Introduction
Motivation
Digital platforms are evolving toward comprehensive ecosystems integrating communication, commerce, and community—from X/Twitter's payment systems to Facebook's cryptocurrency experiments and Chinese super-apps like WeChat. While StorPunk shares this all-in-one vision, its primary motivation is implementing a complete cypherpunk ecosystem that builds on a foundation centralized platforms cannot offer: decentralized architecture with no central data repository that can be controlled or shut down.
The cypherpunk movement envisioned digital tools that protect privacy and individual sovereignty through cryptography rather than policy. StorPunk seeks to realize this vision by providing what commercial platforms subject to censorship and surveillance cannot: true privacy through cryptography and genuine uncensorability through decentralization. This will ensure no single entity can block communications, censor content, or control economic interactions—making privacy mathematical certainty rather than corporate promise, and freedom architectural reality rather than policy commitment.
Technical Architecture
StorPunk will build upon Autonomi's self-organizing network architecture, implementing quantum-resistant encryption with self-healing, course-correcting capabilities. The system will employ content-addressable storage where data is broken into encrypted chunks, distributed across nodes based on XOR addressing, with no single point of control or failure.
Data sovereignty will be achieved through self-encryption—a process where each chunk is encrypted using its own hash and previous chunk hashes. This will ensure data never leaves devices unencrypted, with reconstruction keys remaining client-side only. The network will operate as a blockchainless distributed ledger, scaling efficiently without traditional blockchain limitations.
Base Network Capabilities (Autonomi codebase)
StorPunk will inherit core capabilities from the Autonomi codebase that will provide the foundation for advanced features:
Self-Encrypting Data Storage
Quantum-resistant encryption where data is automatically chunked and encrypted before leaving client devices. Each chunk uses its own hash plus previous chunk hashes for encryption, ensuring zero-knowledge storage where nodes cannot determine content they hold.
Content-Addressable Network
Chunks are stored at XOR network addresses determined by their cryptographic hashes. This creates a self-organizing system where identical content is automatically deduplicated and data location is deterministic yet distributed.
Autonomous Node Operations
Self-healing network that automatically redistributes data as nodes join and leave. Nodes operate through stigmergy-based coordination—simple local rules creating emergent global consensus without central coordination.
End-to-End Privacy
Multi-layered encryption ensures data privacy during storage and transit, providing strong, but not absolute privacy protections. StorPunk will be adding network hops as a later feature to further enhance privacy, see below.
Launch Features (StorPunk Enhancements)
StorPunk will add key differentiators to the Autonomi foundation:
Configurable Data TTL
Unlike Autonomi's permanent storage, StorPunk implements user-defined Time-to-Live for data chunks, enabling sustainable economics while maintaining all privacy and security properties of the base network.
Native Network Token ($PUNK)
A fixed-supply native non-blockchain token for network transactions and operations, with zero external token dependencies (specification not yet developed).
Integrated P2P Exchange
Built-in decentralized exchange enabling trading between $PUNK tokens, fiat currencies, and cryptocurrencies directly within the network infrastructure rather than requiring external platforms.
Post-Launch Features
Advanced capabilities being planned for the complete ecosystem:
Network Search
Network-wide indexing and search functionality for public data while maintaining privacy for private content. This collaborative system enables efficient discovery across the distributed network.
Dual Network Client
Access both StorPunk and Autonomi networks via the StorPunk client. This will allow clients to access and store data on Autonomi (permanent data storage network) in addition to the default StorPunk network. Storing data will require the client to have Autonomi tokens.
Social Media Communications
Censorship-resistant social media leveraging the network's privacy-preserving architecture, enabling secure communication independent of traditional platforms with built-in resistance to surveillance and control.
Decentralized Trading Platform
General marketplace for goods and services operating directly on the network infrastructure, creating commerce capabilities without central authorities or intermediary control.
Network Hops (Onion Routing)
Anonymous usage capabilities through multi-hop routing similar to Tor, enhancing privacy by masking user IP addresses and locations while maintaining as much network performance as possible.
Data Expiration Management
Client-side tracking of data expiration dates with automated notifications and renewal capabilities, allowing users to extend storage periods of their data without manual intervention while maintaining full control over their data lifecycle.
Economic Sustainability
The network will address both centralized and permanent decentralized storage limitations through configurable data retention. Distributed architecture will prevent single points of failure while temporary storage will ensure economic sustainability by limiting resource requirements to user-defined periods.
Dynamic pricing will adjust to network capacity—storage costs will decrease when underutilized and increase during high demand. This market-based approach will prevent network bloat, ensure fair resource allocation, and maintain transparent costs without requiring subsidization or cascade collapse risks.
DAO Governance
The project uses a multi-phase token sale where $PUNK-DAO tokens are sold at 1:1 with USDT, providing governance rights and claimable for native $PUNK tokens with tier-based multipliers. After claiming, tokens become soulbound (non-transferable) while retaining governance rights.
Development follows conservative treasury management with community voting via Snapshot.org. The Community Development Fund ensures ongoing ecosystem development after initial phases conclude, transitioning to node-operator governance for network evolution decisions.
Complete Ecosystem Vision
StorPunk will create a comprehensive environment for digital sovereignty combining inherited Autonomi capabilities with enhanced features:
- Private Communications: Leveraging the base network's zero-knowledge architecture for surveillance-resistant messaging and content sharing
- Economic Exchange: Built-in decentralized exchange integrated with the native token and network infrastructure
- Digital Commerce: Marketplace capabilities operating directly on the decentralized foundation without intermediary dependencies
- Data Sovereignty: User-controlled data lifecycle management with cryptographic privacy guarantees and configurable retention periods
This will represent a fundamentally different approach to integrated digital platforms—one where privacy will be enforced by mathematics rather than policy, where uncensorability will be guaranteed by architecture rather than promises, and where individual sovereignty will be protected by decentralized design rather than corporate benevolence.
DAO Governance
The StorPunk DAO implements decentralized governance over network development and treasury. Operating without central authority, it enables token holders to make collective decisions about technical direction and resource allocation through cryptographically verified voting.
