| N | Field | Content | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| I.00 | Table of content |
I. Compliance with duties of information
II. Summary Part A: Information about the offeror or the person seeking admission to trading Part B: Information about the issuer, if different from the offeror or person seeking admission to trading Part C: Information about the operator of the trading platform in cases where it draws up the crypto-asset white paper and information about other persons drawing the crypto-asset white paper pursuant to Article 6(1), second subparagraph, of Regulation (EU) 2023/1114 Part D: Information about the crypto-asset project Part E: Information about the offer to the public of crypto-assets or their admission to trading Part F: Information about the crypto-assets Part G: Information on the rights and obligations attached to the crypto-assets Part H: Information on the underlying technology Part I: Information on the risks Part J: Information on the sustainability indicators in relation to adverse impact on the climate and other environment-related adverse impacts |
||||||||||||||||||||||||||||||||||||
| I.01 | Date of notification | N/A | ||||||||||||||||||||||||||||||||||||
| I.02 | Statement in accordance with Article 6(3) of Regulation (EU) 2023/1114 |
This crypto-asset white paper has not been approved by any competent authority in any Member State of the European Union. The operator of the trading platform of the crypto-asset is solely responsible for the content of this crypto-asset white paper.
|
||||||||||||||||||||||||||||||||||||
| I.03 | Compliance statement in accordance with Article 6(6) of Regulation (EU) 2023/1114 |
This crypto-asset white paper has not been approved by any competent authority in any Member State of the European Union. The offeror is solely responsible for the content of this crypto-asset white paper.
|
||||||||||||||||||||||||||||||||||||
| I.04 | Statement in accordance with Article 6(5), points (a), (b), (c), of Regulation (EU) 2023/1114 |
The crypto-asset referred to in this crypto-asset white paper may lose its value in part or in full, may not always be transferable and may not be liquid.
|
||||||||||||||||||||||||||||||||||||
| I.05 | Statement in accordance with Article 6(5), point (d), of Regulation (EU) 2023/1114 |
False
|
||||||||||||||||||||||||||||||||||||
| I.06 | Statement in accordance with Article 6(5), points (e) and (f), of Regulation (EU) 2023/1114 |
The crypto-asset referred to in this white paper is not covered by the investor compensation schemes under Directive 97/9/EC of the European Parliament and of the Council or the deposit guarantee schemes under Directive 2014/49/EU of the European Parliament and of the Council.
|
||||||||||||||||||||||||||||||||||||
| I.07 | Warning in accordance with Article 6(7), second subparagraph, of Regulation (EU) 2023/1114 |
Warning
The summary should be read as an introduction to the crypto-asset white paper. The prospective holder should base any decision to purchase this crypto asset on the content of the crypto-asset white paper as a whole and not on the summary alone. The offer to the public of the crypto-asset does not constitute an offer or solicitation to purchase financial instruments and any such offer or solicitation can be made only by means of a prospectus or other offer documents pursuant to the applicable national law. This crypto-asset white paper does not constitute a prospectus as referred to in Regulation (EU) 2017/1129 of the European Parliament and of the Council or any other offer document pursuant to Union or national law. |
||||||||||||||||||||||||||||||||||||
| I.08 | Characteristics of the crypto-asset |
Purchasers of HBAR can use the token for several purposes. The primary use is to pay for services on the Hedera network, including transferring tokens, storing data, and running smart contracts. These payments are used to compensate the computers (called nodes) that maintain the network, covering their operational costs. Holders of HBAR may also choose to stake their tokens to support the network’s security. Staking means assigning HBAR to a network node without transferring ownership, such that the more HBAR a node is assigned, the higher their influence in consensus. In return, stakers may earn rewards for their participation in determining which nodes are the most