
SUI
Sui price
$3.2953
-$0.02870
(-0.87%)
Price change for the last 24 hours

How are you feeling about SUI today?
Share your sentiments here by giving a thumbs up if you’re feeling bullish about the coin or a thumbs down if you’re feeling bearish.
Vote to view results
Sui market info
Market cap
Market cap is calculated by multiplying the circulating supply of a coin with its latest price.
Market cap = Circulating supply × Last price
Market cap = Circulating supply × Last price
Circulating supply
Total amount of a coin that is publicly available on the market.
Market cap ranking
A coin's ranking in terms of market cap value.
All-time high
Highest price a coin has reached in its trading history.
All-time low
Lowest price a coin has reached in its trading history.
Market cap
$11.21B
Circulating supply
3,396,671,135 SUI
33.96% of
10,000,000,000 SUI
Market cap ranking
10
Audits

Last audit: --
24h high
$3.3924
24h low
$3.2257
All-time high
$5.3681
-38.62% (-$2.0728)
Last updated: 7 Jan 2025, (UTC+8)
All-time low
$0.10000
+3,195.29% (+$3.1953)
Last updated: 3 May 2023, (UTC+8)
Sui Feed
The following content is sourced from .

PANews
preface
This event is a victory for capital, not users, and it is a regression for the development of the industry.
Bitcoin to the left, Sui to the right, and every industry move that shakes up decentralization brings a stronger belief in Bitcoin.
The world needs not just a better global financial infrastructure, but a group of people who will always need freedom.
Once upon a time, the alliance chain was more prosperous than the public chain, because it met the regulatory needs of that era, and now the decline of the alliance actually means that it simply complies with this demand, not the needs of real users.
1. Background of the event
On May 22, 2025, Cetus, the largest decentralized exchange (DEX) in the Sui public chain ecosystem, was attacked by hackers, causing a sharp drop in liquidity and the collapse of multiple trading pairs, resulting in a loss of more than $220 million.
As of press time, the timeline is as follows:
On the morning of May 22, hackers attacked Cetus to extract $230 million, and Cetus urgently suspended the contract and issued an announcement
On the afternoon of May 22, the hacker transferred about $60 million across the chain, and the remaining $162 million was still in the Sui on-chain address, and the Sui validator node quickly took action to add the hacker address to the "Deny List" and freeze the funds
On the evening of May 22, Sui CPO @emanabio tweeted that the funds have been frozen and will start soon
On May 23rd, Cetus began fixing bugs and updating contracts
On May 24th, Sui opened an open source PR, explaining that the funds will be recovered through aliasing and whitelist
On May 26, Sui initiated an on-chain governance vote proposing whether to perform a protocol upgrade and transfer the hacker's assets to an escrow address
On May 29, the voting results were announced, and more than 2/3 of the validator nodes were weighted to support; The protocol upgrade is ready to be executed
From May 30 to early June, the protocol upgrade took effect, the specified transaction hash was executed, and the hacked assets were "legally transferred"
2. Attack principle
The principle of events is related, and there have been many statements in the industry, so here is only an overview of the core principles:
From the perspective of attack flow:
The attacker first used a flash loan to lend about 10,024,321.28 haSUI, which instantly lowered the price of the trading pool
99.90%。 This huge sell order brought the target pool price down from about 1.8956×10^19 to 1.8425×10^19, almost bottoming out.
Subsequently, the attacker creates a liquidity position on Cetus with an extremely narrow range (Tick lower limit of 300000, upper limit of 300200, and the width of the interval is only 1.00496621%). Such a narrow interval amplifies the impact of subsequent calculation errors on the number of tokens required.
The core principle of the attack:
There is an integer overflow vulnerability in the get_delta_a function that Cetus uses to calculate the required number of tokens. The attacker deliberately stated that he wanted to add a huge amount of liquidity (about 10^37 units), but in fact only put 1 token into the contract.
Due to the wrong overflow detection condition of the checked_shlw, the contract was truncated at a high level during the left-shift calculation, causing the system to seriously underestimate the amount of haSUI required, thus exchanging a huge amount of liquidity at a very small cost.
Technically, the above vulnerability stems from Cetus using incorrect masks and judgment conditions in the Move smart contract, resulting in any value less than 0xffffffffffffffff << 192 being able to bypass detection; After moving 64 bits to the left, the high-level data is truncated, and the system only charges a very small number of tokens to consider that it has gained a lot of liquidity.
After the incident, 2 official operations were derived: "Freezing" vs "Recovery", which is two phases:
The freezing phase is completed by Deny List + node consensus;
In the clawback stage, on-chain protocol upgrade + community voting + designated transaction execution is required to bypass the blacklist.
