The ICA Token

The value of the ICA is directly related to the real-world usage of the network, so attackers cannot spam the network without a proportional investment in the network’s bandwidth. What users decide to do with their share of the bandwidth is their own decision, but tying the network’s bandwidth to the value of the token should disincentivize behavior that would ultimately be harmful to the network.

Last updated