Secure and Simplify Your Business With Atsign, the #1 Networking 2.0 Technology
Learn about Networking 2.0 and how it is inherently secure, easier, and greener than Networking 1.0.

What is Networking 2.0?
Networking 2.0 is the networking of networks. One address can be used for both outbound and inbound digital communication, and it makes possible the universal joining of networks of all kinds. The key distinguishing characteristics for Networking 2.0 software, solutions, and products include (1) universal addressability, (2) inherent privacy and security, (3) contextual responses, (4) attestations for trust, (5) velocity, i.e. networking configurations are eliminated and networking and applications engineering are independent efforts, (6) peace of daily routine, i.e. the end of spam, and (7) control plane for event driven communication. These are described in Networking 2.0 Emergent Characteristics.
Networking 2.0 Emergent Characteristics
An excellent way to understand the Networking 2.0 framework is to compare it to Networking 1.0.
Networking 1.0
Networking 2.0
Addresses
- Networking 1.0 addresses are standalone, each person has many
- Identity is solved per-solution, e.g.:
- Phone Numbers
- Emails
- Social Media Handles
Addresses
- Networking 2.0 addresses can contain Networking 1.0 addresses
- Networking 2.0 address is your identity, e.g.:
- One address
NETWORKING 1.0
Privacy
- Designed to transport data with client server architecture. Privacy, security are afterthoughts.
- Mismatched data ownership and control.
- Only “trusted” via open standards.
NETWORKING 2.0
Privacy
- Owner cuts and owns the encryption keys. Only the holder of the keys can update information.
- Clear data ownership and control.
- Verifiably true trust through open source engineering.
NETWORKING 1.0
Context
To implement individually controlled contextual responses, effort is required.
Security is a major consideration in most implementations of Networking 1.0.
NETWORKING 2.0
Context
Individually controlled contextual responses built in by default.
Unless specifically authorized, you don’t get a response (secure by default).
NETWORKING 1.0
Attestations
Relinquishing highly confidential data and documents. (e.g. Passport information)
NETWORKING 2.0
Attestations
- Individually controlled contextual responses built in by default.
- Unless specifically authorized, you don’t get a response (secure by default).
NETWORKING 1.0
Velocity
Networking 1.0 requires expert level knowledge to navigate efficiently.
Network configurations are tedious.
NETWORKING 2.0
Velocity
Networking 2.0 simplifies networking for everyone.
Network configurations are not required.
NETWORKING 1.0
Peace
The current internet requires us to expose our information to the public.
This leads to many channels for spam to be received.
Blocking someone must be done by blocking every single one of their Networking 1.0 addresses.
NETWORKING 2.0
Peace
As a by-product of context, the amount of public information is significantly reduced.
This in turn reduces the number of channels which spam can be received.
If necessary, a Networking 2.0 address can be blocked outright.
NETWORKING 1.0
Control Plane
To ensure data is up to date, the predominant architecture requires polling of the information.
Optimization of Networking 1.0 solutions considers caching and cache invalidation.
NETWORKING 2.0
Control Plane
Networking 2.0 solutions use event-driven architecture to push updates rather than polling for them.
Networking 2.0 solutions automatically cache data and keep caches updated.
Networking 2.0 in Action: Easily Solving Big IoT Problems
The connected world of IoT deployment is upon us and innovators worldwide are already confronted with three major pain points:
- Problem One: Unprecedented levels of security and privacy breaches: Device security breaches and heightened levels of device surveillance impact companies and their customers.
- Problem Two: Growing difficulties in accessing devices: Challenges in installing, configuring, and troubleshooting remote devices are compounding the difficulties in remote device access, which should be a simple task. There is also a shortage of networking engineers.
- Problem Three: Time-consuming and environmental waste in IoT deployment: Increasing cybersecurity budgets, which includes excessive use of VPNs and firewalls, is working against the goals of a more sustainable planet. This is due to the increased electricity/grid consumption and excess materials and metals required.
These three problems must be addressed urgently, as they are predicted to grow at unprecedented levels. Some use cases in action today include: (1) Simple security in Smart Cities, (2) Hassle-free access in telecom and 5G, and (3) IoMT deployment in healthcare.