$PUNK-DAO Token
The $PUNK-DAO token (ERC-20) serves two primary purposes:
- Fundraising: Sold in tiers to raise capital for sustainable development
- Development Governance: Token holders vote via Snapshot.org, maintaining voice after claiming $PUNK tokens
Tiered Sale Structure
$PUNK-DAO tokens are sold at a 1:1 ratio with $USDT. The tier in which you purchase determines your $PUNK network token multiplier at launch:
- Tier 1: 0-250,000 USDT → 1 USDT = 1 $PUNK-DAO, with 16x $PUNK multiplier at launch
- Tier 2: 250,001-700,000 USDT → 1 USDT = 1 $PUNK-DAO, with 8x $PUNK multiplier at launch
- Tier 3: 700,001-1,350,000 USDT → 1 USDT = 1 $PUNK-DAO, with 4x $PUNK multiplier at launch
- Tier 4: 1,350,001-2,350,000+ USDT → 1 USDT = 1 $PUNK-DAO, with 2x multiplier
Holding Mechanism
The DAO claim contract includes a multiplier incentive for token retention. At network launch:
- Original purchasers who never transferred tokens receive an additional 2x multiplier (so, e.g., Tier 1 16x becomes 32x, etc.)
- Secondary buyers receive only base tier multiplier. Thus members are incentivised to buy at the initial sale and hold until launch
- Claiming happens on Ethereum—the contract verifies your holding history automatically
Soulbound Governance
After claiming your $PUNK tokens, your $PUNK-DAO tokens become soulbound (non-transferable):
- Call claim function on Ethereum with StorPunk address
- $PUNK-DAO tokens become permanently locked to wallet
- Bridge service detects claim and mints $PUNK on StorPunk
- Full voting rights maintained forever—governance stays on Ethereum
Purpose: Creates separation between governance rights and token speculation. Only unclaimed tokens trade, maintaining governance among committed participants.
Sustainable Funding Model
- DAO launches with full operations at Phase 0 end
- Treasury management begins before development funding
- Sustainable runway through multiple phases
- Each tier funds specific development phase
- P2P exchange with multisig security prioritized (Phase 3)
- New tiers start only when needed
- Limited sale windows
- Unsold tokens allocated 60/40 to Founder/Developer Pool and Community Fund
Governance Platform
Vote on proposals at snapshot.org (gasless voting):
- Treasury management decisions
- Tier initiation timing
- Development priorities (P2P exchange with multisig in Phase 3)
- Emergency actions if needed
- Network upgrade approvals
- Connect wallet → Read proposals → Vote free
Current Status
- In development
- Launching at Phase 0 end with initial operations
- Unsold tokens allocated 60/40 to developers and Community Fund
- Visit Join Us to connect with community
$PUNK-DAO tokens provide permanent governance rights active after claiming native tokens. This maintains long-term accountability while allowing network evolution. Development prioritizes P2P exchange with multisig security in Phase 3, enabling censorship-resistant trade without intermediaries, including direct peer-to-peer fiat exchanges.
Community Development Fund
A portion of unsold tokens from each tier (40%) is allocated to the Community Development Fund:
- Long-term Support: Funds open-source development and community initiatives after main phases complete
- Developer Incentives: Rewards community contributors enhancing StorPunk ecosystem
- Submission Fee Required: Community developers must pay a $100 USDT submission fee per proposal to be eligible for fund grants.
- Community Governance: Fund allocation decisions made through the same DAO voting mechanisms.
StorPunk implements temporary data storage based on cypherpunk principles. System architecture protects user privacy through cryptography. The Community Development Fund provides ongoing resources for infrastructure enhancement against evolving threats, with governance remaining with token holders.
Cypherpunk Foundations: Principles and Implementation
StorPunk implements decentralized infrastructure based on cypherpunk principles: privacy through cryptography, individual sovereignty, and resistance to centralized control. This document outlines the philosophical foundations and technical approach.
FOUNDATIONAL PRINCIPLES
1. Cypherpunk Philosophy
"Privacy is necessary for an open society in the electronic age." — The Cypherpunk Manifesto
StorPunk embodies core cypherpunk principles: strong cryptography, peer-to-peer architecture, voluntary association, and resistance to censorship. It builds systems to protect individual sovereignty against corporate surveillance and state control.
By implementing cryptographic privacy for data storage and communication, StorPunk provides users with control over their digital existence. Privacy is achieved through cryptography, not data expiration.
This approach represents commitment to decentralization—both technical architecture and philosophical opposition to concentrated control.
2. Resistance to Censorship
In an era of expanding digital control, censorship-resistant infrastructure serves essential functions.
As digital environments face increasing regulation and surveillance, infrastructure that resists centralized control becomes essential. StorPunk creates systems designed to remain operational across varying regulatory conditions.
The architecture resists content filtering, metadata collection, and centralized control points, supporting access to information and communication regardless of external pressures.
Beyond privacy protection, the network supports epistemic freedom—the ability to think, communicate, and access information without surveillance constraints.
3. Privacy Through Architecture
In digital systems, privacy should be fundamental to the architecture, not an optional feature.
StorPunk implements privacy at the architectural level through cryptographic protections. Control over data determines sovereignty. When data becomes accessible without consent, it can be used against individual interests.
The network provides tools for digital sovereignty, enabling users to maintain control over data and transactions. This reduces the need to move data between networks and risk exposure through multiple vulnerability points.
As Eric Hughes wrote, "For privacy to be widespread it must be part of a social contract. People must come and together deploy these systems for the common good." StorPunk represents this collective deployment approach.
TECHNICAL IMPLEMENTATION
4. User Sovereignty and Self-Custody
Digital sovereignty requires control over both data and economic assets.
StorPunk implements self-custody where users maintain control of data, metadata, encryption keys, and tokens. No third party can access user information or assets without explicit permission.
Cryptographic protections are designed to be accessible to regular users, not just technical experts. The architecture makes privacy and censorship resistance available through practical interfaces.
The cypherpunk approach emphasizes working code that enables individuals to exercise digital rights.
5. Engineering for Resilience
Sustainable systems require engineering that remains viable under real-world conditions.
The architecture prioritizes long-term operation through technical choices:
- Rust implementation for memory safety and performance
- Temporary storage model that addresses data accumulation and hardware requirements
- Minimal transaction fees that support network operations without significant user cost
- Peer-to-peer design that avoids single points of failure
The temporary storage approach provides economic benefits. By automatically removing expired data, the network avoids storage accumulation that challenges permanent systems.
This engineering focus ensures censorship-resistant infrastructure remains available and sustainable.
ECONOMIC MODEL
6. Private Economic Exchange
Freedom requires both private communication and economic exchange capabilities.
StorPunk integrates native exchange capabilities, enabling peer-to-peer value transfer resistant to financial surveillance. This creates economic infrastructure where transactions remain private and accessible across boundaries.
The native token uses minimal transaction fees to deter network manipulation while maintaining low costs.
By enabling direct exchanges without intermediaries, StorPunk supports economic interactions based on voluntary agreement.
