2PM.Network
WebsiteXDiscordLinkedinGithub
  • Overview
    • What is 2PM.Network
    • Architecture
    • FAQ
    • Official Social Channels
  • 2PM Data VSIES Service
    • What is Data VSIES and why is it important
    • [V] Data Validation (ZK)
    • [SI] Data Standardization and Index
    • [E] Data Encryption Client (FHE)
    • [S] Data Storage and Access
    • Data VSIES SDK
  • Node Framework
    • Modular Architecture
    • Federated Learning
      • Horizontal Federated Learning Task
      • Logistic Regression Task
      • On-chain Secure Aggregation
      • Typical Scenarios
    • FHE Machine Learning
      • Built-in Models
      • Deep Learning
      • Typical Scenarios
    • Task Submission
    • Running a 2PM Node
      • Installation
      • Chain Connector Configuration
      • Data Preparation
      • Joining a Subnet
  • Security and Verification
    • Node Staking and Slash Mechanism
    • Running Verification Client
      • EigenLayer
      • Mind Network
    • Restaking and Delegation
  • Model Inference
    • 2PM Node Inference API
    • Posting Request to a Subnet Model
    • Getting Inference Results on Chain
      • Oracle Adapters
  • Monetization and Incentives
    • AI Model IP Assets
    • Distribution Algorithm
  • 2PM DAO
    • Build Subnets
      • Establishing New Subnets
      • General Requirements
      • Data Schema Definition
      • Model Selection
      • Task Implementation
    • $DMP Token
  • Deployed Smart Contracts
    • Subnets on Testnets
    • Local Deployment Guideline
  • Ecosystem
    • Partners
    • Use Cases
      • Private Personalized Recommendation
Powered by GitBook
On this page
  • What Problems Does 2PM Solve?
  • Who Can Participate in 2PM.Network?
  1. Overview

What is 2PM.Network

"2PM" Stands for Privacy, Public, Model

2PM.Network is a privacy computing model network protocol that leverages blockchain technology for re-staking protocol verification. Built on fully homomorphic encryption and federated learning, it employs a modular node framework. Under the principle of privacy protection, users can utilize the protocol to construct distributed AI subnets, earning dividend income and receiving incentives for contributions of data and computational power while training AI models.


What Problems Does 2PM Solve?

The ease of access to public data and the open-source nature of many algorithms have historically made it difficult to commercialize AI models. This is because the data can be used and trained by anyone, diminishing the exclusivity and potential revenue streams for original model creators. However, the privacy computing model, akin to a natural copyright scenario, offers a distinct market advantage. This is because the effectiveness of these models is tied to the data providers, creating inherent market barriers and a demand for model commercialization.

2PM.Network addresses the following specific problems:

  • Underutilization of Private Data: The vast potential of private data remains largely untapped due to privacy concerns and the lack of mechanisms that allow for their safe and efficient use.

  • Lack of Incentives: There is an absence of sufficient motivation for individuals or organizations to contribute their private data, which is crucial for training robust AI models.

  • Verification and Security: Ensuring the computation on private data is accurate and secure is essential, as these operations need to be both usable and invisible to maintain privacy.

  • Limited Accessibility: Most AI models trained on private data are confined to B2B collaborations and lack widespread applications that could create positive externalities as public goods.

  • Monetization and Market Mechanisms: There is a scarcity of market mechanisms to realize or enhance the value of these privacy-focused AI models.


Who Can Participate in 2PM.Network?

  • Data Providers: These can be individuals or businesses that own private data. By contributing their data to 2PM.Network, they can participate while still ensuring their privacy is protected. In return, they receive rewards for their contributions and a share of the profits from the models trained using their data.

  • Computational Power Providers: These participants use the node framework provided by 2PM.Network to train models on their own or others' private data. They submit computational proofs and results to the blockchain, for which they receive rewards and a share of the profits derived from the models.

  • Verification Node Operators: These service providers run verification clients provided by 2PM.Network to check the commitments and proofs submitted by computational nodes. By verifying these submissions, they ensure the integrity and correctness of the computations and receive rewards for their services.

  • DAO Participants ($DMP Holders): These are stakeholders within the DAO who engage in the governance and operational aspects of 2PM.Network. They participate in the establishment of new AI subnets within the DAO, receive initial rewards for their participation, and have the opportunity to partake in the token distributions for new subnets at preferential rates.

NextArchitecture

Last updated 11 months ago

Page cover image