3.2 Design Principles

  • Trustless by Default: Every sensitive operation (access, eligibility, identity, content verification) must be reducible to cryptographic proofs and on-chain state.

  • Node Diversity: Different node types (AI inference, relayers, ZK verifiers, indexers) coexist in one logical network, not in isolated silos.

  • Modular Standards: PXP standards provide clean, reusable building blocks for developers, without tying them to a single UI or business model.

  • Privacy Without Permission: Users interact via their own wallets or trusted frontends; no account creation or personal data sharing is required at the protocol level.

Last updated