This approach implements principles of cryptographic consent.
7. Voluntary Economic Model
Genuine markets depend on voluntary exchange without coercion.
StorPunk implements a direct market model where node operators receive compensation from storage fees, eliminating centrally-issued rewards. This creates a voluntary network where participants interact through mutual agreement.
The economic design relies on direct service payments, establishing a model where token value corresponds to actual usage. Users pay for needed storage duration, while operators provide service at freely determined prices.
This extends cypherpunk principles into economics, creating interaction based on cryptographic proof.
COMPLETE ECOSYSTEM VISION
While data storage provides the foundation, StorPunk aims to create a complete ecosystem for digital sovereignty:
- Financial Infrastructure: Exchange capabilities supporting various asset types
- Trading Platform: Marketplace for goods and services without central authorities
- Communication Tools: Censorship-resistant information exchange
- Economic Foundation: Native token with transaction capacity
STRATEGIC APPROACH
John Gilmore observed the race between technology deployment and regulatory development. StorPunk follows this imperative—building privacy technology to establish operational infrastructure.
The project represents practical implementation of cypherpunk principles, creating infrastructure that enables:
- Private economic transactions resistant to surveillance
- Communication channels that support free inquiry
- Decentralized systems without central control points
- Voluntary association based on cryptographic consent
As digital environments face increasing challenges, StorPunk provides tools to maintain digital sovereignty.
Cypherpunk Resources
- The Cypherpunk Manifesto - Eric Hughes' 1993 text on privacy and cryptography
- The Crypto Anarchist Manifesto - Timothy May's 1988 vision of cryptography's role
- A Declaration of the Independence of Cyberspace - John Perry Barlow's statement on digital sovereignty
- Cyphernomicon - Timothy May's cypherpunk exploration
StorPunk continues cypherpunk innovation—using cryptography, decentralization, and peer-to-peer architecture to support digital freedoms. Privacy, voluntary exchange, and censorship resistance represent essential components.
Project Roadmap
Phase 0: Foundation Building (Pre-Funding)
Development of foundational infrastructure through self-funded resources, establishing encrypted communication channels and DAO governance mechanisms.
Website and Forum Development
- Publish MVP website as a Tor hidden service. Status: done
- Deploy website on a public web server. Status: done, but frequent updates and corrections are being made
- Launch community forums (via Retroshare, see the Join link in the menu for details). Status: done
- Implement DAO constitution with cypherpunk principles. Status: done, but may be updated until the DAO is launched
- Architect tiered token distribution with cryptographic soulbound mechanism.
- Create ERC-20 governance token contracts with permanent rights preservation.
- Implement hold tracking for 2x rewards.
- Testing of all aspects of DAO contract via Ethereum test network.
- Set up Snapshot.org governance space.
- Deploy DAO contracts to Ethereum mainnet.
- Initialize time-locked multisig (3-of-5).
- Launch Tier 1 token sale (16x $PUNK-DAO per USDT).
- Establish transparent treasury reporting.
- Implement monthly treasury spending reporting.
- Set up governance voting mechanisms.
DAO Development
DAO Launch & Initial Operations
- Status: Active
- Funding: Self-funded with minimal external capital
Phase 1: Core Team Assembly & Initial Development (Tier 1 Funding)
Assemble core development contributors and initiate technical implementation of privacy-preserving storage architecture using initial funding.
Team Building
- Onboard Systems Engineer Coordinator (remote contractor).
- Hire Lead Developer for Core Network (remote contractor).
- Bring on first Junior Developer (remote contractor, part-time).
- Develop detailed technical specifications.
- Set up development environment and tooling.
- Begin codebase fork implementation.
- Research TTL implementation approaches.
- Continue treasury management with received funds.
- Process first governance proposals.
- Plan for future funding tier activations.
- Establish regular community governance calls.
Initial Development
Ongoing DAO Governance
- Status: Planned
- Funding: Tier 1 (0-250,000 USDT) - 16x $PUNK-DAO per USDT
Phase 2: Full Team & Core Development (Tier 2 Funding)
Complete technical team structure and implement core censorship-resistant architecture using second-tier resources.
Team Expansion
- Complete hiring of all junior developer positions (all remote contractors).
- Engage specialized contractors as needed for specific tasks.
- Establish remote collaboration workflows and tools.
- Complete core codebase implementation.
- Implement basic time-to-live (TTL) functionality.
- Start development of dual-network client.
- Implement native network $PUNK token.
- Conduct internal cryptographic and security verification.
- Conduct initial security review.
- Establish development test environment.
Core Network Implementation
Testing & Security
- Status: Planned
- Funding: Tier 2 (250,001-700,000 USDT) - 8x $PUNK-DAO per USDT
Phase 3: Network Refinement & Launch Preparation (Tier 3 Funding)
Optimize network protocols, finalize dual-network client functionality, and prepare for distributed testing using third tier resources.
Network Completion
- Finalize pay-per-store model with TTL.
- Complete self-custody wallet for storage payments.
- Finish dual-network client implementation.
- Build $PUNK creation bridge to $PUNK-DAO tokens.
- Deploy public testnet for community validation.
- Implement testnet faucet for token distribution.
- Create comprehensive testing guides.
- Incorporate technical improvement proposals from community review.
- Conduct comprehensive security audits.
- Address identified vulnerabilities.
- Implement monitoring and analytics tools.
- Finalize cryptographic verification for mainnet deployment.
- Implement permissionless currency exchange protocol for $PUNK token with ERC-20 tokens and fiat currency through direct channels secured by node-based multisig verification.
- Develop secure trade escrow and verification systems.
- Create trading pairs with selected tokens and fiat currencies.
- Develop exchange security and anti-manipulation safeguards.
Public Testing
Security & Compliance
Decentralized Currency Exchange Development
- Status: Planned
- Funding: Tier 3 (700,001-1,350,000 USDT) - 4x $PUNK-DAO per USDT
Phase 4: Network Launch & Ecosystem Development (Tier 4 Funding)
Deploy production network infrastructure and extend protocol capabilities using fourth tier resources. the Community Development Fund for long-term ecosystem growth.
Network Launch
- Deploy mainnet with complete functionality.
- Deploy claim contract on Ethereum.
- Activate bridge service for $PUNK minting.
- Implement multiplier mechanism for original token holders.
- Implement soulbound token mechanism.
- Establish initial node operator network.
- Announce network launch and claim process.
- Launch social media presence (Twitter, Mastodon, Telegram).
- Distribute technical documentation to potential storage users and node operators.
