With the amount of new subnets being added it can be hard to get up to date information across all subnets, so data may be slightly out of date from time to time
Subnet 91 – known as Tensorprox, is a recently launched subnet dedicated to decentralized cybersecurity. Tensorprox’s launch in April 2025 marked the introduction of an incentivized DDoS “scrubbing” service within Bittensor. In other words, Tensorprox is designed as a distributed DDoS mitigation platform operating under Bittensor’s token-incentive framework. By leveraging Bittensor’s native token for rewards, this subnet aligns participants’ incentives to collaboratively defend against denial-of-service attacks. The creators of Tensorprox (the team at Shugo) act as subnet creators in Bittensor’s terminology, meaning they define the work miners and validators must perform and how those contributions are rewarded.
At its core, Tensorprox is described by its developers as “the world’s first truly decentralized ‘man-in-the-middle’ firewall”, capable of safeguarding infrastructure across network and application layers (OSI Layer 3 through 7). This specialized subnet brings a new use-case into the Bittensor network: cybersecurity-as-a-service. Whereas many Bittensor subnets focus on AI model serving or data processing, Tensorprox’s purpose is to detect and filter malicious traffic (like DDoS attacks) in a decentralized manner, providing robust protection to target systems.
Subnet 91 – known as Tensorprox, is a recently launched subnet dedicated to decentralized cybersecurity. Tensorprox’s launch in April 2025 marked the introduction of an incentivized DDoS “scrubbing” service within Bittensor. In other words, Tensorprox is designed as a distributed DDoS mitigation platform operating under Bittensor’s token-incentive framework. By leveraging Bittensor’s native token for rewards, this subnet aligns participants’ incentives to collaboratively defend against denial-of-service attacks. The creators of Tensorprox (the team at Shugo) act as subnet creators in Bittensor’s terminology, meaning they define the work miners and validators must perform and how those contributions are rewarded.
At its core, Tensorprox is described by its developers as “the world’s first truly decentralized ‘man-in-the-middle’ firewall”, capable of safeguarding infrastructure across network and application layers (OSI Layer 3 through 7). This specialized subnet brings a new use-case into the Bittensor network: cybersecurity-as-a-service. Whereas many Bittensor subnets focus on AI model serving or data processing, Tensorprox’s purpose is to detect and filter malicious traffic (like DDoS attacks) in a decentralized manner, providing robust protection to target systems.
Tensorprox’s mission is to provide a decentralized defense against DDoS attacks and other high-impact cyber threats. It serves as an “ultimate scrubbing center for cyber defense” within the Bittensor network. In traditional terms, a scrubbing center is a system that cleanses incoming traffic to remove malicious packets before they reach a protected server. Tensorprox implements this concept in a decentralized way: instead of a single entity or data center filtering traffic, a network of community-run nodes (miners) competes and collaborates to scrub traffic. This offers several advantages:
Robust DDoS Mitigation: Tensorprox leverages competitive and collaborative efforts of miners to develop highly selective filtering protocols, yielding scalable and resilient protection against malicious traffic. The system is designed to handle evolving attack vectors by continuously improving through competition.
Decentralized Excellence: By harnessing a distributed network of independent nodes, Tensorprox eliminates single points of failure in DDoS defense. No single firewall or server is solely responsible; many nodes worldwide can share the load and back each other up. This decentralization increases resilience: even if some nodes fail or are overwhelmed, others can continue defending, and the system as a whole adapts to new threats.
AI-Driven Precision: Tensorprox integrates machine learning for anomaly detection. Each mining node can run advanced detection algorithms to identify attacks versus normal traffic. The AI models (or rule-based heuristics) used by miners continuously evolve based on feedback and competition, ensuring state-of-the-art detection capabilities tuned to real-world attack patterns.
Incentive Alignment via Bittensor: The value of Tensorprox within Bittensor is that it transforms DDoS mitigation into a tokenized, incentivized service. Bittensor’s protocol emits TAO rewards to participants (miners and validators) proportional to the value they contribute. In Tensorprox, this means miners who are most effective at blocking attacks and allowing legitimate traffic will earn more TAO. The subnet essentially creates a marketplace for DDoS defense – encouraging innovation as miners strive to build better defenses to earn rewards. This competitive model drives rapid improvement in cyber defense strategies, guided by real performance metrics rather than just theoretical promise.
Use Cases: Initially, Tensorprox operates as a research and development subnet to prove that decentralized DDoS protection is feasible and effective. The immediate “customers” of the service are the Bittensor validators (who act as testers, as we will see) and the Bittensor ecosystem itself (gaining security know-how). However, the long-term vision is to offer plug-and-play DDoS protection for any internet service or even other Bittensor subnets that need to secure their nodes. By developing in the Bittensor environment first, Tensorprox can mature its technology with a built-in community and economic model. Eventually, businesses or individual server owners could use Tensorprox to protect their public IPs from DDoS attacks, essentially becoming clients of this decentralized scrubbing network.
Overall, the purpose of Tensorprox is to push the boundaries of cybersecurity through decentralization. It demonstrates a novel use case for Bittensor (securing network infrastructure) beyond the more common AI-model serving tasks. If successful, Tensorprox could significantly enhance the security of decentralized networks by providing community-powered DDoS defense and set a precedent for other security-focused subnets. As the team puts it, “Tensorprox is building the future of decentralized cybersecurity”– a future where anyone can deploy powerful protection in seconds, backed by a global network of incentivized defenders.
