Canton Protocol Development Fund Launch

Join Community

Summary

The Canton Foundation has launched the Canton Protocol Development Fund and its Grants Program to provide dedicated funding for projects that enhance the Canton Network. This funding supports crucial areas like core protocol R&D, developer tooling, security, and shared ecosystem infrastructure. Developers building common good utility on Canton are encouraged to apply for milestone-based funding paid in Canton Coin.

Canton Protocol Development Fund is live

The Canton Foundation has launched the Canton Protocol Development Fund and opened the Grants Program.

This creates dedicated funding for work that strengthens the Canton Network:
core protocol R&D, developer tooling, security and audits, reference implementations, and shared ecosystem infrastructure.

If you are building something that provides common good utility on Canton, you can propose it for support. Funding is milestone based, paid in Canton Coin, and guided by a clear review process with public reporting.

Learn more about the Protocol Development Fund:
https://canton.foundation/canton-foundation-launches-protocol-development-fund/

Explore the Grants Program and apply:
https://canton.foundation/grants-program/ @Canton Users

The latest from Canton Network

DeFi and TradFi Converge on Canton

# DeFi on Canton is taking shape Canton’s **DeFi ecosystem** is beginning to take form, with featured apps deploying across multiple verticals. These applications are …

CIP-0105 Approved SV Locking Framework

# CIP-0105 Approved: SV Locking & Long-Term Commitment Framework **CIP-0105 has been approved.** This proposal introduces a voluntary, onchain framework allowing **Super Validators (SVs)** to …

Canton Network: March 31 Fork and Fee Updates

**Three important updates:** **Batched and Weighted Featured App Markers** ~~are live on MainNet as of last week (Splice 0.5.11)~~. Coming March 31st to MainNet. This …

Security Advisory: Secrets in Validator Logs

## Security Advisory — Potential secrets exposure in validator logs We have identified an issue where sensitive credentials (such as your PostgreSQL password and Ledger …