Jensen Huang’s Latest Essay: AI as a Five‑Layer Cake — What Crypto Builders Should Learn
Jensen Huang’s Latest Essay: AI as a Five‑Layer Cake — What Crypto Builders Should Learn
AI is no longer “just software.” In NVIDIA CEO Jensen Huang’s essay, AI Is a 5‑Layer Cake, he argues that AI is becoming foundational infrastructure, and that its real competition happens across a full industrial stack: Energy → Chips → Infrastructure → Models → Applications. (blogs.nvidia.com)
For the blockchain and crypto industry, this framing is more than a metaphor. In 2025, crypto’s center of gravity has been shifting from “apps that ship fast” to systems that must endure: stablecoin rails, real‑world asset tokenization, institutional custody, and security against AI‑assisted scams. Thinking in layers helps builders and users understand where the real bottlenecks—and the real risks—live.
Below is a Web3‑native interpretation of the five‑layer stack, plus what it implies for self‑custody, crypto security, and the next wave of onchain finance.
Layer 1: Energy — The Hidden Constraint Behind “Onchain Everything”
In Huang’s model, energy is the non‑negotiable base layer: real‑time intelligence requires real‑time power. (blogs.nvidia.com)
Crypto has lived this lesson for years:
- Proof‑of‑Work networks turn electricity into security; their economics are explicitly energy‑priced.
- Proof‑of‑Stake shifts the cost center away from raw power, but energy still matters through the data center footprint of validators, sequencers, and RPC providers.
- As AI workloads compete for power, crypto teams building always‑on infrastructure (bridges, rollups, indexing, DePIN) should expect energy and hosting costs to become a strategic variable again—not an ops detail.
Builder takeaway: if your protocol roadmap assumes “compute is cheap forever,” revisit your assumptions. The next 18 months may reward designs that reduce redundant computation, compress data, or outsource heavy verification to specialized systems (e.g., ZK proofs).
Layer 2: Chips — GPUs for AI, Specialized Hardware for Crypto, and the ZK Arms Race
Huang places chips above energy: processors translate power into computation efficiently, and chip progress sets the pace and price of AI scaling. (blogs.nvidia.com)
In crypto, “chips” shows up in three concrete ways:
- Security budgets: hardware availability shapes hashpower distribution and the economics of PoW mining.
- Zero‑knowledge proofs: ZK rollups, ZK coprocessors, and ZK identity systems increasingly depend on hardware acceleration. Faster proving shifts what is feasible onchain (privacy, scalability, compliance proofs).
- Client security: users ultimately rely on cryptographic signing. Whether you custody assets, run a validator, or operate a treasury, your weakest link is often the device that can sign.
This is where hardware wallet design becomes a practical part of the crypto stack—not a luxury accessory.
Layer 3: Infrastructure — Data Centers, Rollups, and the “AI Factory” Parallel
Huang describes modern AI infrastructure as “factories” that orchestrate massive compute: power delivery, cooling, networking, and orchestration at scale. (blogs.nvidia.com)
Crypto’s infrastructure layer now looks surprisingly similar:
- Rollup ecosystems depend on sequencers, provers, data availability, indexers, and bridging infrastructure.
- Institutional onchain finance depends on reliable blockspace, predictable finality, robust APIs, and monitoring.
- Tokenized treasuries and RWAs introduce operational requirements that feel closer to capital markets infrastructure than to weekend hackathon apps.
A useful reality check is to look at live market dashboards. For example, RWA.xyz’s Tokenized U.S. Treasuries tracks tokenized government debt across chains and platforms, updated continuously (e.g., showing data “as of 02/14/2026”). (app.rwa.xyz)
Builder takeaway: if your protocol touches payments, stablecoins, or RWAs, plan for “infrastructure expectations”: uptime, incident response, audits, and operational maturity.
Layer 4: Models — Onchain Data Meets AI Reasoning (and New Trust Problems)
Huang’s essay makes a key point: models are only one layer, but they are where “intelligence” is encoded—and where new capabilities emerge across domains. (blogs.nvidia.com)
In crypto, the model layer is arriving in multiple forms:
- Onchain analytics + LLMs for compliance, fraud detection, and risk monitoring (reading transactions, contracts, and behavior patterns).