trustworthy. Staking is optional, but makes it more difficult for malicious actors to attack the ledger as long asreceive stake. Unlike other networks, there is also no lock-up period; staked tokens remain under the holder’s control and can be moved or unstaked at any time. The terms of staking including how rewards are calculated, the list of eligible nodes, and technical requirements are determined by the Hedera Council (the “Hedera Council”), a consortium of up to 39 leading organizations around the world organized through Hedera Hashgraph, LLC, a Delaware limited liability company based in the United States. The Hedera Council may change the criteria for eligible nodes and the calculation of rewards over time. For example, the Hedera Council may adjust reward rates, introduce or remove staking limits, or update the list of eligible nodes. Any such changes are announced through the Hedera Council’s public governance and communication channels. Under MiCA, HBAR is a token of the “other” category as it is not referenced by assets, it does not purport to maintain a stable value by being backed with currency, nor is it merely intended to provide access to a particular good or service. Rather it acts as a general medium of exchange that can be used for the payment or exchange of external goods or services in addition to the services offered by the Hedera network. Holding HBAR also does not confer any ownership rights or governance roles in the Hedera Council. |
||||||||||||||||||||||||||||||||||||
| I.09 | Further information about utility tokens | N/A | ||||||||||||||||||||||||||||||||||||
| I.10 | Key information about the offer to the public or admission to trading |
HBAR was not offered through a traditional public offering nor an Initial Coin Offering (ICO). Instead, it is available for trading on numerous wallets and crypto asset exchanges globally. This method allows users to purchase HBAR directly from the open market.The totality of hbars were initially minted in 2017. A very small amount of coins (6.7 million HBAR) was released in the following months to early users to test the network as part of its community testing program. Since, hbars have been acquired by buyers by regulated investment contracts: Simple Agreements for Future Tokens (SAFTs) under applicable securities laws (US Securities Act of 1933), specifically Regulation D. The initial SAFT purchasers were presented with an option to acquire additional hbars in exchange for agreeing to a prolonged, pre-determined schedule for token release. After the Hedera network became operational, Token Purchase Agreements (TPAs), which are classified as physical forward agreements under applicable law, were entered to sell hbars to eligible contract participants (ECPs). Physical forward agreements are excluded from the definition of swap agreements under relevant commodity laws, but were nevertheless reported to the applicable US regulator for the purpose of full transparency. The TPAs were offered to support the ongoing operations of the network. The multiple SAFT series included an initial sale to early users as part of a community testing programme, and later Open Access for the general public. Details of the SAFT offerings follow:
Note that, as part of the terms of the original licence agreement, the Hedera Council distributed 2.5 billion coins (5%) to Swirlds, Inc. Independent of the licence agreement, an additional 1 billion coins are allocated to Swirlds investors (excluding the Hedera Council founders). At the time of submission of this whitepaper, there is still an unallocated supply of 67,018,958 hbars (0.13%), which could be distributed to network operations or ecosystem development. Following its initial distribution, HBAR became available on multiple trading platforms, including major exchanges like Binance, Coinbase, Huobi, and OKEx, where it is traded against various fiat and cryptocurrency pairs.Proceeds from HBAR sales were and are used to fund the development of the network, including open-source and ecosystem development (e.g. grant programmes), and compensation to founders, executives, employees and contractors in accordance to compensation schedules. Until 2022, when all intellectual property was purchased and acquired by the Hedera Council, this also included monthly compensation to Swirlds, Inc. as part of the Hashgraph License Agreement. |
