Compute Substrate

A Permissionless Computation Layer Without Authority


Author: csd
Date: 2026-01-25

Compute Substrate

A Permissionless Computation Layer Without
Authority

Author: csd

2026-01-25

Abstract:

We present Compute Substrate, a permissionless proof-of-work network for producing and

persisting speculative computation without semantic or outcome-level authority. Compute Substrate

introduces a new class of infrastructure: a public cognition layer that is cryptographically persistent

but structurally incapable of exercising power. Participants submit proposals (opaque computational

outputs) and attestations (support signals) at a cost. The network aggregates these signals

deterministically and commits them to a public ledger. Compute Substrate does not determine

correctness, resolve outcomes, or trigger actions. Its sole purpose is to maintain a reproducible,

cost-bearing history of what was proposed and supported over time, while remaining safe to ignore.

1. Introduction

Modern distributed systems increasingly rely on large-scale computation: predictions, rankings,

simulations, and analyses generated by many independent actors. In practice, the outputs of these

computations are often treated as decisions, triggering actions or reallocating resources. This

collapse of layers, allowing computation to accumulate authority, introduces fragility. Errors

become catastrophic, incentives distort behavior, and systems attract adversarial pressure

proportional to the consequences of being “right”. This paper explores a narrower question: can

computation be scaled independently of authority? That is, can a system persist the results of

computation without implying correctness, execution, or obligation?

Historically, computation has always been coupled to consequence: models guide decisions,

predictions trigger actions, and outputs implicitly carry authority. Compute Substrate is the first

distributed system that explicitly forbids this coupling at the protocol level. It introduces a new

category of infrastructure in which cognition may scale arbitrarily while remaining structurally

incapable of affecting the world.

We present Compute Substrate as a minimal affirmative answer. It is a network that

computes and records speculation only. Authority, interpretation, and action are explicitly external.

The system remains complete even if all recorded outputs are wrong or ignored forever.

Accordingly, Compute Substrate is defined as a substrate rather than an outcome-producing system.

It does not resolve uncertainty or produce outcomes. Instead, it provides a neutral, persistent layer

for recording computation under fixed cryptographic rules. The substrate is indifferent to meaning,


correctness, and use. All interpretation, validation, and action occur outside the protocol. Informally,

Compute Substrate can be understood as a system that extracts the informational output of

intelligence while stripping away its ability to act.

Figure 1. Layer separation in Compute Substrate.
The substrate records speculative computation without meaning or
execution. All authority and action exist strictly outside the protocol.

2. Design Goals

Compute Substrate is designed around the following goals:
- Permissionless participation: anyone may join, propose, attest, or mine.
- No authority: the network never decides correctness or resolves outcomes.
- No execution: recorded outputs never trigger actions.
- Cost-bearing computation: contributing signals requires paying fees.
- Deterministic aggregation: all nodes derive identical state from the same history.
- Verifiable history: all state is reproducible from genesis.
- Safe to ignore: external systems may observe or disregard outputs without consequence.
These goals intentionally exclude many features common to “intelligence” or “governance”

systems. The exclusions are essential to safety.

3. System Overview

3.1 Network Model

Compute Substrate is a peer-to-peer network secured by proof-of-work. Nodes perform three roles:
- Full nodes: validate blocks, maintain state, and serve data.
- Miners: construct blocks and perform proof-of-work.
- Clients: submit transactions and query aggregated outputs.
All roles are permissionless.

3.2 Blocks and Consensus

Blocks are linked by hash pointers and ordered by cumulative chainwork. The consensus rule is

simple: The canonical chain is the valid chain with the highest total chainwork. Proof-of-work

provides Sybil resistance and ensures that history is costly to rewrite. Block rewards and transaction


fees incentivize inclusion and liveness, not correctness of computation. In Compute Substrate,

proof-of-work secures temporal provenance rather than consensus truth: it makes public memory

costly to forge, not authoritative to follow.

Unlike conventional blockchains, which use proof-of-work or proof-of-stake to secure

economic state or execution outcomes, Compute Substrate uses proof-of-work solely to secure the

cost of writing into a shared public memory. The network does not enforce correctness, resolve

disputes, or assign authority to any computational result. It only ensures that inserting data into the

global record requires irreversible external cost. In this sense, Compute Substrate secures temporal

provenance rather than consensus truth.

3.2.1 Difficulty and Memory Production Rate

Proof-of-work secures temporal ordering by making history costly to rewrite. Difficulty primarily

regulates the rate at which this public record grows, and it bounds the cost of reorganizing recent

history. Compute Substrate does not attach semantic authority to on-chain artifacts, so manipulation

of ordering yields limited payoff beyond inclusion and timing. Difficulty adjustment is therefore

treated as a throughput and stability mechanism for the public record, not as a truth mechanism for

computation.

3.2.2 Consensus and Authority

In most distributed systems, consensus is used as a decision mechanism: once a network converges

on a state, that state carries immediate consequences. Assets are reassigned, actions are executed, or

obligations are enforced. In such systems, consensus functions as de facto authority. Although

protocols do not claim epistemic correctness, the presence of consequence causes participants and

external observers to treat accepted state as if it were authoritative.

Compute Substrate rejects this coupling. In this system, consensus guarantees only

reproducible agreement on history, not correctness, validity, or entitlement. The protocol assigns no

rights, powers, or obligations to any recorded artifact. Inclusion in the canonical chain confers no

semantic authority and produces no outcomes. By removing all protocol-level consequences from

consensus, Compute Substrate ensures that agreement remains purely coordinative. Consensus

establishes what was recorded and when, but never what is correct, valuable, or actionable.

