Four ways to put money in.
If Veritas Protocol becomes a real economy, the money flows through four distinct layers. Each is a different kind of investment with a different risk profile and a different role. This page explains each — what it does, what you'd be funding, what could go wrong.
~ 9-minute read · No fundraising deck · Honest about risk
This page is descriptive, not promotional. There is no live token, no securities offering, no fund accepting capital. The Veritas Protocol working paper is in v0.2 draft. Several of the things described below cannot legally exist until specific structures are in place. The page exists so people thinking about this space can understand what the four investment shapes would look like — and where the real risks live.
1Why the project might be a real place to put money
Most "fact-checking" or "trust" projects either have no money flow at all (donation-only, runs on grants) or have a speculation token disconnected from real services (the Civil / Po.et / Bitpress lineage that didn't survive). Both shapes have known failure modes.
The Veritas economy is designed to have real services priced in real money: AI laboratories paying for grounding access, websites paying for trust badges, content publishers paying for priority verification, parties paying for investigations. The validators (the institutions doing the checking work) earn a 60–70% share. This is service revenue — closer to a B2B SaaS or a network like Chainlink than to a speculation token.
Whether the demand actually materialises is the open question. The critical review flagged it as the single biggest risk. The plain-English critical review goes through it.
If the demand does materialise, the protocol creates four distinct economic layers. Each is its own investment thesis.
2Path 1 — invest in a verification center
Run or fund an institution that does the actual verification work and earns the 60–70% revenue share.
This is the most direct way to participate. Verification centers — universities, libraries, newsrooms, research institutes, or independent specialised teams — receive payments per attestation, per investigation, and through stipends from the foundation treasury.
What you'd actually fund
Operating costs of an institutional validator: editorial staff, infrastructure (servers, signing keys, gossip-network connectivity), legal coverage (defamation insurance, jurisdictional compliance), audit and quality assurance.
A reasonable Phase II validator operates with a small team: 2–3 editors, 1 ops engineer, 1 part-time legal counsel. Annual operating cost in the range of $200–400K depending on jurisdiction and scope.
What you'd earn
Revenue scales with verification volume. At Phase II steady state with ~12 institutional validators and the base-case revenue scenario (~$1.8M/year gross), each validator earns approximately $80–120K. At Phase III (50–80 validators, base scenario ~$17M/year gross), individual validator revenue could reach $150–250K. Upside scales with the optimistic AI-laboratory revenue case but isn't guaranteed.
Investment shape
- Endowment-style: donate to an existing institution to fund its verification arm. Tax-deductible in many jurisdictions. Returns are mission impact, not financial.
- Equity in a for-profit verification firm: fund a new specialised verification firm — for example, a deep-dive investigative-journalism cooperative — that takes paid commissions and accumulates token revenue. Returns are equity in a service business with growing demand if the protocol succeeds.
- Hybrid: some validators operate as B-corps or non-profits with revenue feeding mission programs.
What could go wrong
- Volume might not arrive at projected scale (AI-lab risk).
- Defamation lawsuits in hostile jurisdictions could exceed insurance coverage.
- Reputation damage from a single bad attestation could collapse a center's economic position.
- Validator labor market may saturate faster than revenue grows.
This is the lowest-risk path of the four. It maps onto a known business shape (small-scale specialised research/journalism firm). The downside is the upside is correspondingly modest — you're funding a service business, not a network.
3Path 2 — invest in the utility token
Buy and hold the protocol's native utility token, used by AI labs and websites to pay for services.
The token is the medium of exchange across the protocol economy. AI laboratories pay for grounding queries with it. Websites pay for verification certificates with it. Validators earn it for their work and convert to stable assets via the treasury.
What the token actually is
A utility token following the Chainlink pattern: service-payment, not speculation. The current design (under regulatory review) includes a treasury-backed buyback mechanism — validators can burn tokens for stable assets at a treasury-set rate. The next paper version (v0.3) may drop the burn mechanism on regulatory advice, in which case the treasury pays validators in stable assets directly and the token is purely consumable.
The investment thesis
Token value scales with protocol service volume. As more AI laboratories integrate, more websites adopt the certificate, more investigation commissions flow — demand for the token rises. If validator burn is enabled, supply contracts as treasury reserves grow. If burn is not enabled, value comes from utility (you need tokens to pay for services).
In other words: holding the token is approximately equivalent to holding a claim on future service revenue across the protocol.
