Digital Matter Theory
  • Introduction
    • Digital Matter Theory
    • Digital Elements
      • .element Registry
      • Example Element
    • Non-Arbitrary Tokens (NATs)
      • Hybrid Token Model
      • NAT Deployment Format
      • NAT Minting
      • NAT Token Transfer
    • NAT Use Cases
      • $NAT (Method 1) - Live
      • $BMT (Method 3)
    • UNAT Use Cases
      • $dmt-natcats
      • $dmt-nat
    • Supported Token Protocols
      • TAP Protocol
    • Resources
      • FAQ
      • Videos
      • Guides
        • $BMT Blockdrop Claim
        • How to convert your NAT deployment into a UNAT (Reinscription Guide)
      • $NAT Mint Process
      • Rendering a UNAT
Powered by GitBook
On this page
  1. Introduction

NAT Use Cases

Throughout history, humans have been good at pattern recognition. Block Elements applies the patterns to Bitcoin's block information.

PreviousNAT Token TransferNext$NAT (Method 1) - Live

Last updated 1 year ago

Methodology

There are 3 methods outlined above that allow for custom usecases depending on your style of project.

Method 1

Method 2

Once a deploy inscription exists, token-auth can be generated as a child inscription and sent to a minting platform. This enables you to create logic to allow minting based on some challenge parameter met by the minter. This concept can be used as a method to earn NATs based on an achievement where the burden on minting cost is on the minter and not on the token deployer.

Method 3

For existing projects, such as Bitmap, you can generate a NAT and leverage parent-child inscriptions through the Blockdrop mechanism to allow bitmap holders to claim NATs. This method is scalable and allows the onboarding of future Bitmap holders for as long as Bitcoin exists.

Minting a NAT using the deploy inscription as a reference establishes on-chain provenance and employs the fair mint distribution process. This enables anyone to leverage any inscription service to mint a NAT using Method 1. Please refer to as a live demonstration.

$NAT
Fair, Function, and Provenance methods are outlined above