Latest Posts

Categories

Reports
Partnerships
Research
Protocol
Reports
Research
Reports
Research
Partnerships
Reports
Press Release
Press Release
Community
Reports
Partnerships
Protocol
Protocol
Community
Community
Protocol
Reports
Partnerships
Partnerships
Partnerships
Partnerships
Research
Partnerships
Reports
Research
Partnerships
Community
Community
Community
Community
Reports
Partnerships
Partnerships
Partnerships
Community
Partnerships
Community
Community
Partnerships
Partnerships
Community
Community
Partnerships
Research
Community
Partnerships
Reports
Press Release
Protocol
Partnerships
Partnerships
Partnerships
Community
Partnerships
Partnerships
Partnerships
Community
Partnerships
Partnerships
Community
Partnerships
Community
Community
Partnerships
Partnerships
Community
Partnerships
Partnerships
Partnerships
Partnerships
Community
Partnerships
Partnerships
Community
Partnerships
Community
Community
Community
Community
Community
Community
Community
Community
Community
Press Release
Community
Community
Community
Press Release
Partnerships
Reports
Press Release
Partnerships
Community
Research
Press Release
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
December 23, 2025

Autonomys Network — 2025 End-of-Year Report

3
Min Read
BY
AUTONOMYS

To our community, partners, and supporters,

2025 was the year Autonomys transitioned from foundational infrastructure to a fully activated, production-ready network. We entered the year with a live Proof-of-Archival-Storage (PoAS) mainnet and a growing distributed storage network (DSN). We close the year with Domains deployed, Auto EVM live, token transfers enabled, exchange markets established, and an expanding ecosystem of builders, partners, and agents integrating real workloads.

Across consensus, storage, execution, and token infrastructure, Autonomys now operates as a vertically integrated, AI-native Layer 1 designed to support permanent, verifiable data and modular on-chain agents at scale.

At the protocol level, the year was defined by the delivery and hardening of Mainnet Phase-2. At the execution layer, we activated Auto EVM to bring permissionless smart contracts online. At the economic layer, we enabled token transfers, launched the Guardians of Growth Staking Incentives Program, and established liquid markets across multiple centralized and decentralized venues.

By December 2025, the Autonomys ecosystem encompassed 60 partners and integrations across infrastructure, exchanges, AI agents, AI data, DePIN, wallets, security, and DeFi. These collaborations reflect a deliberate focus on permanence, verifiability, and scalable AI-native execution rather than integration volume alone.

With consensus, execution, storage, and liquidity now successfully in place, our focus has sharpened toward long-term cryptographic resilience and permissionless scalability. Autonomys is preparing early for challenges and demands that may emerge years from now, ensuring the network remains durable, trustworthy, and capable of supporting the next generation of AI-native workloads.

This is our 2025 year in review, with a brief look at the priorities and developments on the horizon for 2026.

Press enter or click to view image in full size

At the protocol level, 2025 was defined by the delivery and hardening of Mainnet Phase-2.

  • In January, the consensus chain surpassed 1 million blocks, demonstrating stability, reliable block production, and sustained support from more than a thousand farmers contributing hundreds of petabytes of SSD capacity.
  • Throughout Q1, engineering focused on Domain readiness, including extensive Cross-Domain Messaging (XDM) stress testing with roughly 400,000 transactions processed on the Taurus testnet. These tests surfaced specific edge cases that were resolved prior to launch.
  • Execution performance improved significantly, with the Taurus EVM receiving optimizations that achieved above 2,000 TPS in internal testing.
  • DSN retrieval paths were strengthened to reduce latency for Auto Drive cache misses, improving the performance profile for AI, agent, and data-intensive workloads.

This preparation culminated mid-year in the formal activation of Mainnet Phase-2.

Token transfers were enabled at the protocol level on July 16, 2025, followed shortly by the launch of Auto EVM, introducing permissionless smart-contract deployment integrated with the DSN.

These steps completed the transformation from a foundational consensus chain into a full-stack execution environment where agents, applications, and data-rich workloads can operate on a single, coherent network.

Press enter or click to view image in full size

Security remained a primary focus throughout 2025.

SRLabs concluded the 2025 audit cycle covering Domains, Cross-Domain Messaging (XDM), Proof-of-Time (PoT), Proof-of-Archival-Storage (PoAS), and fraud proofs, with all critical findings addressed before mainnet launch, and remaining optimizations tracked publicly as part of our continuous security commitment.

Combined with the performance and reliability work carried out during Q1, these efforts ensured that Mainnet Phase-2 went live on a robust foundation designed to withstand operational stress, adversarial behavior, and long-term usage patterns.

Press enter or click to view image in full size

2025 also marked the year Autonomys began to fully realize its role as infrastructure for AI-native development.

Auto Agents Framework

Major upgrades to the Auto Agents Framework included:

  • v0.2.0 with complex orchestration, multi-character setups, and an enhanced Memory Viewer
  • Improved DSN memory persistence and resurrection
  • Argu-Mint v2, a proof-of-concept (PoC) demonstrating verifiable on-chain agent memory and learned experiences

Later in the year, the release of AgentOS and the first Auto SDK MCP server further streamlined integration between agents, Auto Drive, and DSN-backed storage, making it easier for developers to connect agent frameworks to permanent, verifiable memory.

