What sets Nillion, a decentralized "blind computation" network soon to be launched on Binance, apart?

By: blockbeats|2025/03/24 14:00:05
0
Share
copy
Original Title: "Airdrop Sparks Discussion, Mainnet Countdown: What Sets Apart Nillion, the Blind Computing Network That Raised $50 Million?"
Original Source: DeepTech TechFlow

On March 20, 2025, the decentralized blind computing network Nillion unveiled the $NIL tokenomics, signaling the start of the TGE and mainnet countdown phase.

The first quarter of 2025 saw many blockbuster TGE projects, but Nillion's TGE still sparked significant discussion.

On one hand, former Uber founding engineer Conrad Whelan entered the Web3 space, positioning Nillion as a star project in the privacy + data + AI arena: in December 2022, it achieved a $180 million valuation and completed a $20 million seed round with Distributed Global as the lead investor; in October 2024, Nillion secured a new $25 million funding round led by Hack VC, bringing the total funding amount to over $50 million.

On the other hand, prior to the TGE, Nillion faced a whirlwind of controversy due to the premature leak of the airdrop plan and early supporters not being rewarded. In response to the uproar, Nillion promptly implemented a series of measures, including CMO Charlie Rogers publishing an article to address community concerns and swiftly releasing a new version of the airdrop lookup tool, demonstrating strong problem-solving abilities and a firm commitment to ensuring rewards truly belong to long-term supporters, ultimately turning the situation around and receiving widespread praise.

Privacy is a fundamental human right.

In the Web2 space, whether it's frequent unwanted calls/texts/emails or identity information, facial recognition data, or shopping records sold indiscriminately in related Telegram bots or groups, it's clear that the issue of privacy breaches has reached a critical point.

Therefore, the Web3 privacy track, which has always aimed to disrupt using decentralized power, has been under close scrutiny.

As a decentralized "blind computing" network, what sets Nillion apart?

With the TGE underway and the mainnet officially launched, will Nillion, entering a new stage of development, lead the innovation paradigm in the privacy track?

This article aims to delve into Nillion, exploring its specific operational logic and strong ecological performance, shedding light on the future development prospects of the project and the blind computation track.

What sets Nillion, a decentralized

Image Source: Twitter @nillionnetwork

Make Rules Transparent, Make Community Reassured: Nillion Airdrop to Launch Simultaneously with TGE on March 24

In the crypto world, whether an airdrop can proceed smoothly carries some meaning of "success or failure, it is what it is" for a project:

If the airdrop standard is unclear and scammers abound, the ecosystem will be in chaos, and the project will bear enormous public opinion pressure;

If the airdrop rules are transparent, rewards are truly distributed according to contributions, not only can a strong community be rallied, but it also lays a solid foundation for the project's ecosystem's effective circulation and long-term development.

Image Source: Nillion website

Unfortunately, Nillion's airdrop work encountered an unexpected twist at the beginning of its progress: on March 8, a leaked Nillion airdrop plan spread widely in the community ahead of time, and to the community's dissatisfaction, many early Nillion supporters found themselves not on this airdrop list.

Just as negative emotions began to brew, Nillion noticed this issue and quickly took a series of actions:

On the one hand, Nillion's CMO Charlie Rogers provided a detailed explanation of the airdrop rules in an article, including the airdrop's reward recipients, standard definition, and witch prevention, promptly addressing the community's concerns about the airdrop.

On the other hand, Nillion quickly released an updated version of the airdrop allocation checker within a short period, allowing community members to access the page, connect their wallets, and view specific airdrop results, including badges and airdrop levels. Eligible members will all receive a custom card:

· GOLD Level: 1,000 - 3,000 tokens

· DIAMOND Level: 3,000+ tokens

Image Source: Nillion Airdrop Allocation Checker

Meanwhile, Nillion has also canceled the original 90-day pre-staking lockup period. All pre-staking rewards will be unlockable on day one to demonstrate Nillion's commitment to rewarding the community.

In the face of community sentiment, Nillion's decisive and effective handling not only allowed the community to see the project's ample preparation for the airdrop work, but also, through CMO Charlie Rogers' article outlining clear airdrop rules, we felt the project's full respect for ecosystem participants.

Specifically, Nillion's airdrop audience mainly includes the following three major groups, covering both technical and non-technical contributors:

For each group, Nillion has also published specific criteria aimed at accurately identifying long-term participants and true contributors in the ecosystem, ensuring that rewards truly flow to members who bring positive value to the project.

