What is 2PM.Network
"2PM" Stands for Privacy, Public, Model
2PM.Network is a privacy computing model network protocol that leverages blockchain technology for re-staking protocol verification. Built on fully homomorphic encryption and federated learning, it employs a modular node framework. Under the principle of privacy protection, users can utilize the protocol to construct distributed AI subnets, earning dividend income and receiving incentives for contributions of data and computational power while training AI models.
What Problems Does 2PM Solve?
The ease of access to public data and the open-source nature of many algorithms have historically made it difficult to commercialize AI models. This is because the data can be used and trained by anyone, diminishing the exclusivity and potential revenue streams for original model creators. However, the privacy computing model, akin to a natural copyright scenario, offers a distinct market advantage. This is because the effectiveness of these models is tied to the data providers, creating inherent market barriers and a demand for model commercialization.
2PM.Network addresses the following specific problems:
Underutilization of Private Data: The vast potential of private data remains largely untapped due to privacy concerns and the lack of mechanisms that allow for their safe and efficient use.
Lack of Incentives: There is an absence of sufficient motivation for individuals or organizations to contribute their private data, which is crucial for training robust AI models.
Verification and Security: Ensuring the computation on private data is accurate and secure is essential, as these operations need to be both usable and invisible to maintain privacy.
Limited Accessibility: Most AI models trained on private data are confined to B2B collaborations and lack widespread applications that could create positive externalities as public goods.
Monetization and Market Mechanisms: There is a scarcity of market mechanisms to realize or enhance the value of these privacy-focused AI models.
Who Can Participate in 2PM.Network?
Data Providers: These can be individuals or businesses that own private data. By contributing their data to 2PM.Network, they can participate while still ensuring their privacy is protected. In return, they receive rewards for their contributions and a share of the profits from the models trained using their data.
Computational Power Providers: These participants use the node framework provided by 2PM.Network to train models on their own or others' private data. They submit computational proofs and results to the blockchain, for which they receive rewards and a share of the profits derived from the models.
Verification Node Operators: These service providers run verification clients provided by 2PM.Network to check the commitments and proofs submitted by computational nodes. By verifying these submissions, they ensure the integrity and correctness of the computations and receive rewards for their services.
DAO Participants ($DMP Holders): These are stakeholders within the DAO who engage in the governance and operational aspects of 2PM.Network. They participate in the establishment of new AI subnets within the DAO, receive initial rewards for their participation, and have the opportunity to partake in the token distributions for new subnets at preferential rates.
Last updated