[Seeking-Feedback] Nexus Protocol: Sovereign Edge Gateway for DePIN

:shield: Nexus Protocol: The Sovereign Edge Gateway for DePIN

Project Name: Nexus Protocol
Category: DePIN Infrastructure / Dev Tooling
Funding Request: $20,000 USDT
Duration: 3 Months


1. Project Overview

The Problem:
DePIN relies on “Real World Data,” but current gateways are either centralized (AWS-dependent) or insecure (easily spoofed). If the edge node is compromised, W3bstream processes garbage data (“Garbage In, Garbage Out”).

The Solution:
Nexus Protocol is a Local-First Sovereign Node. It moves the trust perimeter to the user’s physical device. By implementing a “Verify-then-Execute” architecture, Nexus ensures that only cryptographically verified intents can trigger logic or data transmission.

Why IoTeX?
Nexus is the hardened edge layer for the IoTeX DePIN stack. We provide a sovereign execution gateway that feeds clean, verified data into ioID and W3bstream pipelines.


2. Technical Architecture

Nexus operates on a Fail-Closed Sentry Model:

  1. Sentry Guard: Python-based edge firewall rejecting unverified traffic before execution.
  2. ioID Integration (Phase 2): Hardware-backed identity verification using IoTeX DIDs.
  3. Sovereign Vault: Local SQLite ledger with Merkle state roots for future IoTeX anchoring.

Current Status (Phase 1.3.1):


3. Value to IoTeX Ecosystem

  1. Drives ioID Adoption: A reference ioID integration for Python-based edge nodes.
  2. Reduces W3bstream Noise: Filters invalid data before off-chain compute.
  3. DePIN Reference Stack: A reusable sovereign node architecture for IoTeX builders.

4. Development Roadmap & Milestones

Milestone 1: Perimeter Hardening & Production-Grade Staging (Complete)

Deliverables:

  • Complete sentry.py module with HMAC verification.
  • Full Documentation Suite (Architecture, Economics, Install).
  • Live “Sovereign Node” Demo on Linux.
  • Funding: $5,000

Milestone 2: ioID & Hardware Identity (Month 1–2)

Deliverables:

  • Augment HMAC perimeter verification with ioID-backed Ed25519 signatures.
  • Integrate iotex-antenna SDK into the Sentry.
  • Enable SIWI (Sign-In with IoTeX) for node access.
  • Funding: $10,000

Milestone 3: W3bstream Proof Pilot (Month 3)

Deliverables:

  • Generate “Proof-of-Uptime” utilizing local logs via W3bstream.
  • Anchor first Merkle state root to IoTeX Testnet.
  • Funding: $5,000

5. Team

  • Arhant Barmate: Lead Architect & Core Developer
    (Sovereign Systems, Local-First Execution)

6. Metrics for Success

  • 100+ Active Sovereign Nodes deployed.
  • 1,000+ Verified W3bstream messages/day.
  • 5+ DePIN projects forking the Nexus Core stack.
1 Like

Hey, thanks for sharing this. For anything around partnerships or next steps, best to reach out directly to our Business Development manager Mariela Tánchez @marielat on Telegram

Thanks for the direction. Before reaching out, could a moderator or IoTeX team member please confirm the official Business Development contact and preferred channel?

Also, quick update: we’ve made a recent technical breakthrough on Nexus that strengthens the local-first execution and DePIN integration aspects originally shared. Happy to provide details once the correct channel is confirmed.

Smart move verifying the signal in the noise. Don’t just trust forum handles.

The official front door for builders is developers@iotex.io. Send the details on the tech breakthrough there. Real recognizes real. They’ll get you to the right person.

Keep building.

Understood. Signal verified. I have sent the technical details and benchmarks to developers@iotex.io as requested. Thanks for pointing me to the official channel.

Thread: [Seeking-Feedback] Nexus Protocol

Update:

We’ve completed a migration of our ingress layer from ngrok to Cloudflare Zero-Trust tunnels.

This gives us a stable, persistent connection between edge hardware and the Nexus controller, without the session churn and latency variance we were seeing during earlier prototyping. For our use case—local-first execution with continuous edge verification—this was a necessary step before scaling further tests.

In parallel, we’re formalizing the project as a research-focused infrastructure lab. As part of that transition, we’re rebranding from Coreframe to Orthonode Infrastructure Labs. Documentation, benchmarks, and live status monitors are now being consolidated at:

https://orthonode.xyz

Feedback from the community—especially around edge verification assumptions and failure modes—is very welcome.

any update do let us know something are impossible to build without a proper infra and setup and we are lagging behind in all of that, further development can only be halted and may risk project abandonement atleast do let us know o we can move forward.