Design and Operation: How Tensorprox Works
Tensorprox introduces an innovative design for DDoS protection by using Bittensor’s miner/validator framework to continuously simulate attacks and test defenses. The subnet operates with two main participant roles familiar in Bittensor: miners and validators – but here their roles are tailored to cybersecurity:
Challenge-Response Cycle: The interaction between validators and miners is the heart of Tensorprox’s operation. For a given round, a validator (or a set of validators) will connect to the miner’s testing environment via a secure channel (SSH, as configured – more on this in architecture). The validator deploys one or more Traffic Generator (TGen) processes on machines that the miner provides access to, and designates a King server (the target to protect) in that miner’s environment. The traffic generators then begin sending traffic to the King server through the miner’s Moat. This traffic is dynamically configured each round: one moment it might be mostly normal traffic (to see if the miner allows good traffic through), the next moment it might spike with a flood of simulated attack packets (to test the miner’s blocking under pressure). The miner’s Moat has to continuously adapt, letting benign traffic reach the King while diverting or dropping the malicious packets.
During this process, validators collect detailed telemetry:
At the end of the round, the validator uses these measurements to compute an overall score for the miner. Tensorprox’s incentive model is explicitly defined as a weighted combination of Accuracy, Efficiency, Throughput, and Latency components (each 25%). In simplified terms, miners earn the highest rewards if they consistently allow most or all benign traffic (high BDR), block nearly all attack traffic (high AMA), handle large volumes of packets (high throughput), and do so with minimal delay (low latency). This comprehensive scoring mechanism ensures that miners can’t “game” the system by focusing on one metric alone – they need to balance all aspects of performance (for example, a miner that blocks everything including good traffic would have great attack mitigation but terrible benign delivery, resulting in a poor score). The validators’ scores are then submitted on-chain, and the Bittensor protocol allocates the newly emitted TAO accordingly: miners with better scores get a larger share of the reward for that round.
From a user perspective, at this stage of development, Tensorprox is mostly an infrastructure and developer-focused product. It doesn’t yet offer a plug-and-play interface for a website owner to protect their site. However, everything needed to participate in and benefit from Tensorprox is publicly available:
The operation of Tensorprox today involves validators simulating attacks and scoring miners, and miners running firewall nodes to earn rewards by protecting a dummy target. The product is currently the network itself – a proving ground for decentralized DDoS defense techniques. As it matures, this will evolve into a more user-facing service (where real clients could route their traffic through Tensorprox nodes for protection). Even in its current form, Tensorprox provides immediate value to the Bittensor ecosystem: it’s a live, constantly-improving cybersecurity experiment that not only secures the subnet’s own infrastructure but also generates knowledge and tooling that could secure other parts of the network.
Technical Architecture and Components
The Tensorprox subnet employs a clever distributed architecture to simulate realistic network attacks and test defenses in a safe yet rigorous environment. The design is centered around a few key components and concepts:
Network Topology: To create a realistic yet controlled testbed, Tensorprox uses an overlay network built with GRE (Generic Routing Encapsulation) and IP-in-IP tunnels. All the involved nodes (TGen machines, Moat/miner machine, and King) are networked together in this overlay:
The use of GRE/IP tunnels is crucial. It enables simulation of complex attack scenarios (including IP spoofing) in a controlled way. For example, a common DDoS tactic is to use fake source IP addresses. In a normal cloud environment, you often can’t send packets with arbitrary source IPs (ISPs will drop them). But within this GRE/IPIP sandbox, the validators can generate traffic that appears to come from random or globally distributed IP addresses, testing whether the miner’s defense can handle such conditions. All of this malicious traffic remains contained in the overlay and does not impact the public internet – making it a safe arena for stress-testing. The architecture essentially provides a “virtual battleground” where attacks and defenses can play out realistically without collateral damage.
Performance Scaling and Fairness: Tensorprox’s architecture accounts for both scalability and fairness in several ways:
Scalable Traffic for Miners: Miners are allowed to increase the number of traffic generator nodes they provide over time to handle more load. If a miner proves capable of filtering a high volume of traffic accurately, they are incentivized to add another TGen machine to push even more traffic through their Moat (thus potentially earning more if they can handle it). However, this is regulated by the reward function – simply adding more traffic without maintaining filtering quality won’t yield rewards. The reward mechanism, by incorporating throughput and accuracy, ensures that only miners who can both scale up and keep a high mitigation rate benefit from deploying many TGens. This creates a natural balance: miners start with perhaps a modest setup and as they optimize their system, they can scale out, but always need to keep performance high.
Validator Coordination: In a decentralized setting with multiple validators, Tensorprox enforces that validators operate in a synchronized and non-overlapping fashion. All validators coordinate their challenge rounds using a universal timestamp trigger, so that each testing round starts at the same time for everyone. This prevents timing advantages or a validator running extra rounds unfairly. Moreover, the design guarantees mutual exclusivity, meaning no two validators will try to validate the same miner at the same time (and conversely, each validator works on a distinct subset of miners each round). This ensures every miner is tested and scored uniformly and avoids duplicated work.
Security and Access Control: A very important aspect of the architecture is that miners must grant controlled SSH access to their machines so validators can deploy scripts and run traffic generators. To make this secure, Tensorprox implements a Whitelist-Agent on the miner side. This is a custom security daemon that intercepts any command a validator tries to execute over the SSH session and checks it against an approved list of actions. Validators are only allowed to run the predefined traffic generation and monitoring scripts needed for the challenge; anything outside that (e.g., trying to access miner’s filesystem or run arbitrary commands) would be blocked. Additionally, all scripts are verified by checksum (SHA-256) before execution to ensure they haven’t been tampered with. This protects the miner from malicious validators and also ensures validators can’t cheat by modifying test scripts on the fly. In essence, even though validators get access to miner-provided machines, that access is sandboxed and tightly controlled.
