#Glossary
This page collects every protocol term used across the learn section into one place. Each definition is a brief summary, and the "Explained in" column links to the page where the concept is covered in depth.
#Core Entities
| Term | Definition | Explained in |
|---|---|---|
| Network Estate | Your place on the network, built through years of hosting labor. It holds your level, boost badges, eternal floor, and Estate Key. | Avatar + Mind = You |
| Avatar | Your cryptographic identity on the network, consisting of a quantum-resistant keypair (the Identity Key) and a .avtr domain name. | Avatar + Mind = You |
| Artificial Mind / Mind | Everything you write about yourself: stories, journal entries, lessons, memories, opinions. Your Avatar contains it, and it is what future generations read and converse with. | Avatar + Mind = You |
| Engram | An atomic unit of content, up to 8,192 characters. Each engram is content-addressed by its SHA-512 hash and signed by the author's Identity Key. | Data Hierarchy |
| Experience | A major topic area in your Mind, like a book on a shelf. Contains memories and engrams beneath it. | Data Hierarchy |
| Memory | A grouping that organizes engrams, like a chapter in a book. Memories can nest up to three levels deep. | Data Hierarchy |
| Node | A physical machine on the network, the building on network land. A node can run one or more roles such as beacon, mirror, or relay. | Peer-to-Peer |
#Node Roles
| Term | Definition | Explained in |
|---|---|---|
| Beacon | The primary node hosting an avatar's data. It holds the authoritative, latest copy. There is one beacon per avatar. | Peer-to-Peer |
| Mirror | A node that stores and serves copies of an avatar. Any node can mirror any public avatar. | Peer-to-Peer |
| Relay | A node that routes encrypted traffic between other nodes without being able to read it. | Peer-to-Peer |
| Satellite | A lightweight browser node that offloads heavy tasks like AI inference to a remote beacon. | Peer-to-Peer |
| Receiver | A visitor browsing an avatar. It reads content but does not store or serve it. | Peer-to-Peer |
#Level System
| Term | Definition | Explained in |
|---|---|---|
| Level (L1 through L7) | Your Network Estate's rank on the network, determined by cumulative hosting time following the 3^n pattern. Higher levels grant more copies and require higher contribution ratios. | Protocol Economics |
| Temp / Limbo | The 90-day probationary period before your avatar becomes permanent, requiring three verifications from trusted members to pass. Failure means deletion. | Protocol Economics |
| 3^n pattern | The progression rule governing the entire protocol: level n requires 3^n months and grants up to 3^n copies. The same constant drives probation (3 months), verifications (3 required), daily storage (3 MB), and exercise windows (3 days). | Protocol Economics |
| Verifier status | Earned after hosting for at least nine months (L2), allowing you to vouch for new avatars during their 90-day probation. In the mature network, L3 (27 months) is required. | Protocol Economics |
#Economics
| Term | Definition | Explained in |
|---|---|---|
| Bucket | Your personal storage allocation, which grows by 3 MB per day as long as you exercise the daily unlock and host proportionally. It is permanent and never degrades. | Protocol Economics |
| Progressive contribution (L+2) | The formula where your estate's contribution ratio is always two steps above its level number. An L3 estate hosts 5x what it stores, producing 2x surplus. | Protocol Economics |
| Surplus | The extra hosting capacity that higher-level estates produce beyond their own needs. Surplus funds free access for visitors, non-contributors, and the dead. | Protocol Economics |
| Boost badge | A permanent multiplier recorded on your Network Estate, earned by responding to a stress call and hosting continuously for 90 days. It increases your eternal floor and your priority in the recovery queue. | Protocol Economics |
| Stress call | A network broadcast issued when health drops below 80%, offering permanent boost badges to participants who contribute extra storage. Responding early earns a higher reward than waiting. | Protocol Economics |
| Eternal floor | The minimum number of guaranteed backup copies your estate keeps, even at 0% network health. The base is L+2 (so 7 for an L5 estate), and a full boost badge triples it (to 21). | Protocol Economics |
| Circuit breaker | An automatic safety mechanism that fires at 50%, 33%, and 0% health to progressively shed surplus, delete temps, or freeze the network. Guaranteed copies are never touched regardless of which breaker fires. | Protocol Economics |
| Network health | A single percentage tracking how much surplus capacity remains after covering all guaranteed commitments. Displayed as a filling bar with zone labels from Excellent (90%+) to Failing (below 50%). | Protocol Economics |
| Degradation | The process where levels decay symmetrically when you stop hosting, each taking the same 3^n months to lose as it took to earn. An L5 estate takes over 30 years of continuous absence to fully degrade. | Digital Permanence |
| Universal access ancestors | Previous generations whose avatars are preserved by the network's surplus pool. The progressive contribution formula ensures the living produce enough surplus to carry the dead. | Digital Permanence |
| Backupism | The economic model that borrows the mechanics of capitalism and redirects them toward preservation. More backups means a higher chance of survival in eternity, the same way more capital means a higher chance of survival in the economy. | Backupism |
| Artificial Eternity | The state where your avatar persists indefinitely on the network, sustained by the surplus of future generations. Only one copy needs to survive for the network to restore the rest. | Backupism |
| Digital immortality | The ability of your 0s and 1s to live forever: your words, your writings, and your signed cryptographic identity preserved on a decentralized network. Not consciousness upload, but data preservation. | Backupism |
