IN ACCORDANCE WITH
TITLE II OF REGULATION (EU) 2023/1114
| Name | Business Address | Function |
|---|---|---|
|
|
|
|
|
|
|
|
|
|
|
|
The Foundation aims to further initiatives that serve to widen the reach of the Irys network, reducing crypto’s reliance on centralized data storage and fragmented developer experiences. This entity itself will fund further development of the network, while also covering expenses associated with infrastructure costs, risk assessments, audits and more.
$20M raised across 4 rounds with participation from Coinfund, Hypersphere, Framework, Lemniscap, Primitive Ventures, Permanent Ventures, Echo Group and others.
Angel participation from Smokey the Bera, David Phelps, Nader Dabit, Chase Chapman, Ryan Watkins, Daniel Cheung, and others.
The foundation and issuer have been funded by promissory notes from a third party aligned with the foundation's objectives.
10 months to date of the foundation:
Income: $ -
Administration Costs: $ 184,000
Assets: $ 136,000
Liabilities: $ 320,000
Irys is a Layer-1 Datachain That Unlocks the Value of Data—letting you store, use, and monetize your AI and IP data.
The Irys token has three uses:
Fees: Fees are charged on all network operations, including payment for data storage and protocol execution. Unlike other datachains, both temporary and permanent data storage fees are pegged to a USD range and updated on a yearly basis.
Security: Token rewards are used to incentivize node validators contributing to Irys consensus and to prevent spam and denial-of-service attacks.
Staking: Miners must lock $IRYS tokens as collateral, signaling their commitment to the network and creating clear economic consequences for failing to uphold their responsibilities. Users will also be able to delegate $IRYS tokens in order to passively participate in contributing to the network’s security model.
Irys is purpose built to solve for the following issues:
1. Storage is expensive and unpredictable
On other datachains, storing data is expensive and pricing swings with token volatility.
Irys fixes this with stable pricing tied to actual hard drive costs, making it 10–20x cheaper than alternatives. Additionally, our pricing algorithm makes sure the price of storage is fixed, eliminating the pain point of unreliable budgeting for data storage.
2. Intellectual property is being stolen by AI, and value is taken from end users
Creators lose control when their work is scraped, remixed, and monetized without permission. The rise of AI has only accelerated the amount of value that is lost every day, as outdated IP regulations and infrastructure have not caught up with innovation. Users capture none of this value.
Irys fixes this by allowing creators to embed licensing rules, enforce attribution, and through Programmable Data, they can get paid automatically each time their Irys-registered IP is used. This is all done entirely onchain.
3. Training data is low-quality and there is no price discovery due to data siloes
AI models are only as good as their data, but most data isn’t actually reachable for AI companies, as there’s no global marketplace for companies to find buyers for their data.
Irys fixes this by enabling incentivized curation and direct monetization of high-quality datasets. This is another outcome of our flagship “Programmable Data” feature. Also, see Brickroad, an ecosystem project building a native data marketplace on Irys.
4. AI agents can’t coordinate or consistently remember historical actions and queries
AI agents work in walled-in gardens. They lack shared memory, can’t verify each other’s tasks, and struggle to collaborate.
Irys fixes this by giving agents a shared, verifiable memory layer. Agents can discover each other, track results/tasks, and collaborate together on more advanced functions. We see this becoming especially useful as AI frameworks progress into specialized niches/verticals."
