WRITINGS
Stay up to date with thoughts, research and updates from the Symbiotic team
Economic Security for Guarantees
Economic Security for Guarantees
By extending the concept of shared security beyond traditional proof-of-stake consensus, Symbiotic creates a flexible coordination layer where staked assets can underwrite a wide range of use cases.
05,
2025
Research
Modeling Target Stake Requirements in Proof-of-Stake and Restaking-Based Networks
Modeling Target Stake Requirements in Proof-of-Stake and Restaking-Based Networks
Abstract This research in collaboration with TokenSight explores how networks can estimate the amount of stake (or collateral) required to operate securely under Proof-of-Stake or restaking-based models. It introduces a framework for calculating “target stake” based on variables such as total value at risk, attack profitability, validator behavior, and slashing
23,
2025
Research
Demystifying Slashing
Demystifying Slashing
Slashing is ultimately a powerful deterrent that rarely needs to be invoked. This analysis examines real-world slashing data across Ethereum, Cosmos, and Polkadot, revealing how uncommon these events are and why this security feature works so effectively despite its infrequent use.
16,
2025
Research
Building with Symbiotic: Collateral Abstraction
Building with Symbiotic: Collateral Abstraction
Shared security resolves crypto fragmentation through the abstraction of collateral from underlying security functions, improving capital efficiency and alignment.
31,
2024
Research
Building with Symbiotic: Appchains
Building with Symbiotic: Appchains
Symbiotic’s flexibility enhances nearly any use case through increased security and decentralization while maintaining sovereignty. In this article, we’ll explore how Symbiotic can be integrated into appchain networks. We’ll start by describing an abstract protocol and identify specific areas where Symbiotic infrastructure may provide value. What’s
24,
2024
Research