Truebit Verify
  • Getting Started
    • 📄What is Truebit Verify?
      • How does Truebit work?
      • System Actors
    • ⏱️Get Started
    • ⚙️Architecture
      • Truebit Verify Hub
      • Truebit Verify Nodes
      • What is a transcript?
        • Transcript example
        • API Transcript example
    • Key Concepts
      • What is verification?
      • Determinism
      • WebAssembly
      • Task instrumentation
  • Developing Truebit Tasks
    • Introduction
    • Writing Function Tasks
      • Supported languages
        • Javascript
        • Python
        • Rust
    • Writing API Tasks
    • Task examples
      • Function Task examples
        • Fibonacci
        • Reverse Alphabet
        • Encrypt sha256 using bun.js
        • Encrypt sha256 using Deno
        • ECDSA signature verification
        • NumPy example
      • API Task examples
        • Pet Store CRUD
        • API-Auth examples
    • Namespace management
    • Task Authorization
    • Truebit CLI
      • secret.json
  • Executing Truebit tasks
    • Introduction
    • Task Execution API
      • Execute Function Tasks
      • Execute API Tasks
      • Get Task Status
    • Transcript API
      • Get Transcript
      • Get Invoice
  • Community
    • Truebit Unchained Protocol
    • Support
Powered by GitBook
On this page
  • Bringing transparency to off-chain compute
  • Key concepts from the paper include​:
  • Bridging between decentralized and centralized services
  • Transcripts provide proof
  • Smoking Guns and Red Balloons
  • Download the technical report

Was this helpful?

  1. Community

Truebit Unchained Protocol

PreviousGet InvoiceNextSupport

Last updated 2 months ago

Was this helpful?

Bringing transparency to off-chain compute

Truebit Verify is underpinned by the latest research in verified compute. Our technical report lays out transparency as a new standard for certifying the integrity of decentralized compute tasks.

Key concepts from the paper include​:

Bridging between decentralized and centralized services

We introduce ‘transparency’ as a new standard for certifying the integrity of serverless operations.

Transcripts provide proof

Platform-independent, certified transcripts detail execution soundness and make applications tamper-proof.

Smoking Guns and Red Balloons

Machines can resist censorship by reporting smoking guns via ledger transactions or through game-theory techniques inspired by DARPA’s ‘Red Balloon Challenge.’

Download the technical report

Click to download the technical report

here