3. Sui's freezing mechanism
There is a special Deny List mechanism in the Sui chain, which realizes the freezing of hacking funds. Not only that, but Sui's token standard also has a "regulated token" model with a built-in freezing function.
This emergency freeze takes advantage of this feature: validator nodes quickly add addresses related to stolen funds in their local configuration files. Theoretically, each node operator can modify the TransactionDenyConfig to update the blacklist on their own, but in order to ensure network consistency, the Sui Foundation has centralized coordination as the original configuration publisher.
The Foundation first officially released a configuration update containing the hacker's address, and the validator took effect synchronously according to the default configuration, so that the hacker's funds were temporarily "sealed" on the chain, which actually has a high degree of centralization behind it
In order to rescue the victims from the frozen funds, the Sui team immediately launched a patch for the Whitelist mechanism.
This is for subsequent transfers back of funds. Legitimate transactions can be constructed in advance and registered on the whitelist, even if the fund address is still on the blacklist, it can be enforced.
This new feature transaction_allow_list_skip_all_checks allows specific transactions to be pre-added to the "Censor Freelist", allowing them to skip all security checks, including signatures, permissions, blacklists, and more.
It is important to note that whitelisting patches do not directly steal hacker assets; It only gives certain transactions the ability to bypass the freeze, and the real asset transfer still needs to be done with a legal signature or additional system permission module.
In fact, the mainstream freezing scheme in the industry often occurs at the token contract level, and is controlled by the issuer for multi-signature.
Taking the USDT issued by Tether as an example, its contract has a built-in blacklist function, and the issuing company can freeze the offending address so that it cannot transfer USDT. This scheme requires multisig to initiate a freezing request on the chain, and the multisig is agreed before it is actually executed, so there is an execution delay.
Although the Tether freezing mechanism is effective, statistics show that there is often a "window period" in the multisig process, leaving opportunities for criminals.
In contrast, Sui's freeze occurs at the underlying protocol level, is collectively operated by validator nodes, and is executed much faster than normal contract calls.
In this model, to be fast enough, it means that the management of these validator nodes themselves is highly uniform.
3. Sui's "transfer recycling" implementation principle
What's even more striking is that Sui not only froze the hack's assets, but also planned to "transfer and recover" the stolen funds through an on-chain upgrade.
On May 27, Cetus proposed a community vote to upgrade the protocol to send frozen funds to a multisig custodial wallet. The Sui Foundation then initiated an on-chain governance vote.
On May 29, the results of the vote were announced, and about 90.9% of the validators supported the scheme. Sui officially announced that once the proposal is approved, "all funds frozen in the two hacker accounts will be recovered to a multisig wallet without the hacker's signature".
There is no need for a hacker to sign, which is such a difference that there has never been such a fix in the blockchain industry.
As can be seen from Sui's official GitHub PR, the protocol introduces an address aliasing mechanism. The upgrade includes pre-specifying alias rules in ProtocolConfig so that certain permitted transactions can be treated as if the legitimate signature was sent from a hacked account.
Specifically, a hashlist of rescue transactions to be executed is tied to a destination address (i.e., a hacker address), and any executor who signs and publishes a summary of these fixed transactions is considered to have initiated the transaction as a valid hacker address owner. For these specific transactions, the validator node system bypasses the Deny List check.
At the code level, Sui adds the following judgment to the transaction validation logic: when a transaction is blocked by the blacklist, the system iterates through its signer to check whether protocol_config.is_tx_allowed_via_aliasing(sender, signer, tx_digest) is true.
As long as a signer satisfies the alias rule, that is, the transaction is allowed to pass, the previous interception error is ignored and the normal package execution continues.
4. Point of view
160 million, tearing apart is the deepest underlying belief in the industry
From the author's personal point of view, this may be a storm that will pass soon, but this model will not be forgotten, because it subverts the foundation of the industry and breaks the traditional consensus that blockchain cannot be tampered with under the same set of ledgers.
In blockchain design, the contract is the law, and the code is the referee.
But in this case, the code failed, governance intervened, and power overrode the pattern, forming a pattern of voting behavior ruling code results".
This is because Sui's direct appropriation of transactions is very different from the handling of hackers on mainstream blockchains.
This is not the first time that consensus has been tampered with, but it has been the most silent
Historically:
Ethereum's 2016 The DAO incident used a hard fork to roll back transfers to cover losses, but this decision led to the split between Ethereum and Ethereum Classic, which was controversial, but ultimately different groups formed different consensus beliefs.
The Bitcoin community has experienced similar technical challenges: the 2010 value spillover vulnerability was urgently fixed by developers and the consensus rules were upgraded, completely erasing some 18.4 billion illegally generated bitcoins.
It's the same hard fork model, rolling back the ledger to the point where it was before the problem, and then the user can still decide which ledger system to continue using under the issue.
