Proof of Compute Security Documentation
Overview
The Merkle-Proof-of-Compute (M-PoC) system is a verifiable GPU-based computation framework designed for proof-of-work style mining. Each computation round produces deterministic, tamper-evident proofs that can be efficiently validated by a verifier or server.
This approach guarantees that all GPU workloads are:
Deterministic — reproducible using the same seed.
Verifiable — validated through Merkle root sampling.
Bound to origin — tied to an authenticated compiled miner client.
Security Architecture
Server-issued seed
Prevents precomputation and replay
✅
Per-loop seed binding
Enforces unique digest per loop (seed:i)
✅
Merkle tree commitment
Detects any tampering or partial work
✅
Random audit sampling
Enables low-cost probabilistic verification
✅
Nuitka-compiled miner (.pyd)
Obfuscates logic and embedded secrets
✅
App signing key
Authenticates official miner builds
✅
GPU hardware binding
Associates proofs with a specific GPU UUID
✅
Security Achievements
Fake GPU work
Merkle commitment + seed audit verification
Replay / reuse attacks
Unique server-issued seed per challenge
Digest manipulation
Merkle root verification
Binary modification
.pyd self-hash and signing key check
Binary cloning
GPU UUID + app key pairing
Offline forgery
Unpredictable seed generation by server
Miner Identity & Authenticity
Binary Hash Each miner self-hashes its
.pydbinary using SHA-256 and sends the result to the server. The server maintains a whitelist of valid build hashes.Application Private Key A private signing key is embedded within the compiled binary (protected and obfuscated). The miner signs
(seed + merkle_root + gpu_uuid)before submission.Server Verification The server verifies the signature using the corresponding public key, confirming that the proof originated from an official build and a registered GPU.
Final Notes
The miner’s deterministic path (
seed → matmul → digest → Merkle) ensures all verifications are reproducible.TF32 enforcement is removed as it’s not security-critical.
The compiled
.pydbinaries act as authenticated, tamper-resistant clients.Cloning the binary is ineffective since each proof is tied to both the GPU identity and the server-issued challenge.
Final Verdict: The current system — Merkle-Proof-of-Compute + Server-Seeded Challenges + Compiled & Signed Nuitka Miner — forms a robust, multi-layer proof-of-work verification model that is both tamper-evident and cryptographically secure.
This achieves lightweight, auditable, and cheat-resistant GPU compute verification. 🚀