Protocol Integration: On the blockchain side, Tensorprox uses Bittensor’s subtensor mechanism to register miners and validators (each identified by wallet hotkeys) and to log scores. The netuid 91 identifies this subnet on-chain, and participants register to that netuid to join. The substrate chain stores the stake, ranks, and incentive weights for Tensorprox miners as with any subnet. Thus, the fundamental consensus mechanism of Bittensor (where validators’ scores translate into adjusting miners’ stake weight for token emission) underpins Tensorprox’s economics. The TAO tokenomics are inherited from Bittensor – Tensorprox did not need to create a new token, which lowers the barrier for participation and ties the subnet’s success to the broader TAO economy. Community members can also stake/delegate TAO to Tensorprox validators if they believe in the subnet, further rooting it in the ecosystem.
To visualize the above, imagine each miner as a mini fortress: It has a King inside (the asset to protect), a Moat around it (the filtering barrier), and the validators act like sporadic “stress testers” who send volleys of good and bad “traffic” at the fortress to see how well the moat holds. The entire fortress and attack simulation is built on a virtual land (the GRE tunnel network) that mimics the internet. This architecture is both complex and cutting-edge: it blends network engineering (tunneling, traffic generation), cybersecurity (intrusion detection systems), and blockchain-based incentive alignment. Tensorprox’s technical design allows it to evolve quickly – the team can introduce new attack patterns, new scoring rules, or allow miners to integrate new defense algorithms, all within this flexible sandbox. As attacks become more sophisticated, the decentralized defense can also adapt in a competitive Darwinian fashion.
Tensorprox’s mission is to provide a decentralized defense against DDoS attacks and other high-impact cyber threats. It serves as an “ultimate scrubbing center for cyber defense” within the Bittensor network. In traditional terms, a scrubbing center is a system that cleanses incoming traffic to remove malicious packets before they reach a protected server. Tensorprox implements this concept in a decentralized way: instead of a single entity or data center filtering traffic, a network of community-run nodes (miners) competes and collaborates to scrub traffic. This offers several advantages:
Robust DDoS Mitigation: Tensorprox leverages competitive and collaborative efforts of miners to develop highly selective filtering protocols, yielding scalable and resilient protection against malicious traffic. The system is designed to handle evolving attack vectors by continuously improving through competition.
Decentralized Excellence: By harnessing a distributed network of independent nodes, Tensorprox eliminates single points of failure in DDoS defense. No single firewall or server is solely responsible; many nodes worldwide can share the load and back each other up. This decentralization increases resilience: even if some nodes fail or are overwhelmed, others can continue defending, and the system as a whole adapts to new threats.
AI-Driven Precision: Tensorprox integrates machine learning for anomaly detection. Each mining node can run advanced detection algorithms to identify attacks versus normal traffic. The AI models (or rule-based heuristics) used by miners continuously evolve based on feedback and competition, ensuring state-of-the-art detection capabilities tuned to real-world attack patterns.
Incentive Alignment via Bittensor: The value of Tensorprox within Bittensor is that it transforms DDoS mitigation into a tokenized, incentivized service. Bittensor’s protocol emits TAO rewards to participants (miners and validators) proportional to the value they contribute. In Tensorprox, this means miners who are most effective at blocking attacks and allowing legitimate traffic will earn more TAO. The subnet essentially creates a marketplace for DDoS defense – encouraging innovation as miners strive to build better defenses to earn rewards. This competitive model drives rapid improvement in cyber defense strategies, guided by real performance metrics rather than just theoretical promise.
Use Cases: Initially, Tensorprox operates as a research and development subnet to prove that decentralized DDoS protection is feasible and effective. The immediate “customers” of the service are the Bittensor validators (who act as testers, as we will see) and the Bittensor ecosystem itself (gaining security know-how). However, the long-term vision is to offer plug-and-play DDoS protection for any internet service or even other Bittensor subnets that need to secure their nodes. By developing in the Bittensor environment first, Tensorprox can mature its technology with a built-in community and economic model. Eventually, businesses or individual server owners could use Tensorprox to protect their public IPs from DDoS attacks, essentially becoming clients of this decentralized scrubbing network.
Overall, the purpose of Tensorprox is to push the boundaries of cybersecurity through decentralization. It demonstrates a novel use case for Bittensor (securing network infrastructure) beyond the more common AI-model serving tasks. If successful, Tensorprox could significantly enhance the security of decentralized networks by providing community-powered DDoS defense and set a precedent for other security-focused subnets. As the team puts it, “Tensorprox is building the future of decentralized cybersecurity”– a future where anyone can deploy powerful protection in seconds, backed by a global network of incentivized defenders.
Design and Operation: How Tensorprox Works
Tensorprox introduces an innovative design for DDoS protection by using Bittensor’s miner/validator framework to continuously simulate attacks and test defenses. The subnet operates with two main participant roles familiar in Bittensor: miners and validators – but here their roles are tailored to cybersecurity:
Challenge-Response Cycle: The interaction between validators and miners is the heart of Tensorprox’s operation. For a given round, a validator (or a set of validators) will connect to the miner’s testing environment via a secure channel (SSH, as configured – more on this in architecture). The validator deploys one or more Traffic Generator (TGen) processes on machines that the miner provides access to, and designates a King server (the target to protect) in that miner’s environment. The traffic generators then begin sending traffic to the King server through the miner’s Moat. This traffic is dynamically configured each round: one moment it might be mostly normal traffic (to see if the miner allows good traffic through), the next moment it might spike with a flood of simulated attack packets (to test the miner’s blocking under pressure). The miner’s Moat has to continuously adapt, letting benign traffic reach the King while diverting or dropping the malicious packets.
