3/4 Then, the model is distributed to users who post collateral in exchange for OMLized models. When fulfilling external requests (e.g., chatbots), model users must file permission requests with the Sentient Protocol. https://nostrcheck.me/media/eb6bb1d8a202f263c3d013fec8a883c1fa4d719544dd964831122b05d3332715/a54a54ee4354ab1e53bb93b1345505143b870a08d71df9d8b89a555b66dc2bce.webp https://nostrcheck.me/media/eb6bb1d8a202f263c3d013fec8a883c1fa4d719544dd964831122b05d3332715/4a5d1e4d6fbd5543b4e03cab6132b2504796b18ae48829e65f9e1bc7fd1aae03.webp
4/4 The protocol ensures payments by having provers input secret keys into the model. If a user hasn’t paid, the protocol detects it and penalizes them by taking collateral. Explore the full whitepaper: OML Whitepaper https://openagi.discourse.group/t/whitepaper-oml-unleashing-the-era-of-ai-entrepreneurship/1594 #StayTuned #SentientAGI #OML #TerranovaVentures https://nostrcheck.me/media/eb6bb1d8a202f263c3d013fec8a883c1fa4d719544dd964831122b05d3332715/419d0592339bad659f5785bf5238c3b134876e712d3cd66c46ede3df5c68b756.webp