White paper drafted under the European Markets in Crypto-Assets Regulation (EU) 2023/1114 for FFG 3R3J70FDR
Preamble
00. Table of Content
- Preamble
- 01. Date of notification
- 02. Statement in accordance with Article 6(3) of Regulation (EU) 2023/1114
- 03. Compliance statement in accordance with Article 6(6) of Regulation (EU) 2023/1114
- 04. Statement in accordance with Article 6(5), points (a), (b), (c), of Regulation (EU) 2023/1114
- 05. Statement in accordance with Article 6(5), point (d), of Regulation (EU) 2023/1114
- 06. Statement in accordance with Article 6(5), points (e) and (f), of Regulation (EU) 2023/1114
- Summary
- 07. Warning in accordance with Article 6(7), second subparagraph, of Regulation (EU) 2023/1114
- 08. Characteristics of the crypto-asset
- 09. Information about the quality and quantity of goods or services to which the utility tokens give access and restrictions on the transferability
- 10. Key information about the offer to the public or admission to trading
- Part A – Information about the offeror or the person seeking admission to trading
- A.1 Name
- A.2 Legal form
- A.3 Registered address
- A.4 Head office
- A.5 Registration date
- A.6 Legal entity identifier
- A.7 Another identifier required pursuant to applicable national law
- A.8 Contact telephone number
- A.9 E-mail address
- A.10 Response time (Days)
- A.11 Parent company
- A.12 Members of the management body
- A.13 Business activity
- A.14 Parent company business activity
- A.15 Newly established
- A.16 Financial condition for the past three years
- A.17 Financial condition since registration
- Part B – Information about the issuer, if different from the offeror or person seeking admission to trading
- B.1 Issuer different from offeror or person seeking admission to trading
- B.2 Name
- B.3 Legal form
- B.4 Registered address
- B.5 Head office
- B.6 Registration date
- B.7 Legal entity identifier
- B.8 Another identifier required pursuant to applicable national law
- B.9 Parent company
- B.10 Members of the management body
- B.11 Business activity
- B.12 Parent company business activity
- Part C – Information about the operator of the trading platform in cases where it draws up the crypto-asset white paper and information about other persons drawing the crypto-asset white paper pursuant to Article 6(1), second subparagraph, of Regulation (EU) 2023/1114
- C.1 Name
- C.2 Legal form
- C.3 Registered address
- C.4 Head office
- C.5 Registration date
- C.6 Legal entity identifier
- C.7 Another identifier required pursuant to applicable national law
- C.8 Parent company
- C.9 Reason for crypto-Asset white paper Preparation
- C.10 Members of the Management body
- C.11 Operator business activity
- C.12 Parent company business activity
- C.13 Other persons drawing up the crypto-asset white paper according to Article 6(1), second subparagraph, of Regulation (EU) 2023/1114
- C.14 Reason for drawing the white paper by persons referred to in Article 6(1), second subparagraph, of Regulation (EU) 2023/1114
- Part D – Information about the crypto-asset project
- D.1 Crypto-asset project name
- D.2 Crypto-assets name
- D.3 Abbreviation
- D.4 Crypto-asset project description
- D.5 Details of all natural or legal persons involved in the implementation of the crypto-asset project
- D.6 Utility Token Classification
- D.7 Key Features of Goods/Services for Utility Token Projects
- D.8 Plans for the token
- D.9 Resource allocation
- D.10 Planned use of Collected funds or crypto-Assets
- Part E – Information about the offer to the public of crypto-assets or their admission to trading
- E.1 Public offering or admission to trading
- E.2 Reasons for public offer or admission to trading
- E.3 Fundraising target
- E.4 Minimum subscription goals
- E.5 Maximum subscription goals
- E.6 Oversubscription acceptance
- E.7 Oversubscription allocation
- E.8 Issue price
- E.9 Official currency or any other crypto-assets determining the issue price
- E.10 Subscription fee
- E.11 Offer price determination method
- E.12 Total number of offered/traded crypto-assets
- E.13 Targeted holders
- E.14 Holder restrictions
- E.15 Reimbursement notice
- E.16 Refund mechanism
- E.17 Refund timeline
- E.18 Offer phases
- E.19 Early purchase discount
- E.20 Time-limited offer
- E.21 Subscription period beginning
- E.22 Subscription period end
- E.23 Safeguarding arrangements for offered funds/crypto- Assets
- E.24 Payment methods for crypto-asset purchase
- E.25 Value transfer methods for reimbursement
- E.26 Right of withdrawal
- E.27 Transfer of purchased crypto-assets
- E.28 Transfer time schedule
- E.29 Purchaser's technical requirements
- E.30 Crypto-asset service provider (CASP) name
- E.31 CASP identifier
- E.32 Placement form
- E.33 Trading platforms name
- E.34 Trading platforms Market identifier code (MIC)
- E.35 Trading platforms access
- E.36 Involved costs
- E.37 Offer expenses
- E.38 Conflicts of interest
- E.39 Applicable law
- E.40 Competent court
- Part F – Information about the crypto-assets
- F.1 Crypto-asset type
- F.2 Crypto-asset functionality
- F.3 Planned application of functionalities
- A description of the characteristics of the crypto asset, including the data necessary for classification of the crypto-asset white paper in the register referred to in Article 109 of Regulation (EU) 2023/1114, as specified in accordance with paragraph 8 of that Article
- F.4 Type of crypto-asset white paper
- F.5 The type of submission
- F.6 Crypto-asset characteristics
- F.7 Commercial name or trading name
- F.8 Website of the issuer
- F.9 Starting date of offer to the public or admission to trading
- F.10 Publication date
- F.11 Any other services provided by the issuer
- F.12 Language or languages of the crypto-asset white paper
- F.13 Digital token identifier code used to uniquely identify the crypto-asset or each of the several crypto assets to which the white paper relates
- F.14 Functionally fungible group digital token identifier
- F.15 Voluntary data flag
- F.16 Personal data flag
- F.17 LEI eligibility
- F.18 Home Member State
- F.19 Host Member States
- Part G – Information on the rights and obligations attached to the crypto-assets
- G.1 Purchaser rights and obligations
- G.2 Exercise of rights and obligations
- G.3 Conditions for modifications of rights and obligations
- G.4 Future public offers
- G.5 Issuer retained crypto-assets
- G.6 Utility token classification
- G.7 Key features of goods/services of utility tokens
- G.8 Utility tokens redemption
- G.9 Non-trading request
- G.10 Crypto-assets purchase or sale modalities
- G.11 Crypto-assets transfer restrictions
- G.12 Supply adjustment protocols
- G.13 Supply adjustment mechanisms
- G.14 Token value protection schemes
- G.15 Token value protection schemes description
- G.16 Compensation schemes
- G.17 Compensation schemes description
- G.18 Applicable law
- G.19 Competent court
- Part H – information on the underlying technology
- H.1 Distributed ledger technology (DTL)
- H.2 Protocols and technical standards
- H.3 Technology used
- H.4 Consensus mechanism
- H.5 Incentive mechanisms and applicable fees
- H.6 Use of distributed ledger technology
- H.7 DLT functionality description
- H.8 Audit
- H.9 Audit outcome
- Part I – Information on risks
- I.1 Offer-related risks
- I.2 Issuer-related risks
- I.3 Crypto-assets-related risks
- I.4 Project implementation-related risks
- I.5 Technology-related risks
- I.6 Mitigation measures
- Part J – Information on the sustainability indicators in relation to adverse impact on the climate and other environment-related adverse impacts
- J.1 Adverse impacts on climate and other environment-related adverse impacts
- S.1 Name
- S.2 Relevant legal entity identifier
- S.3 Name of the cryptoasset
- S.4 Consensus Mechanism
- S.5 Incentive Mechanisms and Applicable Fees
- S.6 Beginning of the period to which the disclosure relates
- S.7 End of the period to which the disclosure relates
- S.8 Energy consumption
- S.9 Energy consumption sources and methodologies
- S.10 Renewable energy consumption
- S.11 Energy intensity
- S.12 Scope 1 DLT GHG emissions – Controlled
- S.13 Scope 2 DLT GHG emissions – Purchased
- S.14 GHG intensity
- S.15 Key energy sources and methodologies
- S.16 Key GHG sources and methodologies
01. Date of notification
02. Statement in accordance with Article 6(3) of Regulation (EU) 2023/1114
03. Compliance statement in accordance with Article 6(6) of Regulation (EU) 2023/1114
04. Statement in accordance with Article 6(5), points (a), (b), (c), of Regulation (EU) 2023/1114
05. Statement in accordance with Article 6(5), point (d), of Regulation (EU) 2023/1114
06. Statement in accordance with Article 6(5), points (e) and (f), of Regulation (EU) 2023/1114
Summary
07. Warning in accordance with Article 6(7), second subparagraph, of Regulation (EU) 2023/1114
08. Characteristics of the crypto-asset
The crypto-asset Chainlink (LINK) referred to in this white paper is a crypto-asset other than EMTs and ARTs, and is implemented on multiple blockchain networks, namely Ethereum, Binance Smart Chain, Polygon, Gnosis Chain, Arbitrum, Avalanche C-Chain, Fantom, Optimism and Solana, as of 2026-02-04. The total supply is capped at 1,000,000,000 LINK. The first activity on Ethereum can be viewed on 2017-09-16 (transaction hash: 0x5488510df045770efbff57f25d0c6d2c1404d58c1199b21eb8dc5072b22d91d7, source: https://etherscan.io/tx/0x5488510df045770efbff57f25d0c6d2c1404d58c1199b21eb8dc5072b22d91d7, accessed 2026-02-04). The first activity on Binance Smart Chain can be viewed on 2020-10-23 (transaction hash: 0x706e0a84af6338a56866e55e789beac5d1a2c034b1f67c75046852aca62b73eb, source: https://bscscan.com/tx/0x706e0a84af6338a56866e55e789beac5d1a2c034b1f67c75046852aca62b73eb, accessed 2026-02-04). The first activity on Polygon can be viewed on 2020-10-21 (transaction hash: 0x930b0e271da636375c28f38b556da58e2a0b1a37b381ed145523d66b8e666da7, source: https://polygonscan.com/tx/0x930b0e271da636375c28f38b556da58e2a0b1a37b381ed145523d66b8e666da7, accessed 2026-02-04). The first activity on Gnosis Chain can be viewed on 2020-08-19 (transaction hash: 0xb7b6c9cc58ded302e5c0a7d5343af35ea260c315fbe03ca7305f02cd8ea342f0, source: https://gnosisscan.io/tx/0xb7b6c9cc58ded302e5c0a7d5343af35ea260c315fbe03ca7305f02cd8ea342f0, accessed 2026-02-04). The first activity on Arbitrum can be viewed on 2021-06-16 (transaction hash: 0xcec68dee6c2433066c57f4e69effbfa3c46f49eddf49f99c8e4b7367cb0d77d9, source: https://arbiscan.io/tx/0xcec68dee6c2433066c57f4e69effbfa3c46f49eddf49f99c8e4b7367cb0d77d9, accessed 2026-02-04). The first activity on Avalanche C-Chain can be viewed on 2021-07-23 (transaction hash: 0x0c7dbd5d8258bfbdd43f1195656ab6ba475f3ce401e37037e08592f20f64f35c, source: https://snowtrace.io/tx/0x0c7dbd5d8258bfbdd43f1195656ab6ba475f3ce401e37037e08592f20f64f35c?chainid=43114, accessed 2026-02-04). The first activity on Fantom can be viewed on 2021-02-09 (transaction hash: 0x5a082135cdebb6b167dc12847962e2373ed1c5d93497c8db26f8ba32f4baaed0, source: https://explorer.fantom.network/transactions/0x5a082135cdebb6b167dc12847962e2373ed1c5d93497c8db26f8ba32f4baaed0, accessed 2026-02-04). The first activity on Optimism can be viewed on 2021-11-12 (transaction hash: 0xcf99a6a74dccfbc2519621c0795e104b25f8cfb7171703b873ec23dcb955ac8b, source: https://optimistic.etherscan.io/tx/0xcf99a6a74dccfbc2519621c0795e104b25f8cfb7171703b873ec23dcb955ac8b, accessed 2026-02-04). The first activity on Solana can be viewed on 2022-03-16 (transaction hash/signature: 2aMFk4spV4UM1fpcU8X4kAfWQ2TRnMRcnVQj6xAvha7c3Bt7Z2FXHngHoeaXPAdKeGVwzqJGDScHnTsfKx5RsQn6, source: https://solscan.io/tx/2aMFk4spV4UM1fpcU8X4kAfWQ2TRnMRcnVQj6xAvha7c3Bt7Z2FXHngHoeaXPAdKeGVwzqJGDScHnTsfKx5RsQn6, accessed 2026-02-04).
Chainlink is a decentralised oracle network intended to enable smart contracts to access and use data and services that originate outside the relevant blockchain network. In operational terms, independent node operators deliver data and computation results to on-chain applications and may be selected and incentivised under the technical rules of the protocol. The LINK token is used in connection with paying for oracle services and, depending on the applicable service configuration, may also be used as collateral (including through staking-based mechanisms) intended to support cryptoeconomic security. According to official Chainlink documentation, LINK is an ERC677 token (compatible with ERC20 tooling) and token contracts exist for multiple supported blockchains where Chainlink services are offered.
The crypto-asset does not grant any legally enforceable or contractual rights or obligations to its holders or purchasers. Any functionalities accessible through the underlying technology are technical or operational in nature and do not confer rights comparable to ownership, profit participation, governance over any legal entity, or similar entitlements known from traditional financial instruments.
