Blockchain in the Real World

Section IX: Applications and Synthesis

Army Cyber Institute

April 9, 2026

From Theory to Reality

We’ve studied how blockchain works—and how it’s abused. But how do real people actually use it?

  • From diagrams → to real systems
  • From cryptography → to applications
  • From theory → to user experience

What Does a User Actually Interact With?

  • Users do not interact with blockchains directly
  • They interact with:
    • Wallet applications
    • Web interfaces (dApps)
    • Exchanges and platforms
  • Blockchain is abstracted away

Walking a Transaction Step-by-Step

  • User initiates an action (send or swap)
  • Wallet creates and signs the transaction
  • RPC provider broadcasts it to the network
    • RPC = Remote Procedure Call, the network interface wallets and apps use to talk to blockchain nodes
  • Node validates and propagates
  • Blockchain records the transaction

Simplified blockchain transaction flow from user through wallet, RPC provider, node, and blockchain.

Wallets: The Control Layer

  • Wallets manage private keys, which control assets
  • They sign transactions on behalf of the user
  • Wallets now come in many forms:
    • browser extensions, mobile apps, hardware devices
    • exchange-linked wallets with extra services
MetaMask fox logo
MetaMask
Browser/mobile wallet focused on signing, swapping, and dApp access.
Ledger logo
Ledger
Hardware wallet focused on isolating keys from the internet-facing device.

Custody Models

  • Custodial
    • Platform holds keys
    • Easier to use
    • Account recovery possible
  • Examples:
    • Coinbase
    • Kraken
    • Robinhood
  • Self-Custody
    • User holds keys
    • Full control
    • No recovery if lost
  • Examples:
    • MetaMask
    • Ledger

Self-Custody does not imply easier or safer control.

What Users Actually Do

Send Funds

Initiate a wallet-to-wallet transfer of value.

Mint or Trade NFTs

Create or exchange unique digital items.

Swap Assets

Trade tokens through smart contracts.

Bridge Across Networks

Move assets between chains or execution layers.

  • Users see apps and wallets
  • But systems rely on hidden infrastructure
  • Multiple components work together behind the scenes
  • Each adds functionality, dependencies, and tradeoffs

RPC Providers: The Access Layer

  • Wallets and apps talk to nodes through JSON-RPC endpoints
  • Common requests: balances, blocks, logs, and transaction submission
  • Providers include:
  • They abstract node access, but can become major infrastructure chokepoints

Nodes and Validators

  • Nodes maintain the ledger, mempool, and current network state
  • Full nodes independently verify blocks and transactions
  • Validators (or miners) order transactions and produce new blocks
  • Consensus rules determine which chain becomes the accepted state

The Full Blockchain System

Full blockchain ecosystem diagram showing the core transaction pipeline, read layer, and supporting external systems.

The diagram shows system relationships; communication paths differ by implementation.

Oracles: Connecting to the Real World

  • Virtual machines are deterministic and cannot query the web directly
  • Oracles publish external data on-chain for smart contracts to read
  • Common inputs: prices, reserves, outcomes, and timestamps
  • Oracle design determines who reports, how often, and how disputes are handled

Typical Oracle Flow

  1. Data is gathered from external APIs, exchanges, or reporters
  2. Oracle nodes validate or aggregate the observations
  3. A signed answer is posted on-chain
  4. Smart contracts read that value during execution

Failure Modes

Bad data, delayed updates, or manipulated reporting can trigger incorrect contract behavior.

Example: Chainlink Data Feeds

Indexing: Making Blockchain Usable

  • Raw blockchain state is optimized for verification, not rich queries
  • Indexers scan blocks, transactions, logs, and contract events
  • They build queryable databases for front ends, dashboards, and analytics
  • Example outputs: wallet history, token balances, DEX trades, NFT activity

Indexing Pipeline

  1. Watch new blocks and contract events
  2. Parse the fields the app cares about
  3. Store them in searchable tables or entities
  4. Serve fast application queries

Why Apps Need It

Without indexing, an app would repeatedly scan raw chain data just to answer simple interface questions.

