The Economic Flywheel: A Structured Token Workflow

The SuperNet economic flywheel is powered by a structured, cyclical flow of the $SUPER token. This workflow is best understood as a symbiosis of the three mechanisms.

Economic Flow for $SUPER

Mechanism 1: The Security Foundation (Proof-of-Stake)

The entire economic model is predicated on a foundation of verifiable trust, established through the Proof-of-Stake (PoS) mechanism. In this initial phase, a validator locks a significant amount of $SUPER as collateral, which enables their participation in the network and earning PoS rewards, from $SUPER emissions. This act of staking is the foundational prerequisite for all network operations, providing the robust economic security and Sybil resistance upon which the subsequent phases are built. The staked capital ensures that validators are financially committed to the protocol's integrity before any computational work is performed.

Mechanism 2: The Work Phase (Proof-of-Compute)

This active phase is triggered by an application's demand for data and is governed by the Proof-of-Compute (PoC) mechanism. An application initiates a transaction by paying a fee in $SUPER to the network's task pool. This fee covers the cost of the impending computation. A staked validator then selects this task and executes the "useful work" of PoC—performing high-performance similarity searches or vector graph queries. This phase culminates in the validator successfully generating a cryptographic proof of their work while earning the computing reward coming from the $SUPER token emission.

Mechanism 3: The Value Distribution Phase (Proof-of-Context)

Once a block is finalized, the final phase of the workflow is executed by the Proof-of-Context (PoX) value distribution engine. The fees paid by the application are now transparently and programmatically distributed to the contributing parties. A significant portion is allocated to the user as a "Data Royalty," directly compensating them for the value of their sovereign context. Concurrently, the validator receives their "Compute Reward" and gas fee, rewarding them for their contribution of security and computational resources.

This structured, three-phase workflow creates a powerful and synergistic flywheel. The security of PoS enables the useful work of PoC, which in turn generates the value that is equitably distributed by PoX. Each phase logically and economically enables the next, ensuring that network utility, security, and participant rewards are perpetually and inextricably linked.

Last updated