The full whitepaper for Veil Protocol, a decentralized AI inference network.
- Abstract
- Introduction (AI Access Problem, Structural Arbitrage, The Third Paradigm)
- Protocol Design (Architecture, Three Roles, Request Flow)
- Privacy Architecture (Four Tiers, Envelope Encryption)
- Security Model (Threat Model, Four-Layer Defense, WASM Sandbox)
- Anti-Detection (Multi-Account Pooling, Natural Rhythm)
- Pricing Engine (Surge Formula, Capacity-Aware Pricing)
- Settlement (Optimistic Model, Fraud Proofs, Escalating Slash)
- Token Economics (Three Phases, Revenue Flywheel, Buyback)
- Build Protocol — RBOB (Four Rules, Repo-as-Taskboard, Three Precedents)
- Wallet & Onboarding (Device Encryption, Progressive Backup)
- Roadmap
- Related Work
- Conclusion
- References
Satoshi didn't design mining pools. He wrote rules. An industry emerged.
Veil Build applies the same principle: 4 rules, everything else emerges.