Glossary

This page collects every protocol term used across the learn section into one place. Each definition is a brief summary, and the "Explained in" column links to the page where the concept is covered in depth.

Core Entities

TermDefinitionExplained in
Network EstateYour place on the network, built through years of hosting labor. It holds your level, boost badges, eternal floor, and Estate Key.Avatar + Mind = You
AvatarYour cryptographic identity on the network, consisting of a quantum-resistant keypair (the Identity Key) and a .avtr domain name.Avatar + Mind = You
Artificial Mind / MindEverything you write about yourself: stories, journal entries, lessons, memories, opinions. Your Avatar contains it, and it is what future generations read and converse with.Avatar + Mind = You
EngramAn atomic unit of content, up to 8,192 characters. Each engram is content-addressed by its SHA-512 hash and signed by the author's Identity Key.Data Hierarchy
ExperienceA major topic area in your Mind, like a book on a shelf. Contains memories and engrams beneath it.Data Hierarchy
MemoryA grouping that organizes engrams, like a chapter in a book. Memories can nest up to three levels deep.Data Hierarchy
NodeA physical machine on the network, the building on network land. A node can run one or more roles such as beacon, mirror, or relay.Peer-to-Peer

Node Roles

TermDefinitionExplained in
BeaconThe primary node hosting an avatar's data. It holds the authoritative, latest copy. There is one beacon per avatar.Peer-to-Peer
MirrorA node that stores and serves copies of an avatar. Any node can mirror any public avatar.Peer-to-Peer
RelayA node that routes encrypted traffic between other nodes without being able to read it.Peer-to-Peer
SatelliteA lightweight browser node that offloads heavy tasks like AI inference to a remote beacon.Peer-to-Peer
ReceiverA visitor browsing an avatar. It reads content but does not store or serve it.Peer-to-Peer

Level System

TermDefinitionExplained in
Level (L1 through L7)Your Network Estate's rank on the network, determined by cumulative hosting time following the 3^n pattern. Higher levels grant more copies and require higher contribution ratios.Protocol Economics
Temp / LimboThe 90-day probationary period before your avatar becomes permanent, requiring three verifications from trusted members to pass. Failure means deletion.Protocol Economics
3^n patternThe progression rule governing the entire protocol: level n requires 3^n months and grants up to 3^n copies. The same constant drives probation (3 months), verifications (3 required), daily storage (3 MB), and exercise windows (3 days).Protocol Economics
Verifier statusEarned after hosting for at least nine months (L2), allowing you to vouch for new avatars during their 90-day probation. In the mature network, L3 (27 months) is required.Protocol Economics

Economics

TermDefinitionExplained in
BucketYour personal storage allocation, which grows by 3 MB per day as long as you exercise the daily unlock and host proportionally. It is permanent and never degrades.Protocol Economics
Progressive contribution (L+2)The formula where your estate's contribution ratio is always two steps above its level number. An L3 estate hosts 5x what it stores, producing 2x surplus.Protocol Economics
SurplusThe extra hosting capacity that higher-level estates produce beyond their own needs. Surplus funds free access for visitors, non-contributors, and the dead.Protocol Economics
Boost badgeA permanent multiplier recorded on your Network Estate, earned by responding to a stress call and hosting continuously for 90 days. It increases your eternal floor and your priority in the recovery queue.Protocol Economics
Stress callA network broadcast issued when health drops below 80%, offering permanent boost badges to participants who contribute extra storage. Responding early earns a higher reward than waiting.Protocol Economics
Eternal floorThe minimum number of guaranteed backup copies your estate keeps, even at 0% network health. The base is L+2 (so 7 for an L5 estate), and a full boost badge triples it (to 21).Protocol Economics
Circuit breakerAn automatic safety mechanism that fires at 50%, 33%, and 0% health to progressively shed surplus, delete temps, or freeze the network. Guaranteed copies are never touched regardless of which breaker fires.Protocol Economics
Network healthA single percentage tracking how much surplus capacity remains after covering all guaranteed commitments. Displayed as a filling bar with zone labels from Excellent (90%+) to Failing (below 50%).Protocol Economics
DegradationThe process where levels decay symmetrically when you stop hosting, each taking the same 3^n months to lose as it took to earn. An L5 estate takes over 30 years of continuous absence to fully degrade.Digital Permanence
Universal access ancestorsPrevious generations whose avatars are preserved by the network's surplus pool. The progressive contribution formula ensures the living produce enough surplus to carry the dead.Digital Permanence
BackupismThe economic model that borrows the mechanics of capitalism and redirects them toward preservation. More backups means a higher chance of survival in eternity, the same way more capital means a higher chance of survival in the economy.Backupism
Artificial EternityThe state where your avatar persists indefinitely on the network, sustained by the surplus of future generations. Only one copy needs to survive for the network to restore the rest.Backupism
Digital immortalityThe ability of your 0s and 1s to live forever: your words, your writings, and your signed cryptographic identity preserved on a decentralized network. Not consciousness upload, but data preservation.Backupism
Replication factorThe number of independent machines holding a complete copy of your data. Starts at 3x for everyone and can go as high as 3^n (your level's ceiling) by accepting higher storage ratios.Replication