| Type | Name | Business Address | Domicile |
|---|---|---|---|
|
|
|
Historical Development and Milestones split out by years achieved
2025
January:
Scope Rust codebase rewrite (initially written in Erlang) - Finished
February
Deploy Single-Node Testnet - Finished
Difficulty calculations & tests - Finished
March
Implement multi-node gossip & testing framework - Finished
April
Finalize Reth integration strategy - Finished
Implement peer staking & pledging - Finished
Multi-node peer validation tests - Finished
May
Deploy multiple peers on testnet - Finished
Implement emissions curve & block rewards - Finished
Develop fork recovery tests - In Progress
June
Continue MVP Consensus (fork recovery, epoch service, mempool service, transaction validation) - Finished
Testnet restart tooling (genesis node restart & synchronization) - Finished
July
Round out fork/reorg test suite - Finished
Address audit feedback (difficulty adjustments) - Finished
August
Deploy Data Sync - Finished
Deploy multiple testnet miners - Finished
Ingress Proof gossip and consensus - Finished
September
Mainnet Packing / hashing parameters - Finished
Mempool validation pathways - Finished
October:
Packing / Unpacking Service Improvements - Finished
Programmable Data Pricing - Finished
Onboard network miners - Finished
2025 Q4
Launch Irys wallet & tooling
Build S3-API & developer tools
Launch mainnet & TGE
Launch Brickroad data marketplace
2026 Q1
Reduce blocktimes
Enhance wallet features
Implement additional storage terms
2026 Q2
Further reduce blocktimes
Enhance wallet features
Implement additional storage terms
Migration to BFT-based PoW
N/A
N/A
Opportunity to trade IRYS Token on regulated and transparent trading venues within the European Union ensuring sufficient liquidity and price discovery mechanisms for the IRYS token through regulated exchanges enabling broader participation in the IRYS ecosystem through established and compliant trading platforms facilitating secure and regulated access to the IRYS token for ecosystem participants, including developers, users, and governance participants.
Targeted holders include all types of investors, subject to the following restrictions:
Geographic Restrictions:
a. Not available to persons or entities in sanctioned jurisdictions
b. Not available to persons or entities on OFAC restricted lists or similar applicable sanctions lists
c. Not available to persons or entities in US and other jurisdictions as defined at time of the tokens admission to trading
d. Must comply with all applicable local regulations in their jurisdiction
Payments may be made in supported cryptocurrencies (e.g., USDT, USDC, ETH) and, where applicable, via fiat currency through approved payment channels.
N/A
Tokens will be transferred directly to the purchaser’s registered wallet address on the supported blockchain network after confirmation of payment
Purchasers must have a compatible blockchain wallet that supports the token’s network.
Investors can access the platforms via their official websites or mobile applications after completing any required registration and KYC procedures.
Standard trading fees apply as set by the trading platform. Infinity Ground does not charge additional access fees.
Potential conflicts of interest:
1. Relationship Structure:
a. All relationships are governed by clear contractual arrangements to ensure independence and transparency
2. Token Allocations:
a. Team members and early contributors will receive token allocations
b. These allocations are subject to predefined vesting schedules and governance rules
c. All allocations are transparently disclosed in the token distribution section
3. Governance:
a. Initial governance decisions are made by the IRYS Foundation
b. Transition to DAO governance is planned to ensure decentralised decision-making
c. Clear separation of duties between foundation management and operational teams
4. Risk Mitigation:
a. Regular reporting and disclosure requirements
b. Clear governance framework for decision-making
All identified potential conflicts are managed through appropriate governance structures and transparency measures to protect token holder interests.
Cayman Islands
Cayman Islands
IRYS tokens are considered as crypto-assets other than EMTs and ARTs under Regulation (EU) 2023/1114. IRYS tokens are fungible tokens.
Irys is a PoW/S hybrid L1 that introduces "Programmable Data". This feature combines a high-performance storage network with native VM execution. This allows users to store data at low costs while accessing it within IrysVM.
The token is also heavily deflationary, with 95% of storage fees and 50% of transaction fees being burnt. This makes Irys more sustainable.
Network utilities include the following:
PoW/S hybrid consensus: a custom consensus protocol that combines traditional Proof-of-Work with staking to provide a cheaper and faster chain.
Lowest storage costs: at least 10x cheaper than any competitor (e.g. $2.50/TB/month and $2.50/GB permanent data storage)
IrysVM / Programmable Data: a custom EVM with precompiles that allow smart contracts to read data stored on the chain
The Irys token specifically has three uses:
Fees: Fees are charged on all network operations, including payment for data storage and protocol execution. Unlike other datachains, both temporary and permanent data storage fees are pegged to a USD range and updated on a yearly basis.
