What is Threshold? All You Need to Know About T

Intermediate11/13/2024, 2:46:10 AM
Threshold is a cryptography network enabling secure, permissionless data management on blockchains. It combines secret sharing with distributed nodes

Threshold is a cryptography network enabling secure, permissionless data management on blockchains. It combines secret sharing with distributed nodes

As Web 3.0 grows, platforms increasingly face challenges in ensuring user privacy and control on public blockchains, where transparency often conflicts with data security. To address these concerns, decentralized cryptographic solutions are essential for safeguarding information while enabling permissionless interactions. Threshold cryptography is a powerful tool here, distributing cryptographic operations across multiple independent nodes to prevent single points of failure and ensure resilient data protection. Offering a comprehensive range of decentralized privacy services, the Threshold Network brings advanced threshold cryptography to Web 3.0, reinforcing user sovereignty and data security in an open blockchain environment.

What is Threshold (T)?

The Threshold Network emerged from the merger of two decentralized projects, Keep Network and NuCypher, marking a unique, community-driven approach to strengthening privacy on public blockchains. The idea for the merger was proposed by the communities in February 2021, with the initial proposal introduced on Keep’s forum in March. After months of discussion and multiple proposal drafts, the final merger proposal (rc0) was approved in June 2021 by both communities through a snapshot vote involving Keep and NuCypher token holders. Spearheaded by Keep Network founder Matt Luongo and NuCypher founders MacLane Wilkinson and Michael Egorov, Threshold’s formation underscored the founders’ and communities’ commitment to decentralized governance, establishing a platform for threshold cryptography services.

Threshold’s formation underscored the founders’ and communities’ commitment to decentralized governance, establishing a platform for threshold cryptography services. Security remained a priority as the network developed, with significant audits conducted to bolster the network’s reliability, including a report by ChainSecurity in November 2021 covering the Staking Contract, T Token, and Vending Machine. In 2022, the tBTC Bridge v2 underwent a security audit by Least Authority, followed by another audit for Solana Smart Contracts in September 2023.

To ease the transition for token holders, the network introduced vending machine contracts allowing NU and KEEP to T token conversion at fixed ratios, giving holders the flexibility to upgrade at their own pace. Special staking adapters ensured existing stakers could smoothly shift to the new Threshold network. These features solidified Threshold’s position as a robust, user-centric privacy solution in Web 3.0.

How Does Threshold Work? Network and tBTC

The Threshold Network leverages threshold cryptography to provide secure, privacy-focused operations for digital assets on public blockchains. Threshold uses a decentralized approach at its foundation where sensitive cryptographic operations are split across independent nodes, requiring a minimum number of these nodes (t-of-n) to collaborate for any operation to succeed. This model reduces reliance on a single, centralized entity, allowing traditionally centralized functions like signing and encryption to occur in a decentralized manner. Threshold addresses core privacy and security challenges encountered in Web 3.0 through this structure, establishing itself as a key layer for privacy-centric blockchain applications.


Source: threshold.network

Proxy Re-encryption (PRE)

A major feature of the Threshold Network is Proxy Re-Encryption (PRE), an innovative encryption service that allows for secure, decentralized data sharing across Web3 platforms. Unlike conventional encryption, where access management relies on a centralized authority, PRE distributes encryption processes across Threshold’s decentralized nodes, which function as intermediaries, or proxies, in data re-encryption. This means that nodes can re-encrypt data from one public key to another without ever decrypting it or accessing private keys, keeping sensitive data fully protected.

PRE offers considerable flexibility and utility, enabling Web3 applications to implement secrets management and dynamic access controls tailored to user-defined conditions. For example, data owners can set conditions to share encrypted content through paid subscriptions or transfer data ownership securely for encrypted NFTs. PRE empowers users to define who can access their data while maintaining full control over privacy, an essential feature for data sovereignty in decentralized networks.

In practice, PRE allows users like Alice to securely share data with others without needing a centralized intermediary. By storing encrypted data and creating access policies on the blockchain, Alice can specify which parties may access her data. When access is requested, the Threshold Network’s nodes re-encrypt the data according to Alice’s policies, without viewing the data themselves. The intended recipient collects enough re-encryption fragments to decrypt the data, ensuring privacy and secure access.

