Documentation Protocol specification v2.1

CPUNK Protocol Whitepaper v2.1

The CPUNK whitepaper describes a post-quantum identity and messaging layer built on Cellframe CF20. It covers DNA identities, DNA-Messenger, Proof of Humanity, tokenomics and decentralized governance.

Post-quantum identity · DNA-Messenger Includes: Architecture, security, tokenomics, governance
Overview

From community token to protocol layer

The whitepaper explains how CPUNK has evolved into a post-quantum infrastructure layer for decentralized identity and private communication on Cellframe CF20.

Core Components

Identity & messaging

DNA provides human-readable identities, while DNA-Messenger routes encrypted messages directly between those identities using a DHT-based P2P network.

Security Quantum-safe

Post-quantum cryptography

The protocol relies on NIST-selected algorithms (ML-KEM / ML-DSA families), SHA-3 hashing and modern symmetric encryption for long-term confidentiality.

Economics Governance

Tokenomics & CIPs

CPUNK is used for DNA registration, delegation, protocol fees and governance. Community proposals (CIPs) steer upgrades and treasury allocations.

Document structure

How the whitepaper is organized

Readers can skim high-level concepts or dive into specific subsystems. The main chapters are structured around eight core areas.

1. System Architecture
Layers and components of the CPUNK ecosystem across CF20, P2P networking and the cryptographic stack.
2. DNA Identity Protocol
How human-readable DNA names bind to public keys, wallets, messenger endpoints and optional metadata.
3. DNA-Messenger
P2P design, peer discovery, offline delivery and post-quantum message protection between DNA identities.
4. Proof of Humanity
Human-versus-bot differentiation using behavior, web-of-trust, reputation and optional attestations – without centralized KYC.
5. Quantum-Safe Security
Threat model, algorithm choices and design principles for resisting both classical and future quantum adversaries.
6. Protocol Tokenomics
Economic roles of CPUNK: fees, delegation, incentives, spam prevention and long-term sustainability.
7. Decentralized Governance
CIPs, voting, delegation of voting power and how protocol parameters and treasury decisions are made.
8. Development Roadmap
Phased rollout from core identity and messaging to advanced features such as Proof of Humanity and post-quantum voice/video.
Core model

Security, incentives and governance

The whitepaper ties together the cryptographic model, the economic layer and decision-making so the protocol can evolve without central ownership.

Quantum-safe security model

Designed under a zero-trust assumption, with pervasive monitoring and long-term adversaries in mind.

  • Post-quantum key exchange and signatures for identity binding and sessions.
  • End-to-end encryption for all messenger traffic, independent of transport.
  • SHA-3 family hashing for commitments, integrity and resistant identifiers.
  • Protection against replay, tampering and “store-now-decrypt-later” attacks.

Tokenomics & governance

CPUNK coordinates incentives for validators, infrastructure operators and contributors without VC unlocks or a central company.

  • DNA registration and renewals settled in CPUNK.
  • Delegation to validators and bootstrap nodes.
  • CIP-based governance with optional vote delegation.
  • Treasury allocations for development and infrastructure.

The whitepaper also explains legacy v1.0 tokenomics and how they map into the v2.x protocol-centric model.

Availability

Downloads, formats & translations

Once the v2.1 specification is frozen, the whitepaper will be published in several formats so both technical and non-technical readers can access it easily.

Format Documents

Planned formats

The canonical reference will be a PDF release, with an HTML version on cpunk.io and a Markdown source for developers and integrators.

Languages Localization

Translations

The English original will be followed by community-driven translations into additional languages once v2.1 is finalized and stable.

Status v2.1

Publication status

Draft content is in active use for implementation work. Final download links will be added here after the official v2.1 document set is published.

From reading to building

The whitepaper gives you the theory. The next step is to try the protocol in practice – register a DNA, explore DNA-Messenger and see how post-quantum identity fits your own use cases.

Start by registering your DNA identity, joining the conversation, and picking a small part of the ecosystem you’d like to improve or build on.