Coin Market
How to use Render Network for decentralized GPU rendering
Published
1 month agoon
By
Key takeaways
Render Network connects GPU owners with creators, allowing users to rent idle graphics power for AI training, 3D rendering and crypto-related projects.
The RNDR token powers the ecosystem, enabling fast, transparent and decentralized transactions between creators and node operators.
Decentralized rendering is more accessible and cost-effective than traditional centralized GPU services, solving issues such as pricing, scalability and vendor lock-in.
Proof-of-render ensures verified outputs, rewarding only completed, validated tasks while maintaining blockchain-level trust and transparency.
The hunger for powerful graphics processing units (GPUs) has skyrocketed. Whether it’s training complex AI models or rendering high-fidelity 3D graphics, the demand often outstrips supply.
Traditional centralized GPU services, while effective, can be costly and sometimes inaccessible to smaller developers or artists. This is where the Render Network steps in, offering a decentralized approach to GPU rendering.
By connecting individuals who have idle GPU power with those who need it, Render Network creates a collaborative ecosystem that benefits both parties. This not only democratizes access to high-performance computing but also introduces a crypto-economic model, utilizing its native RNDR token to facilitate transactions.
In the sections that follow, you’ll learn how Render Network is contributing to the evolution of AI development and 3D rendering through decentralization and blockchain technology.
What is Render Network?
At its core, Render Network is like an Airbnb for GPU power. If you’ve got a powerful graphics card sitting idle, you can rent it out. And if you’re someone building an AI model or rendering a complex 3D scene but don’t have enough GPU muscle, you can tap into that unused power — on demand.
Here’s how it works:
Creators
These are the people who need serious computing power — think AI researchers training models, 3D artists rendering animations or developers working on visually demanding projects. Instead of buying expensive hardware or paying top dollar for centralized cloud services, they can just hop on Render Network and get access to what they need when they need it.
Node operators
On the flip side, there are folks who have GPUs collecting dust (or at least not being fully used). Maybe it’s a gaming rig that’s idle during work hours or a small mining setup looking for a better use case. These operators can plug into Render Network, offer up their GPU power, and earn crypto — specifically RNDR tokens — for their trouble.
RNDR token
The RNDR token (RNDR) is the fuel that keeps this whole ecosystem running. It’s the currency used to pay for jobs on the network. Creators pay in RNDR; operators earn in RNDR. Everything happens transparently onchain, and the token system helps keep things fair and efficient.
In short: Creators get access to affordable, decentralized computing power; node operators get rewarded for sharing their resources; and RNDR tokens make it all tick. It’s a win-win setup that’s especially useful in AI and crypto-heavy workflows.
Did you know? Render Network employs blockchain technology to ensure that every transaction and rendering task is securely recorded, promoting transparency and trust among users.
The role of decentralization in GPU rendering
If you’ve ever tried renting GPU power from a big cloud provider, you know it can get expensive fast. And even then, you’re often competing with major corporations for access to the best hardware. The whole system works, sure, but it’s not exactly built with flexibility or accessibility in mind.
That’s where decentralization comes in. Render Network flips the script by spreading the workload across a global network of independent GPU owners. Instead of relying on a single provider, you’re tapping into thousands of available machines — from gaming rigs to pro-grade render farms — that might otherwise sit idle.
What’s the problem with centralized GPU rendering?
Centralized services come with a few key headaches:
It’s pricey: Renting powerful GPUs from the likes of Amazon Web Services or Google Cloud can eat through your budget quickly, especially if you’re running long jobs like training an AI model.
Scalability is limited: If you suddenly need more power, scaling up isn’t always smooth or instant. You’re stuck waiting in line — or paying more for priority access.
Access isn’t equal: Big corporations tend to hoard the best GPU availability, which makes it harder for smaller teams or indie creators to get what they need when they need it.
Vendor lock-in is real: Once you build your pipeline around one provider, switching later can be a pain (and expensive).
