Home web3.0 The number of Web3 users surged 40% in the second quarter, setting a new historical record

The number of Web3 users surged 40% in the second quarter, setting a new historical record

Jul 11, 2024 am 10:54 AM
web3 cyber security dapp

Web3用户数第二季度飙升40% 刷新历史记录

In the second quarter of 2024, user participation in the Web3 field reached a new peak, and the number of daily unique active wallets (dUAW) reached an average of 10 million. Compared with the previous quarter, this number achieved 40% significant growth.

According to a report released by blockchain analysis platform DappRadar on July 4, the decentralized application (DApp) industry has experienced unprecedented expansion in many aspects and has shown a positive growth trend overall.

Social dApp and NFT market growthSignificant

In the second quarter of 2024, the social decentralized application (dApp) and NFT market performed well and became a significant growth point in the quarter. The growth in user activity of social dApps is particularly significant, with dUAW increasing by 66% year-on-year. This trend is mainly driven by applications such as Fantasy.top and UXLINK. Although the market share of the blockchain gaming space has declined, its user base is still growing.

At the same time, the user activity of decentralized exchanges (DEX) has also seen a significant increase, especially Uniswap and Raydium. Thanks to the addition of meme currency traders, dUAW has increased by 80% and 134% respectively. At the same time, the NFT market also ushered in its highest usage since the first quarter of 2023, with transaction volume reaching $4 billion and the number of transactions exceeding 14.9 million. Magic Eden's market share increased from 17% to 22%, while Blur's market share dropped to 31%.

However, while the number of users grew, the total value of cryptocurrencies locked in DeFi applications fell by $7 billion, a 4% decrease from the previous quarter. The total value locked (TVL) of Tron and Arbitrum decreased by 17% and 9% respectively. At the same time, Ethereum’s layer 2 solutions Linea and Base achieved growth against the trend, with Linea’s TVL increasing by 420% and Base’s TVL increasing by 44%.

DappRadar warned of this, noting that dUAW’s rapid growth may not be sustainable, with part of the growth due to users participating in “airdrop farming” activities, that is, participating in certain activities in order to obtain airdrop tokens. The Blast and zkSync airdrop events in June were one of the factors contributing to this growth. The report highlights the need to deliver an excellent user experience, have a solid development roadmap, and have strong team support in order to achieve sustained growth.

Security issues are still the focus of the Web3 industry

According to the latest report from DappRadar, security issues in the Web3 industry remain severe in the second quarter of 2024, with losses caused by security breaches reaching US$430 million, an increase of 5% from the previous quarter. Among them, Ethereum and BNB Chain are the two chains most affected by attacks, each responsible for about 28% of security incidents. The Solana chain accounted for 8% of the events, and other chains such as Polygon and Arbitrum were also affected to a certain extent.

Among various security incidents, although access control problems only account for 23% of the total number of incidents, the financial losses caused by them account for 75% of the total losses, showing the extremely harmful and serious nature of such problems. In comparison, although flash loan attacks and dragnet attacks each accounted for 13% of the total number of incidents, the losses they caused were relatively small, accounting for only about 1% of the total losses. At the same time, although phishing attacks accounted for only 3% of the total number of incidents, the financial losses they caused also reached 0.4% of the total losses.

The above data shows that the Web3 industry needs to more accurately identify and respond to risk points that may lead to heavy losses in terms of security protection.

Conclusion:

With the significant growth in the number of Web3 users in the second quarter of 2024, we have witnessed unprecedented activity and development potential in the industry. However, DappRadar’s report also reminds us that this growth may be partly due to short-term “airdrop farming” activities, and its sustainability still requires further observation and analysis within and outside the industry. In addition, security issues are still a major challenge that cannot be ignored in the Web3 field, especially in aspects such as access control and flash loan attacks, which require the industry to adopt more stringent security measures and risk management strategies.

Looking to the future, if the Web3 industry wants to achieve healthy and stable development, it must find a balance between innovation and security. This requires not only technological innovation and excellent user experience, but also a reliable development roadmap, strong team support, and an industry-wide emphasis on and active response to security issues. Only in this way can we jointly promote the sustainable progress of Web3 technology and create a more secure, transparent and efficient digital ecosystem for users.

The above is the detailed content of The number of Web3 users surged 40% in the second quarter, setting a new historical record. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Roblox: Bubble Gum Simulator Infinity - How To Get And Use Royal Keys
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
Nordhold: Fusion System, Explained
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
Mandragora: Whispers Of The Witch Tree - How To Unlock The Grappling Hook
3 weeks ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

Hot Topics

Java Tutorial
1672
14
PHP Tutorial
1276
29
C# Tutorial
1256
24
Master network security and penetration testing in Go Master network security and penetration testing in Go Nov 30, 2023 am 10:16 AM

With the development of the Internet, network security has become an urgent issue. For technical personnel engaged in network security work, it is undoubtedly necessary to master an efficient, stable, and secure programming language. Among them, Go language has become the first choice of many network security practitioners. Go language, referred to as Golang, is an open source programming language created by Google. The language has outstanding features such as high efficiency, high concurrency, high reliability and high security, so it is widely used in network security and penetration testing.