09. Information about the quality and quantity of goods or services to which the utility tokens give access and restrictions on the transferability
As defined in Article 3(9) of Regulation (EU) 2023/1114 of the European Parliament and of the Council of 31 May 2023 on Markets in Crypto-Assets – amending Regulations (EU) No 1093/2010 and (EU) No 1095/2010 and Directives 2013/36/EU and (EU) 2019/1937 – a utility token is “a type of crypto-asset that is only intended to provide access to a good or a service supplied by its issuer”. This crypto-asset does not qualify as a utility token, as its intended use goes beyond providing access to a good or service supplied solely by the issuer.
10. Key information about the offer to the public or admission to trading
Crypto Risk Metrics GmbH is seeking admission to trading on Payward Global Solutions LTD ("Kraken") platform in the European Union in accordance with Article 5 of Regulation (EU) 2023/1114 of the European Parliament and of the Council of 31 May 2023 on Markets in Crypto-Assets, and amending Regulations (EU) No 1093/2010 and (EU) No 1095/2010 and Directives 2013/36/EU and (EU) 2019/1937. The admission to trading is not accompanied by a public offer of the crypto-asset.
Part A – Information about the offeror or the person seeking admission to trading
A.1 Name
A.2 Legal form
A.3 Registered address
A.4 Head office
A.5 Registration date
A.6 Legal entity identifier
A.7 Another identifier required pursuant to applicable national law
A.8 Contact telephone number
A.9 E-mail address
A.10 Response time (Days)
A.11 Parent company
A.12 Members of the management body
| Identity | Function | Business Address |
|---|---|---|
A.13 Business activity
Crypto Risk Metrics GmbH is a technical service provider that supports regulated entities in the fulfilment of their regulatory requirements. In this regard, Crypto Risk Metrics GmbH, among other services, acts as a data provider for ESG data according to Article 66(5). Due to the regulations laid out in Articles 4(7), 5(4) and 66(3) of the Regulation (EU) 2023/1114 of the European Parliament and of the Council of 31 May 2023 on Markets in Crypto-Assets, and amending Regulations (EU) No 1093/2010 and (EU) No 1095/2010 and Directives 2013/36/EU and (EU) 2019/1937, Crypto Risk Metrics GmbH aims to provide central services for crypto-asset white papers.
A.14 Parent company business activity
A.15 Newly established
A.16 Financial condition for the past three years
Crypto Risk Metrics GmbH, founded in 2018 and based in Hamburg (HRB 154488), has undergone several strategic shifts in its business focus since incorporation. Due to these changes in business model and operational direction over time, the financial figures from earlier years are only comparable to a limited extent with the company’s current commercial activities. The present business model – centred around regulatory technology and risk analytics in the context of the MiCA framework – has been established progressively and can be realistically considered fully operational since approximately 2024.
The company’s financial trajectory over the past three years reflects the transition from exploratory development toward market-ready product delivery. The profit or loss after tax for the last three financial years is as follows:
2024 (unaudited): negative EUR 50.891,81
2023 (unaudited): negative EUR 27.665,32
2022: EUR 104.283,00.
The profit in 2022 resulted primarily from legacy consulting activities, which were discontinued in the course of the company’s repositioning.
The losses in 2023 and 2024 result from strategic investments in the development of proprietary software infrastructure, regulatory frameworks, and compliance technology for the MiCA ecosystem. During those periods, no substantial commercial revenues were expected, as resources were directed toward preparing the platform for regulated market entry.
A fundamental repositioning of the company occurred in 2023 and especially in 2024, when the focus shifted toward providing risk management, regulatory reporting, and supervisory compliance solutions for financial institutions and crypto-asset service providers. This marked a material shift in business operations and monetisation strategy.
Based on the current business development in Q4 2025, revenues exceeding EUR 550,000 are expected for the fiscal year 2025, with an anticipated net profit of approximately EUR 100,000. These figures are neither audited nor based on a finalised annual financial statement; they are derived from the company’s current pipeline, client development, and active commercial engagements. Accordingly, they are subject to future risks and market fluctuations.
With the regulatory environment now taking shape and the platform commercially validated, it is assumed that the effects of the strategic developments will continue to materialise in 2026. The company foresees further scalability of its technology and growing market demand for regulatory compliance tools in the European crypto-asset sector.
No public subsidies or governmental grants have been received to date; all operations have been financed through shareholder contributions and internally generated resources. Crypto Risk Metrics has never accepted any payments via tokens from projects it has worked with and – due to the internal Conflicts of Interest Policy – never will.
A.17 Financial condition since registration
Not applicable. The company has been established for more than three years and its financial condition over the past three years is provided in Part A.16 above.
Part B – Information about the issuer, if different from the offeror or person seeking admission to trading
B.1 Issuer different from offeror or person seeking admission to trading
B.2 Name
B.3 Legal form
B.4 Registered address
B.5 Head office
B.6 Registration date
B.7 Legal entity identifier
B.8 Another identifier required pursuant to applicable national law
B.9 Parent company
B.10 Members of the management body
| Identity | Function | Business Address |
|---|---|---|
B.11 Business activity
SMARTCONTRACT INC develops software for decentralized oracle networks, enabling smart contracts to securely access real-world data and external APIs, perform off-chain computation, and support cross-chain interoperability across multiple blockchains.
B.12 Parent company business activity
Not applicable.
Part C – Information about the operator of the trading platform in cases where it draws up the crypto-asset white paper and information about other persons drawing the crypto-asset white paper pursuant to Article 6(1), second subparagraph, of Regulation (EU) 2023/1114
C.1 Name
C.2 Legal form
C.3 Registered address
C.4 Head office
C.5 Registration date
C.6 Legal entity identifier
C.7 Another identifier required pursuant to applicable national law
C.8 Parent company
C.9 Reason for crypto-Asset white paper Preparation
C.10 Members of the Management body
C.11 Operator business activity
C.12 Parent company business activity
C.13 Other persons drawing up the crypto-asset white paper according to Article 6(1), second subparagraph, of Regulation (EU) 2023/1114
C.14 Reason for drawing the white paper by persons referred to in Article 6(1), second subparagraph, of Regulation (EU) 2023/1114
Part D – Information about the crypto-asset project
D.1 Crypto-asset project name
D.2 Crypto-assets name
D.3 Abbreviation
D.4 Crypto-asset project description
According to public information (source: https://chain.link/whitepaper, accessed 2026-02-02), the Chainlink project is a crypto-asset initiative concerned with the development and operation of a decentralised oracle network (DON) designed to connect blockchain-based smart contracts with external, real-world data and systems. The project is intended to address the “oracle problem”, namely the inherent inability of blockchain networks to natively observe, verify, or retrieve information from outside their own execution environment. In this context, Chainlink is described as a “connective tissue” enabling smart contracts to become “hybrid” by combining on-chain logic with off-chain data inputs and computation.
The technical core of the project is the Chainlink Protocol, which provides a decentralised architecture for sourcing, aggregating, and delivering data to smart contracts in a manner intended to be tamper-resistant. Rather than relying on a single data source, the protocol is designed to utilise multiple independent data providers and a decentralised group of node operators to fetch, validate, and deliver information. The protocol includes multiple service components, including Data Feeds for aggregated market data delivery (e.g., price feeds), CCIP (Cross-Chain Interoperability Protocol) for sending messages and transferring tokens across different blockchain networks, Automation for enabling scheduled or conditional smart contract execution, VRF (Verifiable Random Function) for cryptographically verifiable randomness, and the Chainlink Runtime Environment (CRE) as an orchestration layer intended to combine blockchains, external data sources, and legacy systems into unified workflows.
The LINK crypto-asset functions as an element within this broader technical framework. It is described as the native utility token of the Chainlink ecosystem and is intended to support the operational and cryptoeconomic mechanisms of the decentralised oracle network. LINK is an ERC-677 token (compatible with ERC-20 wallets while allowing token transfers to contain a data payload) and has a capped total supply of 1,000,000,000 units. Within the protocol model described, LINK may be used to pay node operators for oracle services, including retrieving and delivering data, performing off-chain computation, and supporting other oracle-related functions. Node operators are intended to earn LINK rewards for providing accurate and timely services, and reputation considerations are described as being linked, in part, to LINK holdings and historical performance.
The project does not involve the granting of ownership, profit-participation rights, or legal claims against any project entity or contributors; rather, it is described as centring on the creation and operation of technical infrastructure in which LINK is intended to function as a utility and incentive input for oracle network services and related protocol processes. All future developments, including the evolution and configuration of services, staking and slashing parameters, and broader protocol scope, remain subject to change.
D.5 Details of all natural or legal persons involved in the implementation of the crypto-asset project
| Type of person | Name of person | Business address of person | Domicile of company |
|---|---|---|---|
D.6 Utility Token Classification
D.7 Key Features of Goods/Services for Utility Token Projects
D.8 Plans for the token
This section provides an overview of the historical developments related to the LINK crypto-asset and a description of planned or anticipated project milestones as publicly communicated. All forward-looking elements are subject to significant uncertainty. They do not constitute commitments, assurances, or guarantees, and may be modified, delayed, or discontinued at any time. The implementation of past milestones cannot be assumed to continue in the future, and future changes may have adverse effects for token holders.
There is no formally published roadmap for the LINK crypto-asset and the Chainlink protocol. Based on the official roadmap (sources: https://blog.chain.link/; accessed 2026-02-02), several protocol upgrades, ecosystem initiatives, and crypto-asset-related developments have been communicated that affect the evolution of the Chainlink protocol and the role of the LINK crypto-asset.
Past milestones:
- Initial Coin Offering (September 2017): The project conducted an initial token sale that reportedly raised USD 32 million to support the development of decentralized oracle functionality.
- Ethereum Mainnet Launch (May 2019): Chainlink’s oracle functionality was deployed on Ethereum mainnet, enabling decentralized price feed delivery for on-chain applications.
- CCIP Launch (2023): The Cross-Chain Interoperability Protocol (CCIP) was launched as a standard intended to facilitate cross-chain data and value transfer.
- Chainlink Reserve Launch (August 2025): The Chainlink Reserve was introduced as an on-chain reserve of LINK reportedly funded by revenue to support long-term network sustainability.
- Grayscale Chainlink ETF Launch (December 2025): A Grayscale Chainlink ETF launch was referenced as having occurred in December 2025.
Future milestones:
- Confidential Compute Early Access (Early 2026): Confidential Compute is targeted for early access to support processing of sensitive data within secure enclaves with on-chain verifiability.
- Sustainable Economics Transition (Long-term; date not specified): A long-term objective is for emission-based rewards to taper off and be replaced by non-emission sources such as user service fees and the Partner Growth Program (PGP).
Note: All future milestones are subject to significant uncertainty, including but not limited to technical feasibility, regulatory developments, market adoption, and community governance decisions. The project may modify, delay, or discontinue any of these initiatives at any time. Past implementation or performance outcomes do not constitute an indication of future results, and any such changes may materially affect the characteristics, availability, or perceived value of the LINK crypto-asset for its holders.
D.9 Resource allocation
Based on information from various third-party and industry sources, it is reported that the crypto-asset project associated with the Chainlink (LINK) token has raised external funding primarily through its 2017 token sale process, which included a private sale component and a public sale component.
According to publicly available descriptions of the token sale structure, on or around 19 September 2017 the project is reported to have raised approximately USD 29 million through a private sale, and an additional approximately USD 3 million through a public sale, resulting in an indicated aggregate of approximately USD 32 million raised as part of the initial token sale.
Further third-party fundraising databases and token-sale aggregators list a number of investors and participants in connection with the Chainlink token sale, including NodeRise Capital, FJ Syndicates, and Richard F. Dulude, among others. However, these listings are not accompanied by publicly verifiable contractual documentation or consistent cross-source confirmation, and should therefore be treated as indicative only.
However, all such information is derived exclusively from public announcements, portfolio disclosures, press releases, and third-party publications. The issuer, foundation, or entities associated with the Chainlink (LINK) crypto-asset have not independently confirmed the occurrence, precise amounts, valuation, legal structure, or contractual terms of these reported financing rounds. As a result, the referenced investment amounts, investor participation, and any implied cumulative funding figures cannot be independently verified and should be considered indicative only.
D.10 Planned use of Collected funds or crypto-Assets
Not applicable, as this white paper serves the purpose of admission to trading and is not associated with any fundraising activity for the crypto-asset project.
Part E – Information about the offer to the public of crypto-assets or their admission to trading
E.1 Public offering or admission to trading
E.2 Reasons for public offer or admission to trading
The purpose of seeking admission to trading is to enable the crypto-asset to be listed on a regulated platform in accordance with the applicable provisions of Regulation (EU) 2023/1114 and Commission Implementing Regulation (EU) 2024/2984. The white paper has been drawn up to comply with the transparency requirements applicable to trading venues.
E.3 Fundraising target
E.4 Minimum subscription goals
E.5 Maximum subscription goals
E.6 Oversubscription acceptance
E.7 Oversubscription allocation
E.8 Issue price
E.9 Official currency or any other crypto-assets determining the issue price
E.10 Subscription fee
E.11 Offer price determination method
E.12 Total number of offered/traded crypto-assets
E.13 Targeted holders
E.14 Holder restrictions
E.15 Reimbursement notice
E.16 Refund mechanism
E.17 Refund timeline
E.18 Offer phases
E.19 Early purchase discount
E.20 Time-limited offer
E.21 Subscription period beginning
E.22 Subscription period end
E.23 Safeguarding arrangements for offered funds/crypto- Assets
E.24 Payment methods for crypto-asset purchase
E.25 Value transfer methods for reimbursement
E.26 Right of withdrawal
E.27 Transfer of purchased crypto-assets
E.28 Transfer time schedule
E.29 Purchaser's technical requirements
E.30 Crypto-asset service provider (CASP) name
E.31 CASP identifier
E.32 Placement form
E.33 Trading platforms name
E.34 Trading platforms Market identifier code (MIC)
E.35 Trading platforms access
The token is intended to be listed on the trading platform operated by Payward Global Solutions LTD ("Kraken"). Access to this platform depends on regional availability and user eligibility under Kraken’s terms and conditions. Investors should consult Kraken’s official documentation to determine whether they meet the requirements for account creation and token trading.