Why decentralization makes more sense
Now, here’s what a decentralized network like Render offers instead:
Lower costs: Because you’re tapping into existing resources that would otherwise be unused, pricing tends to be way more affordable.
Flexible scaling: Need more power? The network can grow with you — just pull in more nodes.
Equal access: There’s no gatekeeping. Anyone can request GPU resources, and anyone can provide them. It’s a much more level playing field.
Earn while you sleep: If you’ve got a powerful GPU, you can make it work for you by sharing it on the network when you’re not using it.
All in all, decentralized GPU rendering is quickly becoming the practical choice for AI builders, 3D artists and crypto-native developers who want more control over their tools and budget.
The crypto economy within Render Network
As you briefly explored, at the heart of Render Network’s decentralized rendering platform is its native cryptocurrency, the RNDR token. Let’s dive deeper.
RNDR token mechanics
The RNDR token serves as the primary medium of exchange within the Render Network. Creators use RNDR tokens to pay for rendering services, while node operators earn these tokens by providing their GPU power to process rendering tasks. This system creates a self-sustaining economy where computational resources are efficiently allocated and fairly compensated.
Additionally, a small percentage of RNDR tokens, ranging from 0.5% to 5%, is charged on every transaction to support the ongoing development and maintenance of the network.
Earning RNDR tokens
Once onboarded, node operators can connect their GPUs to the network and start accepting rendering jobs. After successfully completing and submitting a rendering task, the work undergoes verification to ensure quality standards are met. Upon approval, the corresponding RNDR tokens are transferred to the node operator’s digital wallet as compensation for their contribution.
Spending RNDR tokens
Creators looking to access rendering services can acquire RNDR tokens through various cryptocurrency exchanges. Once they have the tokens, they can submit their rendering projects to the network. The system calculates the required RNDR tokens based on the project’s complexity and resource demands. After the rendering is completed and the output meets the creator’s expectations, the RNDR tokens are released from escrow and transferred to the node operators who processed the job.
This token-based economy not only streamlines the transaction process within the Render Network but also fosters a collaborative environment where both creators and node operators benefit from the decentralized exchange of rendering services.
Did you know? Render Network utilizes a unique proof-of-render mechanism, which validates completed rendering tasks before compensating node operators. This system mirrors blockchain’s transaction validation processes, ensuring that only verified work is rewarded.
Getting started with Render Network
Here’s how to get started with Render Network.
For creators
Setting up an account and submitting rendering tasks require the following:
Obtain an OctaneRender license: Ensure you have an active OctaneRender license or subscription, which can be purchased from OTOY.
Access the Creator Portal: With your OctaneRender credentials, log in to the Creator Portal.
Prepare your project: Export your project as an ORBX file using OctaneRender. This format encapsulates all necessary assets and settings for rendering.
Submit your job: Upload the ORBX file to the Creator Portal, configure your rendering parameters (such as resolution and sample size), and choose a service tier that fits your needs.
Monitor and retrieve results: Once submitted, you can monitor the progress of your rendering tasks through the portal. Upon completion, download your rendered assets directly from the platform.
For node operators
Registering GPUs on the network requires:
Express interest: Complete the Render Network Interest Form to join the onboarding queue.
Await onboarding instructions: Once a slot becomes available, the Render Network team will provide further instructions for setting up your node.
By following these steps and best practices, both creators and node operators can effectively engage with the Render Network, leveraging its decentralized infrastructure for efficient rendering solutions.
A bright future for Render Network?
Render Network is quickly becoming a go-to solution for anyone needing serious GPU power — especially in AI and crypto. Decentralizing access to high-performance computing makes rendering and model training faster, cheaper and way more accessible.
What’s exciting is where it’s headed. The network is expanding to support more advanced AI workflows and exploring deeper integration with other blockchain ecosystems. That means more tools, more flexibility and even broader use cases — whether you’re building with AI, working in 3D or developing onchain applications.
At the end of the day, Render Network is creating a new kind of infrastructure where creators and GPU owners can work together, earn and scale. Whether you’re here to build or contribute, it could be a space worth jumping into.