Security: Token rewards are used to incentivize node validators contributing to Irys consensus and to prevent spam and denial-of-service attacks.
Staking: Miners must lock $IRYS tokens as collateral, signaling their commitment to the network and creating clear economic consequences for failing to uphold their responsibilities. Users will also be able to delegate $IRYS tokens in order to passively participate in contributing to the network’s security model.
Immediately
The IRYS Token are issued in the form of crypto-assets other than asset reference tokens or e-money tokens pursuant to MiCAR and under the agreed terms and conditions.
1. Technical Specifications:
a. Token standard: ERC-20
b. Blockchain: Transfers occur on the IRYS Layer 1 blockchain.
c. Total supply: 10 Billion tokens
2. Core Functionalities / Rights and Obligations:
a. Obligations: There are no mandatory obligations for token holders. Participation in governance or staking is entirely voluntary and at the discretion of each holder.
b. Obligations: Fees are charged on all network operations, including payment for data storage and protocol execution. Unlike other datachains, both temporary and permanent data storage fees are pegged to a USD range and updated on a yearly basis.
c. Obligations: Token rewards are used to incentivize node validators contributing to Irys consensus and to prevent spam and denial-of-service attacks.
3. Implementation Timeline:
a. Initial functionality: Ecosystem participation, storage and execution payments, staking to validate the network
b. Planned upgrades: Delegation, Programmable Data, Extended Storage Terms
c. Future capabilities: Network optimizations
N/A
Rights of Token Holders:
a. Right to vote on protocol proposals, including:
i. Protocol upgrades and technical parameters
ii. Treasury fund allocations
iii. Network parameter adjustments
iv. Ecosystem incentive programs
b. Voting weight proportional to token holdings
Obligations: N/A
Governance rights exercised through a website that allows token holders to create and vote on proposals.
50%+1 of the token holders’ votes that participate are needed to propose modifications. The implementation of these modifications needs to be implemented / executed by an independent committee that consists of representatives of the Foundation and token holders.
N/A
Tokens admitted to trading on exchanges. While there are no restrictions on transferability, provided purchasers comply with applicable regulations, trading platforms may impose their own set of restrictions as to who is permitted to buy and sell the token. Such restrictions may vary between platforms based on their internal policies as well as the legal and regulatory requirements of their respective jurisdictions.
Cayman Islands
Cayman Islands
Irys operates as a Layer-1 “datachain” that unifies decentralized storage, data availability, and smart-contract execution within a single distributed ledger. The network is secured by a hybrid Proof-of-Work and Stake (PoW/S) consensus mechanism that integrates continual, verifiable proofs of storage directly into block production. The ledger uses a multi-ledger architecture, where data is stored across separate retention-based ledgers and 22TB partitions, allowing flexible durations such as short-term, long-term, or permanent storage. Execution is supported through IrysVM, an EVM-compatible environment extended with native data-access capabilities so that smart contracts can deterministically read and compute over on-chain data. Together, these components form a vertically integrated DLT that records transactions, proves data availability, and supports computation within one coherent, trustless system.
The IRYS blockchain is designed as a Layer 1 (L1) protocol.
Execution environment: IrysVM is EVM-compatible (EVM++) and adds “programmable data” so contracts can read specified chunk ranges via a PD precompile using EIP-2930 access lists.
Block model: Two block lanes separate data and execution for stable data-tx pricing; headers include evm_block_hash and vdf_limiter_info.
Storage architecture: Multi-ledger by duration with promotion from submit to permanent; data is organized in 16 TB partitions.
Data integrity and uniqueness: Ingress proofs are Merkle-root proofs bound to miner address and signature; Matrix Packing VDF-encodes the miner’s address into each 256 KiB chunk to enforce unique replicas.
Replication requirement (permanent data): Minimum 10 replicas.
