NoConsensus.wtf 2025 — Overview

NoConsensus.wtf was a one-day research workshop run by Flashbots on August 13, 2025, co-located with the Stanford Blockchain Conference (SBC). The theme: P2P networking challenges, censorship resistance, and privacy for distributed systems — specifically applied to Ethereum and block-building infrastructure. Fourteen talks, heavy on cryptography and systems research. The unifying agenda was Flashbots’ own R&D program: building anonymous broadcast into production block-building infrastructure.

Core Research Agenda

Three interlocking problems drove nearly every talk:

  1. Scaling blobs/data availability without collapsing the P2P network under bandwidth costs.
  2. Censorship resistance — neither consensus liveness nor TEEs alone are sufficient; the whole network stack must be private.
  3. Anonymous broadcast — as a cryptographic primitive applicable to mempool privacy, block-building coordination, and censorship-resistant gossip.

Talk Map by Theme

P2P Networking & Blob Scaling

  • mempirate (Jonas, Chainbound) — blob propagation napkin math: relays face ~21 TB/month at 48 blobs post-PeerDAS. See P2P Networking in Ethereum.
  • Muriel Medard (Optimum/MIT) — RLNC as a provably optimal alternative to GossipSub. See P2P Networking in Ethereum.
  • Michal — PANDAS — direct UDP P2P protocol for DAS under Danksharding. 2.5s for 20k nodes. See P2P Networking in Ethereum.
  • Leyton Taylor (WorldChain) — raw bandwidth numbers from a production OP Stack L2. See P2P Networking in Ethereum.
  • Kartik (Sei Labs) — Autobahn multi-proposer consensus achieving 5 Ggas / 200k TPS. See Autobahn Consensus.

Anonymous Broadcast & Privacy

Censorship Resistance in Consensus

Distributed Block Building & TEEs

Validator Infrastructure

Distributed Systems Architecture

  • Louis Thibault (Wetware) — object-capability model for secure off-chain distributed apps; caretaker pattern eliminates ambient authority. See Object-Capability Security.

Cross-Cutting Signals

  • TEEs as enabling layer: Five talks referenced TEEs — for disruption resistance (ZipNet), spam removal (BuilderNET), off-chain execution (Wetware), anonymous scheduling (ZipNet/ADCNets), distributed block building. The trust model is consistently “fail-stop”: TEE failures are detectable, not silent.
  • The network layer is the remaining attack surface: Even inside fully compliant TEEs, metadata (IPs, packet timing, order flow source) is visible to network adversaries. Anonymous broadcast is the response.
  • Production numbers as research input: dmarz and mempirate set the design requirements — any anonymous broadcast system must handle ~500 nodes and ~4,000 transactions/second to be production-relevant.
  • Unconditional privacy as north star: Phil Daian’s framing — start with information-theoretic privacy (no assumptions), relax only when forced — set the methodological agenda for the ZipNet and ADCNets work.

Connections

Open Questions

  • Can DCNet-based anonymous broadcast reach the 4,000 TPS / 500-node operating point required for production block building?
  • Does the TEE fail-stop model hold under realistic hardware attack scenarios?
  • Will RLNC or PANDAS displace GossipSub in Ethereum’s P2P layer?