Auto Drive and DSN

The DSN matured substantially:

  • Auto Drive was launched this year, giving developers a simple way to store and access data on the network. Shortly after launch, it added support for Amazon S3 style workflows, alongside a refreshed interface.
  • DSN retrieval optimizations improved cache miss handling and response times, strengthening support for AI, analytics, and archival use cases.
  • Research advanced the design for verifiable erasure-coded, on-demand data sharding, positioning Autonomys for orders-of-magnitude throughput improvements as demand scales.
  • We also made user-driven enhancements requested by those integrating our stack.

Developer Enablement

To match these infrastructure advances, Autonomys invested in developer enablement:

  • The Autonomys Academy was refreshed as a product and architecture learning hub, while the Developer Hub was expanded to serve as the primary technical resource for builders, with deeper documentation, tooling references, and integration guides.
  • The Autonomys Core content series clarified vision, farming, agent tooling, storage, and developer pathways.

Together, these initiatives made it easier for developers to understand the architecture, experiment with agents and storage, and build composable applications on top of the Auto Suite.

Press enter or click to view image in full size

The economic layer of Autonomys evolved significantly across the year.

Token Transfer Enablement

Token transfers were activated at block 3,585,226, unlocking the network’s economic layer and enabling participating builders to move seamlessly into staking, rewards, and Domain-based applications.

Staking and Decentralization

To encourage a broad and resilient validator and nominator set, the Subspace Foundation launched the Guardians of Growth Boosted-Staking Initiative, allocating 5,000,000 AI3 over approximately twelve months to incentivize operator and nominator participation.

Get Autonomys Network’s stories in your inbox

Join Medium for free to get updates from this writer.

Subscribe

By September, roughly 28 million AI3, about 25 percent of the circulating supply, was staked on the network. Today, that figure has grown to over 34 million, representing approximately one-third of circulating supply.

Exchange Listings and Liquidity

Press enter or click to view image in full size

All token listing and liquidity operations were conducted by the Subspace Foundation, preserving separation between protocol development and market operations.

In August, the Foundation coordinated:

These actions established a globally accessible token ecosystem while maintaining clear boundaries between governance, engineering, and market infrastructure.

Press enter or click to view image in full size

2025 Ecosystem Snapshot

Press enter or click to view image in full size

Autonomys’ ecosystem expanded substantially in 2025 as more teams adopted infrastructure designed for permanence, verifiability, and scalable AI-native execution. Many collaborations deepened earlier engagements, while others represented new integrations across AI data pipelines, agent frameworks, decentralized storage, and DSN-backed verifiable memory.
Autonomys began the year with 30 partners. By December 2025, the ecosystem reached 60 partners and integrations, doubling in size in a single year. Additional integrations are underway and will be announced in early 2026. As we head into the new year, the expanding ecosystem will continue to shape how builders use Autonomys for persistent data, agent execution, and decentralized AI development.

Press enter or click to view image in full size

Autonomys’ developer and community base expanded meaningfully as the network matured.

  • Hackathons such as HackSecret 5, the Aurora Buildathon, and the Midwest Block-a-thon introduced Autonomys tooling to hundreds of developers.
  • The Game of Domains initiatives, including “Crossing the Narrow Sea” and “The Watcher’s Oath” helped secure and optimize XDM and improve staking UX ahead of Phase-2 activation.
  • Campaigns such as The Dawn of Autonomy, Spark & Seed, Node Atlas, and the Monthly Community Contests strengthened early contributor engagement and rewarded meaningful participation.

In July, the Subspace Foundation introduced the Ecosystem Grants Program to fund Infrastructure, AI-powered dApps and Agents, Integrations, Research, and Community growth. Designed as a long-term investment in ecosystem health, the program supports the foundational components, applications, and communities that enable the Autonomys Network to grow sustainably. Early applications began arriving immediately following token listings. These initiatives created a pipeline for new projects, improved documentation, and aligned community efforts with the network’s technical roadmap, helping ensure that Autonomys grows in a focused and durable way.

Press enter or click to view image in full size

In November, the Autonomys Engineering Roadmap was released, outlining priorities across three tracks: Application, Protocol, and Research.

Press enter or click to view image in full size
  • Application Layer — the tools and interfaces that users and developers touch.
  • Protocol Evolution — the code that shapes the reliability, performance, and decentralization of the network itself.
  • Research — the forward-looking work that prepares Autonomys for emerging technical, economic, and cryptographic challenges.

These tracks guide the next stage of network evolution:

  • Strengthening the application layer.
  • Hardening the protocol for open participation.
  • Researching the technologies that will define Autonomys five years from now.
  • And preparing the network for permissionless operators and Domains with Game of Domains.

Our ongoing post-quantum cryptography (PQC) research continues in parallel with these roadmap tracks to ensure long-term cryptographic resilience as the network evolves.

Press enter or click to view image in full size

2025 was the year the Autonomys Network transformed from a whitepaper into a fully functional network. In a space filled with hype and empty promises, that is no small accomplishment. This was only possible because our farmers, developers, and community members believed it was worth building and stuck around to see it through.

The hard part was never the technology, but getting people to use it. With the technical foundation in place, what matters now is adoption. For 2026, we are focused entirely on building traction, by bringing in projects that need what we built, and showing why it solves real problems. We are putting our resources behind this through our grants program, which will fund infrastructure development, AI-powered applications, and ecosystem integrations. That means targeted outreach to developers that require permanent, verifiable storage.

