Proposal: Onion-Routed Mesh for Alt Data Network
Implementing Tor Onion Services as the Native Transport for a Censorship-Resistant, Surveillance-Proof Peer-to-Peer Web
You want a web that cannot be surveilled, subjected to KYC regulations, censored, or shut down. Distributed dApps, uncensorable social networks, unstoppable marketplaces, purely peer-to-peer, E2EE calls and messages, and encrypted email delivery.
A network where applications and services operate without corporate servers, where email is transmitted without a central mail exchanger, and where no one can compile a list of who is talking to whom or spy on private messages.
The web is currently under construction, and the ANNE datachain nodes serve as its mature backbone. Its Alt Data Network protocol proposes a gradual replacement of traditional HTTP backends with a cooperative mesh of personal servers.
Developers create applications by defining typed payloads, while users operate lightweight nodes called annodes on their own hardware. Requests and responses travel through the mesh over encrypted channels, using adaptive routing that learns and optimizes. Users simply install an annode which is no more difficult than installing any other desktop application, and opt into the specific alt data types they want their annode to help support. All web applications run locally when an annode is running.
One critical piece of the puzzle is not yet supported. Every annode currently communicates over a clearnet IP address. Even with end-to-end encrypted payloads and per-request signatures, carrying traffic over clearnet IP addresses leaves the network vulnerable to surveillance that maps operator social graphs, active interference by ISPs and state firewalls that can blackhole nodes, and physical coercion of anyone whose IP address can be linked to a dissident application. VPNs merely substitute one trusted central point of failure for another. With an ADN on TOR, an optional VPN, and additional in-anne-network routing, we can achieve the level of network anonymity needed in the coming age.
This campaign asks for your support to help upgrade the process via the integration of Tor onion services as the primary transport layer for the Alt Data Network protocol.
The application layer must be both decentralized, distributed and, networking must be private. If any of these is not true, the project or business is at risk.
One can use a super private coin but if they do so via clearnet app that ties their IP to site activity, to invoice # and to payment received, they can be outed.
Every alt data application can become reachable via a self‑authenticating onion address, automatically provisioned at startup and cryptographically bound to its permanent Neuron ID. No IP addresses will appear in route tables, handshakes, or hypergraph entries. The peer‑to‑peer application stack will become not just logically decentralised and opt-in distributed, but physically anonymous at the network layer.
Tor Onion Services as the Transport for the Alt Data Network
The Alt Data Network protocol in tandem with Antor file transfer protocol moves application specific payloads (blobs, texts, media, and custom data types) between consenting nodes. It does not carry the datachain’s consensus traffic, block propagation, or hypergraph queries. That separation allows a clean design: the Alt Data Network can work even when a node is behind, out of sync, or entirely (by design) not processing blocks and only serving a role in ADNS services, ANTOR services, or in ADN services.
Every annode will ship with an isolated Tor daemon bundled inside the application, exactly as the Tor Browser does. When the node starts, the daemon launches automatically, provisions a hidden service, and binds an .onion address to the Alt Data listener. The onion address is generated from a persistent keypair derived from the node’s Neuron ID, so it remains verifiable by every other peer. With NID identity you can calculate onion, and with onion you can calculate NID.
All Alt Data Network traffic (requests, responses, whitelist hints, return‑path route lists, and adaptive‑forwarding updates) can then flow exclusively through Tor circuits. The flood‑routing logic remains identical, only now the next‑hop entries in a route list are onion addresses instead of IPs. Peering, caching, and performance tracking continue to operate on the new identifiers without algorithmic changes. Circuit isolation per data type prevents cross‑application correlation.
The rest of the node (consensus messages, chain synchronisation, and hypergraph queries) continues to use the fastest available transport. The annode can operate in “all TOR” mode where where only TOR connections are used, or it can operate in hybrid mode where it speaks to some clearnet peers and then has some processes it uses for Tor traffic. The Alt Data Network is network‑anonymous by design, turning every opt‑in subnetwork into a surveillance‑proof mesh that reveals no IP addresses, requires no DNS or certificate configuration, and demands nothing from the operator beyond a standard annode install and opt-in configuration for desired apps.
Technical Scope and Implementation Plan
The work delivers a series of upgrades to the annode codebase, broken into four tightly scoped modules. The estimated effort is estimated at 6 months, with contingency for community beta testing.
Tor Daemon Integration
Bundle a pre‑compiled Tor binary inside the annode distribution, exactly as Tor Browser does. A lightweight Java lifecycle manager starts the daemon on launch, authenticates via the control port, and retrieves the established .onion address. The daemon runs isolated, requires no user configuration, and provisions a hidden service bound to the Alt Data listener automatically. Advanced options (bridges, pluggable transports) are exposed in the properties file but are not required for operation.
