Pi Network is a fascinating experiment in the world of cryptocurrency. It aims to make crypto mining accessible to anyone with a smartphone, removing the traditional barriers of expensive hardware and technical know-how. Unlike Bitcoin or Ethereum, which require intensive computation, Pi’s “mining” process is designed to be lightweight, focusing on user engagement and network growth. It’s built on the vision of creating a new digital currency and a robust ecosystem where everyday people can participate, contribute, and potentially derive value.
In this comprehensive guide for beginners, we will explore the intriguing world of Pi Network. We’ll start by revisiting the fundamental concepts of cryptocurrency, blockchain, and decentralization. Then, we’ll delve into Pi’s unique past, its visionary founders, its current “use cases,” and its ambitious roadmap for the future, including its recent Open Mainnet launch. We’ll also address common misconceptions about crypto, ensuring you have a clear, accurate, and trustworthy understanding as you navigate this unique crypto venture.
Your Crypto Compass: Navigating the Basics (Revisited)
Before we delve into the specifics of Pi Network, let’s establish a solid understanding of the foundational concepts that underpin the entire cryptocurrency landscape. These are essential for grasping Pi’s innovative, albeit distinct, approach.
- Cryptocurrency: Imagine digital money that exists purely online, secured by complex computer code called cryptography. Unlike the Indian Rupee or US Dollar, which are issued and controlled by central banks, cryptocurrencies are decentralized. This means no single government, bank, or institution controls them. They are designed to be peer-to-peer, allowing direct transactions between individuals without intermediaries. Pi Coin (PI) is the native cryptocurrency of the Pi Network.
- Blockchain: Picture a public, unchangeable digital ledger, like a massive, continuously updated spreadsheet, that meticulously records every transaction. Instead of being stored in one central location, this ledger is distributed across countless computers worldwide. Each new “block” of transactions is cryptographically linked to the previous one, forming an unbroken “chain.” Once a transaction is recorded, it’s virtually impossible to alter or remove. This inherent transparency, security, and immutability are what make cryptocurrencies and decentralized applications possible. Pi Network is building its own blockchain, distinct from established ones like Bitcoin or Ethereum.
- Decentralization: This is a core philosophy in the crypto universe. It signifies that power and control are distributed among many participants in a network, rather than being concentrated in the hands of a few. For instance, Bitcoin is decentralized because no single company or government owns or controls it. Pi Network aims for decentralization by allowing a broad base of users to participate in the network’s security and governance, ostensibly without a central authority controlling all aspects of the currency.
- Mining (and how Pi’s “mining” is different): For some cryptocurrencies like Bitcoin, “mining” is the process where powerful computers solve complex mathematical puzzles to verify and add new transactions to the blockchain, earning new coins as a reward. This process (Proof-of-Work) is energy-intensive and requires specialized hardware.
Pi Network’s approach to “mining” is fundamentally different. It’s often referred to as “mobile mining” or “social mining.” Users “mine” Pi coins by simply checking in with the app once every 24 hours and tapping a button. This process does not consume your phone’s battery or processing power in the same way traditional mining does. Instead, it’s designed to:
- Prove Presence: Demonstrate active engagement with the network.
- Contribute to Security Circles: Users form “security circles” of 3-5 trusted individuals. These circles, based on the Stellar Consensus Protocol (SCP), help secure the network by vouching for trusted participants, preventing fraudulent transactions.
- Grow the Network: Incentivize user acquisition and network expansion through a referral system.
In essence, Pi’s “mining” is more akin to a distribution mechanism and a user engagement strategy than traditional cryptographic proof-of-work.
The Journey of Inclusion: Pi Network’s Past and its Stanford Founders
The story of Pi Network began with a clear vision: to make cryptocurrency accessible to everyone, circumventing the complexity and resource demands of early crypto projects.
The Problem Pi Network Sought to Solve
The founders of Pi Network identified several significant barriers to mainstream cryptocurrency adoption:
- High Entry Barriers for Mining: Traditional mining required expensive hardware, technical expertise, and substantial electricity, making it inaccessible to the average person.
- Complexity of Use: Cryptocurrencies like Bitcoin were perceived as complex to understand, acquire, and use for everyday transactions.
- Centralization Concerns: As crypto mining became dominated by large pools and powerful entities, concerns arose about centralization of control.
