What is the Newton Protocol (NEWT)?

6/26/2025, 9:32:04 AM
Beginner
Quick Reads
Newton Protocol is an innovative decentralized economic protocol aimed at solving the issues of trustlessness in automation and the complexity of cross-chain operations in the crypto world through zero-knowledge proofs and trusted execution environments.

What is the Newton Protocol?


(Source: blog.newt.foundation)

The Newton Protocol (NEWT) is dedicated to addressing the core issues of lack of trust in automation and complexity of cross-chain operations in the crypto world. It is jointly constructed by the Magic team and the Magic Newton Foundation. Newton is not just a set of automated infrastructure; it is a brand new decentralized economic protocol that allows users to automatically execute tasks through smart agents in a multi-chain architecture, with each step of the operation being cryptographically verifiable and traceable.

The current bottleneck of Web3 and Newton's solution

Despite Magic significantly lowering the entry barrier through its embedded wallet, users' operations on the blockchain are still fragmented, manual, and high-risk, especially when it comes to cross-chain transactions, staking management, and asset rebalancing, which often deter general users. Additionally, many automated solutions on the market rely on Telegram bots or centralized tools, severely lacking in security and transparency.

The Newton Protocol is designed to address these pain points. It combines zero-knowledge proofs (ZKP) with trusted execution environments (TEE) to achieve verifiable automation without the need to trust third parties. From cross-chain strategies, trade execution, and rebalancing to AI-driven strategies, everything can be handled by agents while ensuring that each step remains within the user's control.

Core functions and design philosophy of the protocol

The design of the Newton Protocol is based on three core principles:

  1. Scoped Autonomy
    Users set the behavior boundaries of agents through zkPermissions, including funding limits, areas of activity, and operational conditions. The system enforces these restrictions to prevent abuse of power.

  2. Verifiable Integrity
    All actions performed by agents will generate ZKP proofs, ensuring that their behavior is consistent with user authorization. This layer of assurance is particularly critical, especially when it involves AI reasoning, off-chain data, or high-value transactions.

  3. Earned Reputation
    Each agent will accumulate reputation points and will suffer economic penalties when violating rules, creating a stable structure that coexists with incentives and punishments.

This architecture not only enhances security and transparency but also creates a win-win decentralized agent market for both users and developers.

Developer and Agent Architecture

Newton provides a Software Development Kit (SDK) to help developers build Agents and convert off-chain services into verifiable agents. Developers can define:

  • Input and Output Format
  • Execution cost estimate
  • certificate verification mechanism

At the same time, agents can register their proxy with the Model Registry on the protocol, allowing operators to register and provide execution services. This architecture significantly lowers the entry barrier and encourages outstanding developers to create more powerful automation strategies.

$NEWT tokenomics

The native token of the Newton Protocol, $NEWT, is the core of the entire platform's operation, with a total supply of 1 billion tokens and an initial circulating supply of 215 million tokens (i.e., 21.5%). Its distribution structure is as follows:

Community-oriented distribution: 60%

  • Onchain Ecosystem Development Fund
  • Onchain Ecosystem Growth Fund
  • Onchain Foundation Vault

These three are established for ecology and infrastructure, with a 48-month linear unlock, of which 20% will be unlocked at TGE.

Internal Orientation Allocation: 40%

  • Core Contributors: 18.5%
  • Early Backers: 16.5%
  • Magic Labs: 5%


(Source: blog.newt.foundation)

All three have a 12-month lock-up period, after which they will be released linearly over 36 months. All unlocked tokens are not allowed to circulate in the secondary market.

Token Use

  1. Staking and Network Security
    $NEWT will be used for the delegated Proof of Stake (dPoS) consensus mechanism of the protocol, allowing token holders to delegate their tokens to validators and earn staking rewards.

  2. transaction fee
    When users issue operation instructions or initiate transactions through agents, they will use $NEWT as the gas fee. Newton will implement a mechanism similar to EIP-1559 to handle transaction ordering and fees.

  3. Model Registration and Service
    Developers need to pay $NEWT to register their proxy models in the Model Registry. Once the model is adopted by an operator, developers can earn a profit share based on usage.

  4. governance function
    Token holders can participate in protocol governance, proposing and voting on key decisions such as model audits, fee adjustments, and the use of ecological development funds.

Start trading NEWT spot immediately:https://www.gate.com/trade/NEWT_USDT

Summary

The verifiable automation proposed by the Newton Protocol not only fills the trust gap in the existing Web3 automation but also establishes a solid trust foundation for an AI-driven decentralized economy, allowing users to express their goals and enabling agents to execute them safely. With the deep integration of AI and blockchain, the Newton Protocol will become a key infrastructure supporting the new era of decentralized finance, agent business, and on-chain automation.

Author: Allen
* The information is not intended to be and does not constitute financial advice or any other recommendation of any sort offered or endorsed by Gate.
* This article may not be reproduced, transmitted or copied without referencing Gate. Contravention is an infringement of Copyright Act and may be subject to legal action.

