# What is the $NAORIS Token used for?

### Overview

Naoris Protocol is driven by a device-to-device 'proof of trust' community economic model which incetivizes the security of the Decentralization Post-Qunatum Infrastructure&#x20;

It rewards users with $NAORIS for participating in the successful validation of mesh devices and for contributing compute to the mesh.

Tokens and their transactions provide indisputable 'proof of trust', proving secure operations both within and between devices and between relying parties.

Mesh participants share real-time proof of trusted operations and record forensic evidence of compliance within a reliable and trusted ecosystem.

The $NAORIS token fosters secure and transparent collaboration between users, enterprises, and governments.

The more networks and devices that integrate with the protocol the stronger and more robust the mesh becomes.

### Utility

#### Overview

The $NAORIS token provides an always on solution that validates trust and security across devices, networks and systems.

* Token operations validate cyber-secure systems over time, transferring value between devices to compensate for services under the dPoSec consensus protocol.
* $NAORIS provides the foundations for a unique record of provable results that are immutably secured by the blockchain.

#### **Trusted Security Validation**

The dPoSec consensus ensures measurement and proof of device and software operations that enable cyber-assured trusted networks to produce high quality data

* Devices are rewarded with $NAORIS as proof that it has been successfully validated.
* $NAORIS is continuously used and transferred between devices as part of trusted operations.
* As more devices are added, the network's power, value and trustworthiness grows.
* Naoris Protocol enforces continual validation of underlying devices, applications and infrastructure that power a network.

#### **Decentralized Trust Mesh**

Naoris Protocol transforms centralized and untrusted devices to act as validator nodes that use $NAORIS

* Under dPoSec devices validate each other for trusted behavior within millisecond blocktimes.
* Creating a distributed cyber-secure mesh that enforces trust globally.
* Recorded $NAORIS transactions provides proof that high quality data produced by a device is operating as intended.
* The value of maintaining provable cybersecurity grows exponentially as the number of nodes and measurement quality increases.
* $NAORIS secures device, validator integrity and cross-chain trust relays
* It backs economic incentives and penalties
* $NAORIS enables PQ-secure transactions at scale

Every bonded token represents economic commitment to a global trust economy.

<br>

#### **Incentivized Participation**

The network is built on the foundations of a device-to-device community economy.

* Rewards users for participating giving opportunities to offset security costs and contribute to global security.
* $NAORIS facilitates a new model of risk and reward incentivized investment to build a decentralized network enforcing best practices and security.
* A community model for security requires a new approach to operations, risks and investment
* $NAORIS provides an always on, unstoppable solution to how value is moved, consumed and realized.

$NAORIS is designed for infrastructure, not speculation. Its value comes from the security work performed by the network.

&#x20;**-Security incentives**\
Nodes earn rewards for validating devices, detecting anomalies, and contributing trust signals.

**- Bonding requirements**\
Devices, enterprise nodes, and validators bond $NAORIS to participate in dPoSec and generate trust proofs.\
Higher bonding increases responsibility, authority, and rewards.

**- Slashing**\
Malicious, compromised, or low-health nodes automatically lose a portion of their bonded tokens.

**-Post-quantum secure operations**\
All network transactions use Dilithium-5 post-quantum signatures, ensuring long-term resilience across Web3, enterprise, and sovereign systems.

**- Cross-chain trust**\
$NAORIS is used to generate trust proofs that secure asset transfers and contract interactions across EVM, Cosmos, Move, and other ecosystems.

**- Smart contract protection**\
dPoSec rewards early detection of reentrancy attacks, flash-loan anomalies, oracle manipulation, and other runtime threats

<br>

<figure><img src="/files/xy4fGs8Pke7yGVEuJlYA" alt=""><figcaption></figcaption></figure>

### Staking & Rewards

Full Validator Nodes are nodes jointly selected by all $NAORIS holders to maintain and develop the dPoSec network. The majority of nodes with the most votes will become alternative nodes, from which a core of validators will be randomly selected to participate in the management of the entire dPoSec network. Validators that are full nodes (like a master node) require locking tokens, making it highly capable. A full node will also have the ability to connect wallets.

The responsibilities of a validator are:

1\.  Maintaining node and the network operations

2\.  Produce and validate blocks

3\.  Proposal voting and decision-making

Minimum staking of a set amount of $NAORIS tokens is required for a staking account, locked or unlocked. If the actual stake is less than the minimum staking amount due to penalties or any other reason, the node will disappear from the listing of possible node candidates. There are also checks that entail the enforcement of the availability of recommended hardware levels, software, and infrastructure requirements for the node.

### Token Economy Overview

Token flow\
• Nodes bond tokens\
• Nodes perform security work\
• Verified trust events generate rewards\
• Malicious behavior is slashed\
• TrustMesh strengthens through economic reinforcement\
• Treasury and incentives support long-term global adoption

### Exchanges and Availability

Where can you buy $NAORIS ?

The token is available on major cryptocurrency exchanges, including:\
• Binance\
• KuCoin\
• Bybit\
• Gate.io\
• MEXC\ <br>

<br>


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://knowledgebase.naorisprotocol.com/naoris-protocol/introduction/what-is-the-usdnaoris-token-used-for.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