- Document technical implementation of cypherpunk principles and censorship resistance.
- Expand decentralized currency exchange trading pair options.
- Establish network-wide indexing and search functionality (collaborative between nodes and clients).
- Implement basic client-side social media functionality.
- Develop decentralized trading platform for goods and services (separate from currency exchange).
- Implement anonymous usage capability (network hops).
- Add data expiration notification and automated renewal capabilities to client.
Launch Campaign
Application Layer Development
- Status: Planned
- Funding: Tier 4 (1,350,001-2,350,000+ USDT) - 2x $PUNK-DAO per USDT
- Includes allocation of unsold tokens 60/40 to Founder/Developer Pool and Community Development Fund
Frequently Asked Questions
General Information
What is StorPunk?
StorPunk will be a decentralized ecosystem implementing core cypherpunk principles through cryptographic privacy, individual sovereignty, and resistance to centralized control. While being built on a foundation of configurable data storage, the network will aim to provide a comprehensive suite of tools for digital sovereignty including financial infrastructure, trading platforms, and communication tools.
How will StorPunk differ from Autonomi Network?
StorPunk will fork the Autonomi Network codebase but will introduce significant changes, including:
- Temporary Data Model: Unlike Autonomi's permanent data storage, StorPunk will focus on temporary data storage with configurable retention periods.
- Native Token: StorPunk will have its own native token ($PUNK) for network operations, separate from the $PUNK-DAO governance token.
- Dual-Network Client: The client will support both StorPunk and Autonomi networks for comprehensive data management without requiring multiple applications.
Why will StorPunk choose temporary data storage?
The implementation of temporary data storage will provide several key benefits:
1. Economic Sustainability: Will prevent network bloat and ensure users always pay market rates for storage
2. Operational Resilience: Will eliminate the risk of cascade collapse from unfunded data maintenance obligations
3. Market-Based Pricing: Clients will pay for exactly what they need, for exactly how long they need it, without subsidizing others' data
4. User Control: Clients will determine data retention periods rather than being forced into an aribtrary indefinite timeperiod as with Autonomi
What network features are planned?
Launch Features:
- Configurable Data Storage Network: Temporary data retention with dual-network client supporting both StorPunk and Autonomi
- Native Network Token ($PUNK): Fixed-supply token for all network operations
- Decentralized Currency Exchange: Direct trading between $PUNK tokens, fiat currencies, and selected cryptocurrencies
Post-Launch Features:
- Network Search: Indexing and search functionality for public (shared) data
- Social Media Communications: Client-side social media functionality
- Decentralized Trading Platform: General trading platform for goods and services
- Network Hops: Anonymous usage capabilities similar to Tor
How will the dual-network client work?
The dual-network client will allow users to:
- Store data to both StorPunk and Autonomi networks from a single interface
- Use StorPunk for temporary storage needs
- Use Autonomi for permanent storage requirements
- Manage both network tokens ($PUNK and $ANTONOMI) in one application
- Access the strengths of each network without switching applications
Note: Using Autonomi features will require owning $ANTONOMI tokens in addition to $PUNK tokens.
DAO and Governance
What is the $PUNK-DAO token?
$PUNK-DAO will be an ERC-20 token that serves two purposes:
1. Fundraising: Will be sold in tiers to raise capital for sustainable, long-term development
2. Permanent Governance: Token holders will vote on key decisions via Snapshot.org, maintaining their voice throughout the project's lifetime
How will the tiered sale work?
$PUNK-DAO tokens will be sold at a 1:1 ratio with USDT across all tiers. The tier will determine your $PUNK network token multiplier at launch:
- Tier 1: 1 USDT = 1 $PUNK-DAO with 16x multiplier at launch (0-250,000 USDT)
- Tier 2: 1 USDT = 1 $PUNK-DAO with 8x multiplier at launch (250,001-700,000 USDT)
- Tier 3: 1 USDT = 1 $PUNK-DAO with 4x multiplier at launch (700,001-1,350,000 USDT)
- Tier 4: 1 USDT = 1 $PUNK-DAO with 2x multiplier at launch (1,350,001-2,350,000+ USDT)
Each tier will have a limited supply. Tiers will be initiated only when needed (typically when runway decreases to 6 months). Unsold tokens from each tier will be allocated 60/40 between the Founder/Core Developer Pool and the Community Development Fund.
What is the hold-to-double reward?
The token claim mechanism will provide an additional 2x multiplier for original purchasers who maintain their position without transfer. For example, a Tier 1 buyer with a 16x multiplier will receive a 32x multiplier (16x × 2x) if they never transfer their tokens. Secondary buyers will receive only the base tier multiplier. This structure will incentivize long-term participation in governance and development.
What happens to my $PUNK-DAO tokens after claiming $PUNK?
After claiming native tokens, $PUNK-DAO tokens will become soulbound (cryptographically locked to your wallet). This mechanism will:
- Prevent transfer or sale
- Preserve full voting rights permanently
- Maintain governance voice
- Prevent market confusion (only unused tokens will trade)
How will I vote on proposals?
Voting will happen on Snapshot.org (gasless and free):
1. Visit snapshot.org/#/storpunk
2. Connect your wallet (MetaMask, etc.)
3. Browse active proposals
4. Click "Vote" and select your choice
5. Sign a message (no gas fees!)
Your voting power will equal your $PUNK-DAO token balance, whether the tokens have been previously traded or not.
What is the Community Development Fund?
The Community Development Fund will be a long-term initiative that receives 40% of all unsold tokens:
- Purpose: Will fund ecosystem development, community projects, and ongoing maintenance after the main development phases are complete
- Eligibility: Community developers will need to pay a $100 USDT submission fee per proposal to receive approved grants from the fund
- Governance: Fund allocations will be decided by DAO voting through Snapshot.org
- Sustainability: Will be designed to support the project ecosystem for an indeterminant number of years after the initial development phases.
Network and Technical
How will I claim my $PUNK tokens?
Important: The claim contract will be separate from the DAO contract and will only be deployed when the StorPunk network launches (Phase 4). During pre-launch phases (0-3), $PUNK-DAO tokens will remain fully transferable on Ethereum.
Claim Process (Available only after StorPunk network launch):
1. StorPunk network will launch and a separate claim contract will be deployed on Ethereum
2. User will call the claim function on this new claim contract, providing their StorPunk network address
3. The claim contract will verify your $PUNK-DAO token balance and transaction history
4. Your $PUNK-DAO tokens will immediately become soulbound (permanently non-transferable) via cross-contract integration
5. A bridge service will detect the claim event and mint your $PUNK tokens on StorPunk at the appropriate multiplier
How Soulbound Will Work: The claim contract will mark your address as having claimed, and the DAO contract's transfer function will check this status before allowing any transfers. This will create an on-chain enforcement mechanism that permanently prevents transfers while preserving governance rights.
