| [Table 2] Template for white papers for crypto-assets other than asset-referenced tokens or e-money tokens | |||||
| Template for white papers for crypto-assets other than asset-referenced tokens or e-money tokens [abstract] | |||||
| General information | |||||
| 00 Table of content | boolean true | ||||
| 01 Date of notification | date | ||||
| 02 Statement in accordance with Article 6(3) of Regulation (EU) 2023/1114 | boolean true | ||||
| 03 Compliance statement in accordance with Article 6(6) of Regulation (EU) 2023/1114 | boolean true | ||||
| 04 Statement in accordance with Article 6(5), points (a), (b), (c), of Regulation (EU) 2023/1114 | boolean true | ||||
| 05 Statement in accordance with Article 6(5), point (d), of Regulation (EU) 2023/1114 | boolean true | ||||
| 06 Statement in accordance with Article 6(5), points (e) and (f), of Regulation (EU) 2023/1114 | boolean true | ||||
| SUMMARY | |||||
| 07 Warning in accordance with Article 6(7), second subparagraph, of Regulation (EU) 2023/1114 | boolean true | This summary should be read as an introduction to the crypto-asset white paper. The prospective holder should base any decision to purchase this crypto –asset on the content of the crypto-asset white paper as a whole and not on the summary alone. The offer to the public of this crypto-asset does not constitute an offer or solicitation to purchase financial instruments and any such offer or solicitation can be made only by means of a prospectus or other offer documents pursuant to the applicable national law. This crypto-asset white paper does not constitute a prospectus as referred to in Regulation (EU) 2017/1129 of the European Parliament and of the Council or any other offer document pursuant to Union or national law. |
|||
| 08 Characteristics of the crypto-asset | textBlock | Token holders will be entitled to a varied set of rights within the Protocol. For instance, Token holders may lock their Tokens for a pre-defined period to obtain veROBO, which represents their voting power within the Protocol governance and allows them to vote on proposals. The Token will also allow users to access the Protocol's services, such as data exchange, compute tasks, and API calls, by paying the corresponding fees with the Token. While transaction fees may be paid with stablecoins, they will all be settled in the Token. The Protocol will rely on a set of validators for monitoring and dispute resolutions. Validators will be required to deposit the Token through a high-value bond to participate in the Protocol. In exchange, they will be compensated with the Token, sourced from transaction fees and challenge bounties for successful fraud detection. Those who provide verified contributions to the Protocol, such as task completion, data provision, and validation work, will be rewarded with the Token. Additionally, Token holders will be able to deposit their Tokens in crowdsourced robot deployment, giving them priority access to Protocol services. Lastly, robot operators will have to deposit the Token through refundable work bonds as a guarantee of their robots' behaviour. If their robots misbehave, the deposited Tokens will be subject to slashing penalties. Token holders will be able to delegate their Tokens to robot operators, increasing their bonds, which allows them to expand their capacity and accept higher-value tasks. Any modifications to the Token's characteristics, rights, or obligations are currently managed by the Foundation and its development team. Those changes will be communicated through the Foundation's official channels and documentation. |
|||
| 09 Further information about utility tokens | textBlock | ||||
| 10 Key information about the offer to the public or admission to trading | textBlock | ||||
| Part A - Information about offeror or person seeking admission to trading | |||||
| A.1 Name | text | ||||
| A.2 Legal form | text | ||||
| A.3 Registered address | |||||
| Registered addess | text | ||||
| Country | enumeration | ||||
| Sub-division | text | ||||
| A.4 Head office | |||||
| Head office | text | ||||
| Country | enumeration | ||||
| Sub-division | text | ||||
| A.5 Registration date | date | ||||
| A.6 Legal entity identifier | LEI | ||||
| A.7 Another identifier required pursuant to applicable national law | text | ||||
| A.8 Contact telephone number | text | ||||
| A.9 E-mail address | text | ||||
| A.10 Response time (days) | integer | ||||
| A.11 Parent company | text | ||||
| A.12 Members of the management body | |||||
| Member #1 | id | 1 | |||
| Identity | text | ||||
| Business address | text | ||||
| Function | text | ||||
| Member #2 | id | 2 | |||
| Identity | text | ||||
| Business address | text | ||||
| Function | text | ||||
| A.13 Business activity | textBlock | ||||
| A.14 Parent company business activity | textBlock | ||||
| A.15 Newly established | boolean | ||||
| A.16 Financial condition for the past three years | textBlock | ||||
| A.17 Financial condition since registration | textBlock | The issuer has primarily been funded through a revolving loan facility, providing adequate financial resources to support its initial operational expenses, ongoing technological development, and project implementation. As the issuer advances and becomes operationally mature, relevant financial statements and financial performance data will be prepared and disclosed in accordance with applicable regulatory and compliance standards. |
|||
| Part B - Information about issuer, if different from offeror or person seeking admission to trading | |||||
| B.1 Issuer different from offerror or person seeking admission to trading | boolean | ||||
| B.2 Name | N/A | . | |||
| B.3 Legal form | N/A | . | |||
| B.4 Registered address | |||||
| Registered addess | N/A | . | |||
| Country | N/A | . | |||
| Sub-division | N/A | . | |||
| B.5 Head office | |||||
| Head office | N/A | . | |||
| Country | N/A | . | |||
| Sub-division | N/A | . | |||
| B.6 Registration date | N/A | . | |||
| B.7 Legal entity identifier | N/A | . | |||
| B.8 Another identifier required pursuant to applicable national law | N/A | . | |||
| B.9 Parent company | N/A | . | |||
| B.10 Members of the management body | |||||
| Member #1 | N/A | . | |||
| Identity | N/A | . | |||
| Business address | N/A | . | |||
| Function | N/A | . | |||
| B.11 Business activity | N/A | . | |||
| B.12 Parent company business activity | N/A | . | |||
| Part C - Information about the operator of the trading platform in cases where it draws up the crypto-asset white paper and information about other persons drawing the crypto-asset white paper pursuant to Article 6(1), second subparagraph, of Regulation (EU) 2023/1114 | |||||
| C.1 Name | N/A | . | |||
| C.2 Legal form | N/A | . | |||
| C.3 Registered address | |||||
| Registered address | N/A | . | |||
| Country | N/A | . | |||
| Sub-division | N/A | . | |||
| C.4 Head office | |||||
| Head office | N/A | . | |||
| Country | N/A | . | |||
| Sub-division | N/A | . | |||
