Technical Architecture
USDi's technical architecture is designed to be robust, scalable, and secure, leveraging smart contracts and blockchain technology.
1. Asset Conversion
Process Overview:
Users deposit supported stablecoins (e.g., USDC, DAI) into the USDi smart contract.
The smart contract verifies the deposit and mints an equivalent amount of USDi tokens to the user's address.
Deposited stablecoins become part of the protocol's collateral pool.
Supported Stablecoins:
USDC (USD Coin)
DAI (Dai Stablecoin)
USDT (Tether)
BUSD (Binance USD)
Additional stablecoins to be supported in future updates.
2. Cross-Chain Bridge
Functionality:
USDi utilizes a decentralized cross-chain bridge to enable asset transfers between supported networks.
The bridge employs atomic swap protocols to ensure that transactions are secure and either fully completed or not executed at all.
Relayers and validators facilitate cross-chain communication and transaction verification.
Security Measures:
Multi-Signature Authorization: Transactions require multiple signatures from trusted parties to be executed.
Time-Locked Transactions: Adds an additional layer of security by delaying execution to prevent rapid exploit attempts.
Auditable Trails: All transactions are recorded on-chain, allowing for transparency and auditability.
3. Yield Distribution
Yield Generation Strategies:
Lending Protocols: Assets are lent out on platforms like Aave, Compound, and others to earn interest.
Liquidity Provision: Providing liquidity on decentralized exchanges (DEXs) to earn fees.
Staking and Farming: Participating in staking pools and yield farming opportunities.
Distribution Mechanism:
Yields are accumulated in the protocol's yield pool.
On a regular basis (e.g., daily or weekly), yields are calculated and proportionally distributed to USDi holders.
Distribution is automated via smart contracts, ensuring fairness and transparency.
4. Liquidity Management
Dynamic Allocation:
The protocol monitors market conditions, platform performance, and risk factors to adjust liquidity allocations.
Allocation strategies aim to maximize yield while maintaining acceptable risk levels.
Risk Management:
Diversification: Spreading assets across multiple platforms reduces exposure to any single point of failure.
Real-Time Monitoring: The protocol continuously monitors for platform vulnerabilities, security breaches, or adverse market events.
Automated Responses: In the event of detected risks, the protocol can automatically withdraw assets or adjust allocations.
Last updated