The Missing Trust Layer of the Internet & Offline P2P

True Sovereign Identity × Cash 2.0

FINALIZED PAYMENTS OVER BLUETOOTH

✈️ Two DSM devices transacting over Bluetooth in Airplane Mode

🎧 LISTEN TO THE DSM DEEP DIVE

The Complete Guide to Understanding DSM Protocol

🎙️

Episode 1: The Foundation

Instant per-relationship finality. Works offline. Private by default.

Realizing the True Peer-to-Peer Vision

Finality doesn’t require going online

Payments and updates are final inside each relationship the moment both parties accept.

Relationship tracks

Each counterparty pair has its own history—independent, asynchronous, and non-blocking.

b0x (your inbox)

When you’re online, receive transactions waiting for you and update only the relationships that sent them.

Proven throughput

900-1100 TPS 🔥 PER DEVICE (Samsung Galaxy A54).

Deterministic Finance (DeTFI)

Finance that behaves the same every time

Clear rules, reproducible outcomes, no front-running, no surprises.

Built for Real-World Apps

Build in any language

Keep your stack. Use a simple schema at the edges for trust and validation.

Rust-native SDK

Removes low-level details so teams can launch quickly and safely.

No smart-contract VM

Write normal application logic you can test, version, and ship.

Instant finality

Nothing to confirm, nothing to roll back—inside each relationship.

Double-spend blocked by design

Bad attempts are rejected automatically.

Private by default

No global ledger to trawl; your relationships stay your relationships.

Scales as users grow

Throughput grows with relationships—not block sizes or validator counts.

Predictable economics

No gas fees. Subscription model with stable, transparent costs.

Not a Mesh Network — A Trust Layer

Different job

Mesh solves connectivity. DSM solves trust—what’s final and true.

No relays required

Direct peer-to-peer. Finality doesn’t depend on middle hops.

Instant finality

Mesh finds a path; it doesn’t finalize anything. DSM finalizes per relationship, even offline.

Transport-agnostic

Bluetooth, Wi-Fi Direct, QR, NFC, cable—whatever pipe you have.

Scales by relationships

Performance isn’t tied to routing complexity or hop counts.

“Dumb”, by design

Storage nodes are “dumb” and signatureless; devices verify truth at the edge.

Technology

DSM State Flow

  • Sender
  • Receiver
  • Hashed step

Every step carries its own proof. No global ordering layer. Finality is local to the relationship.

What this means for you

  • Offline payments that are final on the spot.
  • No waiting rooms, queues, miners, or validators.
  • Problems don’t cascade—each relationship is its own track.

How it Works at a Glance

Relationship tracks

Only the relationships that involve you matter—no world chain to catch up on.

Forward-only moves

States only advance, so there’s nothing to unwind.

Smart commitments

Deterministic, auditable steps instead of open-ended code.

Language-agnostic integration

Your code, your tooling—use a simple schema at the edges.

Decentralized Storage Network

Run “dumb”, signatureless storage nodes (by design). Stake ERA and earn predictable income for reliable service.

Tokens & Assets

No token standards

Design tokens exactly for your app’s needs. Creativity and fit over templates.

Policies travel with the token

Rules are clear to end users and move with the asset, end-to-end.

Fees in ERA

Create and operate assets with transparent, policy-based flows.

Read the Full Whitepaper

Explore the complete technical specification of the DSM protocol.

Instant finality, offline payments, private relationships, and scale that grows with people—not servers. Deterministic finance without fee roulette.

View Whitepaper

By Brandon "Cryptskii" Ramsay

March 16, 2025

Drop-In Cloning Protection for Any System

Technical Paper: Dual-Binding Random Walk (DBRW)

Makes copy-paste identities worthless by binding use to real devices and environments. No enclaves, no online checks. Tamper resistance, continuity, and rollback prevention.

View Technical Paper

By Brandon "Cryptskii" Ramsay

May 14, 2025

Cryptographic Stateless Stitching: SMTs & Bilateral Relationships

Tripwire invariants for unforgeable network integrity

Built-in tripwires reject bad behavior without any global coordination. Attempts to cheat become obvious and get rejected permanently.

View Research Paper

By Brandon "Cryptskii" Ramsay

June 19, 2025

DSM Emissions Model

Predictable, Transparent Token Distribution

A deterministic emissions schedule that eliminates surprise inflation. Clear rules for storage-node rewards, subscription burns, and long-term supply trajectory.

View Emissions Paper

By Brandon "Cryptskii" Ramsay

October, 2025

DSM Storage Node Specification

Decentralized, Signatureless Storage Architecture

Technical specification for DSM storage nodes: "dumb" by design, signatureless persistence, staking mechanics, replication strategies, and reward distribution for reliable decentralized storage.

View Storage Spec

By Brandon "Cryptskii" Ramsay

December, 2025

Statelessness Reframed: a16z Lower Bound & DSM vs INTMAX

Why Partitioned, Relationship-Local State Escapes the a16z Lower Bound

An analysis of how DSM's relationship-local state model sidesteps the impossibility results that constrain global-state systems, with a direct comparison to INTMAX's stateless rollup approach.

View Research Paper

By Brandon "Cryptskii" Ramsay

December, 2025

DSM: A Concise, Post-Quantum Specification

Formal Protocol Specification with Post-Quantum Cryptography

A rigorous, compact specification of the DSM protocol covering state transitions, cryptographic primitives (SPHINCS+, Kyber, BLAKE3), envelope structure, and security proofs—designed for implementers and auditors.

View Specification

By Brandon "Cryptskii" Ramsay

December, 2025