Key Features

An Autonomous Network

Autonomi goes a step beyond typical decentralized systems. It is a network that can act both as a global market for computer capacity, but also turn that capacity into usable capability that's native to the Internet itself, not just a pointer to existing cloud services. It's a self-healing, course-correcting system; a huge resource layer that anyone can utilize with no permission required.

Non-Blockchain

The Network is a form of Decentralized Ledger Technology (DLT) that doesn't utilize nor require a blockchain to function. It's able to sidestep many of the obstacles to scale inherent in blockchain solutions. The bigger it gets, the more it can do.

Quantum-Secure Encryption

Anything stored on the Network is encrypted in a way that not even a quantum computer can break it. And it is end-to-end encrypted in transit too. This means you get all the benefits of the cloud, but without your data hitting the Internet. That also means no one can watch or track your use of the Network either.

Commodity Devices

The Network is assembled from a multitude of connected devices, of all shapes and sizes. It's deliberately designed to allow even the smallest computers to be able to contribute, rather than just relying on enterprise data centres. Not only does this make the most of humanity's spare resources—which is better for the planet—but it means it’s inherently more decentralized and secure, thanks to the millions of devices able to participate.

Real-Time Payment System

The oil that makes the Network's economy run is a novel payment system and native currency. This currency (known as the network token) is not just a medium of exchange for storage/hosting, it is a currency that can be transferred directly between users or devices in real-time. Payments are highly parallelizable: the bigger the Network gets, the more payments it can handle. This, combined with the Network's in-built storage, opens up a broad range of new capabilities impossible on blockchain, and without the limitations, costs and compromises required to use centralized services.

Privacy

Zero-knowledge: The Network's protocol employs multilayered encryption, protecting the privacy of users data both during storage and during transit. Nodes cannot determine the content, nor origin of data they hold or transmit, even if it is their own.

No tracking: thanks to its various encryption schemes, tracking and surveillance of browsing and data usage patterns—commonplace business practice on the incumbent web—is no longer possible. Privacy is by default.

Users of the Network have sovereignty over their personal data, and can maintain and control access to it, while still making use of rich and accessible services and software.

Passwords and credentials never leave the client computer when accessing and decrypting data. And users need only a single set of credentials while interacting with an unlimited number of services, businesses, identities, or contexts of use.

Last updated