Compared with the DAO hard fork, Sui did not choose to split the chain, but targeted this event accurately by upgrading the protocol and configuring aliases. In doing so, Sui keeps the chain continuity and most of the consensus rules unchanged, but also shows that the underlying protocol can be used to implement targeted "rescue operations".
The problem is that historically, the "forked rollback" is a user's choice of beliefs; Sui's "protocol correction" is that the chain makes the decision for you.
Not Your Key, Not Your Coin? I'm afraid not anymore.
In the long run, this means that the idea of "Not your keys, not your coins" is dismantled on the Sui chain: even if the user's private key is intact, the network can still block the flow of assets and redirect assets through collective agreement changes.
If this becomes a precedent for blockchain to respond to large-scale security incidents in the future, it is even considered to be a practice that can be followed again.
"When a chain can break rules for justice, it has a precedent for breaking any rules."
Once there is a success of "public welfare money grabbing", the next time it may be an operation in the "moral ambiguity zone".
So what happens?
The hacker did steal the user's money, so can the crowd vote rob him of his money?
Vote based on whose money is more (pos) or more people? If the one with more money wins, then Liu Cixin's final producer will come soon, and if the one with more people wins, then the group rabble will also be loud.
Under the traditional system, it is very normal for illegal gains to be unprotected, and freezing and transferring are the routine operations of traditional banks.
But the fact that this cannot be done technically is not the root of the development of the blockchain industry.
Now the stick of industry compliance is continuing to ferment, today you can freeze for hackers and modify the account balance, then tomorrow you can do arbitrary modifications for geographical factors and contradictory factors. If the chain becomes part of the regional tool.
The value of that industry has been greatly reduced, and at best it is a more difficult financial system.
This is also the reason why the author is firmly in the industry: "Blockchain is not valuable because it cannot be frozen, but because even if you hate it, it will not change for you." ”
Regulatory trends, can the chain keep its soul?
Once upon a time, the alliance chain was more prosperous than the public chain, because it met the regulatory needs of that era, and now the decline of the alliance actually means that it simply complies with this demand, not the needs of real users.
From the perspective of industry development
Efficient centralization", is it a necessary stage in the development of blockchain? If the ultimate goal of decentralization is to protect the interests of users, can we tolerate centralization as a means of transition? ”
The word "democracy", in the context of on-chain governance, is actually token weighted. So if a hacker holds a large amount of SUI (or one day the DAO is hacked and the hacker controls the votes), can they also "legally vote to whitewash themselves"?
In the end, the value of blockchain is not whether it can be frozen, but whether the group chooses not to do so even if it has the ability to freeze.
The future of a chain is not determined by the technical architecture, but by the set of beliefs it chooses to protect.
Show original24.42K
1

ChainCatcher 链捕手
Author: Fourteen Jun
This event is a victory for capital, not users, and it is a regression for the development of the industry.
Bitcoin to the left, Sui to the right, and every industry move that shakes up decentralization brings a stronger belief in Bitcoin.
The world needs not just a better global financial infrastructure, but a group of people who will always need freedom.
Once upon a time, the alliance chain was more prosperous than the public chain, because it met the regulatory needs of that era, and now the decline of the alliance actually means that it simply complies with this demand, not the needs of real users.
1. Background of the event
On May 22, 2025, Cetus, the largest decentralized exchange (DEX) in the Sui public chain ecosystem, was attacked by hackers, causing a sharp drop in liquidity and the collapse of multiple trading pairs, resulting in a loss of more than $220 million.
As of press time, the timeline is as follows:
On the morning of May 22, hackers attacked Cetus to extract $230 million, and Cetus urgently suspended the contract and issued an announcement
On the afternoon of May 22, the hacker transferred about $60 million across the chain, and the remaining $162 million was still in the Sui on-chain address, and the Sui validator node quickly took action to add the hacker's address to the "Deny List" and freeze the funds
On the evening of May 22, Sui CPO @emanabio tweeted that the funds have been frozen, and the return will start soon
On May 23, Cetus began fixing vulnerabilities and updating contracts
On May 24th, Sui open-sourced the PR, explaining that it was about to recycle funds through aliasing and whitelist
On May 26, Sui initiated an on-chain governance vote proposing whether to perform a protocol upgrade and transfer the hacked assets to an escrow address
On May 29, the voting results were announced, and more than 2/3 of the validator nodes were weighted to support; The protocol upgrade is ready to be executed
From May 30th to early June, the protocol upgrade took effect, the specified transaction hash was executed, and the hacked assets were "legally transferred"
2. Attack principle
The principle of events is related, and there have been many statements in the industry, so here is only an overview of the core principles:
From the perspective of attack flow:
The attacker first used a flash loan to lend about 10,024,321.28 haSUI, which instantly lowered the price of the trading pool
99.90%。 This huge sell order brought the target pool price down from about 1.8956×10^19 to 1.8425×10^19, almost bottoming out.