E.36 Involved costs
The costs involved in accessing the trading platform depend on the specific fee structure and terms of the respective crypto-asset service provider. These may include trading fees, deposit or withdrawal charges, and network-related gas fees. Investors are advised to consult the applicable fee schedule of the chosen platform before engaging in trading activities.
E.37 Offer expenses
Not applicable, as this white paper is written to seek admission to trading, not for the initial offer to the public.
E.38 Conflicts of interest
MiCA-compliant crypto-asset service providers shall have strong measures in place in order to manage conflicts of interest. Due to the broad audience this white paper is addressing, potential investors should always check the conflicts-of-interest policy of their respective counterparty.
Crypto Risk Metrics GmbH has established, implemented, and documented comprehensive internal policies and procedures for the identification, prevention, management, and documentation of conflicts of interest in accordance with applicable regulatory requirements. These internal measures are actively applied within the organisation. For the purposes of this specific assessment and the crypto-asset covered by this white paper, a token-specific review has been conducted by Crypto Risk Metrics GmbH. Based on this individual review, no conflicts of interest relevant to this crypto-asset have been identified at the time of preparation of this white paper.
E.39 Applicable law
Not applicable, as this white paper is written to seek admission to trading, not for the initial offer to the public.
E.40 Competent court
Not applicable, as this white paper is written to seek admission to trading, not for the initial offer to the public.
Part F – Information about the crypto-assets
F.1 Crypto-asset type
F.2 Crypto-asset functionality
According to public information available in the official Chainlink project documentation (https://chain.link/economics, accessed 2026-02-02), LINK is the native crypto-asset of the Chainlink ecosystem and is intended to function as the primary on-chain economic and coordination mechanism supporting the decentralised oracle network. LINK is implemented as an ERC-677 token, which is compatible with the ERC-20 standard while enabling token transfers to carry a data payload for smart-contract interactions.
The LINK crypto-asset functions as a technical component within the Chainlink Network and its associated protocol environment. It is used to support core network operations and interactions at the protocol level. LINK is used as a payment and settlement asset for oracle services, including compensating node operators for retrieving off-chain data, performing computations, and delivering results to smart contracts. It may also be used in connection with staking mechanisms intended to contribute to cryptoeconomic security and node performance guarantees, subject to the technical rules and configurations of the protocol. This includes Chainlink Staking (sometimes described as “Economics 2.0”), under which node operators and, where supported, community participants may lock LINK to back oracle services and align incentives, with rewards mechanisms that may combine token-based incentives and, over time, service-fee–based rewards; staking designs may also include performance enforcement (such as slashing) under defined conditions.
The LINK crypto-asset does not confer ownership, profit participation, governance rights in or over the issuer or any related entity, or any form of economic entitlement. All functionalities are technical in nature and relate exclusively to interactions within the Chainlink protocol environment. The actual usability of LINK depends on factors such as system stability, smart-contract execution, development progress, governance decisions, and the operational conditions of the Chainlink Network, which are outside the control of token holders.
F.3 Planned application of functionalities
Future milestones:
- Confidential Compute Early Access (Early 2026): Confidential Compute is targeted for early access to support processing of sensitive data within secure enclaves with on-chain verifiability.
- Sustainable Economics Transition (Long-term; date not specified): A long-term objective is for emission-based rewards to taper off and be replaced by non-emission sources such as user service fees and the Partner Growth Program (PGP).
Note: All future milestones are subject to significant uncertainty, including but not limited to technical feasibility, regulatory developments, market adoption, and community governance decisions. The project may modify, delay, or discontinue any of these initiatives at any time. Past implementation or performance outcomes do not constitute an indication of future results, and any such changes may materially affect the characteristics, availability, or perceived value of the LINK crypto-asset for its holders.
A description of the characteristics of the crypto asset, including the data necessary for classification of the crypto-asset white paper in the register referred to in Article 109 of Regulation (EU) 2023/1114, as specified in accordance with paragraph 8 of that Article
F.4 Type of crypto-asset white paper
F.5 The type of submission
F.6 Crypto-asset characteristics
The crypto-asset referred to herein is a crypto-asset other than EMTs and ARTs, and is available on multiple networks. The crypto-asset is fungible up to 18 digits after the decimal point on Ethereum, Binance Smart Chain, Polygon, Gnosis Chain, Arbitrum, Avalanche C-Chain, Fantom, Optimism and 9 digits after the decimal point on Solana. The crypto-asset constitutes a digital representation recorded on distributed-ledger technology and does not confer ownership, governance, profit participation, or any other legally enforceable rights. Any functionalities associated with the token are limited to potential technical features within the relevant platform environment. These functionalities do not represent contractual entitlements and may depend on future development decisions, technical design choices, and operational conditions. The crypto-asset does not embody intrinsic economic value; instead, its value, if any, is determined exclusively by market dynamics such as supply, demand, and liquidity in secondary markets.
F.7 Commercial name or trading name
F.8 Website of the issuer
F.9 Starting date of offer to the public or admission to trading
F.10 Publication date
F.11 Any other services provided by the issuer
No such services are currently known to be provided by the issuer. However, it cannot be excluded that additional services exist or may be offered in the future outside the scope of Regulation (EU) 2023/1114.
F.12 Language or languages of the crypto-asset white paper
F.13 Digital token identifier code used to uniquely identify the crypto-asset or each of the several crypto assets to which the white paper relates
F.14 Functionally fungible group digital token identifier
F.15 Voluntary data flag
F.16 Personal data flag
F.17 LEI eligibility
F.18 Home Member State
F.19 Host Member States
Part G – Information on the rights and obligations attached to the crypto-assets
G.1 Purchaser rights and obligations
The crypto-asset does not grant any legally enforceable or contractual rights or obligations to its holders or purchasers.
Any functionalities accessible through the underlying technology are of a purely technical or operational nature and do not constitute rights comparable to ownership, profit participation, governance, or similar entitlements known from traditional financial instruments.
Accordingly, holders do not acquire any claim capable of legal enforcement against the issuer or any third party.
G.2 Exercise of rights and obligations
As the crypto-asset does not establish any legally enforceable rights or obligations, there are no applicable procedures or conditions for their exercise.
Any interaction or functionality that may be available within the technical infrastructure of the project – such as participation mechanisms or protocol-level features – serves operational purposes only and does not create or constitute evidence of any contractual or statutory entitlement.
G.3 Conditions for modifications of rights and obligations
As the crypto-asset does not confer any legally enforceable rights or obligations, there are no conditions or mechanisms under which such rights could be modified.
Adjustments to the technical protocol, smart contract logic, or related systems may occur in the ordinary course of development or maintenance.
Such changes do not alter the legal position of holders, as no contractual or regulatory rights exist. Holders should not interpret technical updates or governance-related changes as amendments to legally binding entitlements.
G.4 Future public offers
Information on future offers to the public of crypto-assets was not available at the time of writing this white paper (2026-02-02).
G.5 Issuer retained crypto-assets
G.6 Utility token classification
G.7 Key features of goods/services of utility tokens
G.8 Utility tokens redemption
G.9 Non-trading request
G.10 Crypto-assets purchase or sale modalities
G.11 Crypto-assets transfer restrictions
The crypto-assets themselves are not subject to any technical or contractual transfer restrictions and are generally freely transferable. However, crypto-asset service providers may impose restrictions on buyers or sellers in accordance with applicable laws, internal policies or contractual terms agreed with their clients.
G.12 Supply adjustment protocols
G.13 Supply adjustment mechanisms
For the crypto-asset in scope, the supply is limited to approximately 1,000,000,000 units according to official sources (https://chain.link/circulating-supply, accessed 2026-02-02). Investors should note that changes in the supply of the crypto-asset can have a negative impact.
G.14 Token value protection schemes
G.15 Token value protection schemes description
G.16 Compensation schemes
G.17 Compensation schemes description
G.18 Applicable law
This white paper is submitted in the context of an application for admission to trading on a trading platform established in the European Union. Accordingly, this white paper shall be governed by the laws of the Federal Republic of Germany.
G.19 Competent court
Any disputes arising in relation to this white paper or the admission to trading may fall under the jurisdiction of the competent courts in Hamburg, Germany.
Part H – information on the underlying technology
H.1 Distributed ledger technology (DTL)
The crypto-asset in scope is implemented on the Arbitrum, Avalanche C-Chain, Binance Smart Chain, Ethereum, Fantom, Gnosis Chain, Optimism, Polygon, and Solana networks, following the standards described below.
H.2 Protocols and technical standards
The crypto-asset in scope is implemented on the Arbitrum, Avalanche C-Chain, Binance Smart Chain, Ethereum, Fantom, Gnosis Chain, Optimism, Polygon, and Solana networks, following the standards described below.
The following applies to Arbitrum:
Arbitrum commonly refers to the Arbitrum Rollup, a Layer 2 (L2) blockchain build using the Arbitrum technology suite. The Arbitrum Rollup is an optimistic rollup on top of the Ethereum blockchain. This means that the L2 transactions do not have their own consensus mechanism and are only validated by the execution clients. The so-called sequencer regularly bundles stacks of L2 transactions and publishes them on the L1 network, i.e. Ethereum. Ethereum's consensus mechanism (Proof-of-Stake) thus indirectly secures all L2 transactions as soon as they are written to L1.
The following applies to Avalanche C-Chain:
Avalanche supports the Ethereum Virtual Machine on its C-Chain and implements standard token protocols such as ERC-20 and ERC-721 for compatibility. Its architecture also allows custom virtual machines via the Subnet framework.
The following applies to Binance Smart Chain:
Binance Smart Chain (BSC) is a Layer-1 blockchain that utilizes a Proof-of-Staked Authority (PoSA) consensus mechanism. This mechanism combines elements of Proof-of-Authority (PoA) and Proof-of-Stake (PoS) and is intended to secure the network and validate transactions. In PoSA, validators are selected based on their stake and authority, with the goal of providing fast transaction times and low fees while maintaining network security through staking.
The following applies to Ethereum:
The crypto-asset operates on a well-defined set of protocols and technical standards that are intended to ensure its security, decentralization, and functionality. Below are some of the key ones:
1. Network Protocols
The crypto-asset follows a decentralized, peer-to-peer (P2P) protocol where nodes communicate over the crypto-asset's DevP2P protocol using RLPx for data encoding.
- Transactions and smart contract execution are secured through Proof-of-Stake (PoS) consensus.
- Validators propose and attest blocks in Ethereum’s Beacon Chain, finalized through Casper FFG.
- The Ethereum Virtual Machine (EVM) executes smart contracts using Turing-complete bytecode.
2. Transaction and Address Standards
crypto-asset Address Format: 20-byte addresses derived from Keccak-256 hashing of public keys.
Transaction Types:
- Legacy Transactions (pre-EIP-1559)
- Type 0 (Pre-EIP-1559 transactions)
- Type 1 (EIP-2930: Access list transactions)
- Type 2 (EIP-1559: Dynamic fee transactions with base fee burning)
The Pectra upgrade introduces EIP-7702, a transformative improvement to account abstraction. This allows externally owned accounts (EOAs) to temporarily act as smart contract wallets during a transaction. It provides significant flexibility, enabling functionality such as sponsored gas payments and batched operations without changing the underlying account model permanently.
3. Blockchain Data Structure & Block Standards
- the crypto-asset's blockchain consists of accounts, smart contracts, and storage states, maintained through Merkle Patricia Trees for efficient verification.
Each block contains:
- Block Header: Parent hash, state root, transactions root, receipts root, timestamp, gas limit, gas used, proposer signature.
- Transactions: Smart contract executions and token transfers.
- Block Size: No fixed limit; constrained by the gas limit per block (variable over time). In line with Ethereum’s scalability roadmap, Pectra includes EIP-7691, which increases the maximum number of "blobs" (data chunks introduced with EIP-4844) per block. This change significantly boosts the data availability layer used by rollups, supporting cheaper and more efficient Layer 2 scalability.
4. Upgrade & Improvement Standards
Ethereum follows the Ethereum Improvement Proposal (EIP) process for upgrades.
The following applies to Fantom:
Fantom is EVM-compatible and adheres to common Ethereum standards (ERC-20, ERC-721). It uses the Lachesis protocol layer for consensus while maintaining full interoperability with Ethereum tooling and smart contracts.
The following applies to Gnosis Chain:
Gnosis is built on the Ethereum Virtual Machine (EVM) standard and supports standards like ERC-20 and ERC-721 token protocols. Smart contracts follow widely adopted Ethereum standards, ensuring interoperability with existing tools and dApps
The following applies to Optimism:
Optimism is a Layer 2 scaling solution built on Ethereum that uses Optimistic Rollups technology. Transactions are bundled outside the Ethereum main chain and only transmitted to Layer 1 in compressed form. This significantly reduces gas fees and increases transaction speed. Optimism is fully EVM-compatible and allows developers to migrate existing Ethereum smart contracts without major adjustments. Optimism's architecture is based on a modular rollup design, with data and execution layers treated separately to ensure scalability and flexibility.
