A new financial model for app tokens: How to generate cash flows

gateio

GATE.IO芝麻开门

GATE.IO芝麻开门交易所(原比特儿交易所)是全球前10的交易所,新用户注册可免费领取空投,每月可得50-200U

点击注册 更多入口

更多交易所入口

一站式注册各大交易所、点击进入加密世界、永不失联,币安Binance/欧易OKX/GATE.IO芝麻开门/Bitget/抹茶MEXC/火币Huobi

点击进入 永不失联
For infrastructure tokens — which correspond to a Layer 1 network (or an adjacent part of the computing stack like Layer 2) — economic models are well-developed and understood, rooted in the supply and demand for blockspace. But for application tokens — smart contract protocols deploying services on top of blockchains that relay rights in “distributed businesses” — economic models are still being solved. App token business models should be as expressive as their underlying software. To that end, we introduce cash flows for app tokens — an approach that enables applications to create permissive, flexible models and users to pick and choose how they are rewarded for the value they provide. This method creates fees from legitimate activities across different jurisdictions’ regulatory requirements, encouraging greater compliance. It also maximizes value accruing to the protocol while encouraging governance minimization. The principles we share here apply to all web3 applications — from DeFi to decentralized social apps, DePIN networks, and everywhere in between. Challenges for token modelsInfrastructure tokens are subject to embedded supply and demand: As demand increases, supply decreases, and markets adjust accordingly. This native economic foundation for many infrastructure tokens was accelerated by Ethereum Improvement Proposal 1559 (EIP-1559), which implemented a base fee to be burned for all Ethereum transactions. But despite scattered attempts at buy-and-burn models, there is no parallel to EIP-1559 for application tokens. Applications are users, not providers, of block space, so they can’t rely on the collection of gas fees from others using their block space. This is why they need to develop their own economic models. There are some legal challenges here as well: Infrastructure token economic models are more insulated from legal risk, because of the generic nature of typical blockchain transactions and the programmatic mechanisms they use. But for application token economic models, the applications involved may depend on the facilitation of regulated activity and may require intermediation by governance tokenholders — making the economics more complicated. A decentralized exchange that facilitates trading of derivatives, a highly regulated activity in the U.S., is radically different than, say, Ethereum. The combination of these intrinsic and extrinsic challenges means that application tokens require a different economic model. With that in mind, we present one possible solution: a method for designing protocols that compensate app tokenholders for their services while maximizing protocol revenue, incentivizing regulatory compliance, and incorporating governance minimization. Our objective is simple: to give application tokens the same economic grounding, through cash flows, that many infrastructure tokens already have. Our solution focuses on solving three problems application tokens face relating to: Challenges with governanceChallenges with value distributionChallenges with regulated activity 1. Challenges with governanceApplication tokens typically have governance rights, and the presence of a Decentralized Autonomous Organization (DAO) can introduce uncertainty that infrastructure tokens don’t face. For DAOs with significant U.S. operations, risks may arise if the DAO has control over protocol revenue or intermediates the economic activity of the protocol and making such activity programmatic. To avoid these risks, projects can eliminate the control a DAO has by minimizing governance. For DAOs where that isn’t possible, Wyoming’s new Decentralized Unincorporated Nonprofit Association (DUNA) provides a decentralized legal entity that may help mitigate these risks and comply with applicable tax laws. 2. Challenges with value distributionApplications must also exercise caution in designing the mechanism that distributes value to tokenholders. Combining voting and economic rights may raise concerns under U.S. securities laws, particularly with simple and direct mechanisms like pro rata distributions and token buy-and-burns. These mechanisms look similar to dividends and stock buybacks, and can undermine arguments that tokens deserve a different regulatory framework from equity. Projects should instead explore stakeholder capitalism — rewarding tokenholders for contributions to the project in a manner that benefits the project. Many projects have encouraged positive-sum participation, including operating a frontend (Liquity), participating in the protocol (Goldfinch), and pledging collateral as part of a safety module (Aave). The design space here is wide open, but a good place to start is mapping out all the stakeholders in a project, determining what behaviors should be encouraged from each of them, and deciding what overarching value the protocol can create via that incentivization. For simplicity’s sake, in this post we’ll assume a simple compensation model that rewards tokenholders for participation in governance, even though other schemes exist. 