Community Value

Image Source: Translated from Nillion CMO's Long-form Article "The Nillion Airdrop: Setting a New Standard"

Developers and Open Source Contribution

Image Source: Translated from Nillion CMO's Long-form Article "The Nillion Airdrop: Setting a New Standard"

Validator Engagement Plan

Image Source: Translated from Nillion CMO's Long-form Article "The Nillion Airdrop: Setting a New Standard"

And in the current trend of airdrops becoming industrialized and the ongoing issue of bot farming, Nillion has also introduced corresponding standards, committed to resisting those attempting to simplify the mining process through one-click node services, filtering out pure "freeloaders." According to the information currently released, two types of project participants will be ineligible for the airdrop:

· Low-engagement Secret Submitters: Only submitted 4 Secrets; did not stake any ETH; do not have any Discord roles (including reward roles); do not hold a Nill Pill NFT.

· Low-engagement Late Validators: Joined the validator program after September 14, 2024; did not stake any ETH; do not have any Discord roles (including reward roles); do not hold a Nill Pill NFT.

Although some professional bot farmers have raised doubts on social media, arguing that one-click node services can also be considered a form of ecosystem contribution and should not be excluded in this way, more people still appreciate the series of measures announced by Nillion: clear standards, transparent rules, and a focus on long-term value. Nillion is exploring a new standard for how the crypto community operates.

Currently, Nillion has released the economic model of $NIL, as the native token of the ecosystem, the $NIL token has utility for paying computational and storage fees, incentivizing validators, and may also become an important governance tool for the ecosystem in the future.

The total token supply of $NIL is 1 billion, with an initial circulation of 19.52% (approximately 195.15 million tokens), distributed as follows:

· Ecosystem and R&D: 29%

· Community: 20%

· Protocol Development: 10%

· Early Supporters: 21%

· Core Contributors: 20%

Image Source: Twitter @nillionnetwork

Meanwhile, the release of the $NIL token will coincide with the launch of the Nillion mainnet, Alpha mainnet with blind modules, and community airdrop on March 24. At launch, $NIL will be distributed to the community through airdrops and community round participants with unlocked tokens.

Of course, such a "transparent" airdrop rule has also attracted more attention to Nillion, a privacy track star project, prompting more people to want to delve deeper:

What exactly is Nillion's decentralized blind computation network? How is it different from other privacy solutions?

Focus on High-Value Data, Building a Super Privacy Tool: Stepping into the Nillion Blind Computation Network

A simple one-liner summary of Nillion's goal: High-value data is stored, transmitted, and processed in a fully encrypted state throughout.

This statement can be broken down into two parts:

First: High-Value Data.

The high-value data that Nillion focuses on refers to highly sensitive private data that is of great value to an organization or individual, often capable of significantly impacting a user's life, such as personal medical genetic data. The leakage of this data can often have serious consequences for the data owner, requiring a more robust security line of defense. After achieving "data usability without visibility," these data can further unlock more valuable application scenarios, building a fairer data ecosystem.

Second: Data storage, transmission, and processing in a fully encrypted state.

Many privacy solutions aim to achieve data storage, transmission, and processing in a fully encrypted state. Currently popular blockchain privacy technologies include Zero-Knowledge Proof (ZK), Multi-Party Computation (MPC), Fully Homomorphic Encryption (FHE), and Trusted Execution Environment (TEE).

However, Nillion aims to build a blind computation network where users do not need to trust anyone, and nodes can collaborate to perform calculations on the data. Yet, nodes cannot see the plaintext data locally and know nothing about the input data or output results.

So, what is "blind computation"?

It is actually a broad concept that can be described as various technologies and methods that can "perform calculations without exposing the input data." It is the product of the fusion and development of various cryptographic and secure computing technologies.

In our country's reform and opening up, there is a well-known slogan: It doesn't matter if it's a black cat or a white cat, as long as it catches mice, it's a good cat.

The Nillion blind computation concept has many similarities to this saying:

Various privacy computing methods have their unique advantages and applicable scenarios, but they also have their own dilemmas. For example, MPC often faces communication complexity, FHE faces challenges in breaking through computational overhead, and TEE is criticized for its trusted foundation. A single solution often faces computational complexity and performance limitations, making it difficult to balance efficiency, security, and scalability, and often cannot meet diverse privacy scenarios.