Subsequently, the attacker creates a liquidity position on Cetus with an extremely narrow range (Tick lower limit of 300000, upper limit of 300200, and interval width of only 1.00496621%). Such a narrow interval amplifies the impact of subsequent calculation errors on the number of tokens required.
The core principle of the attack:
There is an integer overflow vulnerability in the get_delta_a function that Cetus uses to calculate the required number of tokens. The attacker deliberately stated that he wanted to add a huge amount of liquidity (about 10^37 units), but in fact only put 1 token into the contract.
Due to the wrong overflow detection condition of checked_shlw, the contract was truncated at a high level during the left-shift calculation, causing the system to seriously underestimate the amount of haSUI required, thus exchanging a huge amount of liquidity at a very small cost.
Technically, the above vulnerability stems from Cetus using incorrect masks and judgment conditions in the Move smart contract, resulting in any value less than 0xffffffffffffffff << 192 being able to bypass detection; After moving 64 bits to the left, the high-level data is truncated, and the system only charges a very small number of tokens to consider that it has gained a lot of liquidity.
After the incident, 2 official operations were derived: "Freezing" vs "Recovery", which is two phases:
The freezing phase is completed by Deny List + node consensus;
In the clawback stage, on-chain protocol upgrade + community voting + designated transaction execution is required to bypass the blacklist.
3. Sui's freezing mechanism
There is a special Deny List mechanism in the Sui chain itself, which realizes the freezing of hacking funds. Not only that, but Sui's token standard also has a "regulated token" model with a built-in freezing function.
This emergency freeze takes advantage of this feature: validator nodes quickly add addresses related to stolen funds in their local configuration files. Theoretically, each node operator can modify the TransactionDenyConfig to update the blacklist on their own, but in order to ensure network consistency, the Sui Foundation has centralized coordination as the original configuration publisher.
The Foundation first officially released a configuration update containing the hacker's address, and the validator took effect synchronously according to the default configuration, so that the hacker's funds were temporarily "sealed" on the chain, which actually has a high degree of centralization behind it
In order to rescue the victims from the frozen funds, the Sui team immediately launched a patch for the Whitelist mechanism.
This is for subsequent transfers back of funds. Legitimate transactions can be constructed in advance and registered on the whitelist, even if the fund address is still on the blacklist, it can be enforced.
This new feature transaction_allow_list_skip_all_checks allows specific transactions to be pre-added to the "checklist", allowing them to skip all security checks, including signatures, permissions, blacklists, etc.
It is important to note that whitelisting patches do not directly steal hacker assets; It only gives certain transactions the ability to bypass the freeze, and the real asset transfer still needs to be done with a legal signature or additional system permission module.
In fact, the mainstream freezing scheme in the industry often occurs at the token contract level, and is controlled by the issuer for multi-signature.
Taking the USDT issued by Tether as an example, its contract has a built-in blacklist function, and the issuing company can freeze the offending address so that it cannot transfer USDT. This scheme requires multisig to initiate a freezing request on the chain, and the multisig is agreed before it is actually executed, so there is an execution delay.
Although the Tether freezing mechanism is effective, statistics show that there is often a "window period" in the multi-signature process, leaving opportunities for criminals to take advantage of.
In contrast, Sui's freeze occurs at the underlying protocol level, is collectively operated by validator nodes, and is executed much faster than normal contract calls.
In this model, to be fast enough, it means that the management of these validator nodes themselves is highly uniform.
3. Sui's "transfer recycling" implementation principle
What's even more amazing is that Sui not only froze the hacker's assets, but also planned to "transfer and recover" the stolen funds through on-chain upgrades.
On May 27, Cetus proposed a community vote to upgrade the protocol to send frozen funds to a multisig custodial wallet. The Sui Foundation then initiated an on-chain governance vote.
On May 29, the results of the vote were announced, and about 90.9% of the validators supported the scheme. Sui officially announced that once the proposal is approved, "all funds frozen in the two hacker accounts will be recovered to a multisig wallet without the hacker's signature".
There is no need for a hacker to sign, which is such a difference that there has never been such a fix in the blockchain industry.
As can be seen from Sui's official GitHub PR, the protocol introduces an address aliasing mechanism. The upgrade includes pre-specifying alias rules in ProtocolConfig so that certain permitted transactions can be treated as if the legitimate signature was sent from a hacked account.
Specifically, a hashlist of rescue transactions to be executed is tied to a destination address (i.e., a hacker address), and any executor who signs and publishes a summary of these fixed transactions is considered to have initiated the transaction as a valid hacker address owner. For these specific transactions, the validator node system bypasses the Deny List check.