3. Challenges with regulated activityApplications that facilitate regulated activity must also be careful when designing value accrual mechanisms for tokenholders. If such mechanisms accrue value from frontends or APIs that are not operated in compliance with applicable law, tokenholders could be profiting from illicit activity. Most proposed solutions to this problem have focused on limiting value accrual to activity that is permissible in the U.S. — for instance, only turning on protocol fees with respect to liquidity pools involving certain assets. This subjects projects to the lowest common denominator of regulatory approaches and undermines the value proposition of global autonomous software protocols. It also directly undermines efforts at governance minimization. Determining which fee strategy works from a regulatory compliance perspective is not an appropriate task for DAOs. In an ideal world, projects would be able to collect fees from activity in any jurisdiction where that activity is permissible, without having to rely on DAOs to determine what is permissible. The solution is not to require regulatory compliance at the protocol level but to ensure that protocol-generated fees are passed on only if the frontend or API that originated them is following applicable laws and regulations where the frontend is located. If the U.S. made it illegal to collect fees on a certain type of transaction an application facilitated, that could drive the economic value of that app’s token to zero, even if the activity were entirely permissible in every other country in the world. Flexibility when it comes to fee accrual and distribution ultimately equals resiliency in the face of regulatory pressures. One core issue: Tracing feesThe traceability of fees is critical to solving the potential risks arising from non-compliant frontends without introducing censorship risk or making a protocol permissioned. With traceability, an application could ensure that any fees that accrue to tokenholders only come from frontends that are legally compliant in the jurisdiction of the tokenholder. If fees are untraceable, there would be no way to insulate tokenholders from accruing value from non-compliant frontends (i.e., fees collected by non-compliant frontends), which could expose tokenholders to risk. To make fees traceable, a protocol could use a two-step app-token staking system design. Step 1: identifying which frontend originated the fees, and Step 2: routing the fees to different pools based on custom logic. Mapping frontendsFee traceability requires a one-to-one mapping from a domain to a public/private key pair. Without this mapping, a malicious frontend could spoof transactions and pretend they were submitted from an honest domain. Cryptography allows us to “register” frontends, immutably recording the domain to public key mapping, proving the domain actually controls that public key, and signing transactions with said private key. This gives us the ability to attribute transactions, and thus fees, to a given domain. Routing feesOnce the source of fees is traceable, the protocol can determine how to distribute those fees in a manner that insulates tokenholders from receiving fees from illicit transactions, but that also doesn’t increase the decentralized governance burdens of the DAO. To help illustrate this point, think of the spectrum of possible designs for app-token staking, ranging from one staking pool for each frontend to one staking pool for all frontends. In its most simple construct, the fees of every frontend could be routed to a separate frontend-specific staking module. By selecting which frontends to stake to, a tokenholder would be able to decide which fees it was receiving and avoid any fees that place the tokenholder in legal jeopardy. For example, a tokenholder could only stake to the module associated with a frontend that has received all regulatory approvals in Europe. While this design sounds simple, it is actually quite complicated. There could be 50 staking pools for 50 different frontends, and the dilution of fees could be adverse to token value. On the opposite end of the spectrum, fees from every front end could be pooled together — but this defeats the purpose of fee traceability. If all fees are pooled together, there’s no way to differentiate fees from compliant frontends versus non-compliant ones — one bad apple would spoil the barrel. Tokenholders would be forced to choose between not receiving any fees or stake in a pool where they would benefit from the illegal activities of non-compliant frontends in their jurisdiction — an option that could dissuade many tokenholders from participating or could revert the system to current suboptimal designs, where a DAO has to assess where fees can be applied. Addressing fee traceability through curationThese complexities could be resolved through curation. Consider a permissionless smart contract protocol application that has a fee and a