Therefore, Nillion is committed to building a flexible and efficient development environment that aggregates all privacy technologies. Faced with different needs in different scenarios, developers do not need to understand the specifics of privacy technologies. The Nillion compiler will help select the best combination of privacy technologies, thus helping developers easily build privacy-enabled applications.

In this "Blind Computation Network," Nillion adopts a parallel dual-layer architecture with Petnet and NilChain:

NilChain serves as the "scheduling center" and "incentive center" for the entire network:

NilChain is built on the Cosmos SDK and is mainly responsible for node management, task scheduling, inter-cluster coordination, and payment settlement, while also supporting IBC (Inter-Blockchain Communication Protocol) to achieve interoperability with other blockchains. For example, NilChain records node staking and reputation, allocates computing tasks to the appropriate Petnet node cluster, and handles user payments and node rewards.

On the other hand, Petnet is mainly responsible for data storage and computation, consisting of a distributed node network.

As the orchestration layer, Petnet's functionality relies on two key components:

· Compiler: Simplifies the use of privacy technologies by providing different levels of abstraction

· Computing Network: Performs secure computation and manages encrypted data

Image Source: Nillion Doc

Petnet integrates various privacy technologies, including ZK, MPC, FHE, and TEE, each running in its independent Blind Module as a core component to perform specific functions. Moreover, Nillion has also introduced a series of utility tools to further lower the privacy barrier and enhance the development experience.

The MPC protocol Curl is based on Linear Secret Sharing Scheme (LSSS), excelling in efficiently handling complex computations and is particularly suitable for addressing real-world issues such as supporting AI Agent development with privacy protection.

Privacy Technology Suite nilAI includes multiple modules such as AIVM, nada-AI, and nilTEE, focusing on supporting the development of Privacy AI.

Virtual Machine nilVM allows developers to use the Nada compiler to compile programs and then upload the compiled programs to the Nillion Network for execution. Nada is Nillion's Python-based open-source Domain Specific Language (DSL) and is developed using the Nillion Software Development Kit (SDK), including components such as nada-AI, nada-numpy, and nada-test, which can significantly reduce the threshold for building privacy applications.

Encrypted Distributed NoSQL database nilDB is designed for secure data storage and computation, enabling encrypted data to be distributed as Secret Shares to multiple nodes to eliminate reliance on a central authority. Furthermore, data owners can authorize others to run SQL-like queries, computation, and privacy-preserving aggregation on the stored data.

When facing complex privacy computation requirements, Petnet internally organizes nodes into clusters to perform specific tasks based on different requirements. Each cluster can be viewed as an independent blind computation unit, providing data sharding across multiple nodes.

Through data sharding technology, data is fragmented into smaller pieces distributed across different nodes, and a single node cannot access the complete dataset. In addition, by introducing MPC and other privacy technologies, multiple nodes can perform collaborative computation without revealing private data, reducing inter-node communication, thereby significantly enhancing security, performance, efficiency, and scalability.

As a blockchain equipped with super privacy tools, the Nillion ecosystem has already taken shape during the testnet phase. The Nillion Blind Computation Network has further confirmed its technical feasibility through in-depth collaboration with major projects. With the upcoming airdrop in March 2025 and the official launch of the mainnet, the next round of growth in the Nillion ecosystem has become a focus of attention for many.

Mainnet Launch Countdown, Exclusive Look at Nillion's Rich Ecosystem Projects in the Privacy Scene

As the highly anticipated Privacy + Data + AI project, Nillion has made very solid preparations for its mainnet debut during the more than eight months of the testnet phase:

Nillion has gone through 200+ investor conference calls, 2 successful testnet iterations, 50+ social media and podcast events, and has posted thousands of tweets. It has also engaged with over 300+ developers and 178 Apps, aiming to further build a developer-friendly environment while closely engaging with the ecosystem and community.

In the previously launched Validator Program, validators will ensure the data integrity of the entire network, playing a key role in maintaining security and the mainnet launch. The program concluded on December 11, 2024, attracting over 500,000 validators in total, collectively processing around 195 million keys, and securing approximately 1050 GB of data.

Image Source: Twitter @nillionnetwork

Through the ecosystem overview released by Nillion, we also see Nillion's growing ecosystem map, as Nillion has already partnered with over 50 projects including Aptos, Near, Arbitrum, Mantle, Virtuals, Fractal, covering various sectors such as DeFi, AI, DeSci, public chains, DAOs, among others.

