
(Source: tenprotocol)
TEN focuses on data access control—a function well-established in Web2 but often overlooked in Web3. It brings this capability to the decentralized world using hardware-based Trusted Execution Environments (TEE), programmable encryption, and a fully EVM-compatible execution framework. With these features, TEN aims to build the next generation of Layer 2 with Smart Transparency.
Legacy blockchains emphasize making all data public. TEN argues that transparency does not mean all data should be open. By introducing Smart Transparency, TEN redesigns the smart contract framework.
The core idea is that smart contracts should control both computation rules and data access permissions. On TEN, contracts operate in an encrypted state, remain composable and automatable, and are fully compatible with Ethereum development practices. Developers can achieve Web2-level data control without sacrificing decentralization.
TEN uses three core technologies to define Layer 2.
On TEN, transactions, contract states, and application logic are encrypted during computation, preventing external inspection.
This means user activity is not tracked by on-chain analytics, and business strategies, game logic, and trading models stay confidential. Developers can build within the EVM-compatible framework without rewriting their applications. On TEN, MEV is not merely constrained—it is fundamentally eliminated.
TEN uses TEE to provide privacy but not to secure the ledger. This design avoids single-point trust risks and ensures users do not have to trade off chain integrity for TEE-based privacy.
TEN aggregates all data and submits it to the Ethereum mainnet, using rollup architecture to reduce transaction fees and keep costs competitive with other Layer 2 solutions. Transaction finality is synchronized with Layer 1, and developers benefit from familiar Ethereum tools.
$TEN has a fixed total supply of 1,000,000,000 (one billion) tokens. Its allocation is structured for sustainable growth and aims to avoid early centralization and transparency issues seen in traditional projects.
Main uses of $TEN include:
TEN treats its token as the network’s core resource, not as a short-term fundraising tool. Distribution is designed for gradual release, community sharing, and long-term incentives.
TEN’s token allocation prioritizes structure, transparency, and community engagement. The approximate breakdown is:

(Source: tenprotocol)
TEN’s vision is not just about improving on-chain efficiency. It aims to fill a long-standing gap in Web3—the data control layer. When users can control their data, set authorization methods, and maintain unified identities across apps, the structure of on-chain economies changes. From identity and authorization to data circulation, TEN enables secure information flow and value accumulation as a core asset, instead of leaving data siloed across protocols. This marks the start of a new era for advanced Web3 applications.
To learn more about Web3, register here: https://www.gate.com/
TEN goes beyond typical Layer 2 performance. Its core value is in redefining data sovereignty. Using a unified data layer and secure authorization framework, TEN reorganizes the relationships between users, developers, and applications, giving users control over their data. This data-focused architecture provides a stronger foundation for the Web3 ecosystem, allowing future applications to grow in a more flexible and resilient environment. TEN represents not just a technical upgrade, but a significant change for the future of Web3 data.





