Cryplex AI Docs
  • Getting Started
    • What is Cryplex
  • Why is Cryplex
  • Cryplex Mission
  • Cryplex Vision
  • What is Cryplex Node
    • What is Cryplex Node
    • What is Cryplex Point
    • How it works
  • Cryplex’s Training Model
    • Models Training
    • Cryplex - Online Storage Node
  • Cryplex Feature
    • Cryplex Feature
  • System Architecture & Technology
    • Technical Highlights
    • Core Components
    • Data Lifecycle
  • Tokenomics
    • Token metrics
    • Token Distribution Model
    • Functions of CPX Tokens
  • Benefits and Pricing
    • Pricing
    • Extra Points Reward
    • Cryplex - Community
  • How Cryplex Work
    • Setup Cryplex Extension
    • How Cryplex Storage Node Works
  • Support
    • FAQ
    • Official Link
  • Mechanism of Cryplex
  • Backer
    • HuntX Labs
Powered by GitBook
On this page

Mechanism of Cryplex

This section outlines the core mechanisms ensuring network integrity and data reliability within Cryplex's decentralized AI ecosystem.

Device and IP Address Policy for Network Integrity

We fully support and encourage the use of multiple genuine devices operating from distinct original IP addresses. However, if multiple devices are detected originating from the same IP address, our system will flag this as potentially posing a risk to the decentralized network.

Unfortunately, we cannot differentiate between legitimate users and those intentionally engaging in fraudulent activities through the use of proxies, VPNs, VPSs, or emulators. In such instances, the security and reliability of storing critical data, particularly AI training data, would be compromised, necessitating proactive intervention by our system.

Furthermore, sharing a single network connection across multiple devices can lead to bandwidth congestion, potentially disrupting data transmission.

Cryplex's objective is to establish a decentralized AI training and storage system accessible to everyone. To ensure the integrity and effectiveness of this system, we will be implementing stringent regulations regarding data mining and storage.

PreviousOfficial LinkNextHuntX Labs

Last updated 2 months ago