Connect with us
DAPA Banner

Crypto World

Dmail to shut down its decentralized email service on May 15

Published

on

Crypto Breaking News

Decentralized email platform Dmail Network has announced it will shut down after five years of operation, citing escalating infrastructure costs, weak monetization, failed fundraising efforts, and limited token utility. The company said it will gradually cease all services starting May 15, and urged users to export their data before then, as all nodes will be shut down afterward, rendering emails and accounts inaccessible.

Positioning itself as a Web3 communication tool built around wallet-based email, encrypted messaging, and on-chain notifications, Dmail had aimed to demonstrate that decentralized infrastructure could scale with user demand. In January 2025, Dmail’s profile among AI DApps surged; DappRadar ranked the project second in that category for the month, reporting 4.9 million unique active wallets. Despite the early momentum, Dmail’s founders say expanding operational costs outpaced monetization and investment, ultimately undermining the project’s sustainability.

Key takeaways

  • In its shutdown notice, Dmail Network says it will begin winding down services on May 15, with all nodes going offline thereafter, effectively ending access to emails and accounts on the platform.
  • Infrastructure costs—covering bandwidth, storage, and compute—consumed a growing share of the budget as the user base expanded, while the project failed to identify a scalable paid model or monetization path.
  • Funding rounds failed to materialize, acquisitions fell through, and staff departures left the team unable to maintain critical infrastructure or push a viable economic model.
  • The project’s token never achieved a clear, scalable use case, and its economic design did not establish a self-sustaining loop; the token price subsequently hit an all-time low.
  • Tonight’s news sits within a broader pattern of Web3 project closures, reflecting a challenging environment for infrastructure-heavy, user-reliant services.

Escalating costs vs. decentralized promises

At the heart of Dmail’s exit lie the economics of running a decentralized communication platform at scale. The shutdown notice emphasizes that bandwidth, storage, and computing resources form the majority of operating expenses, costs that grow as more users come online. While decentralization can reduce reliance on centralized servers, it does not eliminate the physical requirements of delivering reliable, globally accessible services. The company notes that despite exploring various monetization avenues, it could not secure a business model that users were willing to support at scale.

The experience underscores a recurring tension in the space: the ambition to offer censorship-resistant, privacy-preserving communications often collides with the costs of maintaining robust infrastructure and a sustainable economic engine. Even with strong early user engagement, especially for crypto-native applications that rely on on-chain primitives or specialized services, the path to profitability remains uncertain without durable monetization or external capital cycles.

Funding headwinds and the token narrative

Dmail’s leadership pinpoints financing challenges as a critical contributor to the shutdown. Multiple fundraising rounds did not close, and strategic acquisitions that might have bolstered the platform’s capital runway did not come to fruition. When coupled with ongoing staff churn and the resulting strain on maintenance capabilities, the project’s ability to keep its infrastructure online deteriorated over time.

Advertisement

Compounding the financial strain was the token’s performance, which failed to translate into a compelling, large-scale use case. The project’s native token did not establish a durable economic design that could support a self-sustaining ecosystem, according to the shutdown note. After the announcement, the token price retraced to all-time lows, with data from CoinGecko showing a slide to about $0.0002067 per token. This dynamic mirrors a broader market pattern where tokenomics and real utility struggle to align with high operational costs and user expectations.

Context within a challenging Web3 landscape

Dmail’s exit comes amid a wave of closures that illustrates the current fragility of some Web3 native services, particularly those that depend on sustained infrastructure beyond simple software deployments. Earlier in March, DAO tooling platform Tally announced a wind-down, citing a lack of a viable market for its products. A week later, Balancer Labs reported shutting down parts of its protocol four months after a major exploit drained more than $100 million. While each case has its own specifics, the trend underscores a critical point for builders in this space: without a durable path to revenue and resilience against funding cycles and security incidents, even technically innovative projects can struggle to endure.

For users, developers, and investors, Dmail’s experience reinforces the importance of aligning decentralization promises with practical, scalable economics. It also highlights the need for clear exit strategies and data portability when services decide to wind down, ensuring users can preserve important communications and records before shutdowns take effect.

In sharing its decision, Dmail urged users to export data ahead of May 15, and suggested that anyone relying on the service prepare for discontinuation of access as the network’s nodes go offline. For observers, the episode serves as a reminder that the most ambitious technical visions must be matched by disciplined business models and sustainable funding paths if they are to endure in a competitive crypto ecosystem.

Advertisement

Looking ahead, readers will want to monitor how remaining Web3 communication projects address the dual pressures of infrastructure costs and monetization. Will new models emerge that better balance decentralization with long-term sustainability? And how will the broader market’s appetite for funding, partnerships, and user growth shape the next generation of crypto-enabled communication tools?

Risk & affiliate notice: Crypto assets are volatile and capital is at risk. This article may contain affiliate links. Read full disclosure

Source link

Advertisement
Continue Reading
Click to comment

You must be logged in to post a comment Login

Leave a Reply

Crypto World

Execution Risk In Crypto Is The New Custody Risk

Published

on

Execution Risk In Crypto Is The New Custody Risk

Opinion by: Ido Sofer, founder and CEO at Sodot.