| Replication factor | The number of independent machines holding a complete copy of your data. Starts at 3x for everyone and can go as high as 3^n (your level's ceiling) by accepting higher storage ratios. | Replication |
#Cryptography
| Term | Definition | Explained in |
|---|---|---|
| Estate Key | The SLH-DSA keypair that controls your Network Estate (level, boost badges, hosting position). Separate from the Identity Key so compromising one does not compromise the other. | Avatar + Mind = You |
| Identity Key | The SLH-DSA keypair that proves your authorship by signing every engram you write. The public half travels with your .avtr domain so anyone can verify your signatures. | Avatar + Mind = You |
| Node key | The SLH-DSA keypair that identifies a machine on the network, separate from both the Identity Key and the Estate Key. It answers "which machine am I talking to?" | Peer-to-Peer |
| SLH-DSA | Stateless Hash-Based Digital Signature Algorithm (FIPS 205), the post-quantum signature algorithm used for all signing on Avatarnet. Built entirely from hash functions, so its security does not depend on any problem a quantum computer could solve. | Post-Quantum Cryptography |
| SHA-512 | Secure Hash Algorithm producing a 64-byte fingerprint of any input (FIPS 180-4). It powers content addressing on the network: every engram's hash becomes its permanent address. | Signing and Encryption |
| AES-256-GCM | Advanced Encryption Standard with 256-bit keys in Galois/Counter Mode (FIPS 197). The symmetric encryption algorithm that encrypts private and personal engrams so only the intended recipient can read them. | Signing and Encryption |
| ML-KEM | Module-Lattice-Based Key Encapsulation Mechanism (FIPS 203). The post-quantum algorithm that lets two avatars agree on a shared encryption key across an untrusted network, replacing classical approaches like X25519. | Signing and Encryption |
| Content hash | The SHA-512 fingerprint of a piece of content. It serves as the content's permanent address on the network: changing even one character produces an entirely different hash. | Content Addressing |
| Signature | Proof of authorship: a piece of data produced by combining a message with a private key. Anyone with the corresponding public key can verify the signature without needing any secret. | Key and Hash Sizes |
| CID | Content Identifier. A self-describing address that wraps a SHA-512 hash with a short header specifying which algorithm produced it and how long the digest is. | Content Addressing |
| Multihash | A 66-byte self-describing wrapper around a hash: two header bytes (algorithm code and length) followed by the 64-byte SHA-512 digest. It lets the network support multiple hash algorithms without ambiguity. | Content Addressing |
| Merkle DAG | A Directed Acyclic Graph where every node is identified by the hash of its contents, and every parent includes the hashes of its children. Changing one leaf changes every hash up to the root. | Data Hierarchy |
| Peer ID | A compact identifier for a machine on the network. It is derived from the SHA-256 hash of the machine's protobuf-wrapped SLH-DSA public key, encoded in Base58. | Key and Hash Sizes |
| Distributed Key Generation (DKG) | A technique for splitting a cryptographic key into shares held by multiple family members so no single person holds the full key. Used to pre-arrange Estate Key custody for inheritance. | Digital Permanence |
#Naming
| Term | Definition | Explained in |
|---|---|---|
| .avtr domain | A human-readable name for a person's avatar on the network, like einstein.avtr. Resolved through the Avatar Name System without relying on DNS or any central authority. | Avatar + Mind = You |
| .node domain | A human-readable name for a machine or hosting provider on the network, like oxfordarchive.node. Registered through the same DHT that resolves .avtr names. | Peer-to-Peer |
| .temp.avtr domain | The temporary domain assigned during the 90-day probation period. It becomes a permanent .avtr domain after three verifications. | Protocol Economics |
| Avatar Name System (ANS) | The decentralized name resolution system that maps .avtr names to public keys in the DHT, replacing DNS entirely. Once a name is certified, the mapping is permanent. | Peer-to-Peer |
| DHT (Distributed Hash Table) | A decentralized phone book where each participating machine holds a piece of the lookup table. Uses the Kademlia algorithm to find any record in three to five hops, even in a network of millions of nodes. | Peer-to-Peer |
#Infrastructure
| Term | Definition | Explained in |
|---|---|---|
| Avataroam | The browser for Avatarnet, the same way Chrome is the browser for the traditional internet. You type a .avtr address and it loads the avatar's mind from the network. | Introduction |
| Avatarfind | The search engine for avatars, the same way Google is the search engine for websites. It indexes avatars across the network so you can discover people, ideas, and knowledge. | Introduction |
| libp2p | A modular networking library that handles peer identity, connection encryption, protocol negotiation, and the DHT. It is the same library that powers IPFS and other decentralized networks. | Peer-to-Peer |
| Kademlia | The DHT algorithm that defines mathematical "closeness" between nodes so that any lookup converges quickly, even across millions of participants. It is the routing engine behind the Avatar Name System. | Peer-to-Peer |
#Pillars and Privacy
| Term | Definition | Explained in |
|---|---|---|
| Five Pillars | The five cryptographic promises Avatarnet makes: Estate Ownership (your estate is yours), Avatar Identity (your avatar is you), Mind Authorship (you wrote this), Mind Integrity (your words are unchanged), and Mind Privacy (only who you decide can read it). | Avatar + Mind = You |
| Privacy Spheres | Three zones controlling who can read your content. Public engrams are visible to everyone, Private engrams are encrypted and shared with specific recipients, and Personal engrams are encrypted with a key only you hold. | Privacy Spheres |