VM and toolchain: EVM++ with a precompiled “system” contract to expose chunk ranges to contracts; remains compatible with standard EVM tooling via EIP-2930 access lists. Built using Reth, Async Rust, while the application layer supports Solidity development
Client SDK and gateway: SDK abstracts range calculation for PD transactions, implemented by the gateway. SDK built using TypeScript and Gateway is implemented in async Rust
Networking: Gossip/mempool propagates PD transactions and chunks; nodes validate chunks against Merkle roots and can request or unpack chunks as needed. Async Rust used for p2p layer and chunk streams
Design: Hybrid Proof-of-Work-and-Stake with slashing to punish malicious behavior and meet reliability/economic requirements.
Efficient Sampling: VDF ticks every second to seed deterministic reads of 200 MiB per partition; miner publishes a block if solution exceeds network difficulty. Guarantees each partition is fully sampled daily resulting in consistent data verafiability.
Minimum fee: $0.001 to deter spam (paid in $IRYS)
Term storage fees: At-cost model (real world HDD cost) plus 5% inclusion fee; example calculations provided.
Permanent storage fees: perm_fee = term_fee + (ingress_fee × 10) + perm_cost; 10 ingress-proof fees apply.
Fee distribution: 5% of term_fee to block producer at inclusion; 5% of term_fee paid per ingress-proof; perm_fee is prepaid for 200 years × 10 replicas and added to the treasury; refunds if data not uploaded/published.
Inflation and burns: Block rewards follow an 4% starting inflation that halves every two years; 50% of execution-tx fees are burned; 95% of temporary storage fees are burned; long-term storage fees contribute to an endowment sink.
Additional miner incentives: Term-ledger payouts at epoch expiry (≈$0.60 per full 16 TB partition) and extra fees to cover re-packing.
The Irys distributed ledger functions through tight integration of storage, consensus, and execution. Every block contains two parallel lanes: one for data-storage transactions and one for execution transactions. Data submitted to the network is written into the appropriate ledger based on the user’s desired retention period and stored inside 22TB partitions maintained by miners. Before data is accepted, miners must generate ingress proofs (i.e., signed Merkle roots that demonstrate possession of the underlying data) ensuring that the network only stores verifiable replicas.
Consensus is achieved through a hybrid PoW/S mechanism that continuously validates data availability. A verifiable delay function emits a global randomness seed once per second, and for every partition a miner stores, the seed determines a mandatory 200 MiB sequential read. Miners hash the resulting chunks and attempt to meet the current difficulty target; a valid solution, combined with sufficient stake, grants block-production rights. Because every partition is sampled once per day through this process, block production itself serves as an ongoing proof-of-storage, with slashing applied for miners who fail to store or serve data.
Execution occurs through IrysVM, which extends the Ethereum Virtual Machine with precompiled functions that stream on-chain data directly into smart-contract logic. Nodes must first retrieve and validate the relevant data chunks through the network’s gossip layer before including a programmable-data transaction in a block. Finality is probabilistic, similar to traditional PoW networks, with future upgrades targeting BFT-based PoW for single-slot finality. Through this integrated architecture, the Irys DLT simultaneously provides verifiable storage, reliable data availability, and deterministic smart-contract execution within a single ledger.Detailed description of DLT
An extensive independent security review of the Irys mainnet implementation was conducted in 2H 2025, covering the full consensus, storage, networking, and execution subsystems. The auditors identified a set of high, medium, and low-severity findings, all of which were formally acknowledged, addressed, and incorporated into the final audited codebase (commit c5aeab259213f1125cea1a6c0a6582f8450610e1). The remediation process involved implementing the recommended fixes, adding missing validation paths, strengthening error-handling, hardening Merkle and PoA verification logic, improving consensus safeguards, correcting boundary and offset checks, enforcing chain-specific protections, and tightening signature validation across all ingress and commitment transactions.
Following these remediations, the auditors confirmed that each issue had been fully resolved or, where appropriate, explicitly reviewed and accepted with documented rationale. No high, medium, or low-severity findings remained unaddressed at the conclusion of the process, and the final code passed all audit verification steps and regression tests. The outcome of the audit is that the Irys mainnet software meets the expected security, correctness, and stability requirements for launch, with all previously identified risks remediated, validated, and retested in accordance with the audit recommendations.