Warning: Once you claim, your $PUNK-DAO tokens will become permanently non-transferable, though they will retain full governance rights. Only claim when you're ready to use the StorPunk network.
The system will verify original ownership through transaction history and apply appropriate multipliers: double for original holders (those holding tokens that were never resold), and 1x for secondary purchasers (those who bought tokens from other people and not during a sale period).
Can I use StorPunk with Autonomi Network?
Yes. The dual-network client architecture will support both systems:
- Upload and download from either network
- Use the appropriate currency for each network
- Leverage each network's unique strengths
- StorPunk: Temporary, efficient storage
- Autonomi: Permanent, immutable storage
What is the decentralized currency exchange?
Available at launch, the decentralized currency exchange will operate directly on the StorPunk network. It will enable direct trading between $PUNK tokens, fiat currencies, and selected cryptocurrencies without intermediaries or central points of failure.
The exchange will maintain security through network architecture while protecting participant privacy.
What is the decentralized trading platform?
Developed post-launch, this platform will support unrestricted exchange of goods and services through a fully decentralized marketplace on the StorPunk network. This will create censorship-resistant alternatives to traditional marketplaces with direct transactions.
How will network privacy work?
The system will implement network privacy protections including anonymous usage capability through network hops. These features will protect user identity and location while maintaining communication and transaction capabilities across the network.
What programming language will StorPunk be built with?
StorPunk will be built primarily using Rust, following the same technology stack as Autonomi Network since StorPunk will be a fork of that codebase.
Will I be notified before my data expires?
Yes, as a post-launch client feature, the StorPunk client will track data expiration dates and notify users before their data expires. The client will also support automated renewal capabilities for stored data, allowing users to extend storage periods without manual intervention.
Auto-renewal Requirements: Automated renewal will only work when your computer is on, the StorPunk client is running, and the client has access to your wallet keys to enable automatic payments for storage extensions.
Development and Timeline
What is the development timeline?
StorPunk will follow a 4-phase development approach:
- Phase 0: Foundation Building (Pre-Funding) - Website, DAO structure, initial operations
- Phase 1: Core Team Assembly & Initial Development (Tier 1 Funding)
- Phase 2: Full Team & Core Development (Tier 2 Funding)
- Phase 3: Network Refinement & Launch Preparation (Tier 3 Funding) - Including decentralized currency exchange development
- Phase 4: Network Launch & Ecosystem Development (Tier 4 Funding)
Why a phase-based funding plan?
Our 4-phase development plan with aligned funding will ensure:
- Development continues regardless of market conditions
- 100% remote contractor team for global talent and efficiency
- Just-in-time funding reduces dilution
- Each tier will directly fund a specific development phase
- Community will have clear visibility into progress
- DAO governance will continue long after main development through the Community Development Fund
What happens after network launch?
Post-launch development will focus on:
- Expanding exchange trading pairs
- Implementing network-wide indexing and search functionality
- Developing client-side social media capabilities
- Creating the decentralized trading platform for goods and services
- Implementing anonymous usage capability (network hops)
The Community Development Fund will ensure ongoing development and governance for years after the initial phases.
Treasury and Funding
How will the treasury be managed?
Treasury management will follow conservative principles:
- Target: Sustainable runway across multiple development phases
- New tiers will start when runway reaches 6 months
- Monthly treasury spending reports to community
- Time-locked multisig (3-of-5) controls
- Emergency tier activation via governance
What happens to unsold tokens in each tier?
All unsold tokens from each tier will be allocated according to a 60/40 split:
- 60% to the Founder/Core Developer Pool to support ongoing development
- 40% to the Community Development Fund for long-term ecosystem growth
This allocation will ensure resources for both immediate development needs and long-term sustainability of the project ecosystem.
What are the risks involved?
As with any cryptocurrency project, there are several risk factors:
- Technical Risks: Network development challenges, security vulnerabilities
- Economic Risks: Token price volatility, market adoption uncertainty
- Regulatory Risks: Changing legal requirements for tokens and DAOs
- Development Risks: Timeline delays, funding shortfalls
Conservative treasury management and phased development will help mitigate many of these risks.
Why will tokens be soulbound after claiming?
Soulbound tokens will solve several problems:
- Market Clarity: Buyers will always know they're getting unused tokens with full utility
- Governance Integrity: Voting power will stay with committed participants
- Technical Simplicity: All logic will remain on Ethereum
How will StorPunk implement cypherpunk principles?
StorPunk will implement core cypherpunk principles through:
- Privacy Through Cryptography: Technical protection rather than policy promises
- Individual Sovereignty: Users will control their own data and digital assets
- Censorship Resistance: Architecture designed to prevent central control
- Voluntary Association: Interaction based on consent rather than coercion
- Self-Custody: Users will maintain direct control of keys and data
- Permissionless Access: No gatekeepers or arbitrary restrictions
Join Us
StorPunk implements decentralized infrastructure based on cypherpunk principles: privacy through cryptography, individual sovereignty, and resistance to centralized control. While built on a foundation of configurable data storage, the project aims to create a complete ecosystem for digital sovereignty including financial infrastructure, trading platforms, and communication tools.
The project accepts contributions from developers, designers, researchers, and privacy advocates. All work arrangements are remote contractor positions with flexible location and schedule requirements. Participation provides:
- Development experience with decentralized infrastructure
- Compensation through both fiat and native token allocation
- Influence over technical architecture and implementation
- Experience with distributed systems, cryptography, and P2P networks
- Collaboration with privacy-focused developers and researchers
- Practical application of cypherpunk principles to infrastructure development
Connect With Us
We use decentralized platforms for all communications to maintain privacy and censorship resistance. We use Retroshare over Tor for community discussions and Radicle for decentralized code collaboration.
How do I get started?
Radicle Git
Radicle offers peer-to-peer code collaboration built on Git, eliminating reliance on centralized platforms like GitHub while maintaining full Git functionality.
Retroshare for communications
Retroshare provides encrypted, decentralized communication without central servers. It supports chat, forums, file sharing, and works over Tor for additional anonymity.
Download Retroshare from retroshare.cc and add our coordinator using the key below. Radicle setup instructions will be provided to contributors.
Contact the Project Coordinator
TylerAbeoJordan via Retroshare over Tor (key below)
For available positions and detailed job descriptions, see our Positions page.
