Overview
Unitus Finance: A Next-Generation Multi-Chain Money Market
Welcome to Unitus documents, you can find all the essential information about Unitus right here.
What Is Unitus?
As you can read in this post, Unitus Finance, formerly known as dForce Lending, has undergone rebranding and evolved from dForce Lending, inheriting all of dForce's lending features and smart contracts, and marking a significant milestone as the first platform to provide native dForce USX liquidity across multiple L1/L2s.
Unitus, currently governed by dForce, has introduced the UTS token to drive farming initiatives. Once a satisfactory level of decentralization is achieved, the UTS token will assume governance of Unitus to ensure fairness.
Our Mission
Unitus aims to become a cross-chain and omni money market, connecting liquidity across the globe, encompassing both crypto and real-world assets, and spanning the realms of on-chain and off-chain ecosystems.
The Unitus core team are committed to advancing Unitus Lending by eliminating entry obstacles, enhancing the user experience, and striving to push DeFi into the mainstream.
Features
Unitus Finance offers a range of advantages that distinguish it from existing protocols:
Multi-chain: Unitus extends DeFi lending & borrowing capabilities to multiple blockchain.
Cross-chain: Through the integration of dForceβs native USX stablecoin, users can secure omni USX liquidity by using collaterals assets from various blockchain networks.
Tokenomics: Unitusβ tokenomics and liquidity mining mechanism incentivize long-term liquidity and align interests effectively.
SuperCharged Mode: Unitus achieves maximum capital efficiency by enabling higher loan-to-value (LTV) ratios for correlated assets, including LSD assets like wstETH, rETH, cbETH, among others, as well as Real World Asset (RWA) yield assets like sDAI and sUSX.
Segregated Mode: Users can borrow stablecoins against long-tail crypto assets with specific risk parameters tailored to each asset, diversifying market offerings and catering to a broader range of users.
Time-Locked Mechanism: A predetermined time delay may be applied before certain requests are executed to allow the protocol to monitor for any suspicious activity.
Last updated