Example: The Graph

Bridges: Linking Separate Chains

  • Blockchains do not natively share assets or state
  • Bridges move assets or messages between separate networks
  • Often work by locking an asset on one chain and issuing a linked version on another
  • Expand usability across ecosystems, but add major trust and security risks
  • Example: Wormhole

A locking flow:

  1. Send the original token to a bridge contract on Chain A
  2. The bridge contract escrows it so it cannot be spent again there
  3. Bridge validators or relayers verify the lock event
  4. A wrapped or linked token is minted or released on Chain B

Scaling and Interoperability

  • Layer 2 networks execute many user transactions away from the base layer
  • They batch transactions together and post compressed data back to Layer 1
  • Some designs use fraud proofs or validity proofs so Layer 1 can verify the result
  • Interoperability expands what users can do across networks, but adds cross-system dependencies

A typical Layer 2 flow

Users submit transactions to the Layer 2. A sequencer orders them, updates the Layer 2 state, and periodically posts a batch summary plus data or proofs to Layer 1, where final settlement or dispute resolution occurs.

Where Does Blockchain Show Up?

  • We now understand the system architecture
  • The same components can support very different deployments
  • Blockchain is often used to address one or more of these conditions:
    • Multiple parties must coordinate
    • Auditability is required
    • Trust is limited or no single operator should dominate
  • Not every blockchain deployment emphasizes all three equally

Finance (High-Level Overview)

  • Decentralized finance (DeFi)
  • Stablecoin payments and settlement
  • Tokenized assets (real-world and digital)
  • Global, programmable transactions

Market Churn and Complexity

CoinMarketCap’s cryptocurrency count page showed about 46.86 million cryptocurrencies tracked on March 23, 2026. At that scale, discovery, due diligence, liquidity, and risk assessment become dramatically harder, and the market experiences constant churn as new tokens appear faster than most users can evaluate them.

Supply Chain Case

  • Multiple parties share a common ledger
  • Each step records product data (origin, handling, location)
  • Data is visible across trusted organizations
  • Shared records make it easier to trace where contamination or handling problems entered the chain

Example: IBM Food Trust

IBM’s Colli del Garda case study describes a food traceability deployment in which product history, handling events, and distribution records were surfaced to both staff and consumers through an IBM Food Trust-backed system.

Identity Case: Verifiable Credentials

  • Three roles:
  • Issuer (creates credential)
    • Holder (stores it)
    • Verifier (checks it)
  • Credentials are cryptographically signed
  • Validators are run by participating public institutions

Example: EBSI Academic Credentials

The European Commission’s EBSI verifiable-credentials success stories describe a cross-border pilot launched in July 2021 involving 2 university alliances and 11 universities in 11 countries. Students can hold signed credentials in wallets and present them to verifiers without each institution manually re-checking records through a central database.

Prediction Markets Case: Polymarket

  • Users trade YES / NO shares on real-world events
  • Markets use USDC, a dollar-pegged stablecoin, on Polygon for collateral and settlement
  • Wallet signatures authorize trades, while smart contracts track positions and payouts
  • Final resolution still depends on market rules, oracle inputs, and dispute handling
  • The result is transparent and portable, but still exposed to speculation, regulation, and contested outcomes

Policy trouble still matters

Polymarket’s blockchain design does not remove legal oversight. The CFTC’s January 3, 2022 enforcement order shows that even when markets run with wallets, smart contracts, and on-chain settlement, prediction products can still face regulatory action. CFTC Order

Infrastructure as a Use Case

  • Blockchain networks provide services, not just transactions, such as Chainlink for data and Filecoin / IPFS for storage
  • Multiple independent providers coordinate through protocols
  • These services reduce reliance on one company, but still depend on incentives, availability, and data quality

Example: Chainlink Feeds in Lending

Chainlink’s Data Feeds page highlights lending protocols such as Aave as users of decentralized price feeds. In practice, the oracle network is the product: applications depend on it to price collateral, trigger liquidations, and reduce the risk of acting on stale or manipulated market data.