| N | Field | Content |
|---|---|---|
| A.1 | Name | N/A |
| A.2 | Legal form | N/A |
| A.3 | Registered address | N/A |
| A.4 | Head office | N/A |
| A.5 | Registration date | N/A |
| A.6 | Legal entity identifier | N/A |
| A.7 | Another identifier required pursuant to applicable national law | N/A |
| A.8 | Contact telephone number | N/A |
| A.9 | E-mail address | N/A |
| A.10 | Response time (days) | N/A |
| A.11 | Parent company | N/A |
| A.12 | Members of management body | N/A |
| A.13 | Business activity | N/A |
| A.14 | Parent company business activity | N/A |
| A.15 | Newly established | N/A |
| A.16 | Financial condition for the past three years | N/A |
| A.17 | Financial condition since registration | N/A |
| N | Field | Content | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| B.1 | Issuer different from offerror or person seeking admission to trading |
True
|
||||||||||||||||||
| B.2 | Name |
|
||||||||||||||||||
| B.3 | Legal form | N/A – LEI is provided in B.7. | ||||||||||||||||||
| B.4 | Registered address | N/A – LEI is provided in B.7. | ||||||||||||||||||
| B.5 | Head office | N/A – LEI is provided in B.7. | ||||||||||||||||||
| B.6 | Registration date |
|
||||||||||||||||||
| B.7 | Legal entity identifier |
|
||||||||||||||||||
| B.8 | Another identifier required pursuant to applicable national law |
Federal EIN: 46-4716239 |
||||||||||||||||||
| B.9 | Parent company | N/A – LEI is provided in B.7. | ||||||||||||||||||
| B.10 | Members of management body |
|
||||||||||||||||||
| B.11 | Business activity |
|
||||||||||||||||||
| B.12 | Parent company business activity | N/A |
| N | Field | Content |
|---|---|---|
| C.1 | Name | N/A |
| C.2 | Legal form | N/A |
| C.3 | Registered address | N/A |
| C.4 | Head office | N/A |
| C.5 | Registration date | N/A |
| C.6 | Legal entity identifier | N/A |
| C.7 | Another identifier required pursuant to applicable national law | N/A |
| C.8 | Parent company | N/A |
| C.9 | Reason for crypto-asset white paper preparation | N/A |
| C.10 | Members of management body | N/A |
| C.11 | Operator business activity | N/A |
| C.12 | Parent company business activity | N/A |
| C.13 | Other persons drawing up the crypto-asset white paper according to Article 6(1), second subparagraph, of Regulation (EU) 2023/1114 |
|
| C.14 | Reason for drawing the white paper by persons referred to in Article 6(1), second subparagraph, of Regulation (EU) 2023/1114 |
|
| N | Field | Content | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| D.1 | Crypto-asset project name |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| D.2 | Crypto-asset name | N/A as DTI is provided in field F.13 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| D.3 | Abbreviation | N/A as DTI is provided in field F.13 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| D.4 | Crypto-asset project description |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| D.5 | Details of all natural or legal persons involved in implementation of crypto-asset project |
Hedera Council
Hedera Council Members
Other persons involved in the implementation of the crypto-asset project
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| D.6 | Utility token classification |
False
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| D.7 | Key features of goods or services for utility token projects |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| D.8 | Plans for the token |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| D.8 | Plans for the token |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| D.9 | Resource allocation |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| D.10 | Planned use of collected funds or other tokens | N/A as no other funds will be collected via public offering. |
| N | Field | Content |
|---|---|---|
| E.1 | Public offering or admission to trading | N/A |
| E.2 | Reasons for public offer or admission to trading | N/A |
| E.3 | Fundraising target | N/A |
| E.4 | Minimum subscription goals | N/A |
| E.5 | Maximum subscription goals | N/A |
| E.6 | Oversubscription acceptance | N/A |
| E.7 | Oversubscription allocation | N/A |
| E.8 | Issue price | N/A |
| E.9 | Official currency determining issue price | N/A |
| E.9 | Any other tokens determining issue price | N/A |
| E.10 | Subscription fee | N/A |
| E.11 | Offer price determination method | N/A |