- Lack of Real-World Utility: Many cryptocurrencies lacked immediate, tangible use cases for everyday consumers.
The Visionary Minds Behind Pi Network
Pi Network was founded by two Stanford University PhDs, bringing a blend of academic rigor and practical innovation to the crypto space:
- Dr. Nicolas Kokkalis: As the Head of Technology, Dr. Kokkalis is a Stanford PhD in computer science. He previously taught Stanford’s first decentralized applications course in 2018. His expertise lies in distributed systems, human-computer interaction (HCI), and social computing, which are evident in Pi’s design for user accessibility and network growth. His focus is on making cryptocurrency usable for everyday people.
- Dr. Chengdiao Fan: As the Head of Product, Dr. Fan is a Stanford PhD in anthropological sciences. Her work centers on social computing and human behavior. She is instrumental in designing Pi Network’s user experience, community-building features, and the vision for an inclusive digital ecosystem where individuals worldwide can contribute and be rewarded.
The founders’ combined expertise aimed to create a user-friendly, socially-oriented cryptocurrency that could achieve mass adoption.
Key Milestones and Phases of Development
Pi Network launched on March 14, 2019 (Pi Day), initiating a multi-phase development roadmap:
- Phase 1: Design, Distribution, and Trust Graph Bootstrap (2019 – 2020)
- Mobile App Launch: The Pi Network mobile app was launched on iOS and Android, allowing users to start “mining” Pi by tapping a button daily.
- Security Circles: The concept of security circles, based on the Stellar Consensus Protocol (SCP), was introduced to build a decentralized trust graph. Users inviting others and forming these circles contributed to the network’s security and expanded its user base.
- Growth: This phase saw rapid user acquisition, reaching millions of “Pioneers” (Pi users) globally through word-of-mouth and the app’s referral system.
- Phase 2: Testnet (2020 – 2021)
- Decentralized Node Software: The Pi Node software was released, allowing users to run nodes on their computers, validating transactions and contributing to the network’s security without the energy demands of traditional mining.
- Developer Platform: Tools for developers were introduced, encouraging the community to start building decentralized applications (dApps) on the Pi blockchain.
- Continued Growth: The user base continued to expand significantly, validating the mobile-first approach.
- Phase 3: Enclosed Mainnet (2021 – February 2025)
- Mainnet Launch (Enclosed): The Pi Mainnet officially launched, but it was in an “enclosed” state. This meant that while transactions were happening on the real blockchain, external connectivity was restricted. Pi coins could be migrated to the mainnet for users who completed KYC (Know Your Customer) verification, but they could not be freely traded on external exchanges.
- KYC Verification: A crucial focus of this phase was the mass KYC verification of millions of Pioneers. This process aimed to confirm the identity of legitimate users, prevent bot accounts, and comply with potential regulatory requirements for the eventual Open Mainnet.
- Ecosystem Development: The Core Team emphasized building out the Pi ecosystem, encouraging dApp development through initiatives like the Pi Hackathon. The goal was to create tangible utility for Pi coins within the network before opening it up to external markets. This also saw the development of the Pi Browser, a dedicated browser for interacting with Pi dApps.
- Phase 4: Open Mainnet (February 20, 2025 – Present)
- Full Decentralization: Pi Network officially launched its Open Mainnet on February 20, 2025. This marked the transition to a fully decentralized blockchain network, allowing external transfers of Pi coins and enabling the possibility of listing on major cryptocurrency exchanges.
- Market Fluctuations: The launch of the Open Mainnet led to immediate price fluctuations for Pi Coin, with an initial surge followed by dips and rebounds, as the market began to discover its value in an open trading environment.
- Ecosystem Growth Continuation: The focus remains on growing the utility of Pi through its ecosystem of applications, partnerships, and developer engagement.
The journey of Pi Network has been long and deliberate, characterized by a unique focus on gradual user adoption, identity verification, and ecosystem building before opening up to broader market forces.
Beyond the Tap: Pi Network’s “Use Cases” and Ecosystem
Unlike many cryptocurrencies launched with a whitepaper and immediate exchange listings, Pi Network has taken a different path, emphasizing community and a gradual build-out of its ecosystem before full market exposure. This means its “use cases” have primarily developed within its closed environment and are now expanding with the Open Mainnet.