The following applies to Polygon:
The Polygon network is built on a clear set of protocols and standards designed to ensure scalability, interoperability, and security. Polygon is built on top of Ethereum, it combines Layer-2 features with sidechain architecture. Network security is provided through Proof-of-Stake, where validators stake POL to propose and validate blocks. The consensus architecture consists of three layers: Smart Contracts on Ethereum that are used for staking POL. The Heimdall layer consisting of Heimdall nodes running in parallel to the Ethereum mainnet, monitoring the staking smart contracts deployed on the mainnet, and committing checkpoints to the mainnet. And the Bor layer, which are block producing Bor nodes. Bor clients are based on the widely used Go Ethereum client, and therefore most technical standards on Polygon are the same as for Ethereum. Furthermore full compatibility with the Ethereum Virtual Machine (EVM) allows Ethereum smart contracts to be deployed on Polygon without modification.
The following applies to Solana:
The tokens were created with Solana’s Token Program, a smart contract that is part of the Solana Program Library (SPL). Such tokens are commonly referred to as SPL-token. The token itself is not an additional smart contract, but what is called a data account on Solana. As the name suggests data accounts store data on the blockchain. However, unlike smart contracts, they cannot be executed and cannot perform any operations. Since one cannot interact with data accounts directly, any interaction with an SPL-token is done via Solana’s Token Program. The source code of this smart contract can be found here https://github.com/solana-program/token.
The Token Program is developed in Rust, a memory-safe, high-performance programming language designed for secure and efficient development. On Solana, Rust is said to be the primary language used for developing on-chain programs (smart contracts), intended to ensure safety and reliability in decentralized applications (dApps).
Core functions of the Token Program:
initialize_mint() → Create a new type of token, called a mint
mint_to() → Mints new tokens of a specific type to a specified account
burn() → Burns tokens from a specified account, reducing total supply
transfer() → Transfers tokens between accounts
approve() → Approves a delegate to spend tokens on behalf of the owner
set_authority() → Updates authorities (mint, freeze, or transfer authority)
These functions ensure basic operations like transfers, and minting/burning can be performed within the Solana ecosystem.
In addition to the Token Program, another smart contract, the Metaplex Token Metadata Program is commonly used to store name, symbol, and URI information for better ecosystem compatibility. This additional metadata has no effect on the token’s functionality.
H.3 Technology used
The crypto-asset in scope is implemented on the Arbitrum, Avalanche C-Chain, Binance Smart Chain, Ethereum, Fantom, Gnosis Chain, Optimism, Polygon, and Solana networks, following the standards described below.
The following applies to Arbitrum:
1. Arbitrum-Compatible Wallets:The tokens are supported by all wallets compatible with the Ethereum Virtual Machine (EVM), such as MetaMask.
2. Decentralized Ledger: Arbitrum operates as a Layer-2 blockchain on Ethereum and maintains its own decentralized ledger for recording token transactions. Final transaction data is periodically posted to Ethereum Layer 1, ensuring long-term availability and resistance to tampering.
3. ERC-20 Token Standard: The Arbitrum network supports tokens implemented under the ERC-20 standard, the same as on Ethereum.
4. Arbitrum supports what is called. MultiVM, which is the combination of EVM support and WASM VM support. The latter one being more efficient (lower gas costs) but specific to Arbitrum.
5. Scalability and Transaction Efficiency:
As a rollup-based Layer-2, Arbitrum is intended to handle high volumes of transactions with lower fees compared to Ethereum Layer 1. This is enabled by off-chain execution and on-chain data posting via optimistic rollup architecture.
The following applies to Avalanche C-Chain:
Avalanche features a modular, multi-chain design enabling the creation of custom subnets, each with its own blockchain and rules, while intending to maintain high throughput and low latency.
The following applies to Binance Smart Chain:
1. BSC-Compatible Wallets
Tokens on BSC are supported by wallets compatible with the Ethereum Virtual Machine (EVM), such as MetaMask. These wallets can be configured to connect to the BSC network and are designed to interact with BSC using standard Web3 interfaces.
2. Ledger
BSC maintains its own decentralized ledger for recording token transactions. This ledger is intended to ensure transparency and security, providing a verifiable record of all activities on the network.
3. BEP-20 Token Standard
BSC supports tokens implemented under the BEP-20 standard, which is tailored for the BSC ecosystem. This standard is designed to facilitate the creation and management of tokens on the network.
4. Scalability and Transaction Efficiency
BSC is designed to handle high volumes of transactions with low fees. It leverages its PoSA consensus mechanism to achieve fast transaction times and efficient network performance, making it suitable for applications requiring high throughput.
The following applies to Ethereum:
1. Decentralized Ledger: The Ethereum blockchain acts as a decentralized ledger for all token transactions, with the intention to preserving an unalterable record of token transfers and ownership to ensure both transparency and security.
2. Private Key Management: To safeguard their token holdings, users must securely store their wallet’s private keys and recovery phrases.
3. Cryptographic Integrity: Ethereum employs elliptic curve cryptography to validate and execute transactions securely, intended to ensure the integrity of all transfers. The Keccak-256 (SHA-3 variant) Hashing Algorithm is used for hashing and address generation. The crypto-asset uses ECDSA with secp256k1 curve for key generation and digital signatures. Next to that, BLS (Boneh-Lynn-Shacham) signatures are used for validator aggregation in PoS.
The following applies to Fantom:
Fantom leverages a Directed Acyclic Graph (DAG) structure powered by the Lachesis protocol, delivering fast confirmation times and high scalability for DeFi and enterprise use cases.
The following applies to Gnosis Chain:
Gnosis uses an Ethereum-compatible architecture focused on efficient governance and DAO applications. By employing Rollups and an energy-efficient infrastructure, scalability and transaction performance are enhanced.
The following applies to Optimism:
Optimism is fully compatible with Ethereum (Layer 1) and uses the same development tools as Solidity, Vyper, and popular frameworks (Hardhat, Foundry, Truffle). This allows developers to deploy their applications on Optimism without making major changes. In addition, the bridge between Ethereum and Optimism is designed to allow assets to be easily transferred between the two networks.
The following applies to Polygon:
Polygon operates as a decentralized ledger that records all token transactions on its network, ensuring transparency and security through an immutable record of transfers and ownership. To protect their holdings, users must securely manage their private keys and recovery phrases, since access to tokens depends entirely on these credentials.
The network relies on elliptic curve cryptography for secure transaction validation and execution. Polygon uses the secp256k1 curve with ECDSA for key generation and digital signatures, while the Keccak-256 hashing algorithm underpins address derivation and transaction integrity. This combination of cryptographic standards provides the foundation for both the security and reliability of the Polygon ecosystem.
Polygon’s Bor client is based on Ethereum’s Go Ethereum Client. Polygon’s Heimdall client is built using Cosmos-SDK and CometBFT.
The following applies to Solana:
1. Solana-Compatible Wallets: The tokens are supported by all wallets compatible with Solana’s Token Program
2. Decentralized Ledger: The Solana blockchain acts as a decentralized ledger for all token transactions, with the intention to preserving an unalterable record of token transfers and ownership to ensure both transparency and security.
3. SPL Token Program: The SPL (Solana Program Library) Token Program is an inherent Solana smart contract built to create and manage new types of tokens (so called mints). This is significantly different from ERC-20 on Ethereum, because a single smart contract that is part of Solana’s core functionality and as such is open source, is responsible for all the tokens. This ensures a high uniformity across tokens at the cost of flexibility.
4. Blockchain Scalability: With its intended capacity for processing a lot of transactions per second and in most cases low fees, Solana is intended to enable efficient token transactions, maintaining high performance even during peak network usage.
Security Protocols for Asset Custody and Transactions:
1. Private Key Management: To safeguard their token holdings, users must securely store their wallet’s private keys and recovery phrases.
2. Cryptographic Integrity: Solana employs elliptic curve cryptography to validate and execute transactions securely, intended to ensure the integrity of all transfers.
H.4 Consensus mechanism
The crypto-asset in scope is implemented on the Arbitrum, Avalanche C-Chain, Binance Smart Chain, Ethereum, Fantom, Gnosis Chain, Optimism, Polygon, and Solana networks, following the standards described below.
The following applies to Arbitrum:
Arbitrum is a Layer-2 (L2) solution on Ethereum that is developed using the Arbitrum technology suite. L2 transactions do not have their own consensus mechanism and are only validated by the execution clients. The so-called sequencer regularly bundles stacks of L2 transactions and publishes them on the L1 network, i.e. Ethereum. Ethereum's consensus mechanism (Proof-of-Stake) thus indirectly secures all L2 transactions as soon as they are written to L1.
The following applies to Avalanche C-Chain:
The Avalanche blockchain network employs a unique Proof-of-Stake consensus mechanism called Avalanche Consensus, which involves three interconnected protocols: Snowball, Snowflake, and Avalanche.
Avalanche Consensus Process:
1. Snowball Protocol:
- Random Sampling: Each validator randomly samples a small, constant-sized subset of other validators.
- Repeated Polling: Validators repeatedly poll the sampled validators to determine the preferred transaction.
- Confidence Counters: Validators maintain confidence counters for each transaction, incrementing them each time a sampled validator supports their preferred transaction.
- Decision Threshold: Once the confidence counter exceeds a pre-defined threshold, the transaction is considered accepted.
2. Snowflake Protocol:
- Binary Decision: Enhances the Snowball protocol by incorporating a binary decision process. Validators decide between two conflicting transactions.
- Binary Confidence: Confidence counters are used to track the preferred binary decision.
- Finality: When a binary decision reaches a certain confidence level, it becomes final.
3. Avalanche Protocol:
- DAG Structure: Uses a Directed Acyclic Graph (DAG) structure to organize transactions, allowing for parallel processing and higher throughput.
- Transaction Ordering: Transactions are added to the DAG based on their dependencies, ensuring a consistent order.
- Consensus on DAG: While most Proof-of-Stake Protocols use a Byzantine Fault Tolerant (BFT) consensus, Avalanche uses the Avalanche Consensus, Validators reach consensus on the structure and contents of the DAG through repeated Snowball and Snowflake.
The following applies to Binance Smart Chain:
Binance Smart Chain (BSC) uses a hybrid consensus mechanism called Proof of Staked Authority (PoSA), which combines elements of Delegated Proof of Stake (DPoS) and Proof of Authority (PoA). This method ensures fast block times and low fees while maintaining a level of decentralization and security.
Core Components
1. Validators (so-called “Cabinet Members”): Validators on BSC are responsible for producing new blocks, validating transactions, and maintaining the network’s security. To become a validator, an entity must stake a significant amount of BNB (Binance Coin). Validators are selected through staking and voting by token holders. There are 21 active validators at any given time, rotating to ensure decentralization and security.
2. Delegators: Token holders who do not wish to run validator nodes can delegate their BNB tokens to validators. This delegation helps validators increase their stake and improves their chances of being selected to produce blocks. Delegators earn a share of the rewards that validators receive, incentivizing broad participation in network security.
3. Candidates: Candidates are nodes that have staked the required amount of BNB and are in the pool waiting to become validators. They are essentially potential validators who are not currently active but can be elected to the validator set through community voting. Candidates play a crucial role in ensuring there is always a sufficient pool of nodes ready to take on validation tasks, thus maintaining network resilience and decentralization.
Consensus Process
4. Validator Selection: Validators are chosen based on the amount of BNB staked and votes received from delegators. The more BNB staked and votes received, the higher the chance of being selected to validate transactions and produce new blocks. The selection process involves both the current validators and the pool of candidates, ensuring a dynamic and secure rotation of nodes.
5. Block Production: The selected validators take turns producing blocks in a PoA-like manner, ensuring that blocks are generated quickly and efficiently. Validators validate transactions, add them to new blocks, and broadcast these blocks to the network.
6. Transaction Finality: BSC achieves fast block times of around 3 seconds and quick transaction finality. This is achieved through the efficient PoSA mechanism that allows validators to rapidly reach consensus. Security and Economic Incentives
7. Staking: Validators are required to stake a substantial amount of BNB, which acts as collateral to ensure their honest behavior. This staked amount can be slashed if validators act maliciously. Staking incentivizes validators to act in the network's best interest to avoid losing their staked BNB.
8. Delegation and Rewards: Delegators earn rewards proportional to their stake in validators. This incentivizes them to choose reliable validators and participate in the network’s security. Validators and delegators share transaction fees as rewards, which provides continuous economic incentives to maintain network security and performance.
9. Transaction Fees: BSC employs low transaction fees, paid in BNB, making it cost-effective for users. These fees are collected by validators as part of their rewards, further incentivizing them to validate transactions accurately and efficiently.
The following applies to Ethereum:
The crypto-asset's Proof-of-Stake (PoS) consensus mechanism, introduced with The Merge in 2022, replaces mining with validator staking. Validators must stake at least 32 ETH every block a validator is randomly chosen to propose the next block. Once proposed the other validators verify the blocks integrity. The network operates on a slot and epoch system, where a new block is proposed every 12 seconds, and finalization occurs after two epochs (~12.8 minutes) using Casper-FFG. The Beacon Chain coordinates validators, while the fork-choice rule (LMD-GHOST) ensures the chain follows the heaviest accumulated validator votes. Validators earn rewards for proposing and verifying blocks, but face slashing for malicious behavior or inactivity. PoS aims to improve energy efficiency, security, and scalability, with future upgrades like Proto-Danksharding enhancing transaction efficiency.
The following applies to Fantom:
Fantom utilizes the asynchronous Byzantine Fault Tolerance (aBFT) Lachesis protocol, enabling near-instant finality and minimal latency.
The following applies to Gnosis Chain:
Gnosis operates with a Proof-of-Stake (PoS) consensus mechanism, where validators secure the network by staking GNO tokens and participating in block production.
The following applies to Optimism:
Since Optimism is based on Ethereum, it ultimately inherits its security via the Ethereum blockchain and the proof-of-stake consensus. Within the rollup system, Optimism relies on a “fault proof” procedure. By default, transactions are assumed to be correct (“optimistic”). Only in the event of suspected faults is a fault proof initiated, in which incorrect transactions can be challenged by challengers. This model allows for high efficiency while ensuring correctness.
