3.2 Design Principles
Trustless by Default: Every sensitive operation (access, eligibility, identity, content verification) must be reducible to cryptographic proofs and on-chain state.
Node Diversity: Different node types (AI inference, relayers, ZK verifiers, indexers) coexist in one logical network, not in isolated silos.
Modular Standards: PXP standards provide clean, reusable building blocks for developers, without tying them to a single UI or business model.
Privacy Without Permission: Users interact via their own wallets or trusted frontends; no account creation or personal data sharing is required at the protocol level.
Last updated