Complications and Risks

  • Fraud: phishing, malicious contracts, and rug pulls
  • Regulation: unclear rules and different approaches across countries
  • Usability: key management and irreversible mistakes
  • Fragmentation: too many networks, standards, and wrapped versions of assets

What the reports show

A report on The crypto ecosystem: key elements and risks argues that congestion, high fees, fragmentation, and de-facto centralization can undermine the system’s promised efficiency and resilience. The FBI’s Operation Level Up and the FTC’s guidance on cryptocurrency scams show the user-facing result: scams, theft, and costly mistakes remain common even when the technology itself is sophisticated.

Fraud and Scams

  • Phishing attacks and fake websites
  • Malicious smart contracts
  • Rug pulls (developers drain liquidity after attracting buyers)
  • Irreversible transactions increase impact

Example: HAWK Memecoin Collapse

CoinDesk reported on December 10, 2024 that Haliey Welch’s HAWK token had lost more than 95% of its value shortly after launch. After a rapid spike in market value, the token crashed within hours and left many buyers with steep losses.

Regulation and Uncertainty

  • Laws and regulations are still evolving
  • Different countries take different approaches
  • Unclear classification of assets (security, commodity, etc.)
  • Regulatory actions can impact markets and platforms

Example: Russia Sanctions and Account Disruption

CoinDesk reported on October 14, 2022 that, after EU sanctions tightened in response to Russia’s invasion of Ukraine, LocalBitcoins, Crypto.com, and Blockchain.com began discontinuing services for Russian users. Some users were told to withdraw funds before their accounts were closed, showing how fast-changing rules can abruptly cut off platform access and create real financial risk for holders.

Usability Challenges

  • Managing private keys is difficult
  • Interfaces can be complex and inconsistent
  • Errors are often irreversible
  • Requires technical understanding from users

Example: Removing Seed-Phrase Friction

CoinDesk covered Coinbase’s February 29, 2024 launch of smart wallets that avoid traditional seed phrases. The product pitch itself is revealing: one of the industry’s biggest onboarding efforts was explicitly framed around eliminating recovery-phrase complexity and reducing the burden placed on ordinary users.

Fragmentation and Speculation

  • Many separate blockchains and ecosystems
  • Limited interoperability between systems
  • Users must navigate multiple networks and standards
  • Market behavior often driven by speculation

Fragmentation Example

In 2023, fears around Multichain’s Fantom bridge caused bridged stablecoins such as anyUSDC to lose their dollar peg. CoinDesk reported that some traders bought the token at roughly a 30% discount, showing how fragmentation between “native” and bridge-issued versions of the same asset can directly hit holders.

How Information Flows in Crypto

  • Multiple actors produce information:
    • Journalists
    • Protocol teams
    • Analysts and researchers
    • Governments and regulators
  • Each has different incentives
  • Information environment is fast-moving and competitive

Key Sources

  • Journalism
    • CoinDesk - markets, companies, and protocol developments.
    • The Block - industry news, policy coverage, and infrastructure.
  • Research and analytics
    • Messari Research - market structure, protocol overviews, and sector reports.
    • Chainalysis - crime trends, illicit-finance analysis, and on-chain investigations.
    • Rekt News - exploit timelines and incident postmortems.
  • Policy and institutions
    • BIS - payments, CBDC, and financial-stability analysis.
    • IMF - digital-money policy, macroeconomic framing.
    • Federal Reserve - U.S. payments-system and central-bank perspectives.