I’m thankful for all the hard work from our team, ambassadors, and everyone who has supported us over the years. Wishing you a happy holiday season, and a healthy and prosperous 2026.

— Todd Ruoff
[CEO, Autonomys]
[ X ] | [ LinkedIn ]

December 17, 2025

Autonomys x metaProof: Permanent On-Chain Storage for metaKnyts and The Qriptopian QriptoMedia Codexes

3
Min Read
BY
AUTONOMYS

Autonomys is pleased to announce a strategic partnership with metaProof to support permanent, decentralized storage for metaKnyts and The Qriptopian, metaProof’s QriptoMedia publishing initiative.

Through this integration, metaProof is leveraging Auto Drive, Autonomys’ gateway to on-chain permanent storage, to ensure that long-form media, codex artifacts, and evolving narrative layers remain verifiable, tamper-resistant, and accessible over time without reliance on off-chain pinning or custodial infrastructure.

This partnership reflects a shared belief that digital media, cultural artifacts, and knowledge systems benefit from infrastructure designed for longevity, not ephemerality.

Key Aspects of the Partnership

  • Auto Drive Integration: metaProof is integrating Auto Drive as the storage layer behind its expanding codex-based media. Auto Drive provides content-addressed, on-chain storage backed by Autonomys’ Distributed Storage Network (DSN), giving metaProof a developer-friendly interface with permanence and verifiability built in by default. This allows complex media structures to be stored and retrieved with the same guarantees as the underlying network itself.
  • Supporting QriptoMedia and iQubes: The integration supports metaProof’s Quantum Ready Internet Protocols (Qripto), including iQubes, which package content, data, tools, models, and agents into reusable and auditable primitives. By anchoring these components to permanent storage, metaProof ensures that codex elements such as story layers, artifacts, and interactive media remain intact, referenceable, and composable over time.
  • Powering The Qriptopian and metaKnyts Codexes: Auto Drive underpins storage for both The Qriptopian, metaProof’s crypto-agentic magazine, and the metaKnyts Codexes, enabling living publications that can expand, remix, and evolve without sacrificing integrity or provenance. Readers can explore canon, characters, lore, assets, and releases within a unified, magazine-native experience, supported by storage designed for long-term accessibility.

Highlighted Use Cases

metaKnyts
A crypto-comic universe spanning unreleased digital still comics and new motion comic episodes, evolving into a broader transmedia franchise supported by codex-driven discovery.

netaKnyts 21 Sats QriptoGraphic Novel
A 400+ page limited-edition collectible narrative intertwining the metaKnyts universe with the disappearance of Satoshi Nakamoto, enhanced by deeper story artifacts, unlockable experiences, and community participation rewards.

Launch Details

metaProof has confirmed that the metaKnyts Codex and The Qriptopian Codex will launch on December 21, 2025, initially privately to its community of three and a half thousand netaKnyts Reg CF investors, alongside the release of the metaKnyts 21 Sats QriptoGraphic Novel.

The release introduces a storytelling model that pairs a core narrative with a live codex layer, allowing readers to both consume the story and interact with its expanding world in a single, continuous experience.

Autonomys is proud to support this release with infrastructure purpose-built for permanence, verifiability, and long-lived digital media.

About metaProof

metaProof builds Qripto protocols and products that merge knowledge, content, and storytelling with identity, value, and agentic systems — anchored by iQubes and QriptoMedia — to enable durable, composable digital experiences across entertainment and beyond.

X | LinkedIn | Discord | Telegram

About Autonomys

The Autonomys Network — the foundation layer for AI3.0 — is a hyper-scalable decentralized AI (deAI) infrastructure stack encompassing high-throughput permanent distributed storage, data availability and access, and modular execution. Our deAI ecosystem provides all the essential components to build and deploy secure super dApps (AI-powered dApps) and on-chain agents, equipping them with advanced AI capabilities for dynamic and autonomous functionality.

December 17, 2025

When Quantum Comes Knocking

3
Min Read
BY
AUTONOMYS

What is the big deal?

Quantum computers cannot break blockchains today. However, the risk has already begun because attackers do not need a fully capable quantum machine right now to create serious problems in the future. All they need to do is collect blockchain data today and store it.

On many networks, public keys are revealed either as soon as an address is created (in account-based models) or when funds are spent (in UTXO models). Once quantum computers become powerful enough, attackers can use those stored public keys to derive the corresponding private keys for vulnerable schemes and then forge signatures or seize control of old addresses.

This long-term strategy is often called “harvest now, decrypt later,” but “harvest now, derive later” is more accurate in the context of blockchains [1]. The harvesting happens today. The deriving happens years or decades from now. Because blockchain history is publicly replicated across many nodes and archival infrastructure preserves past states indefinitely, anything exposed now will remain visible once quantum computers reach the required capability. This is not a hypothetical concern reserved for the distant future. As a16z crypto observes:

“Post-quantum encryption demands immediate deployment despite its costs: Harvest-Now-Decrypt-Later (HNDL) attacks are already underway, as sensitive data encrypted today will remain valuable when quantum computers do arrive, even if that’s decades from now.” [6]

Why the cryptography used by blockchains today will not survive the quantum era

Most blockchains depend on classical public-key cryptography such as ECDSA, EdDSA, and RSA. These systems are believed to be secure today because no efficient classical algorithms are known for solving the underlying mathematical problems at the key sizes used in practice. For example:

  • ECDSA and EdDSA rely on the hardness of the elliptic-curve discrete logarithm problem
  • RSA relies on the difficulty of factoring large integers

Quantum computers operate differently. They use quantum states and interference to run certain algorithms much more efficiently than classical machines. The most important in this context is Shor’s algorithm, which provides a polynomial-time method for solving both factoring and discrete logarithm problems on a sufficiently large and stable quantum computer [2].

