Pre-migration documentation. This site reflects the pre-migration state of the protocol. It’s mostly current, but a few edges may not match ZERA at launch. We’re finalizing the new, detailed ZERA docs now. Thanks for your patience.
Regulatory Compliance
How $ZERA maintains utility token classification and regulatory compliance
$ZERA is structured as a pure utility token: non‑custodial, fee‑free, and without centralized managerial efforts or profit expectations. Design choices focus on complying with prevailing regulatory frameworks while preserving privacy.
$ZERA avoids security classification by delivering direct protocol utility rather than investment promises. The protocol is non‑custodial and operates without transmission services or central fee collection.
1. No Investment Contract
Holders purchase access to privacy features, not investment returns. The token provides functional utility within the protocol.
- Direct Utility: Tokens are consumed to activate privacy features
- Functional Value: Required for zero‑knowledge proof generation
- No Profit Promise: No guaranteed returns or dividends
- Immediate Use: Tokens provide instant protocol access
2. No Common Enterprise
The protocol operates in a decentralized manner without central management.
- Decentralized Protocol: No central authority controls operations
- Open Source: Code is publicly verifiable and community‑driven
- No Management: No corporate structure or managerial efforts
- User‑Controlled: Users maintain full control of their assets
3. No Expectation of Profits
Value accrual occurs through market mechanics and deflationary pressure, not managerial efforts.
- Market‑Driven: Price determined by supply/demand dynamics
- No Dividends: No profit sharing or revenue distribution
- Automatic Burns: Value creation through mathematical deflation
- No Promises: No guaranteed returns or profit expectations
4. No Reliance on Others
Burn mechanisms and value accrual operate automatically without human intervention.
- Smart Contract Automation: Burns triggered by protocol usage
- No Human Intervention: Mathematical rules govern operations
- Transparent Mechanics: All operations verifiable on‑chain
- Self‑Executing: Protocol operates independently
Zero Direct Fees
The protocol does not collect transaction fees or operate as a money transmission service.
- No Transaction Fees: Protocol operators do not collect fees
- Burn‑Based Value: Value accrual through token destruction
- User‑Controlled: Users pay for utility, not transmission services
- Non‑Custodial: No funds held by protocol operators
Non‑Custodial Design
Users maintain full control of their cryptographic keys and assets throughout all operations.
- Key Control: Users always control their private keys
- No Custody: Protocol never holds user funds
- Direct Transactions: Peer‑to‑peer without intermediaries
- Self‑Sovereign: Users maintain full asset control
No Transmission Services
The protocol facilitates direct peer‑to‑peer interactions without acting as a money transmitter.
- Direct P2P: Users interact directly without intermediaries
- Infrastructure Only: Protocol provides tools, not transmission
- User Responsibility: Users control all transaction details
- No Intermediation: No third‑party transmission services
GENIUS Act Compliance
Tokenomics aligns with emerging federal stablecoin frameworks while maintaining privacy features.
- Transparent Reserves: Clear backing for privacy‑enabled stablecoins
- Regulatory Reporting: Supports oversight requirements
- Privacy Preservation: Maintains strict confidentiality
- Consumer Protection: Built‑in safeguards for user funds
AML/KYC Compatibility
Configurable deposit limits and transparent reserve backing facilitate oversight when required.
- Configurable Limits: Adjustable deposit thresholds for compliance
- Transparent Backing: Verifiable reserve ratios and backing
- Regulatory Integration: Designed to avoid classification as a transmitter while remaining compatible with regulatory objectives
Cross‑Jurisdictional Compliance
Designed to meet regulatory requirements across multiple jurisdictions while preserving privacy.
- Privacy Preservation: Core privacy features remain intact
- Regulatory Flexibility: Adaptable to changing requirements
- Global Deployment: Multi‑jurisdictional operation
Regulatory Evolution
Conservative design prioritizes compliance across jurisdictions with built‑in adaptability.
- Conservative Approach: Designed to exceed current requirements
- Smart Contract Upgrades: Ability to adapt to new regulations
- Multi‑Jurisdictional: Compatible with various frameworks
- Future‑Proof: Built for an evolving landscape
Operational Risk Controls
Risk management through transparent operations and automated compliance‑minded design.
- Transparent Operations: All mechanisms publicly verifiable
- Automated Compliance: Built‑in regulatory mindfulness
- Risk Monitoring: Continuous assessment