Share

Crypto Calendar
Project Updates
Coinbase will upgrade all MATIC tokens to POL from October 14 to 17, and during the migration period, rewards for staking MATIC will not accumulate.
POL
-1.74%
2025-10-14
Hackathon
Pi Network has officially launched Pi Hackathon 2025, marking its first major developer challenge following the debut of the Open Network. This hackathon invites developers to design and launch Pi-powered applications that deliver real-world utility and help evolve the ecosystem—with a total prize pool of 160,000 Pi. Building on the innovation momentum from Pi2Day 2025, the competition encourages a broad range of utility-driven ideas, from daily-use tools to entirely new app concepts. All submissions must meet the Mainnet Listing Requirements and provide tangible value to the Pi community. Incentives & Prizes: 1st Place: 75,000 Pi 2nd Place: 45,000 Pi 3rd Place: 15,000 Pi Up to 5 Honorable Mentions: 5,000 Pi each Key Dates: August 15: Registration opens and team formation begins August 21: Hackathon officially starts September 19: Midpoint check-in (optional, but may yield mentorship and exposure) October 15: Final submissions due, including app listing and demo video Developers are encouraged to leverage Pi App Studio, Brainstorm, the Developer Portal, and open-source resources (PiOS), as well as AI tools, to build and refine their ideas.
PI
-9.11%
2025-10-14
Hackathon
Starknet announced the start of the Re{solve} Hackathon on September 15, running for one month with a prize pool of over $50,000. Participants are encouraged to build practical solutions, bring them to production, and compete for rewards.
STRK
-2.42%
2025-10-14
127MM Token Unlock
Starknet unlocks tokens at 12 AM UTC.
STRK
-2.42%
2025-10-14
Tokens Unlock
Sei will unlock 55,560,000 SEI tokens on October 15th, constituting approximately 1,15% of the currently circulating supply.
SEI
-2.22%
2025-10-14

Related Articles

Pi Coin Transaction Guide: How to Transfer to Gate.io
Beginner

Pi Coin Transaction Guide: How to Transfer to Gate.io

Pi Network is a decentralized cryptocurrency network for the general public, using the Stellar Consensus Protocol (SCP) consensus mechanism, which allows users to easily mine Pi tokens from their mobile devices and use them for payments and transactions. With the official opening of the mainnet on February 20, 2025, investors can deposit and trade $PI on exchanges such as Gate.io. This article details how to securely transfer Pi Coins to Gate.io, including obtaining a deposit address, completing the transfer using the Pi Network mainnet wallet, and the exchange's arrival confirmation process. In addition, we have analysed $PI investment risks, including market volatility, compliance and potential fraud risks, to remind investors to take risk management before trading.
2/25/2025, 8:21:43 AM
What is N2: An AI-Driven Layer 2 Solution
Beginner

What is N2: An AI-Driven Layer 2 Solution

This article introduces N2 (Niggachain AI Layer 2), the world's first AI-driven Layer 2 blockchain solution. N2 combines AI technology and quantum computing resistance to address the limitations of traditional blockchains in scalability, transaction speed, and cost. Its core technologies include '0-second block time', AI-driven network optimization, and quantum-resistant security protection, aiming to improve transaction efficiency and ensure system stability.
12/23/2024, 7:21:00 AM
Flare Crypto Explained: What Is Flare Network and Why It Matters in 2025
Beginner

Flare Crypto Explained: What Is Flare Network and Why It Matters in 2025

Discover what Flare Crypto is, how it works, its use cases, tokenomics, and why it's gaining traction in the blockchain space in 2025.
4/15/2025, 1:21:45 AM
How to Use a Crypto Whale Tracker: Top Tool Recommendation for 2025 to Follow Whale Moves
Beginner

How to Use a Crypto Whale Tracker: Top Tool Recommendation for 2025 to Follow Whale Moves

This article will take you through what is a crypto whale tracker and why it has become the "must-have weapon" for encryption investors. We will recommend seven mainstream Whale tracking tools, and combined with usage scenarios, teach you how to efficiently use these tools to obtain first-hand signals from the market. Of course, Whale behavior may also be a "lure," so while using these tools, you also need to have a certain level of judgment and data interpretation ability. This article is suitable for beginners to quickly get started, as well as for experienced players to optimize strategies.
4/14/2025, 6:57:17 AM
Understand Baby doge coin in one article
Beginner

Understand Baby doge coin in one article

Baby Doge Coin, also known as "Baby Dog Token", is a meme token derived from the Dogecoin community, which gained popularity through Elon Musk's tweets and enhanced token utility through mechanisms such as deflation, payment integration, and NFT ecosystem. This article comprehensively analyzes the project background, token information, application scenarios, and market performance of Baby Doge, helping investors quickly understand its potential and risks.
2/14/2025, 4:53:03 PM
How to Sell Pi Coin: A Beginner's Guide
Beginner

How to Sell Pi Coin: A Beginner's Guide

This article provides detailed information about Pi Coin, how to complete KYC verification, and choose the right exchange to sell Pi Coin. We also provide specific steps for selling Pi Coin and remind of important matters to pay attention to when selling, helping novice users complete Pi Coin transactions smoothly.
2/26/2025, 9:20:50 AM
Start Now
Sign up and get a
$100
Voucher!