During this process, validators collect detailed telemetry:
At the end of the round, the validator uses these measurements to compute an overall score for the miner. Tensorprox’s incentive model is explicitly defined as a weighted combination of Accuracy, Efficiency, Throughput, and Latency components (each 25%). In simplified terms, miners earn the highest rewards if they consistently allow most or all benign traffic (high BDR), block nearly all attack traffic (high AMA), handle large volumes of packets (high throughput), and do so with minimal delay (low latency). This comprehensive scoring mechanism ensures that miners can’t “game” the system by focusing on one metric alone – they need to balance all aspects of performance (for example, a miner that blocks everything including good traffic would have great attack mitigation but terrible benign delivery, resulting in a poor score). The validators’ scores are then submitted on-chain, and the Bittensor protocol allocates the newly emitted TAO accordingly: miners with better scores get a larger share of the reward for that round.
From a user perspective, at this stage of development, Tensorprox is mostly an infrastructure and developer-focused product. It doesn’t yet offer a plug-and-play interface for a website owner to protect their site. However, everything needed to participate in and benefit from Tensorprox is publicly available:
The operation of Tensorprox today involves validators simulating attacks and scoring miners, and miners running firewall nodes to earn rewards by protecting a dummy target. The product is currently the network itself – a proving ground for decentralized DDoS defense techniques. As it matures, this will evolve into a more user-facing service (where real clients could route their traffic through Tensorprox nodes for protection). Even in its current form, Tensorprox provides immediate value to the Bittensor ecosystem: it’s a live, constantly-improving cybersecurity experiment that not only secures the subnet’s own infrastructure but also generates knowledge and tooling that could secure other parts of the network.
Technical Architecture and Components
The Tensorprox subnet employs a clever distributed architecture to simulate realistic network attacks and test defenses in a safe yet rigorous environment. The design is centered around a few key components and concepts:
Network Topology: To create a realistic yet controlled testbed, Tensorprox uses an overlay network built with GRE (Generic Routing Encapsulation) and IP-in-IP tunnels. All the involved nodes (TGen machines, Moat/miner machine, and King) are networked together in this overlay:
The use of GRE/IP tunnels is crucial. It enables simulation of complex attack scenarios (including IP spoofing) in a controlled way. For example, a common DDoS tactic is to use fake source IP addresses. In a normal cloud environment, you often can’t send packets with arbitrary source IPs (ISPs will drop them). But within this GRE/IPIP sandbox, the validators can generate traffic that appears to come from random or globally distributed IP addresses, testing whether the miner’s defense can handle such conditions. All of this malicious traffic remains contained in the overlay and does not impact the public internet – making it a safe arena for stress-testing. The architecture essentially provides a “virtual battleground” where attacks and defenses can play out realistically without collateral damage.
Performance Scaling and Fairness: Tensorprox’s architecture accounts for both scalability and fairness in several ways:
Scalable Traffic for Miners: Miners are allowed to increase the number of traffic generator nodes they provide over time to handle more load. If a miner proves capable of filtering a high volume of traffic accurately, they are incentivized to add another TGen machine to push even more traffic through their Moat (thus potentially earning more if they can handle it). However, this is regulated by the reward function – simply adding more traffic without maintaining filtering quality won’t yield rewards. The reward mechanism, by incorporating throughput and accuracy, ensures that only miners who can both scale up and keep a high mitigation rate benefit from deploying many TGens. This creates a natural balance: miners start with perhaps a modest setup and as they optimize their system, they can scale out, but always need to keep performance high.
Validator Coordination: In a decentralized setting with multiple validators, Tensorprox enforces that validators operate in a synchronized and non-overlapping fashion. All validators coordinate their challenge rounds using a universal timestamp trigger, so that each testing round starts at the same time for everyone. This prevents timing advantages or a validator running extra rounds unfairly. Moreover, the design guarantees mutual exclusivity, meaning no two validators will try to validate the same miner at the same time (and conversely, each validator works on a distinct subset of miners each round). This ensures every miner is tested and scored uniformly and avoids duplicated work.
Security and Access Control: A very important aspect of the architecture is that miners must grant controlled SSH access to their machines so validators can deploy scripts and run traffic generators. To make this secure, Tensorprox implements a Whitelist-Agent on the miner side. This is a custom security daemon that intercepts any command a validator tries to execute over the SSH session and checks it against an approved list of actions. Validators are only allowed to run the predefined traffic generation and monitoring scripts needed for the challenge; anything outside that (e.g., trying to access miner’s filesystem or run arbitrary commands) would be blocked. Additionally, all scripts are verified by checksum (SHA-256) before execution to ensure they haven’t been tampered with. This protects the miner from malicious validators and also ensures validators can’t cheat by modifying test scripts on the fly. In essence, even though validators get access to miner-provided machines, that access is sandboxed and tightly controlled.
Protocol Integration: On the blockchain side, Tensorprox uses Bittensor’s subtensor mechanism to register miners and validators (each identified by wallet hotkeys) and to log scores. The netuid 91 identifies this subnet on-chain, and participants register to that netuid to join. The substrate chain stores the stake, ranks, and incentive weights for Tensorprox miners as with any subnet. Thus, the fundamental consensus mechanism of Bittensor (where validators’ scores translate into adjusting miners’ stake weight for token emission) underpins Tensorprox’s economics. The TAO tokenomics are inherited from Bittensor – Tensorprox did not need to create a new token, which lowers the barrier for participation and ties the subnet’s success to the broader TAO economy. Community members can also stake/delegate TAO to Tensorprox validators if they believe in the subnet, further rooting it in the ecosystem.