You may like
Coin Market
Kima joins Mastercard sandbox to enable stablecoin card top-ups
Published
25 minutes agoon
May 14, 2025By
Decentralized settlement protocol Kima has integrated into Mastercard’s sandbox program, enabling stablecoin-powered top-ups for prepaid cards directly from self-custody wallets.
According to an announcement shared with Cointelegraph, Mastercard partners can now rely on Kima’s settlement infrastructure to enable their prepaid cards to be topped up with stablecoins, including USDC (USDC) and Tether’s USDt (USDT), from self-custody wallets across more than 10 blockchains.
Kima CEO Eitan Katz said the integration shows that stablecoins can be practical for everyday use, removing friction and intermediaries from crypto-to-fiat conversions while expanding crypto usability.
“Our goal at Kima is to eliminate barriers between digital assets and traditional finance,” Katz said.
Related: Mastercard tokenized 30% of its transactions in 2024
Infrastructure designed for interoperability
Katz described Kima’s settlement system as asset-agnostic and designed to simplify cross-ecosystem payments, supporting public blockchains, private ledgers and traditional banking rails:
“Kima’s asset-agnostic settlement layer is designed to abstract the complexity of transferring value across disparate ecosystems, whether that’s public blockchains, private ledgers, or even traditional banking systems.”
According to the announcement, Kima’s infrastructure is aligned with Mastercard’s aim to bring stablecoins into mainstream financial usage. Katz rejects the Bitcoin and crypto hardliner vision of digital assets being contraposed to fiat currency, claiming that “crypto and fiat must coexist seamlessly to reach their full potential.”
Katz explained that Kima’s solution allows easy crosschain interoperability and eliminates reliance on intermediaries, custodians or complex smart contracts. This, in turn, reportedly enhances security and efficiency for all parties involved.
Related: Mastercard links with Circle, Paxos for merchant stablecoin payments
ECB includes Kima in digital euro initiative
Earlier in May, the European Central Bank (ECB) included Kima in a list of 70 private sector partners tasked with helping in digital euro innovation. The firms on the list have signed up to work with the ECB to explore digital euro payment functionalities and use cases.
“The breadth and creativity of the proposals highlights the digital euro’s potential as a catalyst for financial innovation in Europe,” ECB executive board member Piero Cipollone said at the time.
Source: Kima
Despite Kima’s institutional partnerships, Katz told Cointelegraph that “compliance shouldn’t mean giving up control of your funds or your data.” He said that know-your-client and Anti-Money Laundering checks are handled by third-party banks and virtual asset service providers at onboarding, and Kima never has access to the data.
Katz added that “once a user is cleared, every transaction carries immutable metadata tags that our protocol-level engine checks against local rules.” This, he said, covers compliance “from the European Union’s Markets in Crypto-Assets Regulation to Singapore’s regulatory guidelines — before settlement.”
Katz said that “keys are kept entirely under the users’ control,” while cryptographic proofs still allow for compliance.
“Institutions get a plug-and-play control layer and users enjoy true self-custody,” Katz added.
Magazine: Crypto wanted to overthrow banks, now it’s becoming them in stablecoin fight
Coin Market
The Q-Day Prize challenge, explained: Can quantum computers really break Bitcoin?
Published
25 minutes agoon
May 14, 2025By
What is the Q-Day prize?
The Q-Day Prize is a challenge to make the Bitcoin network quantum resistant.
On April 16, 2025, quantum computing-focused company Project 11 announced the “Q-Day Prize,” a competition to break a “toy version” of Bitcoin’s cryptography with a quantum computer. Contestants must complete the Q-Day Prize challenge by April 5, 2026.
Their reward? 1 Bitcoin (BTC).
The “Q” in Q-Day refers to quantum computing, the potential threat to many existing cryptographic security measures.
But can quantum computers break Bitcoin? Let’s find out.
