How Does UTONIC Work?
Last updated
Last updated
UTONIC empowers users to repurpose their staked TON, extending the TON Network’s security to additional applications. By reallocating staked assets, users can secure Actively Validated Services (AVS) within the UTONIC network while consenting to grant additional enforcement rights over their staked assets. This opt-in feature introduces supplementary slashing conditions tailored to the specific needs of validated services, such as data availability protocols, bridges, or oracles. These slashing conditions enforce participant integrity, ensuring the security of applications leveraging UTONIC is maintained.
UTONIC functions as a marketplace where developers can incentivize operators to allocate their restaked TON for securing their services. This represents a significant improvement over the traditional approach, where applications often need to issue highly inflationary tokens as rewards for validators and build a new trust network from the ground up. With UTONIC, developers can leverage on the security provided by restaked TON assets, drastically reducing the financial and time investment required compared to establishing a new trust network from scratch.