The StorPunk project represents a practical implementation of cypherpunk principles in decentralized infrastructure development. Contributors interested in building censorship-resistant systems that advance digital sovereignty can submit qualifications through the contact channels described above.
Note: All project communications use encrypted channels for security and privacy. Retroshare is available from retroshare.cc. Running it over Tor provides additional network-level anonymity for sensitive communications.
Open Positions
StorPunk is seeking talented developers to help build decentralized infrastructure based on cypherpunk principles. All positions are remote contractor roles, giving you freedom to work from anywhere in the world. Upon successful DAO launch, we will be offering competitive compensation plus native token incentives for all development work.
Founder Status Opportunity: Contributors who join pro-bono before the DAO launch to help establish the project will be considered founding members and will receive a special founder bonus allocation of native tokens (amount to be determined). This provides early participation benefits for those helping during the initial development phases.
Job Descriptions
Systems-Level Engineer Researcher Coordinator
Status: Open
We are seeking a multifaceted technical leader to serve as the project's #2 position, working directly with the Project Coordinator. This role involves bridging the gap between the development team and StorPunk community, facilitating technical communication and ensuring developers can focus on coding without distraction. The ideal candidate will have strong technical expertise combined with excellent communication and coordination skills.
- Complete role overview and responsibilities
- Required technical skills and experience
- Compensation and benefits details
- Application instructions and requirements
Lead Developer - Core Network
Status: Open
We need an experienced lead developer to spearhead the StorPunk fork and guide the technical evolution of our network infrastructure. This position involves working directly with the founding team to architect and implement core network functionality. The role requires deep expertise in Rust programming, peer-to-peer networking, and decentralized system design.
- Expert-level Rust and P2P networking requirements
- DeFi/DEX development responsibilities
- Core architecture design and implementation
- Team leadership and mentorship duties
Junior Developer - Networking & P2P
Status: Open
We are looking for a junior developer with experience in networking and P2P systems to join the StorPunk team. This role focuses on implementing and optimizing the peer-to-peer networking layer of our decentralized infrastructure. You'll work on P2P connectivity, NAT traversal, network reliability, and performance optimization while collaborating on protocol design.
- Intermediate Rust and libp2p experience
- P2P connectivity and NAT traversal development
- Network reliability and performance optimization
- Collaborative protocol design work
Junior Developer - Storage & Data Management
Status: Open
We seek a junior developer with a focus on storage systems and data management to implement configurable data storage mechanics, TTL-based data lifecycle, and efficient data retrieval systems. This role involves working with storage systems, databases, data redundancy, integrity systems, and performance optimization while conducting thorough testing.
- Storage systems and database experience
- TTL-based data lifecycle implementation
- Data redundancy and integrity systems
- Performance optimization and testing
Junior Developer - DEX & Token Economics
Status: Open
We are seeking a junior developer with interest in decentralized exchanges and token economics to work on implementing native exchange functionality, transaction fee systems, and token-based incentive mechanisms. This position involves DeFi development, token economics design, economic modeling, and building security-focused financial systems.
- DeFi basics and exchange development
- Token economics and incentive design
- Economic modeling and analysis
- Security-focused financial systems
The StorPunk project represents a practical implementation of cypherpunk principles in decentralized infrastructure development. Contributors interested in building censorship-resistant systems that advance digital sovereignty can submit qualifications through the contact channels described in our Join Us section.
Note: All project communications use encrypted channels for security and privacy. Retroshare is available from retroshare.cc. Running it over Tor provides additional network-level anonymity for sensitive communications.
StorPunk Resources
This page provides access to all official StorPunk documentation and resources available for download.
Official Documentation
- Contains complete governance framework with 15 articles
- Details all token holder rights and responsibilities
- Outlines amendment procedures and dispute resolution
- Establishes perpetual DAO governance through the Community Development Fund
- Includes comprehensive development roadmap and constitutional protections
- Contains comprehensive technical specifications and implementation details
- Includes complete table of contents with 10 sections and appendices
- Details all use cases, applications, and getting started guides
- Provides full risk assessment and legal compliance information
- Features complete glossary terms and philosophical references
- --
Note: All resources are regularly updated. Check back frequently for the latest versions.
StorPunk Glossary
This glossary defines technical terms, concepts, and specialized terminology used throughout the StorPunk documentation and website, organized by topic categories.
StorPunk Entity Definitions
What is StorPunk Project?
The decentralized development group that has aims to create the StorPunk Network. This refers to the collective development effort, not an organization with a mission.
What is StorPunk Network?
The software/technology being developed by the StorPunk Project. As software, it has functions but no human aims or mission.
What is StorPunk DAO?
The Decentralized Autonomous Organization that manages development funding, governance, and project management for the StorPunk Project. The DAO has a mission to fund and govern the development effort.
Core Concepts & Philosophy
What is Cypherpunk?
A movement and philosophy focused on using cryptography to protect privacy, enable individual sovereignty, and resist centralized control. StorPunk implements core cypherpunk principles.
What is the Cypherpunk Manifesto?
Eric Hughes' 1993 foundational text that states "Privacy is necessary for an open society in the electronic age" and outlines the principles of cryptographic privacy.
What is Epistemic Freedom?
The ability to think, communicate, and access information without surveillance or censorship constraints.
What is Privacy Through Cryptography?
The approach of implementing privacy at the architectural level through cryptographic protections rather than policy promises.
What is Voluntary Association?
The principle that interactions are based on consent and mutual agreement rather than coercion or mandatory participation.
What is a Voluntaryist?
A philosophical position that emphasizes voluntary cooperation and opposes coercive institutions.
What is Censorship Resistance?
The architectural design principle that prevents any single entity from blocking access to or controlling content on decentralized networks.
What is Self-Custody?
The model where users maintain direct control of their data, metadata, encryption keys, and tokens without third-party dependencies.
What is Digital Sovereignty?
The ability of individuals to maintain control over their digital existence, including data, assets, identity, and communications, without requiring permission from central authorities.
What is Technical Implementation Over Policy?
The principle that rights protected by cryptographic protocols are more durable than rights protected by legal frameworks or organizational policies.
What is Architectural Resistance?
The design approach where systems are architected to resist centralization through technical means rather than relying on organizational restraint.
What is User Sovereignty?
The principle that individuals should maintain absolute control over their digital existence without requiring permission or approval from external entities.
What is Voluntary Interaction?
The principle that all digital interactions should be based on consent rather than coercion or mandatory participation.
What is Trust Minimization?
