2PM.Network
WebsiteXDiscordLinkedinGithub
  • Overview
    • What is 2PM.Network
    • Architecture
    • FAQ
    • Official Social Channels
  • 2PM Data VSIES Service
    • What is Data VSIES and why is it important
    • [V] Data Validation (ZK)
    • [SI] Data Standardization and Index
    • [E] Data Encryption Client (FHE)
    • [S] Data Storage and Access
    • Data VSIES SDK
  • Node Framework
    • Modular Architecture
    • Federated Learning
      • Horizontal Federated Learning Task
      • Logistic Regression Task
      • On-chain Secure Aggregation
      • Typical Scenarios
    • FHE Machine Learning
      • Built-in Models
      • Deep Learning
      • Typical Scenarios
    • Task Submission
    • Running a 2PM Node
      • Installation
      • Chain Connector Configuration
      • Data Preparation
      • Joining a Subnet
  • Security and Verification
    • Node Staking and Slash Mechanism
    • Running Verification Client
      • EigenLayer
      • Mind Network
    • Restaking and Delegation
  • Model Inference
    • 2PM Node Inference API
    • Posting Request to a Subnet Model
    • Getting Inference Results on Chain
      • Oracle Adapters
  • Monetization and Incentives
    • AI Model IP Assets
    • Distribution Algorithm
  • 2PM DAO
    • Build Subnets
      • Establishing New Subnets
      • General Requirements
      • Data Schema Definition
      • Model Selection
      • Task Implementation
    • $DMP Token
  • Deployed Smart Contracts
    • Subnets on Testnets
    • Local Deployment Guideline
  • Ecosystem
    • Partners
    • Use Cases
      • Private Personalized Recommendation
Powered by GitBook
On this page
  1. Ecosystem
  2. Use Cases

Private Personalized Recommendation

PreviousUse Cases

Last updated 10 months ago

2PM.Network envision a future where ecosystems are constructed around high-traffic platforms like Telegram, serving as gateways to vertically integrated application interfaces. Users will have the capability to locally save their interaction history with each application, which, combined with application tags, will be encrypted using fully homomorphic encryption before being uploaded to the DA-layer blockchain. This innovative approach ensures that user data remains private and secure, while still being utilizable for network operations.

To enhance user engagement and utility, 2PM.Network is set to develop a specialized privacy-focused recommendation model. This model will intelligently suggest applications based on individual user behaviors and preferences, fostering a more personalized and engaging user experience. The potential of such a recommendation model extends beyond just app suggestions, encompassing token recommendations, influencer endorsements, and other domains, opening up new avenues for personalized content and service delivery in the decentralized web. This strategy not only enhances user satisfaction but also drives network growth by promoting relevant and tailored interactions within the ecosystem.