Artificial Intelligence in Cybersecurity: Current Issues and Future Directions Artificial Intelligence in Cybersecurity: Current Issues and Future Directions Mar 01, 2024 pm 08:19 PM

Artificial intelligence (AI) has revolutionized every field, and cybersecurity is no exception. As our reliance on technology continues to increase, so do the threats to our digital infrastructure. Artificial intelligence (AI) has revolutionized the field of cybersecurity, providing advanced capabilities for threat detection, incident response, and risk assessment. However, there are some difficulties with using artificial intelligence in cybersecurity. This article will delve into the current status of artificial intelligence in cybersecurity and explore future directions. The role of artificial intelligence in cybersecurity Governments, businesses and individuals are facing increasingly severe cybersecurity challenges. As cyber threats become more sophisticated, the need for advanced security protection measures continues to increase. Artificial intelligence (AI) relies on its unique method to identify, prevent

Binance releases Web3 wallet, an article details its highlights Binance releases Web3 wallet, an article details its highlights Jan 18, 2024 pm 04:45 PM

Quick introduction: According to news on November 8, Richard Teng, general manager of Binance’s regional market, announced the launch of the self-hosted Binance Web3 wallet at Binance’s flagship event Istanbul Binance Blockchain Week, aiming to provide users with simple, secure, and integrated wallets. A one-stop Web3 experience. The wallet is embedded in the Binance App, providing users with a way to explore the Web3 world without complicated registration or worries about losing their mnemonic phrases. Users can easily exchange multiple tokens, access various DApps, quickly transfer funds, and earn income using cryptocurrencies. Binance, the world’s leading blockchain ecosystem and virtual asset exchange, recently launched a product called Binance Web3 Wallet. The wallet is designed to satisfy users’ needs for simple, convenient and secure We

Roborock sweeping robot passed Rheinland dual certification, leading the industry in corner cleaning and sterilization Roborock sweeping robot passed Rheinland dual certification, leading the industry in corner cleaning and sterilization Mar 19, 2024 am 10:30 AM

Recently, TUV Rheinland Greater China ("TUV Rheinland"), an internationally renowned third-party testing, inspection and certification agency, issued important network security and privacy protection certifications to three sweeping robots P10Pro, P10S and P10SPro owned by Roborock Technology. certificate, as well as the "Efficient Corner Cleaning" China-mark certification. At the same time, the agency also issued self-cleaning and sterilization performance test reports for sweeping robots and floor washing machines A20 and A20Pro, providing an authoritative purchasing reference for consumers in the market. As network security is increasingly valued, TUV Rheinland has implemented strict network security and privacy protection for Roborock sweeping robots in accordance with ETSIEN303645 standards.

What does WEB3 mean? What does WEB3 mean? Mar 12, 2024 pm 02:18 PM

Web3.0 refers to the third generation of the Internet, the protocol Internet. The core is: user creation, user ownership, user control, and agreement distribution of benefits. It uses the technology of blockchain protocol creation and automatic execution, that is, rights and value through smart contracts. The distribution agreement can be executed efficiently, accurately, and reliably without using a third party, and the entire process can be audited.

How to install Zeek Internet Security Monitor 12 on Debian How to install Zeek Internet Security Monitor 12 on Debian Feb 19, 2024 pm 01:54 PM

Bro has been renamed Zeek and is a powerful open source network security monitor. It is not only an IDS, but also a network analysis framework. Zeek provides you with real-time insights into network operations to help detect and prevent security incidents. Its benefits include detailed network traffic logging, event-driven analysis and the ability to detect a wide range of network anomalies and security events. Install Zeek Internet Security Monitor 12 Bookworm on Debian Step 1. Before installing Zeek, you need to update and refresh your Debian repository by executing the following command: sudoaptupdatesudoaptupgrade This command will update the package list for upgrades and new package installations. Step 2. Install ZeekN on Debian

Ten methods in AI risk discovery Ten methods in AI risk discovery Apr 26, 2024 pm 05:25 PM

Beyond chatbots or personalized recommendations, AI’s powerful ability to predict and eliminate risks is gaining momentum in organizations. As massive amounts of data proliferate and regulations tighten, traditional risk assessment tools are struggling under the pressure. Artificial intelligence technology can quickly analyze and supervise the collection of large amounts of data, allowing risk assessment tools to be improved under compression. By using technologies such as machine learning and deep learning, AI can identify and predict potential risks and provide timely recommendations. Against this backdrop, leveraging AI’s risk management capabilities can ensure compliance with changing regulations and proactively respond to unforeseen threats. Leveraging AI to tackle the complexities of risk management may seem alarming, but for those passionate about staying on top in the digital race

How do C++ functions implement network security in network programming? How do C++ functions implement network security in network programming? Apr 28, 2024 am 09:06 AM

C++ functions can achieve network security in network programming. Methods include: 1. Using encryption algorithms (openssl) to encrypt communication; 2. Using digital signatures (cryptopp) to verify data integrity and sender identity; 3. Defending against cross-site scripting attacks ( htmlcxx) to filter and sanitize user input.