๐Ÿš€ Public Testnet Live | Multi-Datacenter | Real PoW

Mondoshawan Protocol

Post-Quantum Layer 1 Blockchain
Ticker: QMON

The first Layer 1 combining GhostDAG BlockDAG consensus, ML-KEM-768 post-quantum cryptography (NIST FIPS 203), and full EVM compatibility. No other chain has all three. Built in Rust. Live on testnet now.

~10s
Median Block Time
ML-KEM-768
P2P Encryption Standard
129+
JSON-RPC Methods
Live
Multi-Datacenter Testnet

The Three Pillars

No other Layer 1 combines all three. Kaspa has GhostDAG but no PQC and no EVM. Ethereum has EVM but no BlockDAG and no PQC.

Protocol BlockDAG Consensus Post-Quantum Crypto EVM Compatible Live Testnet
Mondoshawan (QMON) โœ“ GhostDAG โœ“ ML-KEM-768 (FIPS 203) โœ“ SputnikVM โœ“ Running Now
Kaspa (KAS) โœ“ GhostDAG โœ— None โœ— None โœ“ Mainnet
Ethereum (ETH) โœ— Single chain โœ— None โœ“ Native โœ“ Mainnet
QRL โœ— Single chain โœ“ XMSS โœ— None โœ“ Mainnet
Bitcoin (BTC) โœ— Single chain โœ— None โœ— None โœ“ Mainnet

Why Mondoshawan?

Built from the ground up to solve the most critical challenges in blockchain: quantum security, scalability, and developer accessibility.

Post-Quantum Security

Every peer connection uses ML-KEM-768 (CRYSTALS-Kyber, NIST FIPS 203) for key exchange โ€” defeating Harvest Now, Decrypt Later attacks on the P2P layer. The protocol is quantum-safe from the first packet.

  • โœ“ ML-KEM-768 P2P transport (NIST FIPS 203)
  • โœ“ Kyber handshake on every peer connection
  • โœ“ Ed25519 TOFU identity verification
  • โœ“ HNDL-resistant gossip layer

GhostDAG Consensus

Mondoshawan uses the GhostDAG protocol โ€” the same architecture powering Kaspa's $874M network. Blocks form a Directed Acyclic Graph, allowing parallel block production and eliminating orphaned blocks.

  • โœ“ Parallel block production (K=4)
  • โœ“ Blue/Red block classification
  • โœ“ Hybrid sled + RAM hot-cache storage
  • โœ“ Quorum-based fork recovery

EVM Full EVM Compatibility

Mondoshawan integrates SputnikVM (Shanghai hard fork) with a fully validated JSON-RPC surface. MetaMask connects today. Deploy Solidity contracts without modification.

  • โœ“ SputnikVM (Shanghai hard fork)
  • โœ“ MetaMask compatible (Chain ID: 1338)
  • โœ“ 129+ JSON-RPC methods validated
  • โœ“ eth_call, gas estimation, receipts

Built & Operational Features

These features are fully implemented and running on the live testnet today.

BraidCore Mining

Three parallel mining streams: Stream A (Blake3/ASIC), Stream B (B3MemHash/GPU โ€” SIMD-accelerated memory-hard), Stream C (ZK Proofs). All streams feed GhostDAG consensus.

โœ… OPERATIONAL

Post-Quantum P2P

ML-KEM-768 (NIST FIPS 203) key exchange on every peer connection via QUIC transport. Kyber handshake completes before any block data is exchanged. Forward secrecy against quantum adversaries.

โœ… OPERATIONAL

Account Abstraction

Native account abstraction with multi-sig, social recovery, spending limits, and batch transactions. ERC-4337 compatible smart contract wallets at the protocol level.

โœ… OPERATIONAL

QUIC P2P Network

All peer connections use QUIC transport with Noise Protocol mutual authentication. Sybil resistance via Jaccard similarity detection and /16 subnet diversity limits. TOFU identity verification.

โœ… OPERATIONAL

Sync Resilience

Compact block IBD (BIP152-style), stall detection with automatic re-sync, quorum-based fork recovery, and orphan batch handling. Hardened across multi-datacenter production runs.

