SlideShare a Scribd company logo
1 of 28
Download to read offline
How to run high-load
computing (like AI)
in a decentralised network:
Proof of Computing Work protocol
dr. Maxim Orlovsky & Pandora Foundation Team
Our goal is to design
and build global platform
for a decentralised uncensorable AI
Pandora
Method
We will achieve this
futuristic vision
step by step by
building systems
that will be
beneficial to the
industry today
Data
Providers
ML Model
Developers
Computing
Power
Providers
Consumer
Pandora Network Participants
byes
byes
provides job
& payes
mining
rewards
What we’ve done so far
Proof of Computing Work (PoCW)
Protocol that allows large-scale computing (like AI)
in a trustless peer network without
repeating computations on each of the nodes
– this solves main blockchain & decentralised networks
scalability problem
Consensus protocol (Prometheus)
Based on top of PoCW, solves main PoW and PoS problems
Proof of Cognitive Work
Scalability protocol reducing computation redundancy from
O(N) to O(1), where N is the number of nodes in
decentralised network
● Scientifically proved with game
theory
● Formally specified in UML
● Implemented in Ethereum smart
contracts
State of PoCW:
● Implemented python node able
to perform training and
inference on Keras neural
networks
● Testnet web interface
● PoCW web explorer
PoCW Basics
● ML computation run only once by a randomly selected worker node
of the network. Node puts a stake on the correctness of the
computing.
● 10% of the computation is verified once by a higher-staked node
(Verifier), randomly selected also from all high-staked nodes
● In case of inconsistency (negative verdicts of computation
correctness) the stake of the original worker is slashed
● Worker can put an appeal (by increasing stake).
Two round arbitration (closed and public) is run in this case
(details follow)
Computing: Assignment
Model
Input data split on batches
Assigned worker node to process each batch
Computing
Model
Input data split on batches
Assigned worker node to process each batch
Batched results of data processing
Hashes of results
Verification:
partial random re-computing
Model
Model
Input data split on batches
Assigned worker node to process each batch
Batched results of data processing
Hashes of results
Verificators re-computing 10% of batches
Input data split on batches
Assigned worker node to process each batch
Batched results of data processing
Hashes of results
Verificators re-computing 10% of batches
Verdicts
Verification: Verdicts
Model
Model
Stake slashing
Worker Node
Stake
WN
$
Verifier Node
Larger Stake
VN
$
Arbitration (closed round)
Worker Node
Stake
WN
$
Verifier Node
Larger Stake
VN
$
Additional
Stake
$
Arbiter Node #3
Larger Stake
RpSt
VN
$
Arbiter Node #2
Larger Stake
RpSt
VN
$
Arbiter Node #1
Larger Stake
RpSt
VN
$
Arbitration (closed round)
Worker Node
Stake
WN
$
Verifier Node