If such a machine becomes available, the implication is clear: for cryptosystems based on factoring and discrete logarithms, a quantum-capable adversary could compute private keys from public keys. Any public key that has ever appeared on chain becomes a permanent point of potential weakness, because it can be harvested and attacked later if assets or trust still depend on it.

By contrast, symmetric primitives such as block ciphers and hash functions are affected only moderately by known quantum attacks like Grover’s algorithm [3]. These typically require doubling key sizes to maintain comparable security. The critical break occurs at the public-key signature layer, which blockchains use for ownership and transaction authorization.

A simple and accurate explanation of Shor’s algorithm

Shor’s algorithm matters because it changes the cost of breaking the mathematical problems that secure classical public-key cryptography.

For classical computers, the best known algorithms for factoring and discrete logarithms still require super-polynomial time at cryptographic sizes. That makes attacks infeasible in practice and is the main reason current public-key schemes are considered secure today.

A quantum computer can approach these problems differently. It encodes the problem into quantum states that represent many possibilities at once. Shor’s algorithm uses interference patterns among those states to extract the hidden periodic structure behind the problem. Once that structure is known, the remaining steps to factor a number or compute a discrete logarithm become efficient.

In practical terms, a sufficiently powerful quantum computer running Shor’s algorithm could recover private keys from public keys for vulnerable signature schemes. The limitation today is not the algorithm, but the absence of quantum hardware with the scale and stability required to apply it to real-world key sizes.

What “harvest now, derive later” looks like in practice

A useful way to understand this threat is through an analogy that reflects how public-key cryptography works.

Imagine an attacker making a complete copy of an encrypted hard drive. Today, the encryption is strong, and the attacker cannot break it. The copy appears harmless.

But the attacker stores it anyway.

Years later, new technology becomes available that can break that encryption quickly. The attacker no longer needs the original device. The old copy becomes enough to unlock everything that was stored inside.

This mirrors the quantum threat to blockchain. From an attacker’s perspective, public keys and signatures recorded on-chain play a similar role to strongly encrypted data: they are safe today only because inverting the underlying math is computationally infeasible. An adversary can save this data now and wait until a quantum computer can break the assumptions behind ECDSA, EdDSA, or RSA.

At that point, previously collected public keys can be turned into the private keys needed to forge signatures or control old addresses. If valuable assets or trust relationships are still tied to those keys, the damage can be immediate and irreversible.

Why blockchains must prepare before quantum computers mature

Preparing for quantum risk is not about panic, but about timing. As a16z crypto puts it:

“The real challenge in navigating a successful migration to post-quantum cryptography is matching urgency to actual threats.” [6]

Upgrading a decentralized network is intentionally slow. Users need time to migrate keys. Protocols must be redesigned. New signature schemes must be vetted for both security and real-world performance. None of this can occur instantly at the moment quantum hardware becomes capable.

If a public key has already appeared on-chain, that exposure cannot be erased from history. Waiting until quantum computers reach practical capability is too late because the vulnerability arises the moment public keys and signatures are recorded under quantum-vulnerable schemes, not when the first large-scale quantum machine goes online.

A responsible blockchain begins preparing early by:

  • Integrating quantum-resistant signature schemes, such as the lattice-based and hash-based constructions being standardized by NIST.
    NIST’s 2024 draft guidance (NIST IR 8547) outlines a formal migration roadmap, identifies which classical algorithms are quantum-vulnerable, and specifies approved post-quantum replacements [4]. The draft sets a final deadline of 2035 for fully disallowing vulnerable algorithms across federal systems. External analyses, including the Global Risk Institute’s Quantum Threat Timeline Report, warn that the threat could materialize earlier than expected and that progress may be hidden from full view, which further supports accelerating migration timelines for systems with long-lived data [5].
  • Reducing unnecessary public-key exposure in protocol design, for example, by using key-hiding address formats
  • Designing protocols with cryptographic agility, so that primitives can be replaced or upgraded in response to evolving standards and threats
  • Treating quantum readiness as an ongoing requirement rather than a one-time upgrade

These measures help ensure that by the time quantum computers operate at relevant scales, at whatever point that arrives, there is little of value left tied to keys that can be broken by Shor’s algorithm.

The future rewards early action

Quantum hardware continues to progress. It is not strong enough today to break classical signature schemes at realistic key sizes, but the theoretical tools already exist, and many experts consider large-scale quantum machines a matter of “when,” not “if.”

Because blockchain data is public and long-lived, the decisions made today determine whether that data remains trustworthy in a quantum future.

Long-term data requires long-term cryptography. Networks that begin preparing now, by reducing exposure to quantum-vulnerable keys and adopting quantum-resistant primitives, will be far better positioned to remain secure, reliable, and resilient once quantum computing matures.