Quantum computing and the threat to Bitcoin
Bitcoin utilizes the SHA-256 hashing algorithm, a National Security Agency (NSA)-developed encryption algorithm. SHA-256 prevents brute force attacks against the Bitcoin network, as decrypting it with current hardware can take decades. However, the emerging threat to SHA-256 is quantum computing, a method of computing that harnesses quantum physics and is much faster than traditional computing.
At a fundamental level, quantum computing utilizes quantum bits (qubits), which can exist in multiple states. This contradicts binary (traditional) computing, which uses binary bits (1s and 0s). In 1994, mathematician Peter Shor presented an algorithm for quantum computers to solve complex algorithms in seconds, rather than the decades it can take for conventional hardware. At the time, no hardware could effectively run it, but recent advances like Google Willow are nearing that capability.
Quantum computing, when paired with Shor’s algorithm, can disrupt Bitcoin cryptographic systems as we know them. Shor’s algorithm allows quantum computers to solve complex math super fast, potentially threatening Bitcoin’s safety.
Did you know? If quantum tech gets strong enough, Bitcoin’s current security could become obsolete, so developers are racing to create “quantum-proof” shields using new math that even Shor’s algorithm can’t break.
Quantum threat to Bitcoin: How real is the danger?
Bitcoin is vulnerable to quantum computing, but how serious is the risk?
When you create a crypto wallet, it generates two important things: a private key and a public key. The private key is a secret code, like a password, that you must keep safe. The public key is created from your private key, and your wallet address (like a bank account number) is made from the public key.
You share your wallet address with others so they can send you cryptocurrency, just like you share your email address for someone to contact you. However, you never share your private key. It’s like the password to your email — only you need it to access and spend the money in your wallet.
Your private key is like a master password that controls your crypto wallet. From this private key, your wallet can create many public keys, and each public key generates a wallet address.
For example, if you use a hardware wallet, it has one private key but can create unlimited public keys (wallet addresses). This means you can have different addresses for each cryptocurrency supported by the wallet or even multiple addresses for the same cryptocurrency, all managed by a single private key.
While generating a public key from a private key is straightforward, figuring out a private key from a public key is extremely hard — almost impossible — which keeps your wallet secure. Every time you send cryptocurrency, your private key creates a special code called a signature. This signature proves you own the funds and want to send them. The system that uses your private key, public key and signature to secure transactions is called the Elliptic Curve Digital Signature Algorithm (ECDSA).
It is believed that quantum computing could reverse the process and generate private keys out of public ones. It is feared that this could cause many Bitcoin holders (especially whales and Satoshi-era wallets) to lose their funds.
Bitcoin address types and quantum risks
When you send Bitcoin, you use a specific address type to direct the payment. Each address type has unique features, affecting security, privacy and vulnerability to quantum computing attacks like Shor’s algorithm.
P2PK address types
When you pay someone with Bitcoin, the transaction is typically considered a “pay-to-public-key” (P2PK). This was the most common payment method in 2009, according to a report from consulting firm Deloitte.
Much of the original Bitcoin released at the network’s launch is held in wallets with the P2PK address type, primarily due to the fact that they’ve sent transactions since Bitcoin’s 2009 launch. These addresses are long (up to 130 characters), making them less user-friendly.
Wallets with the P2PK address type are most susceptible to Shor’s algorithm, as it can brute force the private key from a P2PK wallet address.
P2PKH address types
There’s a second address type that’s more resistant to Shor’s algorithm: the pay-to-public-key-hash (P2PKH). P2PKH addresses are shorter and are generated from the hash (a unique, hexadecimal value) of a public key created using SHA-256 and RIPEMD-160 algorithms instead of displaying the full key itself.
These addresses are shorter (33-34 characters), start with “1,” and are encoded in Base58 format. Such addresses are widely used and include a checksum to prevent typos, making them more reliable.
P2PKH addresses are more resistant to Shor’s algorithm than P2PK because the public key is hashed. The public key is only revealed when you spend from the address (not when receiving). If a P2PKH address never sends Bitcoin, its public key stays hidden, offering better protection against quantum attacks.