The following applies to Polygon:
Polygon is a scaling solution for Ethereum that stores and process transaction data on its own separate chain and regularly submits checkpoints to Ethereum. This type of scaling solution is sometimes referred to as a plasma chain, and is distinct from sidechains, which don’t store checkpoints and Layer 2 solutions that store all transaction data on Ethereum in addition to the checkpoints. Here’s a detailed explanation of how Polygon achieves consensus: Core Concepts 1. Proof of Stake (PoS): Validator Selection: Validators on the Polygon network are selected based on the number of POL tokens they have staked. The more tokens are staked, the higher the chance of being selected to validate transactions and produce new blocks. Delegation: Token holders who do not wish to run a validator node can delegate their POL tokens to validators. Delegated tokens also count towards the block production chance of the validator they are delegated to. Delegators receive a share of rewards earned by validators. Consensus Process 2. Transaction Validation: Transactions are first validated by validators who have staked POL tokens. These validators confirm the validity of transactions and include them in blocks. 3. Block Production: Proposing and Voting: Validators are randomly selected to propose new blocks. Their selection chance is proportional to their staked tokens. Validators also participate in a voting process to reach consensus on the next block. The block with most votes is added to the blockchain. Checkpointing: Polygon uses periodic checkpointing, where a cryptographic summary of the transactions on the Polygon chain is submitted to the Ethereum main chain. This process ensures the security and finality of transactions on the Polygon network.
The following applies to Solana:
Solana uses a combination of Proof of History (PoH) and Proof of Stake (PoS). The core concepts of the mechanism are intended to work as follows:
Core Concepts
1. Proof of History (PoH):
Time-Stamped Transactions: PoH is a cryptographic technique that timestamps transactions, intended to creating a historical record that proves that an event has occurred at a specific moment in time.
Verifiable Delay Function: PoH uses a Verifiable Delay Function (VDF) to generate a unique hash that includes the transaction and the time it was processed. This sequence of hashes provides a verifiable order of events, intended to enabling the network to efficiently agree on the sequence of transactions.
2. Proof of Stake (PoS):
Validator Selection: Validators are chosen to produce new blocks based on the number of SOL tokens they have staked. The more tokens staked, the higher the chance of being
selected to validate transactions and produce new blocks.
Delegation: Token holders can delegate their SOL tokens to validators, earning rewards proportional to their stake while intended to enhancing the network's security.
Consensus Process
1. Transaction Validation:
Transactions are broadcasted to the network and collected by validators. Each transaction is validated to ensure it meets the network’s criteria, such as having correct signatures and sufficient funds.
2. PoH Sequence Generation:
A validator generates a sequence of hashes using PoH, each containing a timestamp and the previous hash. This process creates a historical record of transactions, establishing a
cryptographic clock for the network.
3. Block Production:
The network uses PoS to select a leader validator based on their stake. The leader is responsible for bundling the validated transactions into a block. The leader validator uses the PoH sequence to order transactions within the block, ensuring that all transactions are processed in the correct order.
4. Consensus and Finalization:
Other validators verify the block produced by the leader validator. They check the correctness of the PoH sequence and validate the transactions within the block. Once the block is verified, it is added to the blockchain. Validators sign off on the block, and it is considered finalized.
Security and Economic Incentives
1. Incentives for Validators:
Block Rewards: Validators earn rewards for producing and validating blocks. These rewards are distributed in SOL tokens and are proportional to the validator’s stake and performance.
Transaction Fees: Validators also earn transaction fees from the transactions included in the blocks they produce. These fees provide an additional incentive for validators to process transactions efficiently.
2. Security:
Staking: Validators must stake SOL tokens to participate in the consensus process. This staking acts as collateral, incentivizing validators to act honestly. If a validator behaves maliciously or fails to perform, they risk losing their staked tokens.
Delegated Staking: Token holders can delegate their SOL tokens to validators, intended to enhance network security and decentralization. Delegators share in the rewards and are incentivized to choose reliable validators.
3. Economic Penalties:
Slashing: Validators can be penalized for malicious behavior, such as double-signing or producing invalid blocks. This penalty, known as slashing, results in the loss of a portion of the staked tokens, discouraging dishonest actions.
H.5 Incentive mechanisms and applicable fees
The crypto-asset in scope is implemented on the Arbitrum, Avalanche C-Chain, Binance Smart Chain, Ethereum, Fantom, Gnosis Chain, Optimism, Polygon, and Solana networks, following the standards described below.
The following applies to Arbitrum:
Arbitrum is a Layer-2 (L2) solution on Ethereum that is developed using the Arbitrum technology suite. Transaction on Arbitrum are bundled by a, so called, sequencer and the result is regularly submitted as an Layer-1 (L1) transactions. This way many L2 transactions get combined into a single L1 transaction. This lowers the average transaction cost per transaction, because many L2 transactions together fund the transaction cost for the single L1 transaction. This creates incentives to use Arbitrum rather than the L1, i.e. Ethereum, itself. To get crypto-assets in and out of Arbitrum, a special smart contract on Ethereum is used. Since there is no consensus mechanism on L2 an additional mechanism ensures that only existing funds can be withdrawn from L2. When a user wants to withdraw funds, that user needs to submit a withdrawal request on L1. If this request remains undisputed for a period of time the funds can be withdrawn. During this time period Arbitrum validators can dispute the claim, which will start a dispute resolution process. This process is designed with economic incentives for correct behavior of all participants.
The following applies to Avalanche C-Chain:
Avalanche uses a consensus mechanism known as Avalanche Consensus, which relies on a combination of validators, staking, and a novel approach to consensus to ensure the network's security and integrity.
1. Validators:
- Staking: Validators on the Avalanche network are required to stake AVAX tokens. The amount staked influences their probability of being selected to propose or validate new blocks.
- Rewards: Validators earn rewards for their participation in the consensus process. These rewards are proportional to the amount of AVAX staked and their uptime and performance in validating transactions.
- Delegation: Validators can also accept delegations from other token holders. Delegators share in the rewards based on the amount they delegate, which incentivizes smaller holders to participate indirectly in securing the network.
2. Economic Incentives:
- Block Rewards: Validators receive block rewards for proposing and validating blocks. These rewards are distributed from the network’s inflationary issuance of AVAX tokens.
- Transaction Fees: Validators also earn a portion of the transaction fees paid by users. This includes fees for simple transactions, smart contract interactions, and the creation of new assets on the network.
3. Penalties:
- Slashing: Unlike some other PoS systems, Avalanche does not employ slashing (i.e., the confiscation of staked tokens) as a penalty for misbehavior.Instead, the network relies on the financial disincentive of lost future rewards for validators who are not consistently online or act maliciously.
- Uptime Requirements: Validators must maintain a high level of uptime and correctly validate transactions to continue earning rewards. Poor performance or malicious actions result in missed rewards, providing a strong economic incentive to act honestly.
Fees on the Avalanche Blockchain
1. Transaction Fees:
- Dynamic Fees: Transaction fees on Avalanche are dynamic, varying based on network demand and the complexity of the transactions. This ensures that fees remain fair and proportional to the network's usage.
- Fee Burning: A portion of the transaction fees is burned, permanently removing them from circulation. This deflationary mechanism helps to balance the inflation from block rewards and incentivizes token holders by potentially increasing the value of AVAX over time.
2. Smart Contract Fees:
- Execution Costs: Fees for deploying and interacting with smart contracts are determined by the computational resources required. These fees ensure that the network remains efficient and that resources are used responsibly.
3. Asset Creation Fees:
- New Asset Creation: There are fees associated with creating new assets (tokens) on the Avalanche network. These fees help to prevent spam and ensure that only serious projects use the network's resources.
The following applies to Binance Smart Chain:
Binance Smart Chain (BSC) uses the Proof of Staked Authority (PoSA) consensus mechanism to ensure network security and incentivize participation from validators and delegators.
Incentive Mechanisms
1. Validators: Staking Rewards: Validators must stake a significant amount of BNB to participate in the consensus process. They earn rewards in the form of transaction fees and block rewards. Selection Process: Validators are selected based on the amount of BNB staked and the votes received from delegators. The more BNB staked and votes received, the higher the chances of being selected to validate transactions and produce new blocks.
2. Delegators: Delegated Staking: Token holders can delegate their BNB to validators. This delegation increases the validator's total stake and improves their chances of being selected to produce blocks. Shared Rewards: Delegators earn a portion of the rewards that validators receive. This incentivizes token holders to participate in the network’s security and decentralization by choosing reliable validators.
3. Candidates: Pool of Potential Validators: Candidates are nodes that have staked the required amount of BNB and are waiting to become active validators. They ensure that there is always a sufficient pool of nodes ready to take on validation tasks, maintaining network resilience.
4. Economic Security: Slashing: Validators can be penalized for malicious behavior or failure to perform their duties. Penalties include slashing a portion of their staked tokens, ensuring that validators act in the best interest of the network. Opportunity Cost: Staking requires validators and delegators to lock up their BNB tokens, providing an economic incentive to act honestly to avoid losing their staked assets. Fees on the Binance Smart Chain
5. Transaction Fees: Low Fees: BSC is known for its low transaction fees compared to other blockchain networks. These fees are paid in BNB and are essential for maintaining network operations and compensating validators. Dynamic Fee Structure: Transaction fees can vary based on network congestion and the complexity of the transactions. However, BSC ensures that fees remain significantly lower than those on the Ethereum mainnet.
6. Block Rewards: Incentivizing Validators: Validators earn block rewards in addition to transaction fees. These rewards are distributed to validators for their role in maintaining the network and processing transactions.
7. Cross-Chain Fees: Interoperability Costs: BSC supports cross-chain compatibility, allowing assets to be transferred between Binance Chain and Binance Smart Chain. These cross-chain operations incur minimal fees, facilitating seamless asset transfers and improving user experience.
8. Smart Contract Fees: Deployment and Execution Costs: Deploying and interacting with smart contracts on BSC involves paying fees based on the computational resources required. These fees are also paid in BNB and are designed to be cost-effective, encouraging developers to build on the BSC platform.
The following applies to Ethereum:
The crypto-asset's PoS system secures transactions through validator incentives and economic penalties. Validators stake at least 32 ETH and earn rewards for proposing blocks, attesting to valid ones, and participating in sync committees. Rewards are paid in newly issued ETH and transaction fees. Under EIP-1559, transaction fees consist of a base fee, which is burned to reduce supply, and an optional priority fee (tip) paid to validators. Validators face slashing if they act maliciously and incur penalties for inactivity. This system aims to increase security by aligning incentives while making the crypto-asset's fee structure more predictable and deflationary during high network activity.
The following applies to Fantom:
Fantom distributes FTM rewards to validators and delegators for staking. Transaction fees are low and partially burned to support long-term network sustainability.
The following applies to Gnosis Chain:
Validators on Gnosis earn GNO rewards for validating transactions and securing the network. Transaction fees are used to compensate for network resources and maintain stability.
The following applies to Optimism:
Optimism charges significantly lower transaction fees than Ethereum Layer 1, as transactions are bundled in the rollup and written to the Ethereum main chain in compressed form. Gas fees on Optimism continue to be paid in ETH.
The incentive model is based on increased efficiency for users (lower fees, faster confirmation) and on the role of sequencers. Sequencers are central actors who collect, organize, and include transactions in the rollup. Their revenue comes from the gas fees they charge. Fault proofs ensure that sequencers cannot permanently enforce incorrect or malicious transactions. Fault proofs and their resolution are also incentivized economically to discourage faults to begin with.
The following applies to Polygon:
Incentive Mechanisms 1. Validators: Staking Rewards: Validators on Polygon secure the network by staking POL tokens. Validators are rewarded for block production and block validation/voting. They earn rewards in the form of newly minted POL tokens and, when they produce blocks, some transaction fees. 2. Delegators: Delegation: Token holders who do not wish to run a validator node can delegate their POL tokens to trusted validators. Delegators earn a portion of the rewards earned by the validators, incentivizing them to choose reliable and performant validators. Validators profit from delegations, because their chance of being selected for block production and therefore the associated expected rewards increase. This system encourages widespread participation and enhances the network's decentralization. 3. Economic Security: Slashing: Validators can be penalized through a process called slashing if they engage in malicious behavior or fail to perform their duties correctly. This includes double-signing or going offline for extended periods. Slashing results in the loss of a portion of the staked tokens, acting as a strong deterrent against dishonest actions. Bond Requirements: Validators are required to bond a significant amount of POL tokens to participate in the consensus process, ensuring they have a vested interest in maintaining network security and integrity. Fees on the Polygon Blockchain 4. Transaction Fees: Low Fees: One of Polygon's main advantages is its low transaction fees compared to the Ethereum main chain. The fees are paid in POL tokens and are designed to be affordable to encourage high transaction throughput and user adoption. Dynamic Fees: Fees on Polygon can vary depending on network congestion and transaction complexity. However, they remain significantly lower than those on Ethereum, making Polygon an attractive option for users and developers. 5. Smart Contract Fees: Deployment and Execution Costs: Deploying and interacting with smart contracts on Polygon incurs fees based on the computational resources required. These fees are also paid in POL tokens and are much lower than on Ethereum, making it cost-effective for developers to build and maintain decentralized applications (dApps) on Polygon.
The following applies to Solana:
1. Validators:
Staking Rewards: Validators are chosen based on the number of SOL tokens they have staked. They earn rewards for producing and validating blocks, which are distributed in SOL. The more tokens staked, the higher the chances of being selected to validate transactions and produce new blocks.
Transaction Fees: Validators earn a portion of the transaction fees paid by users for the transactions they include in the blocks. This is intended to provide an additional financial incentive for validators to process transactions efficiently and maintain the network's integrity.
