Back to Course

3. Advanced Course

0% Complete
0/0 Steps
  1. 1. What is Taproot?
  2. 2. Blockchain bridges – what are they?
  3. 3. What is Ethereum Plasma?
  4. 4. What is Ethereum Casper?
  5. 5. What is Zk-SNARK and Zk-STARK? 
  6. 6. What is Selfish Mining? 
  7. 7. What is spoofing in the cryptocurrency market? 
  8. 8. Schnorr signatures - what are they? 
  9. 9. MimbleWimble - what is it? 
  10. 10. What is digital property rights in NFT?
  11. 11. What are ETFs and what role do they play in the cryptocurrency market? 
  12. 12. How to verify a cryptocurrency project – cryptocurrency tokenomics 
  13. 13. What is the 51% attack on blockchain?
  14. 14. What is DAO, and how does it work?
  15. 15. Zero-knowledge proof – a protocol that respects privacy 
  16. 16. What is EOSREX?
  17. 17. What is Proof of Elapsed Time (PoET)?
  18. 18. Mirror Protocol – what it is? 
  19. 19. What are synthetic assets? 
  20. 20. How to create your own NFT? 
  21. 21. Definition of DeFi, and what are its liquidations?
  22. 22. New identity system - Polygon ID
  23. 23. Ethereum Foundation and the Scroll protocol - what is it?
  24. 24. What is Byzantine fault tolerance in blockchain technology?
  25. 25. Scalability of blockchain technology - what is it?
  26. 26. Interchain Security - new Cosmos (ATOM) protocol
  27. 27. Coin Mixing vs. Coin Join - definition, opportunities, and threats
  28. 28. What is Ethereum Virtual Machine (EVM) and how does it work?
  29. 29. Soulbound Tokens - what are they, and how do they work?
  30. 30. Definition of LIDO - what is it?
  31. 31. What are Threshold Signatures, and how do they work?
  32. 32. Blockchain technology and cyberattacks.
  33. 33. Bitcoin script - what it is, and what you should know about it.
  34. 34. What is zkEVM, and what are its basic features?
  35. 35. Do confidential transactions on blockchain exist? What is a Confidential Transaction?
  36. 36. Algorithmic stablecoins - everything you should know about them.
  37. 37. Polygon Zk Rollups ZKP - what should you know about it?
  38. 38. What is Web3 Infura?
  39. 39. Mantle - Ethereum L2 scalability - how does it work?
  40. 40. What is the NEAR Rainbow Bridge?
  41. 41. Liquid Staking Ethereum and LSD tokens. What do you need to know about it?
  42. 42. Top 10 blockchain oracles. How do they work? How do they differ?
  43. 43. What are Web3.js and Ether.js? What are the main differences between them?
  44. 44. What is StarkWare, and recursive validity proofs
  45. 45. Quant Network: scalability of the future
  46. 46. Polygon zkEVM - everything you need to know
  47. 47. What is Optimism (OP), and how do its roll-ups work?
  48. 48. What are RPC nodes, and how do they work?
  49. 49. SEI Network: everything you need to know about the Tier 1 solution for DeFi
  50. 50. Types of Proof-of-Stake Consensus Mechanisms: DPoS, LPoS and BPoS
  51. 51. Bedrock: the epileptic curve that ensures security!
  52. 52. What is Tendermint, and how does it work?
  53. 53. Pantos: how to solve the problem of token transfer between blockchains?
  54. 54. What is asymmetric encryption?
  55. 55. Base-58 Function in Cryptocurrencies
  56. 56. What Is the Nostr Protocol and How Does It Work?
  57. 57. What Is the XDAI Bridge and How Does It Work?
  58. 58. Solidity vs. Rust: What Are the Differences Between These Programming Languages?
  59. 59. What Is a Real-Time Operating System (RTOS)?
  60. 60. What Is the Ethereum Rinkeby Testnet and How Does It Work?
  61. 61. What Is Probabilistic Encryption?
  62. 62. What is a Pinata in Web 3? We explain!
  63. 63. What Is EIP-4337? Will Ethereum Account Abstraction Change Web3 Forever?
  64. 64. What are smart contract audits? Which companies are involved?
  65. 65. How does the AirGapped wallet work?
  66. 66. What is proto-danksharding (EIP-4844) on Ethereum?
  67. 67. What is decentralised storage and how does it work?
  68. 68. How to Recover Cryptocurrencies Sent to the Wrong Address or Network: A Practical Guide
  69. 69. MPC Wallet and Multilateral Computing: Innovative Technology for Privacy and Security
  70. 70. Threshold signature in cryptography: an advanced signing technique!
  71. 71. Vanity address in cryptocurrencies: what is it and what are its characteristics?
  72. 72. Reentrancy Attack on smart contracts: a threat to blockchain security!
  73. 73. Slither: a static analyser for smart contracts!
  74. 74. Sandwich Attack at DeFi: explanation and risks!
  75. 75. Blockchain RPC for Web3: A key technology in the world of decentralized finance!
  76. 76. Re-staking: the benefits of re-posting in staking!
  77. 77. Base: Evolving cryptocurrency transactions with a tier-2 solution from Coinbase
  78. 78. IPFS: A new era of decentralized data storage
  79. 79. Typical vulnerabilities and bridge security in blockchain technology
  80. 80. JumpNet - Ethereum's new sidechain
Lesson 36 of 80
In Progress