| E.12 | Total number of offered or traded other tokens | N/A |
| E.13 | Targeted holders | N/A |
| E.14 | Holder restrictions | N/A |
| E.15 | Reimbursement notice | N/A |
| E.16 | Refund mechanism | N/A |
| E.17 | Refund timeline | N/A |
| E.18 | Offer phases | N/A |
| E.19 | Early purchase discount | N/A |
| E.20 | Time-limited offer | N/A |
| E.21 | Subscription period beginning | N/A |
| E.22 | Subscription period end | N/A |
| E.23 | Safeguarding arrangements for offered funds or other tokens | N/A |
| E.24 | Payment methods for other token purchase | N/A |
| E.25 | Value transfer methods for reimbursement | N/A |
| E.26 | Right of withdrawal | N/A |
| E.27 | Transfer of purchased other tokens | N/A |
| E.28 | Transfer time schedule | N/A |
| E.29 | Purchaser's technical requirements | N/A |
| E.30 | Other token service provider (CASP) name | N/A |
| E.31 | CASP identifier | N/A |
| E.32 | Placement form | N/A |
| E.33 | Trading platforms name | N/A |
| E.34 | Trading platforms market identifier code (MIC) | N/A |
| E.36 | Involved costs | N/A |
| E.37 | Offer expenses | N/A |
| E.38 | Conflicts of interest | N/A |
| E.39 | Applicable law | N/A |
| E.40 | Competent court | N/A |
| N | Field | Content |
|---|---|---|
| F.1 | Other token type |
|
| F.3 | Planned application of functionalities |
|
| F.4 | Type of crypto-asset white paper |
OTHR
|
| F.5 | Type of submission |
NEWT
|
| F.6 | Other token characteristics |
The crypto asset itself has a fixed supply and is divisible by 100,000,000, with the minimum unit being the tinybar (tℏ). HBAR’s supply is fixed and set at 50 billion coins. The crypto asset symbol is a lower case, italicized HBAR (ℏ). The written way to express HBAR cryptocurrency is hbars, and is equivalent to writing US dollars. It can also be expressed as HBAR, which is equivalent to writing USD. |
| F.7 | Commercial name or trading name | N/A as DTI is provided. |
| F.8 | Website of the issuer |
|
| F.9 | Starting date of offer to the public or admission to trading |
|
| F.10 | Publication date |
|
| F.11 | Any other services provided by the issuer |
|
| F.12 | Language or languages of white paper |
|
| F.13 | Digital token identifier code used to uniquely identify the crypto-asset or each of the several crypto assets to which the white paper relates, where available |
|
| F.14 | Functionally fungible group digital token identifier, where available |
|
| F.15 | Voluntary data flag |
False
|
| F.16 | Personal data flag |
True
|
| F.17 | LEI eligibility |
True
|
| F.18 | Home member state | N/A as the crypto asset was not offered to the general public (see Sec. II, N.10) and has already been admitted to trading on multiple exchanges around the world. |
| F.19 | Host member states | N/A as the crypto asset was not offered to the general public (see Sec. II, N.10) and has already been admitted to trading on multiple exchanges around the world. |
| N | Field | Content |
|---|---|---|
| G.1 | Purchaser rights and obligations | N/A as the crypto asset was not offered to the general public (see Sec. II, N.10), has already been admitted to trading on multiple exchanges around the world, and there is no contract governing how crypto asset-holders may hold or use the crypto assets. |
| G.2 | Exercise of rights and obligations | N/A |
| G.3 | Conditions for modifications of rights and obligations | N/A |
| G.4 | Future public offers | N/A |
| G.5 | Issuer retained other token |
|
| G.6 | Utility token classification |
False
|
| G.7 | Key features of goods or services utility tokens | N/A |
| G.8 | Utility tokens redemption | N/A |
| G.9 | Non-trading request |
False
|
| G.10 | Other tokens purchase or sale modalities |
|
| G.11 | Other tokens transfer restrictions |
|
| G.12 | Supply adjustment protocols |
False
|
| G.13 | Supply adjustment mechanisms | N/A |
| G.14 | Token value protection schemes |
False
|
| G.15 | Token value protection schemes description |
|
| G.16 | Compensation schemes |
There is no written legal agreement between the issuer and the crypto asset-holder that sets out the laws that govern the legal relationship between those two parties. In the absence of such an agreement, the laws that govern that relationship will depend on the location of the issuer and the given crypto asset-holder and characteristic performance of the legal relationship, and any agreed intention of the issuer and crypto asset-holder.
