THORSwap Airdrop Review: Sustainable Liquidity Mining

by Cws Team
A+A-
Reset

About Block-mine.io

THORSwap Airdrop is a decentralised cross-chain liquidity protocol based on Tendermint & Cosmos-SDK and utilising Threshold Signature Schemes (TSS). It does not peg or wrap assets, it simply determines how to move them in response to user-actions.

THORChain observes incoming user deposits to vaults, executes business logic (swap, add/remove liquidity), and processes outbound transactions. THORChain is primarily a leaderless vault manager, ensuring that every stage of the process is byzantine-fault-tolerant.

THORSwap Airdrop key objective is to be resistant to centralisation and capture whilst facilitating cross-chain liquidity. THORChain only secures the assets in its vaults, and has economic guarantees that those assets are safe.

BasicDetails
Token NameTHORSwap Airdrop
PlatformRUNE
Total Value5% of the total supply
Airdrop EndN/A
KYCKYC Is Not requirement
WhitepaperClick Here To View
Max. ParticipantsUnlimited
Collect AirdropClick Here To Collect Free Airdrop

Block Title

First Step

THORSwap will airdrop 5% of the total supply to various early users of the platform.

Second step

THORName buyers, THORSwap traders and Liquidity providers, active Discord members and THORChain supporters and community members will be eligible for the airdrop.

Third Step

The snapshot details are yet to be announced.

Fourth Step

Follow their social channels to stay updated about the airdrop.

Fifth Step

Check out the airdrop announcement tweet from here.

RUNE

RUNE is the asset which powers the THORSwap Airdrop ecosystem and provides the economic incentives required to secure the network. RUNE has four key roles which are described below.

  1. Liquidity (as a settlement asset)
  2. Security (as a sybil-resistant mechanism, and a means for driving economic behaviour)
  3. Governance (signalling priority on-chain)
  4. Incentives (paying out rewards, charging fees, subsidising gas)

THORNodes

THORNodes service the THORChain network, of which there is intended to be initially 100, but can scale to 300. The design goal of THORChain is such that anyone can join the network with the required funds (permissionless) *and be anonymous*, yet still be secure. THORChain takes this a step further by having a VERY high churn schedule, kicking out nodes continuously.

This high-churn network ensures that it is censorship-resistant, evades capture and resists centralisation. Each THORNode is comprised of several independent servers in a cluster, which run full-nodes for each connected chain, a THORDaemon and a Midgard API. THORNodes should be anonymous, do not support delegation and are regularly churned out.

Technology

THORSwap Airdrop is a leaderless vault manager:

  1. 1-way State Pegs allow syncing state from external chains
  2. A State Machine to coordinate asset exchange logic and delegate redemptions
  3. Bifröst Chain Client to convert redemptions into chain-specific transactions
  4. A TSS protocol to enable distributed threshold key-signing

Liquidity Model

Instead of limit-order books, THORChain uses continuous liquidity pools (CLP). The CLP is arguably one of the most important features of THORChain, with the following benefits:

  • Provides “always-on” liquidity to all assets in its system.
  • Allows users to trade assets at transparent, fair prices, without relying on centralised third-parties.
  • Functions as source of trustless on-chain price feeds for internal and external use.
  • Democratises arbitrage opportunities.
  • Allows pools prices to converge to true market prices, since the fee asymptotes to zero.
  • Collects fee revenue for liquidity providers in a fair way.
  • Responds to fluctuating demands of liquidity.

Proofing THORNodes

THORSwap Airdrop security model is always by consensus – the truth is what everyone agrees it is. Any THORNode can attempt to spoof downstream clients and send a fake vault address, but a client can protect themselves against this by checking that at least 1/3rd of Nodes agree.

The process for this is:

  1. Get the full list of active THORNode IPs
  2. Retrieve the vault address off at least 1/3rd of them
  3. Check for 100% correctness, if incorrect, repeat Step (2)
  4. If correct, use one of the proofed THORNodes for the next session
  5. Repeat Step (1) regularly

Disclaimer:

Not All The Websites Which Listed In Top List Are 100% Safe To Use Or Investment. We Do Not Promote Any Of Those. Due Diligence Is Your Own Responsibility. You Should Never Make An Investment In An Online Program With Money You Aren’t Prepared To Lose. Make Sure To Research The Website. So Please Take Care Of Your Investments. And Be On The Safe Site And Avoid Much Losing Online.

coinworldstory logo

Coinworldstory Provide Crypto Review Including – Blockchain , Bitcoin , DEFI All About NFT &, Gaming , Cloud Mining ,Exchange , ICO, Ai , Crypto News All In One Place 

Edtior's Picks

nexo 300x250

All Right Reserved. Designed and Developed by CWS TEAM 

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More