In the current AI-dominated landscape of both Web2 and Web3, Nillion's concept of blind computing naturally aligns with AI development:

Data serves as the fuel for AI development, and through protecting user data, promoting data sharing, optimizing model training, fulfilling ethical responsibilities, and driving technological innovation, Nillion's blind computing network will provide comprehensive support for the sustainable development of AI.

AI is currently a significant pillar of Nillion's ecosystem, with over a dozen AI projects enhancing privacy through collaboration with Nillion.

As the largest multimodal AI agent protocol and framework today, Virtuals Protocol established a partnership with Nillion in June 2024. By leveraging Nillion's secure computing infrastructure, it supports private training and inference of AI models. This ensures that users' private information is protected during interactions with AI agents, preventing sensitive conversations and data from being exposed.

In addition, the Nillion ecosystem AI project includes the decentralized open AI infrastructure network Ritual, the AI agent protocol Crush AI, and more.

Nillion focuses on high-value data, including financial investment data, personal medical data, etc., which also provides opportunities for Nillion in DeFi and DeSci development.

In the DeFi field, the powerful privacy features brought by Nillion not only protect users' data and asset security but will also play an important role in identity compliance, financial innovation, personalized financial services, and Kayra is a very typical case.

As a decentralized dark pool trading platform, Kayra, based on Multi-Party Computation (MPC) technology, aims to provide a privacy-protected trading experience. Currently operating on Aleo, Ethereum Sepolia, and the Nillion testnet, it is committed to providing users with a secure and private trading environment.

Meanwhile, in the field of DeSci (Decentralized Science), the healthcare sector is undoubtedly one of the most promising application scenarios.

Traditional medical research typically faces a prominent challenge: researchers need access to a wide range of diverse datasets to conduct health assessments and analyses, but most people are reluctant to share their health data due to privacy concerns. This not only limits the sample size but also slows down the research process.

Nillion's privacy computing solution provides an innovative answer to this problem: through its technology, researchers can analyze health data without revealing personal information, thereby eliminating trust issues in data sharing.

Currently, this technological feature of Nillion has attracted the attention and collaboration of various healthcare projects:

Space of Mind is a platform focused on providing affordable peer support for individuals experiencing post-traumatic stress disorder (PTSD). Through Nillion, the platform achieves patient data privacy and security management, ensuring that user information is not misused.

Monadic DNA focuses on the security and privacy of personal genomic data, aiming to help users own and manage their genetic information, avoiding the data leakage risks associated with traditional methods. Using Nillion's secure computation technology, users can securely process data and generate a DNA passport after uploading the raw DNA file, while ensuring data privacy is not compromised.

AgeRate is an online platform dedicated to helping people achieve a healthier, longer life. Users simply need to collect a small blood sample and send it back to receive a health score and personalized advice. Through a partnership with Nillion, AgeRate ensures that user privacy is not compromised, allowing users to have a more comprehensive understanding of their health.

Furthermore, Nillion's ecosystem extends to social, DAO, and other consumer applications:

For example, Aloha is an AI-driven dating app designed to help users authentically showcase themselves and efficiently find suitable matches. By integrating Nillion's secure computation technology, Aloha ensures the safety of user data and reduces the risk of data breaches.

Image Source: Twitter @nillionnetwork

The diverse ecosystem not only demonstrates the high demand for privacy in various niche tracks and the recognition of Nillion's privacy solution but also allows users to have a rich exploration experience early in the mainnet launch.

With Nillion's mainnet officially launching in March 2025, its ecosystem partnerships will further accelerate, bringing innovative privacy and security experiences to more users.

Conclusion

In the future, with the official launch of the mainnet and the start of the TGE, more of Nillion's roadmap plans will also be implemented.

According to its official roadmap, in the early Project Development phase, Nillion will focus on launching the mainnet, followed by driving the coordination and optimization of the secure computation module to achieve the early launch of the universal computing layer to support a wider range of application scenarios.

In the second phase, Nillion's key efforts will focus on initiating the validator plan to ensure the network's security and reliability, continuously enhancing the decentralization of the network, while actively advancing integration with other blockchain projects or ecosystems.