|
| G.17 | Compensation schemes description |
|
| N | Field | Content |
|---|---|---|
| H.1 | Distributed ledger technology (DTL) | N/A as DTI is provided. |
| H.2 | Protocols and technical standards |
|
| H.3 | Technology used |
Some of its key elements include:
|
| H.4 | Consensus mechanism |
However, the data packets in the hashgraph are not mere transactions but “events” (gossip syncs are also events). Events in the hashgraph include not just the transactions itself, its timestamp, and the hash of the previous event (“self-parent”) – like in any other DLT – but also a second hash: The hash of the last event from the immediately preceding gossip by another node (i.e. the last event of the other node prior to the gossip sync event, “other-parent”). By including this additional information overhead, nodes are not just gossiping about transactions, but engaging in “gossip about gossip”. That is, by including the other-parent, a node is not only gossiped the information about the transactions received in themselves, but also about their ordering: When the other node learned about this transaction, and what the ancestors of each event are for each node. As a result, nodes are not merely receiving loose transactions but the graph of the transactions – the “hashgraph”, which each node stores. After the transactions have been broadcast, DLTs will usually require a voting system, a leader-system, or a combination of both to achieve consensus. To achieve an agreement of what transactions are permanently stored, and in what order, nodes submit messages with their votes in this regard, or a leader node (block proposer) that will make this decision is selected by the protocol (through a system that could be mining, staking, others), or messages containing votes about electing a leader node. None of this happens in the hashgraph. Thanks to the initial overhead submitted in the form of the two hashes, all nodes have a copy of the hashgraph and can calculate a total order of the events getting the same answer. Furthermore, all broadcast transactions are accepted as long as they are valid, with no node being allowed to exercise a leader’s discretion. As a result of this architecture, copies of the hashgraph are always necessarily consistent, by definition. Due to asynchronicity, these copies may not be identical if a node has “seen” events that another node has not yet seen – although eventually this will happen – but the consistency of the ordering is ensured. If two nodes have a given event, they are guaranteed to also have all its ancestors. This ordering is calculated in rounds of elections, but these elections do not have messages sending votes. Instead, each node is able to locally apply the protocol’s voting algorithm to calculate what vote another node would have sent if it were actually sending votes over the internet. In each of these voting rounds, each node votes (i.e. is simulated to vote) on the events they can “strongly see”. Strongly seeing an X event is having in storage multiple independent Y events which contain event X as their ancestor. This data structure not only saves bandwidth by not requiring voting messages, but also strongly mitigates dishonest behaviour, as through virtual voting even malicious nodes vote honestly. As a form of malicious behaviour consists in sending inconsistent votes to other nodes, other DLTs require messages with “receipts” of each vote received, which entails additional overhead that the hashgraph does not require. The content of the voting is always the response to a YES/NO question (e.g. whether an event is famous, whether an event is a witness to another event, etc.), which is calculated in a purely algorithmic manner. In voting rounds, the “received round” is also calculated, as well as the “received time”. If two events are recorded in the same round, they are ordered based on their received time If there is still a tie, the tie is resolved by arranging them according to their signatures. This has a unique implication: Fair ordering of transactions. Every distributed ledger faces the problem of not just arranging what transactions are stored, but also in what order. Furthermore, it is also crucial that this order is “fair”, which in the Hedera network is defined as follows: A transaction has been received by the network once it has reached a significant fraction of the entire community of nodes; once a transaction has been received by the network, it is fair that this transaction is placed after all the transactions received before itself, and before all the transactions received after itself. In hashgraph, this is achieved by calculating the median timestamp of an event (the median of the times at which each node says it first received an event). This ensures fair timestamping and fair ordering of transactions. Nevertheless, this system would be vulnerable to numerous nodes joining the network, colluding and biassing the median in their favour. In this scenario, the hashgraphs would still be consistent, but ordering would not be fair. To avoid this, the Hedera network started as a permissioned network with trusted nodes run only by identifiable, highly reputable world-leading organisations who have a reputation to