Reading Critically

  • Ask: Who is the source?
  • What are their incentives or biases?
  • Is the claim supported by data or evidence?
  • Cross-check across multiple sources

What Blockchain Looks Like in Practice

  • Users interact through wallets and applications
  • Systems rely on layered infrastructure
  • Tradeoffs reappear:
    • Convenience vs control
    • Performance vs decentralization
  • Blockchain is used selectively, not universally

References

[1]
D. Yaga, P. Mell, N. Roby, and K. Scarfone, “Blockchain technology overview,” National Institute of Standards and Technology, Gaithersburg, MD, NIST IR 8202, Oct. 2018. doi: 10.6028/NIST.IR.8202.
[2]
V. Buterin, “Ethereum: A Next-Generation Smart Contract and Decentralized Application Platform.” Ethereum.org, 2014. Available: https://ethereum.org/content/whitepaper/whitepaper-pdf/Ethereum_Whitepaper_-_Buterin_2014.pdf
[3]
A. M. Antonopoulos and G. Wood, “Mastering Ethereum.” 2018. Available: https://github.com/ethereumbook/ethereumbook
[4]
Ethereum.org, “Transactions.” Accessed: Mar. 18, 2026. [Online]. Available: https://ethereum.org/en/developers/docs/transactions/
[5]
Bitcoin.org Developers, “Wallets (Developer Guide).” 2024. Available: https://developer.bitcoin.org/devguide/wallets.html
[6]
U. C. F. Library, “Digital Wallets: An Overview.” 2022. Available: https://stars.library.ucf.edu/cgi/viewcontent.cgi
[7]
U.S. Securities and Exchange Commission, “U.s. Securities and exchange commission.” Accessed: Mar. 18, 2026. [Online]. Available: https://www.sec.gov
[8]
Ethereum.org, “Ethereum guides.” Accessed: Mar. 18, 2026. [Online]. Available: https://ethereum.org/en/guides/
[9]
Uniswap Labs, “Uniswap documentation.” Accessed: Mar. 18, 2026. [Online]. Available: https://docs.uniswap.org
[10]
OpenSea, “OpenSea help center.” Accessed: Mar. 18, 2026. [Online]. Available: https://support.opensea.io
[11]
Ethereum.org, “JSON-RPC API.” Accessed: Mar. 18, 2026. [Online]. Available: https://ethereum.org/en/developers/docs/apis/json-rpc/
[12]
Infura, “Ethereum API.” Accessed: Mar. 23, 2026. [Online]. Available: https://www.infura.io/product/ethereum
[13]
Alchemy, “Alchemy documentation.” Accessed: Mar. 23, 2026. [Online]. Available: https://www.alchemy.com/docs
[14]
A. M. Antonopoulos, Mastering Bitcoin: Programming the open blockchain, Second edition. Sebastopol, CA: O’Reilly, 2017.
[15]
S. Ellis, A. Juels, and S. Nazarov, ChainLink: A Decentralized Oracle Network.” Apr. 09, 2017. Accessed: Oct. 21, 2025. [Online]. Available: https://research.chain.link/whitepaper-v1.pdf
[16]
K. Croman et al., “On scaling decentralized blockchains - (a position paper),” in Financial cryptography workshops, Feb. 2016. Available: http://diyhpl.us/~bryan/papers2/bitcoin/On%20scaling%20decentralized%20blockchains%20-%20A%20position%20paper.pdf
[17]
Chainlink, “Data feeds.” Accessed: Mar. 23, 2026. [Online]. Available: https://chain.link/data-feeds
[18]
The Graph, “The graph documentation.” Accessed: Mar. 18, 2026. [Online]. Available: https://thegraph.com/docs/en/
[19]
ethereum.org, “Blockchain bridges.” Accessed: Mar. 23, 2026. [Online]. Available: https://ethereum.org/bridges/
[20]
Wormhole, “Wormhole documentation.” Accessed: Mar. 18, 2026. [Online]. Available: https://wormhole.com
[21]
Optimism, “OP stack explainer.” Accessed: Mar. 23, 2026. [Online]. Available: https://docs.optimism.io/stack/explainer