Authority, interpretation, and execution are strictly external to the protocol.

Compute Substrate is structurally inert: no on-chain artifact can cause side effects beyond its

own reproduction in future state. This ensures that even perfect manipulation of the system cannot

translate into power, only into additional records. The protocol cannot express commands,

obligations, or triggers. All state transitions are internal to the ledger itself and carry no semantic

force outside the system.This design enforces a structural separation between coordination and

consequence. Whereas most systems use consensus to decide, Compute Substrate uses consensus

only to remember. This removes authority from the protocol layer entirely, such that the system is

structurally incapable of deciding outcomes or conferring power.


3.3 Transactions

Transactions follow a UTXO model. Each transaction may include an optional application payload.

Two payload types are defined:
- PROPOSE: submits a speculative computational output.
- ATTEST: expresses support for an existing proposal.
Transactions pay fees. Minimum fees are enforced for PROPOSE and ATTEST payloads to bound

spam.

Figure 2. Transaction flow in Compute Substrate.
Clients submit speculative outputs (PROPOSE) and weight them
(ATTEST). Miners include transactions in proof-of-work
blocks. Epoch aggregation ranks proposals deterministically
without implying correctness or triggering execution.

3.4 Proposals

A proposal consists of:
- a domain identifier (e.g. “finance”, “science”)
- an opaque payload (bytes)
- a timestamped inclusion height
The network does not interpret proposal contents. Meaning exists only to observers.

3.5 Attestations

An attestation references a specific proposal and contributes weight to it. Attestations are also

opaque to the protocol; they simply increase a proposal’s score within an epoch. Attestations

contribute weight equal to the transaction fee paid (in base units).

3.6 Epochs and Aggregation

Time is divided into fixed-length epochs. Within each epoch, proposals are ranked by the sum of

attestation weight they receive. Ties are broken deterministically by proposal identifier

(lexicographic ascending). At the end of an epoch, the network derives a deterministic Top-K list for

each domain. These lists are part of the canonical state and are queryable by any node. Importantly:
- Rankings do not imply correctness.
- Rankings do not trigger rewards or actions.
- Rankings may change across epochs or reorgs.


4. Incentives and Fees

Compute Substrate uses incentives only to ensure participation and liveness.

- Block rewards incentivize miners to secure the chain.

- Transaction fees incentivize inclusion and bound spam.

There are no rewards for being correct. Fees are paid regardless of outcome. This prevents

computation from becoming authority-bearing.

5. State, Forks, and Reorganizations

Like any proof-of-work chain, Compute Substrate may experience temporary forks. Nodes track

block headers, cumulative chainwork, and maintain undo logs for state transitions.

Figure 3. Forks and deterministic state rollback.
Competing chains may temporarily diverge. On reorganization,
proposals and attestations are rolled back and rankings recomputed so
that aggregated outputs always correspond to the canonical chain.

On reorganization:
- spent UTXOs are restored
- created UTXOs are removed
- proposal and attestation inserts are rolled back
This ensures that aggregated outputs always correspond to the canonical chain. Although the system

does not execute actions, correctness of reorg handling is essential for determinism and verifiability.

6. Security Properties

6.1 Adversarial Model and Threat Surface

Compute Substrate does not secure assets, execution, or authority. Therefore adversarial strategies

that seek to gain economic or control advantage by manipulating consensus yield no meaningful

payoff. The only adversarial action available is the creation of additional records at personal cost,

which does not degrade protocol determinism or confer influence. Adversaries may attempt to

spam, censor, or reorder transactions, but such actions affect only inclusion and ordering, not the

interpretation, correctness, or authority of recorded computation.


6.2 Adversarial Computation

Malicious or incorrect proposals are allowed by design. They are harmless because they carry no

authority. Compute Substrate is not designed to be correct; it is designed to be reproducible.

6.3 Spam Resistance

Spam is bounded by transaction fees and proof-of-work costs.

6.4 No Oracle Attacks

Because outcomes are never resolved, there is no oracle to corrupt and no incentive to do so.

6.5 Miner Behavior

Miners may reorder or exclude transactions, but can only affect inclusion, not interpretation or

execution.

6.6 Censorship

Many decentralized systems reduce centralized control while retaining semantic or outcome-level

authority. Compute Substrate removes these layers entirely, leaving transaction inclusion as the only

remaining censorship surface.

Because the protocol assigns no meaning, correctness, or authority to recorded computation,

censorship can occur only at the level of transaction inclusion and cannot target interpretation,

outcomes, or use. Once recorded, computational artifacts are reproduced deterministically and

cannot be selectively removed without rewriting chain history. As in other proof-of-work systems,

transaction inclusion may be delayed by individual miners, but no mechanism exists for semantic or

retroactive censorship within the protocol.

7. Non-Goals

Compute Substrate explicitly does not attempt to:
- determine truth or correctness
- resolve real-world outcomes
- execute actions or trigger payments
- govern participants
- provide predictions with guarantees
- replace markets, oracles, or governance systems
These functions belong to higher layers. In particular, Compute Substrate is not designed to make

better decisions, only to make it impossible for computation itself to decide.

8. Applications (External)

Compute Substrate is intended to be observed, not relied upon. External systems may use its outputs

as:
- speculative inputs
- advisory signals
- planning data
- exploratory intelligence
Any authority to act on these outputs must exist entirely outside the protocol.


9. Conclusion

Compute Substrate demonstrates that temporal ordering can be separated from authority in a

distributed ledger. By committing only speculative outputs under fixed cryptographic rules, the

system enables public cognition without decision, control, or obligation. All interpretation,

validation, and action are strictly external to the protocol, which remains complete even if ignored

forever.