Token Utility

🛡️ 1. Network Security & Access (Security & Slashing)

Node Staking

  • Any computation, verification, or anti-fraud node must stake $GEN to participate in the network.

  • The staking amount is directly tied to node capacity, task eligibility, and reputation scoring.

Slashing & Penalties

  • Malicious behavior (e.g., falsified proofs, denial-of-service, protocol violations) will trigger slashing.

  • A portion of the slashed $GEN will be permanently burned, creating both punitive and deflationary effects.


⚡ 2. Privacy & Compute Pricing

PCC Consumption Mechanism

  • Advertisers consume PCC when initiating ESQ (Encrypted Sensitive Query) requests.

  • A portion of PCC will be automatically converted into $GEN and burned in the background.

Resource Reservation & Priority

  • During network congestion, advertisers staking $GEN gain priority in strategy review, scheduling, and compute allocation.


⚖️ 3. Protocol Governance

Core Parameter Governance

  • Minimum k-anonymity threshold

  • Upper bound of privacy budget ε

  • Network fee standards and economic parameters

Protocol Evolution Governance

  • Protocol upgrades and roadmap transitions

  • Connector and compliance template whitelisting

  • Deprecation timelines and migration policies


💰 4. Value Capture & Return

Network Fee Buyback

  • Every proof-verified advertising settlement contributes a small network fee.

  • These fees are periodically used to buy back and burn $GEN, forming structural deflation.

Sustained Work Incentives

  • High-performing connector developers and compliance template maintainers

  • Receive continuous $GEN rewards aligned with long-term ecosystem contribution.

Last updated