Oasis is a groundbreaking layer 1 blockchain crafted to offer scalability and secure computing. It hosts Sapphire, the premier confidential EVM, which enables developers in the Web3 and Decentralized AI spaces to create dApps with Smart Privacy either on Oasis or any other EVM-based chains.
The native token of the Oasis Network is ROSE, utilized for gas fees, staking, delegation, and governance. Oasis features a distinctive layered architecture, providing an ideal environment for developing and executing DeFi, AI, GameFi, NFTs, the metaverse, data tokenization, and DAO governance. Additionally, Oasis naturally supports rollups at the consensus layer.
What Makes Oasis Network Unique?
* Smart Privacy
Superior dApps need superior privacy. Oasis is dedicated to delivering Smart Privacy to Web3 and AI by offering a flexible, entirely customizable confidentiality framework. This framework replaces the outdated, complicated, and inefficient tools currently in use. Technologies like the Sapphire runtime and the Oasis Privacy Layer (OPL) for EVM-based chains bring advanced confidentiality features to any Web3 developer, even those not building directly on Oasis. OPL allows applications on different host chains to incorporate Sapphire's powerful privacy capabilities at any Web3 layer. By offering a range of customizable privacy options, Oasis is redefining how developers approach privacy integration and enhancing the tools available for prioritizing privacy in Web3 and AI.
* Layered Architecture
The design of the Oasis Network began with a pivotal decision to separate the consensus layer from the compute layer. Oasis supports privacy-preserving computation through runtime environments on the compute layer. The consensus layer, secured by a proof-of-stake (PoS) mechanism, serves as a central point for establishing network-wide consensus on transaction order, validity, and global state. The compute layer, serving as the platform for smart contract execution, comprises several parallel runtimes (ParaTimes) tailored for specific computational needs.
This layered design enables the efficient and cost-effective deployment of dApps on Oasis or those using Oasis technology on another host network. Each ParaTime connects to the Oasis consensus layer, and every runtime can develop independently while maintaining security through the consensus layer, granting users and developers total control over their dApps' execution and data confidentiality.
* Efficient Confidentiality
Oasis sets itself apart from other privacy networks and technologies by optimizing for both efficiency and confidentiality simultaneously. Each dApp handles varying types and amounts of user data, yet Oasis processes all data loads with consistent efficiency. From data-intensive smart contracts to simple transaction data, everything can be executed swiftly with optional end-to-end encryption in one of Oasis's runtimes.
By having separate consensus and computing layers, Oasis allows its execution environments to function without hindrance. The consensus is resolved on a separate layer and is only accessed by applications on the compute layer when needed. Unlike other networks that offer high privacy with inefficient computation or high efficiency with limited privacy, the Oasis architecture allows for both.
How Many Oasis Network (ROSE) Coins Are There in Circulation?
There are currently 6.5 billion ROSE tokens in circulation, with a total supply set at 10 billion ROSE. The initial distribution of tokens at the network's launch was as follows:
* 23.5% for staking rewards
* 23% for backers
* 5% for strategic partners and reserve
* 18.5% for community and ecosystem
* 10% for foundation endowment
* 20% for core contributors
ROSE is used for transaction fees, staking, delegation, and governance within the Oasis Network's consensus layer, as well as for transaction fees and computing costs in the compute layer.
How Is the Oasis Network Secured?
Oasis relies on a proof-of-stake (PoS) mechanism for security on its consensus layer, supported by a decentralized network of validator nodes managed by independent global users. Fraud proofs using discrepancy detection safeguard both the compute and consensus layers. In confidential runtimes such as Sapphire and Cipher, Oasis nodes use Trusted Execution Environments (TEE), a secure computing technology that acts as a secure enclave for executing smart contracts. It utilizes encrypted memory and remote attestation. Data, along with the smart contract and validity proofs, enters the TEE, where it is validated, decrypted, and processed. The smart contract then outputs encrypted data, ensuring it remains confidential and inaccessible even to node operators or app developers. This method not only minimizes friction for developers and users but also guarantees that data stays secure.