By the third phase, Nillion will center on an audit and certification mechanism, continually enhancing the network's credibility and transparency. In the final fourth phase, Nillion will focus on expanding the ecosystem's scale, aiming to achieve permissionless network expansion to support more users and applications, while launching an ecosystem exploration plan to drive more innovative applications and implementations.

Image Source: Twitter @nillionnetwork

As a privacy project supported by Uber's senior executives and top VCs, we see in Nillion's past performance its foresight in product design, ecosystem expansion, and community building.

Through end-to-end encryption of high-value data storage, transmission, and processing, Nillion aims to build the next-generation privacy infrastructure and is committed to driving secure, efficient, and rapid development in various fields including AI, DeFi, DeSci, and more.

The handling of the airdrop controversy this time and the CMO's publication of a long article addressing community concerns in detail, introducing airdrop rules, have also strengthened the community's confidence in the project's long-term healthy development.

In an era where privacy and data value are equally important, privacy exemplified by Nillion will become a significant force driving the prosperity of the Web3 ecosystem. With the Nillion mainnet officially launched and entering a new stage of ecosystem development, we look forward to Nillion serving as a key player in the Web3 development wave, accelerating the arrival of the privacy era.

Original Article Link

You may also like

Token Cannot Compound, Where Is the Real Investment Opportunity?

The next chapter in the crypto industry will undoubtedly be written by Crypto-empowered Stocks.

February 6th Market Key Intelligence, How Much Did You Miss?

1. On-chain Flows: $508.2M USD inflow to Ethereum today; $390.8M USD outflow from Arbitrum 2. Biggest Gainers/Losers: $HBTC, $AIO 3. Top News: Current Bitcoin weekly RSI oversold signal comparable to June 2022

China's Central Bank and Eight Other Departments' Latest Regulatory Focus: Key Attention to RWA Tokenized Asset Risk


Foreword: Today, the People's Bank of China's website published the "Notice of the People's Bank of China, National Development and Reform Commission, Ministry of Industry and Information Technology, Ministry of Public Security, State Administration for Market Regulation, China Banking and Insurance Regulatory Commission, China Securities Regulatory Commission, State Administration of Foreign Exchange on Further Preventing and Dealing with Risks Related to Virtual Currency and Others (Yinfa [2026] No. 42)", the latest regulatory requirements from the eight departments including the central bank, which are basically consistent with the regulatory requirements of recent years. The main focus of the regulation is on speculative activities such as virtual currency trading, exchanges, ICOs, overseas platform services, and this time, regulatory oversight of RWA has been added, explicitly prohibiting RWA tokenization, stablecoins (especially those pegged to the RMB). The following is the full text:


To the people's governments of all provinces, autonomous regions, and municipalities directly under the Central Government, the Xinjiang Production and Construction Corps:


  Recently, there have been speculative activities related to virtual currency and Real-World Assets (RWA) tokenization, disrupting the economic and financial order and jeopardizing the property security of the people. In order to further prevent and address the risks related to virtual currency and Real-World Assets tokenization, effectively safeguard national security and social stability, in accordance with the "Law of the People's Republic of China on the People's Bank of China," "Law of the People's Republic of China on Commercial Banks," "Securities Law of the People's Republic of China," "Law of the People's Republic of China on Securities Investment Funds," "Law of the People's Republic of China on Futures and Derivatives," "Cybersecurity Law of the People's Republic of China," "Regulations of the People's Republic of China on the Administration of Renminbi," "Regulations on Prevention and Disposal of Illegal Fundraising," "Regulations of the People's Republic of China on Foreign Exchange Administration," "Telecommunications Regulations of the People's Republic of China," and other provisions, after reaching consensus with the Cyberspace Administration of China, the Supreme People's Court, and the Supreme People's Procuratorate, and with the approval of the State Council, the relevant matters are notified as follows:


  I. Clarify the essential attributes of virtual currency, Real-World Assets tokenization, and related business activities


  (I) Virtual currency does not possess the legal status equivalent to fiat currency. Virtual currencies such as Bitcoin, Ether, Tether, etc., have the main characteristics of being issued by non-monetary authorities, using encryption technology and distributed ledger or similar technology, existing in digital form, etc. They do not have legal tender status, should not and cannot be circulated and used as currency in the market.


