Digital artwork of a secure decentralised Web3 network showing a padlock over a global grid, symbolising verifiable short links, encryption, and trust in Aethralink.”

Building the Foundation: Aethralink, Week in Review

October 24, 2025: Today marks a significant step forward for tech advancements with the introduction of Aethralink verifiable infrastructure, paving the way for innovative and secure solutions.

Since the 18th of October, I have been moving the Aethralink project from abstract design into tangible systems work. I have not released anything publicly yet, but progress is accelerating beneath the surface. Each evening this week, I focused on building the foundations that will define how this network behaves, what it trusts, what it records, and how it preserves context over time.

It has been a busy week balancing the nine-to-five and other commitments, so the project is not ready for launch yet. Even so, the structure is forming, and I am getting there.


Making the Web3 Layer Real

Feature 23 focused on integrating Aethralink with Web3 infrastructure. As a result, the system now recognises and validates decentralised web addresses across IPFS, Arweave, ENS, and Unstoppable Domains. When I submit an address, Aethralink checks that it is genuine before allowing it to be shortened or signed.

That verification step matters. The modern web is full of dead links and unverified content, and many systems accept data without checking its truth. Aethralink follows a different path. A shortlink that points to a decentralised source must prove that it exists. The link itself becomes a small act of validation.

This principle, proof before trust, continues to guide every part of development.


Solving Key Recovery Without Central Control

One of the hardest challenges in decentralised design is recovery. If someone loses a private key, identity often disappears with it. To solve this, I implemented Shamir Secret Sharing over libp2p. This approach splits a private key into five encrypted shares. Any three can restore the key, but none can reveal it alone. I also secured all peer communication with Kyber1024, a post-quantum encryption scheme.

With this approach, users no longer depend on a central server or company to regain access to their credentials. The network itself helps them recover, keeping trust distributed rather than surrendered. Consequently, it creates a safeguard that most people will never notice until they need it.


Preserving Context in System Configuration

Feature 22 introduced a configuration management system that records its own history. Every setting change—whether a new URL, a permission, or a threshold—automatically adds an entry to the audit log. The log records who made the change, when it happened, the IP address, and the previous and new values.

I built this system directly into PostgreSQL triggers, so it cannot be skipped or silently disabled. Each configuration version can be rolled back, and I sign every export or import with Ed25519 keys.

For example, when I changed the shortlink base from staging to production on the 18th, the database logged it automatically. Six months from now, when someone asks Why are we using this domain?, the answer will already exist in the data. As a result, Aethralink can always explain its own evolution.

This is what I mean by context preservation: systems should remember how they became themselves.


The Shape of Progress

Here is what this work looks like in numbers:

  • 689 BDD scenarios across 20 feature files
  • 36,556 lines of Go code
  • 13 commits over six days
  • 10 services and 11 database tables
  • 4 migrations with complete audit trails

These are not vanity metrics; they reflect structure taking shape. Each scenario and table extends the verification framework and moves Aethralink closer to operational readiness.


Technical Highlights

Several technical steps stand out this week. First, I built finite field arithmetic over Galois Field 256 to support Shamir Secret Sharing, using compact mathematics to reinforce security. Next, I created database triggers that automatically generate audit entries. Finally, I validated Web3 content IDs before signing any credential, ensuring that every record begins with verifiable authenticity.

The work is not glamorous, but it is the kind of engineering that keeps systems honest and resilient.


What Comes Next

The next phase focuses on strengthening security and scaling capacity. I am finalising multi-tenant support for configuration management and moving into Features 24 through 27: KeystoreVault SecurityNetwork Security, and Rate Limiting. After that, I will begin integrating Ceramic ComposeDB and building libp2p swarm synchronisation so the first distributed test nodes can communicate. Consequently, each step brings me closer to transforming local prototypes into a functioning network.


Continuity Over Hype

In the previous Aethralink post, I explained that the goal was to prove that decentralised systems could preserve truth as they evolve. This week, that principle is becoming real. Every component: Web3 verification; distributed recovery and audit enforcement, exists to ensure continuity. A user, a developer, or an auditor will always be able to trace how the system reached its current state.

I have not shipped yet, and that is fine. Moving carefully now prevents mistakes later. The goal is not speed; it is integrity. As a result, Aethralink is slowly becoming what I set out to build: a system that remembers, verifies, and can be trusted to tell the truth about its own history.


Looking Ahead

Gherkin and BDD have become essential parts of my recent development process, working seamlessly with the Claude CLI and my specialist optimised agents. I am continuing to build a custom cyber SDLC designed to operate with AI agents on demand, combining local and cloud-based agent workers. This framework will guide future projects, making the development cycle faster, more consistent, and deeply integrated with intelligent automation. When it is ready, I will write one or two blogs explaining how this SDLC works and how it can support future Aethralink releases and related projects.

If you’d like to follow the journey more closely, subscribe to the Vortex mailing list below. You’ll receive updates as the Aethralink system evolves, along with detailed posts when I publish deep dives on the custom cyber SDLC and AI-agent workflows. Stay tuned and feel free to share your thoughts or questions in the comments; I’ll respond personally to the most insightful ones.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.