State of the Network - November 2025

Glacier Drop phase 1 claims are now closed, with over 3.5 billion NIGHT tokens claimed.
Scavenger Mine phase 2 claims are now closed, with 1 billion NIGHT tokens claimed.
Next is the reconciliation phase where all Scavenger Mine allocations are reconciled with the Glacier Drop. Final allocations are then distributed according to the mechanics specified in the tokenomics and incentives whitepaper, subject to the thawing schedule during the Redemption period.
The free, multi-phase distribution of NIGHT tokens is aimed at empowering a broad, diverse community to build the future of the Midnight network.
Learn more about the mission and organizations behind the Midnight network.
The Midnight Tokenomics and Incentives whitepaper describes the novel functions, utilities, and properties of NIGHT, Midnight's native utility token, and DUST, the network resource used to pay for transaction fees. It also describes Midnight's approach to incentives and the cooperative tokenomics for multi-chain access and participation. Lastly, the NIGHT distribution mechanisms and token allocation are described as part of the Midnight Glacier Drop.

The transparency of traditional blockchains forces a difficult choice: utility or privacy. Midnight empowers innovators to break free from this limitation, to a place where privacy is not just a feature, but foundational.

Testnet serves as a crucial intermediary step on the Midnight roadmap, allowing time for rigorous testing and refinement to ensure the stability, security, and performance of the network. The experience and scalability of Testnet continues to improve because of our community. Stay informed on the latest network updates.
Developers building on Midnight are provided a reliable environment that simulates the conditions of a live mainnet. Including:
Enjoy a seamless developer experience with modular smart contracts using Compact – Midnight’s programming language, based on TypeScript.
Shield wallet addresses and transaction information with programmable data protection that lets you choose who can access sensitive data.
Design apps that process sensitive data in compliance with relevant regulations.
Easily transition into creating and using decentralized applications via an accessible development environment.
Maintain security and integrity of data with zero-knowledge proofs that allow selective disclosure of data.
Derisk business operations with secure, compliance-focused infrastructure that’s as easy to use as the cloud.
Discover what it takes to create a data protection blockchain, with educational content and expert analysis of the Midnight network.
