Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
the-creator-economy-web2-vs-web3
Blog

Why Blocklist Governance Reveals the True Power Dynamics

An analysis of how the control over NFT blocklists—the tool for enforcing royalties—exposes the centralized choke points and power struggles beneath the surface of decentralized creator economies.

introduction
THE POWER MAP

Introduction

Blocklist governance exposes the centralized control points hidden beneath decentralized marketing.

Blocklists are the ultimate veto. They reveal that permissionless infrastructure is a marketing term, not a technical reality. The entity controlling the list holds unilateral power to censor transactions or freeze assets, a power that contradicts the foundational ethos of decentralization.

Governance tokens are often theater. Projects like Uniswap or Aave promote token-based voting for protocol parameters, but the emergency admin key or a multisig controlling a blocklist is the real source of authority. This creates a governance facade that obscures a centralized kill switch.

The evidence is in the multisigs. Analyze any major DeFi protocol's on-chain admin contracts. You will find a short list of EOAs or Safe multisig wallets with the power to upgrade logic or update filters. This architecture is the de facto standard, not an exception.

thesis-statement
THE GOVERNANCE REALITY

The Core Argument: Blocklists Are Centralized Choke Points

The authority to censor transactions via blocklists is the ultimate governance power, revealing centralized control points within supposedly decentralized systems.

Blocklist control is final governance. The entity that maintains the OFAC-compliant list holds a veto over all transactions, making all other governance votes for upgrades or treasury spending secondary to this censorship power.

Decentralization theater ends at the RPC. Protocols like Uniswap or Aave can be governed by token votes, but if the underlying infrastructure provider like Infura or Alchemy filters transactions, the DAO's sovereignty is an illusion.

This creates silent centralization. The threat isn't a public takeover but the implicit coercion where protocols self-censor to avoid being added to the blocklist, as seen with Tornado Cash sanctions affecting front-end access across major providers.

Evidence: After the Tornado Cash sanctions, Infura and Alchemy restricted access to the protocol's RPC endpoints, demonstrating that infrastructure-level blocklists override application-layer permissionlessness.

market-context
THE POWER DYNAMICS

Current State: A Fragmented, Ad-Hoc Power Grid

Blocklist governance exposes the centralized, ad-hoc control mechanisms that underpin the fragmented multi-chain ecosystem.

Blocklists are the kill switch. The unilateral power to block addresses or contracts reveals that governance is not decentralized. This authority, held by teams like Uniswap Labs or Circle, functions as a centralized veto over protocol operations.

Fragmentation creates power vacuums. Each chain and bridge—LayerZero, Wormhole, Arbitrum—maintains its own opaque blocklist. This patchwork of sovereignty forces users to navigate inconsistent rules, with no unified standard for appeal or transparency.

The power resides with infrastructure. The entities controlling the RPC endpoints, sequencers, and validators hold ultimate execution power. A blocklist is just the most visible manifestation of this infrastructural authority, which can censor transactions before they reach a decentralized ledger.

Evidence: The OFAC-sanctioned Tornado Cash addresses were blocked not by a consensus mechanism, but by the infrastructure providers like Alchemy and Infura, demonstrating that network-level control trumps smart contract logic.

BLOCKLIST GOVERNANCE

Power Dynamics: A Comparative Analysis

A comparative analysis of governance models, revealing where ultimate authority resides in major protocols.

Governance Feature / MetricLayerZeroAxelarWormholeChainlink CCIP

Blocklist Authority

Security Council (9/15 multisig)

Interchain Security Committee (5/8 multisig)

Wormhole Guardians (19/19 multisig)

Committee (N/A)

Blocklist Update Latency

< 1 hour

< 1 hour

< 1 hour

N/A

User-Owned Signing Keys

Governance Token Voting on Blocklists

On-Chain Enforcement Mechanism

Public Blocklist Transparency

N/A

Historical Censorship Actions (2023-2024)

5

0

2

0

deep-dive
THE GOVERNANCE REALITY

The Protocol Illusion: EIP-2981 and the Missing Enforcement Layer

EIP-2981's blocklist function exposes that protocol-level code is subordinate to the social and legal enforcement layers that control it.

Royalty enforcement is off-chain. EIP-2981 is a standard, not an enforcer. It provides a royalty signaling mechanism that marketplaces like OpenSea or Blur can choose to ignore. The protocol layer cannot compel compliance; it only enables it.

Blocklists reveal power dynamics. When a creator uses a tool like Manifold's Royalty Registry to block non-compliant marketplaces, they are executing social-layer governance. The power shifts from the smart contract to the entity maintaining the list and the platforms that respect it.

Code is law until it isn't. The Ethereum execution layer processes transactions blindly. A blocklist's authority derives from the legal threats and community pressure that force centralized operators like NFT marketplaces to check it. The protocol is the messenger, not the judge.

Evidence: Look at adoption. Major platforms like OpenSea enforce creator-set fees only when a blocklist exists, proving the economic incentive to comply comes from external pressure, not the EIP-2981 standard itself.

case-study
GOVERNANCE IN ACTION

Case Studies in Blocklist Power

Theoretical decentralization is cheap; blocklists reveal who truly controls the kill switch.