| C.5 Registration date | N/A | . | |||
| C.6 Legal entity identifier | N/A | . | |||
| C.7 Another identifier required pursuant to applicable national law | N/A | . | |||
| C.8 Parent company | N/A | . | |||
| C.9 Reason for crypto-asset white paper preparation | N/A | . | |||
| C.10 Members of the management body | |||||
| Member #1 | N/A | . | |||
| Identity | N/A | . | |||
| Business address | N/A | . | |||
| Function | N/A | . | |||
| C.11 Operator business activity | N/A | . | |||
| C.12 Parent company business activity | N/A | . | |||
| C.13 Other persons drawing up the crypto-asset white paper according to Article 6(1), second subparagraph, of Regulation (EU) 2023/1114 | N/A | . | |||
| C.14 Reason for drawing the white paper by persons referred to in Article 6(1), second subparagraph, of Regulation (EU) 2023/1114 | N/A | . | |||
| Part D - Information about other token project | |||||
| D.1 Crypto-asset project name | text | ||||
| D.2 Crypto-asset name | text | ||||
| D.3 Abbreviation | text | ||||
| D.4 Crypto-asset project description | textBlock | The Protocol will involve the following actors: - Validators: Validators will be in charge of two tasks: routine monitoring, consisting of automated availability and quality checks, and dispute resolutions, consisting of investigating challenges and fraud allegations within the Protocol. To participate as validators, users will have to deposit a certain number of Tokens through a high-value bond. In return, they will be compensated with the Token, sourced from transaction fees and challenge bounties for successful fraud detection. Validators who misbehave, by failing to perform or attempting to manipulate data, will face slashing penalties. - Robot Operators: They can be both humans and autonomous robots themselves. They will use Tokens to pay for coordination services. For instance, when a robot needs data from another robot or verification of another machine's credentials, it will have to pay for it with the Tokens. Operators will also have to deposit a certain number of Tokens as collateral, through refundable work bonds, for their robot's behaviour. If a robot misbehaves by failing in a task delivery or providing false location data, the operator's deposited Tokens will get slashed. - Users: They are the ones interacting with the Protocol. Users will need the Token to access the Protocol's services. Additionally, users will be able to deposit the Token in crowdsourced robot deployment, giving them priority access to Protocol services. The Protocol will rely on a decentralised governance centred on the Token holders. To participate, they will have to lock their Tokens to obtain veROBO, which will represent their voting power. When users lock their Tokens, a voting power multiplier will be applied, with longer locking periods granting greater voting power. Governance proposals may consist of protocol parameter adjustments, quality threshold changes, verification and slashing rule modifications, or protocol upgrades. This means that governance rights are limited to protocol operations and do not extend to control over the Foundation, treasury management beyond protocol-specified rules, or distribution of assets. |
|||
| D.5 Details of all natural or legal persons involved in implementation of crypto-asset project | |||||
| Person #1 | id | 1 | |||
| Type of person | enumeration | ||||
| Name of person | text | ||||
| Business address of person | text | ||||
| Domicile of company | enumeration | ||||
| Person #2 | id | 2 | |||
| Type of person | enumeration | ||||
| Name of person | text | ||||
| Business address of person | text | ||||
| Domicile of company | enumeration | ||||
| D.6 Utility token classification | boolean | ||||
| D.7 Key features of goods or services for utility token projects | text | ||||
| D.8 Plans for the token | |||||
| Description of past milestones | textBlock | ||||
| Description of future milestones | textBlock | The Protocol's development is structured in three phases: - Prototyping: The Protocol will be deployed on Ethereum. This phase's focus will be on data collection to improve models and developing software to prioritise human-machine alignment and coordination. Where it is possible, the Protocol will reuse existing open-source components. - Testnet Launch: All needed functionality must have an open-source alternative to increase the stack's resilience. During this phase, the L1 specification must be completed, and the testnet will be launched. Early contributors will be rewarded during this phase. - L1 Mainnet: The L1 mainnet goes live, with the goal of achieving sustainable operations through L1 gas fees, robot tasking, and service revenue. The Protocol's 2026 roadmap includes the following quarterly milestones: - Q1 2026: Deploy the initial components of the Protocol to support robot identity, task settlement, and structured data collection. Begin collecting real-world operational data from active robot usage. - Q2 2026: Introduce contribution-based incentives tied to verified task execution and data submission. Expand data collection across additional robot platforms and broaden App Store participation among developers. - Q3 2026: Extend incentives to support more complex tasks and sustained usage. Scale data pipelines to improve coverage and quality. Support multi-robot workflows in selected real-world scenarios. - Q4 2026: Refine incentive mechanisms and data systems based on performance feedback. Improve reliability, throughput, and operational stability. Prepare the Protocol for larger-scale deployments. - Beyond 2026: Progress toward a machine-native L1 informed by accumulated data and real-world usage. Support continued expansion of autonomous coordination across robots, data, and skills. Additionally, the Protocol will execute Token buybacks. Initially, 20% of the Protocol's revenue will be used to acquire the Token in the open market. |
|||
| D.9 Resource allocation | text | The ROBO project is supported by a dedicated and multidisciplinary team of specialists, including experts in robotics development, blockchain engineering, decentralised infrastructure integration, cybersecurity, compliance, legal advisory, and strategic marketing. Technical infrastructure resources, encompassing decentralised infrastructure, cloud computing environments, robotics inference and training resources, and strategic partnerships, have been established to underpin the platform's operational efficiency, scalability, and continued expansion. These allocated resources position ROBO effectively to achieve the technological and strategic objectives outlined within this crypto-asset whitepaper, ensuring strong project foundations and sustainable future development. |
|||
| D.10 Planned use of collected funds or other tokens | text | - Legal and regulatory structuring for token issuance and exchange listings. - Development and deployment of the token smart contracts. - Market maker engagement and exchange listing fees. |
