Cerebrum Validators

Entrusting Zero-Trust Inferencing

Cerebrum Validators are a class of nodes in the network, which are made critical to secure and maintain the integrity of inferencing transactions. They are designed to work within a Zero-Trust Architecture, wherein no implicit trust is granted to any entity inside or outside thenetwork. Every interaction with the GPU nodes involved in the inferencing goes through severe authentication and authorization.

  • Zero-Trust Model: Each model inference request is considered to originate from an untrusted source. Validators check the identity of the requesting entity and the integrity of the request in order to make sure that malicious actors cannot perform unauthorized inferencing using GPU resources.

  • Authentication: Validators use cryptography to authenticate users and agents that want to utilize the inferencing services. This ensures that unauthorized entities do not have access to the models and cannot use them. Strong mechanisms for authentication include multi-factor authentication and digital signatures that avoid identity spoofing and unauthorized access.

  • Authorization: Validators, upon authentication, shall then implement Fine-grained access control policies on which models a given user or agent can use and for what purpose. In this way, users cannot access resources they don't need to have. Limiting the attack surface in case of a security breach. The access control policies can be defined based on user roles, agent types, and specific model functionalities.

  • Data Privacy: The Zero-Trust model ensures that the data processed during the inference is private, even within the decentralized network, by the validators. Encryption and access controls, together with secure communication protocols, will ensure this. All data, both in transmission and at rest, is encrypted, and decrypted data can only be revealed to an explicitly white-listed authorized party. Validators further ensure such processing is according to relevant privacy requirements like GDPR or CCPA.

This rigorous approach to security is essential in gaining trust in the platform and sensitive data handled by AI agents. It ensures that data privacy is maintained throughout the entire AI lifecycle, from model hosting to inferencing and beyond.

Validator Client

In that regard, the validator software has been made to support a wide array of operating systems, from Windows and Mac to Linux and even Android devices. The inclusion of mobile gadgets is very strategic, considering computational demands for validation are relatively modest, hence making participation wide without high-performance hardware.

Participation as a validator requires the installation of a dedicated application on the user's device, which must remain online to perform constant, end-to-end validation of transactions across the network.

Validator Rewards

Validators are incentivized by the network. They can see their activities, rewards, and other information through their validator-specific dashboard, which is available on our website. It shows in detail the transactions they have validated, together with the rewards they have received; this ascertains transparency and inspires activity in the network's governance.

Last updated