Skip to Content
News & ContentMove Packets, Don't Trust. Verify
Move Packets, Don't Trust. Verify

Move Packets, Don’t Trust. Verify

tl;dr — move packets, order events, verify everything

In 1977, Jon Postel wrote a memo that would shape how billions of people communicate.

“We are screwing up in our design of internet protocols by violating the principle of layering. Specifically we are trying to use TCP to do two things: serve as a host level end to end protocol, and to serve as an internet packaging and routing protocol. These two things should be provided in a layered and modular way.” [Postel, IEN #2, 1977]

TCP was doing two jobs simultaneously: end-to-end reliability and packet routing. This wasn’t just inelegant. It was architecturally fatal.

Reliability requires state. Sequence numbers, acknowledgment tracking, retransmission buffers. If that stateful protocol sits at the middle layer, every intermediate node has to maintain connection state. Routers become complex, memory-heavy, assumption-laden. The middle grows fat and too expensive for simple networks to participate in, too prescriptive for diverse applications to build on. Baking it into the universal layer forces everyone to accept overhead they didn’t ask for, or work around a layer that was supposed to help them.

The fix was to split the protocol. TCP handles reliability at the endpoints for applications that need it. IP does exactly one thing: move a datagram from source to destination. Stateless. Minimal. Intermediate nodes carry packets without knowing anything about the connections they’re forwarding for.

This produced the Internet’s narrow waist.

With stateful complexity pushed to the edges, the middle layer became cheap enough that everything could speak it.

Saltzer, Reed, and Clark formalized the logic in 1984: correctness belongs at the endpoints, verified by the parties that need to know. The network core should carry, not judge. Simplicity at the center enables complexity at the edges, which is where it belongs.

The narrow waist didn’t emerge despite removing reliability from the middle. It emerged because of it.

The Internet this architecture produced was built at the frontier of technology available at the time.

Bitcoin arrived in a different moment.

Satoshi’s work produced something the Internet’s architects couldn’t have built in 1977: a trustless ordering primitive. Global consensus for canonical order, cryptographically enforced, with no central authority.

Bitcoin is also, deliberately, non-Turing complete. This is same design discipline Postel applied to IP. Do the irreducible thing. Do it so well that everything else can build on top.

Bitcoin is a settlement layer. An ordering primitive. The stateless middle of a stack that hasn’t been fully built yet.

What builds on top?

Most blockchains answer by collapsing ordering and execution into the same layer. That’s the same architectural mistake Postel identified in TCP. The middle gets fat, the complexity competes with the fundamental primitives, and the range of applications that can build on top narrows.

Execution-first blockchains introduced a verification problem at the architectural level. When execution happens in the network core, every contract can read and write every other contract’s storage. That is state explosion, where nothing can be verified in isolation. This design was explicitly chosen for composability, but composability without verifiability is not a feature. It’s a liability.

You cannot verify a slice of global state without verifying the whole. This is why bridges fail. Unverifiable global state cannot cross a protocol boundary without reintroducing the trust assumption it was supposed to eliminate.

You end up with a system that’s neither an excellent ordering layer nor a verifiable execution environment, because the two responsibilities are in tension.

A Cryptographic Hourglass Architecture

Bitcoin’s non-Turing completeness isn’t a limitation. It’s the invariant in action. Simple execution keeps verification cheap. Any node can independently recompute the state from the ordered transaction history with trivial cost. That is the design. Ordering is authoritative. Execution is local. Verification is cheaper than execution by architecture, not by accident. Zenon is the only other system that respects the essential constraints.

Separation of concerns:

The meta-DAG layer handles ordering: tamper-evident, sequentially hashed Momentums produced at regular intervals, leaderless, with no single node determining canonical sequence.

The block-lattice layer handles transactions: each account maintains a chain in the lattice for linear scaling parallelism, cross-referencing, and asynchronicity.

Verification-first. Execution happens at the network edge. Cryptographic proofs settle outcomes on the lightweight metaDAG. Edge clients verify before commitment, not after.

Verifiable composability by default. This is a formally standardized assumption for critical infrastructure.

Internet device native. Zenon is feeless — No gas tokens required. PoW-plasma provides anti-spam and weighted attestations. This opens the network to machines as first-class participants. Another feeless lane runs on an infinitely rechargeable PoS-plasma mechanism.

Zenon is substrate agnostic and async tolerant for constrained and intermittent devices.

Zenon checkpoints on Bitcoin. The most secure ordering primitive ever constructed becomes the anchor for the global-scale state transitions. Bitcoin provides proof-of-work backing that no other system can provide.

IP moves packets. Bitcoin orders events. Zenon verifies them.

Last updated on