Security & Privacy

Security and Privacy

Cortensor prioritizes security and privacy to ensure that user data and network operations remain protected. This section outlines the key mechanisms and strategies implemented to safeguard the Cortensor network.

Overview

Cortensor employs a multi-faceted approach to security and privacy, incorporating encryption, secure communication protocols, and robust validation processes to protect data and maintain trust within the network.

Key Mechanisms

Encrypted Communication:

  • All data transmitted within the network is encrypted to ensure privacy and integrity.

  • Router nodes manage encryption and decryption, ensuring secure interactions between clients and miner nodes.

Data Storage Security:

  • Uses IPFS for decentralized and secure data storage.

  • Ensures that data such as prompts and completions are stored off-chain, reducing exposure to potential on-chain vulnerabilities.

Staking and Incentives:

  • Nodes stake tokens to participate, ensuring their commitment to network security.

  • Staking reduces the risk of malicious behavior, as nodes have a financial incentive to maintain network integrity.

Validation and Verification:

  • Validation nodes verify the accuracy of AI inference results using methods like semantic checks, embedding comparisons, and checksum verifications.

  • Multiple nodes participate in the validation process to ensure consensus and reliability.

Access Control:

  • Implements permissioned access for certain network operations, with plans to transition to a more decentralized, permissionless setting in the future.

  • Ensures that only authorized nodes can perform specific tasks, enhancing overall security.

Privacy Measures:

  • User data is handled with strict privacy protocols, ensuring that sensitive information is protected throughout the processing and storage lifecycle.

  • Future updates will include additional privacy features, such as enhanced data anonymization and secure multi-party computation.

Last updated