Primary Use Cases (Past & Present)
- Mobile Mining / User Engagement:
- Purpose: The core activity for Pioneers. It’s designed to distribute Pi coins widely and fairly, incentivize daily interaction with the app, and grow the user base without consuming phone resources.
- Benefit: Provides a low-barrier entry point for anyone to acquire cryptocurrency, democratizing access to the crypto space.
- Security Circles:
- Purpose: Users form “security circles” by identifying 3-5 trusted individuals from their network. These circles form a global trust graph that underpins the network’s security using the Stellar Consensus Protocol (SCP).
- Benefit: Contributes to the decentralization and security of the Pi blockchain, as trusted nodes collectively validate transactions. It leverages social connections to build trust.
- Pi Node Operation:
- Purpose: Individuals can run Pi Node software on their desktop or laptop computers. These nodes help validate transactions on the Pi blockchain and contribute to its overall decentralization and security.
- Benefit: Allows more technically inclined users to directly participate in the network’s infrastructure, further decentralizing its operation beyond just mobile users.
- Pi Browser and dApps (Decentralized Applications):
- Purpose: The Pi Browser is a specialized web browser within the Pi ecosystem. It allows users to interact with Pi-specific decentralized applications (dApps) built by the community. These dApps are intended to create utility for Pi Coin.
- Examples: Community-built dApps might include:
- Pi Chain Mall: A decentralized marketplace where users can buy and sell goods and services using Pi coins.
- Pi Games: Play-to-earn games or other interactive experiences.
- Social dApps: Platforms for communication and community building within the Pi ecosystem.
- Benefit: Creates an internal economy and fosters real-world utility for Pi, demonstrating its potential as a medium of exchange. This moves Pi beyond just a speculative asset to something with tangible applications.
- P2P Transactions (within Enclosed Mainnet):
- Purpose: During the Enclosed Mainnet phase, users who had completed KYC could send and receive Pi coins peer-to-peer within the Pi ecosystem.
- Benefit: Enabled early transactions and testing of the Pi blockchain’s functionality in a live environment, preparing it for broader usage.
Future Use Cases (Post Open Mainnet)
With the Open Mainnet launched in February 2025, the potential use cases for Pi Coin significantly expand:
- Open Trading on Exchanges:
- Purpose: The Open Mainnet enables Pi Coin to be listed and freely traded on major centralized cryptocurrency exchanges (CEXs) and decentralized exchanges (DEXs).
- Benefit: Provides liquidity for Pi holders, allows market discovery of Pi’s value, and makes it accessible to a much broader global audience.
- E-commerce and Merchant Adoption:
- Purpose: The long-term vision is for Pi to be widely accepted as a payment method by merchants and businesses worldwide, both online and offline.
- Benefit: Transforms Pi into a practical digital currency for everyday purchases, competing with traditional payment methods.
- Broader dApp Ecosystem:
- Purpose: With an open mainnet, developers have greater flexibility to build more sophisticated and interconnected dApps on Pi, potentially integrating with other blockchain ecosystems.
- Benefit: Enhances the utility of Pi by providing diverse applications, from DeFi (decentralized finance) services to advanced social platforms and innovative Web3 experiences.
- Tokenized Real-World Assets (Potential):
- Purpose: In the future, the Pi blockchain could potentially host tokenized real-world assets, allowing for fractional ownership or more efficient transfer of assets like real estate or commodities.
- Benefit: Expands the scope of the Pi ecosystem into broader financial and asset management areas.
- Expertise Insight: “Pi Network’s approach of building utility before widespread market trading is a deviation from many crypto projects. This strategy aims to create a self-sustaining ecosystem where Pi has intrinsic value from its use within applications, rather than solely relying on speculative trading.”
Dispelling the Myths: Addressing Common Crypto Misconceptions (and Pi’s Context)
The unique nature of Pi Network, with its mobile “mining” and lengthy development phases, often triggers or plays into common misconceptions about cryptocurrency. Let’s address these head-on, using Pi’s context to provide clarity.
- “Cryptocurrency is only for criminals and illicit activities.”
- Reality: While cryptocurrencies, like any form of money (fiat or digital), can be misused, the vast majority of crypto transactions are legitimate. Law enforcement and blockchain analytics firms routinely use the transparent nature of public blockchains to track illicit funds more effectively than with traditional cash.
