Skip to content

Pars PIPsImprovement Proposals

Governance and standardization framework for Pars Network

Pars Network

About Pars Network ​

Pars Network is the cryptography-based blockchain and networking stack for building local and wide-area networks with readily available hardware. Pars Network can continue to operate even in adverse conditions with very high latency and extremely low bandwidth.

Vision ​

The vision of Pars Network is to allow anyone to operate their own sovereign communication networks, and to make it cheap and easy to cover vast areas with a myriad of independent, interconnectable and autonomous networks. Pars Network is Unstoppable Networks for The People.

Pars Network is not one network. It is a tool for building thousands of networks. Networks without kill-switches, surveillance, censorship and control. Networks that can freely interoperate, associate and disassociate with each other. Pars Network is Networks for Human Beings.

Capabilities ​

From a users perspective, Pars Network allows the creation of applications that respect and empower the autonomy and sovereignty of communities and individuals. Pars Network provides secure digital communication that cannot be subjected to outside control, manipulation or censorship.

Pars Network enables the construction of both small and potentially planetary-scale networks, without any need for hierarchical or bureaucratic structures to control or manage them, while ensuring individuals and communities full sovereignty over their own network segments.

Notable Characteristics ​

PropertyDescription
No Source AddressesNo packets transmitted include information about the address, place, machine or person they originated from
No Central ControlAnyone can allocate as many addresses as they need, when they need them
Instant ReachabilityNewly generated addresses become globally reachable in seconds to minutes
Portable AddressesAddresses are self-sovereign and portableβ€”can be moved physically and continue to be reachable
Encryption by DefaultAll communication is secured with strong, modern encryption. Cannot be disabled
Forward SecrecyAll encryption keys are ephemeral. Communication offers forward secrecy by default
No Unencrypted LinksNot possible to establish unencrypted links or send unencrypted packets

Core Stack ​

  • Post-Quantum Cryptography: NIST ML-KEM + ML-DSA (FIPS 203/204) for all communications
  • AI-Native Blockchain: Native precompiles for ML verification, inference consensus, and model registries
  • Coercion-Resistant Identity: Duress passwords, anonymous recovery, and self-sovereign DIDs
  • Mesh Networking: DAG/CRDT sync, offline capability, sneakernet support, and mobile mesh

What are PIPs? ​

Pars Improvement Proposals (PIPs) are the primary mechanism for proposing new features, collecting community input, and documenting design decisions for Pars Network.

PIP Categories ​

RangeCategoryDescription
0xxxCoreNetwork architecture, consensus, protocols
1xxxMeshDAG, CRDT, offline sync, sneakernet
2xxxCryptoPost-quantum, encryption, key management
3xxxSecurityThreat model, coercion resistance, privacy
4xxxClientsMobile, desktop, embedded nodes
5xxxSessionsSession daemon, messaging, groups
6xxxBridgesCross-chain, teleport, interoperability
7xxxGovernanceDAOs, voting, treasury

PIP Lifecycle ​

Draft β†’ Review β†’ Voting β†’ Approved/Rejected β†’ Implemented
  1. Draft: Author creates PIP following template
  2. Review: Community discussion (minimum 7 days)
  3. Voting: vePARS holders vote on-chain
  4. Approved: Passes with >50% approval and quorum
  5. Implemented: Development and deployment

Core Principles ​

1. Post-Quantum Security is MANDATORY ​

PQ encryption is the default and cannot be disabled. Every message, every session, every key exchange uses post-quantum cryptography.

2. Coercion Resistance by Design ​

The network is designed for high-threat environments where:

  • Participants face state surveillance
  • Keys may be compromised under duress
  • Network access may be intermittent or blocked

3. Mesh-First Architecture ​

Every node is equal. Every user can be a node. The network survives:

  • Complete WiFi/internet blackouts
  • Physical network partitions
  • State-level blocking

4. Privacy Without Permission ​

No KYC. No registration. No metadata. Communications are private by design, not by policy.

Contributing ​

  1. Fork the pips repository
  2. Create PIPs/pip-XXXX-title.md following template
  3. Submit PR for review
  4. Engage with community feedback
  5. Once approved, proposal goes to on-chain vote

Released under the MIT License.