DECENTRALIZED AI INFERENCE PROTOCOL

Private Access.
Permissionless AI.

Share idle AI capacity, earn rewards. Access top models with crypto. No KYC. No tracking. Open source protocol.

Scroll to Explore
>PROVIDE & EARN

Share idle AI capacity. Earn USDC + TOKEN rewards.

$ npx clawhub@latest install idle-provide
Then run: clawd provide start
>USE AI

Access top AI models. No KYC. Pay with crypto.

$ npx clawhub@latest install idle-consume
Then run: clawd credits add 10
>RUN A RELAY

Support the network. Earn TOKEN passively.

$ clawd setup

Join the Veil network? [Y/n] Y
Enabled by default in clawd
Solana///QUIC///WASM///Rust///TypeScript///E2E Encryption///Optimistic Settlement///Fraud Proofs///TEE (SGX/SEV)///Merkle Trees///Ed25519///ChaCha20///X25519///Solana///QUIC///WASM///Rust///TypeScript///E2E Encryption///Optimistic Settlement///Fraud Proofs///TEE (SGX/SEV)///Merkle Trees///Ed25519///ChaCha20///X25519///
01

Protocol Design

Three roles. One network. No central authority. Providers share idle AI capacity through relays. Consumers access models anonymously. Everything settles on Solana.

Request Flow Architecture
CONSUMER / clawd
1
RELAY
VERIFYSTRIPWITNESS
5
PROVIDERWASM SANDBOX
Settlement Layer
SOLANA CHAIN
1Consumer encrypts prompt, sends to Relay
2Relay verifies identity + balance
3Relay strips identity, forwards to Provider
4Relay submits settlement witness on-chain
5Provider processes in WASM sandbox, returns result
6Result returned to Consumer via Relay
Providers Online
1,247
Relays Active
8,420
24h Volume
$8.4K
Models Available
12
veil@protocol:~
bash 5.2.15
Boot Sequence
_
System Overview

Protocol Core

Decentralized inference layer with cryptographic privacy guarantees.

>Roles:Provider / Consumer / Relay
>Settlement:Optimistic (Solana)
>Encryption:X25519 + ChaCha20
>Transport:QUIC (outbound only)
02
Trust architecture. Anonymity by design.

Security and Privacy

LIVE

Open source. Security by math and economics, not obscurity. Four layers. Each works even if providers modify their code. Identity stripped at source. Zero logging.

Layer Inspector
LayerLayer 1
NameCRYPTOGRAPHY
Bypass DifficultyImpossible
Depends OnMathematics
Components> E2E Encryption> Ed25519 Signatures
01
Baseline
Math + Economics
02
Open Source
MIT License
03
Trust Required
None
04
Auditable
By Anyone
03
Decentralized access

Network & Install

LIVE

clawd is the only way to access Veil. No public API gateway. No API keys. A local OpenAI-compatible gateway that Cursor, Windsurf, or any tool can connect to.

C
R
R
P
R
R
P
R
P
C
C = ConsumerR = RelayP = Provider
Nodes Online1,247/8,420
ThroughputAdaptive
Latency p99<50ms
Packet Loss0.001%
veil@protocol ~ install
# Share idle AI capacity, earn USDC + TOKEN

$ npx clawhub@latest install idle-provide
$ clawd provide start

> Mining started.
> Wallet: 7xK2...3mNp (auto-created)
> Models: claude-sonnet, claude-opus
> Status: EARNING
> _
ProtocolQUIC
TransportE2E TLS
Latency<50ms
BandwidthAdaptive
04
Sustainable incentives

Token Economics

Seven phases: Points, TGE, Staking, Pricing, Settlement, Burn, DAO. 1B fixed supply with deflationary burns. Revenue-proportional elastic release prevents death spirals.

Phase 0: Points + USDCStage 1/7
1  // Phase 0: Points + USDC (Month 0-3)
2  provider.reward = {
3    usdc: transaction.amount * 0.80,
4    points: consumer.usdc_spent * RATE
5  }
6  relay.reward = { points: witness_count * RATE }
7  genesis_bonus = first_30_days ? 5x : 1x
8  max_monthly = 500_000 // per provider
Pipeline Info
PointsDAO
Revenue Split80% / 10% / 10%
ReleaseElastic (Revenue)
Supply1B Fixed
Anti-SybilPoints = USDC spent
05
Emergent development

Build

Satoshi didn't design mining pools. He wrote a few rules. Pools, farms, exchanges, Lightning Network — all emerged on their own.

Linux wasn't planned by a committee. Wikipedia wasn't designed by an architect. Bitcoin wasn't managed by a CEO.

They were given rules. The rest emerged.

Veil Build works the same way.

VEIL BUILD PROTOCOL — 4 RULES
R1Code that passes verification can be merged.
R2Merge requires K independent stake signatures.
R3Protected modules require higher threshold.
R4Surviving code earns future revenue share.
INFERENCENetwork generates revenue
TREASURYFunds accumulate
BUILD REWARDSContributors earn share
BETTER PROTOCOLCode improves

Two lungs. One organism.

The inference network funds development. Development makes the inference network better.

← cycle repeats →
clawd build — autonomous development
$ clawd build
Scanning veil-protocol repos...
Found: 2 failing tests, 1 desired state
[1] core — relay timeout not handled
[2] core — TODO at src/provider.ts:42
[3] core — DESIRED: provider reputation (500 PTS) *
Select (or 'auto'): auto
Working...
✓ All tests passing
PR #42 created → awaiting verification

Linux wasn't planned. Wikipedia wasn't designed. Bitcoin wasn't managed.

They were given rules. The rest emerged.

Rules4
VerificationAutomated
StakeProgressive
RevenueAnchored
>
Interactive

Terminal

Explore the protocol. Type commands to interact with the Veil network.

veil@protocol ~ interactive
Welcome to Veil Protocol Terminal v1.0.0
Type "help" for available commands.
 
$