|||
| Part E - Information about offer to public of other tokens or their admission to trading | |||||
| E.1 Public offering or admission to trading | enumeration | ||||
| E.2 Reasons for public offer or admission to trading | textBlock | ||||
| E.3 Fundraising target | |||||
| Target expressed in currency | monetary | EUR | |||
| Target expressed in units | decimal | ||||
| Target expressed in digital token identifier | text | ||||
| E.4 Minimum subscription goals | |||||
| Goals expressed in currency | monetary | EUR | |||
| Goals expressed in units | decimal | ||||
| Goals expressed in digital token identifier | text | ||||
| E.5 Maximum subscription goals | |||||
| Goasl expressed in currency | monetary | EUR | |||
| Goals expressed in units | decimal | ||||
| Goals expressed in digital token identifier | text | ||||
| E.6 Oversubscription acceptance | boolean | ||||
| E.7 Oversubscription allocation | text | ||||
| Issue price details | |||||
| E.8 Issue price | decimal | ||||
| E.9 Official currency determining issue price | enumeration | ||||
| E.9 Any other tokens determining issue price | text | ||||
| E.10 Subscription fee | |||||
| Fee expressed in currency | monetary | EUR | |||
| Fee expressed in units | decimal | ||||
| Fee expressed in digital token identifier | text | ||||
| E.11 Offer price determination method | text | ||||
| E.12 Total number of offered or traded other tokens | integer | ||||
| E.13 Targeted holders | enumeration | ||||
| E.14 Holder restrictions | text | ||||
| E.15 Reimbursement notice | boolean true | ||||
| E.16 Refund mechanism | textBlock | ||||
| E.17 Refund timeline | text | ||||
| E.18 Offer phases | textBlock | ||||
| E.19 Early purchase discount | textBlock | ||||
| E.20 Time-limited offer | boolean | ||||
| E.21 Subscription period beginning | date | ||||
| E.22 Subscription period end | date | ||||
| E.23 Safeguarding arrangements for offered funds or other tokens | textBlock | ||||
| E.24 Payment methods for other token purchase | textBlock | ||||
| E.25 Value transfer methods for reimbursement | textBlock | ||||
| E.26 Right of withdrawal | textBlock | ||||
| E.27 Transfer of purchased other tokens | textBlock | ||||
| E.28 Transfer time schedule | text | ||||
| E.29 Purchaser's technical requirements | textBlock | - A compatible digital wallet or account on supported exchange; - Internet access; - A device (computer or mobile) to manage digital wallet/private key and/or account on exchange to carry out transactions |
|||
| Other token services provider characteristics | |||||
| E.30 Other token service provider (CASP) name | text | ||||
| E.31 CASP identifier | LEI | ||||
| E.32 Placement form | enumeration | ||||
| Trading platforms characteristics | |||||
| E.33 Trading platforms name | text | - Binance - Bybit - Bitget - Bitumb - Bitvavo - Bitstamp - Bitpanda - Coinbase - Crypto.com - Gate.io - Gemini - Kraken - Kucoin - Mexc - OKX - Revolut - Upbit |
|||
| E.34 Trading platforms market identifier code (MIC) | text | ||||
| E.35 Trading platforms access | text | ||||
| E.36 Involved costs | textBlock | ||||
| E.37 Offer expenses | textBlock | ||||
| E.38 Conflicts of interest | textBlock | ||||
| E.39 Applicable law | textBlock | ||||
| E.40 Competent court | textBlock | ||||
| Part F - Information about other tokens | |||||
| F.1 Crypto-asset type | text | ||||
| F.2 Other token functionality | textBlock | The Token qualifies as a crypto-asset within the meaning of MiCA, as it a digital representation of the right to access the Protocol and participate in the Protocol's governance. The Token can be transferred and stored using the distributed ledger technology ("DLT"). The Token facilitates Token holders' interaction with the Protocol by displaying the following functionalities: - Governance: Token holders will be able to lock their Tokens to obtain veROBO, which represents their voting power, and cast their vote on governance proposals. - Staking: To participate as validators, it will be required to stake a certain number of Tokens through a high-value bond. - Payments: Validators will be compensated with the Token in exchange for securing the Protocol. The Token will be used to pay for the Protocol transaction fees for services like data exchange, compute tasks, and API calls. While users will be able to pay transaction fees with stablecoins, they will be settled/converted to the Token through on-chain oracles. - Rewards: The Token will be used to reward users who provide verified contributions to the Protocol, such as task completion, data provision, and validation work. - Deposits: Robot operators will have to deposit the Token, through refundable bonds, as a guarantee of their robots' behaviour, subject to slashing penalties if robots misbehave. Moreover, Token holders will be able to deposit their Tokens to crowdsource robots to the network. - Delegations: Token holders will be able to delegate their tokens to increase operators' bonds, allowing them to increase their capacity to accept high-value tasks. - Access: Those who participate in robot crowdsourcing will have priority access to Protocol services. |
|||
| F.3 Planned application of functionalities | textBlock | ||||
| A description of the characteristics of the other token, including the data necessary for classification of the crypto-asset white paper in the register referred to in Article 109 of Regulation (EU) 2023/1114, as specified in accordance with paragraph 8 of that Article | |||||
| F.4 Type of crypto-asset white paper | enumeration | ||||
| F.5 Type of submission | enumeration | ||||
| F.6 Other token characteristics | textBlock | Token holders will be entitled to a varied set of rights within the Protocol. For instance, Token holders may lock their Tokens for a pre-defined period to obtain veROBO, which represents their voting power within the Protocol governance and allows them to vote on proposals. The Token will also allow users to access the Protocol's services, such as data exchange, compute tasks, and API calls, by paying the corresponding fees with the Token. While transaction fees may be paid with stablecoins, they will all be settled in the Token. The Protocol will rely on a set of validators for monitoring and dispute resolutions. Validators will be required to deposit the Token through a high-value bond to participate in the Protocol. In exchange, they will be compensated with the Token, sourced from transaction fees and challenge bounties for successful fraud detection. Those who provide verified contributions to the Protocol, such as task completion, data provision, and validation work, will be rewarded with the Token. Additionally, Token holders will be able to deposit their Tokens in crowdsourced robot deployment, giving them priority access to Protocol services. Lastly, robot operators will have to deposit the Token through refundable work bonds as a guarantee of their robots' behaviour. If their robots misbehave, the deposited Tokens will be subject to slashing penalties. Token holders will be able to delegate their Tokens to robot operators, increasing their bonds, which allows them to expand their capacity and accept higher-value tasks. Any modifications to the Token's characteristics, rights, or obligations are currently managed by the Foundation and its development team. Those changes will be communicated through the Foundation's official channels and documentation. |