The person seeking admission to trading does not control, operate, or oversee the trading platforms on which the IRYS token may be admitted. While not exhaustive, the following outlines key risks associated with the token’s admission to trading:
Market Integrity Risks: Newly listed tokens often experience significant price volatility and limited liquidity, making them more susceptible to speculative trading and market manipulation. Without robust market surveillance mechanisms in place, practices such as wash trading, spoofing, and pump-and-dump schemes can occur. There is also a risk of insider trading if individuals exploit material non-public information before or during the listing process.
Trading Platform Dependencies and Risks: Relying on third-party trading platforms introduces counterparty risks, including the potential for platform insolvency, technical malfunctions, security breaches, or other operational issues that may disrupt token access or trading. Additionally, platform-specific rules, fee models, or technical constraints can limit token usability or result in higher costs for users. Low trading volumes may lead to delisting decisions, which can severely affect a token’s liquidity and market reach.
Regulatory & Compliance Uncertainties: The regulatory environment for token trading continues evolving, posing ongoing compliance challenges. Jurisdictions may introduce new restrictions or licensing requirements that affect a token’s tradability or legal status. As regulatory scrutiny increases, trading platforms may be compelled to delist tokens that fall short of emerging compliance standards.
N/A
Concentration Risk: Concentration risk refers to the potential for loss resulting from an excessive allocation of investment capital in a single asset or a group of closely related assets.
Counterparty Risk: In cases where crypto-assets are used in contractual agreements or held on exchanges, there is a risk that the counterparty may fail to fulfill their obligations due to insolvency, compliance issues, or fraud, resulting in loss of crypto-assets.
Custodial Risk: Risks associated with the theft of crypto-assets from exchanges or wallets, loss of private keys, or failure of custodial services, which can result in the irreversible loss of crypto-assets.
Liquidity Risk: Some crypto-assets may suffer from low liquidity, making it difficult to buy or sell large amounts without affecting the market price, which could lead to significant losses, especially in fast-moving market conditions.
Market integrity risk: A crypto-asset’s standing in the market could be negatively impacted by associations with illicit activities, high-profile hacks, or severe technical failures, which would undermine user trust and reduce market value.
Market Risk: Crypto-assets are notoriously volatile, with prices subject to significant fluctuations due to market sentiment, regulatory news, technological advancements, and macroeconomic factors.
Regulatory and Tax Risk: Changes in the regulatory environment for crypto-assets (such as consumer protection, taxation, and anti-money laundering requirements) could affect the use, value, or legality of crypto-assets in a given jurisdiction.
Reputational Risk: Association with illicit activities, high-profile thefts, or technological failures can damage the reputation of certain crypto-assets, impacting user trust and market value.
Risk of Exchange Failure: The risk of exchange failure refers to the possibility that the exchange may experience temporary or permanent outages. Such a failure could impair the tradability of crypto-assets issued by the issuer.
Sector-Specific Risks: Sector-specific risks are inherent to a particular industry or sector. These risks may arise from changes in the macroeconomic environment, a decline in demand within the sector where the issuer operates, or dependencies on other sectors.
Smart Contract Risk: Crypto-assets might be connected to or be issued with the help of smart contracts. Smart contracts are code running on a blockchain, executing the programmed functions automatically if the defined conditions are fulfilled. Bugs or vulnerabilities in smart contract code can expose blockchain users to potential hacks and exploits. Any flaw in the code can lead to unintended consequences, such as the loss of crypto-assets or unauthorised access to sensitive data.
Team Dependency Risk: The success of the network relies on the competence, expertise, and commitment of its development team. Unexpected departures or the loss of key personnel could hinder project progress, innovation, and continuity.
Resource Management Risk: Mismanagement of governance funds or development resources could delay milestones, hinder ecosystem growth, and jeopardise the project’s long-term sustainability.
