News

Ethereum bots are burning over 50% of gas fees so ETH now needs privacy just to scale

تكنلوجيا اليوم 2026-02-17 12:27:00

On some Ethereum L2s, bots now burn over half the gas just searching for MEV, and they don’t pay proportionally for it. That’s a scaling and market-fairness problem rooted in market structure.

The privacy conversation in crypto has finally escaped the “anonymous money” framing that dominated the last cycle. In early 2026, the urgency is economic, not ideological.

The industry is confronting a structural problem: on-chain transparency creates extractable value at massive scale, and that extraction is now large enough to be a scaling bottleneck, not just a philosophical complaint.

Flashbots has documented how MEV-related “search spam” can consume more than 50% of gas on major layer 2s while paying a small share of fees. Alchemy, citing EigenPhi data, points to nearly $24 million in MEV profit extracted on Ethereum over just 30 days, from Dec. 8, 2025, to Jan. 6, 2026.

When a hedge fund’s $10 million DEX swap is visible in the mempool before it lands, slippage from sandwich attacks can dwarf gas costs.

Privacy is no longer a feature request. It’s a market fairness problem.

Reads, writes, proving

The Ethereum Foundation’s Privacy and Scaling Explorations team has standardized a three-part framework: private writes, private reads, and private proving.

Private reads relate to hiding transaction intent before execution. Private reads hide which users and apps are querying, such as balances and positions. Private proving is about making zero-knowledge proofs and attestations cheap and portable enough to embed everywhere.

Cais Manai, co-founder and CPO of TEN Protocol, argues the most urgent problem is reads. He stated that the industry has spent years obsessing over hiding who sent what to whom, the ‘write’ side of privacy.

However, he noted:

“The real hemorrhage right now is on the read side: the fact that every balance, every position, every liquidation threshold, every strategy is sitting there in plaintext for anyone to inspect. That’s what powers MEV. That’s what makes institutional DeFi a non-starter.”

Over 112,000 ETH, roughly $400 million at current prices, has been extracted from users by sequencers and MEV bots feeding on the readable state, according to TEN’s estimates.

The solution Manai advocates involves encrypting the entire execution environment using Trusted Execution Environments (TEEs). He explained:

“Contract state and logic stay encrypted while in use, not just at rest. Nobody reads what they’re not supposed to, because there’s nothing exposed to read.”

Tanisha Katara, founder of Katara Consulting Group, sees “writes” as the most costly problem right now.

According to her:

“Read privacy (RPC leakage, query patterns) is a slow-burning surveillance issue. Write privacy (front-running, sandwich attacks on institutional flows) is actively destroying value today. It’s hundreds of millions per year being extracted from users because their transaction intent is visible before execution. “

Andy Guzman, who leads the Ethereum Foundation’s Privacy and Scaling Explorations team, emphasizes that private reads are not widely understood.

He elaborated further:

“Private Writes is the one that currently takes most attention, it’s the ‘first base’ and arguably the first thing you have to do. Private Proving is the enabler of the other two, and it has advanced significantly in recent years. Still a lot to do.”

MEV search spam consumed over 50% of gas on major Layer 2s, including Unichain and OP Mainnet, while paying under 10% of fees.

Private writes as the wedge

Private orderflow is a product, not research.

Flashbots’ MEV-Share operates as an order-flow auction in which users and wallets selectively share transaction data to redistribute MEV. By default, 90% of extracted value flows back to users rather than disappearing to bots.

Encrypted mempools represent the next layer. Shutter’s research documents a pathway that uses threshold encryption and timed key release, integrated with proposer-builder separation.

Transactions enter the mempool encrypted and are decrypted only after the order is committed, eliminating the public mempool as an attack surface. The design acknowledges practical constraints: latency overhead, reorg edge cases, and coordination challenges across validator sets.

The economic pressure is real enough that major infrastructure providers are building MEV protection into default flows.

Alchemy’s MEV overview characterizes the problem as systemic, with documented profit extraction totaling approximately $1 billion annually across major chains.

LayerWhat’s exposed todayEconomic harmWhat’s deploying now (examples)Main bottleneck
WritesTrade intent pre-executionSandwiching / slippageMEV-Share, private orderflow, encrypted mempool researchCoordination + wallet defaults
ReadsBalances / positions / queriesStrategy leakage / MEV fuelPrivate RPC, stealth addresses (ERC-5564), TEEs / confidential executionUX + developer UX
ProvingPrivacy proofs portability/costDeployment frictionzk tooling improving (Ethproofs: ~5× latency ↓, ~15× cost ↓)Integration + product decisions

Silent leak becoming the next headline

The Ethereum privacy roadmap now explicitly elevates private reads as a first-class track.

RPC privacy, which hides which addresses query which contracts, is important because query patterns expose strategies. If a bot observes that a specific address repeatedly checks a liquidation threshold, it knows the position is near collapse.

Wallet-side privacy primitives are where this gets practical. Stealth addresses are formally standardized under ERC-5564, enabling recipient privacy by generating unique, unlinkable addresses for each payment.

The specification exists, but broad wallet adoption remains hindered by UX challenges, including scanning incoming payments, reconciling balances across ephemeral addresses, and the complexity of key management.

Manai’s developer UX argument hits hardest here:

“The real UX bottleneck in 2026 is developer UX, the gap between ‘I want to build a private application’ and actually being able to do it without learning an entirely new programming model, a custom language, or a bespoke proving system.”

He highlighted the need for full EVM/SVMs running within TEEs so developers can build encrypted dApps using the same tools, languages, and mental models they already have. No circuits to write, no custom VMs to learn.

Proving is improving fast enough

Zero-knowledge proving costs have collapsed. Ethproofs’ 2025 review documents onboarding multiple zkVMs and provers, verifying roughly 200,000 blocks, and seeing latency fall approximately fivefold while costs dropped around fifteenfold over the year.

Proof generation is no longer the primary constraint on privacy deployment.

The bottleneck has shifted to coordination and integration. Guzman identifies user experience and cost as the primary barriers for retail users, and regulation and compliance as the primary barriers for institutions.

CryptoSlate Daily Brief

Daily signals, zero noise.

Market-moving headlines and context delivered every morning in one tight read.