Smart Cities

- Autonomous, secure devices with zero attack surface
- Addressability / controlability with regardless of NAT
- Part of the insurance story
Telecom/5G

- No static IP pain
- Faster deployment than 5G (9-12mo. reduced to days )
- All digital, self-service offering
- New sources of revenue
Healthcare

- Patients in control of their data
- Dynamic access (ambulance)
- Reduced IT burden saves 9 months per deployment
- Cryptographic keys created and locked in SIM cards
Networking 2.0 Features and Benefits
Because Networking 2.0 is fully decentralized, places encryption keys at the edge, has no open ports, is massively scalable, and provides connectivity independence, at its broadest view it provides these key benefits:
- Inherent Security: Security and privacy of company, device, and customer data
- Hassle-Free Access: Increased efficiency of networking deployment and device administration; agency to deploy without network administrators
- Faster & Greener Deployment: Fewer devices, less electricity, and less time to deploy due to not requiring firewalls and VPNs
Due to the increased efficiency and cost-effectiveness of Networking 2.0, its inherent privacy and security, and independence between networking and applications engineers, many IoT businesses adopt Networking 2.0. Why?
When complementing Networking 1.0 with Networking 2.0, you get:
Inherent Security
- Trust, security, and privacy for data, devices, and the connectivity “pipe”
- No network attack surface or open networking ports
- Secure remote access from anywhere
- Secure delivery (no snooping)
Hassle-Free Access
- No static IPs
- No firewalls
- No VPNs
- Secure remote access from anywhere
Faster & Greener Deployment
- Regulatory compliance
- Deploy without VPNs and firewalls
- Fewer sensors and devices needed
- Less energy consumption needed
Networking 2.0 has evolved between 2019 and 2023, and is driving IoT transformation. Atsign, an enabler of Networking 2.0 products, offers open source SDKs to spur that innovation while easily solving IoT pain points.
How Is Atsign Technology Enabling Networking 2.0?
Founded in 2019, Atsign is one of the first Networking 2.0 companies. It developed open source software development kits and a protocol to enable innovators, entrepreneurs, and developers to easily build Networking 2.0 solutions and products. Developed products run on Atsign infrastructure.
The suite of Atsign components include:
Atsign Technology: Open Source Free SDKs for Building Products and Solutions: The building blocks for developers include atSDKs currently available in Flutter or Java, and the underlying atProtocol. Atsign technology enables IoT developers to build inherently secure solutions with no open networking ports, with free open source tech and the investment of engineering time.
- Complete end-to-end encrypted communication between any two endpoints through an open source protocol. The atProtocol runs on TCP/IP. It is a simple protocol for connecting and interacting with the Atsign Infrastructure – atDirectory and atServers.
- Open source software development kits for building products and solutions meeting all six characteristics of Networking 2.0.
Atsign Infrastructure: SaaS Based for Implementing Your Products Networking 2.0 addresses, called atSigns along with atServers are packaged in a simple SaaS model. atSigns and atServers communicate through the atDirectory operated by Atsign. There is also SaaS pricing for only addresses, if you desire to host the atServers on your own.
- A centralized directory service for Networking 2.0 addresses, the atDirectory allows for lookup of where atServers for atSigns are running. It is very similar to a DNS server.
- Addresses for people, entities and things, for example, @alice, @acmecorp, @frontdoorcamera, @gateway, etc.
atServers (Optional Hosting by Atsign):
- Micro-servers directly linked to atSign addresses, backing up primary data on devices.
Details on Atsign technology and infrastructure in the context of inherent security, hassle-free access, and faster and greener deployment are detailed in tables.
Atsign Products: No Ports Products for Independent and Enterprise Developers
A great example of Atsign’s Networking 2.0 technology, our products remove networking attack surfaces. Try SSH No Ports
Security Benefits
Security Features
Security Underlying Technology
Removes the surface for “middleman” surveillance
SECURITY FEATURES
P2P and E2E encrypted specifically for the intended recipient
SECURITY UNDERLYING TECHNOLOGY
RSA2048, ECC (Ed25519 and P-256 curves), AES256 encryption
SECURITY BENEFITS
Provides data privacy and security
SECURITY FEATURES
