GitHub Devnet Live

Common
questions.

Straight answers about what URUZ is, how it works, and where it is going. No hype, no deflection.

The basics

No. URUZ is a Layer 1 DAG protocol with its own finality, security, and cryptographic architecture. There is no token sale, no presale, and no airdrop. The current phase is a private devnet.

If you are here looking for a token to trade, this is not the right place. If you are here because you want to understand how a DAG-based L1 with post-quantum cryptography actually works, keep reading.

URUZ uses work-weighted finality. Finality is derived from objective on-chain graph signals, not from a fixed validator committee.

No one appoints validators. Participation is protocol-native, and influence is phased as the network matures and security gates are satisfied.

The Uruz DAG is the name for the URUZ network's directed acyclic graph structure. Unlike a blockchain — where transactions are serialized into a linear chain — a DAG allows every node to emit transactions simultaneously, referencing multiple existing vertices as parents. This enables parallel processing without coordination.

Finality in the Uruz DAG is not determined by block producers or validators. It emerges from work accumulation: as more transactions reference a given transaction's descendants, its score grows until it satisfies the finality conditions.

SGI is URUZ's Sybil-resistance layer. It derives influence from long-term, verifiable graph behavior rather than token stake or privileged identity.

Reputation is constrained by staged activation and governance safeguards before full consensus influence is enabled.

Post-quantum cryptography

Every blockchain in production today uses ECDSA or BLS signatures. Both are broken by Shor's algorithm on a sufficiently powerful quantum computer. Most engineering roadmaps place cryptographic relevance in the early-to-mid 2030s — which sounds distant, but migrating a decentralized global protocol takes many years of coordination across clients, wallets, exchanges, and users.

Chains that are not post-quantum face a hard migration burden. URUZ uses ML-DSA (FIPS 204 / Dilithium) from genesis, which materially reduces retrofit risk across core trust anchors.

URUZ uses ML-DSA (Module-Lattice Digital Signature Algorithm), standardised as FIPS 204 by NIST in August 2024. ML-DSA is built on the hardness of the Module Learning With Errors (MLWE) problem — believed to be resistant to both classical and quantum attacks.

In the protocol, ML-DSA protects canonical trust anchors and long-term history integrity under post-quantum assumptions from launch.

No cryptographic scheme is proven secure in an absolute sense — security is always relative to computational assumptions and the best known attacks. ML-DSA's security is based on the hardness of MLWE, which has been studied intensively for over a decade and survived the NIST evaluation process intact.

The honest answer: post-quantum schemes are newer and less battle-tested than ECDSA. ECDSA has 30+ years of cryptanalysis behind it. ML-DSA has significantly less. This is why URUZ treats cryptographic agility as a design property — the protocol can upgrade its signature primitive without a network-wide hard fork if a weakness is found.

Status and roadmap

URUZ is running a private multi-node devnet with continuous monitoring and staged security validation.

The network is functional and continuously monitored, but remains private while security controls complete phased validation before public testnet.

The roadmap targets guarded testnet and guarded mainnet phases before full mainnet. These are target windows, not commitments. Phase progression depends on formal security and readiness gates.

Security is not on a deadline. If gates are not met, the timeline extends. Current public gates include readiness uptime, reconciliation mismatch rate, incident count, and shadow-phase parity/drift checks.

Yes, eventually. URUZ will have a native token for transaction fees and node incentives. The distribution model has not been announced and will not be announced until guarded readiness gates are satisfied. There is no presale, no allocation list, and no whitelist.

Anyone who claims otherwise is not affiliated with the project.

Not yet. The current devnet is private. A node operator program will open with the guarded testnet — at that point, external participants will be able to join, run nodes, and participate in the network under testnet conditions.

Follow @uruznetwork or watch this site for the testnet announcement.

Security

Through Structural Graph Identity (SGI): participation quality, consistency, and graph behavior are combined with slow, phased influence ramp-up to make Sybil influence costly over time.

Additional structural and governance checks limit concentrated influence and coordinated behavior patterns.

The URUZ security model defines a structured threat taxonomy, detection signals, and automated response paths.

Controls are activated in phases, with shadow-mode validation before they affect consensus behavior.

Still have questions?

The Technology page covers the protocol mechanics in full detail.

Technology Why Post-Quantum