Token Utility
🛡️ 1. Network Security & Access (Security & Slashing)
Node Staking
Any computation, verification, or anti-fraud node must stake $GEN to participate in the network.
The staking amount is directly tied to node capacity, task eligibility, and reputation scoring.
Slashing & Penalties
Malicious behavior (e.g., falsified proofs, denial-of-service, protocol violations) will trigger slashing.
A portion of the slashed $GEN will be permanently burned, creating both punitive and deflationary effects.
⚡ 2. Privacy & Compute Pricing
PCC Consumption Mechanism
Advertisers consume PCC when initiating ESQ (Encrypted Sensitive Query) requests.
A portion of PCC will be automatically converted into $GEN and burned in the background.
Resource Reservation & Priority
During network congestion, advertisers staking $GEN gain priority in strategy review, scheduling, and compute allocation.
⚖️ 3. Protocol Governance
Core Parameter Governance
Minimum k-anonymity threshold
Upper bound of privacy budget ε
Network fee standards and economic parameters
Protocol Evolution Governance
Protocol upgrades and roadmap transitions
Connector and compliance template whitelisting
Deprecation timelines and migration policies
💰 4. Value Capture & Return
Network Fee Buyback
Every proof-verified advertising settlement contributes a small network fee.
These fees are periodically used to buy back and burn $GEN, forming structural deflation.
Sustained Work Incentives
High-performing connector developers and compliance template maintainers
Receive continuous $GEN rewards aligned with long-term ecosystem contribution.
Last updated