To visualize the above, imagine each miner as a mini fortress: It has a King inside (the asset to protect), a Moat around it (the filtering barrier), and the validators act like sporadic “stress testers” who send volleys of good and bad “traffic” at the fortress to see how well the moat holds. The entire fortress and attack simulation is built on a virtual land (the GRE tunnel network) that mimics the internet. This architecture is both complex and cutting-edge: it blends network engineering (tunneling, traffic generation), cybersecurity (intrusion detection systems), and blockchain-based incentive alignment. Tensorprox’s technical design allows it to evolve quickly – the team can introduce new attack patterns, new scoring rules, or allow miners to integrate new defense algorithms, all within this flexible sandbox. As attacks become more sophisticated, the decentralized defense can also adapt in a competitive Darwinian fashion.
Tensorprox was conceptualized and built by Shugo LTD, a startup dedicated to next-generation cybersecurity solutions. The core team publicly consists of two co-founders, each bringing complementary expertise:
Felix Eggstein – Co-founder & CEO: Felix is a cybersecurity and network specialist with 10+ years of experience. Prior to Tensorprox, he has been involved in designing and implementing network security solutions for both small/medium businesses and Fortune 500 companies. As CEO of Shugo, Felix drives the strategic vision and ensures the project addresses real-world security needs. His background suggests a strong foundation in practical cybersecurity – likely contributing to Tensorprox’s focus on DDoS, a very concrete and impactful threat. Felix’s handle “performator” may also hint at his focus on performance optimization in network systems. He is active in the Bittensor community channels and likely coordinates outreach (for example, posting updates on LinkedIn under Shugo’s account). Under Felix’s leadership, Shugo aims to deliver enterprise-grade security capabilities through decentralized tech.
Nabil Ratbi – Co-founder & CTO: Nabil is the technical architect and software engineering lead for Tensorprox. He has ~8 years of experience in building scalable systems and data-driven applications, which is crucial for creating the distributed architecture of Tensorprox. Importantly, Nabil was an early participant in the Bittensor network – he is noted as an “early Bittensor miner with deep expertise across various subnets.”This indicates that before founding Shugo, Nabil was already mining on Bittensor (potentially on the foundational language-model subnet or others), giving him firsthand understanding of the network’s mechanics and culture. This experience has likely been invaluable in designing Tensorprox’s incentive mechanisms and in navigating the subtleties of developing a new subnet on Bittensor. Nabil’s alias “borgg” or “metaborgg” appears on social media; for instance, he tweeted about the upcoming launch of Tensorprox, describing it as a “collaborative, decentralized cybersecurity solution”. As CTO, he is responsible for the core code (which is hosted in Shugo’s GitHub repository) and for implementing the complex validation logic, networking, and machine learning components of Tensorprox.
The team operates under the company Shugo.io, which positions itself as a pioneer in decentralized cybersecurity. The name “Shugo” itself means “guardian” or “protector” in Japanese, befitting their mission. On their official website, Shugo emphasizes combining cutting-edge AI with decentralized network architecture to deliver robust DDoS detection solutions. This mission statement reflects the team’s blend of AI and security expertise.
Tensorprox was conceptualized and built by Shugo LTD, a startup dedicated to next-generation cybersecurity solutions. The core team publicly consists of two co-founders, each bringing complementary expertise:
Felix Eggstein – Co-founder & CEO: Felix is a cybersecurity and network specialist with 10+ years of experience. Prior to Tensorprox, he has been involved in designing and implementing network security solutions for both small/medium businesses and Fortune 500 companies. As CEO of Shugo, Felix drives the strategic vision and ensures the project addresses real-world security needs. His background suggests a strong foundation in practical cybersecurity – likely contributing to Tensorprox’s focus on DDoS, a very concrete and impactful threat. Felix’s handle “performator” may also hint at his focus on performance optimization in network systems. He is active in the Bittensor community channels and likely coordinates outreach (for example, posting updates on LinkedIn under Shugo’s account). Under Felix’s leadership, Shugo aims to deliver enterprise-grade security capabilities through decentralized tech.
Nabil Ratbi – Co-founder & CTO: Nabil is the technical architect and software engineering lead for Tensorprox. He has ~8 years of experience in building scalable systems and data-driven applications, which is crucial for creating the distributed architecture of Tensorprox. Importantly, Nabil was an early participant in the Bittensor network – he is noted as an “early Bittensor miner with deep expertise across various subnets.”This indicates that before founding Shugo, Nabil was already mining on Bittensor (potentially on the foundational language-model subnet or others), giving him firsthand understanding of the network’s mechanics and culture. This experience has likely been invaluable in designing Tensorprox’s incentive mechanisms and in navigating the subtleties of developing a new subnet on Bittensor. Nabil’s alias “borgg” or “metaborgg” appears on social media; for instance, he tweeted about the upcoming launch of Tensorprox, describing it as a “collaborative, decentralized cybersecurity solution”. As CTO, he is responsible for the core code (which is hosted in Shugo’s GitHub repository) and for implementing the complex validation logic, networking, and machine learning components of Tensorprox.
The team operates under the company Shugo.io, which positions itself as a pioneer in decentralized cybersecurity. The name “Shugo” itself means “guardian” or “protector” in Japanese, befitting their mission. On their official website, Shugo emphasizes combining cutting-edge AI with decentralized network architecture to deliver robust DDoS detection solutions. This mission statement reflects the team’s blend of AI and security expertise.
Phase 1: Foundation Forge – Building the Competitive Core. This is the current phase (as of launch) focused on establishing all fundamental architecture and features needed for a functional decentralized DDoS scrubber. Key milestones include:
According to the roadmap, most of these foundation tasks are nearly complete (e.g., core architecture 95% done, while performance monitoring tools were at ~40% at last update). Indeed, by the time of launch, the essential pieces were in place and tested. The success of a “flawless” launch implies the Foundation phase delivered a working product. Finishing the remaining few items (perhaps refining monitoring, documentation, etc.) will transition the project into the next phase.
