Network Integrity

Acceptable Use

Enforced Protocol Standards: April 9, 2026

To maintain the integrity and high performance of the decentralized compute pool, all users (Clients and Providers) must adhere to these strict execution guidelines.

1

1. Allowed Workloads

RenderOnNodes is strictly architected for 3D rendering, animation computation, and approved AI inferencing pipelines. Users may upload scene files (.blend, .fbx, etc.) and associated texture assets specifically for these purposes.
2

2. Prohibited Activities

Node Providers' hardware must not be utilized for unauthorized cryptographic mining (e.g., Proof of Work hashing), distributed denial of service (DDoS) generation, network scanning, or any activity that attempts to break the virtualization sandbox.
3

3. Content Restrictions

While the network prioritizes censorship resistance for artistic expression, users are strictly prohibited from utilizing the distributed compute power to generate illegal imagery, child exploitation material, or content that violates international terrorism laws.
4

4. Network Abuse & Slashing

Nodes found attempting to intercept client data, manipulate frame verification hashes, or spoof completion signals will face immediate network banishment and programmatic slashing of any locked governance stakes.

Report Network Abuse

If you detect a node behaving maliciously or a client uploading prohibited materials, report it immediately to protect the protocol.