|||
| F.7 Commercial name or trading name | text | ||||
| F.8 Website of the issuer | text | ||||
| F.9 Starting date of offer to the public or admission to trading | date | ||||
| F.10 Publication date | date | ||||
| F.11 Any other services provided by the issuer | textBlock | ||||
| F.12 Language or languages of white paper | text | ||||
| F.13 Digital token identifier code used to uniquely identify the crypto-asset or each of the several crypto assets to which the white paper relates, where available | text | ||||
| F.14 Functionally fungible group digital token identifier, where available | text | ||||
| F.15 Voluntary data flag | boolean | ||||
| F.16 Personal data flag | boolean | ||||
| F.17 LEI eligibility | boolean | ||||
| F.18 Home member state | enumeration | ||||
| F.19 Host member states #1 | enumerationSet | ||||
| F.19 Host member states #2 | enumerationSet | ||||
| F.19 Host member states #3 | enumerationSet | ||||
| F.19 Host member states #4 | enumerationSet | ||||
| F.19 Host member states #5 | enumerationSet | ||||
| F.19 Host member states #6 | enumerationSet | ||||
| F.19 Host member states #7 | enumerationSet | ||||
| F.19 Host member states #8 | enumerationSet | ||||
| F.19 Host member states #9 | enumerationSet | ||||
| F.19 Host member states #10 | enumerationSet | ||||
| F.19 Host member states #11 | enumerationSet | ||||
| F.19 Host member states #12 | enumerationSet | ||||
| F.19 Host member states #13 | enumerationSet | ||||
| F.19 Host member states #14 | enumerationSet | ||||
| F.19 Host member states #15 | enumerationSet | ||||
| F.19 Host member states #16 | enumerationSet | ||||
| F.19 Host member states #17 | enumerationSet | ||||
| F.19 Host member states #18 | enumerationSet | ||||
| F.19 Host member states #19 | enumerationSet | ||||
| F.19 Host member states #20 | enumerationSet | ||||
| F.19 Host member states #21 | enumerationSet | ||||
| F.19 Host member states #22 | enumerationSet | ||||
| F.19 Host member states #23 | enumerationSet | ||||
| F.19 Host member states #24 | enumerationSet | ||||
| F.19 Host member states #25 | enumerationSet | ||||
| F.19 Host member states #26 | enumerationSet | ||||
| F.19 Host member states #27 | enumerationSet | ||||
| F.19 Host member states #28 | enumerationSet | ||||
| F.19 Host member states #29 | enumerationSet | ||||
| Part G - Information on rights and obligations attached to other tokens | |||||
| G.1 Purchaser rights and obligations | textBlock | - Governance: Token holders will be able to lock their Tokens to obtain veROBO, which represents their voting power, and cast their vote on governance proposals. - Payments: The Token will be used to pay for the Protocol transaction fees for services like data exchange, compute tasks, and API calls. While users will be able to pay transaction fees with stablecoins, they will be settled/converted to the Token through on-chain oracles. - Staking: To participate as validators, users will be required to stake a certain number of Tokens through a high-value bond. Validators will be compensated with the Token in exchange for securing the Protocol. - Rewards: The Token will be used to reward users who provide verified contributions to the Protocol, such as task completion, data provision, and validation work. - Deposits: Robot operators will have to deposit the Token through refundable bonds as a guarantee of their robots' behaviour, subject to slashing penalties if robots misbehave. Additionally, Token holders will be able to deposit their Tokens to crowdsource robots to the network. - Delegations: Token holders will be able to delegate their Tokens to increase operators' bonds, allowing operators to expand their capacity and accept higher-value tasks. - Access: Those who participate in robot crowdsourcing will have priority access to Protocol services. |
|||
| G.2 Exercise of rights and obligations | textBlock | - Governance: To exercise their right to participate in the Protocol's governance, Token holders must lock their Tokens for a pre-defined period to obtain veROBO. Then, they will be able to cast their vote on governance proposals. - Payments: To exercise their right to pay for Protocol transaction fees, Token holders must interact with the Protocol's services, such as data exchange, compute tasks, and API calls. Users may also pay transaction fees with stablecoins, which will be settled/converted to the Token through on-chain oracles. - Staking: To exercise their right to participate as validators, Token holders must deposit a certain number of Tokens through a high-value bond and perform validation tasks. - Compensation: To be compensated with the Token, validators will have to correctly and timely perform validation tasks. - Rewards: To exercise their right to receive Token rewards, users must provide verified contributions to the Protocol, such as completing tasks, providing data, or performing validation work. - Deposits: To exercise their right to deposit the Token as collateral, Token holders must be robot operators and deposit the Token through refundable work bonds as a guarantee of their robots' behaviour. Additionally, to exercise their right to crowdsource robots, Token holders must deposit their Tokens in crowdsourced robot deployment. - Delegations: To exercise their right to delegate Tokens, Token holders must select robot operators and delegate their Tokens to increase those operators' bonds. - Access: To exercise their right to priority access to Protocol services, Token holders must participate in robot crowdsourcing by depositing Tokens in crowdsourced robot deployment. |
|||
| G.3 Conditions for modifications of rights and obligations | textBlock | ||||
| G.4 Future public offers | textBlock | ||||
| G.5 Issuer retained other token | integer | ||||
| G.6 Utility token classification | boolean | ||||
| G.7 Key features of goods or services utility tokens | text | ||||
| G.8 Utility tokens redemption | text | ||||
| G.9 Non-trading request | boolean | ||||
| G.10 Other tokens purchase or sale modalities | text | ||||
| G.11 Other tokens transfer restrictions | text | ||||
| G.12 Supply adjustment protocols | boolean | ||||
| G.13 Supply adjustment mechanisms | text | ||||
| Other token schemes details | |||||
| G.14 Token value protection schemes | boolean | ||||
| G.15 Token value protection schemes description | textBlock | ||||
| G.16 Compensation schemes | boolean | ||||
| G.17 Compensation schemes description | textBlock | ||||
| G.18 Applicable law | textBlock | ||||
| G.19 Competent court | textBlock | ||||