token. Anyone can create a frontend for the application and any frontend can have its own staking module. Let’s call one frontend for this protocol app.xyz. App.xyz could follow specific compliance rules for the jurisdiction it is located in. Application activity that originated from app.xyz generates protocol fees. App.xyz has its own staking module, and tokenholders can stake their tokens to that module directly or to a curator that wants to individually pick a basket of frontends that they deem compliant. These token stakers would earn yield in the form of the fees from the set of frontends they stake to. If a frontend generates $100 in fees, and 100 entities are each staking 1 token, then each entity is entitled to $1. Curators could initially charge a fee for their services. In the future, governments could make onchain attestations about frontends being compliant in their jurisdiction to help protect consumers, with the ancillary benefit being the automation of curation. One potential risk in this model is that non-compliant frontends could be cheaper to operate because they lack the administrative overhead of compliant frontends. They could also devise models to recycle frontend fees to traders to further incentivize their workaround. Two factors mitigate this risk. First, most users actually want compliant frontends to follow their local laws and regulations. This applies especially to large, regulated institutions. Second, governance could play a vital role as a last resort or “veto authority” on non-compliant frontends that repeatedly break the rules and endanger the viability of the app, discouraging bad behavior. Finally, all fees from transactions that are not initiated through a registered frontend would be deposited in a single catchall staking module, enabling the protocol to capture revenue from transactions initiated by bots and other direct interactions with the protocol’s smart contracts. From theory to implementation: Putting the method into practiceLet’s revisit the app token stack in greater detail. For a protocol to facilitate frontend staking, it would need to establish a registry smart contract that frontends would need to register with. Each frontend or API can add a special TXT record to the DNS record of their domain like the ENS DNS integration. This TXT record contains the public key of a key pair that the frontend generates once, called the certificate. The frontend client can then call a register() function and prove that it owns its domain name. A mapping of the domain to the certificate public key, and vice versa, are stored.When transactions are created through the client, it also signs the transaction payload with its certificate public key. These are passed to the application’s smart contracts in a bundle.The application’s smart contracts validates the certificate, checks that it corresponds to the right tx body, and has been registered. If yes, the transaction is processed. The fees generated by the transaction are then sent to a FeeCollector contract along with the domain name (from the registry).The FeeCollector allows curators, users, validators, and others, to stake tokens directly to a domain or set of domains. These contracts must keep track of the amount of tokens staked on each domain, each address’ share of that stake, and the amount of time they have been staked for. Popular implementations of liquidity mining can be used as a starting point for this contract logic.Users who have staked to curators (or directly to the Fee Management contracts themselves) can then withdraw the proportionate share of the fee according to the amount of the app token staked to the domain. The architecture could be similar to MetaMorpho/Morpho Blue. This could be introduced without increasing the governance burden of an application’s DAO. In fact, the governance responsibilities could be reduced as the fee switch could be turned on permanently for all transactions facilitated by the protocol, thereby removing any control of the DAO over the economic model of the protocol. Additional considerations based on application typeWhile these principles apply broadly to application token economic models, there can be other fee considerations based on the type of application: apps built on Layer 1s or Layer 2s, app-chains, and apps built using rollups. Considerations for L1/ L2 applicationsApplications on Layer 1 or Layer 2 blockchains have smart contracts deployed directly onchain. Fees would be collected when users interact with the applications’ smart contracts. Usually that occurs through an easy-to-use frontend (like an app or website) that serves as an interface between a retail user and the underlying smart contracts. In that case, any fees would originate with that frontend. The example above about app.xyz illustrates how a fee system could work for a Layer 1 app. Instead of relying on curators to filter frontend fees, apps could also take either a whitelist or blacklist approach to frontends contributing to network fees. Again, the purpose here would be to ensure that tokenholders, and the protocol at large, are not profiting