What Is Oasis Network?
Oasis is the pioneering layer 1 blockchain designed to enable scalability and confidential compute. Oasis is home to Sapphire, the first confidential EVM that empowers Web3 and Decentralized AI developers to build dApps with Smart Privacy natively on Oasis or other EVM-based chains.
ROSE is the native token of the Oasis Network used for gas fees, staking, delegation and governance. With a unique layered architecture, Oasis presents the optimal building and execution environment for DeFi, AI, GameFi, NFTs, the metaverse, data tokenization and DAO governance. Oasis also has native support for rollups at the consensus layer.
What Makes Oasis Network Unique?
* Smart Privacy
Better dApps require smarter privacy. This is why Oasis focuses on delivering Smart Privacy to Web3 and AI in the form of a flexible, fully customizable confidentiality framework that replaces the rigid, complex and inefficient tools in the status quo. With technologies like the Sapphire runtime and its accompanying Oasis Privacy Layer (OPL) for EVM-based chains, Oasis brings cutting edge confidentiality to any Web3 developer, even ones that don’t build directly on the Oasis Network. For applications running on a separate host chain, OPL allows the powerful privacy features of Sapphire to be integrated on any layer of Web3. By creating a spectrum of confidentiality with unlimited customizability, Oasis is redefining how developers think about integrating privacy and reshaping the toolset available for prioritizing privacy in Web3 and AI.
* Layered Architecture
Architecting the Oasis Network started with a key decision to separate the network’s consensus layer from the compute layer. Oasis provides privacy-preserving computation via runtime environments on the compute layer. A proof-of-stake (PoS) mechanism secures the consensus layer, which acts as a hub for reaching network-wide agreement on transaction ordering, validity and global state. The compute layer, which functions as the execution platform for smart contracts, consists of multiple parallel runtimes (ParaTimes) that are built for specialized computation needs.
This layered approach allows for a dynamic and low-cost deployment of any dApps running on Oasis or using Oasis technology while running on another host network. Each ParaTime plugs into the Oasis consensus layer. Each Oasis runtime can also evolve independently of the others while maintaining security provided by the consensus layer, enabling users and developers to have complete control over the execution and confidentiality of their dApps and associated data.
* Efficient Confidentiality
Oasis differentiates itself from other privacy networks and technologies by optimizing for both efficiency and confidentiality simultaneously. Every dApp manages different amounts and types of user data, but every data load can be processed on Oasis with the same level of efficiency. From data-heavy smart contracts to simple transaction data, both can be executed efficiently with optional end-to-end encryption in one of the Oasis runtimes.
By operating separate consensus and compute layers, Oasis allows its execution environments to operate unencumbered by each other. Consensus is settled on a separate layer and accessed by applications running on the compute layer when necessary. While other networks offer extreme privacy only through inefficient computation or extreme efficiency without robust privacy, the Oasis architecture enables both.
How Many Oasis Network (ROSE) Coins Are There in Circulation?
The current supply of Oasis Network ROSE is 6.5 billion tokens, with a total supply of 10 billion ROSE. The initial token distribution upon genesis was as follows:
* 23.5% – Staking rewards
* 23% – Backers
* 5% – Strategic partners and reserve
* 18.5% – Community and ecosystem
* 10% – Foundation endowment
* 20% – Core contributors
ROSE is used for transaction fees, staking, delegation and governance on the Oasis Network consensus layer. ROSE is also used for transaction fees and compute costs in the Oasis compute layer.
How Is the Oasis Network Secured?
Oasis is secured by a proof-of-stake (PoS) mechanism on its consensus layer with a decentralized set of validator nodes operated by a global network of independent users. Fraud proofs based on discrepancy detection secure the separate compute and consensus layers in the network. For confidential runtimes like Sapphire and Cipher, Oasis nodes are required to use a type of secure computing technology called a Trusted Execution Environment (TEE), which acts as a black box for smart contract execution leveraging encrypted memory and remote attestation. Encrypted data goes in along with the smart contract and validity proofs. Data is then validated, decrypted and processed by the smart contract. Contract data is then encrypted before it is sent out of the TEE. This process not only reduces developer and user friction, but it also ensures that data remains confidential and is never leaked, even to node operators or application developers.
Contributors
The Oasis Network is built and contributed by a vibrant, decentralized community of engineers and developers. Notably, many of the core contributors hold PhD degrees and are specialists in computer security and cryptography. Oasis is also supported by a cadre of industry leading backers and external contributors who collectively support a $235 million Ecosystem Fund to foster ecosystem development in Oasis. The Oasis Foundation also runs an active grants program to support builders and creators using the network.
Technology
The Oasis compute layer supports multiple parallel runtime, or ParaTime, environments which allows Web3 developers to build decentralized applications on any existing runtime or even launch their own. Unique ParaTimes can be developed in isolation to meet the specific requirements of any application, including privacy parameters, staking requirements, development language and more.
