An Open Protocol
for Verified Useful Compute
ComputeNet explores a decentralized future where useful computation becomes a verifiable protocol primitive.
...
Active Validators
3 total nodes
...
Truth Records
Total verified
...
Network Peers
Connected peers
...
Propagation Queue
Pending propagation
Telemetry reflects live ComputeNet research/testnet activity.
Validator Network
Live Testnet Status
Telemetry reflects live ComputeNet research/testnet activity. Last update: Never
Network Status
Connecting to network...
What is ComputeNet?
ComputeNet is an experimental open protocol designed to transform compute into a verifiable, decentralized, utility-backed network resource. Where Bitcoin introduced decentralized monetary consensus and Ethereum introduced decentralized execution, ComputeNet explores a third primitive: decentralized verification of useful compute.
Useful Computation
Computational work should produce reusable value, not just difficulty competition.
Verifiable Execution
Independent validators can reproduce and verify computation results.
Decentralized Consensus
Trust emerges from distributed validation, not centralized authority.
Why Useful Compute Matters
Modern compute markets suffer from structural problems. At the same time, existing proof-of-work systems consume energy while producing computational outputs with little reusable utility. ComputeNet explores an alternative: computational work should produce reusable value.
The Core Thesis
Useful computation can become a native protocol primitive.
Instead of hashing purely for difficulty competition, nodes compete by executing deterministic workloads, generating verifiable outputs, producing cryptographic execution receipts, and participating in decentralized validation.
Proof of Useful Compute (PoUC)
In PoUC, computational work must produce reusable outputs that are independently verifiable. Validators must be able to reproduce execution, and receipts must be consensus-verifiable. This is the conceptual foundation of ComputeNet.
Determinism
Inputs produce reproducible outputs
Verifiability
Independent validators verify execution
Replay Resistance
Receipts resist duplication
Fraud Detection
Dishonest validators identifiable
Cost Efficiency
Verification cheaper than generation
Utility Production
Network generates reusable value
Verification Pipeline
The protocol approaches verification through a layered pipeline combining deterministic execution, reproducible workloads, execution hashing, portable compute receipts, validator re-execution, and consensus attestations.
Job Manifest
Deterministic execution blueprint
Deterministic Execution
Reproducible workload processing
Execution Hashing
Immutable output fingerprint
Receipt Construction
Portable evidence artifact
Validator Re-execution
Independent verification
Consensus Attestation
Distributed agreement
Validator Consensus
Validators serve as the trust infrastructure of ComputeNet. They verify receipts, cast attestations, aggregate acceptance ratios, and finalize valid execution bundles. No single validator is treated as authoritative — trust emerges from independent reproducibility.
- Receipt validation
- Consensus participation
- Peer propagation
- Fraud detection
Open Protocol Principles
ComputeNet intends to follow a Bitcoin-style fair-launch philosophy where network participation emerges organically through open-source infrastructure and validator participation. The protocol prioritizes openness over exclusivity, utility over speculation, and infrastructure over hype.
No Premine
No founder allocation or hidden supply
No ICO
No public fundraising through token sales
No Central Custody
Protocol operates without custodial control
Open Participation
Validator participation through open rules
Utility-First
Prioritize useful compute over speculation
Research-First
Experimentation over marketing
Current Development Status
ComputeNet is currently operating in Research Preview / Private Testnet mode. The current network is non-economic, non-custodial, non-commercial, and experimental. There is currently no public token, no mining, no public rewards, and no economic issuance.
Long-Term Vision
The long-term objective of ComputeNet is a decentralized protocol for verifiable useful compute. The protocol exists to explore whether useful compute can remain decentralized and whether verification can remain cheaper than execution.
Open Research Questions
ComputeNet does not claim to have fully solved these questions. The protocol exists to explore them experimentally.
Explore the Protocol
ComputeNet is open-source and research-first. Read the whitepaper, explore the architecture, and follow the protocol's development.