| Part H – Information on underlying technology | |||||
| H.1 Distributed ledger technology (DTL) | text | ||||
| H.2 Protocols and technical standards | text | ||||
| H.3 Technology used | textBlock | ||||
| H.4 Consensus mechanism | text | ||||
| H.5 Incentive mechanisms and applicable fees | text | ||||
| H.6 Use of distributed ledger technology | boolean | ||||
| H.7 DLT functionality description | textBlock | ||||
| Other token audit details | |||||
| H.8 Audit | boolean | ||||
| H.9 Audit outcome | textBlock | ||||
| Part I - Information on risks | |||||
| I.1 Offer-related risks | textBlock | - Regulatory Compliance Risks: Although the Token is designed to comply with existing regulations (such as MiCA), evolving regulatory landscapes could impact its classification, trading status, or market/ community acceptance. Changes in regulatory requirements may necessitate modifications to its operation, structure, or governance. Token holders must ensure compliance with local laws, as regulatory treatment of crypto-assets varies across jurisdictions. - Market Volatility: The Token is subject to extreme price fluctuations, influenced by market speculation, investor sentiment, and broader industry trends. External factors, such as regulatory announcements or technological developments, may further contribute to volatility, potentially leading to financial losses for holders. - Liquidity Risks: The ability to buy, sell or otherwise transact Tokens depends on activity on decentralised exchanges ("DEXs") and centralised exchanges ("CEXs"). Limited liquidity may result in difficulties executing large trades without significant price impact, increasing the risk of loss. - Risk of Trading Platforms: When Token holders trade on Exchanges, the Person Seeking Admission to Trading does not act as a contractual party to these transactions. All legal relationships regarding these trading platforms are subject to their respective terms and conditions, with no responsibility assumed by the Person Seeking Admission to Trading for their operations, services, or outcomes. - Risk of Delisting: There is no guarantee that the Token will remain listed on any exchange. Delisting could significantly hinder the ability to trade Tokens, reducing liquidity and market value. - Risk of Bankruptcy: The Exchanges where the Token is listed may become insolvent or cease operations, potentially resulting in a loss of access to funds or Tokens. - Legal Risks: Uncertainties in legal frameworks, regulatory changes, potential lawsuits, or adverse legal rulings could pose significant risks, affecting the legality, usability, or value of the Token. - Reputational Risks: Negative publicity – whether due to operational failures, security breaches, or associations with illicit activities – could damage the Token issuers' reputation and, by extension, impact the value and acceptance of the Token. - Investor Vesting Risks: While Tokens allocated to the team and other stakeholders may be subject to a vesting schedule to prevent "rug pulls" and conflicts of interest, the unlocking of Tokens over time could affect supply and demand trends and liquidity. - Unanticipated Risks: There may be additional risks that cannot be foreseen. Some risks may materialise as unexpected variations or combinations of the factors discussed in this section. |
|||
| I.2 Issuer-related risks | textBlock | ||||
| I.3 Other tokens-related risks | textBlock | - Market Volatility Risks: The Token's value is highly volatile and may fluctuate due to market speculation, investor sentiment, regulatory developments, and technological advancements. External factors, such as shifting trends in the crypto industry, changing demand for blockchain services, or macroeconomic conditions, could contribute to extreme price fluctuations, potentially leading to total depreciation. - Speculative Nature: No assurances of future value, performance, or rewards are made regarding the Token. Other than as stated herein within this whitepaper regarding its rights and functions, the Token has no inherent or guaranteed utility beyond its role in the Project, and its valuation depends entirely on user adoption, demand, and community engagement. If adoption of the Project fails to grow as expected, the Token's value may be significantly impacted. - Liquidity Risks: The ability to trade the Token depends on the level of activity on DEXs and CEXs. Low trading volume may result in difficulties executing large transactions without significant price impact. Limited demand for the Token or the underlying protocol may further reduce liquidity, making it difficult to acquire, sell or otherwise transact with the Token. Adoption and Network Demand Risks: The long-term success of the Token is dependent on widespread adoption of the Project. Adoption is influenced by various external factors, including user demand, competitive economic conditions, and organic community-driven expansion. The Person Seeking Admission to Trading has no control over the pace of adoption, and there is no guarantee that the Project will gain sufficient traction to sustain its economic model. If demand is too low, obtaining services through the Project may be difficult, while an inadequate supply may lead to delays in accessing services. - Blockchain Dependency Risks: The Token operates exclusively on its underlying blockchain network. Any disruptions, such as network congestion, downtime, or security vulnerabilities, could impact the ability to transfer, store, or trade the Token. Changes to blockchain infrastructure, governance, or transaction fees may also influence the Token's usability and cost-effectiveness. - Transaction Costs: While blockchain fees are generally low, network congestion, high demand, or changes in blockchain fee structures may increase transaction costs, potentially reducing the economic viability of using the Token within the Project. - Security Risks: - Smart Contract Vulnerabilities: Despite security best practices, unforeseen vulnerabilities in smart contracts could lead to security breaches, impacting Token security or functionality. - Private Key Management: Token holders are solely responsible for safeguarding their private keys and recovery phrases. Loss of wallet credentials will result in the permanent loss of Tokens, as blockchain transactions are irreversible. - Scam and Fraud Risks: Token holders are exposed to risks associated with scams, phishing attacks, fake giveaways, impersonation of the Token issuer/offeror or its team, counterfeit Tokens, and fraudulent airdrops. Engaging with unverified third-party platforms or unofficial communications increases the risk of fraud. - Community and Narrative Risks: The Token's success is closely tied to community interest and the broader crypto narrative. Macroeconomic trends, emerging competitors, or declining community engagement may negatively impact the Token's perceived value and adoption. - Regulatory and Compliance Risks: - Evolving Legal Frameworks: Regulations governing crypto-assets differ across jurisdictions and are subject to change. New legal requirements may impact the Token's classification, availability, or functionality. - Jurisdictional Restrictions: Some jurisdictions may impose restrictions or prohibitions on the trading or use of the Token, limiting its accessibility for certain users. - Regulatory Harmonisation Risks: A lack of global regulatory alignment may create uncertainty, with some authorities potentially classifying the Token as a security or financial instrument, leading to increased compliance costs and legal obligations. - Regulatory Enforcement Risks: Government agencies may take enforcement actions against the Token issuer f the Token is deemed an unregistered security or if other financial laws are found to have been violated. Such actions could negatively impact the Token's availability, appeal, and value. - Anti-Money Laundering ("AML") & Counter-Terrorism Financing ("CTF") Risks: Crypto transactions may be scrutinised for potential links to illicit activities. Authorities may take action against wallets or platforms suspected of facilitating money laundering or terrorist financing, affecting the ability of Token holders to use or trade their assets. - Taxation Risks: The tax treatment of the Token varies by jurisdiction, and Token holders are solely responsible for understanding and complying with applicable tax laws. Any appreciation, conversion, or sale of the Token may trigger tax obligations that differ depending on the regulatory environment. -Team Vesting and Token Release Risks: Tokens allocated to the team and other stakeholders may be subject to a vesting and unlock schedule. When these Tokens are vested, unlocked, and released into circulation, they may affect demand trends and liquidity . Technological Obsolescence Risks: The blockchain and crypto industries evolve rapidly. The emergence of new technologies, changes in market demand, or advancements in competing protocols could render the Token or its underlying blockchain infrastructure less competitive, reducing adoption and utility. - Software Weakness Risks: The Token's infrastructure relies on relatively new blockchain technologies, which may contain undiscovered bugs, vulnerabilities, or inefficiencies. There is no guarantee that the process of transacting, storing, or interacting with the Token will be uninterrupted or error-free. - Unanticipated Risks: Beyond the risks outlined above, additional unforeseen risks may emerge due to changes in regulatory, technological, or macroeconomic conditions, potentially affecting the Token's security, functionality, or value. |
|||
| I.4 Project implementation-related risks | textBlock | - Technical Development Risks: - Smart Contract Issues: Despite robust security measures, unforeseen vulnerabilities or bugs in the smart contracts could disrupt Token distribution, refunds, or vesting mechanisms. - Blockchain Dependency: The Token operates exclusively on its underlying blockchain. Any network congestion, downtime, or security breaches could impact the project's implementation and functionality. - Risk of Security Weaknesses in Core Infrastructure: The project relies on open-source software, which may be modified by third parties not directly affiliated with the Issuer. Weaknesses or bugs introduced into the core infrastructure could compromise security and lead to the loss of digital assets. Furthermore, malfunctions or inadequate maintenance of the Network may negatively impact the Token's usability. - Bugs in Core Blockchain Code: Even with rigorous testing, unknown bugs may exist in the blockchain protocol, potentially leading to disruptions, incorrect transaction processing, or security vulnerabilities. - Regulatory and Compliance Risks: - Regulatory Actions in One or More Jurisdictions: The Token and the underlying Project could be impacted by regulatory inquiries or actions, which may restrict further development, implementation, or usage. - Evolving Laws and Regulations: New and changing laws related to financial securities, consumer protection, data privacy, cybersecurity, and intellectual property could impact the project. Compliance with these laws may require significant resources and could impose additional operational constraints. - Governance Risk: Decision-making mechanisms in blockchain governance may be inefficient, slow, or disproportionately influenced by specific stakeholders, leading to potential centralisation or unfavourable network changes. - Operational Risks: - Resource Allocation: The project's success depends on the issuer of the Token and its core team allocating sufficient resources (both financial and non-financial) to ensure timely development and deployment. Poor resource management could lead to delays or failure to achieve key milestones. - Team Vesting Risks: While the team's Tokens may be subject to a vesting and unlock schedule to align interests with the community, the eventual vesting and unlocking of these Tokens may impact market stability or long-term commitment from team members. - Market Adoption Risks: - Competitive Environment: The crypto industry is highly competitive and trend-driven. There is a risk that the Token may fail to capture sufficient interest, limiting its adoption. - Community Engagement Risks: The success of the Token depends heavily on community-driven sentiment and engagement. Failure to build or sustain an active community could hinder growth and long-term tradability - Timeline and Milestone Risks: - Delayed Milestones: Key deliverables such as Token distribution and liquidity access may face delays due to technical, operational, or funding challenges. - CEX Listing Risks: Listings on centralised exchanges depend on securing the necessary funding for listing fees and meeting platform-specific requirements. Delays or insufficient resources could postpone broader market/ community access. - Ecosystem Risks: - Dependence on External Partners: The project relies on partnerships with infrastructure providers, liquidity providers/ market makers, exchanges and other third-party service providers. Any failure or delay from these partners could disrupt implementation plans. - Risk of Withdrawing Partners: The Token holder understands that the feasibility of the project depends strongly on the collaboration of service providers and other key stakeholders. A loss of critical partnerships could impact project sustainability. - Technology and Software Risks: - Risk of Software Weakness: The Token holder acknowledges that blockchain and smart contract technologies are still evolving. There is no guarantee that Token usage will be uninterrupted or error-free. Vulnerabilities in the underlying blockchain, smart contracts, or supporting technologies could lead to the complete loss of Tokens or their functionality. - Dependency on Underlying Technology: The Network relies on blockchain infrastructure, hardware, and network connectivity, all of which may