Larger Stake
VN
$
Additional
Stake
$
Arbiter Node #3
Larger Stake
RpSt
VN
$
Arbiter Node #2
Larger Stake
RpSt
VN
$
$
Arbiter Node #1
Larger Stake
RpSt
VN
$
Arbitration (open round)
Worker Node
Stake
WN
$
Verifier Node
Larger Stake
VN
$
Arbiter Node #3
Larger Stake
RpSt
VN
$
Arbiter Node #2
Larger Stake
RpSt
VN
$
Arbiter Node #1
Larger Stake
RpSt
VN
$
Additional
Stake
$
$
$
$
Worker Node
(open participation)
WN
$
WN
$
WN
$
WN
$
WN
$
WN
$
WN
$
WN
$
WN
$
WN
$
Arbitration (open round)
Worker Node
Stake
WN
$
Verifier Node
Larger Stake
VN
$
Arbiter Node #3
Larger Stake
RpSt
VN
$
Arbiter Node #2
Larger Stake
RpSt
VN
$
Arbiter Node #1
Larger Stake
RpSt
VN
$
Additional
Stake
$
$
$
$
Worker Node
(open participation)
WN
$
WN
$
WN
$
WN
$
WN
$
WN
$
WN
$
WN
$
WN
$
WN
$
Arbitration (open round)
Worker Node
Stake
WN
$
Verifier Node
Larger Stake
VN
$
Arbiter Node #3
Larger Stake
RpSt
VN
$
Arbiter Node #2
Larger Stake
RpSt
VN
$
Arbiter Node #1
Larger Stake
RpSt
VN
$
Additional
Stake
$
$
$
$
Worker Node
(open participation)
WN
$
WN
$
WN
$
WN
$
WN
$
WN
$
WN
$
WN
$
WN
$
WN
$
Full node
Proof of Computing Work
(producing reputation)
Workers Verifiers Arbiters
Reputation
level
increase
Computing
work/reward
ratio increase
Where are we with release
● Science: formal verification, academic papers prepared
● Engineering: tech specifications in UML
https://github.com/pandoraboxchain/pyrrha-techspecs
● Code: smart contracts + full node code
https://github.com/pandoraboxchain/pyrrha-consensus
https://github.com/pandoraboxchain/pyrrha-pynode
● Testnet in Ethereum network + Web UI to testnet
(web client, explorer)
http://client.pandora.network/
http://pandora.network/
Formal verification of
PoCW consensus with game
theory:
probabilistic prove for
computation correctness in
trustless environment with O(1)
for a network with N nodes
Detailed technical
specifications of PoCW in
UML diagrams
https://github.com/pandoraboxchain
/pyrrha-techspecs
PoCW consensus
implemented in form
of smart contract
(Solidity, EVM, Ethereum
network)
https://github.com/pandora
boxchain/pyrrha-consensus
Node for running
ML models in
decentralised network
with PoCW written in
python
https://github.com/pandorabox
chain/pyrrha-pynode
Testnet and web client on http://client.pandora.network/
PoCW explorer http://pandora.network/
https://github.com/pandoraboxchain/pyrrha-boxplorer
Core Pandora Boxchain Differentiators
● Censorship resistance
● Decentralised AI
(and generic large-scale
parallel and sequential)
computing
● Generic setup with economic
incentivisation of
5 types of actors
For this aims it …
● … provides own protocol for
proving correctness of
computation in trustless
network without repeating
all computing on each of
the nodes
● … provides its own
consensus protocol
Ask your question on Telegram:
https://t.me/pandoraboxchain_chat
Follow on Twitter:
https://twitter.com/pandoraboxchain

