All proxies use the
Network protocol. This enables incentivization of the proxies and allows for a trustless and decentralized network. The protocol is based on Proof-of-Work to generate value for the proxies and to prevent spam. You mine a small amount of value and send it to the proxy in order to use it. This value can then be converted into a token by the proxy. The token can then be used to pay for the service without mining for it. This creates a market where the price of the token is determined by supply and demand for services.