At the code level, Sui adds the following judgment to the transaction validation logic: when a transaction is blocked by the blacklist, the system iterates through its signer to check whether protocol_config.is_tx_allowed_via_aliasing(sender, signer, tx_digest) is true.
As long as a signer satisfies the alias rule, that is, the transaction is allowed to pass, the previous interception error is ignored and the normal package execution continues.
4. Point of view
160 million, tearing apart is the deepest underlying belief in the industry
From the author's personal point of view, this may be a storm that will pass soon, but this model will not be forgotten, because it subverts the foundation of the industry and breaks the traditional consensus that blockchain cannot be tampered with under the same set of ledgers.
In blockchain design, the contract is the law, and the code is the referee.
But in this case, the code failed, governance interfered, and power overrode the pattern, forming a pattern of voting behavior adjudicating code results.
This is because Sui's direct appropriation of transactions is very different from the handling of hackers on mainstream blockchains.
This is not the first time that consensus has been tampered with, but it has been the most silent
Historically:
Ethereum's 2016 The DAO incident used a hard fork to roll back transfers to cover losses, but this decision led to the split between Ethereum and Ethereum Classic, which was controversial, but ultimately different groups formed different consensus beliefs.
The Bitcoin community has experienced similar technical challenges: the 2010 value spillover vulnerability was urgently fixed by developers and the consensus rules were upgraded, completely erasing some 18.4 billion illegally generated bitcoins.
It's the same hard fork model, rolling back the ledger to the point where it was before the problem, and then the user can still decide which ledger system to continue using under the issue.
Compared with the DAO hard fork, Sui did not choose to split the chain, but targeted this event accurately by upgrading the protocol and configuring aliases. In doing so, Sui maintains the continuity of the chain and most of the consensus rules, but also shows that the underlying protocol can be used to implement targeted "rescue operations".
The problem is that historically, the "forked rollback" is a user's choice of faith; Sui's "protocol correction" is that the chain makes the decision for you.
Not Your Key, Not Your Coin? I'm afraid not anymore.
In the long run, this means that the idea of "not your keys, not your coins" is dismantled on the Sui chain: even if the user's private key is intact, the network can still block the flow of assets and redirect them through collective agreement changes.
If this becomes a precedent for blockchain to respond to large-scale security incidents in the future, it is even considered to be a practice that can be followed again.
"When a chain can break rules for the sake of justice, it has a precedent for breaking any rules."
Once there is a success of "public welfare money grabbing", the next time it may be an operation in the "moral ambiguity".
So what happens?
The hacker did steal the user's money, so can the crowd vote rob him of his money?
Vote based on whose money is more (pos) or more people? If the one with more money wins, then Liu Cixin's final producer will come soon, and if the one with more people wins, then the group rabble will also be loud.
Under the traditional system, it is very normal for illegal gains to be unprotected, and freezing and transferring are the routine operations of traditional banks.
But the fact that this cannot be done technically is not the root of the development of the blockchain industry.
Now the stick of industry compliance is continuing to ferment, today you can freeze for hackers and modify the account balance, then tomorrow you can do arbitrary modifications for geographical factors and contradictory factors. If the chain becomes part of the regional tool.
The value of that industry has been greatly reduced, and at best it is a more difficult financial system.
This is also the reason why the author is firmly committed to the industry: "Blockchain is not valuable because it cannot be frozen, but because even if you hate it, it will not change for you."
Regulatory trends, can the chain keep its soul?
Once upon a time, the alliance chain was more prosperous than the public chain, because it met the regulatory needs of that era, and now the decline of the alliance actually means that it simply complies with this demand, not the needs of real users.
From the perspective of industry development
Efficient centralization, is it a necessary stage in the development of blockchain? If the ultimate goal of decentralization is to protect the interests of users, can we tolerate centralization as a means of transition?
The word "democracy", in the context of on-chain governance, is actually token weighted. So if a hacker holds a large amount of SUI (or one day the DAO is hacked, and the hacker controls the votes), can they also "legally vote to launder themselves"?
In the end, the value of blockchain is not whether it can be frozen, but whether the group chooses not to do so even if it has the ability to freeze.
The future of a chain is not determined by the technical architecture, but by the set of beliefs it chooses to protect.
Show original24.98K
0

CoinDesk
The following open letter was written by Dan Boneh (Stanford), Joseph Bonneau (NYU), Giulia Fanti (Carnegie Mellon), Ben Fisch (Yale), Ari Juels (Cornell), Farinaz Koushanfar (U.C. San Diego), Andrew Miller (University of Illinois at Urbana Champaign), Ciamac Moallemi (Columbia), David Tse (Stanford), Pramod Viswanath (Princeton).
Here’s a multiple choice question.
