# Key Features

### An **Autonomous** Network

Autonomi goes a step beyond typical decentralized systems. It is a network that can act both as a global market for computer capacity, but also turn that capacity into usable capability that's native to the Internet itself, not just a pointer to existing cloud services. It's a self-healing, course-correcting system; a huge resource layer that anyone can utilize with no permission required.

### **Blockchainless Data**

Data storage on the Network use is a Decentralized Ledger Technology (DLT) that doesn't utilize blockchain, so it's able to sidestep many of the obstacles to scale inherent typical decentralized storage solutions. The bigger it gets, the more it can do.

### **Post-Quantum Security**

Anything stored on the Network is self-encrypted on your own device before upload, and every connection between nodes uses NIST-standardised post-quantum cryptography. The transport layer is quantum-resistant from the very first byte, not just the application layer on top. This means Autonomi combines client-side encrypted storage with connections designed for the quantum era, while keeping your data out of plain sight on the network.

### **Commodity Devices**

The Network is assembled from a multitude of connected devices, of all shapes and sizes. It's deliberately designed to allow even the smallest computers to be able to contribute, rather than just relying on enterprise data centres. Not only does this make the most of humanity's spare resources—which is better for the planet—but it means it’s inherently more decentralized and secure, thanks to the millions of devices able to participate.

### Privacy

Zero-knowledge: The Network's protocol employs multilayered encryption, protecting the privacy of users data both during storage and during transit. Nodes cannot determine the content, nor origin of data they hold or transmit, even if it is their own.

No tracking: thanks to its various encryption schemes, tracking and surveillance of browsing and data usage patterns—commonplace business practice on the incumbent web—is no longer possible. Privacy is by default.

Users of the Network have sovereignty over their personal data, and can maintain and control access to it, while still making use of rich and accessible services and software.

Cryptographic keys replace passwords and accounts. Users need only a single secret key while interacting with an unlimited number of services, businesses, identities, or contexts of use.

<br>
