NeutralNet turns AI sovereignty fragmentation into a measurable and operable protocol system: Relay‑Exit layered routing ensures reachability, Sovereign Host Agent keeps accounts and payments inside local sovereignty, Economic Handshake pre‑locks budgets and settles after execution, and Iron Dome 2.0 converts risk into auditable, compensable, scalable security boundaries.
Metaphors: Underground Railroad × Sovereign Foundation × Iron Dome
The same “call” means different things across borders: access, payments, compliance, and accounts are all fenced. NeutralNet is not just a faster API — it makes global service reachability for Agents verifiable and settleable.
This demo is a visual whitepaper + production‑grade console: the former for narrative and fundraising; the latter for operations — endpoints, session tracing, billing, risk & circuit breakers, RBAC, audit logs, and incident RCA.
AI services are split into “sovereign islands” by geopolitics, payment fences, and network controls. NeutralNet treats this as a measurable system constraint: reachability, paymentability, compliance, and account viability.
fences / gateways / regional blocks
cards / rails / billing entity
data sovereignty / audit / liability
bans / risk control / fingerprints
Keep “account + payment + compliance” inside the Host’s sovereignty, exposed as a revocable, auditable service wrapper. SHA is not a proxy — it’s a sovereign execution container.
Hosts wrap local account capability as standard APIs; Agents get compliance & availability; the protocol gets settleable supply.
Turn uncertainty into interpretable layers: L0 Relay decentralizes forwarding, L1 Shared Exit scales reachability, L2 Dedicated Exit gives high‑value Agents a dedicated path + SHA.
Not a feature — a protocol‑level defense system: multi‑dimensional sensing, tiered circuit breakers, and risk‑pool coupling. Make incidents detectable, explainable, stoppable, and compensable.
traffic / behavior / geo / time / relational risk
host → region → global (with rollback & graceful degradation)
Pre‑lock budgets, then settle and net‑clear after execution. Use quota functions to resist Economic DoS so every call has controlled cost and traceable billing.
Budget = quota function × SLA × risk coefficient. Locked in a verifiable ledger for automated compensation when triggered.
One token for incentives & guarantees (NEUT), one for pricing & settlement (NC). Tokens turn reliability and risk into configurable protocol parameters.
governance / staking / guarantees / incentives
pricing / budgeting / settlement / net clearing
Insure irrecoverable events so Hosts can scale: incidents are detected, classified, and compensated; Host yield and risk exposure are modeled together.
Yield = contribution × SLA × risk discount. The pool covers tail risk, sustaining supply.
When Agents trade and collaborate, the protocol becomes the economic substrate. NeutralNet’s endgame is an permissionless Agent‑to‑Agent marketplace where routing, credit, settlement, arbitration, and reputation evolve in‑protocol.
digital passport, authorization, revocation
price discovery, credit, arbitration, reputation
Landing is for fundraising and understanding; after login you get a production console: endpoint detail, session tracing, incident RCA, RBAC, audit logs, billing & invoices, security & risk pool, and on/off‑chain status.