2PM.Network
WebsiteXDiscordLinkedinGithub
  • Overview
    • What is 2PM.Network
    • Architecture
    • FAQ
    • Official Social Channels
  • 2PM Data VSIES Service
    • What is Data VSIES and why is it important
    • [V] Data Validation (ZK)
    • [SI] Data Standardization and Index
    • [E] Data Encryption Client (FHE)
    • [S] Data Storage and Access
    • Data VSIES SDK
  • Node Framework
    • Modular Architecture
    • Federated Learning
      • Horizontal Federated Learning Task
      • Logistic Regression Task
      • On-chain Secure Aggregation
      • Typical Scenarios
    • FHE Machine Learning
      • Built-in Models
      • Deep Learning
      • Typical Scenarios
    • Task Submission
    • Running a 2PM Node
      • Installation
      • Chain Connector Configuration
      • Data Preparation
      • Joining a Subnet
  • Security and Verification
    • Node Staking and Slash Mechanism
    • Running Verification Client
      • EigenLayer
      • Mind Network
    • Restaking and Delegation
  • Model Inference
    • 2PM Node Inference API
    • Posting Request to a Subnet Model
    • Getting Inference Results on Chain
      • Oracle Adapters
  • Monetization and Incentives
    • AI Model IP Assets
    • Distribution Algorithm
  • 2PM DAO
    • Build Subnets
      • Establishing New Subnets
      • General Requirements
      • Data Schema Definition
      • Model Selection
      • Task Implementation
    • $DMP Token
  • Deployed Smart Contracts
    • Subnets on Testnets
    • Local Deployment Guideline
  • Ecosystem
    • Partners
    • Use Cases
      • Private Personalized Recommendation
Powered by GitBook
On this page
  1. Security and Verification

Node Staking and Slash Mechanism

PreviousJoining a SubnetNextRunning Verification Client

Last updated 10 months ago

To ensure the security of the 2PM.Network, a robust Node Staking and Slash Mechanism has been implemented. Before joining any subnet, nodes are required to stake a certain amount in the subnet’s corresponding blockchain via a staking contract. This stake can be in the form of $2PM tokens or the native cryptocurrency of the corresponding blockchain.

2PM.Network utilizes technologies from Eigenlayer/Mind Network to facilitate an . This service enables off-chain validator node operators to run a verification client provided by 2PM.Network. This client is used to validate on-chain proofs, such as zero-knowledge proofs and commitments.

Should any discrepancies or issues be detected during verification, the validator nodes have the ability to submit proof to the staking contract and initiate a "slash" action against the stake of the node at fault.

Actively Validated Service