[22]
Arbitrum, “Arbitrum rollup protocol.” Accessed: Mar. 23, 2026. [Online]. Available: https://arbitrum.io/rollup
[23]
BIS, “Annual Economic Report 2022,” Bank for International Settlements (BIS), Annual AR2022E, Jun. 2022. Available: https://www.bis.org/publ/arpdf/ar2022e.pdf
[24]
G. Wang and M. Nixon, SoK: Tokenization on blockchain,” in Proceedings of the 14th IEEE/ACM International Conference on Utility and Cloud Computing Companion, Leicester United Kingdom: ACM, Dec. 2021, pp. 1–9. doi: 10.1145/3492323.3495577.
[25]
U.S. CFTC, CFTC Orders Tether to Pay $41 Million.” 2021. Available: https://www.cftc.gov/PressRoom/PressReleases/8450-21
[26]
M. Labonte and P. Tierno, “Key Issues in Stablecoin Legislation in the 119th Congress,” Congressional Research Service, Washington, D.C., In Focus IF12984, Sep. 2025. Accessed: Sep. 12, 2025. [Online]. Available: https://www.congress.gov/crs_external_products/IF/PDF/IF12984/IF12984.3.pdf
[27]
CoinMarketCap, “Number of cryptocurrencies tracked.” Accessed: Mar. 23, 2026. [Online]. Available: https://coinmarketcap.com/charts/number-of-cryptocurrencies-tracked/
[28]
IBM, “Colli del garda case study.” Accessed: Mar. 23, 2026. [Online]. Available: https://www.ibm.com/case-studies/colli-del-garda-blockchain
[29]
U.S. Food and Drug Administration, “FSMA final rule on requirements for additional traceability records for certain foods.” Accessed: Mar. 18, 2026. [Online]. Available: https://www.fda.gov/food/food-safety-modernization-act-fsma/fsma-final-rule-requirements-additional-traceability-records-certain-foods
[30]
European Commission, “Verifiable credentials success stories.” Accessed: Mar. 23, 2026. [Online]. Available: https://ec.europa.eu/digital-building-blocks/sites/spaces/EBSI/pages/575210496/Verifiable+Credentials+Success+Stories
[31]
World Wide Web Consortium, “Verifiable Credentials Data Model v2.0.” Accessed: Oct. 28, 2025. [Online]. Available: https://www.w3.org/TR/vc-data-model-2.0/
[32]
D. Temoshok, “Digital Identity Guidelines: Authentication and Authenticator Management,” National Institute of Standards and Technology, Gaithersburg, MD, NIST SP 800-63B-4, 2025. doi: 10.6028/NIST.SP.800-63B-4.
[33]
Polymarket, “What is Polymarket.” Accessed: Mar. 19, 2026. [Online]. Available: https://help.polymarket.com/en/articles/13364060-what-is-polymarket
[34]
Polymarket, “Why crypto?” Accessed: Mar. 19, 2026. [Online]. Available: https://help.polymarket.com/en/articles/13364268-why-crypto
[35]
Polymarket, “How are prediction markets resolved?” Accessed: Mar. 19, 2026. [Online]. Available: https://help.polymarket.com/en/articles/13364518-how-are-prediction-markets-resolved
[36]
Commodity Futures Trading Commission, CFTC orders event-based binary options markets operator to pay $1.4 million penalty.” Accessed: Mar. 19, 2026. [Online]. Available: https://www.cftc.gov/PressRoom/PressReleases/8478-22
[37]
E. Androulaki et al., “Hyperledger fabric: A distributed operating system for permissioned blockchains,” in Proceedings of the Thirteenth EuroSys Conference, Porto Portugal: ACM, Apr. 2018, pp. 1–15. doi: 10.1145/3190508.3190538.
[38]
Filecoin, “Filecoin docs.” Accessed: Mar. 18, 2026. [Online]. Available: https://docs.filecoin.io
[39]
IPFS, “IPFS.” Accessed: Mar. 18, 2026. [Online]. Available: https://ipfs.tech
[40]
Chainalysis, “Chainalysis reports.” Accessed: Mar. 18, 2026. [Online]. Available: https://www.chainalysis.com/reports/