Onion‑Address Abstraction and NID Binding
Generate the onion keypair deterministically from the node’s permanent Neuron ID so the onion address is stable and cryptographically verifiable. Replace all internal peer addressing with onion layer abstraction, keeping local‑loop compatibility. The peer handshake and route‑tracking buffer are adapted to carry onion addresses exclusively; intermediate hops never see an IP.
Alt Data Network Adaptation
Re‑point the flood‑routing engine to establish connections through the Tor SOCKS proxy. Route lists, performance counters, and route‑learning caches index by onion address without algorithmic change. Each data type namespace opens a separate Tor circuit, preventing cross‑application traffic analysis.
Full PHP Application Support via PHP‑FPM Integration
The current Java servlet implements standard CGI, which spawns a new process per request, carries no persistent session state, and cannot support the process‑pooling or opcode caching that frameworks like WordPress, Laravel, and full vanilla PHP apps require. This limits the Alt Data Network to stateless scripts or javascript and prevents the vast ecosystem of existing PHP applications from running as decentralized services.
We will add a PHP‑FPM (FastCGI Process Manager) bridge to the annode. The servlet will communicate with a local, pre‑configured PHP‑FPM pool over FastCGI, forwarding Alt Data requests that match a PHP‑typed payload. PHP‑FPM maintains a pool of persistent worker processes, handles session management natively, and supports opcode caching. The integration requires no modification to the PHP application code; a WordPress or Laravel instance installed on the node becomes an Alt Data provider simply by associating its entry point script with the appropriate type identifier in the node's provider list.
The PHP‑FPM binary is up to the user and OS to choose but they can connect to it with the annode config. Alternatively, PHP-CGI is supported as well for lighter use cases depending on the operator’s needs. Configuration is driven entirely through the annode properties file, mapping application types to PHP pools and document roots. This unlocks millions of existing PHP applications for migration onto the anonymous Alt Data mesh, transforming them from centralized services into sovereign, opt‑in locally distributed applications that inherit Tor’s network anonymity automatically.
Testing, Hardening, and Documentation
A multi‑node integration test harness simulates adversarial relays and inspects traffic to confirm no Alt Data clearnet leaks. A configuration guide covers threat models and bridge usage. API documentation is published for developers.
As benchmarks are hit, new versions of the annode will be released. If PHP-FPM was released first, it would allow users to start configuring and testing their sites (using the php app localhost or opening it up to be accessed by IP). If Tor integration came first, with deterministic generation of onion-from-nid, it would be released.
The Cypherpunk Imperative
Governments worldwide are accelerating network surveillance and control. Deep packet inspection, protocol‑level blocking, VPN oversight and pressures and mandatory identity verification for server operators are looming into standards. In parallel, privacy‑enhancing technologies face increasing legal pressure. This adversarial environment demands a web stack that is not merely hard to censor, but difficult by design to map at the network layer. Privacy should be the default.
ANNE’s design already offers to replace centralised servers with sovereign nodes. Neurons, encryption and private communications are one aspect, but the networking layer that reveals IP and physicality is an important part of hardening the process. By implementing onion transport for the Alt Data Network now, we eliminate that real-world traceable link. The result is a peer‑to‑peer application fabric that leaves no network‑level footprints: no IP logs, no traffic analysis signals, no permanent addressing that can be blocked or associated with a physical location. That runs localhost. A user of an annode is essentially their own server and they can access a suite of application without leaving their localhost. They can gain the advantages of “client / server” on clearnet yet both sender and receiver on ANNE use Tor and/or the ADN via a normie browser.
The default use case should be private by design. Any user can make as many NIDs as they choose, they can take on as many identities. These are not “real world” identities. They are cryptographic key pairs.
This is a necessary hardening that aligns directly with the original cypherpunk commitment to privacy as the foundation of a free society. A network invisible at the routing layer is the only sustainable substrate for permissionless innovation.
Funding and Rewards: A Pledge‑Based Swap Model
Our campaign runs on a pledge‑based swap mechanism. All contributors receive ANNE Coin (the ecosystem’s native utility token) through the ANNE Development Fund shortly after their pledge is received and validated. Your early support translates directly into a better swap ratio than what the public will later receive.