Algorand, Arbitrum, Avalanche, Axelar, Babylon, Cardano, Cosmos, Eigenlayer, Espresso, Flashbots, Oasis, Starkware, Sui.
Byzantine Fault Tolerant (BFT) protocols, digital signatures, formal verification, maximal extractable value (MEV), public-key cryptography, proof of work, rollups, trusted execution environments (TEEs) used in blockchain systems, verifiable random functions (VRFs), zero-knowledge proof systems.
Which of the following is true of the companies, projects, and concepts listed above?
A) They were invented / created by researchers employed at or with deep roots in academic institutions.
B) They have fueled and transformed the crypto / blockchain industry.
C) They demonstrate how essential academic innovation is to the crypto / blockchain industry.
D) All of the above.
The answer is D. The lion’s share of these innovations happened at universities, largely in the United States.
Crypto and the U.S. Federal Government
Both the White House and Congress are working to support and accelerate innovation and bolster U.S. dominance in the crypto economy and the blockchain technologies that power it. The White House has established the Presidential Working Group on Digital Asset Markets, while two major pieces of legislation, the GENIUS and STABLE bills, are pending in Congress. There is a crying need for regulatory and legislative reforms that prioritize and support innovation in crypto while enforcing robust protections for consumers. Efforts to accomplish these things sensibly are to be applauded.
At the same time, though, we are on the brink of seeing massive cuts to academic research funding in the United States. The White House budget proposal for 2025 includes a cut of 55% for the National Science Foundation (NSF). In the meantime, China increased its budget by 10% last year. NSF is the source of most federal funding for research in computer science at U.S. universities. It’s the main source of funding that has driven crypto innovations like those in the list above. Companies provide little funding for academic research because it’s not product-specific. So defunding NSF means defunding scientists in the U.S.—including those leading crypto innovation.
Defunding the Innovation Pipeline
We are academic researchers in the field of crypto, representing five U.S. universities. Alongside our teaching, we conduct research and train PhD students.
While market cap is a short-term indicator of the crypto industry’s health, the number of PhD students studying blockchain is a long-term one: it reflects the depth of future scientific leadership. That pipeline is already thinning. Several of us could not take on new PhD students this year due to the uncertain U.S. funding climate. And we are not alone.
Several of the companies in the list above were co-founded by former members of our academic groups or by us. If future members of our groups vanish alongside scientific funding, so will successful future founders of crypto companies in the U.S. And PhD students don’t just start companies. They are also the engine that powers academic and ultimately industry research, doing the brain- and labor-intensive work behind the technical innovations that lead to faster, more secure blockchains. PhD students in our groups played a key role in creating or advancing in many of the concepts in the second list above. If they vanish, so will the breakthroughs they would have brought to the industry.
When we’re funded to do research and stay on the cusp of innovation in crypto, we’re also better teachers—able to equip students with the latest advances. That means stronger technical leaders educated in the U.S.
Conclusion
Better regulation and legislation could be a boon to crypto. But U.S. leadership in crypto won’t be secured by policy alone. At the forefront of crypto innovation is science—and U.S. universities have long been its powerhouse.
If you’re a farmer trying to ensure a strong harvest, it’s wise to upgrade your equipment and expand your fields. But if you stop planting seedcorn, no amount of machinery will save the crop.
If you care about U.S. leadership in crypto, contact your congressional representatives and senators. Urge them to support the research funding that has made American universities the seedbed of global scientific and technical leadership—blockchain technology included.
Authors:
Dan Boneh is a Professor of Computer Science and Electrical Engineering at Stanford University, and advises a16z crypto and several projects in the blockchain space.
Joseph Bonneau is an Associate Professor of Computer Science at New York University. He has served as an advisor for Zcash, Algorand, Chia, O(1) labs and Espresso Systems and as a Research Partner at a16z crypto.
Giulia Fanti is the Angel Jordan Associate Professor of Electrical Engineering at Carnegie Mellon University. She is a co-director of the Initiative for CryptoCurrencies and Contracts (IC3), a member of Department of Commerce Information Security and Privacy Advisory Board (ISPAB), and a member of the UK Financial Conduct Authority’s Synthetic Data Expert Group (SDEG).
Ben Fisch is an Assistant Professor of Computer Science at Yale University. He is a co-founder of Espresso Systems and has advised several prominent crypto projects, including Chia and Filecoin.
Ari Juels is the Weill Family Foundation and Joan and Sanford I. Weill Professor at Cornell Tech and a Computer Science faculty member at Cornell University. He is also a co-director of the Initiative for CryptoCurrencies and Contracts (IC3), Chief Scientist at Chainlink Labs, and author of crypto thriller novel The Oracle.