01

Tornado Cash Sanctions & The OFAC-Compliant Chain

The US Treasury's sanction of Tornado Cash smart contracts forced a hard choice: censor or fork. Major infrastructure providers like Infura and Alchemy complied, blocking RPC access. This exposed the centralized choke points beneath decentralized protocols like Ethereum, proving that governance is downstream of infrastructure control.\n- Revealed Dependency: Frontends and RPCs as compliance vectors.\n- Protocol Response: Ethereum core devs rejected client-level censorship, pushing the problem to the application layer.

$7B+
Value Locked (Pre-Sanction)
100%
Major RPCs Complied
02

Uniswap's Frontend Takedown & The SEC Threat

Uniswap Labs voluntarily restricted access to certain tokens via its frontend interface, citing "regulatory dynamics." This demonstrated that application-layer blocklists are a first line of defense against regulator pressure. The threat of being classified as a securities broker-dealer forced a proactive, centralized curation of a decentralized protocol's gateway.\n- Strategic Retreat: Protected the immutable core protocol by sacrificing frontend neutrality.\n- Precedent Set: Established a template for DeFi projects to appease regulators without hard-forking.

100+
Tokens Delisted
~$4B
Protocol Fee Revenue
03

Solana Validator Client Kill Switch

Solana's validator client software includes a mechanism for the core development teams to effectively halt the network by pushing a software update that rejects all blocks. This 'kill switch' is the ultimate blocklist, controlled by a handful of entities like Solana Labs and Anza. It's a frank admission that liveness sometimes trumps censorship-resistance during catastrophic bugs.\n- Explicit Centralization: Governance encoded in client software distribution.\n- Trade-off Made: Prioritized network recovery over ideological purity during outages.

<10
Entities with Control
5+
Major Halts Since 2021
04

The MEV-Boost Relay Cartel

Over 90% of Ethereum post-Merge blocks are built by a cartel of ~10 dominant MEV-Boost relays. These relays maintain private blocklists, censoring transactions from OFAC-sanctioned addresses. This creates a de facto regulated mempool, where economic incentives (maximal extractable value) align with regulatory compliance, bypassing any on-chain governance vote.\n- Power Concentration: A few relay operators control transaction inclusion.\n- Incentive-Driven Censorship: Profit motive reinforces regulatory blocklists.

90%+
Blocks Affected
<10
Dominant Relays
counter-argument
THE POWER GRAPH

The Steelman: Are Blocklists a Necessary Evil?

Blocklist governance is not a security feature; it is the ultimate expression of who holds final control in a permissionless system.

Blocklists are political tools. They formalize the power of a protocol's core developers or DAO to censor transactions, revealing that permissionless networks have permissioned choke points. This is the operational reality for most major L2s and bridges like Arbitrum and Optimism, which maintain upgradeable contracts.

The counter-intuitive insight is that explicit blocklists are more honest than hidden centralization. A transparent governance kill-switch like in Uniswap or Aave is preferable to the opaque, unaccountable control exercised by off-chain sequencers in many rollups.

Evidence: The Tornado Cash sanctions demonstrated that even Ethereum's base layer is not immune, but the response highlighted a spectrum. Lido's DAO refused to censor, while infrastructure providers like Infura and Alchemy complied, mapping the real network power graph.

risk-analysis
GOVERNANCE AS A WEAPON

Systemic Risks of Centralized Blocklists

Blocklist control is the ultimate veto power, revealing that infrastructure is often more centralized than the applications built on top of it.

01

The OFAC Sanction Oracle Problem

RPC providers like Infura and Alchemy enforce US sanctions, creating a fragmented global ledger. This introduces a single point of failure for censorship resistance.\n- De Facto Jurisdiction: US policy dictates global transaction validity.\n- Slippery Slope: Today's sanctioned addresses, tomorrow's political dissent.

>60%
RPC Market Share
1
Jurisdiction
02

Stablecoin Issuers as Global Regulators

Entities like Circle (USDC) and Tether (USDT) maintain centralized freeze lists. Their compliance decisions can brick assets across Ethereum, Solana, and Tron.\n- Blackhole Risk: Frozen addresses lose access to $100B+ in combined stablecoin liquidity.\n- Protocol Contagion: A freeze can cripple DeFi pools on Aave and Compound.

$100B+
TVL at Risk
Multi-Chain
Attack Surface
03

Validator Cartels & MEV-Boost

In Proof-of-Stake systems, dominant validator pools like Lido and Coinbase can theoretically enforce blocklists via MEV-Boost relays. This centralizes the most critical layer.\n- Consensus-Level Censorship: Transactions can be excluded from blocks entirely.\n- Opaque Governance: Relays like BloXroute and Flashbots make non-public filtering decisions.

33%+
Stake Threshold
Opaque
Relay Rules
04

The Bridge Custodian Trap

Canonical bridges like Polygon PoS Bridge and Arbitrum Bridge rely on multi-sigs. These signers can be compelled to blocklist addresses, stranding assets.\n- Single-Chain Illusion: L2 security reverts to a 5/8 multi-sig.\n- Funds Held Hostage: Users trade Ethereum's security for a custodian's policy.