Cryptography

TermDefinitionExplained in
Estate KeyThe SLH-DSA keypair that controls your Network Estate (level, boost badges, hosting position). Separate from the Identity Key so compromising one does not compromise the other.Avatar + Mind = You
Identity KeyThe SLH-DSA keypair that proves your authorship by signing every engram you write. The public half travels with your .avtr domain so anyone can verify your signatures.Avatar + Mind = You
Node keyThe SLH-DSA keypair that identifies a machine on the network, separate from both the Identity Key and the Estate Key. It answers "which machine am I talking to?"Peer-to-Peer
SLH-DSAStateless Hash-Based Digital Signature Algorithm (FIPS 205), the post-quantum signature algorithm used for all signing on Avatarnet. Built entirely from hash functions, so its security does not depend on any problem a quantum computer could solve.Post-Quantum Cryptography
SHA-512Secure Hash Algorithm producing a 64-byte fingerprint of any input (FIPS 180-4). It powers content addressing on the network: every engram's hash becomes its permanent address.Signing and Encryption
AES-256-GCMAdvanced Encryption Standard with 256-bit keys in Galois/Counter Mode (FIPS 197). The symmetric encryption algorithm that encrypts private and personal engrams so only the intended recipient can read them.Signing and Encryption
ML-KEMModule-Lattice-Based Key Encapsulation Mechanism (FIPS 203). The post-quantum algorithm that lets two avatars agree on a shared encryption key across an untrusted network, replacing classical approaches like X25519.Signing and Encryption
Content hashThe SHA-512 fingerprint of a piece of content. It serves as the content's permanent address on the network: changing even one character produces an entirely different hash.Content Addressing
SignatureProof of authorship: a piece of data produced by combining a message with a private key. Anyone with the corresponding public key can verify the signature without needing any secret.Key and Hash Sizes
CIDContent Identifier. A self-describing address that wraps a SHA-512 hash with a short header specifying which algorithm produced it and how long the digest is.Content Addressing
MultihashA 66-byte self-describing wrapper around a hash: two header bytes (algorithm code and length) followed by the 64-byte SHA-512 digest. It lets the network support multiple hash algorithms without ambiguity.Content Addressing
Merkle DAGA Directed Acyclic Graph where every node is identified by the hash of its contents, and every parent includes the hashes of its children. Changing one leaf changes every hash up to the root.Data Hierarchy
Peer IDA compact identifier for a machine on the network. It is derived from the SHA-256 hash of the machine's protobuf-wrapped SLH-DSA public key, encoded in Base58.Key and Hash Sizes
Distributed Key Generation (DKG)A technique for splitting a cryptographic key into shares held by multiple family members so no single person holds the full key. Used to pre-arrange Estate Key custody for inheritance.Digital Permanence

Naming

TermDefinitionExplained in
.avtr domainA human-readable name for a person's avatar on the network, like einstein.avtr. Resolved through the Avatar Name System without relying on DNS or any central authority.Avatar + Mind = You
.node domainA human-readable name for a machine or hosting provider on the network, like oxfordarchive.node. Registered through the same DHT that resolves .avtr names.Peer-to-Peer
.temp.avtr domainThe temporary domain assigned during the 90-day probation period. It becomes a permanent .avtr domain after three verifications.Protocol Economics
Avatar Name System (ANS)The decentralized name resolution system that maps .avtr names to public keys in the DHT, replacing DNS entirely. Once a name is certified, the mapping is permanent.Peer-to-Peer
DHT (Distributed Hash Table)A decentralized phone book where each participating machine holds a piece of the lookup table. Uses the Kademlia algorithm to find any record in three to five hops, even in a network of millions of nodes.Peer-to-Peer

Infrastructure

TermDefinitionExplained in
AvataroamThe browser for Avatarnet, the same way Chrome is the browser for the traditional internet. You type a .avtr address and it loads the avatar's mind from the network.Introduction
AvatarfindThe search engine for avatars, the same way Google is the search engine for websites. It indexes avatars across the network so you can discover people, ideas, and knowledge.Introduction
libp2pA modular networking library that handles peer identity, connection encryption, protocol negotiation, and the DHT. It is the same library that powers IPFS and other decentralized networks.Peer-to-Peer
KademliaThe DHT algorithm that defines mathematical "closeness" between nodes so that any lookup converges quickly, even across millions of participants. It is the routing engine behind the Avatar Name System.Peer-to-Peer

Pillars and Privacy

TermDefinitionExplained in
Five PillarsThe five cryptographic promises Avatarnet makes: Estate Ownership (your estate is yours), Avatar Identity (your avatar is you), Mind Authorship (you wrote this), Mind Integrity (your words are unchanged), and Mind Privacy (only who you decide can read it).Avatar + Mind = You
Privacy SpheresThree zones controlling who can read your content. Public engrams are visible to everyone, Private engrams are encrypted and shared with specific recipients, and Personal engrams are encrypted with a key only you hold.Privacy Spheres