Farinaz Koushanfar is the Nemat-Nasser Endowed Chair Professor of Electrical and Computer Engineering at the University of California San Diego. She is also the founding co-director of the UCSD Center for Machine Intelligence, Computing, and Security (MICS), and a Research Scientist at Chainlink Labs. She is a fellow of ACM, IEEE, and the National Academy of Inventors (NAI).
Andrew Miller is an Adjunct Associate Professor of Electrical and Computer Engineering at the University of Illinois at Urbana Champaign. He is also a co-director of Flashbots[X], a co-director of Initiative for CryptoCurrencies and Contracts (IC3), and a board member of Zcash Foundation. He has been an advisor to Cycles, Chainlink, Inco, Clique, and Pi2.
Ciamac Moallemi is William von Mueffling Professor of Business and the director of the Briger Family Digital Finance Lab at the Graduate School of Business at Columbia University. He is also an advisor to several firms in the blockchain and fintech space.
David Tse is the Thomas Kailath and Guanghan Xu Professor of Engineering at Stanford University. He is a member of the National Academy of Engineering, and a recipient of the Claude E. Shannon Award in 2017 and the IEEE Richard W. Hamming Medal in 2019. He is also a co-founder of the Babylon Bitcoin staking protocol, currently ranked 8th in TVL (total value locked) among all DeFi protocols.
Pramod Viswanath is the Forrest G. Hamrick Professor of Engineering at Princeton University. He is a core contributor to Sentient.
Show original100.1K
2
Sui price performance in USD
The current price of Sui is $3.2953. Over the last 24 hours, Sui has decreased by -0.86%. It currently has a circulating supply of 3,396,671,135 SUI and a maximum supply of 10,000,000,000 SUI, giving it a fully diluted market cap of $11.21B. At present, the Sui coin holds the 10 position in market cap rankings. The Sui/USD price is updated in real-time.
Today
-$0.02870
-0.87%
7 days
-$0.19400
-5.56%
30 days
+$0.083600
+2.60%
3 months
+$0.66230
+25.15%
Popular Sui conversions
Last updated: 03/06/2025, 16:35
1 SUI to USD | $3.3003 |
1 SUI to AUD | $5.1098 |
1 SUI to PHP | ₱183.85 |
1 SUI to EUR | €2.8910 |
1 SUI to IDR | Rp 53,812.16 |
1 SUI to GBP | £2.4411 |
1 SUI to CAD | $4.5320 |
1 SUI to AED | AED 12.1217 |
About Sui (SUI)
The rating provided is an aggregated rating collected by OKX from the sources provided and is for informational purpose only. OKX does not guarantee the quality or accuracy of the ratings. It is not intended to provide (i) investment advice or recommendation; (ii) an offer or solicitation to buy, sell or hold digital assets; or (iii) financial, accounting, legal or tax advice. Digital assets, including stablecoins and NFTs, involve a high degree of risk, can fluctuate greatly, and can even become worthless. The price and performance of the digital assets are not guaranteed and may change without notice. Your digital assets are not covered by insurance against potential losses. Historical returns are not indicative of future returns. OKX does not guarantee any return, repayment of principal or interest. OKX does not provide investment or asset recommendations. You should carefully consider whether trading or holding digital assets is suitable for you in light of your financial condition. Please consult your legal/ tax/ investment professional for questions about your specific circumstances.
Show more
- Official website
- White Paper
- Github
- Block explorer
About third-party websites
About third-party websites
By using the third-party website ("TPW"), you accept that any use of the TPW will be subject to and governed by the terms of the TPW. Unless expressly stated in writing, OKX and its affiliates ("OKX") are not in any way associated with the owner or operator of the TPW. You agree that OKX is not responsible or liable for any loss, damage and any other consequences arising from your use of the TPW. Please be aware that using a TPW may result in a loss or diminution of your assets.
Latest news about Sui (SUI)

SUI Plunges 6% Overnight Before Buyers Step in at $3.40 Support
Market volatility intensified as geopolitical tensions and protocol recovery efforts create conflicting signals for traders
30 May 2025|CoinDesk

SUI Plunges 9% Amid Flash Crash and Extraordinary Selling Volume
Sui token stabilizes around $3.43 after dramatic midnight selloff and recovery pattern forms
30 May 2025|CoinDesk

Sui Network Steps in to Compensate Cetus Losses in Full After $223M Exploit
The Sui Foundation has extended a loan to Cetus to fully reimburse affected users, with repayment contingent on an upcoming on-chain community vote.
28 May 2025|CoinDesk
Learn more about Sui (SUI)

IKA: Revolutionizing Cross-Chain Interoperability with Sui
Introduction to IKA and Its Impact on the Crypto World On April 28, 2025, IKA announced a strategic investment from the Sui Foundation, boosting its total project financing to over $21 million. This development marks a significant milestone for IKA, formerly known as 'dWallet Network', as it prepares to launch its parallel MPC (Multiparty Computation) network on the Sui blockchain. IKA aims to transform cross-chain asset interoperability, addressing the limitations of conventional bridging protocols and wrapped assets.
