Roadmap
N1’s roadmap increases decentralization step by step: we start with Proton—the
live network where a curated operator runs high-performance apps while
validators police withdrawals—and then broaden the set of participants who
provide security and liveness without sacrificing low-latency UX. Each phase
keeps apps live while expanding who can verify and challenge the system.
-
v0 — Proton launch
Status: Live. Proton is the stack described in the internal technical
reference: applications are operated by an operator who streams deposits
from Solana, builds actions into blocks, and commits those
blocks to the Bridge contract. Each block includes the action hash, state
commitments, effects (withdrawals), and the app version, so operators can upgrade
without pausing execution. In the meantime, validators can halt withdrawals if they
detect any inconsistency, issues, or malicious behavior, forcing the operator to
submit a correct state update before funds can move. -
v0.5 — Jito-secured shared security
Status: In progress. Proton plugs into Jito’s NCN restaking system so
Operators, Vaults, and NCNs opt into shared security, with slashable stake
guarding state transitions. This phase also unlocks permissionless data
availability verification, challenges, and richer app-to-app messaging without
fragmenting performance. NCNs define the proof/attestation logic for a service,
Vaults custody restaked SPL tokens and mint Vault Receipt Tokens (VRTs), and
Operators run the workloads. All three must mutually opt in before stake is
activated, creating a flexible handshake for allocating security. Validators
begin assuming data availability and block certification responsibilities from
Jito, while restaking economics remain anchored to Solana. -
v1 — Native validator network
Status: Planned. N1’s validator set takes over the full settlement stack:
data availability, block certification, reward routing, bridging, and staking
all live on-chain, while apps keep their own dedicated execution environments.
Validators provide horizontally scalable bandwidth and optional security
modules (SNARK validity, consensus, TEEs), completing the end-state described
in the litepaper. Restaked validators now replace the NCN/Vault handshake, so
any validator can participate in securing apps, and upgrades to the execution
layer can be rolled out without depending on external chains.
At every stage we preserve the dedicated-compute model that gives N1 its
speed, so developers never have to trade UX for decentralization. Instead, each
phase lowers trust in the operator while keeping the performance ceiling high.