π§ Understanding the Flow
The complete flow demonstrates several key concepts:
1. Trustless Execution
Workers execute VB transactions, but Zenith doesn't trust them. Instead, workers must provide zero-knowledge proofs that their execution was correct.
2. Content-Addressed Storage
IPFS ensures data integrity through content addressing. If someone tries to modify the VB image or input data, the CID will change, and the execution will fail.
3. Scalable Architecture
Multiple workers can process different VBs simultaneously. Each worker can handle multiple VBs, creating a scalable compute network.
4. Developer Experience
Developers can use familiar frameworks like Substrate with minimal changes - just compile to RISC-V target instead of native.