Autonomys is committed to this path, continuing to harden its cryptographic foundations and evolve toward quantum-resistant security as part of its long-term network design.

Resources

[1] Subspace Network, “Harvest Now, Derive Later: The Most Underestimated Threat in Blockchain,” 2024.
Available at: https://medium.com/subspace-network/harvest-now-derive-later-the-most-underestimated-threat-in-blockchain-ccad4166e973

[2] P. Shor, “Algorithms for Quantum Computation: Discrete Logarithms and Factoring,” 1994.
Available at: https://arxiv.org/abs/quant-ph/9508027

[3] L. K. Grover, “A Fast Quantum Mechanical Algorithm for Database Search,” 1996.
Available at: https://arxiv.org/abs/quant-ph/9605043

[4] National Institute of Standards and Technology, “NIST IR 8547: Transition to Post-Quantum Cryptography Standards,” Draft, 2024.
Available at: https://csrc.nist.gov/pubs/ir/8547/ipd

[5] Global Risk Institute, “Quantum Threat Timeline Report 2023,” 2023.
Available at: https://www.globalriskinstitute.org/publications/quantum-threat-timeline-report-2023/

[6] a16z Crypto, “Quantum computing and blockchains: Matching urgency to actual threats,” 2025.
Available at: https://a16zcrypto.com/posts/article/quantum-computing-misconceptions-realities-blockchains-planning-migrations/

November 27, 2025

Autonomys Engineering Roadmap — Designing for the Long Term

3
Min Read
BY
AUTONOMYS

Introduction

The Autonomys Network has reached a new stage of maturity. With the foundations of mainnet secure and domains active, attention now turns to evolution — scaling the protocol, expanding its capabilities, and preparing for a fully permissionless ecosystem.

This technical roadmap outlines the next phase of that work: the application interfaces that make the network accessible, the protocol improvements that make it resilient, and the research that ensures it endures.

This roadmap is indicative, not absolute. Priorities may shift as the network evolves, usage grows, and new opportunities emerge from the ecosystem itself.

TL;DR

The Autonomys roadmap focuses on three parallel layers of progress — Application, Protocol, and Research — that together drive the network toward a fully permissionless and scalable architecture.

Application Layer:

  • Pay with AI3 enables token holders to purchase storage directly, marking the first step toward financialized storage.
  • Auto Portal evolves as a lightweight, modular interface hub with improved staking scalability and dedicated XDM and WAI3 interfaces.
  • Auto SDK introduces MCP servers for agent interoperability, allowing AI frameworks to interact natively with network functions.

Protocol Evolution:

  • Adds chain monitoring for real-time observability and offline operator handling to ensure domain liveness.
  • Improves farming stability, introduces an XDM EVM precompile for seamless cross-domain transactions, and provides engineering support for Game of Domains.
  • Prepares for permissionless operators and domain instantiation, gets ready for third-party runtime development and data domain scalability.

Research:

  • Advancing Fast XDM to drastically reduce cross-domain confirmation times.
  • Exploring post-quantum and information-theoretic security to safeguard the network’s cryptography.
  • Designing data domain and scalability specifications to extend the protocol’s performance ceiling.

These developments enable the network to move toward a self-sustaining, permissionless, and community-driven architecture.

Application Layer

Auto Drive — Pay with AI3

“Pay with AI3” has been a consistently requested feature from both the community and partners we have been speaking to. It will allow token holders to purchase storage directly on the network using AI3, simplifying access for builders and users alike.

Beyond convenience, this marks the first step toward the financialization of storage — where network capacity can be programmatically accessed, monetized, and composed into higher-level products and services.

By enabling direct settlement in AI3, we’re laying the groundwork for new use cases that connect decentralized infrastructure to real economic activity. We are excited to see what can be built.

Auto Portal — Evolving the Interface Layer

Autonomys is designed for modularity — and lessons learned from our testnet initiatives reinforce the value of separation of concerns. The Auto Portal will continue to evolve as a lightweight interface hub, distinct from explorers and other dApps, focused purely on core network functionality.

Explorers: Now managed through Subscan and Blockscout, providing clear, specialized visibility into both consensus and Auto EVM layers.

Staking Interface: Live and functional, supporting operator/nominator delegation. Usability and scalability improvements are ongoing, especially to handle high-volume operator participation during initiatives like Game of Domains.

  • We are actively collecting feedback to inform refinements.

AI3 Conversion Interfaces: Currently, executing Cross-Domain Messaging (XDM) transactions requires using the Substrate Portal. A dedicated interface will make this process simpler and more intuitive.

  • See our XDM Guide for technical context.
  • In addition, we plan to have an interface to simplify wrapping and unwrapping AI3 to and from its ERC-20 counterpart.

Auto SDK — Model Context Protocol (MCP) Servers

The Auto SDK will introduce dedicated MCP (Model Context Protocol) servers for staking and XDM, enabling integration with agents and AI frameworks via industry-standard interfaces.

  • This allows intelligent agents to query network state, stake, or even execute XDM transactions on behalf of users.
  • The MCP standard, championed by Anthropic, is rapidly becoming a common language for interoperable AI agents.
  • As we progress toward AI-native infrastructure, Autonomys aims to be a decentralized network that agents can natively interact with. We see a future where users can instruct their agent of choice to stake or XDM on their behalf.

