Legal expert affirms public blockchains remain regulatory standard despite corporate L1 launches


0

Unlock the Secrets of Ethical Hacking!
Ready to dive into the world of offensive security? This course gives you the Black Hat hacker’s perspective, teaching you attack techniques to defend against malicious activity. Learn to hack Android and Windows systems, create undetectable malware and ransomware, and even master spoofing techniques. Start your first hack in just one hour!
Enroll now and gain industry-standard knowledge: Enroll Now!

Variant Fund chief legal officer Jake Chervinsky maintains that decentralized public blockchains remain the regulatory standard for product development, despite recent announcements of corporate-controlled layer-1 (L1) networks.

Chervinsky argued on X that many new L1s built by companies for product-specific reasons are “unnecessary” and “unhelpful” from a regulatory perspective.

He noted that no US regulator has demanded permissioned validator sets or built-in compliance tools, and no serious legislative effort in Congress has contemplated such requirements.

Chervinsky added:

“If you have a great commercial reason to build (or build on) a product-specific L1, have at it. If not, and you’re just vaguely worried about compliance issues, decentralized public blockchains remain the standard.”

Circle recently announced its own L1 called Arceeee last month, followed by Stripe revealing Tempo, a payment-focused L1 network built in collaboration with Paradigm.

Corporate L1s as regulatory arbitrage

Venture capitalist Revaz Shmertz offered a contrasting view in response to Chervinsky’s remarks, arguing that corporate L1s represent a form of regulatory arbitrage.

Shmertz contended that regulatory agencies may act unilaterally through enforcement actions and guidance letters, regardless of congressional inaction.

He argued:

“Corporate L1s represent regulatory arbitrage, with companies building blockchain infrastructure that preemptively satisfies compliance requirements rather than fighting for protocol-level neutrality.”

Shmertz suggested this approach creates a “bifurcated adoption” where compliant corporate chains serve institutional use cases while neutral protocols handle retail and DeFi applications.

He further assessed that the structural reality is that when traditional finance companies can build blockchain rails with familiar regulatory frameworks, they avoid the need to lobby for crypto-friendly legislation.

Chervinsky’s position emphasizes maintaining base layer neutrality principles rather than compromising on decentralization for perceived regulatory benefits that regulators have not explicitly requested.

The ongoing corporate blockchain launches will test whether regulatory compliance concerns or commercial control ultimately drives institutional blockchain adoption.

At the same time, lobbyist groups are advocating for a flexible approach towards decentralization to the Securities and Exchange Commission (SEC).

Five core principles

The DeFi Education Fund (DEF) submitted a letter to the SEC on April 18 proposing five core principles for creating a “token safe harbor” framework supporting decentralized finance initiatives.

DEF emphasized that any safe harbor should adopt technology-agnostic approaches addressing activity risks rather than prescribing rules for specific blockchain models.

The group advocated for broad eligibility criteria allowing already-distributed tokens to qualify, provided they meet decentralization goals, rather than evaluating status only at genesis.

Chervinsky’s position emphasizes maintaining base layer neutrality principles rather than compromising on decentralization for perceived regulatory benefits that regulators have not explicitly requested.

The ongoing corporate blockchain launches will test whether regulatory compliance concerns or commercial control ultimately drives institutional blockchain adoption.

Mentioned in this article


Unlock the Secrets of Ethical Hacking!
Ready to dive into the world of offensive security? This course gives you the Black Hat hacker’s perspective, teaching you attack techniques to defend against malicious activity. Learn to hack Android and Windows systems, create undetectable malware and ransomware, and even master spoofing techniques. Start your first hack in just one hour!
Enroll now and gain industry-standard knowledge: Enroll Now!

Don’t miss the Buzz!

We don’t spam! Read our privacy policy for more info.

🤞 Don’t miss the Buzz!

We don’t spam! Read more in our privacy policy


Like it? Share with your friends!

0

0 Comments

Your email address will not be published. Required fields are marked *