- Context for Pi: Pi Network has emphasized KYC (Know Your Customer) verification for its users before they can migrate their mined Pi to the Mainnet. This means that unlike some purely anonymous crypto interactions, Pi aims to have a verified user base. This commitment to identity verification directly counteracts the notion that it’s designed for illicit activities. Furthermore, all transactions on the Pi blockchain are publicly recorded, contributing to transparency.
- Expertise Insight: “Pi Network’s focus on widespread KYC before Open Mainnet migration is a significant step towards compliance and disproving the ‘criminal’ narrative. It demonstrates a commitment to building a legitimate and auditable financial system.”
- “Crypto is a scam/Ponzi scheme.”
- Reality: Unfortunately, the crypto space has been a fertile ground for scams. However, legitimate decentralized projects are built on verifiable technology and provide genuine utility. A Ponzi scheme relies on new investor money to pay off earlier investors, with no sustainable underlying business.
- Context for Pi: Pi Network has faced considerable skepticism and criticism, often being likened to a multi-level marketing (MLM) scheme or a scam due to its referral system and the long wait for the Open Mainnet. However, it is crucial to differentiate:
- Referral System vs. Ponzi: While Pi uses a referral system to grow its user base (similar to many tech startups), it claims that the “mining” rewards are not directly paid from new user investments but from the initial allocation for mining rewards, and the value is derived from future ecosystem utility.
- Open-Source and Auditable: The Pi Core Team has stated its intention for the Pi blockchain code to be open-source, allowing for public audits and transparency. The goal is to build a functional blockchain and ecosystem.
- Lack of Immediate Monetary Value (Historically): For a long time, Pi coins had no external market value, which countered the typical “get rich quick” scam narrative that often promises immediate, unsustainable returns. With the Open Mainnet, Pi has a market value, but it’s determined by supply and demand, not by a guaranteed return structure.
- Authoritativeness Tip: “We at [Your Blog Name] always advise extreme caution with projects that offer ‘free money’ or promise guaranteed returns. While Pi’s model is unique and has generated debate, its transition to an Open Mainnet and focus on a real ecosystem aims to distinguish it from outright scams. However, vigilance is key, and users should understand that initial gains are speculative.”
- “Crypto is bad for the environment.”
- Reality: This myth primarily stems from older Proof-of-Work (PoW) cryptocurrencies like Bitcoin. However, the crypto industry is rapidly shifting towards more sustainable models.
- Context for Pi: Pi Network explicitly addresses this concern by not using energy-intensive Proof-of-Work mining. Instead, it utilizes a variation of the Stellar Consensus Protocol (SCP), which is a low-energy, highly efficient consensus mechanism. The mobile “mining” process itself requires minimal battery or CPU usage on your phone. This makes Pi Network one of the more environmentally friendly approaches to cryptocurrency distribution and validation.
- Experience Insight: “My initial concern about crypto’s energy use was a major hurdle. Projects like Pi Network, with their innovative, low-energy ‘mining’ methods, were instrumental in showing me how blockchain technology can evolve to be sustainable and accessible.”
- “Crypto will replace all traditional money.”
- Reality: While cryptocurrencies and decentralized finance (DeFi) introduce revolutionary ways to manage money and offer significant improvements over traditional financial systems, it’s highly unlikely they will entirely replace fiat currencies (like the Rupee or Dollar) in the foreseeable future.
- Context for Pi: Pi Network’s stated goal is to create a widely accessible and usable cryptocurrency for everyday people. This vision leans towards becoming a mainstream digital currency, but it’s more about offering an alternative or complementary financial system rather than a complete overthrow of existing ones. Fiat currencies still serve critical roles in daily commerce, taxes, and government functions. The future is more likely one of coexistence and integration, where digital currencies like Pi find their niche in payments, e-commerce, and community-driven economies, fostering competition and innovation within the broader financial landscape.
- Trustworthiness Principle: “Pi Network represents an ambitious attempt to bridge the gap between complex blockchain technology and everyday users. While it may not replace all money, its success could demonstrate a powerful model for financial inclusion and a new form of digital economy, complementing existing systems.”
By addressing these common misconceptions with specific examples from Pi Network, we aim to provide a more accurate and nuanced understanding of the crypto space, empowering beginners to approach it with confidence and informed judgment.