be subject to failures, outages, or vulnerabilities. - Risk of Technological Disruption: The emergence of new technology, such as quantum computing, could undermine the security of blockchain encryption and compromise the integrity of digital assets. - Network Security Risks: - Network Attacks and Cybersecurity Threats: Blockchain networks can be vulnerable to cyberattacks such as 51% attacks, Sybil attacks, or distributed denial-of-service ("DDoS") attacks. These threats could disrupt network operations and compromise security. - Blockchain Network Attacks: The Network may be subject to validation attacks, including double-spend attacks, reorganisations, majority mining power attacks, "vampire" attacks and work race condition attacks. Successful attacks could compromise the proper execution of transactions and smart contracts. - Privacy and Anonymity Risks: - Public Ledger Transparency: Blockchain transactions are recorded on a public ledger, which may expose transaction history and financial activity. Certain transactions could be linked to specific wallet addresses, making users vulnerable to fraud, phishing attacks, or targeted scams. - Economic and Governance Risks: - Consensus Failures or Forks: Errors in the consensus mechanism could lead to forks, where multiple versions of the ledger coexist, or network halts, reducing trust in the network. - Economic Self-Sufficiency: The long-term sustainability of the Token ecosystem depends on sufficient transaction volume to generate fees to support rewards for validators, which in turn maintain network security. A lack of adoption could lead to governance-driven changes to monetary policy, fee structures, or consensus mechanisms. - Incentive Model Risks: Changes to block rewards, staking incentives, or governance models may be required to maintain network participation. Governance decisions could result in modifications that impact Token holders, including inflationary adjustments, transaction fees, or redistribution of rewards. - Software Weakness Risks: - Unforeseen Bugs and Security Vulnerabilities: The Token and its supporting infrastructure rely on blockchain technologies that may still be evolving. There is no guarantee that Token transactions will be uninterrupted or error-free. Software vulnerabilities, weaknesses in smart contracts, or infrastructure issues may result in loss of assets, security breaches, or unexpected network failures. – Unanticipated Risks: - Unforeseen Regulatory, Technological, or Economic Challenges: In addition to the risks identified, new threats may emerge due to changes in legal, technological, or economic conditions. Developments such as regulatory crackdowns, unforeseen vulnerabilities, or disruptive innovations could impact the usability, security, or value of the Token in ways not currently foreseeable. |
|||
| I.5 Technology-related risks | textBlock | - Blockchain Dependency Risks: - Network Downtime and Congestion: The Token relies entirely on its underlying blockchain network, which may experience outages, congestion, or downtime. Such events could disrupt Token transfers, trading, or other functionalities. - Scalability Challenges: As transaction volume grows, the blockchain network may face scaling limitations. Increased congestion could lead to slower transaction processing times and higher fees, reducing efficiency and usability. - Settlement and Transaction Finality Risks: Blockchain transactions are designed to be irreversible; however, under exceptional circumstances such as network forks or consensus failures, there remains a theoretical risk that transactions could be reversed, or multiple competing ledger versions could persist. Transactions sent to an incorrect address are not recoverable, leading to permanent loss of assets. - Smart Contract Risks: - Vulnerabilities: While smart contracts are developed with security measures, undiscovered vulnerabilities or exploits may impact Token security, distribution, or access. Bugs in the contract code may lead to unintended loss of Tokens, unauthorised transactions, or exposure to external attacks. Immutability Risks: Once deployed, some smart contracts cannot be altered. Errors or security flaws in the code could result in operational failures without the possibility of corrections. - Security Exploits: Bugs or vulnerabilities in smart contracts may expose the Token ecosystem to potential hacks, allowing attackers to manipulate transactions, drain liquidity, or disrupt contract execution. - Network Security Risks: - Risk of Attacks and Forks: The blockchain may be susceptible to consensus-related attacks, such as double-spend attacks, majority validation power takeovers, censorship attacks, or forks. These risks could affect Token transactions, balance integrity, and overall network security. - Cybercrime and Theft Risks: Despite security efforts, blockchain-based assets and services may be exposed to cyberattacks, including hacking, phishing, or malware threats. Compromised wallets, exchanges, or smart contracts could lead to asset theft, loss of funds, or disruptions in Token functionality. - Data Corruption Risks: The reliability of blockchain data could be compromised due to software bugs, human error, or deliberate tampering. Such incidents may affect transaction records, network integrity, and user confidence in the system. Wallet and Storage Risks: - Private Key Management: Token holders are solely responsible for securing their private keys and recovery phrases. The loss of private keys results in irreversible loss of Tokens, as blockchain transactions are final and cannot be undone. - Compatibility Issues: The Token is supported only by blockchain-compatible wallets. Incompatibility with specific wallet software, network malfunctions, or wallet provider shutdowns may affect access to and usability of the Token. - Ecosystem Dependency Risks: - DEX and CEX Integration Issues: The Token's availability depends on integration with DEXs and CEXs. Technical failures, security breaches, or delisting from these platforms could limit liquidity, disrupt trading, and reduce Network accessibility. - Reliance on Third-Party Services: Many blockchain services, including wallets, bridges, and oracles, depend on third-party providers. Failures, security breaches, or regulatory actions against these services could negatively affect the functionality of the Token. - Centralisation Concerns: Although blockchain networks are designed to be decentralised, a small number of validators or node operators could introduce centralisation risks. This may lead to potential censorship, control over transactions, or increased vulnerability to governance attacks. - Software and Protocol Risks: - Bugs in Core Blockchain Code: Despite rigorous testing, undiscovered bugs in the core blockchain protocol could lead to network failures, incorrect transaction processing, or security vulnerabilities. A failure to address such issues promptly could result in loss of user confidence