The $ZAMA token is the native token of the @zama Protocol. It is used for protocol fees and staking. It follows a burn and mint model, where 100% of the fees are burnt and tokens are minted to reward operators. Fee model Deploying a confidential app on a supported chain is free and permissionless. Furthermore, the Zama Protocol does not charge for the FHE computation, instead charging for: Verifying ZKPoKs. Each time a user includes encrypted inputs in a transaction, they need to pay a fee to the Zama Protocol to verify it. Decrypting ciphertexts. When a user wants to decrypt a ciphertext, they need to pay a fee to the Zama Protocol. Bridging ciphertexts. When a user wants to bridge an encrypted value from one chain to another, it needs to request it from the Zama Protocol and pay a fee. The protocol fees can be paid by the end user, the frontend app or a relayer. As such, developers can create applications without their users ever needing to hold $ZAMA tokens directly.
- 0 replies
- 0 recasts
- 0 reactions
Good Morning - GM Do you want to make money? Easy money is here. In the age of A.I., everyone's chasing quick cash. But the real alpha in @zama_fhe isn’t the prize money—it’s the OG NFT. This NFT isn’t just a JPEG. - Passport to next airdrops, special channels & presales. - A long-time destination for real Passive Income. While Onchain Season heats up and new drops continue, be sure you don’t miss Zama’s last days of Season 2. You don’t need to be top 100. Quality content + engagement can still score you that NFT. Short-term rewards fade. Long-term positions change the game. #ZamaCreatorProgram
- 0 replies
- 0 recasts
- 0 reactions
Zama’s Vision for a Privacy Blockchain Layer Above All Else Here’s what I grokked from the litepaper: @zama is not creating another chain; it’s making a confidential layer that lives “above” existing chains (either L1 or L2), to enable smart contracts with privacy guarantees built-in. All data and inputs remain end-to-end encrypted; nobody (not even nodes) can see your raw values. What They Are Striving For & How It Works Private smart contracts: who have what predetermined by developers, making programmable access control possible. Interoperability: confidential and non-confidential contracts can interoperate seamlessly. Under the hood, Zama operates with a mixture of FHE (Fully Homomorphic Encryption), MPC (Multi-Party Computation), and ZK (Zero-Knowledge proofs). A host chain (such as Ethereum) only processes “pointers” or events, and the heavy encrypted computations are off-chain coprocessors. #ZamaCreatorProgram
- 0 replies
- 0 recasts
- 0 reactions