ZK-Edge: Intelligent ZK-Secure Edge Compute
The ZK-Edge is the physical extension of Layer 0 at the edge — running a local mix-node, executing private AI models, and extending zero-knowledge guarantees into the physical world.
Local Mix-Node: Layer 0 at the Edge
Every ZK-Edge device runs a full Katzenpost Echomix mix-node locally — routing Sphinx packets through encrypted layers with exponential delays and memoryless mixing.
Key Capabilities
- Gateway + Mix Capability — Operates as both entry gateway and intermediate mix node. Routes Sphinx packets with exponential delay, contributing to network-wide anonymity sets.
- Cover Traffic Generation — Emits continuous loop packets (2.5 pkt/s) to maintain anonymity guarantees. Local hardware ensures cover traffic runs even during network outages.
- SURB Support — Single-Use Reply Blocks enable unlinkable return paths. Hardware-backed key storage protects SURB generation and consumption from physical extraction.
- Three-Layer Topology — Participates in entry, middle, and exit mix layers. Configurable latency (100-200ms per layer) with hardware-timed exponential delays.
Local Private AI & Edge Inference
ZK-Edge runs local AI models with zerOS AI Runtime — on-device neural network execution with mixnet-routed inputs/outputs and ZK-proofs for verifiable outputs.
AI Features
- Local Model Execution — Runs LLMs, vision models, and custom inference pipelines entirely on edge hardware. Models load from encrypted storage, execute in secure enclaves.
- Funion Architecture — Echomix-based store→compute→store workflow. Input tensors stored in Pigeonhole storage, computation via local or remote Charlie nodes, results verified via ZK proofs.
- Privacy-Preserving APIs — Expose inference as a ZKNetwork service. Clients request inference through mixnet routing, receive verified outputs without revealing identity or query patterns.
- Federated Learning — Model updates route through mixnets, aggregated with differential privacy. Contribute to global model improvement without exposing local data or participation.
DePIN Operations
ZK-Edge devices form a community-owned physical infrastructure network that operates independently of centralized ISPs, cloud providers, and power grids.
Deployment Models
- Mesh WiFi Networks — Community-deployed mesh providing decentralized internet access, local peering, and privacy-preserving routing. Self-healing connectivity — if one node fails, traffic reroutes automatically.
- Micro-Greenhouse Program — AI-powered greenhouses with ZK-verified environmental data (soil moisture, pH, CO₂, temperature). Regenerative agriculture integration, community food sovereignty, educational curriculum for K-12 and higher ed.
- Edge Compute Network — Distributed compute for privacy-preserving inference, local AI model execution, and privacy-enhanced data processing. Batching matrix operations across GPU/TPU acceleration.
- IoT Sensor Integration — CircuitTree sensor suite (soil, pH, humidity, CO₂, ambient light, water levels). Data encrypted at source, transmitted via mixnet, verified via ZK-BOM provenance tracking.
Energy Sovereignty & Power Systems
ZK-Edge operates with power sovereignty — solar panels, battery backup, and micro-grid compatibility ensure the network functions independently of centralized power infrastructure.
Power Features
- Solar + Battery Platform — Runs pumps, sensors, controller, and lighting without grid dependence. Ideal for rural schools, urban gardens, field deployments, and disaster resilience hubs.
- Micro-Grid Compatible — Connects to community micro-grids, shares excess energy with neighboring nodes. Power-aware scheduling — inference batching aligns with solar production peaks.
- Off-Grid Operation — Inference continues during grid outages. Mix-node routing, AI model execution, and sensor data collection maintain operation without external power.
- Power-Aware Routing — Nodes with excess solar capacity prioritized for compute-intensive tasks. Energy costs factored into ZKN reward calculations for sustainable operations.
Supply Chain & ZK-BOM Provenance
Every ZK-Edge device carries a ZK-BOM (Bill of Materials) with recursive zero-knowledge proofs — enabling verifiable supply chain integrity from silicon fab to deployment in your community.
Provenance Features
- Recursive ZK Proofs — Each component (SoC, RAM, sensors, power system) verified via recursive Noir circuits. Supply chain provenance tracked from manufacturer to deployment — unlinkable from your identity.
- Hardware Authenticity — Verify your device hasn't been tampered with during shipping. ZK-BOM proofs confirm component authenticity without revealing supplier relationships or purchase history.
- Local Manufacturing — Cosmo-localism in practice — open source hardware designs flow globally, production happens locally using regional materials and labor. Reduces shipping emissions, strengthens local economies.
- Tamper Evidence — Hardware intrusion detection triggers automatic key rotation and ZK re-attestation. Physical tamper events recorded on-chain via mixnet, alerting neighboring nodes without exposing location.
zerOS: Hardened Edge Operating System
zerOS is a hardened Linux-based operating system purpose-built for ZK-Edge devices — minimal attack surface, signed boot chain, encrypted storage, and automatic security updates.
OS Features
- Minimal Attack Surface — Stripped-down kernel with only essential services. Mix-node, AI runtime, and sensor APIs are the only exposed interfaces — everything else locked down.
- Signed Boot Chain — Secure boot verifies every layer from BIOS to userspace. Compromised boot paths trigger hardware lockout, ZK proof generation, and neighbor notification via mixnet.
- Encrypted Storage — Full-disk encryption with hardware-backed key storage. Model weights, sensor data, and mixnet keys never exist in plaintext outside secure enclaves.
- Automatic Security Updates — OTA updates verified via ZK-BOM proofs. Update packages routed through mixnets, installed only after cryptographic verification — no plaintext telemetry, no usage tracking.
Proof of Useful Work: Earn ZKN for Operation
ZK-Edge operators earn ZKN through Proof of Useful Work — rewarded for bandwidth, compute, data integrity, and uptime.
Reward Mechanisms
- Node Operation Rewards — Earn ZKN for mix-node uptime, bandwidth contribution, and successful packet routing. Rewards scale with network traffic, latency performance, and SURB success rates.
- Compute Bounties — Local AI inference earns ZKN proportional to model complexity, compute time, and result verification. Pigeonhole storage/retrieval operations also rewardable.
- Sensor Data Rewards — Verifiable sensor readings (ZK-BOM provenanced) earn ZKN. Micro-greenhouse operators earn for environmental data, crop yields, and regenerative outcomes.
- Reputation Staking — Higher uptime, faster inference, and accurate data grows node reputation. Reputation staking unlocks enterprise clients, priority routing, and boosted ZKN multipliers (up to 3x for 24-month locks).
Deployment Models
Use Cases
- Educational (K-12 + Higher Ed) — Micro-greenhouse kits in schools for STEM education, environmental science, and regenerative agriculture. Students earn contributor credentials, participate in DAO governance.
- Community Hubs — Commons Hub deployments with 3D printer, laser lab, and workshop space. Host workshops, deploy mesh WiFi, coordinate local resilience initiatives.
- Rural & Off-Grid — Solar-powered nodes in remote areas, providing connectivity, local AI services, and environmental monitoring. Operates independently of ISP or grid infrastructure.
- Enterprise & Municipal — Secure edge compute for healthcare (HIPAA), legal (attorney-client privilege), and municipal resilience. ZK-verified operations with selective disclosure for compliance.
See also: Architecture | DAO Governance