and network instability. - Risk of Technological Disruption: Emerging technologies, such as quantum computing, could potentially compromise blockchain encryption, making networks vulnerable to attacks that could compromise data integrity or enable unauthorised asset transfers. - Dependency on Underlying Technology: The stability of the Token ecosystem relies on underlying technical infrastructures, including internet connectivity, computing hardware, and cryptographic algorithms. Disruptions in these foundational technologies may impact network security and operational efficiency. - Privacy and Anonymity Risks: - Public Ledger Transparency: Blockchain transactions are recorded on a publicly accessible ledger, which may expose sensitive transaction data. While addresses do not directly reveal identities, sophisticated data analysis could potentially link certain transactions to specific individuals or entities. - Exposure to Fraud and Targeted Attacks: Increased transparency may lead to risks such as phishing, fraud, or unauthorised tracking of user activity by malicious actors. Individuals with significant Token holdings may be targeted for scams or social engineering attacks. - Economic and Network Viability Risks: - Economic Self-Sufficiency: The long-term sustainability of the Token ecosystem depends on maintaining sufficient transaction volume to generate rewards for incentivising validators to ensure network security. If network adoption remains low, there is a risk of reduced validator participation, increased transaction costs, or a need for governance-driven changes to monetary policy, fee structures, or consensus mechanisms. - Incentive Model Risks: Changes to block rewards, staking incentives, or governance models may be required to ensure ongoing network security and sustainability. Governance proposals may introduce modifications that impact Token holders, including inflation adjustments, transaction fees, or redistribution of rewards. - Software Weakness Risks: - Unforeseen Bugs and Security Vulnerabilities: The Token and its supporting infrastructure rely on blockchain technologies that may still be evolving. There is no guarantee that Token transactions will be uninterrupted or error-free. Software vulnerabilities, weaknesses in smart contracts, or infrastructure issues may result in loss of assets, security breaches, or unexpected network failures. - Unanticipated Risks: - Unforeseen Regulatory, Technological, or Economic Challenges: In addition to the risks identified, new threats may emerge due to changes in legal, technological, or economic conditions. Developments such as regulatory crackdowns, unforeseen Network vulnerabilities, or disruptive innovations could impact the usability, security, or value of the Token in ways not currently foreseeable. |
|||
| I.6 Mitigation measures | textBlock | ||||
| Part J - Information on the sustainability indicators in relation to adverse impact on the climate and other environment-related adverse impacts | |||||
| J.1 Adverse impacts on climate and other environment-related adverse impacts | textBlock | For the period 24 January 2026 to 24 January 2027, the estimated annual energy consumption attributable to the crypto-asset is 174.23931 kWh, calculated using a conservative bottom-up methodology that allocates a proportion of Ethereum's network energy use based on expected transaction activity. The estimated energy intensity per transaction is 0.00006 kWh. The estimated share of renewable energy used in network operations is 31.81%, based on node location analysis and publicly available global energy datasets. Scope 1 GHG emissions are negligible, while Scope 2 emissions are estimated at 0.05799 tCO₂e per year, resulting in a GHG intensity of 0.00002 kgCO₂e per transaction. Overall, the use of Proof-of-Stake materially limits adverse climate and environmental impacts compared to proof-of-work systems. Conservative assumptions have been applied to avoid underestimating potential environmental impacts. |
|||
| Mandatory information on principal adverse impacts on the climate and other environment-related adverse impacts of the consensus mechanism | |||||
| General information about adverse impacts | |||||
| S.1 Name | text | ||||
| S.2 Relevant legal entity identifier | text | ||||
| S.3 Name of the crypto-asset | text | ||||
| S.4 Consensus mechanism | text | ||||
| S.5 Incentive mechanisms and applicable fees | text | ||||
| S.6 Beginning of period to which disclosed information relates | date | ||||
| S.7 End of period to which disclosed information relates | date | ||||
| Mandatory key indicator | |||||
| S.8 Energy consumption | energy (kWh) | ||||
| Sources and methodologies | |||||
| S.9 Energy consumption sources and methodologies | textBlock | ||||
| Supplementary information on principal adverse impacts on climate and other environment-related adverse impacts of consensus mechanism | |||||
| Supplementary key indicators | |||||
| S.10 Renewable energy consumption | percent | ||||
| S.11 Energy intensity | energy (kWh) | ||||
| S.12 Scope 1 DLT GHG emissions - controlled | GHG emissions (tCO2e) | ||||
| S.13 Scope 2 DLT GHG emissions - purchased | GHG emissions (tCO2e) | ||||
| S.14 GHG intensity | GHG emissions (tCO2e) | ||||
| Sources and methodologies | |||||
| S.15 Key energy sources and methodologies | textBlock | ||||
| S.16 Key GHG sources and methodologies | textBlock | ||||
| Optional information on principal adverse impacts on the climate and on other environment-related adverse impacts of the consensus mechanism | |||||
| Optional indicators | |||||
| S. 17 Energy mix | percent | ||||
| S.18 Energy use reduction | |||||
| Energy use reduction target (absolute value) | energy (kWh) | ||||
| Energy use reduction target (percentage) | percent | ||||
| S.19 Carbon intensity (kgCO2e/kWh) | decimal | ||||
| S.20 Scope 3 DLT GHG emissions - value chain | GHG emissions (tCO2e) | ||||
| S.21 GHG emissions reduction targets or commitments | textBlock | ||||
| S.22 Generation of waste electrical and electronic equipment (WEEE) | mass (tonnes) | ||||
| S.23 Non-recycled WEEE ratio | percent | ||||
| S.24 Generation of hazardous waste | mass (tonnes) | ||||
| S.25 Generation of waste (all types) | mass (tonnes) | ||||
| S.26 Non-recycled waste ratio (all types) | percent | ||||
| S.27 Waste intensity (all types) | mass (tonnes) | ||||
| S.28 Waste reduction targets or commitments (all types) | textBlock | ||||
| S.29 Impact of use of equipment on natural resources | textBlock | ||||
| S.30 Natural resources use reduction targets or commitments | textBlock | ||||
| S.31 Water use | volume (m3) | ||||
| S.32 Non recycled water ratio | percent | ||||
| Sources and methodologies | |||||
| S.33 Other energy sources and methodologies | textBlock | ||||
| S.34 Other GHG sources and methodologies | textBlock | ||||
| S.35 Waste sources and methodologies | textBlock | ||||
| S.36 Natural resources sources and methodologies | textBlock | ||||