<u>Staking as a Service</u>
<https://drive.google.com/file/d/1O2a9U-4WRNXiaBBWw9pFK4itpRoFefzB/view?usp=sharing>
Our Staking as a Service products have been used by over 100 projects in the space. Most of these have been repeat customers. Through the hundreds of staking contracts we have deployed, we have been responsible for a lifetime TVL of over half a billion dollars and an ATH of over 100 million.
These products are fully audited white label solutions, deployed on the client's website with their brand assets. These solutions add an immense amount of value in regard to token utility for both early stage and established projects.
Traditional Staking
Projects can incentivize communities to stake and lock their native token and earn rewards in their native token at the end of the staking period. This creates instant utility while rewarding long term holders.
VIP StakingVIP Staking allows projects to implement a whitelist feature. This will enable the project to allow only whitelisted addresses to participate in the staking pool. These addresses could be whitelisted based on a number of factors including but not limited to:
- Token holdings
- Pre Sale/IDO Participants
- Holding a particular NFT
- Usage of their dApp
- Engagement with their social networks/community
Liquidity StakingLiquidity staking allows folks to take their Liquidity Pool (LP) tokens and stake them for what would likely end up being far greater rewards.
Multi-Asset StakingContributors to these types of staking pools may be rewarded in alternative assets to the ones they stake.
NFT Collection StakingArtists and their fan-base can create staking pools for NFTs as a means of rewarding their supporters who hold their NFTs with exclusive collections, VIP events, etc, thus strengthening the bond between the artist and their collectors.
We use an iterative and lean approach toward integration and development in general. We focus heavily on quicker deployments internally to incorporate feedback, then start detailed usability, security, functionality and reliability testing to capture any gaps in our initial approach. We quickly implement this feedback and then get the product in the hands of our customers when it passes our standards for performance and security.
Once the product is in the customer’s hands, we utilize an effective feedback loop to continuously improve our product by prioritizing the feature enhancements and bug fixes based on the priority of the feedback we are receiving.
In order to integrate with Cardano we’ll be utilizing the same principles. We will first scope out the integration, then start with a shell app version of the deployment that will explore the possibilities of the functional integration. Based on the results of this initial effort, we’ll identify high traction and demand areas to prioritize and build further into a production ready product. We will then proceed to develop and deploy the integration through our deployment cycle. Dev -> QA -> UAT -> Staging -> Launch.
We will repeat this process to integrate the rest of our product suite and future products as well.
After the integration is complete we will have a very strong go to market strategy. This will entail but is not limited to working with Market Across (top marketing/PR firm in the space), Influencer marketing, interviews, AMAs, etc.
The main risks that any staking protocol faces are that of security breaches. We will implement architectural and OpSec security measures to ensure the security of the protocol.
This includes: Node architecture and related infrastructure updates. For example, the signing of withdrawals is often centralized. Ferrum Network has updated the Node Signing Architecture and related Infrastructure (v2.0.0) to enable decentralized Node signing. This major update will provide additional security and reliability layers while allowing stakeholders like Cardano to run Generator and Validator nodes for withdrawals. The ability for more stakeholders to run Generator and Validator nodes brings state-of-the-art decentralization to the our products. This major upgrade will be pivotal in improving architectural security while maintaining the protocols reliability.