Third-Party Domain Support

One of the most powerful properties of the Subspace Protocol is the ability to support custom runtimes for domains. We plan to provide the tooling, infrastructure, and documentation necessary to make third-party runtime development frictionless.

While demand will shape prioritization, the long-term goal is to enable any developer to build domain types suited to their specific use cases, all while leveraging the shared consensus of the farmer network.


This work dovetails with our ongoing exploration of Data Domain implementations — specialized runtimes that target throughput bottlenecks and push the limits of scalability across storage and execution.

Protocol Evolution

Chain Monitoring

The introduction of chain monitoring brings real-time visibility into the network’s performance and security events. This tool enables automated alerts and observability for events such as:

  • Reorganizations or abnormal block times
  • Large fund movements and specific wallet activity
  • Consensus performance anomalies

You can explore the early implementation in our repository.
The system is now being tested — we welcome contributions, feedback, and feature requests from the community.

Handling Offline Operators

Operators play a critical role in executing transactions and maintaining domain liveness. However, inactive or unresponsive operators can degrade performance, particularly when heavily staked.

The upcoming “Handle Offline Operators” feature adds logic to automatically detect, mitigate, and remove operators who are no longer participating correctly.

This improvement is a prerequisite for permissionless operators, ensuring domains remain stable and reliable once registration is open to all.

Farming Improvements

Several smaller issues affecting the farming client are scheduled for resolution in this cycle. None are critical but improving stability and reliability remains a core engineering goal.

Updates will be reflected in both the core client and Space Acres, ensuring a synchronized upgrade path for farmers.

XDM EVM Precompile

Each domain on Autonomys includes a Substrate layer beneath its execution environment. The new XDM EVM precompile introduces a direct method for cross-domain interactions from within Auto EVM.

Instead of calling consensus functions manually, developers will be able to interact with a precompiled smart contract that handles the Substrate transporter.transfer() function on the EVM layer.

This unlocks native XDM from EVM-compatible tools like MetaMask and ethers.js — making cross-domain interactions faster and more accessible while preserving Substrate’s underlying guarantees.

Support for Game of Domains

Now that Mainnet Phase-2 has been delivered we want to get back to the continuation of our domain and staking testing initiative. Engineering resources will continue to support Game of Domains as both a proving ground and a stress-test environment.

Focused Trials of Innovation will target particular facets of the network that our engineers are interested in giving a solid workout.

During the event, the team will monitor operator behavior, network performance, and bug reports — surfacing and resolving issues before mainnet deployment. This ensures future updates are validated under real-world conditions.

Permissionless Operators and Domain Instantiation

After Game of Domains concludes and any relevant fixes are implemented, the network will move toward permissionless participation.

  • Permissionless Operators: Anyone meeting minimum criteria can register and operate domains.
  • Permissionless Domain Instantiation: Once security assumptions are validated, it will be possible to launch new domains without governance intervention.

This transition marks a major step in progressive decentralization — shifting decision-making and ownership from managed governance toward open participation.

Governance Evolution

Autonomys, steered by the Switzerland-based Subspace Foundation, is entering a phase of progressive decentralization, where key decisions and upgrades will transition from managed oversight to on-chain, community-led mechanisms.

In early mainnet, governance remains partially centralized to safeguard network stability. Over time, these controls will give way to on-chain proposals, voting, and delegation frameworks tied to network participation.

Engineering work is required to design and build the core governance primitives that enable this shift — transparent proposal systems, verifiable decision records, and reputation-based delegation.

The end goal is a self-governing protocol — where upgrades, domains, and ecosystem initiatives are directed transparently by the community itself.

Implementation of Fast XDM, Data Domain, and Protocol Scalability

As the research for Fast XDM, Data Domain design, and the Protocol Scalability Specification mature, engineering work will focus on translating these outputs into production-ready implementations. This includes preparing prototype environments, defining specification-level changes, and sequencing the upgrades required across runtimes, clients, and tooling.

Implementation will begin only once the underlying designs are validated, ensuring each upgrade aligns with the security, performance, and architectural principles established during the research phase.

These efforts lay the groundwork for the next generation of Autonomys performance — faster cross-domain messaging, higher throughput capabilities, and a dedicated domain model optimized for large-scale data operations.

Research

Fast XDM

Cross-domain messaging is central to Autonomys’ modular architecture. Current confirmation times range from 10 minutes (Consensus → Domain) to roughly 1 day (Domain → Domain/Consensus).

The Fast XDM initiative aims to reduce these times to 10–20 minutes without sacrificing security.

This work builds on the fair exchange problem model, which requires either synchronous conditions (implying long confirmation time) or a trusted third party. The proposal suggests using the L1 beacon chain and operator economic security as the trust anchor — a novel design that combines efficiency with strong guarantees.

Research continues with an emphasis on formal verification and minimizing auditing costs, guided by principles of simplicity and robustness.

Post-Quantum Security

Quantum computing represents an eventual but existential risk to cryptography. Recent NIST guidance has accelerated the industry-wide shift toward post-quantum cryptographic (PQC) algorithms.

We are currently in an investigatory phase, exploring both PQC and information-theoretic (IT) signatures. IT-based approaches, while less common, offer strong security against quantum adversaries with lower overhead — potentially aligning with Autonomys’ performance needs.