The crypto industry is normally well ahead of its game when it comes to pure innovation and functionality, but security is a different matter. 

For years, custody risk in crypto was defined by a single fear: the theft of private keys. The industry responded by hardening storage with cold storage, air-gapped systems, MPC and other methods. It then recognized that protecting only the keys is not enough, introducing transaction security and policies to prevent malicious transactions that steal funds, although the keys remain safe. Both of these remain a serious threat, but focusing solely on private keys obscures a deeper shift.

Custody itself has expanded far beyond private keys.

Advertisement

“Custody” once meant protecting private keys. That definition no longer reflects reality. Custody has evolved into a complex, automated system that operates different kinds of transactions, across multiple venues, custodians, vendors and internal systems. Modern trading firms operate across exchanges, staking platforms, liquidity venues and infrastructure providers, each with API keys, validator keys, deployment credentials and system-level secrets that can move capital directly or indirectly. 

Many of these credentials are stored in secret managers that, by design, return the full key to any authenticated process. Convenient, yes, but structurally fragile. If the execution environment is compromised, either by an external attacker, an employee that was threatened or a malicious dependency, the full key is compromised. Custody risk has expanded beyond dormant on-chain keys into a live execution layer, where capital moves in milliseconds and exposure happens in real time.

The evolution of custody security

Custody security evolved in stages. First, the industry secured private keys in storage. It then moved beyond storage, embedding policy and multi-party controls to govern how those keys were used in execution. The next step is inevitable: apply the same zero-exposure and policy-driven discipline to every key and credential. In modern crypto operations, API keys, deployment credentials and execution secrets carry significant risk. Extending private key best practices across this broader surface is no longer optional; it is the defining challenge of execution risk.

In recent years, the execution risk has emerged as the single biggest vector for large-scale exploits. Cybercriminals are bypassing onchain security mechanisms in favor of the soft underbelly, namely the API keys, server credentials and other off-chain secrets needed to facilitate trading, code deployment, staking and custodial actions. Recent major breaches, including the Bybit hack, started with an off-chain hack and compromised credentials, which later led to on-chain loss of funds. 

Advertisement

How big is the execution risk?

It’s big and structural. Asset managers, trading firms, custodians and payment companies connect to dozens of CEXs, DEXs, liquidity providers and other vendors simultaneously. Each integration introduces its own credentials, access controls and operational dependencies. Managing these spans across development, ops, trading, risk and security teams, which creates complexity that compounds over time.

Securing these operations is a never-ending struggle. Maintaining consistent security policies and multi-vendor access is a massive headache that’s largely manual, resulting in inevitable security gaps and configuration drift.

Related: Bitcoin is infrastructure, not digital gold

Execution risk is not inherent toautomation. It is a byproduct of how trading systems have historically been designed. In many centralized exchange environments, API keys and operational credentials are placed directly inside trading infrastructure to eliminate latency. For market makers and trading firms, speed is not a feature, it is the business model. Even marginal delay affects revenue.

Advertisement

Over time, full-key availability inside live systems became normalized as the simplest way to achieve high-performance execution. Credentials sit in a constant state of readiness so transactions can be authorized instantly. The issue is not that capital moves quickly. It is that unilateral authority is embedded inside operational infrastructure. And when authority is concentrated where execution happens, it becomes the most predictable attack vector.

Existing controls fall short

Existing tools fall far short of what’s required, considering the complexity of modern execution environments. 

While crypto exchanges, custodians and over-the-counter trading desks certainly employ robust security policies for specific operations, it’s incredibly difficult for them to synchronize those controls across such a fragmented ecosystem. In fact, it’s almost impossible to maintain consistent governance across forty-odd exchanges for any length of time. Since it’s done manually, in silo, errors are inevitable, and a single mistake can put millions of dollars in value at risk. 

There’s also the counterparty risk to consider. Exchanges and custodians may have their own vulnerabilities in the shape of bugs, misconfigured infrastructure and inconsistent policy enforcement mechanisms. If a trading firm’s internal security code requires geofencing, but one of the exchanges it’s connected to has a buggy implementation of that control, it creates a risk at the point of execution. 

Advertisement

The risk is intolerable

The lesson the industry learned from private key security is clear: eliminate full key exposure and enforce strict policy controls around usage. Those principles must now extend beyond on-chain private keys to every credential capable of authorizing value movement.

The solution is not simply better secret storage. Secret managers were built for convenience; they return the full key to any authenticated process. In live execution environments, that model distributes authority to multiple components of the system at the very moment capital is in motion.

What is required is zero key exposure architecture systems where no single machine or employee ever holds unilateral control, combined with enforceable, context-aware policies governing how credentials are used. Multi-party computation (MPC) is one way to implement this model, but the principle is broader — expand private-key security best practices across the entire crypto execution layer.

Opinion by: Ido Sofer, founder and CEO at Sodot.

Advertisement