Three separate ParaTimes already run on Oasis: Sapphire, Emerald and Cipher.
Sapphire is the first confidential EVM-compatible runtime. Sapphire provides developers with the unique capability to build EVM-based on-chain dApps with smart contracts that are completely confidential, completely public, or anywhere in between on the spectrum of confidentiality. Sapphire is a groundbreaking developer environment that offers a familiar building environment for any EVM developers with the added benefits of Oasis Smart Privacy technology.
Emerald is a runtime built on Oasis that offers full EVM compatibility and high-performance scalability. Emerald was engineered to solve two key problems faced by every Web3 developer: gas fees and cross-chain interoperability. Using the Emerald runtime, developers can build with confidence that their users will not suffer performance lags or surprise congestion.
Cipher is a WebAssembly (WASM)-based privacy-enabled runtime built on Oasis. With Cipher and the Oasis Contract SDK, developers can use Rust to build the next generation of confidential dApps.
But accessing the power of Sapphire is not limited to native Oasis developers. With the Oasis Privacy Layer framework, Oasis brings the power of Sapphire privacy to all of Web3. Crypto developers can seamlessly add Oasis privacy to their existing dApp on any EVM network without having to migrate their application and users away from their native blockchain.
For native builders and users of the Oasis Network, there is a suite of tools that support a seamless experience monitoring and transacting on the network.
Oasis Wallet is the official non-custodial wallet for storing, sending and receiving digital assets on the Oasis Network. With the successful deployment of Oasis Safe by ProtoFire on Sapphire and a partnership with Transak, Oasis users also have access to an industry-leading custody options and easy on-ramps for the Oasis ecosystem.
Oasis Explorer provides an easy-to-use deep dive into on-chain activity from Oasis users and developers. By surfacing powerful data and analytics across all Oasis runtime environments, the Explorer queries data for users to analyze the growth and development of Oasis.
Oasis Nexus is the official indexer tool for the Oasis Network and the backend for explorers and wallets. Nexus continuously fetches blockchain data from one or more Oasis nodes, parses the data and stores it into a heavily indexed SQL database, which provides a JSON-based web API to access the data.
What is Blockchain?
Blockchain is a decentralized and distributed ledger technology that securely records transactions across multiple computers in a verifiable and permanent way. It forms the underlying technology for cryptocurrencies like Bitcoin and enables transparency, security, and immutability.
What is Cryptocurrency?
Cryptocurrency is a digital or virtual form of currency that uses cryptography for security. It operates on decentralized networks, typically based on blockchain technology, and facilitates secure and transparent peer-to-peer transactions.
What is Bitcoin?
Bitcoin is the first and most well-known cryptocurrency, created in 2009 by an anonymous person or group known as Satoshi Nakamoto. It operates on a decentralized peer-to-peer network and is used for secure, transparent, and censorship-resistant transactions.
What is the difference between Bitcoin and Altcoins?
Bitcoin is the original and most widely recognized cryptocurrency, while altcoins refer to any other cryptocurrencies besides Bitcoin. Examples of altcoins include Ethereum, Ripple (XRP), Litecoin (LTC), and many others.
What is Staking?
Staking involves participants locking up a certain amount of cryptocurrency in a wallet to support the operations of a blockchain network. It is commonly associated with proof-of-stake (PoS) and delegated proof-of-stake (DPoS) consensus mechanisms, where participants receive rewards for helping secure the network.
How Can I Stake Cryptocurrency?
To stake cryptocurrency, you typically need to choose a platform or network that supports staking. Transfer your tokens to a compatible wallet, follow the staking instructions provided by the platform, and lock up the desired amount of cryptocurrency. Once staked, you may start earning rewards.
What Are Staking Rewards and How Are They Calculated?
Staking rewards are incentives provided to participants who lock up their cryptocurrency to support the network. The amount of rewards varies and is influenced by factors such as the network's inflation rate, the total amount staked, and the specific rules of the staking protocol.
Can I Unstake My Cryptocurrency at Any Time?
The ability to unstake and withdraw your cryptocurrency depends on the specific staking protocol and network. Some platforms may have lock-up periods or unbonding periods during which your staked tokens are inaccessible. Always check the terms and conditions of the staking service.
What are the Risks of Staking?
Staking comes with risks, including the potential loss of staked funds if a participant behaves maliciously or fails to fulfill their responsibilities. Market volatility can also impact the value of staked tokens. It's crucial to thoroughly research the staking protocol and understand the associated risks.
Can I Lose Money by Staking?
While staking is designed to be a rewarding activity, there is a risk of losing money, especially if the value of the staked cryptocurrency decreases or if the staking protocol encounters security issues. It's important to consider both the potential rewards and risks before participating in staking.