Competitive Pressure Risk: Competing blockchain platforms or protocols may challenge the network’s market position, reducing adoption rates and threatening its overall competitiveness.
Issuer Key Mismanagement Risk: Mismanagement of the issuer's keys, resulting in the loss of crypto-assets, could jeopardise the funding and development of the protocol, threatening its progress and sustainability.
Anonymity and Privacy Risk: The inherent transparency and immutability of blockchain technology can pose risks to user anonymity and privacy. Since all transactions are recorded on a public ledger, there is potential for sensitive data to be exposed. The possibility for the public to link certain transactions to a specific address might expose it to phishing attacks, fraud, or other malicious activities.
Bugs in the Blockchain’s Core Code: Even with thorough testing, there is always a risk that unknown bugs may exist in a blockchain protocol, which could be exploited to disrupt network operations or manipulate account balances. Continuous code review, audit trails, and having a bug bounty program are essential to identify and rectify such vulnerabilities promptly.
Consensus Failures or Forks: Faults in the consensus mechanism can lead to forks, where multiple versions of the ledger coexist, or network halts, potentially destabilising the network and reducing trust among participants.
Data Corruption: Corruption of blockchain data, whether through software bugs, human error, or malicious tampering, can undermine the reliability and accuracy of the system.
Dependency on Underlying Technology: Blockchain technology relies on underlying infrastructures, such as specific hardware or network connectivity, which may themselves be vulnerable to attacks, outages, or other interferences.
Economic Self-sufficiency and Operational Parameters: A blockchain network might not reach the critical mass in transaction volume necessary to sustain self-sufficiency and remain economically viable to incentivise block production. In failing to achieve such inflection point, a network might lose its relevance, become insecure, or result in changes to the protocol’s operational parameters, such as the monetary policy, fee structure and consensus rewards, governance model, or technical specifications such as block size or intervals.
Governance Risk: Governance in blockchain technology encompasses the mechanisms for making decisions about network changes and protocol upgrades. Faulty governance models can lead to ineffective decision-making, slow responses to issues, and potential network forks, undermining stability and integrity. Moreover, there is a risk of disproportionate influence by a group of stakeholders, leading to centralised power and decisions that may not align with the broader public’s interests.
Governance Weakness Risk: Ineffective governance processes can result in decision-making gridlock, contentious network forks, or disproportionate influence by small stakeholder groups, undermining decentralisation and trust.
Infrastructure Dependency Risk: The project’s reliance on stable hardware and network connectivity introduces risks of outages or disruptions, potentially halting transactions and preventing access to funds.
Network Attacks and Cyber Security Risks: Blockchain networks can be vulnerable to a variety of cyber-attacks, including 51% attacks, where an attacker gains control of the majority of the network's consensus, Sybil attacks, or DDoS attacks. These can disrupt the network’s operations and compromise data integrity, affecting its security and reliability.
Private Key Management Risk and Loss of Access to Crypto-Assets: The security of crypto-assets heavily relies on the management of private keys, which are used to access and control the crypto-assets (e.g. initiate transactions). Poor management practices, loss, or theft of private keys, or respective credentials, can lead to irreversible loss of access to crypto-assets.
Risk of Technological Disruption: Technological advancements or the emergence of new technology could impact blockchain systems, or components used in it, by making them insecure or obsolete (e.g. quantum computing breaking encryption paradigms). This could lead to theft or loss of crypto-assets or compromise data integrity on the network.
Scaling Limitations and Transaction Fees: As the number of users and transactions grows, a blockchain network may face scaling challenges. This could lead to increased transaction fees and slower transaction processing times, affecting usability and costs.
Settlement and Transaction Finality: By design, a blockchain’s settlement is probabilistic, meaning there is no absolute guaranteed finality for a transaction. There remains a theoretical risk that a transaction could be reversed, or concurring versions of the ledger could persist due to exceptional circumstances such as forks or consensus errors. The risk diminishes as more blocks are added, making it increasingly secure over time. Under normal circumstances, however, once a transaction is confirmed, it cannot be reversed or cancelled. Crypto-assets sent to a wrong address cannot be retrieved, resulting in the loss of the sent crypto assets.