The design approach where systems minimize trust requirements through cryptographic verification and transparent operations.
What is Code as Law?
The principle that protocol rules should be enforced by code rather than interpretation or human intervention.
Network Architecture & Technology
What is Autonomi Network?
A decentralized storage network focused on permanent data storage that StorPunk maintains compatibility with.
What is a Dual-Network Client?
An interface that supports both temporary storage (StorPunk) and permanent storage (Autonomi Network) from a single application.
What is the Temporary Data Model?
A storage approach where data has configurable retention periods rather than permanent storage, designed to ensure economic sustainability.
What is Time-to-Live (TTL)?
The configurable expiration period for stored data, allowing users to define retention duration.
What is a Chunk?
A piece of immutable data of limited size, typically representing a portion of a file stored on decentralized networks.
What is Close Group Consensus?
A consensus mechanism where data operations require agreement from a group of nodes closest to the data's location.
What is Node Churn?
The natural process of nodes joining and leaving peer-to-peer networks.
What is Network Bloat?
The accumulation of outdated or unfunded data that challenges permanent storage networks.
What is Cascade Collapse?
A scenario where permanent storage networks fail due to accumulating unfunded data maintenance obligations.
What are Network Hops?
Anonymous usage capability similar to Tor's onion routing, designed to enhance user privacy.
What is Stigmergy-Based Coordination?
A consensus mechanism inspired by natural systems like ant colonies, where complex behavior emerges from simple local interactions between nodes without central coordination.
What is XOR-based Addressing?
A 256-bit addressing system derived from cryptographic hashes, used for efficient data location and routing in distributed networks.
What are Close Groups?
Dynamic groups of nodes (typically 5) that manage specific data ranges and provide redundancy for stored chunks.
What are Unified Nodes?
Single software instances that handle storage, validation, and exchange functions within the StorPunk network.
What is the Storage Layer?
The decentralized temporary data storage component of the StorPunk network with configurable TTL.
What is the Transaction Layer?
The component handling native $PUNK token operations and economic transactions.
What is the Exchange Layer?
The integrated peer-to-peer decentralized exchange functionality.
What is the Communication Layer?
The censorship-resistant messaging and data exchange system.
What is the Governance Layer?
The temporary Ethereum DAO system for fundraising and development coordination.
What is Content-Addressable Storage?
A storage approach where data locations are determined by content hashes rather than location-based addressing.
What is Redundant Storage?
The practice of storing multiple copies (typically 5) of each data chunk across different nodes for fault tolerance.
What is Dynamic Routing?
Adaptive routing mechanisms that adjust based on network conditions and node availability.
What is Data Rotation?
The process where nodes implement LRU (Least Recently Used) cache eviction with configurable retention policies.
What is Graceful Expiration?
The mechanism where data not renewed by TTL is gradually removed from circulation rather than abruptly deleted.
What is Node Rotation?
The active migration of data from departing nodes to maintain redundancy and availability.
What is Integrity Verification?
Continuous checksum validation performed during data transfers to ensure data integrity.
What is a Merkle Tree?
A cryptographic data structure used for efficient integrity verification of large datasets by creating a hierarchical hash tree.
What is a Data Map?
A metadata structure containing reconstruction information, chunk hashes, and encryption metadata for stored data.
Node Types & Functions
What are Storage Nodes?
Nodes responsible for storing and managing data chunks with TTL enforcement, participating in network consensus, and handling data replication.
What are Bridge Nodes?
Specialized nodes that monitor blockchain events and facilitate token bridging between networks.
What are Bootstrap Nodes?
Initial connection points that new nodes use to discover and join the network.
Token Economics & Governance
What is a Dual-Token System?
An economic model using separate tokens for governance and utility functions.
What is $PUNK-DAO?
An ERC-20 governance token used for fundraising and voting in decentralized organizations.
What is $PUNK?
A native utility token used for network operations and transactions.
What is a DAO (Decentralized Autonomous Organization)?
A governance structure where token holders make collective decisions about technical direction and resource allocation without central authority.
What is a Tiered Sale Structure?
A multi-phase funding approach where tokens are sold at different multiplier rates based on funding phase.
What is the Multiplier Mechanism?
A tier-based system where token purchases convert at different rates based on purchase timing.
What is Hold-to-Double Reward?
An additional multiplier incentive for original token purchasers who maintain their position without transfer.
What are Soulbound Tokens?
Tokens that become cryptographically locked to a wallet after certain actions, maintaining specific rights while preventing transfer.
What is the Community Development Fund?
A long-term initiative that receives portions of unsold tokens to fund ecosystem development and community projects.
What is Market-Based Pricing?
An economic model where prices are determined by supply and demand rather than fixed rates.
What are Token Economics?
The economic design and incentive structures surrounding token systems.
What is Treasury Management?
The process of managing financial resources in decentralized organizations.
What is Gasless Voting?
Voting mechanisms that don't require paying blockchain transaction fees.
What is Snapshot.org?
A governance platform used for gasless voting on proposals.
What is Dynamic Pricing Algorithm?
A pricing mechanism that combines base cost per gigabyte with duration multipliers and network load factors, applying tiered pricing based on network utilization.
What are Payment Channels?
Bi-directional payment channels that enable efficient micro-transactions between network participants.
What is Batch Settlement?
The process of settling multiple transactions simultaneously using merkle tree proofs for efficiency.
What is Deflationary Design?
An economic design with fixed token supply and burning mechanisms to maintain value.
What are Anti-Sybil Mechanisms?
Economic barriers and verification systems designed to prevent malicious node creation and manipulation.
What is DAO Sunset?
The automatic transition from temporary DAO governance to permanent node-based software update decisions when development funding is depleted.
What is Post-DAO Governance?
The network evolution phase where decisions are made through voluntary software adoption by node operators rather than token-based voting.
Supported Currencies & Assets
What is USDT?
Tether stablecoin, a cryptocurrency pegged to the US dollar.
What is ETH?
Ethereum cryptocurrency, the native token of the Ethereum blockchain.
What is WBTC?
Wrapped Bitcoin, a tokenized version of Bitcoin on Ethereum.
What is PAXG?
A gold-backed stablecoin.
What is ANT?
The native token of the Autonomi Network.
What is a Stablecoin?
Cryptocurrencies pegged to stable assets like the US dollar.
Technical Infrastructure
What is Rust?
A systems programming language focused on safety and performance, commonly used for blockchain and networking applications.
What is Async Programming?
A programming paradigm that allows non-blocking operations.
What is Peer-to-Peer (P2P)?