Taking the First Step: A Beginner’s Perspective on Getting Started with Pi Network
Engaging with Pi Network is relatively simple, especially compared to other cryptocurrencies. Since the Open Mainnet launch in February 2025, Pi is now tradable on some exchanges, adding a new dimension to its accessibility. However, it’s crucial to understand the distinct process for Pi.
Remember, the crypto market is inherently volatile, and this is for educational purposes only – not financial advice.
1. Understanding What You’ll Need
- A Smartphone: The Pi Network app is the primary interface for “mining” Pi. It’s available on both iOS (App Store) and Android (Google Play Store).
- An Invitation Code: Pi Network’s growth model relies heavily on referrals. You’ll need an invitation code from an existing user to sign up. This helps build the “security circles” and the overall trust graph.
- Internet Connection: Essential for the app to connect to the Pi Network and register your daily “mining” session.
- Patience and Long-Term Outlook: Pi Network has been a long-term project. While the Open Mainnet is live, its ecosystem is still developing, and its value depends on widespread adoption and utility.
2. Getting Started with the Pi Network App (The “Mining” Phase)
- Download the Pi Network App: Search for “Pi Network” in your device’s app store and download the official application.
- Sign Up:
- You’ll typically have options to sign up using your Facebook account or phone number. Using your phone number is often recommended for better KYC compatibility later.
- Follow the prompts to set up your password.
- Enter Invitation Code: This is where you’ll input the referral code from an existing Pi user. Without one, you cannot proceed.
- Set Up Your Account: Provide your real name (crucial for KYC later) and choose a username.
- Start “Mining”:
- Once signed in, you’ll see a lightning bolt icon or a similar button. Tap this button once every 24 hours to initiate your “mining” session. The app doesn’t need to be open constantly, but you must check in daily.
- Your “mining” rate will depend on factors like your base rate, your security circle contributions, and active referrals.
- Build Your Security Circle (Optional but Recommended):
- After three days of “mining,” you’ll unlock the “Contributor” role, allowing you to add people to your security circle.
- Add 3-5 trusted individuals (from your phone contacts who are also Pi users) to your security circle to boost your mining rate and enhance network security.
- Run a Pi Node (Optional, for desktop users): For those with a computer, downloading and running the Pi Node software further contributes to the network’s decentralization and may offer additional rewards.
3. KYC Verification (A Critical Step for Mainnet Migration)
- Importance: To prevent fake accounts and ensure a legitimate user base, Pi Network requires users to complete a KYC (Know Your Customer) verification process. This involves submitting identity documents.
- Timing: The opportunity to complete KYC rolls out gradually to users. You’ll be notified through the app when it’s your turn.
- Process: The KYC process is managed through the Pi Browser app (a separate download from the main Pi app). It typically involves uploading photos of your ID and a selfie.
4. Creating and Confirming Your Pi Wallet
- Purpose: The Pi Wallet is where your Pi coins will be stored once they migrate from your in-app balance to the mainnet. It’s a non-custodial wallet, meaning you control your private keys (or passphrase).
- Process:
- Download the Pi Browser app.
- Within the Pi Browser, you’ll find an option to “Pi Wallet.”
- Follow the instructions to create your wallet and securely store your passphrase. This passphrase is your only way to access your funds. Do not lose it, and never share it with anyone.
- You’ll then need to confirm your Pi Wallet within the main Pi Network app.
5. Migrating Pi to Mainnet & Potential Trading (Post Open Mainnet)
- Mainnet Checklist: Once you’ve completed KYC and created your wallet, you’ll follow a “Mainnet Checklist” in the app. This includes confirming your lockup configuration (if you chose to lock up some Pi for a period to boost your mining rate).
- Migration: After completing the checklist and approval, your “mined” Pi will be migrated to your Pi Wallet on the Open Mainnet.
- Trading (Now Possible): With the Open Mainnet launch on February 20, 2025, Pi Coin can now be traded on certain centralized exchanges that have listed it (e.g., OKX, Bitget, HTX). You would transfer your Pi from your Pi Wallet to the exchange’s deposit address for trading. Remember that the price can be highly volatile.