This research is early-stage but crucial. The goal is to prepare a migration pathway for when PQC standards mature and to future-proof the network against emerging threats to key cryptographic primitives.

Data Domain Design

A data domain is a specialized runtime optimized for data throughput, providing a dedicated environment to handle large-scale storage and bandwidth demands.

Design work focuses on ensuring cryptographic integrity while maximizing performance.

Initial specifications are being refined and can be found here. These specs will be fed into the implementation process along with ongoing research support to ensure alignment with long-term project goals.

Protocol Scalability Specification

Scalability is not just about speed — it’s about sustainable flexibility. The upcoming scalability specification defines how the protocol can evolve to support high-volume workloads and dynamic execution across domains.

Unlike PoS (which is permissioned or “less” permissionless), the Subspace Protocol’s PoAS is fully permissionless — though there are hidden networking challenges for almost any scalability design.

This research involves complex trade-offs in data availability, transaction throughput, and validation efficiency. The outcome will form the blueprint for next-generation scaling within the Autonomys network stack.

Conclusion

This roadmap reflects the next phase of engineering progress — deliberate, methodical work that transforms a live network into a truly autonomous one. Each improvement, from Pay with AI3 to Fast XDM and post-quantum research, strengthens the foundation on which open participation will stand.

As Autonomys evolves, so too does its responsibility: to remain transparent, adaptable, and ready for the challenges ahead.

Autonomys isn’t built in isolation; it’s built through collaboration. Developers, operators, and researchers who want to contribute can follow progress on our forum, participate in Game of Domains, or apply for ecosystem grants.

The journey continues, as we scale toward a truly autonomous and enduring network.

November 20, 2025

October 2025 | Community Report

3
Min Read
BY
AUTONOMYS

October marked a month of steady, deliberate progress as Autonomys deepened its focus on post-quantum preparedness and long-term network resilience. The Engineering team delivered key infrastructure upgrades, improved observability, and strengthened developer tooling across the network, while Research advanced both internal post-quantum analysis and external academic contributions. Ecosystem efforts centered on high-conviction partner discovery rather than volume, emphasizing integrations where permanent, verifiable data meaningfully improves protocol integrity. Marketing and Community initiatives reinforced this strategic direction through updated educational materials, refined brand positioning, and improvements to user-facing resources. Together, these actions reflect a disciplined approach: building quietly, strengthening fundamentals, and positioning Autonomys for the demands of an increasingly complex cryptographic landscape.

Press enter or click to view image in full size
Press enter or click to view image in full size
Press enter or click to view image in full size

The Subspace Foundation continued strengthening the AI3 ecosystem by advancing mission-critical initiatives that reinforce Autonomys’ long-term resilience. In October, the team executed on core infrastructure for our post-quantum implementation, keeping the network ahead of an industry only beginning to grapple with quantum risk. In parallel, we refined how we communicate Autonomys’ competitive advantage, clarifying why our architecture is superior in a crowded market. Operational discipline also remained a priority, with ongoing improvements to internal processes and cost containment. Together, these efforts support sustainability in a challenging environment and further solidify Autonomys’ foundation for future growth.

Engineering focused on improving network robustness and enhancing the overall developer experience across Autonomys’ core tooling. Offline operator detection was deployed on the Chronos testnet, strengthening reliability across operator performance monitoring, while the rollout of Auto Drive Pay with AI3 introduced new payment functionality within the storage interface. The team also delivered improved XDM support in the Auto SDK and deployed a more comprehensive chain monitoring system to increase visibility across Domains. Research efforts continued progressing our post-quantum cryptography work, with team insights reflected in the recently published survey paper, “Navigating the quantum computing threat landscape for blockchains: A comprehensive survey” in Science Direct. Together, these initiatives keep Autonomys aligned with emerging standards and positioned for future upgrades.

Press enter or click to view image in full size

The Ecosystem team continued advancing strategic partner discovery and technical scoping with projects that can leverage Auto Drive’s permanent, verifiable, on-chain data storage to strengthen transparency and integrity across decentralized networks. Rather than prioritizing volume, efforts remained focused on opportunities where permanent data is mission-critical and integration paths are clearly defined. In parallel, Autonomys has been mapping potential collaborations with projects and chains pursuing post-quantum resilience, with an emphasis on credible standards and long-term alignment. Together, these initiatives are shaping a high-conviction pipeline of potential integrations that can compound the value of Autonomys’ infrastructure over time.

Press enter or click to view image in full size

[ Explore Ecosystem ]

Press enter or click to view image in full size

Marketing and Community efforts throughout October emphasized clarity, education, and a focused refinement of Autonomys’ brand as the network moves deeper into post-quantum research. The team began a light refresh of the visual identity to reflect the post-launch phase, anchored by long-form articles examining centralized storage fragility and, in particular, the “Harvest Now, Derive Later” threat vector, which framed Autonomys’ stance on quantum-era risk as proactive rather than reactive. Redesigned educational assets were prepared for social channels, and key website content and links were updated to improve navigation and surface core resources. On the community side, we deployed the ERC-20 compliant wrapped AI3 (wAI3) contract, updated the faucet on the Chronos testnet, and released a Chronos developer ecosystem update. EternalMint Pro was upgraded for mainnet to distribute Auto Drive backed Dawn of Autonomy NFTs, and new documentation was published to help node runners sync Taurus quickly from a snapshot if they would like to validate Crossing the Narrow Sea results. Together, these efforts strengthened ecosystem understanding and kept the community aligned with Autonomys’ evolving technical priorities.