More Related Content

Similar to Proof of Computing Work Protocol by Pandora Boxchain

ONOS Open Network Operating System
ONOS Open Network Operating SystemONOS Open Network Operating System
ONOS Open Network Operating System
ON.Lab
 
The 1990s Called. They Want Their Code Back.
The 1990s Called. They Want Their Code Back.The 1990s Called. They Want Their Code Back.
The 1990s Called. They Want Their Code Back.
Jonathan Oliver
 
WSO2 Product Release Webinar - Introducing the WSO2 Complex Event Processor
WSO2 Product Release Webinar - Introducing the WSO2 Complex Event Processor WSO2 Product Release Webinar - Introducing the WSO2 Complex Event Processor
WSO2 Product Release Webinar - Introducing the WSO2 Complex Event Processor
WSO2
 

Similar to Proof of Computing Work Protocol by Pandora Boxchain (20)

An Efficient Reactive Model for Resource Discovery in DHT-Based Peer-to-Peer ...
An Efficient Reactive Model for Resource Discovery in DHT-Based Peer-to-Peer ...An Efficient Reactive Model for Resource Discovery in DHT-Based Peer-to-Peer ...
An Efficient Reactive Model for Resource Discovery in DHT-Based Peer-to-Peer ...
 
ONOS Open Network Operating System
ONOS Open Network Operating SystemONOS Open Network Operating System
ONOS Open Network Operating System
 
Building Continuous Application with Structured Streaming and Real-Time Data ...
Building Continuous Application with Structured Streaming and Real-Time Data ...Building Continuous Application with Structured Streaming and Real-Time Data ...
Building Continuous Application with Structured Streaming and Real-Time Data ...
 
Distributed dataintelligence
Distributed dataintelligenceDistributed dataintelligence
Distributed dataintelligence
 
Overview Of Parallel Development - Ericnel
Overview Of Parallel Development -  EricnelOverview Of Parallel Development -  Ericnel
Overview Of Parallel Development - Ericnel
 
Summit 16: Optimizing OPNFV for Distributed NFV Applications
Summit 16: Optimizing OPNFV for Distributed NFV ApplicationsSummit 16: Optimizing OPNFV for Distributed NFV Applications
Summit 16: Optimizing OPNFV for Distributed NFV Applications
 
Harmonia open iris_basic_v0.1
Harmonia open iris_basic_v0.1Harmonia open iris_basic_v0.1
Harmonia open iris_basic_v0.1
 
The 1990s Called. They Want Their Code Back.
The 1990s Called. They Want Their Code Back.The 1990s Called. They Want Their Code Back.
The 1990s Called. They Want Their Code Back.
 
Scaling OpenStack Networking Beyond 4000 Nodes with Dragonflow - Eshed Gal-Or...
Scaling OpenStack Networking Beyond 4000 Nodes with Dragonflow - Eshed Gal-Or...Scaling OpenStack Networking Beyond 4000 Nodes with Dragonflow - Eshed Gal-Or...
Scaling OpenStack Networking Beyond 4000 Nodes with Dragonflow - Eshed Gal-Or...
 
IRJET- Estimating Various DHT Protocols
IRJET- Estimating Various DHT ProtocolsIRJET- Estimating Various DHT Protocols
IRJET- Estimating Various DHT Protocols
 
Optimization of Incremental Queries CloudMDE2015
Optimization of Incremental Queries CloudMDE2015Optimization of Incremental Queries CloudMDE2015
Optimization of Incremental Queries CloudMDE2015
 
WSO2 Product Release Webinar - Introducing the WSO2 Complex Event Processor
WSO2 Product Release Webinar - Introducing the WSO2 Complex Event Processor WSO2 Product Release Webinar - Introducing the WSO2 Complex Event Processor
WSO2 Product Release Webinar - Introducing the WSO2 Complex Event Processor
 
Big Data & NoSQL - EFS'11 (Pavlo Baron)
Big Data & NoSQL - EFS'11 (Pavlo Baron)Big Data & NoSQL - EFS'11 (Pavlo Baron)
Big Data & NoSQL - EFS'11 (Pavlo Baron)
 
Introduction to Game Network Programming
Introduction to Game Network ProgrammingIntroduction to Game Network Programming
Introduction to Game Network Programming
 
Reactor, Reactive streams and MicroServices
Reactor, Reactive streams and MicroServicesReactor, Reactive streams and MicroServices
Reactor, Reactive streams and MicroServices
 
Transfer Learning: Repurposing ML Algorithms from Different Domains to Cloud ...
Transfer Learning: Repurposing ML Algorithms from Different Domains to Cloud ...Transfer Learning: Repurposing ML Algorithms from Different Domains to Cloud ...
Transfer Learning: Repurposing ML Algorithms from Different Domains to Cloud ...
 
Blockchain
BlockchainBlockchain
Blockchain
 
ONOS: Open Network Operating System. An Open-Source Distributed SDN Operating...
ONOS: Open Network Operating System. An Open-Source Distributed SDN Operating...ONOS: Open Network Operating System. An Open-Source Distributed SDN Operating...
ONOS: Open Network Operating System. An Open-Source Distributed SDN Operating...
 
Summit 16: How to Compose a New OPNFV Solution Stack?
Summit 16: How to Compose a New OPNFV Solution Stack?Summit 16: How to Compose a New OPNFV Solution Stack?
Summit 16: How to Compose a New OPNFV Solution Stack?
 