36. Algorithmic stablecoins – everything you should know about them.

You understand, cryptocurrencies are assets, characterized by high volatility of value in the market. Stablecoins, unlike cryptocurrencies, are backed by a stable asset or designed to combine some characteristics of fiat currencies and some cryptocurrencies.

Known for their stability, stablecoins are assets worthy of attention. Today we are taking on algorithmic stablecoins. However, before you get to the main topic, recall the basic issues about stablecoins [LINK – WHAT ARE STABLECOINS – BASIC LEVEL].

The role of stablecoin in the world of cryptocurrencies

Since their inception, stablecoins have been seen as something between traditional currency and cryptocurrencies. Their advantage is that they provide the best of both worlds: price stability, convenience, and privacy. What more could you want?

An important feature of stablecoin is that it is free from price fluctuations. The first stablecoin to enter the world of cryptocurrencies, was Tether (USDT). It was launched exactly on July 28, 2014. Currently, on the market of digital assets, we have a multitude of stablecoins available. We are talking, for example, about DAI, which we wrote about here [LINK – WHAT A DAO AND DAI MAKER IS – INTERMEDIATE LEVEL].

This would also include USDC, Digix Gold, Gemini Dollar and many, many others. The stablecoins themselves had a positive impact on the development of DeFi (Decentralized Finance). Whether it was lending, borrowing, liquidity pools, yeld farming – stablecoins were an indispensable part of DeFi.

Types of stablecoin

We can divide stablecoins into four main groups.

  1. Fiat Collateralized (secured with fiat currency).

As the name suggests, these are stablecoins, whose underlying asset is fiat currencies. What’s more, this type of stablecoin is regularly audited, further confirming its compliance with current financial regulations.

  1. Stablecoins backed by commodities.

That is, those that are backed by assets like gold, oil, silver, real estate and the like.

  1. Secured with cryptocurrencies.

That is, stablecoins, whose reserve asset is cryptocurrencies. Interestingly, this type of stablecoin is usually all the way over-secured. Therefore, before any cryptocurrency backed by stablecoin is released, the project must keep more pledged assets in its reserves. This is done to prevent high volatility of the reserved asset.

  1. Algorithmic stablecoins.

Algorithmic stablecoins have the same purpose in the market as others. However – they are not secured. So much by way of introduction. We will devote several paragraphs to this type of stablecoins.

