TLDR Solana Mobile will launch its SKR token on January 21 at 2 AM UTC Up to 20% of total SKR supply will be airdropped to Seeker phone users and developers UsersTLDR Solana Mobile will launch its SKR token on January 21 at 2 AM UTC Up to 20% of total SKR supply will be airdropped to Seeker phone users and developers Users

Solana Mobile Sets January 21 Launch Date for SKR Token with 20% Airdrop

2026/01/08 17:08
3 min read

TLDR

  • Solana Mobile will launch its SKR token on January 21 at 2 AM UTC
  • Up to 20% of total SKR supply will be airdropped to Seeker phone users and developers
  • Users can delegate SKR tokens to “Guardians” who secure the network and verify devices
  • The token will enable governance and provide access to exclusive in-app features
  • Seeker phone has processed 9 million transactions and generated $2.6 billion in trading volume

Solana Mobile announced Wednesday that its SKR token will launch on January 21 at 2 AM UTC. The company confirmed that up to 20% of the total token supply will be distributed to users of its Seeker smartphone through an airdrop.

The SKR token will serve as the governance and incentive layer for Solana Mobile’s ecosystem. A snapshot for the airdrop allocation has already been taken, according to the team’s announcement on X.

The total supply of SKR tokens is fixed at 10 billion. The 20% airdrop allocation is reserved for users and developers who meet eligibility requirements.

Token holders will be able to delegate their SKR to “Guardians.” These Guardians will be responsible for securing the Solana network, verifying devices, and curating the decentralized app store.

Users who delegate their tokens will earn rewards in return. They will also gain access to various exclusive features within the apps on the platform.

Solana Mobile general manager Emmett Hollyer said the token will give early supporters the opportunity to influence the platform’s success. This includes decisions about participation rules and economic flows.

The Seeker is Solana Mobile’s second blockchain-powered phone. It aims to bring decentralized apps, payments, and token ownership directly to users’ smartphones.

Solana Mobile launched the Seeker in August after discontinuing support for its first phone, the Saga, in October. The company ended software and security support for the Saga device.

The Seeker phone has shown stronger adoption than its predecessor. The device has processed 9 million transactions since its launch.

Users have generated $2.6 billion in trading volume through the Seeker phone. This activity occurred across 265 decentralized applications.

More than 100,000 users have engaged with the Seeker platform. The device appears to have found better market fit than the original Saga model.

The SKR token will enable governance features for the platform. Token holders will be able to participate in decisions about platform rules and operations.

The staking mechanism will allow users to earn passive rewards. Users must delegate their tokens to approved Guardians to receive these benefits.

Guardians will play a central role in maintaining platform security. They will also be involved in governance decisions that shape the ecosystem’s future.

The January 21 launch gives Seeker users a clear timeline for claiming their tokens. The team described the airdrop as the first step in distributing governance to the community.

The post Solana Mobile Sets January 21 Launch Date for SKR Token with 20% Airdrop appeared first on CoinCentral.

Market Opportunity
Helium Mobile Logo
Helium Mobile Price(MOBILE)
$0.0001104
$0.0001104$0.0001104
-1.51%
USD
Helium Mobile (MOBILE) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact [email protected] for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

The Future of Metalworking: Advancements and Innovations

The Future of Metalworking: Advancements and Innovations

The demand for precision and efficiency in manufacturing processes continues to rise, leading to groundbreaking advancements in metalworking. This sector constantly
Share
Techbullion2026/02/07 19:24
Crypto whale loses $6M to sneaky phishing scheme targeting staked Ethereum

Crypto whale loses $6M to sneaky phishing scheme targeting staked Ethereum

The post Crypto whale loses $6M to sneaky phishing scheme targeting staked Ethereum appeared on BitcoinEthereumNews.com. A crypto whale lost more than $6 million in staked Ethereum (stETH) and Aave-wrapped Bitcoin (aEthWBTC) after approving malicious signatures in a phishing scheme on Sept. 18, according to blockchain security firm Scam Sniffer. According to the firm, the attackers disguised their move as a routine wallet confirmation through “Permit” signatures, which tricked the victim into authorizing fund transfers without triggering obvious red flags. Yu Xian, founder of blockchain security company SlowMist, noted that the victim did not recognize the danger because the transaction required no gas fees. He wrote: “From the victim’s perspective, he just clicked a few times to confirm the wallet’s pop-up signature requests, didn’t spend a single penny of gas, and $6.28 million was gone.” How Permit exploits work Permit approvals were originally designed to simplify token transfers. Instead of submitting an on-chain approval and paying fees, a user can sign an off-chain message authorizing a spender. That efficiency, however, has created a new attack surface for malicious players. Once a user signs such a permit, attackers can combine two functions—Permit and TransferFrom—to drain assets directly. Because the authorization takes place off-chain, wallet dashboards show no unusual activity until the funds move. As a result, the assets are gone when the approval executes on-chain, and tokens are redirected to the attacker’s wallet. This loophole has made permit exploits increasingly attractive for malicious actors, who can siphon millions without needing complex hacks or high-cost gas wars. Phishing losses The latest theft highlights a wider trend of escalating phishing campaigns. Scam Sniffer reported that in August alone, attackers stole $12.17 million from more than 15,200 victims. That figure represented a 72% jump in losses compared with July. According to the firm, the most significant share of August’s damages came from three large accounts that accounted for nearly half…
Share
BitcoinEthereumNews2025/09/19 02:31
WHALE ALERT: $351 MILLION Bitcoin Dump Incoming

WHALE ALERT: $351 MILLION Bitcoin Dump Incoming

One crypto whale transferred 5,000 Bitcoin, which is worth about 351 million, to Binance. Ash Crypto reported this transfer. It happened only several days after
Share
Coinfomania2026/02/07 19:36