With PRE, Threshold enables Web3 applications to achieve true data control and privacy, empowering a secure, decentralized ecosystem where users retain authority over their information even on a public blockchain.

tBTC

tBTC, developed by the Threshold Network, is a decentralized and permissionless Bitcoin bridge designed to bring Bitcoin liquidity into Ethereum’s DeFi ecosystem. Traditional bridges connecting Bitcoin to Ethereum rely on centralized intermediaries who receive the user’s Bitcoin and issue an equivalent ERC-20 token. This model forces users to trust third parties, making it susceptible to censorship and compromising Bitcoin’s permissionless nature. In contrast, tBTC operates without intermediaries, offering a decentralized solution that allows Bitcoin holders to access DeFi and Web3 without sacrificing sovereignty or security.

tBTC leverages threshold cryptography to manage Bitcoin deposits, replacing intermediaries with a randomly selected group of independent node operators on the Threshold Network. These operators collaborate to secure deposited Bitcoin through an “honest majority” assumption: they must reach a threshold consensus to access or move any Bitcoin. Weekly operator rotations further reduce the risk of any single operator or group seizing control, as a new set of nodes is continually assigned to protect the assets. This decentralized structure provides users with a secure and censorship-resistant experience, where their funds are managed through cryptographic protocols rather than individual control.

The minting process for tBTC enables Bitcoin holders to lock their Bitcoin and receive tBTC tokens, which can then be used on Ethereum’s DeFi platforms. With tBTC, users can lend, borrow, provide liquidity, and engage in other DeFi activities that traditionally required Ethereum-native assets. The bridge operates as a 1:1 peg, meaning every tBTC token is fully backed by one BTC, ensuring that users retain the full value of their Bitcoin on Ethereum without the need to trust centralized entities.

To mint tBTC, users connect their Bitcoin and Ethereum wallets to the tBTC dApp and generate a unique deposit address for their Bitcoin. They send a Bitcoin deposit, managed by the network’s operators through a consensus-based model that secures the Bitcoin until the user redeems it. Once the Bitcoin is deposited, users confirm the minting transaction in their Ethereum wallet, and the process automatically mints tBTC. With tBTC in hand, users can seamlessly integrate their Bitcoin into Ethereum-based protocols, unlocking access to various DeFi applications while still benefiting from Bitcoin’s inherent value.

By bridging Bitcoin to Ethereum without intermediaries, tBTC offers a decentralized and secure way for Bitcoin holders to participate in Ethereum’s DeFi ecosystem. This permissionless bridge enables new opportunities for cross-chain interactions, supporting the broader vision of an interconnected blockchain ecosystem where assets flow freely and securely across networks.


Source: threshold.network

Threshold Use Cases

By distributing cryptographic tasks across independent nodes, Threshold enables privacy-preserving operations without a central authority, addressing key challenges in Web3 around security, privacy, and data control. Here are three primary use cases:

  • Decentralized Bitcoin Bridging (tBTC): Through the tBTC bridge, Threshold enables Bitcoin holders to interact with Ethereum’s DeFi ecosystem in a decentralized and permissionless way. Unlike centralized bridges, tBTC requires no intermediaries, instead relying on a threshold consensus among independent nodes to secure Bitcoin deposits. This decentralized model allows Bitcoin users to mint tBTC, a fully backed ERC-20 token, and unlock Bitcoin’s value across DeFi.
  • Privacy-Preserving Data Sharing (Proxy Re-Encryption): Threshold’s Proxy Re-Encryption (PRE) service enables secure, decentralized data sharing by allowing encrypted data to be re-encrypted without decryption. PRE allows data owners to control access through blockchain-based policies, making it ideal for scenarios like subscription-based content sharing and encrypted NFTs, where privacy and control are paramount.
  • Access Control in Decentralized Applications (TACo): The Threshold Access Control (TACo) system provides a decentralized framework for permissioned data access on public blockchains. TACo enables developers to implement encrypted access management, allowing users to securely interact with applications without exposing private information or relying on centralized databases, supporting a privacy-focused Web3 environment.