E2E Encrypted; Static IPs not required
SECURITY UNDERLYING TECHNOLOGY
RSA2048, ECC (Ed25519 and P-256 curves), AES256 encryption, and future encryption types are easy to add, including post quantum algorithms
SECURITY BENEFITS
Reduces key management complexity and security vulnerabilities
SECURITY FEATURES
Key storage on the edge device or sensor
SECURITY UNDERLYING TECHNOLOGY
Encryption keys stored on: On Secure Element, TPM, SIM or File System
SECURITY BENEFITS
Provides device security with no open ports, eliminating network attack surfaces
SECURITY FEATURES
Full communication and access to devices possible with only outbound generated connections
SECURITY UNDERLYING TECHNOLOGY
atServers, atProtocol
SECURITY BENEFITS
Eliminates the need to secure a large datastore
SECURITY FEATURES
Distributed data store
SECURITY UNDERLYING TECHNOLOGY
atServers, atProtocol
SECURITY BENEFITS
Enables key storage security
SECURITY FEATURES
Encryption keys cut at the edge
SECURITY UNDERLYING TECHNOLOGY
APKAM key pairs
SECURITY BENEFITS
Provides Zero Trust Security
SECURITY FEATURES
Key Authentication/Encryption
SECURITY UNDERLYING TECHNOLOGY
atProtocol, TLS v1.3
Hassle-Free Access Benefits
Hassle-Free Access Features
Hassle-Free Access Underlying Technology
ACCESS BENEFITS
Clear data ownership; “My Thing My Data”
ACCESS FEATURES
Cryptographic permissions; Personalized encrypted data store with controls on who to share with polymorphic controls of data sharing
ACCESS UNDERLYING TECHNOLOGY
atSigns for sharing rights; atServers for encrypted data; atSDKs for setting the controls
ACCESS BENEFITS
Accessibility, reachability no matter where the device is located (cellular network, behind a firewall, wherever)
ACCESS FEATURES
Universal addressability; No requirement of static IPs
ACCESS UNDERLYING TECHNOLOGY
atDirectory, like DNS; just needs an Internet connection
ACCESS BENEFITS
Fast, high performance connections
ACCESS FEATURES
Millisecond latency
ACCESS UNDERLYING TECHNOLOGY
atProtocol
ACCESS BENEFITS
Can operate across networks
ACCESS FEATURES
Network coverage independence
ACCESS UNDERLYING TECHNOLOGY
atProtocol
ACCESS BENEFITS
Cloud agnostic
ACCESS FEATURES
Compatible with all major cloud platforms, including Amazon, Google, Azure
ACCESS UNDERLYING TECHNOLOGY
atProtocol
ACCESS BENEFITS
No passwords required
ACCESS FEATURES
Cryptographic authentication
ACCESS UNDERLYING TECHNOLOGY
APKAM key pairs
ACCESS BENEFITS
Minimized downtime
ACCESS FEATURES
Resilient, system to adapt to unforeseen events
ACCESS UNDERLYING TECHNOLOGY
atSDKs, Atsign Infrastructure
ACCESS BENEFITS
Different data sets can be sent to different recipients
ACCESS FEATURES
Connectivity Type (almost agnostic)
ACCESS UNDERLYING TECHNOLOGY
Uses TCP/IP
Faster & Greener Deployment Benefits
Faster & Greener Deployment Features
Faster & Greener Deployment Underlying Technology
FASTER DEPLOYMENT BENEFITS
Faster deployment times
FASTER DEPLOYMENT FEATURES
No static IP addresses; can access devices behind firewalls
FASTER DEPLOYMENT TECHNOLOGY
atProtocol
FASTER DEPLOYMENT BENEFITS
Automatic data redundancy
FASTER DEPLOYMENT FEATURES
Primary and back-up data store for the device
FASTER DEPLOYMENT TECHNOLOGY
Devices or sensors with 50MB or less act as Primary Servers within Docker Containers; atServers act as Back-up of Devices (50MB encrypted data store)
FASTER DEPLOYMENT BENEFITS
Scalable
FASTER DEPLOYMENT FEATURES
Supports 50B look-ups
FASTER DEPLOYMENT TECHNOLOGY
DNS: TCP-Port, In Memory DB, Kubernetes environment
FASTER DEPLOYMENT BENEFITS
Supports connectivity on cellular, wifi, LoRa, Wi-Sun, and Satellite
FASTER DEPLOYMENT FEATURES
Connectivity Type (almost agnostic)
FASTER DEPLOYMENT TECHNOLOGY
Uses TCP/IP
FASTER DEPLOYMENT BENEFITS
Less data store repetition
FASTER DEPLOYMENT FEATURES
Data store in one place
FASTER DEPLOYMENT TECHNOLOGY
atServer, atProtocol
FASTER DEPLOYMENT BENEFITS
Can run on small devices, including MCUs and embedded SOCs, requiring less energy
FASTER DEPLOYMENT FEATURES
No attack surfaces and E2E encryption, because of these two features you do not need to run firewalls, VPNs, etc. all which require more computing power/energy.
FASTER DEPLOYMENT TECHNOLOGY
Requires only outbound communication, so there are no open networking ports
FASTER DEPLOYMENT BENEFITS
Fewer devices and sensors needed
FASTER DEPLOYMENT FEATURES
Polymorphic communication allows one device or sensor to communicate different information to different companies or people
FASTER DEPLOYMENT TECHNOLOGY
atProtocol, atSDKs allows rule setting and atServers store different data sets for different destinations
For more information, see:
Ready to get started?
Schedule a meeting below: