Real-time TPS
Etherlink TPS is coming soon, while Integritee TPS is 0.1 tx/s
Max TPS (100 blocks)
Etherlink max TPS is coming soon, while Integritee max TPS is 14.42 tx/s
Max Theoretical TPS
Etherlink max theoretical TPS is coming soon, while Integritee max theoretical TPS is 1,500 tx/s
Total Transactions
Etherlink total txns is coming soon, while Integritee total txns is 344 txns
Block Time
Etherlink block time is coming soon, while Integritee block time is 13.38s
Finality
Etherlink finality is coming soon, while Integritee finality is 1m
Nakamoto Coefficient
Etherlink and Integritee nakamoto coefficient are both coming soon
Active Addresses
Etherlink and Integritee active addresses are both coming soon
Governance
Etherlink governance is coming soon, while Integritee governance is on-chain
Type
Etherlink type is unknown, while Integritee is a parachain
Launch Date
The Etherlink launch date is unknown, while Integritee was launched on Mar 21, 2022
Other Comparisons
Etherlink Comparisons
Integritee Comparisons
About Blockchains
About Etherlink
Etherlink is an EVM-compatible, non-custodial Layer 2 blockchain powered by Tezos Smart Rollup technology. It enables seamless integration with existing Ethereum tools, including wallets and indexers, and facilitates asset transfers to and from other EVM-compatible chains. Built upon the secure foundation of Tezos layer 1, Etherlink delivers a fast, fair, and (nearly) free experience. This permissionless and censorship-resistant environment empowers developers to actively create and participate in the next generation of decentralized applications.
About Integritee
Integritee is a blockchain project focused on providing privacy-preserving solutions for dApps and smart contracts. It aims to enable confidential computing on public blockchains, allowing sensitive data to be processed securely without compromising privacy. Integritee utilizes trusted execution environments (TEEs), such as Intel SGX, to create secure enclaves where data can be processed confidentially. This ensures that data remains encrypted and inaccessible to anyone, including the network validators or operators, while it is being processed. This idea opens up new possibilities for privacy-focused applications in finance, healthcare, and so on.