What is Liquid Staking? How does it work?

28 November, 2024

What is Liquid Staking? How does it work?

Liquid staking was pioneered by @LidoFinance back in December 2020. Using liquid staking protocols, users can participate in ETH staking without needing to lock up funds or maintain their nodes.

How it Works:

  • Users can deposit a minimum of 0.01 ETH to a liquid staking protocol.
  • This ETH is sent to a Staking Pool.
  • The platform gives users liquid staking tokens (LSTs) representing their staked assets and the rewards they've earned. For example, Lido calls their token staked-Ether (stETH).
  • LSTs are pegged to ETH, ensuring users can trade them seamlessly on DeFi platforms. Plus, users retain the option to withdraw their ETH at any point in time.
  • Users can burn the liquid staking tokens (LSTs) for ETH. Liquid staking tokens (LSTs) can also be swapped for the ETH token.

Major Types of Liquid Staking Tokens:

1. Rebasing Tokens

  • Simple to understand but hard to integrate.
  • The exchange rate remains 1:1 (ETH:stETH), but quantity increases over time.
  • Rebasing tokens like Lido’s stETH adjust their supply, giving users extra tokens as rewards without changing the value of each token. This method keeps them closely tied to Ethereum's value.
  • Rebasing tokens are the most popular design among liquid staking platforms.

2. Non-Rebasing Tokens

  • Harder to understand but easier to integrate compared to rebasing tokens.
  • The quantity remains constant, but the value of the staked token increases with time. For example, if you stake 1 ETH at 3% APY for 1 year, the value of your 1 stETH will equal 1.03 ETH.
  • Unlike rebasing tokens, non-rebasing tokens keep a fixed supply, but their value grows daily with staking rewards. Many platforms use this model. For example, @Rocket_Pool offers a non-rebasing token called rETH.

#Ethereum #BlockchainSecurity #Blockchain #Web3 #LiquidStaking #PrismBlocks

15 October, 2024

The Rise of Phishing Attacks in Web3 Security

Phishing, a form of social engineering attack, tricks individuals into revealing sensitive information such as private keys or passwords by impersonating legitimate entities.

Read More

19 October, 2024

Q3 2024 Blockchain Hack Report

Phishing, a form of social engineering attack, tricks individuals into revealing sensitive information such as private keys or passwords by impersonating legitimate entities.

Read More

11 November, 2024

October 2024 Hack Report: Crypto Industry Faces $126.93 Million in Losses

October 2024 was marked by significant security breaches, with crypto asset losses totaling $126.93 million. The incidents targeted both centralized exchanges and decentralized platforms

Read More

23 November, 2024

Protecting Web3 from Human Exploits: Top Social Engineering Tactics

As Web3 grows, attackers exploit human psychology through social engineering tactics like phishing, baiting, and impersonation to gain access to sensitive data.

Read More