Blockchain Technology

Blockchain Scalability Trilemma

The blockchain scalability trilemma (articulated by Vitalik Buterin) states that blockchain networks can only optimise for two of three properties simultaneously — decentralisation (permissionless validator participation), security (resistance to attack), and scalability (high transaction throughput) — with each L1 chain making different trade-offs, and Ethereum's modular roadmap (rollups + data availability) attempting to achieve all three through architectural separation.

The Trilemma Defined

The blockchain scalability trilemma, articulated by Vitalik Buterin in 2018, describes a fundamental constraint in blockchain design: it is extremely difficult to build a system that simultaneously achieves decentralisation (anyone can participate as a validator/node with commodity hardware), security (the cost of a 51% attack is prohibitively high), and scalability (the system can process thousands of transactions per second at low cost). Traditional distributed systems theory (CAP theorem) identified analogous trade-offs in databases; the blockchain trilemma applies the same insight to permissionless consensus systems.

Understanding the trilemma is essential for evaluating any blockchain's design choices, understanding why certain chains have the properties they do, and assessing the credibility of claims that a new L1 has "solved" the scalability problem. Every blockchain that has achieved high throughput has done so by making trade-offs — usually sacrificing some degree of decentralisation — and understanding which trade-off was made is critical for evaluating the long-term security and censorship-resistance properties of assets built on that chain.

The Three Properties

Decentralisation: The system does not require trusting or depending on a small number of specific validators or operators. A blockchain is decentralised if any person with commodity hardware and an internet connection can run a full node and participate in consensus without permission. Decentralisation provides censorship resistance (no small group can prevent your transactions from being processed), permissionless innovation (anyone can build on the chain without approval), and systemic resilience (no single point of failure or capture). Decentralisation is measured by: number of validators, hardware requirements for full node participation, geographic distribution, and client software diversity.

Security: The cost of attacking the network (performing a 51% attack on a PoW chain, or controlling 33%+ of stake for Byzantine fault tolerance attacks on a PoS chain) is prohibitively high. Security is fundamentally a function of the total economic value protecting the network: for Bitcoin PoW, it is the total hashrate and energy cost; for Ethereum PoS, it is the total value of staked ETH (currently ~$60B+). Security is not simply a binary property — it is an economic function of the cost to attack vs the value to be extracted from an attack.

Scalability: The system can process enough transactions per second (TPS) and at sufficiently low cost to support widespread practical usage. Ethereum mainnet processes approximately 15–30 TPS at base layer — far below Visa (24,000 TPS) or any centralised system. Increasing scalability at the base layer without compromising the other two properties is the core challenge the trilemma identifies.

How Different Chains Navigate the Trilemma

Bitcoin: Explicitly prioritises security and decentralisation over scalability. Bitcoin's 1–4 MB block size limit and 10-minute block time are intentional constraints — ensuring that a full node can be run on commodity hardware anywhere in the world with a reasonable internet connection, maintaining maximum decentralisation. Bitcoin's scalability is therefore limited by design; the Lightning Network (a payment channel layer built on top of Bitcoin) attempts to address this without modifying base layer constraints.

Solana: Prioritises scalability and security over decentralisation. Solana achieves 65,000+ TPS theoretical throughput through Proof of History (a verifiable delay function creating a cryptographic clock) and highly optimised parallel transaction processing. The trade-off: running a Solana validator requires expensive server hardware (128GB+ RAM, high-end CPUs, enterprise-grade storage) — creating a meaningful barrier to validator participation that concentrates the validator set in data centres. Solana has experienced multiple network halts due to validator software vulnerabilities — reflecting the security/reliability trade-offs of optimising aggressively for throughput.

BNB Chain (Binance Smart Chain): Achieves scalability by reducing the validator set to 21 active validators controlled by Binance and selected validators — dramatically increasing throughput and reducing costs but sacrificing decentralisation to a degree most Ethereum developers consider unacceptable. BNB Chain's security model depends heavily on trusting Binance, rather than the economic guarantees of a large permissionless validator set.

Ethereum base layer: Prioritises security and decentralisation over base layer scalability — deliberately keeping block sizes small enough for global commodity hardware node operation. Ethereum's base layer TPS has not increased dramatically through Ethereum's history (though proto-danksharding via EIP-4844/blobs in 2024 increased L2 throughput by reducing blob data costs).

Ethereum's Rollup-Centric Roadmap: Modular Architecture

Ethereum's answer to the trilemma is architectural separation — achieving all three properties not within a single monolithic layer but by separating execution, data availability, and settlement into distinct layers:

Rollups (L2s): Execute transactions off the Ethereum main chain at high speed and low cost (Arbitrum, Optimism, zkSync, Starknet). Transaction execution is handled by the L2 sequencer (which is centralised in current implementations but is transitioning to decentralised designs). Security is inherited from Ethereum's settlement layer — rollup state roots are periodically posted to Ethereum, and fraud proofs (optimistic rollups) or validity proofs (ZK rollups) ensure correctness relative to Ethereum's state.

Data availability: Rollups must post their transaction data somewhere accessible for fraud proof verification and for independent reconstruction of L2 state. They can post to Ethereum mainnet (most secure, most expensive), to EigenDA (off-chain DA using restaked ETH security), or to dedicated DA layers like Celestia or Avail. EIP-4844 ("blobs") introduced a dedicated cheaper data storage format for rollup data on Ethereum, dramatically reducing L2 transaction costs.

The result: Users interact with L2s (high TPS, low cost) while inheriting Ethereum's security guarantees. Ethereum's base layer remains decentralised and highly secure; scalability is achieved by the rollup execution layer rather than the settlement layer. This modular approach separates the trilemma's three properties across layers rather than forcing a single layer to compromise between them.

Sharding: The Alternative Scaling Path

Ethereum's original scaling roadmap included "sharding" — dividing the Ethereum validator set into subsets (shards) that each process a portion of total transactions in parallel. The consensus shift toward rollups as the primary scaling path has deprioritised execution sharding, but data sharding (distributing data availability across the validator set via danksharding) remains part of the Ethereum roadmap as a way to scale the amount of blob data available for rollups, further reducing L2 costs as rollup adoption grows.

Summary

The blockchain scalability trilemma is a genuine architectural constraint — not a marketing problem to be solved with a press release. Every L1 blockchain claiming to have "solved" scalability has done so by making trade-offs, usually in decentralisation: fewer validators, more expensive hardware requirements, or operator-controlled validator sets. Ethereum's rollup-centric modular architecture represents the most technically sophisticated attempt to achieve all three properties simultaneously — by separating them across execution, settlement, and data availability layers rather than requiring any single layer to compromise. Understanding these trade-offs is essential for evaluating long-term asset security and censorship-resistance properties across the blockchain landscape.