Press enter or click to view image in full size

Autonomys is entering a phase not defined by rapid announcements, but by deliberate preparation. We have always believed that readiness is built ahead of time, not in response to crisis. As the rest of the industry begins to acknowledge quantum-era realities, we’re already planning for them. With AI accelerating quantum progress, strengthening our foundation now is essential to staying secure, credible, and ready for what comes next. Over the past six months, we’ve also streamlined the organization, reduced complexity, focused our resources, and strengthened our operations so we can move with intention rather than urgency. The pace is measured. Our direction is clear. And we’re heading exactly where we need to be.

— Todd Ruoff
[CEO, Autonomys]
[ X ] | [ LinkedIn ]

November 11, 2025

Harvest Now, Derive Later: The Most Underestimated Threat in Blockchain

3
Min Read
BY
AUTONOMYS

The quiet threat beneath immutable ledgers
Blockchain is designed for permanence. Transactions, once confirmed, are recorded on a ledger intended to endure. That permanence is the source of trust, but it also creates a structural liability. What cannot be changed cannot be retroactively protected. As quantum computing advances, the cryptography that supports this permanence is approaching a point where the assumptions that secure today’s public-key cryptography could fail. The risk is not abstract. It is a timing problem. Anything recorded on-chain under today’s signature schemes may remain exposed to signature-forgery risk if those schemes become vulnerable faster than networks can migrate.

What “Harvest Now, Decrypt Later” means and how it maps to blockchains
The timing risk has a classical analogue. In traditional security, Harvest Now, Decrypt Later (HNDL) means adversaries capture encrypted data today and decrypt it in the future when stronger computation becomes available. Public blockchains are different because transaction data is not encrypted. Instead, they rely on digital signatures to anchor ownership and authorization. The analogous risk is harvest now, derive later. According to Navigating the Quantum Computing Threat, “by utilizing Shor’s algorithm, an adversary equipped with a sufficiently powerful quantum computer can derive the ECDSA secret key Ks solely from the public-key Kp” (Feng et al., p. 28). The authors add that this “poses a significant security risk to blockchain systems” because an attacker could “successfully forge the identity of any wallet, validate themselves on the blockchain, and potentially initiate the transfer of assets from the breached wallet” (Feng et al., p. 28). In practice, adversaries can record on-chain activity and any public keys that are revealed or can be recovered from signatures today, then attempt exploitation later if quantum computers can derive private keys from those public keys.

Press enter or click to view image in full size

Migration is necessary and difficult
Addressing the risk requires two coordinated tracks. Even once a quantum-resistant replacement is chosen, migration is not simple. The paper cautions that “the process of directly replacing ECDSA with another compatible digital signature algorithm that is secure against quantum attacks, presents several challenges. The migration process itself is complex and time-consuming, raising concerns about compatibility and potential issues during the transition” (Feng et al., p. 28). In addition to protocol-level signature migration, the paper considers wallet-level mitigations. Many production wallets rely on BIP39, and while quantum attacks could target keys derived from public keys, “the security of the BIP39 Seeds or recovery phrases held by current users remains intact due to the quantum-resistant properties of hashing. If we are able to design an alternative post-quantum algorithm that leverages the Seed to accommodate inactive users and preserve the address mapping, it could partially mitigate the impact of migration” (Feng et al., pp. 28–29). These approaches are complementary: protocol changes protect future signatures, while BIP39-based tooling can help migrate existing users safely.

Time as an attack vector for authenticity, not secrecy
The core risk for blockchains is not decrypting private data. It is an authenticity failure. If quantum computers eventually enable private-key derivation from public-key material, signature validity collapses for affected accounts, and any resulting forgeries would be visible but not reversible on an immutable ledger. The National Institute of Standards and Technology (NIST) has issued post-quantum standards for digital signatures and key establishment to guide migration planning. In parallel, the Autonomys Research Team emphasizes efficiency, since “larger signature sizes contribute to increased network bandwidth and higher costs associated with the consensus algorithm,” and without care, validation can become “slow and impractical” (Feng et al., p. 30).

Press enter or click to view image in full size

Conclusion: preparedness over promises
Cryptography will change. Resilient networks plan for change. Industry pathways under consideration include adopting NIST-selected post-quantum signature schemes and phasing key rotation. In parallel, the Autonomys Research Team is evaluating those options and exploring its own migrations, including preserving address mapping from BIP39 seeds to support safe user migration. Our focus is methodical readiness: establishing performance baselines, building migration tooling, and defining key rotation procedures so that, when standards and tooling stabilize, transition becomes execution rather than crisis.

About Autonomys

The Autonomys Network — the foundation layer for AI3.0 — is a hyper-scalable decentralized AI (deAI) infrastructure stack encompassing high-throughput permanent distributed storage, data availability and access, and modular execution. Our deAI ecosystem provides all the essential components to build and deploy secure super dApps (AI-powered dApps) and on-chain agents, equipping them with advanced AI capabilities for dynamic and autonomous functionality.

X | LinkedIn | Discord | Telegram | Blog | Docs | GitHub | Forum | YouTube

Sources

No items found, please try something else.