[41]
Federal Trade Commission, “Cryptocurrency.” Accessed: Mar. 18, 2026. [Online]. Available: https://www.ftc.gov
[42]
Bank for International Settlements, “The crypto ecosystem: Key elements and risks.” Accessed: Mar. 23, 2026. [Online]. Available: https://www.bis.org/publ/othp72.htm
[43]
Federal Bureau of Investigation, “Operation level up.” Accessed: Mar. 23, 2026. [Online]. Available: https://www.fbi.gov/how-we-can-help-you/victim-services/national-crimes-and-victim-resources/operation-level-up
[44]
Federal Trade Commission, “What to know about cryptocurrency scams.” Accessed: Mar. 23, 2026. [Online]. Available: https://consumer.ftc.gov/articles/what-know-about-cryptocurrency-scams
[45]
Federal Bureau of Investigation, “Internet crime complaint center (IC3).” Accessed: Mar. 18, 2026. [Online]. Available: https://www.ic3.gov
[46]
CoinDesk, “Hailey welch goes AWOL after failed hawk tuah token launch.” Accessed: Mar. 23, 2026. [Online]. Available: https://www.coindesk.com/business/2024/12/10/hailey-welch-goes-awol-after-failed-hawk-tuah-token-launch
[47]
Congressional Research Service, “Congressional research service reports.” Accessed: Mar. 18, 2026. [Online]. Available: https://crsreports.congress.gov
[48]
CoinDesk, “Russian journalists, activists kicked off crypto exchanges due to EU sanctions.” Accessed: Mar. 23, 2026. [Online]. Available: https://www.coindesk.com/policy/2022/10/14/russian-journalists-activists-kicked-off-crypto-exchanges-due-to-eu-sanctions
[49]
E. Toch, M. Ben-Meir, M. Leiser, and A. Zohar, “On cryptocurrency wallet design.” 2021. Accessed: Mar. 18, 2026. [Online]. Available: https://eprint.iacr.org/2021/1522
[50]
A. Voskobojnikov and J. Bonneau, “User perception of bitcoin usability and security across novice users,” International Journal of Human-Computer Studies, 2019, doi: 10.1016/j.ijhcs.2019.02.004.
[51]
CoinDesk, “Coinbase adds smart wallet feature so lengthy seed phrases aren’t needed.” Accessed: Mar. 23, 2026. [Online]. Available: https://www.coindesk.com/tech/2024/02/29/coinbase-adds-smart-wallet-feature-so-lengthy-seed-phrases-arent-needed
[52]
L2BEAT, “L2BEAT.” Accessed: Mar. 18, 2026. [Online]. Available: https://l2beat.com
[53]
S. Aramonte, W. Huang, and A. Schrimpf, “DeFi risks and the decentralisation illusion,” BIS Quarterly Review, Dec. 2021, Accessed: Mar. 18, 2026. [Online]. Available: https://www.bis.org/publ/qtrpdf/r_qt2112b.htm
[54]
CoinDesk, “As multichain wobbles, some fantom-based DeFi projects flee bridged tokens.” Accessed: Mar. 23, 2026. [Online]. Available: https://www.coindesk.com/business/2023/06/01/as-multichain-wobbles-some-fantom-based-defi-projects-flee-bridged-tokens
[55]
International Monetary Fund, “IMF fintech notes.” Accessed: Mar. 18, 2026. [Online]. Available: https://www.imf.org/en/Publications/fintech-notes
[56]
CoinDesk, “CoinDesk.” Accessed: Mar. 18, 2026. [Online]. Available: https://www.coindesk.com
[57]
The Block, “The block.” Accessed: Mar. 18, 2026. [Online]. Available: https://www.theblock.co
[58]
Messari, “Messari research.” Accessed: Mar. 18, 2026. [Online]. Available: https://messari.io/research
[59]
Rekt, “Rekt news.” Accessed: Mar. 19, 2026. [Online]. Available: https://rekt.news
[60]
Federal Reserve, “Board of governors of the federal reserve system.” Accessed: Mar. 18, 2026. [Online]. Available: https://www.federalreserve.gov