Chainlink
$27.47 -6.97%
LINK · 3w

Picipo Will Integrate Chainlink VRF to Power Its Unified NFT Management Platform With a Secure and Truly Unbiased Source of On-chain Randomness

Picipo Will Integrate Chainlink VRF to Power Its Unified NFT Management Platform With a Secure and Truly Unbiased Source of On-chain Randomness

We’re excited to announce that Picipo — a unified NFT management platform — will integrate Chainlink Verifiable Random Function (VRF) on the Polygon Network. By integrating Chainlink’s industry-leading decentralised oracle network, we will obtain access to a tamper-proof and auditable source of randomness needed to get an NFT from the pool after fractionalization. Ultimately this creates a more exciting, transparent, and fraud-proof user experience, as users can get NFTs on favorable terms and in a fun way.

On Picipo a fractalization process will create liquidity for the secondary market and fair pricing of NFT collections.

Here is how the process works:

The user sends his NFT collection to the whitelist for fractionalization while they undertake to put liquidity in USDT-ETH on decentralized exchanges. The DAO decides to add to the whitelist by voting. If successful, the user can create a pool from the locked NFT collection and mint 1000 ERC-20 tokens derived from the NFT pool — we refer to them as dERC-20/ERC-20 derivatives. After minting dERC-20 and distributing it to the NFT pool, the user cannot add ERC-721. We deliberately close the pool by adding new NFTs to protect the index from liquidity erosion and so that market makers can take this into account in their strategy in the future. In this case, the user can redeem a random NFT from the pool — each NFT is equal to 1/N dERC-20, where N is the number of NFTs in the pool.

In order to add excitement to the game in a fair manner, we need access to a secure random number generator (RNG) that any user could independently audit. However, RNG solutions for smart contracts require several security considerations to prevent manipulation and ensure system integrity. For instance, RNG solutions using on-chain data like block hashes can be exploited...

Continue on picipo-io.medium.com
Recent news