Game server development in node.js in jsconf eu
Game server development in node.js in jsconf euGame server development in node.js in jsconf eu
Game server development in node.js in jsconf eu
 

More from Pandora Boxchain

More from Pandora Boxchain (8)

The #FreeAI Manifesto
The #FreeAI ManifestoThe #FreeAI Manifesto
The #FreeAI Manifesto
 
How to design a decentralisation: is blockchain & token needed or just a buzz...
How to design a decentralisation: is blockchain & token needed or just a buzz...How to design a decentralisation: is blockchain & token needed or just a buzz...
How to design a decentralisation: is blockchain & token needed or just a buzz...
 
Malleability and SegWit
Malleability and SegWitMalleability and SegWit
Malleability and SegWit
 
Tradeoffs in PoS Consensus Protocols
Tradeoffs in PoS Consensus ProtocolsTradeoffs in PoS Consensus Protocols
Tradeoffs in PoS Consensus Protocols
 
Why we need censorship-resistant AI
Why we need censorship-resistant AIWhy we need censorship-resistant AI
Why we need censorship-resistant AI
 
How AI benefits from Blockchain and Game Theory with Scalable Censorship-resi...
How AI benefits from Blockchain and Game Theory with Scalable Censorship-resi...How AI benefits from Blockchain and Game Theory with Scalable Censorship-resi...
How AI benefits from Blockchain and Game Theory with Scalable Censorship-resi...
 
World decentralized AI on blockchain: simple explanation of Pandora Boxchain ...
World decentralized AI on blockchain: simple explanation of Pandora Boxchain ...World decentralized AI on blockchain: simple explanation of Pandora Boxchain ...
World decentralized AI on blockchain: simple explanation of Pandora Boxchain ...
 
Pandora Boxchain: AI & Blockchain Project
Pandora Boxchain: AI & Blockchain ProjectPandora Boxchain: AI & Blockchain Project
Pandora Boxchain: AI & Blockchain Project
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 

