L1
Money Layer · Bitcoin
Function: a value carrier whose meaning does not need to be re-translated by anyone in the future.
Trustless property: private key + public chain data is sufficient to exercise rights. No third party need stay online.
Why Bitcoin holds: PoW + fixed supply + self-referential semantics. The flywheel: mining demands energy → energy capacity expands → marginal mining rigs survive AI demand cycles via difficulty adjustment → BTC quietly becomes a counter-cyclical reservoir for the AI hardware lifecycle.
Subtle point: SHA-256 cannot be the kernel of an AI algorithm — avalanche effect and differentiability are mathematical duals. But at the capacity layer (fab, HBM, packaging, grid) BTC mining and AI inference share one supply curve. Isomorphism at the production-input level, not at the function level.
STATUS · Established
L2
Settlement Layer · Lightning & Successors
Function: real-time, low-fee, programmable settlement above the money layer. The interface between long-term value and short-term economic activity.
Trustless property: at channel close, on-chain enforcement; during operation, watchtower-assisted. Trust degrades gracefully.
2026 status: ~$1B+ monthly volume, ~17K nodes, ~41K channels, ~5,000 BTC capacity. Cash App, Strike, exchanges already use it as a hidden rail. Taproot Assets (mainnet) brings multi-asset routing.
Outlook: the real adoption curve is not human payments but machine payments — API metering, agent-to-agent settlement, micro-content. Humans tolerate little complexity; machines tolerate any.
STATUS · Operational, scaling unevenly
L3
Asset Layer · The Open Wound
Function: tokenized claims on AI-age scarcity — model shares, dataset rights, persistent agent participation. Service utility may decay; ownership of the claim must not.
The hard test: a key plus public chain data must suffice to exercise the right. No "Universe" must be required to remain online. By this rule:
- ✕ Taproot Assets / RGB — client-side validation outsources data availability.
- ✕ Liquid / RSK — federated trust.
- ✕ Optimistic schemes — challenger must keep existing.
- ~ Ordinals / Runes — pass the test, but pay in chain bloat.
- ~ zk-rollups — math handles validity, data availability is still unresolved.
Where the math is missing: witness encryption / iO are theoretically capable of "anyone who satisfies a relation can decrypt" — no online custodian. Engineering maturity: 10–20 years away.
Unsolved. Fat-chain and thin-chain are both compromises. Bitcoin's anti-attack design — "the attacker must be the victim" — has no equivalent on the asset layer.
STATUS · Unsolved
L4
Existence Layer · The Ducks in the USB Cable
Function: ensure that intelligence itself — model weights, inference capability — cannot be erased by any single actor.
Mechanism: diffusion. Capability density of small models is rising fast; NPUs are now standard in phones, cars, appliances, even USB controllers. Sufficient diffusion is itself trustlessness.
What gets protected: already-distributed weights, running on already-shipped hardware that has its own battery and grid connection. They are not intentionally protected — they are unintentionally undismissible. Mooreʼs law plus commercial competition is laying the redundancy substrate without anyone meaning to.
What is not yet protected: the training of new frontier intelligence — still concentrated in a few clusters. Existence-layer trustlessness today protects the past, not the future.
STATUS · Emergent, fragile at the training boundary