{"id":91788,"date":"2025-12-04T10:44:37","date_gmt":"2025-12-04T07:44:37","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=91788"},"modified":"2025-12-04T10:46:45","modified_gmt":"2025-12-04T07:46:45","slug":"solana-mobile-announces-launch-date-for-native-token-skr","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/solana-mobile-announces-launch-date-for-native-token-skr\/","title":{"rendered":"Solana Mobile Reveals SKR Token Launch Date"},"content":{"rendered":"<p>Solana Mobile has announced the release of its native token, SKR, for the mobile ecosystem in January 2026.\u00a0<\/p>\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\">Seek and you will find.<\/p>\n<p>SKR is coming in January 2026 \ud83e\uddf5 <a href=\"https:\/\/t.co\/cwtlp8G8Zf\">pic.twitter.com\/cwtlp8G8Zf<\/a><\/p>\n<p>\u2014 Seeker | Solana Mobile (@solanamobile) <a href=\"https:\/\/twitter.com\/solanamobile\/status\/1996278509967434017?ref_src=twsrc%5Etfw\">December 3, 2025<\/a><\/p><\/blockquote>\n<p> <script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>The total supply will be 10 billion tokens. Of these, 30% (3 billion SKR) are allocated for an <a href=\"https:\/\/forklog.com\/en\/news\/what-is-a-cryptocurrency-airdrop\">airdrop<\/a>. The distribution of the remaining assets is as follows:\u00a0<\/p>\n<ul class=\"wp-block-list\">\n<li>25% (2.5 billion SKR) \u2014 ecosystem growth and partnerships;<\/li>\n<li>10% (1 billion SKR) \u2014 liquidity and launch;<\/li>\n<li>10% (1 billion SKR) \u2014 community treasury;<\/li>\n<li>15% (1.5 billion SKR) \u2014 Solana Mobile team;<\/li>\n<li>10% (1 billion SKR) \u2014 parent company Solana Labs.\u00a0<\/li>\n<\/ul>\n<p>The issuance of SKR involves linear inflation to incentivize early <a href=\"https:\/\/forklog.com\/en\/news\/what-is-staking-and-how-to-make-money-from-it\">stakers<\/a>. The full tokenomics model and distribution details will be revealed at the Solana Breakpoint conference, which <a href=\"https:\/\/forklog.com\/en\/news\/december-calendar-fusaka-update-and-satoshi-nakamotos-disappearance-anniversary\">will take place from December 11 to 13<\/a>.<\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/img-9c57a9dc94426ba5-50482698823320-1024x1024.png\" alt=\"image\" class=\"wp-image-271080\" srcset=\"https:\/\/forklog.com\/wp-content\/uploads\/img-9c57a9dc94426ba5-50482698823320-1024x1024.png 1024w, https:\/\/forklog.com\/wp-content\/uploads\/img-9c57a9dc94426ba5-50482698823320-300x300.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/img-9c57a9dc94426ba5-50482698823320-150x150.png 150w, https:\/\/forklog.com\/wp-content\/uploads\/img-9c57a9dc94426ba5-50482698823320-768x768.png 768w, https:\/\/forklog.com\/wp-content\/uploads\/img-9c57a9dc94426ba5-50482698823320-1536x1536.png 1536w, https:\/\/forklog.com\/wp-content\/uploads\/img-9c57a9dc94426ba5-50482698823320.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Source: X.\u00a0<\/figcaption><\/figure>\n<h2 class=\"wp-block-heading\">The Role of SKR in Ecosystem Development<\/h2>\n<p>Initially, the main innovation of Solana Mobile was not the <a href=\"https:\/\/forklog.com\/en\/news\/solana-unveils-seeker-crypto-smartphone-with-over-140000-pre-orders\">Seeker<\/a> phone, but its decentralized application store (Dapp Store) with over 100 projects on <a href=\"https:\/\/forklog.com\/en\/news\/what-is-solana-sol\">Solana<\/a>. The goal was to create a full-fledged ecosystem rather than just a &#8220;money-making device,&#8221; as was the case with the first model \u2014 <a href=\"https:\/\/forklog.com\/en\/news\/solana-sets-date-for-saga-smartphone-sales\">Saga<\/a>.<\/p>\n<p>The SKR token is expected to become the primary tool for stimulating the growth of the Solana dApp Store.<\/p>\n<p>Simultaneously, the company introduced the concept of &#8220;Guardians&#8221; \u2014 participants responsible for security and trust within the ecosystem. The announcement states that SKR will be a key element of this system:<\/p>\n<ul class=\"wp-block-list\">\n<li>users will be able to stake their SKR with selected Guardians, receiving rewards in return;<\/li>\n<li>Guardians are to verify device authenticity, moderate applications in the Solana Mobile Dapp Store, and uphold community standards;<\/li>\n<li>Solana Mobile will be the first Guardian. It will later be joined by Helius Labs, Double Zero, and Triton One.<\/li>\n<\/ul>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/img-d6bcb8d7fe143801-50499134983420-1024x576.png\" alt=\"image\" class=\"wp-image-271081\" srcset=\"https:\/\/forklog.com\/wp-content\/uploads\/img-d6bcb8d7fe143801-50499134983420-1024x576.png 1024w, https:\/\/forklog.com\/wp-content\/uploads\/img-d6bcb8d7fe143801-50499134983420-300x169.