself. And that’s because, by combining the functionality of bitcoin’s blockchain with a virtual machine that can execute decentralized applications, ethereum generates a wider range of data than simply transactions.

For example, as well as relying on a blockchain, ethereum stores what is known as the “state,” which is the sum of all computation on the platform. And as the quantity of ethereum users continue to grow, the size of the state keeps expanding as well.

The end result of this is that, as hardware gets increasingly more expensive and complex to operate – and due to ethereum’s underlying design – incentives aren’t in place to encourage people to do this.

“We didn’t create the problem, we are just a Band-Aid on the problem. We are just providing a solution that is needed,” Wuehler said.

Looking ahead, there’s work being done by ethereum researchers such as founder Vitalik Buterin to find a way to rewrite the underlying incentives so that full nodes can be rewarded for storing data, or what is commonly referred to as “rent.”

Such a change is now being considered for inclusion in a proposed upgrade named “ethereum 1x.” Currently targeted for 2019, in the interim, developers are focused on finding solutions that can be deployed immediately.

As Hyman from D-node told CoinDesk:

“Though we are working as a community on these long term goals we also have to be pragmatic and focus on the present. This is a problem that exists right now and has persisted in the space.”

Construct 2017 image courtesy to Steven Gregory

Be the first to comment

Leave a Reply

Your email address will not be published.


Privacy Policy is committed to safeguarding your privacy. Contact us at if you have any questions or problems regarding the use of your Personal Data and we will gladly assist you.

By using this site or/and our services, you consent to the Processing of your Personal Data as described in this Privacy Policy.

Table of Contents

  1. Definitions used in this Policy
  2. Data protection principles we follow
  3. What rights do you have regarding your Personal Data
  4. What Personal Data we gather about you
  5. How we use your Personal Data
  6. Who else has access to your Personal Data
  7. How we secure your data
  8. Information about cookies
  9. Contact information


Personal Data – any information relating to an identified or identifiable natural person.
Processing – any operation or set of operations which is performed on Personal Data or on sets of Personal Data.
Data subject – a natural person whose Personal Data is being Processed.
Child – a natural person under 16 years of age.
We/us (either capitalized or not)

Data Protection Principles

We promise to follow the following data protection principles:

  • Processing is lawful, fair, transparent. Our Processing activities have lawful grounds. We always consider your rights before Processing Personal Data. We will provide you information regarding Processing upon request.
  • Processing is limited to the purpose. Our Processing activities fit the purpose for which Personal Data was gathered.
  • Processing is done with minimal data. We only gather and Process the minimal amount of Personal Data required for any purpose.
  • Processing is limited with a time period. We will not store your personal data for longer than needed.
  • We will do our best to ensure the accuracy of data.
  • We will do our best to ensure the integrity and confidentiality of data.

Data Subject’s rights

The Data Subject has the following rights:

  1. Right to information – meaning you have to right to know whether your Personal Data is being processed; what data is gathered, from where it is obtained and why and by whom it is processed.
  2. Right to access – meaning you have the right to access the data collected from/about you. This includes your right to request and obtain a copy of your Personal Data gathered.
  3. Right to rectification – meaning you have the right to request rectification or erasure of your Personal Data that is inaccurate or incomplete.
  4. Right to erasure – meaning in certain circumstances you can request for your Personal Data to be erased from our records.
  5. Right to restrict processing – meaning where certain conditions apply, you have the right to restrict the Processing of your Personal Data.
  6. Right to object to processing – meaning in certain cases you have the right to object to Processing of your Personal Data, for example in the case of direct marketing.
  7. Right to object to automated Processing – meaning you have the right to object to automated Processing, including profiling; and not to be subject to a decision based solely on automated Processing. This right you can exercise whenever there is an outcome of the profiling that produces legal effects concerning or significantly affecting you.
  8. Right to data portability – you have the right to obtain your Personal Data in a machine-readable format or if it is feasible, as a direct transfer from one Processor to another.
  9. Right to lodge a complaint – in the event that we refuse your request under the Rights of Access, we will provide you with a reason as to why. If you are not satisfied with the way your request has been handled please contact us.
  10. Right for the help of supervisory authority – meaning you have the right for the help of a supervisory authority and the right for other legal remedies such as claiming damages.
  11. Right to withdraw consent – you have the right withdraw any given consent for Processing of your Personal Data.

Data we gather

Information you have provided us with
This might be your e-mail address, name, billing address, home address etc – mainly information that is necessary for delivering you a product/service or to enhance your customer experience with us. We save the information you provide us with in order for you to comment or perform other activities on the website. This information includes, for example, your name and e-mail address.

Information automatically collected about you
This includes information that is automatically stored by cookies and other session tools. For example, your shopping cart information, your IP address, your shopping history (if there is any) etc. This information is used to improve your customer experience. When you use our services or look at the contents of our website, your activities may be logged.

Information from our partners
We gather information from our trusted partners with confirmation that they have legal grounds to share that information with us. This is either information you have provided them directly with or that they have gathered about you on other legal grounds. See the list of our partners here.

Publicly available information
We might gather information about you that is publicly available.

