Network Integrity
Acceptable Use
Enforced Protocol Standards: April 9, 2026
To maintain the integrity and high performance of the decentralized compute pool, all users (Clients and Providers) must adhere to these strict execution guidelines.
1
1. Allowed Workloads
RenderOnNodes is strictly architected for 3D rendering, animation computation, and approved AI inferencing pipelines. Users may upload scene files (.blend, .fbx, etc.) and associated texture assets specifically for these purposes.
2
2. Prohibited Activities
Node Providers' hardware must not be utilized for unauthorized cryptographic mining (e.g., Proof of Work hashing), distributed denial of service (DDoS) generation, network scanning, or any activity that attempts to break the virtualization sandbox.
3
3. Content Restrictions
While the network prioritizes censorship resistance for artistic expression, users are strictly prohibited from utilizing the distributed compute power to generate illegal imagery, child exploitation material, or content that violates international terrorism laws.
4
4. Network Abuse & Slashing
Nodes found attempting to intercept client data, manipulate frame verification hashes, or spoof completion signals will face immediate network banishment and programmatic slashing of any locked governance stakes.
Report Network Abuse
If you detect a node behaving maliciously or a client uploading prohibited materials, report it immediately to protect the protocol.