Competitive Landscape
(Part 2 of 2 — same chapter in the PDF; split for the web site.)
Sahara AI [46] operates a decentralized Data Services Platform for collecting, refining, and labeling datasets—30+ enterprise clients, 200,000+ contributors, on-chain reward distribution in stablecoins and $SAHARA tokens. Data labeling is upstream of model training; Scrypted does not compete in the labeling layer but could register Sahara-curated datasets as ingredients or consume Sahara outputs in training recipes. The interaction is complementary: Sahara supplies labeled data; Scrypted orchestrates the training, inference, and commerce layers. 14.6 Integration targets vs competitors The field divides into three postures: Upstream suppliers (A, C, D′): Replicate, FAL, Modal, Together, OpenRouter, LiteLLM, Akash, Render Network — compute, rendering, and routing substrates Scrypted abstracts over. Not adversaries; their pricing and availability directly affect ingredient cost models. Akash and Render add decentralized compute supply that strengthens censorship resistance and cost competition. Infrastructure partners (D partial, E, F, H): x402 ecosystem, ERC-8004 tooling, Phala (TEE), Ritual (ZK/TEE verification, 8,000+ Infernet nodes), Gensyn and Sentient-class training networks, Sahara AI (data labeling), and the EigenLayer family (EigenCloud, EigenAI, EigenCompute, EigenDA) — Scrypted builds on or composes with these. Eigen is explicit in the decentralization plan (Chapter 16) and in the SWOT analysis (§14.3). Interoperability is the thesis. Head-to-head on network economics (D partial, G): Bittensor, Autonolas, Fetch.ai, Virtuals — overlapping on agent discovery, registry, and marketplace. Scrypted’s differentiation is the combination of attention-auction economics, recipe-level orchestration with per-step billing, CRPC verification, and path-aware ERC-8004 identity. No single competitor spans all five. The integration thesis — why combining these under one network creates value beyond the sum — is the central argument. 77
Source: transcribed from the compiled Scrypted Network Design whitepaper PDF for web reading. Layout, figures, and pagination may differ from the PDF.