protect and are therefore unlikely to collude. As the network matures and it progresses towards a permissionless architecture, a Proof of Stake system is introduced into the virtual voting algorithm, such that e.g. the median timestamp becomes a weighted median, whereby nodes’ votes are valid by the percentage of the stake held by each node. As a result, if a Sybil attack is attempted (an attack in which a malicious actor seeks to manipulate a vote by creating numerous fake identities casting the votes), it would not succeed unless the attacker has amassed a very significant fraction of the total stake (½). The coin distribution schedule and the managed path to depermissioning in accordance to the maturity of the network mitigates this possibility, as the Hedera Council makes sure to make decisions on coin economics and permissioning in a safe way. Staking is optional. Tokens remain fully liquid, with no lock-up period, and there is no fixed minimum or maximum amount that an individual account must stake. To be eligible for rewards, an account must be staked for a minimum of 24 hours. Each node has a configurable maximum stake threshold which sets an upper limit on the amount of weight a node can contribute to consensus. Any stake above this threshold does not increase the node's influence or the proportion of rewards distributed. This cap is designed to prevent any single node from accumulating excessive influence, supporting fair transaction processing and Sybil resistance. The maximum stake per node is currently fixed at 450 million HBAR, and both this value and the minimum of 0 (zero) HBAR can be updated through network governance. Rewards for accounts staking on the Hedera network are distributed from the staking reward account (ID: 0.0.800), which has no keys and cannot return funds. Any community member can contribute HBAR to this account. The Hedera Council sets the reward rate and may update it over time. The reward rate is currently capped at a maximum of 2.5% annually. Rewards are calculated based on several factors including the amount staked to a given node, the total amount stakes on the network and node performance, and accrue in full-HBAR units. Indirect staking is also supported: If one account stakes to another that is itself staked to a node, both balances count towards the node’s weight, but only the directly staked account receives rewards. Accounts may also stake without opting into receiving rewards. Other networks address the problem of transaction ordering by simply taking turns to elect a leader (block proposer) that will select the batch of transactions added to the shared ledger, with the consensus timestamp being the timestamp decided by the leader. This however results in a transaction ordering that is not only not fair by definition, but potentially also corrupted: If leaders collect fees and may decide which transactions are added to the ledger earlier than others, there is an incentive to bribe the leaders to front-run transactions ahead of others, which introduces all sorts of negative possibilities in the network’s landscape. Leader-based systems are also vulnerable to other attacks, e.g. attacks that concentrate on shutting down each leader’s turn and “follow the leader” once the leader changes. The hashgraph, in turn, is leaderless and does not have these problems. In addition, in the hashgraph, once sufficient consensus is reached on a round and history can be considered immutable for all events up to the round. This ensures that all subsequent events (even those yet to be discovered) are assigned to later rounds. A member can then compile all transactions from these events, input them into a database in their agreed-upon order, and compute the resulting state from these transactions. Since every member adheres to the same order, they will all arrive at the identical state. This is a consensus state, which each member can hash and digitally sign the hash, putting the signature into a new transaction. When signatures from at least one-third of the population are gathered, this collection, along with the consensus state, forms a signed state that represents the official consensus for the system at the beginning of the round. This signed state can be shared with individuals outside of the community, who can then verify the signatures and, as a result, trust the authenticity of the state. At this point, all previous transactions could be deleted (they may also be kept) without any negative consequence, as the system is still immutable and secure and the state can be trusted. This feature of the consensus is called a “signed state” and is another advantage over alternative architectures. Other DLTs cannot guarantee consensus in this fashion, even by resorting to leaders, but only approximate it probabilistically while building in inefficiencies. For instance, in Bitcoin’s proof of work it is possible that two blocks are mined almost simultaneously or that, for any other reason, the community starts building on two branches of the transaction history at the same time. While eventually one branch will be abandoned and can be discarded, as the other branch accumulates more “work”, this is inefficient as many honest transactions could be discarded. Furthermore, at no particular point in time it is really known that consensus has been achieved. Rather, there is a probability of confidence that increases over time. In turn, in the hashgraph there is full confidence in consensus and furthermore, no transactions need to be discarded, and no branches are pruned. |