However, reusing a P2PKH address (sending from it multiple times) exposes the public key, increasing vulnerability. Also, when you spend from a P2PKH address, the public key becomes visible on the blockchain, making transactions trackable.
Taproot addresses
Taproot is the newest address type, introduced in November 2021 via the Taproot soft fork. It uses Schnorr signatures instead of the ECDSA signatures used by P2PK and P2PKH. These addresses start with “bc1p,” use Bech32m encoding, and are 62 characters long.
They offer better privacy. Multisignature (multisig) transactions look like single-signature ones, hiding complex spending conditions. However, Taproot addresses expose the public key (or a tweaked version), making them vulnerable to Shor’s algorithm, similar to P2PK.
Did you know? Google’s “Willow” computer chip is capable of solving a complex problem in just five minutes. The same task would take a classical supercomputer 10 septillion (!) years.
The race toward quantum-proofing Bitcoin
Quantum resistance is a real challenge, but not an impossible one.
Quantum computers, still in early development, could one day use Shor’s algorithm to break Bitcoin’s cryptography by deriving private keys from public keys. This would threaten Bitcoin and other systems using SHA-256 or ECDSA (the algorithms securing Bitcoin transactions). However, this threat is not imminent, and solutions are already in progress.
While some believe that Project 11 presented the Q-Day Prize to take down Bitcoin, the company claims this initiative is aimed at “quantum-proofing” the network.
In July 2022, the US Department of Commerce’s National Institute of Standards and Technology (NIST) announced four quantum-resistant cryptographic algorithms resulting from a six-year challenge to develop such solutions.
Quantum computing won’t develop in isolation, and centralized systems like government and financial networks could be bigger targets than Bitcoin’s decentralized blockchain. These systems use outdated cryptography, like RSA, vulnerable to Shor’s algorithm, and store sensitive data (e.g., banking records). Their single points of failure make breaches easier than attacking Bitcoin’s distributed nodes.
The International Monetary Fund warns quantum computers could disrupt mobile banking, while Dr. Michele Mosca from the Institute for Quantum Computing highlights “harvest-now, decrypt-later” risks for centralized data (where attackers store encrypted data today to decrypt with future quantum computers). In 2024, the G7 Cyber Expert Group urged financial institutions to assess quantum risks, noting that centralized systems’ data could be exposed if intercepted now and decrypted later.
Did you know? Many blockchain networks are exploring quantum-resistant algorithms, such as Quantum Resistant Ledger or Algorand. These quantum computing blockchain security methods present a few different approaches.
How to increase your security against quantum threats
While the quantum computing cryptocurrency risk is less of a threat than one might think, it’s still best to stay prepared.
Still, if you’re worried about Bitcoin quantum vulnerability, there are a few precautions you can take to secure your crypto finances.
Avoid reusing public addresses: Most crypto wallets allow you to generate a new public address for every transaction. This practice will make it much harder to track your spending habits.Move funds to a private wallet: If you’ve been using the same public wallet address for some time, consider moving your funds to a new wallet with no history. This will help keep your spending habits private. Use a different blockchain network: Legacy networks like Bitcoin and Ethereum are considered less quantum resistant than newer networks with more modern security algorithms. Consider alternative networks with quantum resistance in mind.Stay informed: Pay attention to the results of the Q-Day Prize challenge, and stay up to date with quantum computing news so you can react accordingly. The best defense is an informed one.
While quantum risk is not immediate, developers and cybersecurity experts are actively working on solutions to ensure long-term security. In the meantime, users should stay updated about Bitcoin protocol updates and best practices, such as avoiding address reuse, as the network gradually moves toward quantum resistance.
Coin Market
Ex-SEC Chair Gary Gensler privately supported crypto — McHenry
Published
25 minutes agoon
May 14, 2025By
Former US Securities and Exchange Commission (SEC) Chair Gary Gensler may not have been as hostile to crypto behind closed doors as he appeared to be in public, according to former US Representative Patrick McHenry.
In a May 13 appearance on the Crypto in America podcast, McHenry revealed that during private meetings with Gensler, the former regulator expressed a far more nuanced view of digital assets.
