#night $NIGHT @MidnightNetwork

Most blockchains operate with a simple and limiting logic: to use the network, you spend the native token. Each transaction on Ethereum consumes ETH. Each operation on Solana consumes SOL. The token is, at the same time, a valuable asset and disposable fuel.

This architecture creates a structural problem: the more the network is used, the more the token is consumed — making costs unpredictable, volatile, and hostile for companies that need to plan budgets.

The Midnight Network — privacy blockchain developed by Input Output Global (IOG), the same company behind Cardano and led by Charles Hoskinson — proposes a break with this paradigm. At the heart of this break is the $NIGHT and its most primordial mechanism: the token is not spent. It generates.

The Primordial Point: Separation between Capital and Operational Cost

The founding principle of tokenomics can be summarized in one sentence:

You do not pay to use the network. You hold the right to use it.

This distinction changes everything.

The Dual Model: NIGHT and DUST

Midnight introduces a two-component system that operates symbiotically:

Component

Type

Function

Ownership

$NIGHT

Native token / capital asset

Governance, network security, DUST generation

Public, non-shielded, transferable

DUST

Network resource

Payment of fees and execution of smart contracts

Armored, non-transferable, renewable, and decaying

NIGHT continuously generates DUST, proportional to the amount held in the wallet. DUST is then consumed in transactions — but NIGHT remains intact.

It is the economic equivalent of a renewable energy source: the solar panel (NIGHT) captures energy continuously. The electricity generated (DUST) is used to power devices. The panel itself is not destroyed in the process.

How the Mechanism Works in Practice

DUST Generation

By holding in a wallet, the protocol automatically generates DUST at defined intervals. The generation rate is proportional to the volume of NIGHT held and the network parameters. There is no need for active staking, forced lock-up, or any manual action: the simple act of holding the token is sufficient to accumulate network usage capacity.

Consumption and Decay

The generated DUST has two critical properties:

Non-transferability: DUST cannot be sent between wallets as a means of paying debts or purchasing goods. This ensures that the network provides privacy for data — not a shield for illicit uses.

Temporal decay: unused DUST decays over time. This prevents speculative accumulation of the resource and denial-of-service (DoS) attacks on the protocol.

DUST Delegation

Although non-transferable, DUST can be delegated. This opens important possibilities:

Developers can delegate DUST to cover transaction costs for users of their applications, without transferring ownership of the underlying NIGHT.

Future implementations foresee a capacity marketplace, where NIGHT holders can lease DUST generation to third parties.

Technical Foundation

Privacy Architecture: ZK-SNARKs and the Kachina Protocol

The separation between NIGHT (public) and DUST (shielded) is not just economic — it is cryptographic.

Midnight uses Zero-Knowledge Succinct Non-Interactive Arguments of Knowledge (ZK-SNARKs) to ensure that transactions can be validated as correct without revealing their contents. The specific protocol is called Kachina and operates on a dual-state ledger:

Public state: where NIGHT is recorded, traceable, and auditable.

Private state (shielded): where DUST and transaction data reside, protected by zero-knowledge proofs.

This architecture allows selective privacy: a user can prove that a transaction occurred and was valid — without revealing the amounts, recipients, or data involved. This is what Midnight calls rational privacy: context-configurable privacy, not absolute and unrestricted privacy.

Contract Language: Compact

Smart contracts on Midnight are written in Compact, a domain-specific language (DSL) based on TypeScript, designed to compile ZK circuits in a way accessible to developers with Web2 experience. This significantly reduces the technical barrier for creating private applications.

Consensus: Minotaur Protocol

For consensus, Midnight uses Minotaur — a hybrid protocol that combines Proof-of-Work (PoW) and Proof-of-Stake (PoS). This approach allows leveraging security resources from multiple blockchains simultaneously and plays a direct role in PoS, with block producers being rewarded in NIGHT extracted from a reserve managed by the protocol.

Multi-Chain Architecture

The $NIGHT exists natively on two networks simultaneously:

As Cardano Native Asset (CNA) on the Cardano blockchain

As a native token on the Midnight Network

The protocol imposes a strict invariant: the total NIGHT across the two networks can never exceed 24 billion tokens. A one-way bridge (Cardano → Midnight) has been planned since launch, with a bidirectional bridge planned for later phases.

Cardano (CNA) ←──── protocol guarantees invariant ────→ Midnight (native) ──────────── one-way bridge (launch) ─────────── (bidirectional: future phase)

NIGHT tokens represented on other networks by third parties (wrapped, bridged) do not carry the rights and utilities of the original token — an important technical and legal distinction.

Tokenomics: Distribution and Deflation

Total Supply

The total supply is fixed at 24 billion tokens — a deliberate number: there are 24 hours in a day, and each token divides into 1 million subunits called STAR, allowing precise denominations for all network operations.

Deflationary Model

was designed with progressive deflation:

New tokens enter circulation as rewards for block production, extracted from a reserve managed by the protocol.

The emission rate gradually slows down with each block.

When the Reserve is exhausted, the circulating supply equals the total supply — no more inflation.

NIGHT is not burned in any function of the protocol. This differentiates the model from most EVM tokens, where burn mechanisms create artificial deflationary pressure.

Distribution: Glacier Drop

The initial distribution adopted the Glacier Drop model — a free mechanism, in multiple phases, without private sales or VC rounds:

Phase

Mechanism

Eligibility

Phase 1

Scavenger Hunt

Resolution of computational tasks

Phase 2

Glacier Drop

Holders of ADA, BTC, ETH, SOL, XRP, BNB, AVAX, BAT

Phase 3 (Redemption)

5-year window

Eligible participants who missed prior windows

The distributed tokens are subject to a 450-day unlocking period, with release in equal quarterly installments — designed to avoid concentrated selling pressure at launch.

Why This Model Matters

For Users and Businesses

The NIGHT/DUST model solves a real business adoption problem: cost predictability. A company integrating Midnight into its processes can calculate in advance how many transactions it can execute based on the volume of NIGHT held — without relying on the price volatility of the token to plan operations.

For the Network

The non-expendability of NIGHT means that participating in the network does not dilute governance rights. A holder who uses the network intensively retains the same voting power as a passive holder with the same amount of tokens.

For the Web3 Ecosystem

Midnight's architecture positions it as an interoperable privacy infrastructure layer — not an isolated island. The concept of Babel Station (gateways that abstract NIGHT entirely, allowing payment in other tokens or fiat) and the future capacity marketplace suggest an ecosystem where the end user may not even know they are interacting with a blockchain.