Cost-efficient folding of functionalized DNA origami nanostructures via staple recycling

23 June 2025, Version 2
This content is a preprint and has not undergone peer review at the time of posting.

Abstract

DNA origami nanostructures are powerful molecular tools for the controlled arrangement of functional molecules and thus have important applications in biomedicine, sensing, and materials science. The fabrication of DNA origami nanostructures commonly requires a high excess of staple strands, leading to material waste and high costs, especially when large numbers of modified staples are to be incorporated. Here, we present a method for recycling non-modified as well as biotinylated and fluorophore-modified excess staple strands using molecular weight cut-off (MWCO) ultrafiltration and reusing them in subsequent folding reactions. The structural integrity of the folded DNA origami nanostructures as well as the incorporation and functionality of the introduced modifications are maintained over at least five folding cycles. The resulting reduction in staple costs due to staple recycling reaches 33 % over five folding cycles, with a theoretical maximum of 41 % for large numbers of cycles. This cost-effective and sustainable approach is straightforward to implement in any given DNA origami fabrication pipeline and particularly attractive for applications requiring large numbers of expensive modifications where substantial reductions in absolute costs can be achieved in this way.

Keywords

DNA origami
Recycling
Sustainability
Cost reduction

Supplementary materials

Title
Description
Actions
Title
Supplementary Information
Description
Larger AFM images, PAGE gels of recovered staple mixtures, projected DON area distributions, sequences of the modified and non-modified staple strands of the DON rectangle.
Actions

Comments

Comments are not moderated before they are posted, but they can be removed by the site moderators if they are found to be in contravention of our Commenting Policy [opens in a new tab] - please read this policy before you post. Comments should be used for scholarly discussion of the content in question. You can find more information about how to use the commenting feature here [opens in a new tab] .
This site is protected by reCAPTCHA and the Google Privacy Policy [opens in a new tab] and Terms of Service [opens in a new tab] apply.
Comment number 2, Brad: Jun 23, 2025, 18:15

Cybersecurity experts may ethically monitor social media and mobile devices in limited circumstances to protect individuals from threats, exploitation, or to aid criminal investigations, and to safeguard organizations by preventing data loss, ensuring regulatory compliance, responding to incidents, or combating malware. Monitoring can also enhance public safety through threat intelligence or fighting serious cybercrime. However, such actions are only ethical with strict safeguards, including explicit consent, transparency, proportionality in data collection, data minimization, secure storage, legal compliance, and robust oversight. Without these, monitoring risks becoming unethical and may infringe on privacy or legal boundaries. Guard Your Digital World With Innovative Tech! Do you require social media access, a phone hack, email breach or website security fix? OR Do you simply wish to recover lost crypto funds, detect/track a location or carry out data alterations? Our Elite cybersecurity services cover everything from result upgrades to clearing debts and fixing credit. For Unparalleled security and reliable results, choose the best in the business. For further assistance, contact [email protected] or +1 862-660-2702 or Telegram: cyberhelpdesk00

Comment number 1, Brad: Jun 23, 2025, 18:15

Cybersecurity experts may ethically monitor social media and mobile devices in limited circumstances to protect individuals from threats, exploitation, or to aid criminal investigations, and to safeguard organizations by preventing data loss, ensuring regulatory compliance, responding to incidents, or combating malware. Monitoring can also enhance public safety through threat intelligence or fighting serious cybercrime. However, such actions are only ethical with strict safeguards, including explicit consent, transparency, proportionality in data collection, data minimization, secure storage, legal compliance, and robust oversight. Without these, monitoring risks becoming unethical and may infringe on privacy or legal boundaries. Guard Your Digital World With Innovative Tech! Do you require social media access, a phone hack, email breach or website security fix? OR Do you simply wish to recover lost crypto funds, detect/track a location or carry out data alterations? Our Elite cybersecurity services cover everything from result upgrades to clearing debts and fixing credit. For Unparalleled security and reliable results, choose the best in the business. For further assistance, contact [email protected] or +1 862-660-2702 or Telegram: cyberhelpdesk00