2 June 2025|OKX

Unlocking the Potential of Volo Staked SUI: A New Era in Liquid Staking
Introduction to Volo Staked SUI (VSUI) Volo Staked SUI (VSUI) is making waves in the cryptocurrency world as a liquid staking token that enhances the utility and liquidity of SUI. Unlike traditional staking, where assets are locked, VSUI allows users to engage in decentralized finance (DeFi) applications while still earning staking rewards. This innovation is particularly appealing to young, crypto-curious investors looking to maximize their returns without sacrificing flexibility.
30 May 2025|OKX

Haedal Protocol: Revolutionizing Liquid Staking on the Sui Blockchain
Introduction to Haedal Protocol and Its Impact on Sui Blockchain Haedal Protocol is making waves in the cryptocurrency world by offering a unique liquid staking solution on the Sui blockchain. Launched on Binance Alpha in April 2025, Haedal Protocol allows users to stake their SUI tokens while maintaining liquidity through yield-bearing haSUI tokens. This innovative approach not only enhances capital efficiency but also integrates deeply with the Sui DeFi ecosystem, providing users with multiple avenues to maximize their returns.
29 May 2025|OKX

Sui Network Surges with Microsoft Partnership: A New Era for Blockchain
Sui Network's Explosive Growth: Over $2.1 Billion in TVL The Sui Network (SUI) has recently achieved a significant milestone, with its total value locked (TVL) surpassing $2.1 billion. This remarkable growth is largely attributed to a strategic partnership with Microsoft, which has catalyzed strong stablecoin inflows and heightened market momentum. As of the latest data from DefiLlama, Sui's TVL stands at $2.107 billion, marking an impressive increase of over 104% from its yearly lows in March.
29 May 2025|OKX
Sui FAQ
How much is 1 Sui worth today?
Currently, one Sui is worth $3.2953. For answers and insight into Sui's price action, you're in the right place. Explore the latest Sui charts and trade responsibly with OKX.
What is cryptocurrency?
Cryptocurrencies, such as Sui, are digital assets that operate on a public ledger called blockchains. Learn more about coins and tokens offered on OKX and their different attributes, which includes live prices and real-time charts.
When was cryptocurrency invented?
Thanks to the 2008 financial crisis, interest in decentralized finance boomed. Bitcoin offered a novel solution by being a secure digital asset on a decentralized network. Since then, many other tokens such as Sui have been created as well.
Will the price of Sui go up today?
Check out our Sui price prediction page to forecast future prices and determine your price targets.
Monitor crypto prices on an exchange
Watch this video to learn about what happens when you move your money to a crypto exchange.
Disclaimer
The social content on this page ("Content"), including but not limited to tweets and statistics provided by LunarCrush, is sourced from third parties and provided "as is" for informational purposes only. OKX does not guarantee the quality or accuracy of the Content, and the Content does not represent the views of OKX. It is not intended to provide (i) investment advice or recommendation; (ii) an offer or solicitation to buy, sell or hold digital assets; or (iii) financial, accounting, legal or tax advice. Digital assets, including stablecoins and NFTs, involve a high degree of risk, can fluctuate greatly. The price and performance of the digital assets are not guaranteed and may change without notice.
OKX does not provide investment or asset recommendations. You should carefully consider whether trading or holding digital assets is suitable for you in light of your financial condition. Please consult your legal/tax/investment professional for questions about your specific circumstances. For further details, please refer to our Terms of Use and Risk Warning. By using the third-party website ("TPW"), you accept that any use of the TPW will be subject to and governed by the terms of the TPW. Unless expressly stated in writing, OKX and its affiliates (“OKX”) are not in any way associated with the owner or operator of the TPW. You agree that OKX is not responsible or liable for any loss, damage and any other consequences arising from your use of the TPW. Please be aware that using a TPW may result in a loss or diminution of your assets. Product may not be available in all jurisdictions.
OKX does not provide investment or asset recommendations. You should carefully consider whether trading or holding digital assets is suitable for you in light of your financial condition. Please consult your legal/tax/investment professional for questions about your specific circumstances. For further details, please refer to our Terms of Use and Risk Warning. By using the third-party website ("TPW"), you accept that any use of the TPW will be subject to and governed by the terms of the TPW. Unless expressly stated in writing, OKX and its affiliates (“OKX”) are not in any way associated with the owner or operator of the TPW. You agree that OKX is not responsible or liable for any loss, damage and any other consequences arising from your use of the TPW. Please be aware that using a TPW may result in a loss or diminution of your assets. Product may not be available in all jurisdictions.
Socials