Threshold Features

The Threshold Network delivers robust features to secure user data, enable decentralized finance, and foster community governance within Web3. By leveraging threshold cryptography, it offers tools for privacy-preserving access, stablecoin collateralization, and community-led decision-making, all focused on user sovereignty and security.

TACo: Decentralized Access Control

TACo, or Threshold Access Control, is a pioneering privacy layer for Web3 that removes the need for trust in intermediaries when managing data access. Offering end-to-end encryption, TACo allows users to securely share data with authorized recipients without central authority oversight. This feature is valuable across various domains, from Web3 social networks to content-gated media. TACo facilitates controlled data sharing in a fully decentralized way, ensuring that users retain ownership and control over sensitive information, from IoT data to NFTs. The result is a trust-minimized solution for high-stakes data privacy.


Source: threshold.network

Threshold USD (thUSD): Bitcoin-Backed Stablecoin

Threshold USD (thUSD) is a stablecoin pegged to the US dollar, backed by a mix of ETH and tBTC collateral with a minimum collateral ratio of 110%. This unique setup allows Bitcoin and Ethereum holders to leverage their assets for low-cost borrowing. Built as a decentralized, self-sustaining protocol, thUSD doesn’t rely on user-funded liquidity rewards. Instead, it uses Protocol Controlled Value (PCV) to sustain the stability pool, ensuring predictability and long-term sustainability. With multi-collateral support and decentralized oversight by the Threshold DAO, thUSD offers a secure, scalable stablecoin solution for DeFi participants.


Source: thresholdusd.org

Threshold DAO: Community-Driven Governance

The Threshold Network operates under the guidance of a decentralized autonomous organization (DAO) that unites both Keep and NuCypher communities. Structured with a Tokenholder DAO and an Elected Council, Threshold’s governance framework ensures representation and accountability. Token holders can propose changes, discuss on forums, and vote, while the Elected Council manages critical decisions through secure Gnosis Safe contracts. Each proposal undergoes a lifecycle of community feedback, off-chain voting, and on-chain governance before final execution. This DAO model empowers Threshold’s community to shape the network, fostering a transparent, user-centered ecosystem.


Source: docs.threshold.network

Threshold Network Participation: Stakers, Liquidity Providers, and Token Holders

The Threshold Network offers diverse roles for users, allowing active participation and rewards while strengthening its decentralized infrastructure. Stakers are integral to the network’s security, locking their T tokens to operate nodes and support Threshold’s cryptographic services. In return, they earn rewards, contributing to the network’s robustness. Liquidity Providers add assets to pools like Threshold (T) and tBTC, facilitating efficient trading and market-making across DeFi. This role enhances the network’s liquidity and stability, offering yield to participants. Token Holders govern, influencing protocol updates, ecosystem growth, and future developments. Holders of legacy NU or KEEP tokens can upgrade to T tokens to fully participate in Threshold’s decentralized governance and help shape its future. Together, these roles create a dynamic, user-powered network, ensuring Threshold remains community-driven and secure.


Source: threshold.network

What is the T Coin?

T is Threshold’s governance and utility token, enabling staking, liquidity, and decentralized decision-making. Its total supply is capped at 11.04 billion units, of which 9.96 billion are already in circulation (November 2024).

The T token is the native utility and governance token of the Threshold Network, designed to support decentralized cryptographic services and community-driven governance. As an ERC-20 token, T allows users to stake it to operate validator nodes, securing the network while earning rewards. Additionally, it can be added to liquidity pools to facilitate trading and earn passive income.

As a governance token, T enables holders to participate in the Threshold DAO, contributing to decision-making and ensuring the network remains decentralized and community-focused. Initially, 10 billion T tokens were allocated to the network, divided among NU and KEEP holders and the DAO treasury. In detail: 4.5 billion allocated to NU holders, 4.5 billion to KEEP holders, and 1 billion reserved for the Threshold DAO treasury.
This structure allows T token holders to drive the future of the network through DAO voting and proposals, setting it apart as a decentralized, user-centered platform.

