At the core of the Jackal Protocol lies a powerful and expansive blockchain and storage network. For a technical deep dive, please see the documentation.Documentation
Get to know the Jackal Protocol.
Jackal is unique in various verticals. Currently, it is the only storage network that has the following features. Self-custody, on-chain permission, programable privacy, peer to peer file transfer, IBC/GMP cross-chain functionality, hot-storage, a modular application specific blockchain, proof of stake blockchain, protocol managed redundancy, protocol managed storage deals, and much more.
Jackal storage providers are the bedrock of the Jackal Protocol. Storage providers operate purpose built machines and require a decent amount of technical knowledge. To get started, check out the documentation and reach out to the welcoming storage provider community in the discord for additional support.
As the Jackal Protocol is an open source and decentralized protocol, the community decides the future with on-chain governance.
If you stake your JKL tokens, you unlock the ability to vote on governance proposals through your wallet provider, on the Jackal Cloud Dashboard, or on some block explorers. There are five types of governance proposals on the Jackal Protocol.
Text Proposal: A simple proposal that does not alter any source code, such as opinion polls.
Software Upgrade Proposal: Validators update their software as per the proposal specifications.
Parameter Change Proposal: The network's parameters, like the maximum validator count, are modified.
Community Pool Spend Proposal: If accepted, the proposed amount will be transferred to the proposers wallet relative to the funding schedule.
Cancel Software Upgrade Proposal: Proposal aims to halt software updates if they are deemed malicious or have bypassed community governance.
The Jackal Protocol is a blockchain and decentralized storage network delivering on-chain access to hot-storage for digital files. This powerful infrastructure delivers self-custodial and secure hot storage to users and developers increasing their resilience and cyber security posture.
JKL tokens power and secure the entirety of Jackal Protocol. JKL tokens can be used to access various applications, secure the network with staking, participate in governance, pay inexpensive transaction fees, be used as collateral for various use-cases, reward infrastructure providers, and access data storage.
If you possess JKL tokens, you can temporarily lock them away to secure the protocol, this is called staking or delegating. In exchange for securing the network, you receive rewards and the ability to vote on the Protocol’s future. You can do this from your wallet provider, on the Jackal Cloud Dashboard, or on some block explorers.
Staking or delegating is not risk free, this is why it is important to learn about the risks and participate in sustainable staking practices.
To decrease risk, it’s recommended that you do research on validators and select one you trust as well as delegate to multiple validators.
Slashing by 0.01% occurs if the validator you delegate to is offline for too long.
Slashing by 5% occurs if the validator signs two different blocks at the same block height.