The open protocol
for Bitcoin scaling
OpenArk brings trustless liquidity providers to Bitcoin scaling on Lightning. No single operator. No vendor lock-in.


The problem
What's missing from Ark today
Single-operator trust
In most Ark implementations, one operator (the ASP) holds a single signing key and funds every round with its own capital. Unilateral exit is always available, but day-to-day operation depends entirely on that one party — if the ASP censors, goes offline, or shuts down, users are on their own.
Locked-in liquidity
External capital providers can't participate without trusting the ASP. There's no way for an LP to verify their exit paths before committing funds. This creates a closed system where the ASP controls both operations and liquidity.
Fee extraction
Centralized ASPs recruit wallets, capture fees, and dictate terms. Wallet operators have no sovereignty — they're clients of the ASP, not peers in an open protocol.
Key concepts
The building blocks
Ark Service Provider
The operator that coordinates rounds and cosigns transactions. Can censor but cannot unilaterally spend your funds.
External Liquidity Provider
Supplies on-chain capital to fund rounds. Co-verifies the ASP's threshold key and confirms exit paths before signing.
Virtual Transaction Output
An off-chain representation of a Bitcoin UTXO. Many VTXOs share a single on-chain root, each with a valid spending path for unilateral exit.
Threshold signing scheme
Multi-party Schnorr signing protocol. The ASP key is split across co-verifiers — no single party can sign alone.
Transport layer
ASP-operated relay (NIP-150) for all coordination between ASPs, services, and users. No proprietary APIs.
Cloud agent
A delegated key that handles round participation on your behalf. Separate from the owner key, rekeyable every round.
Why OpenArk
A better foundation for Ark on Lightning
Trustless liquidity
XLPs verify their exit paths cryptographically before committing capital. No trust-based agreements. No single party controls the funds.
Trustless round transitions
Funds move to new rounds via co-verified forfeit transactions. No single party — not even the ASP — can redirect capital.
Key separation
Delegate round participation to a cloud agent without giving spending authority. Stay offline without risking your funds.
Lightning native
HTLC compatible. 4 messages per payment via MuSig2. ARK Services can run their own Lightning nodes, adding routing capacity and strengthening the network topology.
Wallet sovereignty
Wallet operators can run their own ASP and keep their fees. No vendor lock-in, no platform dependency.
Open transport
No proprietary APIs or vendor-specific protocols. Anyone can observe, audit, or build on the protocol.
Built for
Who uses OpenArk
Run your own ASP
Embed Ark directly into your wallet. Control your fee structure, custody model, and user experience. No middleman taking a cut, no API dependency on a third-party ASP.
- ◆Self-hosted ASP with external liquidity from XLPs
- ◆Keep 100% of transaction fees
- ◆Full control over round timing and capacity
Earn yield on Bitcoin capital
Supply on-chain liquidity to fund rounds. Co-verify exit paths before committing capital — no trust required. Earn fees proportional to your contribution.
- ◆Trustless co-signing via threshold keys
- ◆Verify exit paths cryptographically before each round
- ◆Withdraw capital unilaterally if the ASP misbehaves
Build on an open spec
BOLT-ARK is a protocol specification, not an SDK. Build your own implementation, integrate with existing infrastructure, or extend the protocol.
- ◆Open-source reference implementation
- ◆Nostr-based transport — no proprietary APIs
- ◆HTLC compatible for Lightning interop
How it works
VTXOs, rounds, and trustless exits
Join a round
The ASP announces a new round. Users declare their intentions — onboard, transfer, or offboard. The VTXO tree is constructed.
Sign and anchor
Everyone verifies the tree, signs the forfeit and recycle transactions, and the ASP broadcasts the vtxo-root on-chain.
Transact off-chain
Send and receive payments using HTLC-compatible spend requests. 4 messages per payment. No single party controls funds.
Refresh or exit
Capital moves to the next round atomically via forfeit. Offline users are handled by recycle transactions. Unilateral exit is always available.
GatewayLN ↔ Ark
ServiceOn/Off board
Infrastructure
Co-signing needs proximity
Colocated XLPs
XLPs are infrastructure operators, not end users. They run alongside the ASP in the same facility or region — like validators in a consensus network.
Users stay remote
Only the co-signers need proximity. End users connect to the ASP from anywhere — their latency doesn't affect round signing.
Proximity, not trust
Same region for latency, different providers for security. XLPs run on separate infrastructure with isolated key material — a compromised ASP should never be able to reach the XLP's signing keys.

Comparison
How OpenArk compares
OpenArk vs other Ark implementations
Ark Labs and Second are company-backed Ark implementations. OpenArk takes a different approach to liquidity, custody, and operator sovereignty.
| Aspect | OpenArk | Single-ASP Ark |
|---|---|---|
| Liquidity providers | Trustless XLPs verify exit paths cryptographically before signing | ASP provides all liquidity; no external LPs |
| ASP operation | Any wallet can run an ASP with external liquidity | Wallets can run ASPs but must fund all rounds themselves |
| ASP key | Threshold key shared with XLP co-verifiers | Single operator key |
| Transport | Nostr (NIP-150) — ASP-operated relay, auditable | gRPC / REST — proprietary client-server API |
| Offline handling | Cloud agent handles round transitions automatically | ~30-day VTXO expiry; user must refresh or funds swept |
| Specification | BOLT-ARK — open protocol spec, no SDK lock-in | SDK-driven integration, proprietary extensions |
| Entity | Community-driven protocol; no company, no token | Company-backed implementations (Ark Labs, Second) |
Trustless XLPs verify exit paths cryptographically before signing
ASP provides all liquidity; no external LPs
Any wallet can run an ASP with external liquidity
Wallets can run ASPs but must fund all rounds themselves
Threshold key shared with XLP co-verifiers
Single operator key
Nostr (NIP-150) — ASP-operated relay, auditable
gRPC / REST — proprietary client-server API
Cloud agent handles round transitions automatically
~30-day VTXO expiry; user must refresh or funds swept
BOLT-ARK — open protocol spec, no SDK lock-in
SDK-driven integration, proprietary extensions
Community-driven protocol; no company, no token
Company-backed implementations (Ark Labs, Second)
OpenArk in the Bitcoin L2 landscape
Bitcoin has several scaling approaches. Each makes different tradeoffs around custody, liquidity, and trust.
