Links

H) Security

When a file is uploaded to the network, the scene is exploded into individual assets and each individual asset is encrypted and hashed, providing end-to-end traceability that enables the network to detect malicious behavior and protect chain of custody. Further, more complex permissions can be created through API Tokens - providing security management tools in more complex studio workflows consistent with emerging cloud production security principles. These assets remain encrypted end-to-end, both in transit and at rest, for additional security. The outputs themselves are also encrypted, so network traffic cannot be sniffed to peek at while the files being sent. Finally, RNDR is designed so that unencrypted assets are never stored on disc or in memory, making them irretrievable from a malicious actor. Mining nodes also do not store rendered outputs, reducing the potential for leaking of sensitive IP.
Using encryption, watermarking, scene explosion, and hashing, RNDR is built as a Zero Trust security framework, that does not rely on or assume hardware security. With Zero Trust, RNDR is able to scale with reduced network vulnerability. Incentives like the network’s Reputation Score that are built into the RNDR governance framework further deter malicious behavior.