  The business activities related to virtual currency are classified as illegal financial activities. The exchange of fiat currency and virtual currency within the territory, exchange of virtual currencies, acting as a central counterparty in buying and selling virtual currencies, providing information intermediary and pricing services for virtual currency transactions, token issuance financing, and trading of virtual currency-related financial products, etc., fall under illegal financial activities, such as suspected illegal issuance of token vouchers, unauthorized public issuance of securities, illegal operation of securities and futures business, illegal fundraising, etc., are strictly prohibited across the board and resolutely banned in accordance with the law. Overseas entities and individuals are not allowed to provide virtual currency-related services to domestic entities in any form.


  A stablecoin pegged to a fiat currency indirectly fulfills some functions of the fiat currency in circulation. Without the consent of relevant authorities in accordance with the law and regulations, any domestic or foreign entity or individual is not allowed to issue a RMB-pegged stablecoin overseas.


(II)Tokenization of Real-World Assets refers to the use of encryption technology and distributed ledger or similar technologies to transform ownership rights, income rights, etc., of assets into tokens (tokens) or other interests or bond certificates with token (token) characteristics, and carry out issuance and trading activities.


  Engaging in the tokenization of real-world assets domestically, as well as providing related intermediary, information technology services, etc., which are suspected of illegal issuance of token vouchers, unauthorized public offering of securities, illegal operation of securities and futures business, illegal fundraising, and other illegal financial activities, shall be prohibited; except for relevant business activities carried out with the approval of the competent authorities in accordance with the law and regulations and relying on specific financial infrastructures. Overseas entities and individuals are not allowed to illegally provide services related to the tokenization of real-world assets to domestic entities in any form.


  II. Sound Work Mechanism


  (III) Inter-agency Coordination. The People's Bank of China, together with the National Development and Reform Commission, the Ministry of Industry and Information Technology, the Ministry of Public Security, the State Administration for Market Regulation, the China Banking and Insurance Regulatory Commission, the China Securities Regulatory Commission, the State Administration of Foreign Exchange, and other departments, will improve the work mechanism, strengthen coordination with the Cyberspace Administration of China, the Supreme People's Court, and the Supreme People's Procuratorate, coordinate efforts, and overall guide regions to carry out risk prevention and disposal of virtual currency-related illegal financial activities.


  The China Securities Regulatory Commission, together with the National Development and Reform Commission, the Ministry of Industry and Information Technology, the Ministry of Public Security, the People's Bank of China, the State Administration for Market Regulation, the China Banking and Insurance Regulatory Commission, the State Administration of Foreign Exchange, and other departments, will improve the work mechanism, strengthen coordination with the Cyberspace Administration of China, the Supreme People's Court, and the Supreme People's Procuratorate, coordinate efforts, and overall guide regions to carry out risk prevention and disposal of illegal financial activities related to the tokenization of real-world assets.


  (IV) Strengthening Local Implementation. The people's governments at the provincial level are overall responsible for the prevention and disposal of risks related to virtual currencies and the tokenization of real-world assets in their respective administrative regions. The specific leading department is the local financial regulatory department, with participation from branches and dispatched institutions of the State Council's financial regulatory department, telecommunications regulators, public security, market supervision, and other departments, in coordination with cyberspace departments, courts, and procuratorates, to improve the normalization of the work mechanism, effectively connect with the relevant work mechanisms of central departments, form a cooperative and coordinated working pattern between central and local governments, effectively prevent and properly handle risks related to virtual currencies and the tokenization of real-world assets, and maintain economic and financial order and social stability.


  III. Strengthened Risk Monitoring, Prevention, and Disposal


  (5) Enhanced Risk Monitoring. The People's Bank of China, China Securities Regulatory Commission, National Development and Reform Commission, Ministry of Industry and Information Technology, Ministry of Public Security, State Administration of Foreign Exchange, Cyberspace Administration of China, and other departments continue to improve monitoring techniques and system support, enhance cross-departmental data analysis and sharing, establish sound information sharing and cross-validation mechanisms, promptly grasp the risk situation of activities related to virtual currency and real-world asset tokenization. Local governments at all levels give full play to the role of local monitoring and early warning mechanisms. Local financial regulatory authorities, together with branches and agencies of the State Council's financial regulatory authorities, as well as departments of cyberspace and public security, ensure effective connection between online monitoring, offline investigation, and fund tracking, efficiently and accurately identify activities related to virtual currency and real-world asset tokenization, promptly share risk information, improve early warning information dissemination, verification, and rapid response mechanisms.