or benefitting from illicit activity and are following jurisdictional-specific laws and regulations. In the whitelist approach, the app would publish a set of rules for frontends, create a registry of those frontends that follow the rules, issue a certificate to frontends who opt-in, and require frontends to stake tokens to receive a portion of app fees. If frontends don’t follow these rules, they would be slashed, and their certificate for fee contributions would be removed. In the blacklist approach, apps wouldn’t have to create any rules, but the launching of a frontend for the application would not be permissionless. Instead, the app would require that any frontend deliver an opinion from a law firm that the frontend is in compliance with its jurisdiction prior to enabling that frontend to use the app. Once the opinion is received, the app would issue a certificate to the frontend for fee contributions that would only be removed if the app receives notice from a regulator that the frontend is not in compliance. The fee pipeline would mirror the examples provided in the preceding sections. Both of these approaches significantly increase the burden of decentralized governance, requiring DAOs to either establish and maintain a set of rules or assess legal opinions about compliance. In some instances, this may be acceptable, but in most cases outsourcing this compliance burden to a curator would be preferable. Considerations for appchainsAppchains are application-specific blockchains with validators that work only for that application. In return for their work, those validators receive payment. Unlike Layer 1 blockchains where validators are often rewarded through the inflationary issuance of tokens, some appchains (dYdX) instead pass on customer fees to validators. In this model, tokenholders must stake to validators to receive rewards. The validators become the curated staking modules. This work set is different from a Layer 1 validator. Appchain validators settle specific transactions from a specific application. Because of this difference, appchain validators could bear a greater degree of legal risk regarding the underlying activity they are facilitating. As a result, protocols should grant validators the freedom to perform the work they can perform according to the laws of their jurisdiction and their own comfort level. Importantly, this can be done without jeopardizing the permissionlessness of the appchain or subjecting it to significant censorship risk provided that its validator set is geographically decentralized. The architecture for appchains wishing to take advantage of the benefits of fee traceability would be similar to Layer 1 applications up until the fee pipeline. But validators would be able to use frontend mapping to determine which frontends they wish to process transactions from. The fees for any given transaction would then go to the active validator set, with inactive validators who chose not to participate missing out on such fees. From a fee perspective, the validator performs the same function as the staking module curators discussed above and stakers to those validators could ensure they are not receiving revenue from any illicit activity. Validators could also elect a curator to determine which frontends are compliant per jurisdiction. Considerations for application rollupsRollups have their own blockspace but can inherit the security of another chain. Most rollups today have a single sequencer that is responsible for sequencing and including transactions, although transactions can be submitted directly to the Layer 1 through a process called “forced-inclusion.” If these rollups are application-specific and enshrine their sequencer as the sole validator, the fees generated from transactions included by that sequencer can be dispersed to stakers based on the curated set of compliant frontends or as a general pool. If rollups decentralize their sequencer set, the sequencers become the de facto curated staking modules and the fee pipeline would mirror that of appchains. Sequencers replace validators for fee distribution, and each sequencer can make its own decisions on which frontends to accept fees from. While there are many possible models for application tokens, providing curated staking pools is one path forward that helps thread a needle on the extrinsic challenges unique to applications. By recognizing the intrinsic and extrinsic challenges facing apps, founders can better design app token models from the ground up for their project. Disclaimer: This article is reprinted from [a16zcrypto]. All copyrights belong to the original author [Mason HallPorter SmithMiles Jennings and Ross Shuel]. If there are objections to this reprint, please contact the Gate Learn team, and they will handle it promptly.Liability Disclaimer: The views and opinions expressed in this article are solely those of the author and do not constitute any investment advice.Translations of the article into other languages are done by the Gate Learn team. Unless mentioned, copying, distributing, or plagiarizing the translated articles is prohibited.

目录[+]