<aside> <img src="https://prod-files-secure.s3.us-west-2.amazonaws.com/3d9d148a-17e0-4707-bc02-080ba599512b/43616f78-6932-4fa7-a529-778996a1572a/logo-icon.png" alt="https://prod-files-secure.s3.us-west-2.amazonaws.com/3d9d148a-17e0-4707-bc02-080ba599512b/43616f78-6932-4fa7-a529-778996a1572a/logo-icon.png" width="40px" /> Symbiotic is a permissionless restaking protocol that provides flexible mechanisms for decentralized networks to coordinate node operators and providers of economic security.

</aside>

From Proof-of-Work to Restaking and Beyond

Decentralized networks require coordination mechanisms to incentivize and to hold accountable operators of infrastructure to provide the services they seek to deliver in the crypto economy.

The Bitcoin protocol introduced the first mechanism to trustlessly coordinate infrastructure providers (miners) to provide the service of digital money (Bitcoin) via Proof-of-Work. The invention of Proof-of-Stake allows decentralized networks such as Ethereum to source infrastructure providers (validators) to provide their services (for Ethereum: programmable money) through economic collateral (Proof-of-Stake). Shared security implementations seek to increase capital efficiency by expanding the services provided by a set of node operators using the same underlying economic security (prior work include e.g. Polkadot’s parachain and crowdloan designs, Cosmos Interchain and Mesh Security, and EigenLayer restaking).

Symbiotic is a permissionless protocol of enshrined principles that enables protocol participants to flexibly form trust-minimized shared security agreements. Participants of the Symbiotic protocol economy include node operators (from here on referred to simply as operators), decentralized protocols (from here on simply referred to as networks), and providers of economic security (restakers).

The Symbiotic Protocol Economy.

The Symbiotic Protocol Economy.

Symbiotic functions as a thin security coordination layer enabling builders of networks to fully control and continuously adapt their own (re)staking implementation in a permissionless manner to service any possible decentralized infrastructure use case and its requirements. This enables the Symbiotic protocol to help scale decentralized networks in a safe, transparent, and capital-efficient way. In the long run, we envision the Symbiotic protocol to extend to serve further innovative reputation-based operator and security coordination models.

The Value Proposition of Symbiotic

The protocol’s flexible and credibly neutral design brings unique benefits to participants in the Symbiotic economy:

Protocol Design

Components of the Symbiotic Protocol

The Symbiotic protocol consists of 5 interconnected components:

2.png

Collateral (aka stake, commitments,…)

The security layer of Symbiotic. Collateral is an abstraction used to represent underlying onchain assets, which are chain- and asset-agnostic in Symbiotic. Collateral in Symbiotic can encompass ERC20 tokens, withdrawal credentials of Ethereum validators, or other onchain assets such as LP positions, without limitations regarding which blockchains the positions are held on.

Vaults (aka operator staking pools, liquid (re)staking protocols,…)