A decentralized architecture where participants interact directly without intermediaries.
What is a DEX (Decentralized Exchange)?
A peer-to-peer exchange system that operates without intermediaries.
What is libp2p?
A modular peer-to-peer networking stack for building decentralized applications.
What is NAT Traversal?
Techniques used to establish and maintain network connections through Network Address Translation devices.
What is TCP/IP?
The fundamental communication protocol suite used for internet communications.
What is UDP?
User Datagram Protocol, a connectionless network protocol used for low-latency communications.
What is QUIC?
A modern transport layer network protocol designed for improved performance over TCP.
What is WebRTC?
Web Real-Time Communication, a technology that enables peer-to-peer communication between web browsers.
What is quic-p2p?
A software library allowing secure connection between nodes using the QUIC protocol.
What is DHT (Distributed Hash Table)?
A decentralized distributed system that provides a lookup service similar to a hash table.
What is CRDT (Conflict-free Replicated Data Type)?
Data structures that can be replicated across multiple nodes and updated concurrently without coordination.
What is Self-Encryption?
A cryptographic technique where files are encrypted using hashes of their own content.
What is Tokio?
An asynchronous runtime for Rust that provides the foundation for network operations and concurrent processing.
What is Serde?
A Rust framework for serializing and deserializing Rust data structures efficiently and generically.
What is Criterion?
A Rust benchmarking library used for performance testing and optimization.
What is Proptest?
A property testing framework for Rust that generates random test cases to verify code properties.
What is RESTful API?
An API design that uses standard HTTP methods and follows REST architectural principles for client-server communication.
What is SDK (Software Development Kit)?
A collection of software development tools that allows creation of applications for a specific software package or platform.
Security & Cryptography
What is Ed25519?
A public-key signature system using elliptic curve cryptography.
What is Metadata Collection?
The practice of gathering information about data rather than the content itself.
What is a Sybil Attack?
An attack where an adversary creates multiple fake identities to gain disproportionate influence.
What is an Eclipse Attack?
A network attack where an adversary isolates a node by controlling all its connections.
What is BFT (Byzantine Fault Tolerance)?
The ability of a distributed system to continue operating correctly even when some components fail or behave maliciously.
What is ABFT (Asynchronous Byzantine Fault Tolerance)?
A consensus mechanism that allows distributed systems to tolerate Byzantine faults without requiring synchronous communication.
What is Multisig (Multi-signature)?
A security mechanism requiring multiple signatures to authorize transactions.
What is DKG (Distributed Key Generation)?
A cryptographic protocol that allows multiple parties to jointly generate a secret key.
What is SHA3-256?
A cryptographic hash function that produces a 256-bit hash value, considered quantum-resistant and used for data integrity verification.
What is AES-256-GCM?
An authenticated encryption algorithm that provides both confidentiality and integrity protection, using 256-bit keys in Galois/Counter Mode.
What is HKDF-SHA256?
HMAC-based Key Derivation Function using SHA-256, used for deriving encryption keys from source material.
What is BLS12-381?
A pairing-friendly elliptic curve used for BLS signatures, providing efficient signature aggregation and verification.
What is X25519?
An elliptic curve Diffie-Hellman key exchange protocol using Curve25519 for secure key establishment.
What is Forward Secrecy?
A property of secure communication protocols where compromise of long-term keys does not compromise past session keys.
What is Quantum Resistance?
Cryptographic properties that provide security against attacks from quantum computers.
What is Merkle Root?
The top-level hash in a Merkle tree that represents the entire dataset and enables efficient integrity verification.
What is Domain Separation Tag (DST)?
A security mechanism used in cryptographic protocols to prevent cross-protocol attacks by ensuring protocol-specific domain separation.
What is Threshold Signature Scheme?
A cryptographic scheme where signatures require a threshold number of participants (e.g., 2-of-3) to collaborate.
What is Shamir's Secret Sharing?
A cryptographic algorithm that divides a secret into multiple parts, requiring a minimum number of parts to reconstruct the original secret.
Communication & Development Tools
What is Retroshare?
Encrypted, decentralized communication software that can operate over Tor for additional anonymity.
What is ERC-20?
A technical standard for fungible tokens on the Ethereum blockchain.
What is DBC (Digital Bearer Certificate)?
Digital money that functions like physical cash, providing ownership through possession.
What is IDA (Information Dispersal Algorithm)?
Algorithms that split data into multiple parts for efficient storage and retrieval.
What is XorName?
A representation of an XOR address used in distributed hash tables for efficient data location.
What is Kademlia DHT?
A distributed hash table implementation that uses XOR-based distance metrics for efficient peer discovery and data location.
What are k-Buckets?
Routing table components in Kademlia DHT that maintain lists of nodes sorted by XOR distance, typically containing 20 nodes per bucket.
What is Gossip Protocol?
An epidemic-style message propagation protocol where nodes periodically exchange information with random peers to disseminate messages throughout the network.
What is Pub/Sub Messaging?
A messaging pattern where messages are published to topics and delivered to all subscribed nodes.
What is GossipSub?
A specific implementation of pub/sub messaging used in libp2p for efficient message propagation.
What are Payment Channels?
Off-chain payment mechanisms that enable fast, low-cost transactions between parties with final settlement on the main chain.
What are Merkle Tree Proofs?
Cryptographic proofs that verify the inclusion of specific data in a Merkle tree without revealing the entire dataset.
What is Multi-signature Escrow?
A security mechanism where funds are held in escrow requiring multiple signatures for release, often with time-locked releases for dispute resolution.
What are Registers?
Versioned key-value stores using Conflict-free Replicated Data Types (CRDTs) for concurrent updates.
What are GraphEntries?
Signed, immutable graph structures containing owner public keys, parent references, content, and cryptographic signatures.
What are Pointers?
Mutable references to other data within the StorPunk network.
What are Scratchpads?
Encrypted mutable storage containers for temporary data manipulation.
What are Vector Clocks?
Logical clocks used in distributed systems for ordering operations and detecting conflicts.
What are Tombstone Flags?
Markers used in distributed systems to indicate deleted data while maintaining convergence properties during synchronization.
What are Version Vectors?
Data structures that track version information across multiple replicas in distributed systems.
What are Merge Semantics?
Well-defined rules for combining conflicting updates in distributed systems to ensure consistent outcomes.
- --
Note: This glossary is a work in progress. Terms will be added as they are identified throughout the documentation.
Additional Notes:
- Terms are organized by topic categories for easier navigation
- Some terms may appear in multiple categories where relevant
- Refer to specific technical documents for implementation details