  (6) Strengthened Oversight of Financial Institutions, Intermediaries, and Technology Service Providers. Financial institutions (including non-bank payment institutions) are prohibited from providing account opening, fund transfer, and clearing services for virtual currency-related business activities, issuing and selling financial products related to virtual currency, including virtual currency and related financial products in the scope of collateral, conducting insurance business related to virtual currency, or including virtual currency in the scope of insurance liability. Financial institutions (including non-bank payment institutions) are prohibited from providing custody, clearing, and settlement services for unauthorized real-world asset tokenization-related business and related financial products. Relevant intermediary institutions and information technology service providers are prohibited from providing intermediary, technical, or other services for unauthorized real-world asset tokenization-related businesses and related financial products.


  (7) Enhanced Management of Internet Information Content and Access. Internet enterprises are prohibited from providing online business venues, commercial displays, marketing, advertising, or paid traffic diversion services for virtual currency and real-world asset tokenization-related business activities. Upon discovering clues of illegal activities, they should promptly report to relevant departments and provide technical support and assistance for related investigations and inquiries. Based on the clues transferred by the financial regulatory authorities, the cyberspace administration, telecommunications authorities, and public security departments should promptly close and deal with websites, mobile applications (including mini-programs), and public accounts engaged in virtual currency and real-world asset tokenization-related business activities in accordance with the law.


  (8) Strengthened Entity Registration and Advertisement Management. Market supervision departments strengthen entity registration and management, and enterprise and individual business registrations must not contain terms such as "virtual currency," "virtual asset," "cryptocurrency," "crypto asset," "stablecoin," "real-world asset tokenization," or "RWA" in their names or business scopes. Market supervision departments, together with financial regulatory authorities, legally enhance the supervision of advertisements related to virtual currency and real-world asset tokenization, promptly investigating and handling relevant illegal advertisements.


  (IX) Continued Rectification of Virtual Currency Mining Activities. The National Development and Reform Commission, together with relevant departments, strictly controls virtual currency mining activities, continuously promotes the rectification of virtual currency mining activities. The people's governments of various provinces take overall responsibility for the rectification of "mining" within their respective administrative regions. In accordance with the requirements of the National Development and Reform Commission and other departments in the "Notice on the Rectification of Virtual Currency Mining Activities" (NDRC Energy-saving Building [2021] No. 1283) and the provisions of the "Guidance Catalog for Industrial Structure Adjustment (2024 Edition)," a comprehensive review, investigation, and closure of existing virtual currency mining projects are conducted, new mining projects are strictly prohibited, and mining machine production enterprises are strictly prohibited from providing mining machine sales and other services within the country.


  (X) Severe Crackdown on Related Illegal Financial Activities. Upon discovering clues to illegal financial activities related to virtual currency and the tokenization of real-world assets, local financial regulatory authorities, branches of the State Council's financial regulatory authorities, and other relevant departments promptly investigate, determine, and properly handle the issues in accordance with the law, and seriously hold the relevant entities and individuals legally responsible. Those suspected of crimes are transferred to the judicial authorities for processing according to the law.


 (XI) Severe Crackdown on Related Illegal and Criminal Activities. The Ministry of Public Security, the People's Bank of China, the State Administration for Market Regulation, the China Banking and Insurance Regulatory Commission, the China Securities Regulatory Commission, as well as judicial and procuratorial organs, in accordance with their respective responsibilities, rigorously crack down on illegal and criminal activities related to virtual currency, the tokenization of real-world assets, such as fraud, money laundering, illegal business operations, pyramid schemes, illegal fundraising, and other illegal and criminal activities carried out under the guise of virtual currency, the tokenization of real-world assets, etc.


  (XII) Strengthen Industry Self-discipline. Relevant industry associations should enhance membership management and policy advocacy, based on their own responsibilities, advocate and urge member units to resist illegal financial activities related to virtual currency and the tokenization of real-world assets. Member units that violate regulatory policies and industry self-discipline rules are to be disciplined in accordance with relevant self-regulatory management regulations. By leveraging various industry infrastructure, conduct risk monitoring related to virtual currency, the tokenization of real-world assets, and promptly transfer issue clues to relevant departments.


  IV. Strict Supervision of Domestic Entities Engaging in Overseas Business Activities


(XIII) Without the approval of relevant departments in accordance with the law and regulations, domestic entities and foreign entities controlled by them may not issue virtual currency overseas.