Smart Contract Security Risk: Smart contracts are code running on a blockchain, executing the programmed functions automatically if the defined conditions are fulfilled. Bugs or vulnerabilities in smart contract code can expose blockchain networks to potential hacks and exploits. Any flaw in the code can lead to unintended consequences, such as the loss of crypto-assets or unauthorized access to sensitive data.
Third-Party Risks: Crypto-assets often rely on third-party services such as exchanges and wallet providers for trading and storage. These platforms can be susceptible to security breaches, operational failures, and regulatory non-compliance, which can lead to the loss or theft of crypto-assets.
Bug bounty program: A robust bug bounty program is in place to incentivise identification and resolution of vulnerabilities.
Continuous monitoring and audits: Continuous monitoring and independent security audits ensure ongoing evaluation of the network's integrity.
Reliable infrastructure: Reliable infrastructure providers and fallback mechanisms are incorporated to address potential disruptions.
Clear governance frameworks: Clear governance frameworks are established to promote decentralised, transparent decision-making.
Information referred to in the Annex to Commission Delegated Regulation (EU) 2024/XXX specifying the content, methodologies and presentation of information in respect of sustainability indicators in relation to adverse impacts on the climate and other environment-related adverse impacts.
Design: Hybrid Proof-of-Work-and-Stake with slashing to punish malicious behavior and meet reliability/economic requirements.
Efficient Sampling: VDF ticks every second to seed deterministic reads of 200 MiB per partition; miner publishes a block if solution exceeds network difficulty. Guarantees each partition is fully sampled daily resulting in consistent data verafiability.
Minimum fee: $0.001 to deter spam (paid in $IRYS)
Term storage fees: At-cost model (real world HDD cost) plus 5% inclusion fee; example calculations provided.
Permanent storage fees: perm_fee = term_fee + (ingress_fee × 10) + perm_cost; 10 ingress-proof fees apply.
Fee distribution: 5% of term_fee to block producer at inclusion; 5% of term_fee paid per ingress-proof; perm_fee is prepaid for 200 years × 10 replicas and added to the treasury; refunds if data not uploaded/published.
Inflation and burns: Block rewards follow an 4% starting inflation that halves every two years; 50% of execution-tx fees are burned; 95% of temporary storage fees are burned; long-term storage fees contribute to an endowment sink.
Additional miner incentives: Term-ledger payouts at epoch expiry (≈$0.60 per full 16 TB partition) and extra fees to cover re-packing.
To estimate the energy use associated with the Irys network’s mining and validation operations (as reported in field S.8), we rely on a component-level assessment of typical mining hardware and the operational characteristics of the network’s consensus mechanism.
Irys employs a hybrid proof-of-work model in which block production is intentionally constrained by hard-disk throughput rather than unbounded computational hashing. As a result, mining does not involve intensive, open-ended compute races. Instead, energy consumption is predominantly driven by storage hardware and the baseline operation of standard server components.
For estimation purposes, we model a representative mining node using common consumer-grade server equipment with approximately 1 PB of storage capacity, implemented through a 16-drive array of 22 TB HDDs. Power-draw assumptions for each major system component are based on typical manufacturer specifications and industry-standard values for comparable hardware:
CPU + motherboard + RAM: ~60 W
HDD array (16 × 22 TB): ~276 W
Total estimated continuous load per mining node: ~336 W
Using a standard annual operating-hour assumption of 8,760 hours/year, the expected yearly energy consumption per node is calculated as:
336 W × 8,760 h ≈ 2,943.4 kWh per node per year
The network is initially expected to support 10 miners/validators, each with similar hardware profiles. Therefore, the estimated total annual energy consumption for the validator set is:
2,943.4 kWh × 10 ≈ 29,434 kWh/year
This methodology provides a hardware-based, component-level estimate grounded in realistic power-draw characteristics and the operational behavior of Irys’s consensus mechanism.