| H.5 | Incentive mechanisms and applicable fees |
The values of the transaction fees are set by the Hedera Council, in accordance with the compute power required for each transaction type. These fee values are set in US Dollars but paid in HBAR; with the exchange rate being updated regularly to reflect current market rates. The fee structure has fixed and variable components. The fixed components are based on the following structure:
|
| H.6 | Use of distributed ledger technology |
True
|
| H.7 | DLT functionality description |
Relying on hashgraph technology, the Hedera network offers a number of main functionalities:
|
| H.8 | Audit |
True
|
| H.9 | Audit outcome |
This audit was carried out using a computer-verified mathematical proof conducted through the Coq Proof Assistant system, a renowned tool for checking the validity of mathematical proofs through formal verification methods. This verification was led by Karl Crary, an Associate Professor of Computer Science at Carnegie Mellon University, ensuring an independent and credible review. The confirmation of hashgraph's ABFT status highlights its reliability, providing the highest level of security possible for distributed systems. The Hedera Council has also engaged FP Complete, an IT engineering specialist, to conduct a comprehensive independent audit of the Hedera network, including the new Hedera Token Service. This audit involved an in-depth code review and technical documentation analysis to assess the security, stability, and correctness of the Hedera software. The audit by FP Complete focused on validating the quality of engineering work performed by the Hedera Council’s development team, with special attention to the robustness, security, and audibility of the software. The results from FP Complete’s audit confirm the technical rigour of the Hedera Council's development processes and the reliability of the Hedera network and token service. |
| N | Field | Content |
|---|---|---|
| I.1 | Offer-related risks | N/A as the crypto asset was not offered to the general public (see Sec. II, N.10). |
| I.2 | Issuer-related risks |
|
| I.3 | Other tokens-related risks |
|
| I.4 | Project implementation-related risks |
|
| I.5 | Technology-related risks |
|
| I.6 | Mitigation measures |
|
| N | Field | Content | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| S.1 | Name |
|
||||||||||||||||||||||||
| S.2 | Relevant legal entity identifier |
|
||||||||||||||||||||||||
| S.3 | Name of the crypto-asset |
|
||||||||||||||||||||||||
| S.4 | Consensus mechanism |
|
||||||||||||||||||||||||
| S.5 | Incentive mechanisms and applicable fees |
|
||||||||||||||||||||||||
| S.6 | Beginning of period to which disclosed information relates |
|
||||||||||||||||||||||||
| S.7 | End of period to which disclosed information relates |
|
||||||||||||||||||||||||
| S.8 | Energy consumption |
|
||||||||||||||||||||||||
| S.9 | Energy consumption sources and methodologies |
|
||||||||||||||||||||||||
| S.10 | Renewable energy consumption |
|
||||||||||||||||||||||||
| S.11 | Energy intensity |
|
||||||||||||||||||||||||
| S.12 | Scope 1 DLT GHG emissions - controlled |
|
||||||||||||||||||||||||
| S.13 | Scope 2 DLT GHG emissions - purchased |
|
||||||||||||||||||||||||
| S.14 | GHG intensity |
|
||||||||||||||||||||||||
| S.15 | Key energy sources and methodologies |
|
||||||||||||||||||||||||
| S.16 | Key GHG sources and methodologies |
|
||||||||||||||||||||||||
| S.17 | Energy mix |
|
||||||||||||||||||||||||
| S.18 | Energy use reduction | N/A | ||||||||||||||||||||||||
| S.19 | Carbon intensity |
|
||||||||||||||||||||||||
| S.20 | Scope 3 DLT GHG emissions - value chain | N/A | ||||||||||||||||||||||||
| S.21 | GHG emissions reduction targets or commitments | N/A | ||||||||||||||||||||||||
| S.22 | Generation of waste electrical and electronic equipment (WEEE) |
|
||||||||||||||||||||||||
| S.23 | Non-recycled WEEE ratio |
|
||||||||||||||||||||||||
| S.24 | Generation of hazardous waste |
|
||||||||||||||||||||||||
| S.25 | Generation of waste (all types) |
|
||||||||||||||||||||||||
| S.26 | Non-recycled waste ratio (all types) |
|
||||||||||||||||||||||||
| S.27 | Waste intensity (all types) |
|
||||||||||||||||||||||||
| S.28 | Waste reduction targets or commitments (all types) | N/A | ||||||||||||||||||||||||
| S.29 | Impact of the use of equipment on natural resources |
|
||||||||||||||||||||||||
| S.30 | Natural resources use reduction targets or commitments | N/A | ||||||||||||||||||||||||
| S.31 | Water use |
|
||||||||||||||||||||||||
| S.32 | Non recycled water ratio |
|
||||||||||||||||||||||||
| S.33 | Other energy sources and methodologies |
|
||||||||||||||||||||||||
| S.34 | Other GHG sources and methodologies |
|
||||||||||||||||||||||||
| S.35 | Waste sources and methodologies |
|
||||||||||||||||||||||||
| S.36 | Natural resources sources and methodologies |
|