Frequently asked questions about the Jackal Protocol.


Jackal is a powerful L1 blockchain and decentralized physical infrastructure network. Jackal is purpose built to provide secure storage solutions in a multi-chain world.

JKL Token?

JKL tokens power and secure the entirety of Jackal Protocol. JKL tokens can be used to access various applications, secure the network with staking, participate in governance, pay inexpensive transaction fees, be used as collateral for various use-cases, reward decentralized infrastructure providers, and access data storage.

Stake JKL Tokens?

If you possess JKL tokens, you can temporarily lock them away to secure the protocol, this is called staking or delegating. In exchange for securing the network, you receive rewards and the ability to vote on the Protocol’s future. You can do this from your wallet provider, on the Jackal Cloud Dashboard, or on some block explorers.

Additional Information

Staking or delegating is not risk free, this is why it is important to learn about the risks and participate in sustainable staking practices. To decrease risk, it’s recommended that you do research on validators and select one you trust as well as delegate to multiple validators.

Slashing by 0.01% occurs if the validator you delegate to is offline for too long.
Slashing by 5% occurs if the validator signs two different blocks at the same block height.

Provide Storage?

Jackal storage providers are the bedrock of the Jackal Protocol. Storage providers operate purpose built machines and require a decent amount of technical knowledge. To get started, check out the documentation and reach out to the welcoming storage provider community in the discord for additional support.


As the Jackal Protocol is an open source and decentralized protocol, the community decides the future with on-chain governance. If you stake your JKL tokens, you unlock the ability to vote on governance proposals.


Jackal is unique in various verticals. Currently, it is the only storage network that has the following features. Self-custody, on-chain permissions, programable privacy, peer to peer file transfer, cross-chain functionality, hot-storage speeds, a modular application specific blockchain, proof of stake blockchain, protocol managed redundancy, protocol managed storage deals, and much more.