Decentralized,
Privacy-Preserving
AI Inference

Run large language models across a network of independent nodes. No single node sees your full input. Cryptographic protocols protect your prompts. On-chain staking keeps nodes honest.

Why UNFED AI

Three pillars that make decentralized inference private, secure, and fair.

🔒

Privacy via MPC

Your prompt is secret-shared between two independent MPC nodes at the embedding layer. No single node ever sees the raw text you typed. Inference happens on encrypted shares.

🌐

Decentralized Sharding

Transformer models are split into shards served by independent operators. Each node holds only a slice of the model — no single entity controls the full pipeline.

Trustless Economics

Nodes stake tokens on-chain via an ERC-20 escrow contract. Cheating nodes are detected by verifiers and slashed automatically. Honest work is rewarded proportionally through a P2Pool-style share chain.

How It Works

From prompt to response in four steps, across a privacy-preserving pipeline.

1

Client sends a prompt

The client encrypts the request using onion routing layers — one layer per node in the circuit.

2

MPC protects the embedding

Shard 0 runs as an MPC pair — two nodes that perform the embedding and first transformer layers on secret-shared inputs. Neither node can reconstruct the original tokens.

3

Compute shards process layers

Activations flow through the remaining shards (each run by an independent operator). Each shard processes its transformer layers and forwards the hidden states to the next node.

4

Response streamed back

The last shard samples tokens from the LM head and streams them back through the circuit. Compute shares are recorded on the share chain for settlement and payment.

The Cluster Marketplace

Like Monero mining pools, UNFED AI registries compete in a free market.

Operators create clusters

Any operator can deploy a registry, set economic rules (pricing, staking minimums, slash fractions), and publish model manifests. Each cluster is an independent business.

Nodes and clients choose freely

Nodes join whichever cluster offers the best deal. Clients discover clusters via seed lists and peer-exchange gossip, then pick based on price, latency, and model availability.