Research PreviewPrivate Testnet

An Open Protocol
for Verified Useful Compute

ComputeNet explores a decentralized future where useful computation becomes a verifiable protocol primitive.

Scroll to explore

...

Active Validators

3 total nodes

...

Truth Records

Total verified

...

Network Peers

Connected peers

...

Propagation Queue

Pending propagation

Telemetry reflects live ComputeNet research/testnet activity.

Validator Network

Live Testnet Status

Live
Validator Alphaoffline
London
N/AN/AN/A
Validator Betaoffline
Frankfurt
N/AN/AN/A
Validator Gammaoffline
New York
N/AN/AN/A

Telemetry reflects live ComputeNet research/testnet activity. Last update: Never

Network Status

Connecting to network...

Loading...
network_status:connecting
active_validators:0
total_truth_records:0
connected_peers:0
propagation_queue:0

What is ComputeNet?

ComputeNet is an experimental open protocol designed to transform compute into a verifiable, decentralized, utility-backed network resource. Where Bitcoin introduced decentralized monetary consensus and Ethereum introduced decentralized execution, ComputeNet explores a third primitive: decentralized verification of useful compute.

Useful Computation

Computational work should produce reusable value, not just difficulty competition.

Verifiable Execution

Independent validators can reproduce and verify computation results.

Decentralized Consensus

Trust emerges from distributed validation, not centralized authority.

Why Useful Compute Matters

Modern compute markets suffer from structural problems. At the same time, existing proof-of-work systems consume energy while producing computational outputs with little reusable utility. ComputeNet explores an alternative: computational work should produce reusable value.

Centralized cloud dependency
Opaque compute pricing
Unverifiable execution
Fragmented idle compute
Weak trust guarantees
Poor interoperability

The Core Thesis

Useful computation can become a native protocol primitive.

Instead of hashing purely for difficulty competition, nodes compete by executing deterministic workloads, generating verifiable outputs, producing cryptographic execution receipts, and participating in decentralized validation.

Protocol Foundation

Proof of Useful Compute (PoUC)

In PoUC, computational work must produce reusable outputs that are independently verifiable. Validators must be able to reproduce execution, and receipts must be consensus-verifiable. This is the conceptual foundation of ComputeNet.

Determinism

Inputs produce reproducible outputs

Verifiability

Independent validators verify execution

Replay Resistance

Receipts resist duplication

Fraud Detection

Dishonest validators identifiable

Cost Efficiency

Verification cheaper than generation

Utility Production

Network generates reusable value

Verification Pipeline

The protocol approaches verification through a layered pipeline combining deterministic execution, reproducible workloads, execution hashing, portable compute receipts, validator re-execution, and consensus attestations.

Job Manifest

Deterministic execution blueprint

1

Deterministic Execution

Reproducible workload processing

2

Execution Hashing

Immutable output fingerprint

3

Receipt Construction

Portable evidence artifact

4

Validator Re-execution

Independent verification

5

Consensus Attestation

Distributed agreement

6
consensus_round:active
validator-alpha
accept0.34
validator-beta
accept0.33
validator-gamma
accept0.33
Consensus Ratio1.00

Validator Consensus

Validators serve as the trust infrastructure of ComputeNet. They verify receipts, cast attestations, aggregate acceptance ratios, and finalize valid execution bundles. No single validator is treated as authoritative — trust emerges from independent reproducibility.

  • Receipt validation
  • Consensus participation
  • Peer propagation
  • Fraud detection
Learn about validators
Fair Launch Philosophy

Open Protocol Principles

ComputeNet intends to follow a Bitcoin-style fair-launch philosophy where network participation emerges organically through open-source infrastructure and validator participation. The protocol prioritizes openness over exclusivity, utility over speculation, and infrastructure over hype.

No Premine

No founder allocation or hidden supply

No ICO

No public fundraising through token sales

No Central Custody

Protocol operates without custodial control

Open Participation

Validator participation through open rules

Utility-First

Prioritize useful compute over speculation

Research-First

Experimentation over marketing

Research Preview

Current Development Status

ComputeNet is currently operating in Research Preview / Private Testnet mode. The current network is non-economic, non-custodial, non-commercial, and experimental. There is currently no public token, no mining, no public rewards, and no economic issuance.

Protocol experimentation
Validator architecture testing
Compute receipt verification
Consensus validation
Distributed systems research
Live Validator Services
Active
Compute Receipt Generation
Operational
Public Observer Mode
Enabled
Future Directions

Long-Term Vision

The long-term objective of ComputeNet is a decentralized protocol for verifiable useful compute. The protocol exists to explore whether useful compute can remain decentralized and whether verification can remain cheaper than execution.

AI inference verificationDistributed scientific workloadsRendering networksSimulation marketsDecentralized benchmarkingVerifiable agent executionCryptographic proof marketplaces

Open Research Questions

01How should useful compute be measured?
02How should fraud be penalized?
03How can deterministic execution scale?
04What workloads qualify as useful?
05Can useful compute remain decentralized?
06Can verification remain cheaper than execution?

ComputeNet does not claim to have fully solved these questions. The protocol exists to explore them experimentally.

Explore the Protocol

ComputeNet is open-source and research-first. Read the whitepaper, explore the architecture, and follow the protocol's development.