Phase 2: Network Maturity – Evolution Through Competition. Once the basics are in place, Tensorprox will focus on improving sophistication and efficiency of the defense through the competitive dynamics of the network:
Advanced Detection: Encouraging and integrating more advanced attack detection capabilities. This could mean developing or allowing new machine learning models for miners to use, detecting more subtle attack patterns, or identifying complex multi-vector attacks. Essentially, the subnet should start catching not just brute-force floods but smarter attacks. The competition among miners will drive innovation here – the roadmap suggests fostering development of sophisticated pattern recognition by miners (perhaps through grants or just the incentive of higher scores).
Performance Scaling: Further increasing the network’s capacity – scaling bandwidth and reducing latency. Even though Phase 1 allows basic scaling (adding TGen nodes), Phase 2 might involve optimizing the code to handle even more traffic per node, improving the underlying network throughput, and minimizing any overhead. They want the subnet to handle larger attacks and do so faster.
Cooperative Defense: Implementing cross-node cooperation and failover. This is a notable step: it suggests that in the future, miners might not work in complete isolation. For example, miners could share threat intelligence with each other in real-time or form a multi-node defense cluster around a particularly large attack. Also, if one miner fails or goes down, another could take over protecting a given target (ensuring continuity). Achieving cooperative defense in a decentralized setting is challenging, but it could dramatically improve resilience. This might involve creating protocols for miners to communicate or consensus on threat data. It’s slated for Phase 2, meaning the team sees it as an essential part of reaching a mature state.
As of the latest roadmap update, Phase 2 tasks were 0% complete – understandable, since the team only just completed Phase 1 and launched the subnet. We can expect Phase 2 to unfold in the months following launch, gradually rolling out these enhancements. This will likely be a period of rapid iteration, guided by real data from Phase 1. For instance, if certain types of attacks consistently fool miners, the team might prioritize adding detection for those in advanced detection.
Phase 3: Ecosystem Integration – Protection for All. This phase shifts the focus from just the Tensorprox subnet itself to its usability and integration with external systems and users. Major goals include:
Plug & Play Platform: Launching an easy-to-use platform where anyone (even non-technical users) can deploy DDoS protection with one click. This likely means packaging the Tensorprox miner into a container or a one-command deployment that automatically sets up the necessary components (perhaps simplifying the requirement of setting up TGen and King machines). The roadmap explicitly mentions a containerized protection solution for easy integration. We might see something like a Docker image or a script that quickly sets up a protected proxy in front of your server which ties into the Tensorprox network.
Bittensor Integration: Closer integration of Tensorprox with other Bittensor subnets and the broader blockchain ecosystem. One idea could be offering DDoS protection as a service to other Bittensor miners/validators. For example, other subnets’ nodes could route their traffic through Tensorprox miners for protection (especially important if Bittensor validators themselves face DDoS). They also mention specialized protection profiles for blockchain infrastructure, suggesting tailor-made defenses for nodes (like RPC endpoint protection, etc.). This step will cement Tensorprox as a utility service within the Bittensor network, not just an isolated experiment.
Developer Tools and API: Developing an API suite and tools for developers to build custom solutions on top of Tensorprox. This could mean exposing APIs for managing protection (e.g., to request protection for an IP or to retrieve threat analytics), or tools for miners to plug in custom models easily. Comprehensive documentation and integration guides are planned here as well. Essentially, Phase 3 aims to make Tensorprox accessible to a wider audience – businesses, other devs, and community members – by providing polished interfaces and support.
Service Tiers and SLAs: Introducing tiered service models with performance guarantees. As Tensorprox moves towards being a service, not all users may require the same level of protection. The team might create tiers (for example: a free community tier, a premium tier for enterprise with guaranteed mitigation capacity, etc.). Real-time performance verification and reporting would back these guarantees. This indicates a commercialization aspect – perhaps integrating some payment model or staking-for-service model beyond just the TAO incentives, especially for guaranteed service levels. It’s an interesting mix of decentralized network with potentially centralized service agreements, which will need careful design to maintain trustlessness.
Phase 3 is where Tensorprox becomes productized for end users. It moves from “you can join our network if you’re savvy” to “you can use our network to protect yourself even if you’re not deeply involved in Bittensor.” Achieving this will likely require significant development and testing, and none of it had started (0% complete) as of the roadmap update. This phase might take shape after the network has proven itself in Phase 2, possibly later in 2025.
Phase 4: Global Expansion – Beyond Bittensor. In the final envisioned phase, Tensorprox aims to scale out in scope and ambition to become a worldwide cybersecurity infrastructure:
Enterprise Solutions: Expanding to enterprise-grade protection, including a management console for multi-site protection. This means courting large organizations to use Tensorprox tech to protect their assets, and providing them with the tooling to manage multiple protected sites, view analytics, and control settings – all with the ease they expect from commercial solutions. Essentially, compete with or complement traditional DDoS protection services (like Cloudflare, Akamai, etc.) by offering a decentralized alternative.
Global Network: Building a global protection network with geographic redundancy. By Phase 4, Tensorprox should have miners distributed worldwide. The goal is to ensure that wherever an attack originates or wherever a service is located, Tensorprox has nodes nearby to handle traffic efficiently. Geographic redundancy also implies if one region’s nodes go down, others can cover – truly a cloud of scrubbing centers. Establishing strategic partnerships with major hosting providers is mentioned, which could involve collaborations with cloud data centers or ISPs to deploy Tensorprox nodes at key internet exchange points for maximum effectiveness.
Threat Intelligence Sharing: Developing advanced threat intelligence capabilities. This likely builds upon the cooperative defense in Phase 2, but on a larger scale: Tensorprox nodes could share learned attack signatures, new attack trends, and mitigations globally in real-time. If one node sees a brand new attack type, it could distribute a signature or model update so that others can preemptively block it. Automatic signature sharing across protection nodes is envisaged, potentially turning Tensorprox into a decentralized threat intelligence network akin to how some security companies share feeds of known bad IPs or DDoS fingerprints.
