Proof of Defensive Value (PoDV)
The Economic Engine of Qognet
Proof of Defensive Value (PoDV) is the proprietary consensus and incentive mechanism that powers the qognet Intelligence Ecosystem. PoDV rewards verifiable security contributions and predictive accuracy.
The Core Concept
PoDV operates on the principle that a node's value is determined by the "Defense Delta" which is the measurable gap between a potential exploit's impact and the successful mitigation triggered by the node’s data or analysis.
How PoDV Works
The Verification Cycle
The PoDV mechanism follows a four-stage lifecycle for every intelligence contribution:
1. Data Attribution (The Sentinel Phase)
When a Sentinel Node (SN) identifies a mempool anomaly or a suspicious contract interaction, it signs the data packet with its unique ZK-IDN. This creates an private immutable "Contribution Link."
- Novelty Scoring: The system checks if the data is unique. The first SN to report a specific threat vector receives a "First-Responder Multiplier." which boost the operator's reputation.
2. Cognitive Synthesis (The Cognito Phase)
Cognito Nodes (CN) pull raw data packet from the Mesh and run it through qognet's GNN-based AI models. To prove "Defensive Value," the CN must submit a Predictive Hypothesis (e.g., "This transaction will result in a $2M drainage of Pool X via Re-entrancy").
- Computation Proof: The
CNproves provides a succinct proof that the AI inference was executed correctly on the provided data.
3. Validation Finality & Consensus (The Validator Phase)
Validator Nodes (VN) cross-reference the Cognito Hypothesis against the current blockchain state.
- Verification: If the simulation confirms the threat, the
VNsigns a Defensive Signal. - Finality: Once 67% of stake-weighted
VNsagrees, the signal is finalized, and the Qognet Safety Score (QSS) is updated globally.
4. Value Settlement (The Reward Phase)
Once the "Defense" is finalized (or the simulated exploit is prevented), the PoDV algorithm calculates the rewards:
Why PoDV is a Game Changer
- Alignment of Interests: It turns security from a cost center into a profit center for node operators.
- Anti-Sybil: You cannot "fake" defensive value; the data must be verified by the AI layer and confirmed by the Validator consensus.
- Self-Optimizing: Over time, the most accurate nodes earn more reputation, increasing their influence in the network and making the overall "Brain" smarter.
PoDV Roles
| Component | Defensive Value Contribution | Primary Reward Metric |
|---|---|---|
| Sentinel | Sensory Data / First Response | Data Novelty, Reputation, uptime & Latency |
| Cognito | Predictive Intelligence | Hypothesis Accuracy & Compute Proof |
| Validator | Integrity & Finality | Consensus Participation & Uptime |