Users who hold KEEP or NU tokens from the original Keep and NuCypher networks, which merged to form the Threshold Network, can upgrade their tokens to T.


Source: dashboard.threshold.network

Is T a Good Investment?

T appears to be a compelling project, particularly with its innovative tBTC feature, which bridges Bitcoin to Ethereum in a decentralized and permissionless way. By providing a secure way for Bitcoin holders to access Ethereum’s DeFi ecosystem, tBTC highlights Threshold’s potential in cross-chain finance. The network’s robust cryptographic foundation and community-driven governance further add to its appeal for those interested in decentralized technology.

However, as a relatively new project, Threshold’s success depends on widespread adoption and integration within the DeFi space, and its token value may be influenced by competition in the cross-chain sector.

How to Own T?

To own T, you can use the services of a centralized crypto exchange. Start by creating a Gate.io account, and get it verified and funded. Then you are ready to go through the steps to buy T.

News on Threshold

Released on the official blog on September 25, 2024, Threshold Network announced the integration of its decentralized Bitcoin bridge, tBTC, with Aave, one of the largest liquidity protocol. This milestone marks a significant step towards decentralized Bitcoin access in DeFi. In response to recent shifts in WBTC’s custody model, Threshold proposed that Aave join its Council to strengthen decentralized governance. This includes a 40 million T token delegation to Aave’s node operator, reinforcing security and decentralization while providing Bitcoin users a reliable and permissionless DeFi lending solution through tBTC.

Useful References

For the latest updates about Threshold, you can visit:

Take Action on T

Check out T price today, and start trading your favorite currency pairs.

Author: Mauro
Translator: Sonia
Reviewer(s): Matheus、Piccolo
Translation Reviewer(s): Ashely
* The information is not intended to be and does not constitute financial advice or any other recommendation of any sort offered or endorsed by Gate.io.
* This article may not be reproduced, transmitted or copied without referencing Gate.io. Contravention is an infringement of Copyright Act and may be subject to legal action.

What is Threshold? All You Need to Know About T

Intermediate11/13/2024, 2:46:10 AM
Threshold is a cryptography network enabling secure, permissionless data management on blockchains. It combines secret sharing with distributed nodes

Threshold is a cryptography network enabling secure, permissionless data management on blockchains. It combines secret sharing with distributed nodes

As Web 3.0 grows, platforms increasingly face challenges in ensuring user privacy and control on public blockchains, where transparency often conflicts with data security. To address these concerns, decentralized cryptographic solutions are essential for safeguarding information while enabling permissionless interactions. Threshold cryptography is a powerful tool here, distributing cryptographic operations across multiple independent nodes to prevent single points of failure and ensure resilient data protection. Offering a comprehensive range of decentralized privacy services, the Threshold Network brings advanced threshold cryptography to Web 3.0, reinforcing user sovereignty and data security in an open blockchain environment.

What is Threshold (T)?

The Threshold Network emerged from the merger of two decentralized projects, Keep Network and NuCypher, marking a unique, community-driven approach to strengthening privacy on public blockchains. The idea for the merger was proposed by the communities in February 2021, with the initial proposal introduced on Keep’s forum in March. After months of discussion and multiple proposal drafts, the final merger proposal (rc0) was approved in June 2021 by both communities through a snapshot vote involving Keep and NuCypher token holders. Spearheaded by Keep Network founder Matt Luongo and NuCypher founders MacLane Wilkinson and Michael Egorov, Threshold’s formation underscored the founders’ and communities’ commitment to decentralized governance, establishing a platform for threshold cryptography services.

Threshold’s formation underscored the founders’ and communities’ commitment to decentralized governance, establishing a platform for threshold cryptography services. Security remained a priority as the network developed, with significant audits conducted to bolster the network’s reliability, including a report by ChainSecurity in November 2021 covering the Staking Contract, T Token, and Vending Machine. In 2022, the tBTC Bridge v2 underwent a security audit by Least Authority, followed by another audit for Solana Smart Contracts in September 2023.