How we use your Personal Data

We use your Personal Data in order to:

  • provide our service to you. This includes for example registering your account; providing you with other products and services that you have requested; providing you with promotional items at your request and communicating with you in relation to those products and services; communicating and interacting with you; and notifying you of changes to any services.
  • enhance your customer experience;
  • fulfil an obligation under law or contract;

We use your Personal Data on legitimate grounds and/or with your Consent.

On the grounds of entering into a contract or fulfilling contractual obligations, we Process your Personal Data for the following purposes:

  • to identify you;
  • to provide you a service or to send/offer you a product;
  • to communicate either for sales or invoicing;

On the ground of legitimate interest, we Process your Personal Data for the following purposes:

  • to send you personalized offers* (from us and/or our carefully selected partners);
  • to administer and analyse our client base (purchasing behaviour and history) in order to improve the quality, variety, and availability of products/ services offered/provided;
  • to conduct questionnaires concerning client satisfaction;

As long as you have not informed us otherwise, we consider offering you products/services that are similar or same to your purchasing history/browsing behaviour to be our legitimate interest.

With your consent we Process your Personal Data for the following purposes:

  • to send you newsletters and campaign offers (from us and/or our carefully selected partners);
  • for other purposes we have asked your consent for;

We Process your Personal Data in order to fulfil obligation rising from law and/or use your Personal Data for options provided by law. We reserve the right to anonymise Personal Data gathered and to use any such data. We will use data outside the scope of this Policy only when it is anonymised. We save your billing information and other information gathered about you for as long as needed for accounting purposes or other obligations deriving from law, but not longer than 1 year.

We might process your Personal Data for additional purposes that are not mentioned here, but are compatible with the original purpose for which the data was gathered. To do this, we will ensure that:

  • the link between purposes, context and nature of Personal Data is suitable for further Processing;
  • the further Processing would not harm your interests and
  • there would be appropriate safeguard for Processing.

We will inform you of any further Processing and purposes.

Who else can access your Personal Data

We do not share your Personal Data with strangers. Personal Data about you is in some cases provided to our trusted partners in order to either make providing the service to you possible or to enhance your customer experience. We share your data with:

Our processing partners:


Our business partners:


Connected third parties:


We only work with Processing partners who are able to ensure adequate level of protection to your Personal Data. We disclose your Personal Data to third parties or public officials when we are legally obliged to do so. We might disclose your Personal Data to third parties if you have consented to it or if there are other legal grounds for it.

How we secure your data

We do our best to keep your Personal Data safe. We use safe protocols for communication and transferring data (such as HTTPS). We use anonymising and pseudonymising where suitable. We monitor our systems for possible vulnerabilities and attacks.

Even though we try our best we can not guarantee the security of information. However, we promise to notify suitable authorities of data breaches. We will also notify you if there is a threat to your rights or interests. We will do everything we reasonably can to prevent security breaches and to assist authorities should any breaches occur.

If you have an account with us, note that you have to keep your username and password secret.


We do not intend to collect or knowingly collect information from children. We do not target children with our services.

Cookies and other technologies we use

We use cookies and/or similar technologies to analyse customer behaviour, administer the website, track users’ movements, and to collect information about users. This is done in order to personalize and enhance your experience with us.

A cookie is a tiny text file stored on your computer. Cookies store information that is used to help make sites work. Only we can access the cookies created by our website. You can control your cookies at the browser level. Choosing to disable cookies may hinder your use of certain functions.

We use cookies for the following purposes:

  • Necessary cookies – these cookies are required for you to be able to use some important features on our website, such as logging in. These cookies don’t collect any personal information.
  • Functionality cookies – these cookies provide functionality that makes using our service more convenient and makes providing more personalised features possible. For example, they might remember your name and e-mail in comment forms so you don’t have to re-enter this information next time when commenting.
  • Analytics cookies – these cookies are used to track the use and performance of our website and services
  • Advertising cookies – these cookies are used to deliver advertisements that are relevant to you and to your interests. In addition, they are used to limit the number of times you see an advertisement. They are usually placed to the website by advertising networks with the website operator’s permission. These cookies remember that you have visited a website and this information is shared with other organisations such as advertisers. Often targeting or advertising cookies will be linked to site functionality provided by the other organisation.

You can remove cookies stored in your computer via your browser settings. Alternatively, you can control some 3rd party cookies by using a privacy enhancement platform such as or For more information about cookies, visit

We use Google Analytics to measure traffic on our website. Google has their own Privacy Policy which you can review here. If you’d like to opt out of tracking by Google Analytics, visit the Google Analytics opt-out page.

Read more about cookies on our Cookie Policy

Contact Information

email: [email protected]

Changes to this Privacy Policy

We reserve the right to make change to this Privacy Policy.

You can configure your Internet browser, by changing its options, to stop accepting cookies completely or to prompt you before accepting a cookie from the website you visit. If you do not accept cookies, however, you may not be able to use all portions of the WideBitcoin Websites or all functionality of the Services.

Please note that disabling these technologies may interfere with the performance and features of the Services.

You may also disable cookies on the WideBitcoin Sites by modifying your settings here:

Visitor comments may be checked through an automated spam detection service.

Last Update: May 25, 2018