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/img-d6bcb8d7fe143801-50499134983420-768x432.png 768w, https:\/\/forklog.com\/wp-content\/uploads\/img-d6bcb8d7fe143801-50499134983420-1536x864.png 1536w, https:\/\/forklog.com\/wp-content\/uploads\/img-d6bcb8d7fe143801-50499134983420.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Source: X.\u00a0<\/figcaption><\/figure>\n<h2 class=\"wp-block-heading\">Vulnerability in Solana Smartphones<\/h2>\n<p>The Ledger team <a href=\"https:\/\/www.ledger.com\/blog-is-your-smartphones-hardware-safe\">discovered<\/a> an unfixable vulnerability in the Seeker smartphone chip \u2014 MediaTek Dimensity 7300 (MT6878). This flaw allows attackers to gain full control over the device.\u00a0<\/p>\n<p>Security engineers from the company behind the cryptocurrency wallet, Charles Kristen and Leo Benito, tested an attack on the popular processor using electromagnetic pulses. These were applied during the system&#8217;s initial boot. As a result, the specialists managed to completely bypass all levels of chip protection.\u00a0<\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"768\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/img-3a5d75761bbcf6f6-50512870272992-1024x768.png\" alt=\"image\" class=\"wp-image-271082\" srcset=\"https:\/\/forklog.com\/wp-content\/uploads\/img-3a5d75761bbcf6f6-50512870272992-1024x768.png 1024w, https:\/\/forklog.com\/wp-content\/uploads\/img-3a5d75761bbcf6f6-50512870272992-300x225.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/img-3a5d75761bbcf6f6-50512870272992-768x576.png 768w, https:\/\/forklog.com\/wp-content\/uploads\/img-3a5d75761bbcf6f6-50512870272992-1536x1152.png 1536w, https:\/\/forklog.com\/wp-content\/uploads\/img-3a5d75761bbcf6f6-50512870272992.png 1600w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Setup for electromagnetic attack. Source: Ledger.\u00a0<\/figcaption><\/figure>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>\u201cThere is no way to safely store and use your private keys on these devices,\u201d stated Kristen and Benito.<\/em><\/p>\n<\/blockquote>\n<p>The discovered vulnerability cannot be fixed with a software update or patch. The issue is embedded in the silicon structure of the MT6878.\u00a0<\/p>\n<p>The likelihood of a successful attack is low \u2014 between 0.1% and 1%. However, according to the specialists, the ability to retry every second means an attacker could gain access to the device in just a few minutes.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>\u201cWe can generate an attack attempt approximately once per second. This allows us to automatically cycle through rebooting the device, applying the electromagnetic pulse, and, if unsuccessful, immediately repeating the procedure from the start,\u201d explained the engineers.\u00a0<\/em><\/p>\n<\/blockquote>\n<p>In response to the issue, MediaTek stated that the MT6878 was not originally designed to protect against such attacks. Threats using electromagnetic pulses are \u201cbeyond the design requirements\u201d of this component, company representatives noted.\u00a0<\/p>\n<p>Back in November 2023, CertiK analysts <a href=\"https:\/\/forklog.com\/en\/news\/certik-flags-critical-vulnerability-in-solanas-saga-smartphone\">identified<\/a> a critical vulnerability in the Saga smartphone.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Solana Mobile has announced the release of its native token, SKR, for the mobile ecosystem in January 2026.\u00a0<\/p>\n","protected":false},"author":1,"featured_media":91789,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"","_short_excerpt_text":"Ledger team found an unfixable vulnerability in Seeker smartphone chip","creation_source":"ai_translated","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[1640,1159,1160],"class_list":["post-91788","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-ledger","tag-solana-sol","tag-web3-smartphones"],"aioseo_notices":[],"amp_enabled":true,"views":"231","promo_type":"1","layout_type":"1","short_excerpt":"Ledger team found an unfixable vulnerability in Seeker smartphone chip","is_update":"0","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/91788","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=91788"}],"version-history":[{"count":2,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/91788\/revisions"}],"predecessor-version":[{"id":91791,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/91788\/revisions\/91791"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/91789"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=91788"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=91788"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=91788"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}