An Essential Disclaimer on Risk and Volatility: Engaging with Pi Network, while promising accessibility, involves specific risks. While Pi Network has launched its Open Mainnet and has a market value, its long-term viability and widespread adoption are still developing. The price of Pi Coin, like all cryptocurrencies, is subject to extreme volatility. There are still uncertainties regarding its ecosystem’s full development, merchant adoption, and regulatory clarity. You could lose a substantial portion or even all of your “mined” or purchased Pi. This guide is for informational purposes only and does not constitute financial advice. Always conduct thorough research, understand the significant risks involved, and consider your financial situation before making any investment decisions. Never invest more than you can afford to lose.
The Road Ahead: The Future of Pi Network
Pi Network’s journey has been one of patient community building and gradual technological rollout. With the Open Mainnet officially launched in February 2025, the project enters its most critical phase, where its vision meets the realities of the open cryptocurrency market.
1. Ecosystem Development and Utility Focus
- DApp Growth: The primary focus for Pi Network’s future is the continued growth and adoption of its decentralized applications (dApps) within the Pi Browser ecosystem. The success of these dApps, whether marketplaces, social platforms, or games, will be crucial in creating intrinsic value and utility for the Pi coin.
- Developer Engagement: The Core Team will need to continue incentivizing and supporting third-party developers to build innovative applications that leverage the Pi blockchain. Initiatives like the Pi App Studio (a no-code, AI-powered tool for app creation mentioned in recent updates) aim to lower the barrier for developers.
- Merchant Adoption: A key long-term goal for Pi is to become a widely accepted medium of exchange. This will require significant efforts in onboarding merchants and businesses globally to accept Pi for goods and services.
2. Mainnet Maturity and Decentralization
- Node Network Expansion: The continued growth of the Pi Node network is vital for enhancing the decentralization, security, and robustness of the Pi blockchain. More active and geographically distributed nodes strengthen the network.
- Consensus Mechanism Evolution: While based on SCP, the network’s consensus mechanism and governance model may evolve further as it scales and adapts to real-world usage and increased transaction volume.
- Cross-Chain Interoperability (Potential): In the long run, Pi Network might explore interoperability solutions, allowing Pi to interact with other blockchain networks, expanding its reach and utility within the broader crypto ecosystem.
3. Price Discovery and Market Dynamics
- Volatile Price Action: Post-Open Mainnet, Pi Coin is now subject to the forces of supply and demand on open exchanges. Its price will be highly volatile, influenced by general crypto market trends, news from the Pi Core Team, community sentiment, and the success of its ecosystem.
- Market Cap and Liquidity: As more Pi coins migrate and are traded, its market capitalization and liquidity will evolve, reflecting the market’s collective assessment of its value and potential.
- Long-Term Value Proposition: For Pi to achieve significant and sustainable value, it will need to demonstrate tangible utility and widespread adoption beyond its initial “free mining” appeal. Its price will ultimately reflect its perceived value as a usable currency and a platform for dApps.
4. Regulatory Landscape Navigation
- Compliance: As Pi Network expands and gains more recognition, it will increasingly face scrutiny from global regulatory bodies. Its emphasis on KYC and a transparent blockchain should position it better than fully anonymous projects, but continuous adaptation to evolving regulations will be necessary.
- Legal Clarity: The legal classification of Pi Coin and its unique distribution model will likely remain a topic of discussion among regulators.
5. Overcoming Skepticism and Building Trust
- Proof of Utility: Pi Network has faced considerable skepticism regarding its legitimacy and potential. The coming years will be crucial for the Core Team to deliver on its promises of a functional ecosystem and demonstrate tangible real-world utility for Pi.
- Transparency and Communication: Consistent and clear communication from the Core Team regarding development progress, challenges, and future plans will be vital in maintaining community trust and attracting new users and developers.
- Combating Misinformation: Active efforts to counter misconceptions and false narratives surrounding Pi will be essential for its long-term credibility.
In conclusion, Pi Network stands as a unique and ambitious project aiming to fundamentally change how people engage with cryptocurrency. Its past is characterized by a bold vision for accessibility and a methodical, phased rollout. Its present, marked by the Open Mainnet launch, is a testament to years of community building and development. The future of Pi Network hinges on its ability to foster a vibrant, utilitarian ecosystem where Pi Coin becomes a truly valuable and widely used digital currency, moving beyond its “mobile mining” origins to become a significant player in the evolving landscape of decentralized finance. For beginners, Pi Network offers a compelling case study in the power of community and a distinct approach to crypto adoption.