Algorithmic stablecoins – definition

This type of stablecoin is pledged to cryptocurrencies. But with the difference that it automatically adjusts its demand, supply and other relevant details to reduce its volatility. Algorithmic stablecoins may be pledged with fiat currency, commodities, or even gold.

However, what sets them apart from other stablecoins, is that they have no reserve. Instead, they use intelligent contracts or codes for minting and firing new coins, which is their response to current market conditions.

The ranks of algorithmic stablecoins include Ampleforth (AMPL), DefiDollar (USDC), Basic Cash, Reserve, Debasconomics, Frax (FRAX), Empty Set Dollar (ESD).

How do algorithmic stablecoins work?

Algorithmic stablecoins consist of two coins. The first is responsible for market volatility, and the second holds the peg. Coin number two is the management token. This interaction between the first and second coins is required to maintain the stable value of an algorithmic stablecoin.

Let’s use an example. When the price of an algorithmic stablecoin, which is priced at $1, rises above the pledged price, then the algorithm mints new tokens. Why? The algorithm hopes that the new tokens will be sold and cause the current price to fall.

On the other hand, when the price falls below $1, then the algorithm will burn part of the tokens, hoping that the remaining ones will be priced higher than the previous price.

Stablecoins will not cease to amaze us. Algorithmic stablecoins can also be divided into three basic types:

  1. Rebasing Algorithmic Stablecoins. They operate based on the price elasticity of ERC-20 tokens. For these stablecoins, the rebase process regularly modifies the price.
  2. Seigniorage Algorithmic Stablecoins. This type of stablecoin consists of two coins – a cryptocurrency/stablecoin and a seigniorage property. This division was used to increase the supply of coins.
  3. Fractional Algorithmic Stablecoins. This type of stablecoin is a combination of fully algorithmic and secured stablecoins. They have a significantly lower deposit risk and exhibit the highest level of stability. They use a partial-collateral protocol and a two-token architecture in their operation.

Advantages and disadvantages of algorithmic stablecoins

The main task of algorithmic stablecoin is to increase capital efficiency. All thanks to intelligent contracts which are used to keep prices near pagged levels.

Moreover, algorithmic stablecoins maintain full decentralization in the stablecoin market. How? No third party is involved in their operation. At the same time, they eliminate the problems of raising sufficient capital, which is needed for reserve assets.

A big advantage of algorithmic stablecoin is also the high trust between users and developers. All thanks to peg, which is closely related to the algorithm of a given stablecoin, rather than security.

However, on the other hand, algorithmic stablecoins have a weak architecture. And despite their peg advantages, they are prone to de-pegging risk. Algorithmic stablecoins are also heavily influenced by demand, so thinking logically – a lack of demand for a particular coin, can cause its price to fall.

Another disadvantage of algorithmic stablecoins is that they depend on investors. Sometimes, as it happens in psychology, there is a herd mentality in the market for digital assets. We then have to deal with emotional decision-making and, for example, selling off algorithmic stablecoins. This causes their price to fall.

Can we trust algorithmic stablecoins?

Here are four main reasons why the answer will be yes.

  1. Compared to other top cryptocurrencies, they have higher stability.

They provide a far higher level of stability than traditional cryptocurrencies.

  1. Transparent code that we can check.

Algorithmic stablecoins are based on intelligent contracts and codes that are used to maintain the price. Any such code is open-source, so there’s nothing stopping you from taking a look at it to see if a particular stablecoin is safe and trustworthy.

  1. They have a decentralized structure.

The nature of algorithmic stablecoins is decentralized. No external entity has power over them. The data on algorithmic stablecoins is distributed across nodes, allowing them to be distributed evenly and fairly.

  1. Network management capability.

Algorithmic stablecoins are treated as native tokens in some protocols. Thus, the more of a given coin you have, the more influence you have over decisions in a given ecosystem.

Summary

You already understand the definition and what algorithmic stablecoins are all about. The topic is not as complicated as you might think.