To ease the transition for token holders, the network introduced vending machine contracts allowing NU and KEEP to T token conversion at fixed ratios, giving holders the flexibility to upgrade at their own pace. Special staking adapters ensured existing stakers could smoothly shift to the new Threshold network. These features solidified Threshold’s position as a robust, user-centric privacy solution in Web 3.0.

How Does Threshold Work? Network and tBTC

The Threshold Network leverages threshold cryptography to provide secure, privacy-focused operations for digital assets on public blockchains. Threshold uses a decentralized approach at its foundation where sensitive cryptographic operations are split across independent nodes, requiring a minimum number of these nodes (t-of-n) to collaborate for any operation to succeed. This model reduces reliance on a single, centralized entity, allowing traditionally centralized functions like signing and encryption to occur in a decentralized manner. Threshold addresses core privacy and security challenges encountered in Web 3.0 through this structure, establishing itself as a key layer for privacy-centric blockchain applications.


Source: threshold.network

Proxy Re-encryption (PRE)

A major feature of the Threshold Network is Proxy Re-Encryption (PRE), an innovative encryption service that allows for secure, decentralized data sharing across Web3 platforms. Unlike conventional encryption, where access management relies on a centralized authority, PRE distributes encryption processes across Threshold’s decentralized nodes, which function as intermediaries, or proxies, in data re-encryption. This means that nodes can re-encrypt data from one public key to another without ever decrypting it or accessing private keys, keeping sensitive data fully protected.

PRE offers considerable flexibility and utility, enabling Web3 applications to implement secrets management and dynamic access controls tailored to user-defined conditions. For example, data owners can set conditions to share encrypted content through paid subscriptions or transfer data ownership securely for encrypted NFTs. PRE empowers users to define who can access their data while maintaining full control over privacy, an essential feature for data sovereignty in decentralized networks.

In practice, PRE allows users like Alice to securely share data with others without needing a centralized intermediary. By storing encrypted data and creating access policies on the blockchain, Alice can specify which parties may access her data. When access is requested, the Threshold Network’s nodes re-encrypt the data according to Alice’s policies, without viewing the data themselves. The intended recipient collects enough re-encryption fragments to decrypt the data, ensuring privacy and secure access.

With PRE, Threshold enables Web3 applications to achieve true data control and privacy, empowering a secure, decentralized ecosystem where users retain authority over their information even on a public blockchain.

tBTC

tBTC, developed by the Threshold Network, is a decentralized and permissionless Bitcoin bridge designed to bring Bitcoin liquidity into Ethereum’s DeFi ecosystem. Traditional bridges connecting Bitcoin to Ethereum rely on centralized intermediaries who receive the user’s Bitcoin and issue an equivalent ERC-20 token. This model forces users to trust third parties, making it susceptible to censorship and compromising Bitcoin’s permissionless nature. In contrast, tBTC operates without intermediaries, offering a decentralized solution that allows Bitcoin holders to access DeFi and Web3 without sacrificing sovereignty or security.

tBTC leverages threshold cryptography to manage Bitcoin deposits, replacing intermediaries with a randomly selected group of independent node operators on the Threshold Network. These operators collaborate to secure deposited Bitcoin through an “honest majority” assumption: they must reach a threshold consensus to access or move any Bitcoin. Weekly operator rotations further reduce the risk of any single operator or group seizing control, as a new set of nodes is continually assigned to protect the assets. This decentralized structure provides users with a secure and censorship-resistant experience, where their funds are managed through cryptographic protocols rather than individual control.

The minting process for tBTC enables Bitcoin holders to lock their Bitcoin and receive tBTC tokens, which can then be used on Ethereum’s DeFi platforms. With tBTC, users can lend, borrow, provide liquidity, and engage in other DeFi activities that traditionally required Ethereum-native assets. The bridge operates as a 1:1 peg, meaning every tBTC token is fully backed by one BTC, ensuring that users retain the full value of their Bitcoin on Ethereum without the need to trust centralized entities.