Industry Leadership: By this point, the aim is for Tensorprox to be recognized as a new standard in distributed security. The team wants to lead the development of industry standards for decentralized protection, meaning they might engage in publishing research, working with standards bodies, or influencing how others design similar systems. Essentially, not just be a product, but a thought leader in reimagining cybersecurity using decentralization.
All Phase 4 items are aspirational (0% complete), but they paint a picture of the ultimate trajectory: Tensorprox evolving from a Bittensor subnet into a global decentralized cybersecurity platform with commercial adoption and recognition. This doesn’t necessarily mean leaving Bittensor – rather, Bittensor could be the backbone that empowers this global network, or they might interoperate with other networks as well.
Current Status and Timeline: As of now (Q2 2025), Tensorprox has completed the bulk of Phase 1 and is likely entering Phase 2. The first weeks of operation have been about stabilizing the subnet and ensuring the incentive model works as intended. The team reported after week one that the incentive distribution is functioning and even made some adjustments (the tweet hinting “We have changed the …” possibly refers to tweaking parameters based on week-one results). We can expect Phase 2 (Maturity) to be an ongoing process over the next couple of quarters: implementing advanced detection might be iterative as miners try new models; scaling will come naturally as more miners join with better hardware; cooperative defenses might be tested in the community. By late 2025, if Phase 2 is successful, Phase 3 integration efforts could begin, making it easier for others to use Tensorprox’s protection (perhaps a beta service for select partners). Phase 4 is more of a long-term vision – 2026 and beyond – which will depend on how widely Tensorprox is adopted.
To conclude the roadmap, it’s clear the Tensorprox team has big ambitions. They are effectively aiming to disrupt a segment of the cybersecurity industry (DDoS protection) by using a decentralized, crypto-incentivized model. If they follow through, Tensorprox could move from being “Subnet 91 of Bittensor” to a notable player in cybersecurity at large. Importantly, each phase of the roadmap is grounded in concrete technical goals, which gives credibility to their vision. The phased approach also allows the project to deliver incremental value: right now, the Bittensor community benefits; in a later phase, potentially any internet user could benefit.
Phase 1: Foundation Forge – Building the Competitive Core. This is the current phase (as of launch) focused on establishing all fundamental architecture and features needed for a functional decentralized DDoS scrubber. Key milestones include:
According to the roadmap, most of these foundation tasks are nearly complete (e.g., core architecture 95% done, while performance monitoring tools were at ~40% at last update). Indeed, by the time of launch, the essential pieces were in place and tested. The success of a “flawless” launch implies the Foundation phase delivered a working product. Finishing the remaining few items (perhaps refining monitoring, documentation, etc.) will transition the project into the next phase.
Phase 2: Network Maturity – Evolution Through Competition. Once the basics are in place, Tensorprox will focus on improving sophistication and efficiency of the defense through the competitive dynamics of the network:
Advanced Detection: Encouraging and integrating more advanced attack detection capabilities. This could mean developing or allowing new machine learning models for miners to use, detecting more subtle attack patterns, or identifying complex multi-vector attacks. Essentially, the subnet should start catching not just brute-force floods but smarter attacks. The competition among miners will drive innovation here – the roadmap suggests fostering development of sophisticated pattern recognition by miners (perhaps through grants or just the incentive of higher scores).
Performance Scaling: Further increasing the network’s capacity – scaling bandwidth and reducing latency. Even though Phase 1 allows basic scaling (adding TGen nodes), Phase 2 might involve optimizing the code to handle even more traffic per node, improving the underlying network throughput, and minimizing any overhead. They want the subnet to handle larger attacks and do so faster.
Cooperative Defense: Implementing cross-node cooperation and failover. This is a notable step: it suggests that in the future, miners might not work in complete isolation. For example, miners could share threat intelligence with each other in real-time or form a multi-node defense cluster around a particularly large attack. Also, if one miner fails or goes down, another could take over protecting a given target (ensuring continuity). Achieving cooperative defense in a decentralized setting is challenging, but it could dramatically improve resilience. This might involve creating protocols for miners to communicate or consensus on threat data. It’s slated for Phase 2, meaning the team sees it as an essential part of reaching a mature state.
As of the latest roadmap update, Phase 2 tasks were 0% complete – understandable, since the team only just completed Phase 1 and launched the subnet. We can expect Phase 2 to unfold in the months following launch, gradually rolling out these enhancements. This will likely be a period of rapid iteration, guided by real data from Phase 1. For instance, if certain types of attacks consistently fool miners, the team might prioritize adding detection for those in advanced detection.
Phase 3: Ecosystem Integration – Protection for All. This phase shifts the focus from just the Tensorprox subnet itself to its usability and integration with external systems and users. Major goals include:
Plug & Play Platform: Launching an easy-to-use platform where anyone (even non-technical users) can deploy DDoS protection with one click. This likely means packaging the Tensorprox miner into a container or a one-command deployment that automatically sets up the necessary components (perhaps simplifying the requirement of setting up TGen and King machines). The roadmap explicitly mentions a containerized protection solution for easy integration. We might see something like a Docker image or a script that quickly sets up a protected proxy in front of your server which ties into the Tensorprox network.
Bittensor Integration: Closer integration of Tensorprox with other Bittensor subnets and the broader blockchain ecosystem. One idea could be offering DDoS protection as a service to other Bittensor miners/validators. For example, other subnets’ nodes could route their traffic through Tensorprox miners for protection (especially important if Bittensor validators themselves face DDoS). They also mention specialized protection profiles for blockchain infrastructure, suggesting tailor-made defenses for nodes (like RPC endpoint protection, etc.). This step will cement Tensorprox as a utility service within the Bittensor network, not just an isolated experiment.