2. Delegators:
Delegated Staking: Token holders who do not wish to run a validator node can delegate their SOL tokens to a validator. In return, delegators share the rewards earned by the validators. This is intended to encourage widespread participation in securing the network and ensures decentralization.
3. Economic Security:
Slashing: Validators can be penalized for malicious behavior, such as producing invalid blocks or being frequently offline. This penalty, known as slashing, involves the loss of a portion of their staked tokens. Slashing is intended to deter dishonest actions and ensures that validators act in the best interest of the network.
Opportunity Cost: By staking SOL tokens, validators and delegators lock up their tokens, which could otherwise be used or sold. This opportunity cost is intended to incentivize participants to act honestly to earn rewards and avoid penalties.
Fees Applicable on the Solana Blockchain
1. Transaction Fees:
Solana is designed to handle a high throughput of transactions, which is intended to keep the fees low and predictable.
Fee Structure: Fees are paid in SOL and are used to compensate validators for the resources they expend to process transactions. This includes computational power and network bandwidth.
2. Rent Fees:
State Storage: Solana charges so called ""rent fees"" for storing data on the blockchain. These fees are designed to discourage inefficient use of state storage and encourage developers to clean up unused state. Rent fees are intended to help maintain the efficiency and performance of the network.
3. Smart Contract Fees:
Execution Costs: Similar to transaction fees, fees for deploying and interacting with smart contracts on Solana are based on the computational resources required. This is intended to ensure that users are charged proportionally for the resources they consume.
H.6 Use of distributed ledger technology
H.7 DLT functionality description
Not applicable, as the DLT is not operated by the issuer, the offeror, the person seeking admission to trading, or any third-party acting on their behalf.
H.8 Audit
H.9 Audit outcome
Not applicable, as no comprehensive audit of the technology used has been conducted or can be confirmed.
Part I – Information on risks
I.1 Offer-related risks
1. Regulatory and Compliance
Regulatory frameworks applicable to crypto-asset services in the European Union and in third countries are evolving. Supervisory authorities may introduce, interpret, or enforce rules that affect (i) the eligibility of this crypto-asset for admission to trading, (ii) the conditions under which a crypto-asset service provider may offer trading, custody, or transfer services for it, or (iii) the persons or jurisdictions to which such services may be provided. As a result, the crypto-asset service provider admitting this crypto-asset to trading may be required to suspend, restrict, or terminate trading or withdrawals for regulatory reasons, even if the crypto-asset itself continues to function on its underlying network.
2. Trading venue and connection risk
Trading in the crypto-asset depends on the uninterrupted operation of the trading platform admitting it and, where applicable, on its technical connections to external liquidity sources or venues. Interruptions such as system downtime, maintenance, faulty integrations, API changes, or failures at an external venue can temporarily prevent order placement, execution, deposits, or withdrawals, even when the underlying blockchain is functioning. In addition, trading platforms in emerging markets may operate under differing governance, compliance, and oversight standards, which can increase the risk of operational failures or disorderly market conditions.
3. Market formation and liquidity conditions
The price and tradability of the crypto-asset depend on actual trading activity on the venues to which the service provider is connected, whether centralised exchanges (CEXs) or decentralised exchanges (DEXs). Trading volumes may at times be low, order books thin, or liquidity concentrated on a single venue. In such conditions, buy or sell orders may not be executed in full or may be executed only at a less favourable price, resulting in slippage.
Volatility: The market price of the crypto-asset may fluctuate significantly over short periods, including for reasons that are not linked to changes in the underlying project or protocol. Periods of limited liquidity, shifts in overall market sentiment, or trading on only a small number of CEXs or DEXs can amplify these movements and lead to higher slippage when orders are executed. As a result, investors may be unable to sell the crypto-asset at or close to a previously observed price, even though no negative project-specific event has occurred.
4. Counterparty and service-provider dependence
The admission of the crypto-asset to trading may rely on several external parties, such as connected centralised or decentralised trading venues, liquidity providers, brokers, custodians, or technical integrators. If any of these counterparties fail to perform, suspend their services, or apply internal restrictions, the trading, deposit, or withdrawal of the crypto-asset on the admitting service provider can be interrupted or halted.
Quality of counterparties: Trading venues and service providers in certain jurisdictions may operate under regulatory or supervisory standards that are lower or differently enforced than those applicable in the European Union. In such environments, deficiencies in governance, risk management, or compliance may remain undetected, which increases the probability of abrupt service interruptions, investigations, or forced wind-downs.
Delisting and service suspension: The crypto-asset’s availability may depend on the internal listing decisions of these counterparties. A delisting or suspension on a key connected venue can materially reduce liquidity or make trading temporarily impossible on the admitting service provider, even if the underlying crypto-asset continues to function.
Insolvency of counterparties: If a counterparty involved in holding, routing, or settling the crypto-asset becomes insolvent, enters restructuring, or is otherwise subject to resolution-type measures, assets held or processed by that counterparty may be frozen, become temporarily unavailable, or be recoverable only in part or not at all, which can result in losses for clients whose positions were maintained through that counterparty. This risk applies in particular where client assets are held on an omnibus basis or where segregation is not fully recognised in the counterparty’s jurisdiction.
5. Operational and information risks
Due to the irrevocability of blockchain transactions, incorrect approvals or the use of wrong networks or addresses will typically make the transferred funds irrecoverable. Because trading may also rely on technical connections to other venues or service providers, downtime or faulty code in these connections can temporarily block trading, deposits, or withdrawals even when the underlying blockchain is functioning. In addition, different groups of market participants may have unequal access to technical, governance, or project-related information, which can lead to information asymmetry and place less informed investors at a disadvantage when making trading decisions.
6. Market access and liquidity concentration risk
If the crypto-asset is only available on a limited number of trading platforms or through a single market-making entity, this may result in reduced liquidity, greater price volatility, or periods of inaccessibility for retail holders.
I.2 Issuer-related risks
1. Insolvency of the issuer
As with any commercial entity, the issuer may face insolvency risks. These may result from insufficient funding, low market interest, mismanagement, or external shocks (e.g. pandemics, wars). In such a case, ongoing development, support, and governance of the project may cease, potentially affecting the viability and tradability of the crypto-asset.
2. Legal and regulatory risks
The issuer operates in a dynamic and evolving regulatory environment. Failure to comply with applicable laws or regulations in relevant jurisdictions may result in enforcement actions, penalties, or restrictions on the project’s operations. These may negatively impact the crypto-asset’s availability, market acceptance, or legal status.
3. Operational risks
The issuer may fail to implement adequate internal controls, risk management, or governance processes. This can result in operational disruptions, financial losses, delays in updating the white paper, or reputational damage.
4. Governance and decision-making
The issuer’s management body is responsible for key strategic, operational, and disclosure decisions. Ineffective governance, delays in decision-making, or lack of resources may compromise the stability of the project and its compliance with MiCA requirements. High concentration of decision-making authority or changes in ownership/control can amplify these risks.
5. Reputational risks
The issuer’s reputation may be harmed by internal failures, external accusations, or association with illicit activity. Negative publicity can reduce trust in the issuer and impact the perceived legitimacy or value of the crypto-asset.
6. Counterparty dependence
The issuer may depend on third-party providers for certain core functions, such as technology development, marketing, legal advice, or infrastructure. If these partners discontinue their services, change ownership, or underperform, the issuer’s ability to operate the project or maintain investor communication may be impaired. This could disrupt project continuity or undermine market confidence, ultimately affecting the crypto-asset’s value.
I.3 Crypto-assets-related risks
1. Valuation risk
The crypto-asset does not represent a claim, nor is it backed by physical assets or legal entitlements. Its market value is driven solely by supply and demand dynamics and may fluctuate significantly. In the absence of fundamental value anchors, such assets can lose their entire market value within a very short time. Historical market behaviour has shown that some types of crypto-assets – such as meme coins or purely speculative tokens – have become worthless. Investors should be aware that this crypto-asset may lose all of its value.
2. Market volatility risk
Crypto-asset prices can fluctuate sharply due to changes in market sentiment, macroeconomic conditions, regulatory developments, or technology trends. Such volatility may result in rapid and significant losses. Holders should be prepared for the possibility of losing the full amount invested.
3. Liquidity and price-determination risk
Low trading volumes, fragmented trading across venues, or the absence of active market makers can restrict the ability to buy or sell the crypto-asset. In such situations, it is not guaranteed that an observable market price will exist at all times. Spreads may widen materially, and orders may only be executable under unfavourable conditions, which can make liquidation costly or temporarily impossible.
4. Asset security risk
Loss or theft of private keys, unauthorised access to wallets, or failures of custodial or exchange service providers can result in the irreversible loss of assets. Because blockchain transactions are final, recovery of funds after a compromise is generally impossible.
5. Fraud and scam risk
The pseudonymous and irreversible nature of blockchain transactions can attract fraudulent schemes. Typical forms include fake or unauthorised crypto-assets imitating established ones, phishing attempts, deceptive airdrops, or social-engineering attacks. Investors should exercise caution and verify the authenticity of counterparties and information sources.
6. Legal and regulatory reclassification risk
Legislative or regulatory changes in the European Union or in the Member State where the crypto-asset is admitted to trading may alter its legal classification, permitted uses, or tradability. In third countries, the crypto-asset may be treated as a financial instrument or security, which can restrict its offering, trading, or custody.
7. Absence of investor protection
The crypto-asset is not covered by investor-compensation or deposit-guarantee schemes. In the event of loss, fraud, or insolvency of a service provider, holders may have no access to recourse mechanisms typically available in regulated financial markets.
8. Counterparty risk
Reliance on third-party exchanges, custodians, or intermediaries exposes holders to operational failures, insolvency, or fraud of these parties. Investors should conduct due diligence on service providers, as their failure may lead to the partial or total loss of held assets.
9. Reputational risk
Negative publicity related to security incidents, misuse of blockchain technology, or associations with illicit activity can damage public confidence and reduce the crypto-asset’s market value.
10. Community and sentiment risk
Because the crypto-asset’s perceived relevance and expected future use depend largely on community engagement and the prevailing sentiment, a loss of public interest, negative coverage or reduced activity of key contributors can materially reduce market demand.
11. Macroeconomic and interest-rate risk
Fluctuations in interest rates, exchange rates, general market conditions, or overall market volatility can influence investor sentiment towards digital assets and affect the crypto-asset’s market value.
12. Taxation risk
Tax treatment varies across jurisdictions. Holders are individually responsible for complying with all applicable tax laws, including the reporting and payment of taxes arising from the acquisition, holding, or disposal of the crypto-asset.
13. Anti-money-laundering and counter-terrorist-financing risk
Wallet addresses or transactions connected to the crypto-asset may be linked to sanctioned or illicit activity. Regulatory responses to such findings may include transfer restrictions, report obligations, or the freezing of assets on certain venues.
14. Market-abuse risk
Due to limited oversight and transparency, crypto-assets may be vulnerable to market-abuse practices such as spoofing, pump-and-dump schemes, or insider trading. Such activities can distort prices and expose holders to sudden losses.
15. Legal ownership and jurisdictional risk
Depending on the applicable law, holders of the crypto-asset may not have enforceable ownership rights or effective legal remedies in cases of disputes, fraud, or service failure. In certain jurisdictions, access to exchanges or interfaces may be restricted by regulatory measures, even if on-chain transfer remains technically possible.
16. Concentration risk
A large proportion of the total supply may be held by a small number of holders. This can enable market manipulation, governance dominance, or sudden large-scale liquidations that adversely affect market stability, price levels, and investor confidence.
I.4 Project implementation-related risks
As this white paper relates to the admission to trading of the crypto-asset, the following risk description reflects general implementation risks on the crypto-asset service provider's side typically associated with crypto-asset projects. The party admitting the asset to trading is not involved in the project’s implementation and does not assume responsibility for its governance, funding, or execution.
Delays, failures, or changes in the implementation of the project as outlined in its public roadmap or technical documentation may negatively impact the perceived credibility or usability of the crypto-asset. This includes risks related to project governance, resource allocation, technical delivery, and team continuity.
Key-person risk: The project may rely on a limited number of individuals for development, maintenance, or strategic direction. The departure, incapacity, or misalignment of these individuals may delay or derail the implementation.
Timeline and milestone risk: Project milestones may not be met as announced. Delays in feature releases, protocol upgrades, or external integrations can undermine market confidence and affect the adoption, use, or value of the crypto-asset.
Delivery risk: Even if implemented on time, certain functionalities or integrations may not perform as intended or may be scaled back during execution, limiting the token’s practical utility.
I.5 Technology-related risks
As this white paper relates to the admission to trading of the crypto-asset, the following risks concern the underlying distributed ledger technology (DLT), its supporting infrastructure, and related technical dependencies. Failures or vulnerabilities in these systems may affect the availability, integrity, or transferability of the crypto-asset.
1. Blockchain dependency risk
The functionality of the crypto-asset depends on the continuous and stable operation of the blockchain(s) on which it is issued. Network congestion, outages, or protocol errors may temporarily or permanently disrupt on-chain transactions. Extended downtime or degradation in network performance can affect trading, settlement, or usability of the crypto-asset.
2. Smart contract vulnerability risk
The smart contract that defines the crypto-asset’s parameters or governs its transfers may contain coding errors or security vulnerabilities. Exploitation of such weaknesses can result in unintended token minting, permanent loss of funds, or disruption of token functionality. Even after external audits, undetected vulnerabilities may persist due to the immutable nature of deployed code.
3. Wallet and key-management risk
The custody of crypto-assets relies on secure private key management. Loss, theft, or compromise of private keys results in irreversible loss of access. Custodians, trading venues, or wallet providers may be targeted by cyberattacks. Compatibility issues between wallet software and changes to the blockchain protocol (e.g. network upgrades) can further limit user access or the ability to transfer the crypto-asset.