Proof of Computing Work Protocol by Pandora Boxchain

  • 1. How to run high-load computing (like AI) in a decentralised network: Proof of Computing Work protocol dr. Maxim Orlovsky & Pandora Foundation Team
  • 2. Our goal is to design and build global platform for a decentralised uncensorable AI
  • 3.
  • 4. Pandora Method We will achieve this futuristic vision step by step by building systems that will be beneficial to the industry today
  • 5. Data Providers ML Model Developers Computing Power Providers Consumer Pandora Network Participants byes byes provides job & payes mining rewards
  • 6. What we’ve done so far Proof of Computing Work (PoCW) Protocol that allows large-scale computing (like AI) in a trustless peer network without repeating computations on each of the nodes – this solves main blockchain & decentralised networks scalability problem Consensus protocol (Prometheus) Based on top of PoCW, solves main PoW and PoS problems
  • 7. Proof of Cognitive Work Scalability protocol reducing computation redundancy from O(N) to O(1), where N is the number of nodes in decentralised network ● Scientifically proved with game theory ● Formally specified in UML ● Implemented in Ethereum smart contracts State of PoCW: ● Implemented python node able to perform training and inference on Keras neural networks ● Testnet web interface ● PoCW web explorer
  • 8. PoCW Basics ● ML computation run only once by a randomly selected worker node of the network. Node puts a stake on the correctness of the computing. ● 10% of the computation is verified once by a higher-staked node (Verifier), randomly selected also from all high-staked nodes ● In case of inconsistency (negative verdicts of computation correctness) the stake of the original worker is slashed ● Worker can put an appeal (by increasing stake). Two round arbitration (closed and public) is run in this case (details follow)
  • 9. Computing: Assignment Model Input data split on batches Assigned worker node to process each batch
  • 10. Computing Model Input data split on batches Assigned worker node to process each batch Batched results of data processing Hashes of results
  • 11. Verification: partial random re-computing Model Model Input data split on batches Assigned worker node to process each batch Batched results of data processing Hashes of results Verificators re-computing 10% of batches
  • 12. Input data split on batches Assigned worker node to process each batch Batched results of data processing Hashes of results Verificators re-computing 10% of batches Verdicts Verification: Verdicts Model Model
  • 14. Arbitration (closed round) Worker Node Stake WN $ Verifier Node Larger Stake VN $ Additional Stake $ Arbiter Node #3 Larger Stake RpSt VN $ Arbiter Node #2 Larger Stake RpSt VN $ Arbiter Node #1 Larger Stake RpSt VN $
  • 15. Arbitration (closed round) Worker Node Stake WN $ Verifier Node Larger Stake VN $ Additional Stake $ Arbiter Node #3 Larger Stake RpSt VN $ Arbiter Node #2 Larger Stake RpSt VN $ $ Arbiter Node #1 Larger Stake RpSt VN $
  • 16. Arbitration (open round) Worker Node Stake WN $ Verifier Node Larger Stake VN $ Arbiter Node #3 Larger Stake RpSt VN $ Arbiter Node #2 Larger Stake RpSt VN $ Arbiter Node #1 Larger Stake RpSt VN $ Additional Stake $ $ $ $ Worker Node (open participation) WN $ WN $ WN $ WN $ WN $ WN $ WN $ WN $ WN $ WN $
  • 17. Arbitration (open round) Worker Node Stake WN $ Verifier Node Larger Stake VN $ Arbiter Node #3 Larger Stake RpSt VN $ Arbiter Node #2 Larger Stake RpSt VN $ Arbiter Node #1 Larger Stake RpSt VN $ Additional Stake $ $ $ $ Worker Node (open participation) WN $ WN $ WN $ WN $ WN $ WN $ WN $ WN $ WN $ WN $
  • 18. Arbitration (open round) Worker Node Stake WN $ Verifier Node Larger Stake VN $ Arbiter Node #3 Larger Stake RpSt VN $ Arbiter Node #2 Larger Stake RpSt VN $ Arbiter Node #1 Larger Stake RpSt VN $ Additional Stake $ $ $ $ Worker Node (open participation) WN $ WN $ WN $ WN $ WN $ WN $ WN $ WN $ WN $ WN $
  • 19. Full node Proof of Computing Work (producing reputation) Workers Verifiers Arbiters Reputation level increase Computing work/reward ratio increase
  • 20. Where are we with release ● Science: formal verification, academic papers prepared ● Engineering: tech specifications in UML https://github.com/pandoraboxchain/pyrrha-techspecs ● Code: smart contracts + full node code https://github.com/pandoraboxchain/pyrrha-consensus https://github.com/pandoraboxchain/pyrrha-pynode ● Testnet in Ethereum network + Web UI to testnet (web client, explorer) http://client.pandora.network/ http://pandora.network/
  • 21. Formal verification of PoCW consensus with game theory: probabilistic prove for computation correctness in trustless environment with O(1) for a network with N nodes
  • 22. Detailed technical specifications of PoCW in UML diagrams https://github.com/pandoraboxchain /pyrrha-techspecs
  • 23. PoCW consensus implemented in form of smart contract (Solidity, EVM, Ethereum network) https://github.com/pandora boxchain/pyrrha-consensus
  • 24. Node for running ML models in decentralised network with PoCW written in python https://github.com/pandorabox chain/pyrrha-pynode
  • 25. Testnet and web client on http://client.pandora.network/
  • 27. Core Pandora Boxchain Differentiators ● Censorship resistance ● Decentralised AI (and generic large-scale parallel and sequential) computing ● Generic setup with economic incentivisation of 5 types of actors For this aims it … ● … provides own protocol for proving correctness of computation in trustless network without repeating all computing on each of the nodes ● … provides its own consensus protocol
  • 28. Ask your question on Telegram: https://t.me/pandoraboxchain_chat Follow on Twitter: https://twitter.com/pandoraboxchain