Reward tiers
(Pledge value - ANNE Coin Reward - Additional Bonus)
- < 0.1 XMR - 100% swap value - N/A
- ≥ 0.1 XMR < 1.0 XMR - 100% swap value + 20% - Early access to AMail on your annode
- ≥ 1.0 XMR < 10.0 XRM - 100% swap value + 50% - Early access to AMail on your annode + social media mention
- ≥ 10.0 XMR - 100% swap value + 100% - Early access to AMail access + permanent mention on the anne.network website which is data pulled from the hypergraph
AMail early access: AMail is the encrypted, serverless email alternative that is delivered via distributed network of annode relays. It is not intended to “replace” email, it is intended for allow annode operators not to be forced to use centralized email in order to “receive” emails. The priority will be in using BASED messaging which is E2E encrypted. AMail handles secure routing and delivery of “external” email to the intended address, which is tied to an Neuron Idenitty. Contributors gain priority access.
You receive a setup guide and allocation that lets you send and receive relay-encrypted emails messages from the outside world. Any message sent from ANNE user to ANNE user will be E2E encrypted and not need to use traditional email services at all.
The rundown of the process:
- Send Monero through Kuno and in your wallet find your Monero Transaction ID and Transaction Key
- Head to https://www.anne.network:9116/aon.html and generate new ANNE account. Take a good note of your SEED, and NID, create the account, access ANNE ID page, and also take a note of your PUBLIC KEY.
- Submit comment underneath this campaing, using your Monero transaction ID and Transaction Key. In the Private message to creator field, add your NID and PUBLIC KEY, and custom alias (if you want early amail access). For example, NID: 5642232384324243220 – PUB: dc71616912f28094ca6f23aa14191d6dd3477c1bd50c20912483a559335c100b – NICK: myamailnick – and optionally your best contact eg. [email protected]
- Soon after the comment and message is submitted, you’ll receive your ANNE coins and optional rewards as soon as they become available.
Thereby, you are acquiring a direct economic stake in ANNE’s native token at a favorable rate while gaining early entry into a private communication stack built on the very infrastructure you help complete.
If the network succeeds and token utility grows, your holding might appreciate well beyond the original donation. If your motivation is purely ideological, your Monero goes directly into auditable code that hardens the mesh for everyone.
About ANNE
ANNE is a hybrid peer-to-peer data system made of semantic transforms and a cash system allowing for a queryable local-server at Layer One removing the need for third-party data intermediaries, comprising the following set of protocols:
- 1Schema – a semantic triplet data model for immutable, verifiable knowledge.
- Neuromorphic hypergraph – an in‑memory query structure built from 1Schema relons for global service discovery.
- Alt Data Network – the application‑specific request‑response mesh that replaces backend servers and runs over Tor once this campaign succeeds.
- ANTOR – a swarming file transfer protocol for efficient large‑file distribution.
- PoST consensus – a proof‑of‑space‑time mechanism that secures the datachain.
Find out more about ANNE at official website https://anne.network and community website https://anne.media
If you’d like to get feel of the ecosystem, best to get your own annode up and running with ANNE Wizard: https://anne.media/anne-wizard-anne-installation-suite
Final word
Decentralised infrastructure without anonymous transport is an illusion. The Alt Data Network can already subsume countless centralised backends, but only when nodes connect through untraceable onion addresses can the ecosystem be called truly unstoppable. Think truly distributed dApps, uncensorable social networks, unstoppable marketplaces, purely peer-to-peer, E2EE calls and messages, and encrypted email delivery.
The Tor‑hardened Alt Data Network enables Monero‑native applications to run entirely on sovereign nodes, backed by the same values that made Monero the standard for private transactions. What we create here serves as infrastructure for every Monero developer seeking a backend that reveals nothing.
We ask for your support to implement the Tor onion integration, add PHP‑FPM application support, and distribute the release to every annode operator. By contributing Monero, you receive a direct economic stake in ANNE’s future and early access to AMail, a private email stack that trusts no central provider.
Thank you for your support.
Reach out to us on X...
...or join ANNE Forum at https://annetalk.org to discuss all things ANNE and beyond.
Campaign managed by ANNE Network and endorsed by ANNE Media
Contact: https://x.com/ANNE_p2p
Published: 2026-05-10
Supporters
No donations yet
Support
Send any amount of Monero to:
423Phpf8XWs39zJn5M51GVRJ58i4qQ3m8a7mrwBRviukQbAKW2YJ1vG7USCD9cUvS2efAA1NEm9m4bpzXsBsUoR1DXfkQK4
Open in wallet✓ You donate directly to the recipient’s wallet
✓ No middlemen or fees
✓ Donations are synced every 5 minutes
Share
Copy the link to share this kuno with friends or social media:

Write a comment