Outdated or vulnerable wallet software:
Users relying on outdated, unaudited, or unsupported wallet software may face compatibility issues, security vulnerabilities, or failures when interacting with the blockchain. Failure to update wallet software in line with protocol developments can result in transaction errors, loss of access, or exposure to known exploits.
4. Network security risks
Attack Risks: Blockchains may be subject to denial-of-service (DoS) attacks, 51% attacks, or other exploits targeting the consensus mechanism. These can delay transactions, compromise finality, or disrupt the accurate recording of transfers.
Centralisation Concerns: Despite claims of decentralisation, a relatively small number of validators or a high concentration of stake may increase the risk of collusion, censorship, or coordinated network downtime, which can affect the resilience and operational reliability of the crypto-asset.
5. Bridge and interoperability risk
Where tokens can be bridged or wrapped across multiple blockchains, vulnerabilities in bridge protocols, validator sets, or locking mechanisms may result in loss, duplication, or misrepresentation of assets. Exploits or technical failures in these systems can instantly impact circulating supply, ownership claims, or token fungibility across chains.
6. Forking and protocol-upgrade risk
Network upgrades or disagreements among node operators or validators can result in blockchain “forks”, where the blockchain splits into two or more incompatible versions that continue separately from a shared past. This may lead to duplicate token representations or incompatibilities between exchanges and wallets. Until consensus stabilises, trading or transfers may be disrupted or misaligned. Such situations may be difficult for retail holders to navigate, particularly when trading platforms or wallets display inconsistent token information.
7. Economic-layer and abstraction risk
Mechanisms such as gas relayers, wrapped tokens, or synthetic representations may alter the transaction economics of the underlying token. Changes in transaction costs, token demand, or utility may reduce its usage and weaken both its economic function and perceived value within its ecosystem.
8. Spam and network-efficiency risk
High volumes of low-value (“dust”) or automated transactions may congest the network, slow validation times, inflate ledger size, and raise transaction costs. This can impair performance, reduce throughput, and expose address patterns to analysis, thereby reducing network efficiency and privacy.
9. Front-end and access-interface risk
If users rely on centralised web interfaces or hosted wallets to interact with the blockchain, service outages, malicious compromises, or domain expiries affecting these interfaces may block access to the crypto-asset, even while the blockchain itself remains fully functional. Dependence on single web portals introduces a critical point of failure outside the DLT layer.
10. Decentralisation claim risk
While the technical infrastructure may appear distributed, the actual governance or economic control of the project may lie with a small set of actors. This disconnect between marketing claims and structural reality can lead to regulatory scrutiny, reputational damage, or legal uncertainty – especially if the project is presented as ‘community-governed’ without substantiation.
I.6 Mitigation measures
None.
Part J – Information on the sustainability indicators in relation to adverse impact on the climate and other environment-related adverse impacts
J.1 Adverse impacts on climate and other environment-related adverse impacts
S.1 Name
S.2 Relevant legal entity identifier
S.3 Name of the cryptoasset
S.4 Consensus Mechanism
The crypto-asset in scope is implemented on the Arbitrum, Avalanche C-Chain, Binance Smart Chain, Ethereum, Fantom, Gnosis Chain, Optimism, Polygon, and Solana networks, following the standards described below.
The following applies to Arbitrum:
Arbitrum is a Layer-2 (L2) solution on Ethereum that is developed using the Arbitrum technology suite. L2 transactions do not have their own consensus mechanism and are only validated by the execution clients. The so-called sequencer regularly bundles stacks of L2 transactions and publishes them on the L1 network, i.e. Ethereum. Ethereum's consensus mechanism (Proof-of-Stake) thus indirectly secures all L2 transactions as soon as they are written to L1.
The following applies to Avalanche C-Chain:
The Avalanche blockchain network employs a unique Proof-of-Stake consensus mechanism called Avalanche Consensus, which involves three interconnected protocols: Snowball, Snowflake, and Avalanche.
Avalanche Consensus Process:
1. Snowball Protocol:
- Random Sampling: Each validator randomly samples a small, constant-sized subset of other validators.
- Repeated Polling: Validators repeatedly poll the sampled validators to determine the preferred transaction.
- Confidence Counters: Validators maintain confidence counters for each transaction, incrementing them each time a sampled validator supports their preferred transaction.
- Decision Threshold: Once the confidence counter exceeds a pre-defined threshold, the transaction is considered accepted.
2. Snowflake Protocol:
- Binary Decision: Enhances the Snowball protocol by incorporating a binary decision process. Validators decide between two conflicting transactions.
- Binary Confidence: Confidence counters are used to track the preferred binary decision.
- Finality: When a binary decision reaches a certain confidence level, it becomes final.
3. Avalanche Protocol:
- DAG Structure: Uses a Directed Acyclic Graph (DAG) structure to organize transactions, allowing for parallel processing and higher throughput.
- Transaction Ordering: Transactions are added to the DAG based on their dependencies, ensuring a consistent order.
- Consensus on DAG: While most Proof-of-Stake Protocols use a Byzantine Fault Tolerant (BFT) consensus, Avalanche uses the Avalanche Consensus, Validators reach consensus on the structure and contents of the DAG through repeated Snowball and Snowflake.
The following applies to Binance Smart Chain:
Binance Smart Chain (BSC) uses a hybrid consensus mechanism called Proof of Staked Authority (PoSA), which combines elements of Delegated Proof of Stake (DPoS) and Proof of Authority (PoA). This method ensures fast block times and low fees while maintaining a level of decentralization and security.
Core Components
1. Validators (so-called “Cabinet Members”): Validators on BSC are responsible for producing new blocks, validating transactions, and maintaining the network’s security. To become a validator, an entity must stake a significant amount of BNB (Binance Coin). Validators are selected through staking and voting by token holders. There are 21 active validators at any given time, rotating to ensure decentralization and security.
2. Delegators: Token holders who do not wish to run validator nodes can delegate their BNB tokens to validators. This delegation helps validators increase their stake and improves their chances of being selected to produce blocks. Delegators earn a share of the rewards that validators receive, incentivizing broad participation in network security.
3. Candidates: Candidates are nodes that have staked the required amount of BNB and are in the pool waiting to become validators. They are essentially potential validators who are not currently active but can be elected to the validator set through community voting. Candidates play a crucial role in ensuring there is always a sufficient pool of nodes ready to take on validation tasks, thus maintaining network resilience and decentralization.
Consensus Process
4. Validator Selection: Validators are chosen based on the amount of BNB staked and votes received from delegators. The more BNB staked and votes received, the higher the chance of being selected to validate transactions and produce new blocks. The selection process involves both the current validators and the pool of candidates, ensuring a dynamic and secure rotation of nodes.
5. Block Production: The selected validators take turns producing blocks in a PoA-like manner, ensuring that blocks are generated quickly and efficiently. Validators validate transactions, add them to new blocks, and broadcast these blocks to the network.
6. Transaction Finality: BSC achieves fast block times of around 3 seconds and quick transaction finality. This is achieved through the efficient PoSA mechanism that allows validators to rapidly reach consensus. Security and Economic Incentives
7. Staking: Validators are required to stake a substantial amount of BNB, which acts as collateral to ensure their honest behavior. This staked amount can be slashed if validators act maliciously. Staking incentivizes validators to act in the network's best interest to avoid losing their staked BNB.
8. Delegation and Rewards: Delegators earn rewards proportional to their stake in validators. This incentivizes them to choose reliable validators and participate in the network’s security. Validators and delegators share transaction fees as rewards, which provides continuous economic incentives to maintain network security and performance.
9. Transaction Fees: BSC employs low transaction fees, paid in BNB, making it cost-effective for users. These fees are collected by validators as part of their rewards, further incentivizing them to validate transactions accurately and efficiently.
The following applies to Ethereum:
The crypto-asset's Proof-of-Stake (PoS) consensus mechanism, introduced with The Merge in 2022, replaces mining with validator staking. Validators must stake at least 32 ETH every block a validator is randomly chosen to propose the next block. Once proposed the other validators verify the blocks integrity. The network operates on a slot and epoch system, where a new block is proposed every 12 seconds, and finalization occurs after two epochs (~12.8 minutes) using Casper-FFG. The Beacon Chain coordinates validators, while the fork-choice rule (LMD-GHOST) ensures the chain follows the heaviest accumulated validator votes. Validators earn rewards for proposing and verifying blocks, but face slashing for malicious behavior or inactivity. PoS aims to improve energy efficiency, security, and scalability, with future upgrades like Proto-Danksharding enhancing transaction efficiency.
The following applies to Fantom:
Fantom utilizes the asynchronous Byzantine Fault Tolerance (aBFT) Lachesis protocol, enabling near-instant finality and minimal latency.
The following applies to Gnosis Chain:
Gnosis operates with a Proof-of-Stake (PoS) consensus mechanism, where validators secure the network by staking GNO tokens and participating in block production.
The following applies to Optimism:
Since Optimism is based on Ethereum, it ultimately inherits its security via the Ethereum blockchain and the proof-of-stake consensus. Within the rollup system, Optimism relies on a “fault proof” procedure. By default, transactions are assumed to be correct (“optimistic”). Only in the event of suspected faults is a fault proof initiated, in which incorrect transactions can be challenged by challengers. This model allows for high efficiency while ensuring correctness.
The following applies to Polygon:
Polygon is a scaling solution for Ethereum that stores and process transaction data on its own separate chain and regularly submits checkpoints to Ethereum. This type of scaling solution is sometimes referred to as a plasma chain, and is distinct from sidechains, which don’t store checkpoints and Layer 2 solutions that store all transaction data on Ethereum in addition to the checkpoints. Here’s a detailed explanation of how Polygon achieves consensus: Core Concepts 1. Proof of Stake (PoS): Validator Selection: Validators on the Polygon network are selected based on the number of POL tokens they have staked. The more tokens are staked, the higher the chance of being selected to validate transactions and produce new blocks. Delegation: Token holders who do not wish to run a validator node can delegate their POL tokens to validators. Delegated tokens also count towards the block production chance of the validator they are delegated to. Delegators receive a share of rewards earned by validators. Consensus Process 2. Transaction Validation: Transactions are first validated by validators who have staked POL tokens. These validators confirm the validity of transactions and include them in blocks. 3. Block Production: Proposing and Voting: Validators are randomly selected to propose new blocks. Their selection chance is proportional to their staked tokens. Validators also participate in a voting process to reach consensus on the next block. The block with most votes is added to the blockchain. Checkpointing: Polygon uses periodic checkpointing, where a cryptographic summary of the transactions on the Polygon chain is submitted to the Ethereum main chain. This process ensures the security and finality of transactions on the Polygon network.
The following applies to Solana:
Solana uses a combination of Proof of History (PoH) and Proof of Stake (PoS). The core concepts of the mechanism are intended to work as follows:
Core Concepts
1. Proof of History (PoH):
Time-Stamped Transactions: PoH is a cryptographic technique that timestamps transactions, intended to creating a historical record that proves that an event has occurred at a specific moment in time.
Verifiable Delay Function: PoH uses a Verifiable Delay Function (VDF) to generate a unique hash that includes the transaction and the time it was processed. This sequence of hashes provides a verifiable order of events, intended to enabling the network to efficiently agree on the sequence of transactions.
2. Proof of Stake (PoS):
Validator Selection: Validators are chosen to produce new blocks based on the number of SOL tokens they have staked. The more tokens staked, the higher the chance of being
selected to validate transactions and produce new blocks.
Delegation: Token holders can delegate their SOL tokens to validators, earning rewards proportional to their stake while intended to enhancing the network's security.
Consensus Process
1. Transaction Validation:
Transactions are broadcasted to the network and collected by validators. Each transaction is validated to ensure it meets the network’s criteria, such as having correct signatures and sufficient funds.
2. PoH Sequence Generation:
A validator generates a sequence of hashes using PoH, each containing a timestamp and the previous hash. This process creates a historical record of transactions, establishing a
cryptographic clock for the network.
3. Block Production:
The network uses PoS to select a leader validator based on their stake. The leader is responsible for bundling the validated transactions into a block. The leader validator uses the PoH sequence to order transactions within the block, ensuring that all transactions are processed in the correct order.
4. Consensus and Finalization:
Other validators verify the block produced by the leader validator. They check the correctness of the PoH sequence and validate the transactions within the block. Once the block is verified, it is added to the blockchain. Validators sign off on the block, and it is considered finalized.
Security and Economic Incentives
1. Incentives for Validators:
Block Rewards: Validators earn rewards for producing and validating blocks. These rewards are distributed in SOL tokens and are proportional to the validator’s stake and performance.
Transaction Fees: Validators also earn transaction fees from the transactions included in the blocks they produce. These fees provide an additional incentive for validators to process transactions efficiently.
2. Security:
Staking: Validators must stake SOL tokens to participate in the consensus process. This staking acts as collateral, incentivizing validators to act honestly. If a validator behaves maliciously or fails to perform, they risk losing their staked tokens.
Delegated Staking: Token holders can delegate their SOL tokens to validators, intended to enhance network security and decentralization. Delegators share in the rewards and are incentivized to choose reliable validators.
3. Economic Penalties:
Slashing: Validators can be penalized for malicious behavior, such as double-signing or producing invalid blocks. This penalty, known as slashing, results in the loss of a portion of the staked tokens, discouraging dishonest actions.
S.5 Incentive Mechanisms and Applicable Fees
The crypto-asset in scope is implemented on the Arbitrum, Avalanche C-Chain, Binance Smart Chain, Ethereum, Fantom, Gnosis Chain, Optimism, Polygon, and Solana networks, following the standards described below.