- AI agents with wallets that can route swaps, manage liquidity, or rebalance portfolios—shifting user experience from “clicking buttons” to “delegating intent.”
- ZK + AI research (e.g., verifying inference, proving provenance) that could eventually let users verify claims about AI outputs without exposing inputs.
But crypto’s model layer has a twist: the adversary also has models.
Chainalysis notes that scams increasingly leverage impersonation and AI‑enabled tactics, and projects that 2025 scam totals could exceed $17B as attribution improves. (chainalysis.com)
That means the “model layer” isn’t only about productivity—it also scales deception.
User takeaway: as AI makes phishing more convincing, self‑custody security becomes more about process than paranoia: verifying addresses, understanding signatures, and using tools that reduce blind signing.
Layer 5: Applications — Where Crypto’s 2025–2026 Value Is Concentrating
At the top of Huang’s stack, applications are where economic value is created. (blogs.nvidia.com)
In crypto, 2025’s application momentum has clustered around a few areas that map neatly to “infrastructure-grade” demand:
1) Stablecoins as global settlement rails
Stablecoins increasingly behave like financial infrastructure, which is why regulatory attention has sharpened. In the EU, regulators have published guidance on how crypto‑asset services should treat non‑compliant stablecoins under MiCA. (esma.europa.eu)
2) Tokenized real‑world assets (RWA)
RWA went from “narrative” to measurable traction. CoinGecko’s RWA Report 2025 summarizes how tokenized treasuries and other onchain RWAs expanded as yield and settlement efficiency moved onchain. (coingecko.com)
3) Security and “trust UX” as product features
As wallets become the control plane for identity, assets, and permissions, application success increasingly depends on whether users can understand what they’re signing.
Ethereum’s own security guidance emphasizes why a hardware wallet is considered one of the safest options for private keys—because the key remains offline and transactions are signed locally. (ethereum.org)
Why Clear Signing Matters: The Wallet Layer Is Becoming Part of the AI Stack
If AI applications become “always‑on copilots,” then wallets become the authorization layer for money, identity, and intent. This is where standards matter:
- EIP‑712 defines structured data signing so wallets can present more meaningful signing prompts (instead of opaque blobs). (eips.ethereum.org)
- ERC‑7730 proposes a structured clear‑signing format aimed at making signed data human‑readable and safer to verify on devices. (eips.ethereum.org)
Practical implication: as AI agents and automation increase transaction frequency, reducing blind signing is one of the most impactful security upgrades the industry can make—because many wallet‑drain attacks are ultimately authorization failures, not cryptographic failures.
A Five‑Layer Checklist for Crypto Users (Not Just Builders)
If you’re navigating DeFi, stablecoins, or tokenized assets in 2026, here’s a layered way to think about safety:
- Energy / environment: assume attackers operate at scale (automation, farms of bots, deepfakes). Your threat model is industrial.
- Chips / devices: keep signing keys in dedicated hardware when possible; treat your signing device like a production server.
- Infrastructure: prefer mature apps with strong operational history; be skeptical of “new chain, new bridge, new yield” bundles.
- Models: distrust messages that feel unusually persuasive or urgent—AI makes social engineering cheaper.
- Applications: verify every approval, signature, and destination address—especially when interacting with new contracts.
Where OneKey Fits (When the Stack Gets Real)
As crypto applications converge with AI automation—agents, scripted trading, onchain treasury workflows—the cost of a single bad signature rises. That’s why self‑custody tools that prioritize offline key storage and human verification at signing time become more important, not less.
A hardware wallet like OneKey is designed to keep private keys off internet‑connected devices and to make signing a deliberate step—an approach that aligns with the “five‑layer” reality: the higher the application value, the more pressure it puts on every layer below it, including the device that authorizes transactions.
Ultimately, Huang’s “five‑layer cake” reminds crypto builders and users of a simple truth: there is no magical abstraction layer beneath trust—and the most durable systems are the ones designed end‑to‑end. (blogs.nvidia.com)



