What is verification?

In Truebit Verify, developers deploy application functions to a decentralized computing network that promises virtually limitless compute power, fault tolerance, and consensus-based security. Truebit uses verification to make sure that the nodes in the computing network execute Truebit Tasks accurately and to prove that no one has modified the task's inputs, outputs, or code.

While you can read the full story of how Truebit's verification works in our technical report, the important thing to know when you're using the system is that we verify in two stages.

In Stage 1, the Truebit Verify Hub checks the work of the Nodes by dispatching a task request to multiple nodes and comparing their results. The Truebit Verification Game comes into play when nodes don't provide the same result.

In Stage 2, we audit work of the Truebit Verify Hub using the Truebit Unchained transparency protocol.

One of the benefits of Truebit's verification approach is that it creates an environment where decentralized compute nodes are incentivized to be good actors at all times, and penalized harshly when they do not provide accurate results. Because of this, very few task requests are likely to fail verification, providing a rational basis for trust in all task requests.

Last updated

Was this helpful?