The following applies to Arbitrum:
Arbitrum is a Layer-2 (L2) solution on Ethereum that is developed using the Arbitrum technology suite. Transaction on Arbitrum are bundled by a, so called, sequencer and the result is regularly submitted as an Layer-1 (L1) transactions. This way many L2 transactions get combined into a single L1 transaction. This lowers the average transaction cost per transaction, because many L2 transactions together fund the transaction cost for the single L1 transaction. This creates incentives to use Arbitrum rather than the L1, i.e. Ethereum, itself. To get crypto-assets in and out of Arbitrum, a special smart contract on Ethereum is used. Since there is no consensus mechanism on L2 an additional mechanism ensures that only existing funds can be withdrawn from L2. When a user wants to withdraw funds, that user needs to submit a withdrawal request on L1. If this request remains undisputed for a period of time the funds can be withdrawn. During this time period Arbitrum validators can dispute the claim, which will start a dispute resolution process. This process is designed with economic incentives for correct behavior of all participants.
The following applies to Avalanche C-Chain:
Avalanche uses a consensus mechanism known as Avalanche Consensus, which relies on a combination of validators, staking, and a novel approach to consensus to ensure the network's security and integrity.
1. Validators:
- Staking: Validators on the Avalanche network are required to stake AVAX tokens. The amount staked influences their probability of being selected to propose or validate new blocks.
- Rewards: Validators earn rewards for their participation in the consensus process. These rewards are proportional to the amount of AVAX staked and their uptime and performance in validating transactions.
- Delegation: Validators can also accept delegations from other token holders. Delegators share in the rewards based on the amount they delegate, which incentivizes smaller holders to participate indirectly in securing the network.
2. Economic Incentives:
- Block Rewards: Validators receive block rewards for proposing and validating blocks. These rewards are distributed from the network’s inflationary issuance of AVAX tokens.
- Transaction Fees: Validators also earn a portion of the transaction fees paid by users. This includes fees for simple transactions, smart contract interactions, and the creation of new assets on the network.
3. Penalties:
- Slashing: Unlike some other PoS systems, Avalanche does not employ slashing (i.e., the confiscation of staked tokens) as a penalty for misbehavior.Instead, the network relies on the financial disincentive of lost future rewards for validators who are not consistently online or act maliciously.
- Uptime Requirements: Validators must maintain a high level of uptime and correctly validate transactions to continue earning rewards. Poor performance or malicious actions result in missed rewards, providing a strong economic incentive to act honestly.
Fees on the Avalanche Blockchain
1. Transaction Fees:
- Dynamic Fees: Transaction fees on Avalanche are dynamic, varying based on network demand and the complexity of the transactions. This ensures that fees remain fair and proportional to the network's usage.
- Fee Burning: A portion of the transaction fees is burned, permanently removing them from circulation. This deflationary mechanism helps to balance the inflation from block rewards and incentivizes token holders by potentially increasing the value of AVAX over time.
2. Smart Contract Fees:
- Execution Costs: Fees for deploying and interacting with smart contracts are determined by the computational resources required. These fees ensure that the network remains efficient and that resources are used responsibly.
3. Asset Creation Fees:
- New Asset Creation: There are fees associated with creating new assets (tokens) on the Avalanche network. These fees help to prevent spam and ensure that only serious projects use the network's resources.
The following applies to Binance Smart Chain:
Binance Smart Chain (BSC) uses the Proof of Staked Authority (PoSA) consensus mechanism to ensure network security and incentivize participation from validators and delegators.
Incentive Mechanisms
1. Validators: Staking Rewards: Validators must stake a significant amount of BNB to participate in the consensus process. They earn rewards in the form of transaction fees and block rewards. Selection Process: Validators are selected based on the amount of BNB staked and the votes received from delegators. The more BNB staked and votes received, the higher the chances of being selected to validate transactions and produce new blocks.
2. Delegators: Delegated Staking: Token holders can delegate their BNB to validators. This delegation increases the validator's total stake and improves their chances of being selected to produce blocks. Shared Rewards: Delegators earn a portion of the rewards that validators receive. This incentivizes token holders to participate in the network’s security and decentralization by choosing reliable validators.
3. Candidates: Pool of Potential Validators: Candidates are nodes that have staked the required amount of BNB and are waiting to become active validators. They ensure that there is always a sufficient pool of nodes ready to take on validation tasks, maintaining network resilience.
4. Economic Security: Slashing: Validators can be penalized for malicious behavior or failure to perform their duties. Penalties include slashing a portion of their staked tokens, ensuring that validators act in the best interest of the network. Opportunity Cost: Staking requires validators and delegators to lock up their BNB tokens, providing an economic incentive to act honestly to avoid losing their staked assets. Fees on the Binance Smart Chain
5. Transaction Fees: Low Fees: BSC is known for its low transaction fees compared to other blockchain networks. These fees are paid in BNB and are essential for maintaining network operations and compensating validators. Dynamic Fee Structure: Transaction fees can vary based on network congestion and the complexity of the transactions. However, BSC ensures that fees remain significantly lower than those on the Ethereum mainnet.
6. Block Rewards: Incentivizing Validators: Validators earn block rewards in addition to transaction fees. These rewards are distributed to validators for their role in maintaining the network and processing transactions.
7. Cross-Chain Fees: Interoperability Costs: BSC supports cross-chain compatibility, allowing assets to be transferred between Binance Chain and Binance Smart Chain. These cross-chain operations incur minimal fees, facilitating seamless asset transfers and improving user experience.
8. Smart Contract Fees: Deployment and Execution Costs: Deploying and interacting with smart contracts on BSC involves paying fees based on the computational resources required. These fees are also paid in BNB and are designed to be cost-effective, encouraging developers to build on the BSC platform.
The following applies to Ethereum:
The crypto-asset's PoS system secures transactions through validator incentives and economic penalties. Validators stake at least 32 ETH and earn rewards for proposing blocks, attesting to valid ones, and participating in sync committees. Rewards are paid in newly issued ETH and transaction fees. Under EIP-1559, transaction fees consist of a base fee, which is burned to reduce supply, and an optional priority fee (tip) paid to validators. Validators face slashing if they act maliciously and incur penalties for inactivity. This system aims to increase security by aligning incentives while making the crypto-asset's fee structure more predictable and deflationary during high network activity.
The following applies to Fantom:
Fantom distributes FTM rewards to validators and delegators for staking. Transaction fees are low and partially burned to support long-term network sustainability.
The following applies to Gnosis Chain:
Validators on Gnosis earn GNO rewards for validating transactions and securing the network. Transaction fees are used to compensate for network resources and maintain stability.
The following applies to Optimism:
Optimism charges significantly lower transaction fees than Ethereum Layer 1, as transactions are bundled in the rollup and written to the Ethereum main chain in compressed form. Gas fees on Optimism continue to be paid in ETH.
The incentive model is based on increased efficiency for users (lower fees, faster confirmation) and on the role of sequencers. Sequencers are central actors who collect, organize, and include transactions in the rollup. Their revenue comes from the gas fees they charge. Fault proofs ensure that sequencers cannot permanently enforce incorrect or malicious transactions. Fault proofs and their resolution are also incentivized economically to discourage faults to begin with.
The following applies to Polygon:
Incentive Mechanisms 1. Validators: Staking Rewards: Validators on Polygon secure the network by staking POL tokens. Validators are rewarded for block production and block validation/voting. They earn rewards in the form of newly minted POL tokens and, when they produce blocks, some transaction fees. 2. Delegators: Delegation: Token holders who do not wish to run a validator node can delegate their POL tokens to trusted validators. Delegators earn a portion of the rewards earned by the validators, incentivizing them to choose reliable and performant validators. Validators profit from delegations, because their chance of being selected for block production and therefore the associated expected rewards increase. This system encourages widespread participation and enhances the network's decentralization. 3. Economic Security: Slashing: Validators can be penalized through a process called slashing if they engage in malicious behavior or fail to perform their duties correctly. This includes double-signing or going offline for extended periods. Slashing results in the loss of a portion of the staked tokens, acting as a strong deterrent against dishonest actions. Bond Requirements: Validators are required to bond a significant amount of POL tokens to participate in the consensus process, ensuring they have a vested interest in maintaining network security and integrity. Fees on the Polygon Blockchain 4. Transaction Fees: Low Fees: One of Polygon's main advantages is its low transaction fees compared to the Ethereum main chain. The fees are paid in POL tokens and are designed to be affordable to encourage high transaction throughput and user adoption. Dynamic Fees: Fees on Polygon can vary depending on network congestion and transaction complexity. However, they remain significantly lower than those on Ethereum, making Polygon an attractive option for users and developers. 5. Smart Contract Fees: Deployment and Execution Costs: Deploying and interacting with smart contracts on Polygon incurs fees based on the computational resources required. These fees are also paid in POL tokens and are much lower than on Ethereum, making it cost-effective for developers to build and maintain decentralized applications (dApps) on Polygon.
The following applies to Solana:
1. Validators:
Staking Rewards: Validators are chosen based on the number of SOL tokens they have staked. They earn rewards for producing and validating blocks, which are distributed in SOL. The more tokens staked, the higher the chances of being selected to validate transactions and produce new blocks.
Transaction Fees: Validators earn a portion of the transaction fees paid by users for the transactions they include in the blocks. This is intended to provide an additional financial incentive for validators to process transactions efficiently and maintain the network's integrity.
2. Delegators:
Delegated Staking: Token holders who do not wish to run a validator node can delegate their SOL tokens to a validator. In return, delegators share the rewards earned by the validators. This is intended to encourage widespread participation in securing the network and ensures decentralization.
3. Economic Security:
Slashing: Validators can be penalized for malicious behavior, such as producing invalid blocks or being frequently offline. This penalty, known as slashing, involves the loss of a portion of their staked tokens. Slashing is intended to deter dishonest actions and ensures that validators act in the best interest of the network.
Opportunity Cost: By staking SOL tokens, validators and delegators lock up their tokens, which could otherwise be used or sold. This opportunity cost is intended to incentivize participants to act honestly to earn rewards and avoid penalties.
Fees Applicable on the Solana Blockchain
1. Transaction Fees:
Solana is designed to handle a high throughput of transactions, which is intended to keep the fees low and predictable.
Fee Structure: Fees are paid in SOL and are used to compensate validators for the resources they expend to process transactions. This includes computational power and network bandwidth.
2. Rent Fees:
State Storage: Solana charges so called ""rent fees"" for storing data on the blockchain. These fees are designed to discourage inefficient use of state storage and encourage developers to clean up unused state. Rent fees are intended to help maintain the efficiency and performance of the network.
3. Smart Contract Fees:
Execution Costs: Similar to transaction fees, fees for deploying and interacting with smart contracts on Solana are based on the computational resources required. This is intended to ensure that users are charged proportionally for the resources they consume.
S.6 Beginning of the period to which the disclosure relates
S.7 End of the period to which the disclosure relates
S.8 Energy consumption
S.9 Energy consumption sources and methodologies
The energy consumption associated with this crypto-asset is aggregated of multiple contributing components, primarily the underlying blockchain network and the execution of token-specific operations. To determine the energy consumption of a token, the energy consumption of the underlying blockchain network Arbitrum, Avalanche C-Chain, Binance Smart Chain, Ethereum, Fantom, Gnosis Chain, Optimism, Polygon, and Solana is calculated first. A proportionate share of that energy use is then attributed to the token based on its activity level within the network (e.g. transaction volume, contract execution).
The Functionally Fungible Group Digital Token Identifier (FFG DTI) is used to determine all technically equivalent implementations of the crypto-asset in scope.
Estimates regarding hardware types, node distribution, and the number of network participants are based on informed assumptions, supported by best-effort verification against available empirical data. Unless robust evidence suggests otherwise, participants are assumed to act in an economically rational manner. In line with the precautionary principle, conservative estimates are applied where uncertainty exists – that is, estimates tend towards the higher end of potential environmental impact.
S.10 Renewable energy consumption
S.11 Energy intensity
S.12 Scope 1 DLT GHG emissions – Controlled
S.13 Scope 2 DLT GHG emissions – Purchased
S.14 GHG intensity
S.15 Key energy sources and methodologies
To determine the proportion of renewable energy usage, the locations of the nodes are to be determined using public information sites, open-source crawlers and crawlers developed in-house. If no information is available on the geographic distribution of the nodes, reference networks are used which are comparable in terms of their incentivization structure and consensus mechanism. This geo-information is merged with public information from Our World in Data, see citation. The intensity is calculated as the marginal energy cost wrt. one more transaction. Ember (2025); Energy Institute - Statistical Review of World Energy (2024) - with major processing by Our World in Data. “Share of electricity generated by renewables - Ember and Energy Institute” [dataset]. Ember, “Yearly Electricity Data Europe”; Ember, “Yearly Electricity Data”; Energy Institute, “Statistical Review of World Energy” [original data]. Retrieved from https://ourworldindata.org/grapher/share-electricity-renewables.
S.16 Key GHG sources and methodologies
To determine the GHG Emissions, the locations of the nodes are to be determined using public information sites, open-source crawlers and crawlers developed in-house. If no information is available on the geographic distribution of the nodes, reference networks are used which are comparable in terms of their incentivization structure and consensus mechanism. This geo-information is merged with public information from Our World in Data, see citation. The intensity is calculated as the marginal emission wrt. one more transaction. Ember (2025); Energy Institute - Statistical Review of World Energy (2024) - with major processing by Our World in Data. “Carbon intensity of electricity generation - Ember and Energy Institute” [dataset]. Ember, “Yearly Electricity Data Europe”; Ember, “Yearly Electricity Data”; Energy Institute, “Statistical Review of World Energy” [original data]. Retrieved from https://ourworldindata.org/grapher/carbon-intensity-electricity Licenced under CC BY 4.0.