$20B+
Bridged Value
5/8
Multi-Sig Keys
05

Infrastructure as a Political Tool

The concentration of power in AWS, Cloudflare, and GitHub creates infrastructure kill switches. These are points of coercion outside the protocol.\n- Off-Chain Attack Vector: A state actor can pressure service providers to deplatform nodes.\n- Protocol Irrelevance: Decentralized code is useless without centralized hosting.

70%+
Node Hosting
Global
Chokepoint
06

Solution: Credibly Neutral Protocols

The answer is not no rules, but protocol-level rules. Systems like Ethereum's proposer-builder separation (PBS) and Cosmos' interchain security aim to bake neutrality into consensus.\n- Minimize Trust: Rely on cryptographic proofs, not legal compliance teams.\n- Fork as Final Arbiter: The ultimate blocklist escape is a social consensus fork.

Cryptographic
Guarantees
Social Layer
Final Backstop
future-outlook
THE POWER SHIFT

The Path Forward: From Blocklists to Bonded Markets

Blocklist governance exposes the centralization of trust and creates a market for credible neutrality.

Blocklists are governance theater. They reveal that the ultimate power to censor resides with a small, centralized multisig, not the protocol's code. This is the inherent contradiction of 'decentralized' systems that rely on admin keys for safety.

The market demands credible neutrality. Protocols like Uniswap and Aave face existential pressure to formalize and price this risk. The solution is not hiding the power, but making its exercise prohibitively expensive through economic bonds.

Bonded markets price censorship risk. A validator or sequencer posts a substantial bond that slashes on malicious actions. This creates a verifiable cost for governance overreach, moving trust from personalities to cryptoeconomic security.

Evidence: The EigenLayer restaking market demonstrates the demand for slashing-based security. Its rapid growth shows protocols will pay for cryptoeconomic guarantees over subjective committee decisions.

takeaways
GOVERNANCE IN ACTION

Key Takeaways for Builders and Investors

Blocklist enforcement is not a technical footnote; it is the ultimate stress test for a protocol's power structure and value capture.

01

The Myth of Code-Is-Law

Blocklists prove governance is a political layer on top of protocol logic. The power to censor transactions or freeze assets reveals who holds ultimate sovereignty.\n- Reveals True Custodians: Shows if control lies with a multisig, a DAO, or a foundation.\n- Defines Legal Perimeter: Establishes the protocol's exposure to real-world regulation and enforcement.

>90%
Of Major DeFi
Multisig
Common Control
02

Uniswap vs. Tornado Cash Precedent

Contrasting responses to OFAC sanctions highlight divergent governance philosophies and risk models.\n- Uniswap's Labelled Approach: Frontend filtering preserved protocol neutrality while complying with app-layer demands.\n- Tornado's Immutable Core: Smart contract resistance forced infrastructure-level censorship (e.g., Circle, RPC providers), exposing broader stack vulnerability.

Frontend
Compliance Layer
L1/L2
Censorship Vector
03

Investor Diligence: The Blocklist Audit

The implementation details of a blocklist are a critical investment signal, more telling than tokenomics slides.\n- Check Upgradeability: Can a small multisig update the list without delay? This is centralization risk.\n- Map the Stack: Censorship can occur at the RPC (Alchemy, Infura), sequencer (OP Stack, Arbitrum), or bridge (LayerZero, Wormhole) level.

Timelock
Key Metric
Full-Stack
Audit Scope
04

Builder's Dilemma: Compliance vs. Credible Neutrality

Designing for blocklists is now a first-order architectural decision with trade-offs for growth and resilience.\n- Modular Censorship: Isolate the function to a upgradeable module vs. baking it into core logic (see dYdX v4).\n- Market Positioning: Protocols that credibly resist censorship (e.g., Ethereum post-Merge, Cosmos app-chains) attract a premium but face regulatory headwinds.

Modular
Design Trend
Neutrality Premium
Market Value
05

The MEV Cartel Connection

Blocklist enforcement is often outsourced to validators and searchers, creating a new revenue stream and centralization vector.\n- Proposer-Builder Separation (PBS): In Ethereum, block builders can exclude transactions, bypassing consensus-level debates.\n- Sequencer Profit: On L2s like Arbitrum, the sequencer has unilateral power to order or drop transactions, monetizing compliance.

Builder
Enforcement Agent
New Revenue
For Validators
06

Long-Term Play: Resistance as a Feature

The most defensible protocols will architect for credible neutrality, turning censorship-resistance into a unique selling proposition.\n- Technical Stack: Leverage EigenLayer for decentralized sequencing, or build on Monad/Sei for high-throughput execution with native resistance.\n- Investible Thesis: Back infrastructure that hardens the stack (e.g., Flashbots SUAVE, Tornado Cash-like privacy primitives) against political capture.

SUAVE
Key Infrastructure
EigenLayer
Decentralization Play
ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team