Skip to main content
Centrix introduces a fundamentally different model based on decentralization, cryptographic verification, and economic incentives.

Core Principles

1. Permissionless Participation

  • No approval required to join as provider or requestor
  • Open-source software enables transparency
  • Anyone can fork and extend the protocol
  • Meritocratic reputation system, not arbitrary gatekeeping

2. Market-Driven Pricing

  • Providers set their own rates based on costs and demand
  • Requestors choose based on price, performance, and reputation
  • Real-time price discovery through competitive bidding
  • No artificial premiums or hidden fees

3. Cryptographic Verification

  • Results verified using redundant execution
  • Zero-knowledge proofs enable trustless validation
  • Slashing mechanisms punish fraudulent behavior
  • Reputation system rewards honest participation

4. Resource Optimization

  • Idle hardware worldwide can be monetized
  • Dynamic workload distribution maximizes utilization
  • Elastic scaling matches supply with demand
  • Environmental benefit from better resource use

5. User Sovereignty

  • Data and compute stay under user control
  • Portable workloads can move between providers
  • Transparent execution with auditable results
  • Censorship-resistant infrastructure

How Centrix Works

Step 1: Task Submission

  • Requestor submits computational task to network
  • Specifies requirements (CPU/GPU, memory, duration)
  • Sets maximum price willing to pay
  • Provides verification parameters

Step 2: Provider Matching

  • Available providers receive task broadcast
  • Submit bids based on their pricing
  • Include reputation score and performance history
  • Requestor selects optimal provider(s)

Step 3: Execution

  • Task deployed to provider’s isolated environment
  • Resource usage monitored in real-time
  • Intermediate checkpoints enable fault recovery
  • Network ensures provider remains honest

Step 4: Verification

  • Results submitted to verification layer
  • Multiple methods: redundant execution, ZK proofs, spot checks
  • Reputation updated based on performance
  • Disputes resolved through arbitration

Step 5: Payment

  • Smart contract releases escrowed funds
  • Provider receives payment in CXT tokens
  • Protocol fee distributed to stakeholders
  • Transaction recorded on blockchain

Key Differentiators

FeatureTraditional CloudCentrix Network
PricingFixed, premium markupMarket-driven, competitive
AccessCredit card, contractsCryptocurrency, instant
Lock-inHigh switching costsPortable workloads
TrustCentral authorityCryptographic proofs
Utilization~15% average~80%+ target
GeographicLimited regionsGlobal coverage
TransparencyBlack boxFully auditable
ParticipationHigh barriersPermissionless

Why This Model Works

Decentralization enables:
  • Competition on price and quality
  • Innovation without gatekeepers
  • Global resource optimization
  • Sustainable economics for all participants
  • True user empowerment