To mint tBTC, users connect their Bitcoin and Ethereum wallets to the tBTC dApp and generate a unique deposit address for their Bitcoin. They send a Bitcoin deposit, managed by the network’s operators through a consensus-based model that secures the Bitcoin until the user redeems it. Once the Bitcoin is deposited, users confirm the minting transaction in their Ethereum wallet, and the process automatically mints tBTC. With tBTC in hand, users can seamlessly integrate their Bitcoin into Ethereum-based protocols, unlocking access to various DeFi applications while still benefiting from Bitcoin’s inherent value.

By bridging Bitcoin to Ethereum without intermediaries, tBTC offers a decentralized and secure way for Bitcoin holders to participate in Ethereum’s DeFi ecosystem. This permissionless bridge enables new opportunities for cross-chain interactions, supporting the broader vision of an interconnected blockchain ecosystem where assets flow freely and securely across networks.


Source: threshold.network

Threshold Use Cases

By distributing cryptographic tasks across independent nodes, Threshold enables privacy-preserving operations without a central authority, addressing key challenges in Web3 around security, privacy, and data control. Here are three primary use cases:

  • Decentralized Bitcoin Bridging (tBTC): Through the tBTC bridge, Threshold enables Bitcoin holders to interact with Ethereum’s DeFi ecosystem in a decentralized and permissionless way. Unlike centralized bridges, tBTC requires no intermediaries, instead relying on a threshold consensus among independent nodes to secure Bitcoin deposits. This decentralized model allows Bitcoin users to mint tBTC, a fully backed ERC-20 token, and unlock Bitcoin’s value across DeFi.
  • Privacy-Preserving Data Sharing (Proxy Re-Encryption): Threshold’s Proxy Re-Encryption (PRE) service enables secure, decentralized data sharing by allowing encrypted data to be re-encrypted without decryption. PRE allows data owners to control access through blockchain-based policies, making it ideal for scenarios like subscription-based content sharing and encrypted NFTs, where privacy and control are paramount.
  • Access Control in Decentralized Applications (TACo): The Threshold Access Control (TACo) system provides a decentralized framework for permissioned data access on public blockchains. TACo enables developers to implement encrypted access management, allowing users to securely interact with applications without exposing private information or relying on centralized databases, supporting a privacy-focused Web3 environment.

Threshold Features

The Threshold Network delivers robust features to secure user data, enable decentralized finance, and foster community governance within Web3. By leveraging threshold cryptography, it offers tools for privacy-preserving access, stablecoin collateralization, and community-led decision-making, all focused on user sovereignty and security.

TACo: Decentralized Access Control

TACo, or Threshold Access Control, is a pioneering privacy layer for Web3 that removes the need for trust in intermediaries when managing data access. Offering end-to-end encryption, TACo allows users to securely share data with authorized recipients without central authority oversight. This feature is valuable across various domains, from Web3 social networks to content-gated media. TACo facilitates controlled data sharing in a fully decentralized way, ensuring that users retain ownership and control over sensitive information, from IoT data to NFTs. The result is a trust-minimized solution for high-stakes data privacy.


Source: threshold.network

Threshold USD (thUSD): Bitcoin-Backed Stablecoin

Threshold USD (thUSD) is a stablecoin pegged to the US dollar, backed by a mix of ETH and tBTC collateral with a minimum collateral ratio of 110%. This unique setup allows Bitcoin and Ethereum holders to leverage their assets for low-cost borrowing. Built as a decentralized, self-sustaining protocol, thUSD doesn’t rely on user-funded liquidity rewards. Instead, it uses Protocol Controlled Value (PCV) to sustain the stability pool, ensuring predictability and long-term sustainability. With multi-collateral support and decentralized oversight by the Threshold DAO, thUSD offers a secure, scalable stablecoin solution for DeFi participants.


Source: thresholdusd.org

Threshold DAO: Community-Driven Governance

The Threshold Network operates under the guidance of a decentralized autonomous organization (DAO) that unites both Keep and NuCypher communities. Structured with a Tokenholder DAO and an Elected Council, Threshold’s governance framework ensures representation and accountability. Token holders can propose changes, discuss on forums, and vote, while the Elected Council manages critical decisions through secure Gnosis Safe contracts. Each proposal undergoes a lifecycle of community feedback, off-chain voting, and on-chain governance before final execution. This DAO model empowers Threshold’s community to shape the network, fostering a transparent, user-centered ecosystem.