| Aspect | OpenArk | Lightning | Liquid | Fedimint |
|---|---|---|---|---|
| Custody | Threshold key — no single party can spend | Self-custodial (channel-based) | Federated multisig (11-of-15) | Federated multisig (community guardians) |
| Unilateral exit | Always available via VTXO spending path | Force-close to L1 | Not available — federation controls peg-out | Not available — trust the federation |
| Liquidity model | External LPs (XLPs) fund rounds trustlessly | Channel partners lock capital bilaterally | Federation members provide L-BTC backing | Guardian operators hold reserves |
| Lightning interop | Native — HTLC compatible, 4-message payments | Native | Submarine swaps or bridge | Lightning gateways (bridge) |
| Operator sovereignty | Run your own ASP, keep your fees | Run your own node | Apply to join the federation | Deploy your own federation |
| Offline tolerance | Cloud agent participates in rounds automatically | Watchtowers or risk channel theft | Always online (federation handles) | Always online (guardians handle) |
Threshold key — no single party can spend
Self-custodial (channel-based)
Federated multisig (11-of-15)
Federated multisig (community guardians)
Always available via VTXO spending path
Force-close to L1
Not available — federation controls peg-out
Not available — trust the federation
External LPs (XLPs) fund rounds trustlessly
Channel partners lock capital bilaterally
Federation members provide L-BTC backing
Guardian operators hold reserves
Native — HTLC compatible, 4-message payments
Native
Submarine swaps or bridge
Lightning gateways (bridge)
Run your own ASP, keep your fees
Run your own node
Apply to join the federation
Deploy your own federation
Cloud agent participates in rounds automatically
Watchtowers or risk channel theft
Always online (federation handles)
Always online (guardians handle)
Roadmap
From testnet to mainnet
Public testnet
Functional testnet with the core protocol loop running end-to-end. Developers can integrate, test, and break things.
- ◆Testnet ASP deployment
- ◆Open-source SDK and CLI release (LDK based)
- ◆Developer documentation (full VTXO lifecycle)
- ◆NIP-150 Nostr transport reference implementation
- ◆XLP signing ceremony tooling
Mainnet beta
Real sats on a production ASP. Limited capacity, open to early adopters and liquidity providers.
- ◆Live mainnet ASP launch
- ◆Lightning Gateway integration
- ◆Reference wallet (owner key / agent key separation)
- ◆Initial XLP onboarding
- ◆Cloud agent reference implementation
Protocol hardening
Security audits, stress testing, and ecosystem tooling. Making the protocol production-grade.
- ◆Independent security audits
- ◆Network stress testing
- ◆ASP operator toolkit
- ◆Third-party wallet integrations
- ◆BOLT-ARK v1.0 specification freeze
Technical FAQ
Protocol and architecture
Two companies build on the original Ark protocol: Second (bark, Rust, signet) and Ark Labs (Arkade, mainnet beta). Both share the same core limitations that OpenArk addresses:
- Liquidity — single-operator model with no external LPs. OpenArk has trustless XLPs that cryptographically verify exit paths before signing.
- Transport — proprietary APIs (gRPC/REST). OpenArk uses Nostr (NIP-150) with ASP-operated relays.
- Co-verification — single operator key. OpenArk uses a threshold key shared with XLP co-verifiers.
When joining OpenArk, you present two keys: an owner key (full spending authority, stays on your device or cold storage) and an agent key (limited to round participation and fraud monitoring — cannot spend funds).
The agent runs as a lightweight process — a VPS, a wallet provider's background service, or a home server. It connects to the ASP via Nostr and rolls your VTXOs into new rounds automatically, so you can close your wallet and your funds stay current. You can rekey the agent every round.
If the agent goes down, your funds remain safe — claim them via unilateral exit before the VTXO's timelock expires. The agent is a convenience, not a custody requirement.
The threshold group (ASP + XLPs) cannot spend your VTXOs — they don't have your private key. The real risk is a double-spend: the sender colludes with all threshold signers to spend the same input elsewhere. This requires sender + ASP + all co-verifiers to collude. If the sender is the ASP operator, the bar drops to needing all co-verifiers — which is why independent co-verifiers matter.
Out-of-round payments are anchored on-chain with the vtxo-root — once confirmed, they're final. In-round payments rely on the threshold group's honesty until the next round anchors the state. The vulnerability window is only between receiving an in-round payment and the next round confirmation.
Economics & Incentives
Capital, fees, and incentive design
In other Ark implementations, the ASP must lock up matching capital for every user deposit — typically for ~30 days until VTXOs expire. This creates a structural problem:
- To onboard 100 BTC of user funds, the ASP needs ~100 BTC of its own capital locked up
- That capital is frozen until the round expires, so serving more users means raising more external capital indefinitely
- The ASP becomes a capital-intensive business that scales linearly with user deposits — the opposite of what a protocol should do
Capital-intensive ASP operations typically require external funding to scale. OpenArk eliminates this by letting external liquidity providers fund rounds directly.
Get involved
Build on the protocol.
OpenArk is an open protocol — no permission, no vendor, no gatekeeper. Clone the repo and start building.
