Documentation + Policy Refresh • April 10, 2026 Atho Network LIVE

The Platinum Standard of the Quantum Age.

Atho combines post-quantum signatures, deterministic economics, and Platinum Shield private transaction routes so public UTXO and private-note flows can operate together on one Layer 1.

Compressed Falcon-512 BPoW Bonding + Staking Platinum Shield Privacy Layer 781,250 ATHO Bootstrap 400,000,000 ATHO Base Path 500,000,000 ATHO Hard Cap

Why Atho Stands Out

  • Post-Quantum by Design Falcon-512 pathways and binary pinning are integrated from the start, not added later under pressure.
  • Economics You Can Audit From the 781,250 ATHO bootstrap budget to the bounded supply corridor (400M base path, 500M hard cap, 21M floor), reward flows are deterministic, transparent, and built for public verification.
  • Dual-Layer Key Protection AES-256-GCM with password and Kyber recovery paths balances daily usability with long-term custody depth.
  • Built for Operators Runtime guardrails, clear node lifecycle controls, and structured logs reduce guesswork during incidents.
Market Position

Atho closes a structural gap: long-lived monetary systems still tied to classical assumptions. With deterministic tooling and post-quantum readiness, risk becomes explicit, bounded, and actionable.

Core Technology

Security assumptions, economics, and operations designed to stay coherent for decades.

Falcon-512 signatures, SHA3-384 hashing, LMDB-backed state, and deterministic policy controls give builders a chain they can reason about and verify.

Security Architecture

  • AES Key Protection Wallet material is designed for encrypted at-rest storage to reduce local key-exposure risk.
  • Kyber Compatibility Post-quantum compatible hardening paths are integrated into the Atho key-management stack.
  • Mnemonic Recovery Recovery flows keep wallet portability practical without weakening local custody assumptions.
  • SHA3 Hashing Stack SHA3-384 secures core paths (TXIDs, HPKs, signing payloads) with a 48-byte digest and strong post-quantum margin; SHA3-256 supports layered address checksum defense.

Operator Reliability

  • Node-Side Signing Private keys stay local to node process boundaries and are not transmitted through browser clients.
  • Crash-Aware Send Path Transaction flow is engineered to reduce half-complete states across restarts and interruptions.
  • CLI + GUI + Explorer Parity The same core operations are available for power users and low-power hardware environments.
  • API Auth Boundaries Node API access is gated by password-backed authentication, scoped sessions, and local-first control points to reduce abuse surface during operations.

Atho — Private. Secure. The Platinum Standard of the Quantum Age.

Platinum Shield extends Atho Layer 1 so public UTXO and private-note transactions coexist under the same consensus timeline. Public -> private, private -> private, and private -> public routes are first-class transaction paths with deterministic validation boundaries.

Public UTXO + Private Notes Nullifier Anti-Double-Spend Bundle + X-Address Binding Encrypted Note Payloads Fail-Closed Validation

Platinum Shield on Layer 1

  • One chain, dual value domains Public UTXO accounting remains canonical while private commitments and nullifiers enforce private-value state transitions.
  • Deterministic wallet orchestration Wallet nodes assemble private send bundles, deterministic note material, and policy-checked witness context before relay.
  • Consensus-safe propagation Mempool and block validation reject malformed private payloads, duplicate nullifiers, and binding mismatches.
Animated Send Flows

How value moves between public UTXOs and private notes.

These are first-class transaction routes: wallet assembly, mempool checks, block validation, and deterministic state reconciliation.

Public -> Private

Spend public UTXOs and mint private commitments.

Private -> Private

Consume nullifiers and emit fresh private notes.

Private -> Public

Exit private value back to public outputs.

Monetary Design

Atho follows a bounded model: 400,000,000 ATHO pre-tail base (399,218,750 subsidy + 781,250 bootstrap at block 1), 500,000,000 ATHO hard maximum supply, and a protected 21,000,000 ATHO floor for burn clipping. Tail mode begins at block 17,000,000 (about 64.69 years) at 0.1953125 ATHO per block (51,328.125 ATHO/year), but subsidy is clipped by cap headroom and becomes 0 once emitted supply reaches 500,000,000 ATHO. Fee routing remains deterministic by phase and continues after subsidy clips because fees do not mint new supply. Under current constants, post-tail neutrality is around 24.802% sustained utilization. See Inflation/Deflation for full assumptions and method.

  • 120s Block Cadence Fast-enough settlement with stable production rhythm.
  • Deterministic Fee Pool Split Pre-tail routes 40% to pool (20% miner-side + 20% stake-side), while post-tail routes 55% (25% miner-side + 30% stake-side).
  • Miner-Side Phase Split Miner pool share is 0% winner + 20% bonded-idle pre-tail, then 20% winner + 5% bonded-idle post-tail.
  • BPoW + Wallet Staking Roles Mining requires an active 25 ATHO bond while wallet staking accrues rewards as a separate participation role.

Public Transparency

Atho documents protocol behavior, emissions assumptions, and operator workflows so builders and communities can verify how the system evolves.

Built to survive the next security era, not the next hype cycle.

Atho combines post-quantum-ready cryptography, deterministic economics, and operator-first workflows so teams can integrate with explicit risk boundaries and predictable policy behavior.

Falcon-512 + SHA3-384 core UTXO deterministic validation BPoW miner bonding + wallet staking Runtime guardrails fail closed Node-side signing only

High-Impact Highlights

  • Post-Quantum Ready from Genesis Falcon-512 pathways and binary integrity controls are integrated early to avoid emergency migration risk later.
  • Auditable Monetary Policy Rewards, fee burn, and supply floor behavior are deterministic and independently verifiable by operators and integrators.
  • Practical Throughput + Clear Limits 120-second blocks, 3,500,000 vB capacity, and compact tx sizing deliver a realistic sustained ~44-52 TPS band with ~57 TPS peak simple-flow capacity.
  • Operator-Grade Runtime Controls Structured logs, lifecycle controls, and fail-closed guardrails support stable operations under stress.