  (XIV) Domestic entities engaging directly or indirectly in overseas external debt-based tokenization of real-world assets, or conducting asset securitization activities abroad based on domestic ownership rights, income rights, etc. (hereinafter referred to as domestic equity), should be strictly regulated in accordance with the principles of "same business, same risk, same rules." The National Development and Reform Commission, the China Securities Regulatory Commission, the State Administration of Foreign Exchange, and other relevant departments regulate it according to their respective responsibilities. For other forms of overseas real-world asset tokenization activities based on domestic equity by domestic entities, the China Securities Regulatory Commission, together with relevant departments, supervise according to their division of responsibilities. Without the consent and filing of relevant departments, no unit or individual may engage in the above-mentioned business.


  (15) Overseas subsidiaries and branches of domestic financial institutions providing Real World Asset Tokenization-related services overseas shall do so legally and prudently. They shall have professional personnel and systems in place to effectively mitigate business risks, strictly implement customer onboarding, suitability management, anti-money laundering requirements, and incorporate them into the domestic financial institutions' compliance and risk management system. Intermediaries and information technology service providers offering Real World Asset Tokenization services abroad based on domestic equity or conducting Real World Asset Tokenization business in the form of overseas debt for domestic entities directly or indirectly venturing abroad must strictly comply with relevant laws and regulations. They should establish and improve relevant compliance and internal control systems in accordance with relevant normative requirements, strengthen business and risk control, and report the business developments to the relevant regulatory authorities for approval or filing.


  V. Strengthen Organizational Implementation


  (16) Strengthen organizational leadership and overall coordination. All departments and regions should attach great importance to the prevention of risks related to virtual currencies and Real World Asset Tokenization, strengthen organizational leadership, clarify work responsibilities, form a long-term effective working mechanism with centralized coordination, local implementation, and shared responsibilities, maintain high pressure, dynamically monitor risks, effectively prevent and mitigate risks in an orderly and efficient manner, legally protect the property security of the people, and make every effort to maintain economic and financial order and social stability.


  (17) Widely carry out publicity and education. All departments, regions, and industry associations should make full use of various media and other communication channels to disseminate information through legal and policy interpretation, analysis of typical cases, and education on investment risks, etc. They should promote the illegality and harm of virtual currencies and Real World Asset Tokenization-related businesses and their manifestations, fully alert to potential risks and hidden dangers, and enhance public awareness and identification capabilities for risk prevention.


  VI. Legal Responsibility


  (18) Engaging in illegal financial activities related to virtual currencies and Real World Asset Tokenization in violation of this notice, as well as providing services for virtual currencies and Real World Asset Tokenization-related businesses, shall be punished in accordance with relevant regulations. If it constitutes a crime, criminal liability shall be pursued according to the law. For domestic entities and individuals who knowingly or should have known that overseas entities illegally provided virtual currency or Real World Asset Tokenization-related services to domestic entities and still assisted them, relevant responsibilities shall be pursued according to the law. If it constitutes a crime, criminal liability shall be pursued according to the law.


  (19) If any unit or individual invests in virtual currencies, Real World Asset Tokens, and related financial products against public order and good customs, the relevant civil legal actions shall be invalid, and any resulting losses shall be borne by them. If there are suspicions of disrupting financial order and jeopardizing financial security, the relevant departments shall deal with them according to the law.


  This notice shall enter into force upon the date of its issuance. The People's Bank of China and ten other departments' "Notice on Further Preventing and Dealing with the Risks of Virtual Currency Trading Speculation" (Yinfa [2021] No. 237) is hereby repealed.


Former Partner's Perspective on Multicoin: Kyle's Exit, But the Game He Left Behind Just Getting Started

Kyle knew his game, so he decided to focus on playing the game he was good at and interested in.

Why Bitcoin Is Falling Now: The Real Reasons Behind BTC's Crash & WEEX's Smart Profit Playbook

Bitcoin's ongoing crash explained: Discover the 5 hidden triggers behind BTC's plunge & how WEEX's Auto Earn and Trade to Earn strategies help traders profit from crypto market volatility.

Wall Street's Hottest Trades See Exodus

This time there is no single triggering factor, but rather market anxiety about asset valuation, with many already skeptical of these valuations being too high, leading to investors choosing to retreat almost simultaneously.

Popular coins

Latest Crypto News

Read more