“Did he come across, or was he as anti-crypto in private as he did in public?” McHenry was asked. His response: “No… Nope.”
McHenry noted that Gensler “saw the value of digital assets” and acknowledged the potential of blockchain technology during his time at the Massachusetts Institute of Technology.
Gerald Gallagher, general counsel at Sei Labs, also noted that Gensler played a role in developing the concept of the airdrop during his academic work, calling it a largely forgotten chapter in his background.
However, once Gensler became SEC chair, McHenry said, his stance shifted dramatically. “I had this weird, mistaken, stupid belief that he wouldn’t be that bad as SEC chair,” McHenry admitted. “And I mean, just the level of dismay.”
Source: Crypto in America
Related: SEC chair suggests ‘huge benefits’ in agency’s third crypto roundtable
Gensler’s crypto stance was “confusing”
McHenry said discussions with Gensler on crypto regulation were often confusing.
McHenry said conversations with Gensler about legal frameworks and content structures often started off as reasonable, but quickly became contradictory. He described how Gensler would initially agree with certain points, only to later reject the same facts he had acknowledged moments earlier.
According to McHenry, Gensler’s public opposition may have been shaped more by “Senate politics and confirmation politics than anything else.”
After departing the SEC on Jan. 20, Gensler returned to the Massachusetts Institute of Technology to teach fintech and AI.
Under Gensler’s tenure, which started in 2021, the SEC took an aggressive regulatory stance toward crypto, bringing upward of 100 regulatory actions against industry companies.
The regulatory hostility caused Gensler and his team much scrutiny and backlash from industry leaders.
In December 2024, Coinbase CEO Brian Armstrong announced that the crypto exchange would sever ties with law firms employing former SEC officials involved in what he said was an effort to “unlawfully kill” the crypto industry.
Source: Brian Armstrong
In January 2025, Gemini said it wouldn’t hire any MIT graduates unless the university dropped Gensler from his teaching role.
Magazine: Metric signals $250K Bitcoin is ‘best case,’ SOL, HYPE tipped for gains: Trade Secrets


Construmat Showcases the Transformation of Construction Towards Sustainability

Americans trust online checkout but lack confidence in consumer protection, according to new global index from Checkout.com

New global Digital Economy Trust Index exposes correlation between GDP growth and consumer trust in online payments

Whiteboard Series with NEAR | Ep: 45 Joel Thorstensson from ceramic.network

New Gooseneck Omni Antennas Offer Enhanced Signals in a Durable Package

Huawei Launches Global City Intelligent Twins Architecture to Accelerate City Digital Transformation

Why You Should Build on #NEAR – Co-founder Illia Polosukhin at CV Labs

Whiteboard Series with NEAR | Ep: 45 Joel Thorstensson from ceramic.network

NEAR End of Year Town Hall 2021: The Open Web World, MetaBUILD 2 Hackathon and 2021 recap
Trending
-
Coin Market4 days ago
BlackRock, crypto task force discuss ETP staking, tokenization
-
Coin Market4 days ago
UK to become ‘safe harbor’ for crypto with new draft rules — Experts
-
Technology4 days ago
Sivers Semiconductors Renews Debt Financing with a U.S. Headquartered Bank to Support Growth Strategy
-
Technology3 days ago
DynaFile Leverages the Power of Adobe Acrobat Sign to Eliminate Paper and Simplify HR Document Management
-
Technology4 days ago
Abu Dhabi and Japan sign agreements to strengthen partnerships, boost bilateral trade and investments
-
Coin Market3 days ago
Ex-UFC champ Conor McGregor touts Irish Bitcoin reserve in presidential bid
-
Technology4 days ago
Topband’s “Cloud-PV-ESS-Charger” Solutions Shine at The Smarter E Europe 2025 in Munich, Innovative Technologies Driving Transformation in the Energy Sector
-
Coin Market5 days ago
US senators ask DOJ, Treasury to consider Binance-Trump ties — Report