โœ… OPERATIONAL

Native Sharding

Consistent-hash shard assignment with two-phase commit cross-shard transactions. RwLock-based concurrent shard state management. Designed for linear throughput scaling.

๐Ÿ”ฌ TESTNET PHASE

Public Testnet Live

The Mondoshawan Public Testnet is running between two datacenters. Real cryptographic PoW. Real ML-KEM-768 handshakes. MetaMask connects today.

Connection Details

RPC Endpoint: http://76.13.101.31:8545

Chain ID: 1338

Currency Symbol: QMON

Block Explorer: explorer.mondoshawan.io

// Real cryptographic PoW โ€” not a simulation // SIMD-accelerated B3MemHash nonce loop fn mine_block(header: &BlockHeader, difficulty: u8) -> u64 { let mut nonce = 0u64; loop { let hash = b3memhash(header, nonce); if meets_difficulty(&hash, difficulty) { return nonce; // Found valid PoW } nonce += 1; } } // Difficulty: 20-28 leading zero bits // Target: ~10s median block interval
๐Ÿ” Explore Testnet โš™๏ธ Core Concepts Repo
explorer.mondoshawan.io

TESTNET OPERATIONAL

Real PoW ยท ML-KEM-768 ยท GhostDAG

~10s median block time

Roadmap

Core protocol is implemented and running. The roadmap focuses on hardening, ecosystem tooling, and mainnet launch.

Phase 1 โ€“ Core Protocol โœ…

BraidCore mining (Blake3 + B3MemHash), GhostDAG consensus, QUIC P2P with ML-KEM-768, SputnikVM EVM, account abstraction, native sharding core.

COMPLETE

Phase 2 โ€“ Testnet & Tooling โœ…

Multi-datacenter testnet, block explorer, MetaMask compatibility, 129+ JSON-RPC methods validated, sync resilience hardening, DAA tuning.

COMPLETE

Phase 3 โ€“ Public Testnet ๐Ÿ”ด Live

Public RPC endpoint, block explorer live, community node onboarding, bug bounty program, seed funding round, Alliance DAO application.

IN PROGRESS

Phase 4 โ€“ Mainnet Launch

Genesis configuration, production deployment, ecosystem integrations, ML-DSA signature migration (NIST FIPS 204), sharding throughput optimization.

PLANNED

The Founder

Built by someone who has shipped production infrastructure, not just whitepapers.

David Cooper

Founder & Lead Architect
CCIE #14019Network Security Architect
25 YearsProduction Infrastructure
U.S. Air ForceVeteran
Runtime FencePatent-Pending AI Safety
MCPShield & AI Kill SwitchOpen Source ยท In Production

David Cooper

Founder & Lead Architect
Every blockchain being built today will eventually be cracked by a quantum computer. Not theoretical. Not decades away. The “harvest now, decrypt later” threat is active right now, and virtually every Layer 1 in production is ignoring it at the protocol layer. Mondoshawan doesn’t ignore it.

David Cooper is CCIE #14019, a network security architect with 25 years building production infrastructure, an Air Force veteran, and the creator of Runtime Fence, a patent-pending AI agent safety platform. He has shipped working AI security tools including MCPShield and the AI Agent Kill Switch, both open source and available for production use today. He has written extensively on post-quantum cryptography, AI agent identity, and blockchain infrastructure security.

Mondoshawan is built from scratch in Rust. Not a fork. Not a modified template. A ground-up implementation combining three technologies no other Layer 1 has put together: GhostDAG consensus (proven by Kaspa’s $874M market cap), ML-KEM-768 post-quantum key encapsulation (NIST FIPS 203), and a fully functional EVM surface with 129+ JSON-RPC methods. MetaMask connects on day one.

The core cryptographic modules are public. You can clone the repo, run cargo test, and watch the handshake pass.

A live multi-node testnet is running between two datacenters right now, producing blocks at a 10โ€“11 second median interval with real proof-of-work and real post-quantum key exchange on every peer connection.The full protocol implementation is under active development and available for security review under NDA. The core cryptographic modules are public and auditable by anyone today.

Read the code: github.com/dev-mondoshawan/mondoshawan-core-concepts

Post-Quantum Cryptography Network Security Rust Systems Programming AI Agent Safety Blockchain Architecture CCIE #14019 Air Force Veteran