TRCT VC // THESIS // MMXXV

THE NEXT DECADE
IS A CUSTODY WAR.

Surveillance is the default. Custody is the asset. Quantum is the clock. What follows is the operating doctrine.

FILED // 2025.11
SIGNED // T31
STATUS // ACTIVE
REV // 1.0

// 01THE SURVEILLED CENTURY.

We are in the closing window of consequence-free networks. In the 1990s, mass surveillance was technically possible but operationally expensive. In 2025, it is the default — operated at machine speed by states, platforms, and the contractors that sell to both. The lens we live under is not panopticon-by-design; it is panopticon-by-convenience. We agreed to it because it was the path of least resistance.

This is not a complaint. It is a position.

Every financial transaction we make on a public chain today is permanently observable. Every counterparty who knows our address knows our position size, our liquidity, our timing, and — within a few hops — our identity. The narrative that "blockchains are private because they are pseudonymous" was a phase. Heuristic clustering closed that door in 2019. Chain analysis vendors closed it again in 2022. The thesis that the next cycle will require an answer to that closure is not edgy. It is overdue.

The protocols winning the next decade will not be the ones that ask users to trust them. They will be the ones engineered so that trust is unnecessary.

// 02WHY SELF-SOVEREIGNTY
BECOMES NON-NEGOTIABLE.

Custody is the asset. Everything else is wrapping.

The 2022—2024 cycle taught us — for the third time in a decade — that intermediated custody is a single point of failure dressed up as a feature. Centralized exchanges fail. Lending protocols fail. Wrapper contracts get exploited. Trusted oracles get coerced. The pattern repeats because the incentive to centralize custody is overwhelming for operators, and the cost of failure is socialized to depositors who were never told the question was up for vote.

We refuse to invest into that incentive. TRCT VC custodies its treasury across three independent hardware vendors, in a threshold quorum configuration, air-gapped from any network. No social recovery. No third-party recovery service. No cold-to-hot bridge. Withdrawals require physical presence of a quorum. The fund itself is the proof.

We allocate into builders shipping the same posture: hardware-first wallets that get audited before they ship, intent-based architectures that don't require asset surrender, ZK execution environments that don't broadcast holdings, sealed mempools that don't leak position size before settlement, and protocols that publish their security assumptions in plain language. Anyone asking for "trust us" gets a hard pass.

// 03THE QUANTUM HORIZON.

The timeline is not "if". It is "when, and what is the gap."

Cryptographically relevant quantum computers — machines capable of running Shor's algorithm at the scale required to break the elliptic curves currently securing every major cryptoasset — are projected by serious researchers between 2028 and 2035. We are not in the business of predicting which year. We are in the business of being positioned for the earliest plausible year.

NIST has standardized the post-quantum primitives that matter. CRYSTALS-Kyber for key encapsulation. Dilithium and FALCON for signatures. SPHINCS+ as the hash-based fallback. Production deployment is underway in the protocols that take the threat seriously. The protocols that don't will not be retrofittable in time, because migration is a multi-year coordinated effort and "harvest now, decrypt later" attacks are already running against unshielded chain history.

TRCT VC tracks the active migrations. Networks shipping lattice-based signatures get our attention. Networks shipping hybrid classical + PQ schemes get our attention. Networks deferring the conversation get a note in the file, no allocation. The watchlist is on the home page.

// 04ALLOCATING BEFORE
THE LIGHTS GO OUT.

The cycle window where this thesis is actionable is short.

The market will be late. It always is. By the time post-quantum migration is a press release, the alpha will be in the layers that did it before being asked. By the time ZK privacy is mandatory, the multiples will be in the L1s that built it as a primitive. By the time hardware custody is the default, the device vendors will be priced like infrastructure. Early is not a strategy. Early is the position.

We are pioneers of freedom for what comes next. Sovereignty before it is forced. Privacy before it is regulated. Custody before it is contested. Quantum resistance before the threshold.

You will see soon.

SIGNED // T31 — GENERAL PARTNER
FILED OFF-GRID // MMXXV
REV 1.0 — IMMUTABLE UNTIL NEXT TRANSMISSION.