β³οΈEcological Roles
Last updated
Last updated
To further promote the operation of the Cassava Protocol network, we have introduced four types of ecological contributors, including Industry Masters, Data Miners, Device Network Validation Nodes, and Running Nodes.
Industry Masters are the primary data managers in the Cassava network, typically data contributors with significant resources and technical capabilities in the AI field. Their characteristics include:
- Industry Masters collaborate with Data Miners to plan high-quality manually labelled AI training data.
Industry Masters play a leading role in managing AI data. They need to be experienced AI developers and guide Data Miners in organizing high-quality AI data that can be used to train AI models.
Industry Masters have the authority to organize Data Miners to collect AI data and are the only category with the right to upload data to the Cassava Protocol network. (Regular users must seek advice and contact Industry Masters to obtain data value.)
To prevent Industry Masters from abusing community resources, each Industry Master must be elected by governance token holders. Additionally, as important participants in the network, Industry Masters are required to stake CSV tokens to become an Industry Master to prevent malicious behaviour.
Industry Masters can earn income from their contributions to the network and receive a share of the network's revenue (depending on the number of tokens they have staked). However, their behaviour will be constrained by the network, and any malicious actions will result in confiscating their staked CSV tokens.
Data Miners are crucial contributors in the Cassava network, and their main responsibility is to participate as contributors in organizing AI data. They are also responsible for retrieving data from the network. Data Miners earn income in CSV tokens based on the Proof-of-Work (PoW) algorithm.
Data Miners use Cassava Protocol cSBT as a basis for data locking and ecological value accumulation. This role can help Industry Masters with data collection, annotation, and review tasks anytime and anywhere. Data Miners can use the Cassava application on Android and iOS devices to earn CSV rewards.
Users who meet the minimum hardware requirements can become a Data Miner by registering on the network. By holding cSBT, they can authorize cSBT to access more data from Web2 and Web3 and gain more personal data value. At the same time, Data Miners can generate more data value by expanding social relationships and high-quality social interactions.
Device Network Validation Nodes play the role of data validators in the network. Their main task is to help the Cassava Network validate AI data that is collectively trained and provided by Industry Masters and Data Miners to improve data quality. These to-be-validated data streams adopt ZK-C and Fully Homomorphic Encryption (FHE) technologies to ensure the data security of other users in the network during the data validation process.
Simultaneously, every data retrieval in the network is treated as a network transaction, and Validation Nodes act as validators to verify and reach consensus on the transactions.
Validation Nodes follow the Delegated Proof-of-Stake (DPoS) consensus mechanism, which requires staking CSV tokens to increase the block generation incentive during network data validation and receive rewards from the network with each block generation.
Operating Nodes are interactive privacy-preserving data exchange nodes in the network (responsible for data encryption) and are supported by Cassava Network. Operating Nodes are designed for enterprises with data needs and allow them to use data information stored in Cassava Network, protected by homomorphic encryption technology.
At the same time, Cassava Protocol continuously provides targeted and high-quality data streams to enterprises based on their needs and the training results of large models. It gradually optimizes the structure of user data streams in Operating Nodes based on the efficiency of data stream supply. In the data acquisition process, enterprises pay CSV tokens to the network as network revenue, based on the data volume and data weight. The CSV tokens consumed in Operating Nodes (paid by enterprises) are mostly returned to the users and validation nodes that provide valuable data.
Operating Nodes are primarily users with computational capabilities. They can encrypt the data in the network and, through the DePIN system, provide computational power in a distributed manner for enterprises with model operations under Fully Homomorphic Encryption (FHE), earning computational rewards in the process.
Cassava Protocol hopes that all users can participate in the ecosystem roles in appropriate capacities, both as network computing power suppliers and as ecosystem contributors. Therefore, in the context of the distributed computing power network that Cassava Protocol values the most, we encourage users to participate using portable and small devices such as home computers, smartphones, iPads, and other common devices. Users are also allowed to contribute computing power to Cassava Protocol when their devices are idle, thereby fulfilling the protocol's computational needs.
However, before participating in the formal distributed computing power network, users need to provide network staking proof to obtain the rights to mining computational power. Each device will have limitations based on its staking capacity.