Source: docs.threshold.network

Threshold Network Participation: Stakers, Liquidity Providers, and Token Holders

The Threshold Network offers diverse roles for users, allowing active participation and rewards while strengthening its decentralized infrastructure. Stakers are integral to the network’s security, locking their T tokens to operate nodes and support Threshold’s cryptographic services. In return, they earn rewards, contributing to the network’s robustness. Liquidity Providers add assets to pools like Threshold (T) and tBTC, facilitating efficient trading and market-making across DeFi. This role enhances the network’s liquidity and stability, offering yield to participants. Token Holders govern, influencing protocol updates, ecosystem growth, and future developments. Holders of legacy NU or KEEP tokens can upgrade to T tokens to fully participate in Threshold’s decentralized governance and help shape its future. Together, these roles create a dynamic, user-powered network, ensuring Threshold remains community-driven and secure.


Source: threshold.network

What is the T Coin?

T is Threshold’s governance and utility token, enabling staking, liquidity, and decentralized decision-making. Its total supply is capped at 11.04 billion units, of which 9.96 billion are already in circulation (November 2024).

The T token is the native utility and governance token of the Threshold Network, designed to support decentralized cryptographic services and community-driven governance. As an ERC-20 token, T allows users to stake it to operate validator nodes, securing the network while earning rewards. Additionally, it can be added to liquidity pools to facilitate trading and earn passive income.

As a governance token, T enables holders to participate in the Threshold DAO, contributing to decision-making and ensuring the network remains decentralized and community-focused. Initially, 10 billion T tokens were allocated to the network, divided among NU and KEEP holders and the DAO treasury. In detail: 4.5 billion allocated to NU holders, 4.5 billion to KEEP holders, and 1 billion reserved for the Threshold DAO treasury.
This structure allows T token holders to drive the future of the network through DAO voting and proposals, setting it apart as a decentralized, user-centered platform.

Users who hold KEEP or NU tokens from the original Keep and NuCypher networks, which merged to form the Threshold Network, can upgrade their tokens to T.


Source: dashboard.threshold.network

Is T a Good Investment?

T appears to be a compelling project, particularly with its innovative tBTC feature, which bridges Bitcoin to Ethereum in a decentralized and permissionless way. By providing a secure way for Bitcoin holders to access Ethereum’s DeFi ecosystem, tBTC highlights Threshold’s potential in cross-chain finance. The network’s robust cryptographic foundation and community-driven governance further add to its appeal for those interested in decentralized technology.

However, as a relatively new project, Threshold’s success depends on widespread adoption and integration within the DeFi space, and its token value may be influenced by competition in the cross-chain sector.

How to Own T?

To own T, you can use the services of a centralized crypto exchange. Start by creating a Gate.io account, and get it verified and funded. Then you are ready to go through the steps to buy T.

News on Threshold

Released on the official blog on September 25, 2024, Threshold Network announced the integration of its decentralized Bitcoin bridge, tBTC, with Aave, one of the largest liquidity protocol. This milestone marks a significant step towards decentralized Bitcoin access in DeFi. In response to recent shifts in WBTC’s custody model, Threshold proposed that Aave join its Council to strengthen decentralized governance. This includes a 40 million T token delegation to Aave’s node operator, reinforcing security and decentralization while providing Bitcoin users a reliable and permissionless DeFi lending solution through tBTC.

Useful References

For the latest updates about Threshold, you can visit:

Take Action on T

Check out T price today, and start trading your favorite currency pairs.

Author: Mauro
Translator: Sonia
Reviewer(s): Matheus、Piccolo
Translation Reviewer(s): Ashely
* The information is not intended to be and does not constitute financial advice or any other recommendation of any sort offered or endorsed by Gate.io.
* This article may not be reproduced, transmitted or copied without referencing Gate.io. Contravention is an infringement of Copyright Act and may be subject to legal action.
Start Now
Sign up and get a
$100
Voucher!