Developer Tools and API: Developing an API suite and tools for developers to build custom solutions on top of Tensorprox. This could mean exposing APIs for managing protection (e.g., to request protection for an IP or to retrieve threat analytics), or tools for miners to plug in custom models easily. Comprehensive documentation and integration guides are planned here as well. Essentially, Phase 3 aims to make Tensorprox accessible to a wider audience – businesses, other devs, and community members – by providing polished interfaces and support.
Service Tiers and SLAs: Introducing tiered service models with performance guarantees. As Tensorprox moves towards being a service, not all users may require the same level of protection. The team might create tiers (for example: a free community tier, a premium tier for enterprise with guaranteed mitigation capacity, etc.). Real-time performance verification and reporting would back these guarantees. This indicates a commercialization aspect – perhaps integrating some payment model or staking-for-service model beyond just the TAO incentives, especially for guaranteed service levels. It’s an interesting mix of decentralized network with potentially centralized service agreements, which will need careful design to maintain trustlessness.
Phase 3 is where Tensorprox becomes productized for end users. It moves from “you can join our network if you’re savvy” to “you can use our network to protect yourself even if you’re not deeply involved in Bittensor.” Achieving this will likely require significant development and testing, and none of it had started (0% complete) as of the roadmap update. This phase might take shape after the network has proven itself in Phase 2, possibly later in 2025.
Phase 4: Global Expansion – Beyond Bittensor. In the final envisioned phase, Tensorprox aims to scale out in scope and ambition to become a worldwide cybersecurity infrastructure:
Enterprise Solutions: Expanding to enterprise-grade protection, including a management console for multi-site protection. This means courting large organizations to use Tensorprox tech to protect their assets, and providing them with the tooling to manage multiple protected sites, view analytics, and control settings – all with the ease they expect from commercial solutions. Essentially, compete with or complement traditional DDoS protection services (like Cloudflare, Akamai, etc.) by offering a decentralized alternative.
Global Network: Building a global protection network with geographic redundancy. By Phase 4, Tensorprox should have miners distributed worldwide. The goal is to ensure that wherever an attack originates or wherever a service is located, Tensorprox has nodes nearby to handle traffic efficiently. Geographic redundancy also implies if one region’s nodes go down, others can cover – truly a cloud of scrubbing centers. Establishing strategic partnerships with major hosting providers is mentioned, which could involve collaborations with cloud data centers or ISPs to deploy Tensorprox nodes at key internet exchange points for maximum effectiveness.
Threat Intelligence Sharing: Developing advanced threat intelligence capabilities. This likely builds upon the cooperative defense in Phase 2, but on a larger scale: Tensorprox nodes could share learned attack signatures, new attack trends, and mitigations globally in real-time. If one node sees a brand new attack type, it could distribute a signature or model update so that others can preemptively block it. Automatic signature sharing across protection nodes is envisaged, potentially turning Tensorprox into a decentralized threat intelligence network akin to how some security companies share feeds of known bad IPs or DDoS fingerprints.
Industry Leadership: By this point, the aim is for Tensorprox to be recognized as a new standard in distributed security. The team wants to lead the development of industry standards for decentralized protection, meaning they might engage in publishing research, working with standards bodies, or influencing how others design similar systems. Essentially, not just be a product, but a thought leader in reimagining cybersecurity using decentralization.
All Phase 4 items are aspirational (0% complete), but they paint a picture of the ultimate trajectory: Tensorprox evolving from a Bittensor subnet into a global decentralized cybersecurity platform with commercial adoption and recognition. This doesn’t necessarily mean leaving Bittensor – rather, Bittensor could be the backbone that empowers this global network, or they might interoperate with other networks as well.
Current Status and Timeline: As of now (Q2 2025), Tensorprox has completed the bulk of Phase 1 and is likely entering Phase 2. The first weeks of operation have been about stabilizing the subnet and ensuring the incentive model works as intended. The team reported after week one that the incentive distribution is functioning and even made some adjustments (the tweet hinting “We have changed the …” possibly refers to tweaking parameters based on week-one results). We can expect Phase 2 (Maturity) to be an ongoing process over the next couple of quarters: implementing advanced detection might be iterative as miners try new models; scaling will come naturally as more miners join with better hardware; cooperative defenses might be tested in the community. By late 2025, if Phase 2 is successful, Phase 3 integration efforts could begin, making it easier for others to use Tensorprox’s protection (perhaps a beta service for select partners). Phase 4 is more of a long-term vision – 2026 and beyond – which will depend on how widely Tensorprox is adopted.
To conclude the roadmap, it’s clear the Tensorprox team has big ambitions. They are effectively aiming to disrupt a segment of the cybersecurity industry (DDoS protection) by using a decentralized, crypto-incentivized model. If they follow through, Tensorprox could move from being “Subnet 91 of Bittensor” to a notable player in cybersecurity at large. Importantly, each phase of the roadmap is grounded in concrete technical goals, which gives credibility to their vision. The phased approach also allows the project to deliver incremental value: right now, the Bittensor community benefits; in a later phase, potentially any internet user could benefit.
Keep ahead of the Bittensor exponential development curve…
Subnet Alpha is an informational platform for Bittensor Subnets.
This site is not affiliated with the Opentensor Foundation or TaoStats.
The content provided on this website is for informational purposes only. We make no guarantees regarding the accuracy or currency of the information at any given time.
Subnet Alpha is created and maintained by The Realistic Trader. If you have any suggestions or encounter any issues, please contact us at [email protected].
Copyright 2024