How the protocol works
1 — The client talks to the nearest node
Requests are routed through trusted network nodes that verify signatures and enforce protocol rules.
2 — Local encryption and access policies
Data is encrypted on the client side; keys and access policies are managed by the process owner and never leave their infrastructure.
3 — Distributed data storage
Encrypted segments are replicated across network storage. Nodes earn NPT for confirmed data delivery.
4 — New Protocol Token (NPT) economy
Every operation — read, write, compute — is logged and paid with an NPT micro-amount, with no subscriptions.
NPT settlement model
Novij Protocol has a transparent economy: you pay only for confirmed actions.
- Reading data → NPT micro-deduction.
- Creating or updating a record → slightly higher NPT spend for compute.
- Long-term storage → predictable NPT charges by volume and duration.
Bottom line: flexible, controllable economics without subscriptions or hidden fees.
Frequently asked questions
Who can see my data?
Only you and authorized participants. Encryption happens locally, and nodes operate on encrypted segments.
How is access controlled?
Via distributed keys and policies. You grant, limit, and revoke access without intermediaries.
What do I need to connect?
Choose a role (company, integrator, developer), get starter NPT, and launch your processes.