Numbers (illustrative, not promised)
| Scenario | Year-3 service revenue | Implied token economy |
|---|---|---|
| Pessimistic (no major AI-lab integration) | $5–15M | Small. Token has utility but limited liquidity. |
| Base (one major lab + steady certificate growth) | $50–150M | Functional. Comparable to early Chainlink (~2018-2019). |
| Optimistic (multiple labs, scaled certificates) | $500M–$1B+ | Substantial network value. |
What could go wrong — and these are real
- Regulatory reclassification. The biggest risk. If a regulator declares the token a security after launch, US persons may be forced to divest, exchanges may delist, the legal entity may need to wind down.
- The burn mechanism is the weakest legal link. Quant analysis recommended dropping it before Phase II launch. If the foundation goes ahead with burn anyway and faces enforcement, the value-bridge collapses.
- Token-economic capture. Whales accumulate enough token supply to pressure treasury parameters. Mitigations are designed in but unproven.
- The whole AI-lab thesis fails. If AI laboratories don't integrate, service volume stays small and the token has limited demand.
- Failed-predecessor pattern. Civil, Po.et, Bitpress, Factmata — the graveyard is real. We've designed against the specific failure modes, but designing against history doesn't guarantee not repeating it.
This is the highest-volatility path of the four. It's also where crypto-native investors typically focus. If you're considering this path, read the deep tokenomics analysis and the critical review before forming a position.
4Path 3 — invest in AI-augmented verification teams
Fund teams that build AI-assisted verification tooling on top of the validator layer.
This is one layer above the verification centers. The centers do the work. AI-augmented teams build the tools that let centers do verification 5–10× faster: claim atomisation, source tracing, evidence cross-checking, drafting attestations, anomaly detection. Plus AI models specifically trained on verification reasoning, deployed as services to the centers.
The opportunity
Verification labour is the bottleneck. A human expert can carefully verify maybe 20–40 claims per week. The internet produces millions per day. Even with the protocol's design (verification is incentive-routed, not exhaustive), there's a labour gap that can only close with tooling.
AI-assisted verification — done well, with humans in the loop and outputs reviewed — can multiply throughput. But it requires specialised tooling. That's where this investment thesis lives.
What teams in this layer would build
- Claim atomisation engines: break a long article into individual factual claims with precise wording.
- Source-tracing bots: follow citation chains; flag broken links, retracted papers, fabricated sources.
- Evidence cross-check tools: compare claims against trusted databases (PubMed, court records, government filings).
- Drafting assistants: generate first-draft attestations for human editors to refine and sign.
- Specialised verification AI models: fine-tuned on the corpus of high-quality fact-check work; deployed as APIs to the centers.
- Anomaly detection: spot patterns of bad-faith commissioning, sock-puppet validators, fabricated provenance graphs.
Investment shape
Equity in startups serving the verification-center market. Roughly comparable to investing in legal-tech (firms serving law practices) or revenue-cycle-management vendors (firms serving hospitals). The customer is the verification center; the protocol creates the addressable market.
This layer doesn't exist yet. It would emerge once 20–50 verification centers are operating and have clear pain points. Realistically a Phase III opportunity (18+ months from now), not Phase II.
What could go wrong
- Verification centers may build tooling in-house rather than buy.
- The AI models needed for high-quality verification may not yet exist (current LLMs hallucinate, which is the original problem).
- Open-source tools may dominate, limiting commercial returns.
- The whole protocol may not scale to enough verification centers to support a vendor ecosystem.
This is a venture-equity thesis. Returns are correlated with protocol success but not identical to it.
5Path 4 — invest in the application layer
Fund consumer apps, websites, browsers, AI assistants, search products — anything that uses CPML to render dynamic, profile-aware experiences.
This is the layer that touches end users. Once CPML is a thing, every reading experience can become profile-aware: news that highlights what your trusted communities verify, AI assistants that ground in your chosen consensus standards, search engines that re-rank by your epistemic preferences, education platforms that adapt content to your learning frame.
The analogy
Compare to early app stores. Once the App Store existed, an entire ecosystem of consumer apps emerged that depended on it. Once WordPress existed, an entire ecosystem of publishers emerged. Once OAuth and Stripe existed, an entire generation of SaaS apps emerged on top of those primitives.
If CPML becomes a real primitive, products that consume it become possible. Products that build on top of CPML rather than reinvent the trust layer.
What this layer would look like
- News-reader apps that show you each story's verification status filtered through your CPML.
- Browser extensions that overlay verification badges on every webpage you visit.
- AI assistants that ground responses in your consensus profile (your chosen scientific community, your chosen historical frame, etc.).
- Search engines that re-rank results based on which sources your CPML trusts most.
- Education platforms that adapt content presentation to the learner's stated epistemic frame.
- Research tools that show academics how a claim is regarded across multiple specialty consensuses.
- Civic and policy products that surface where consensus exists vs where contestation is real.
- Specialised vertical applications: medical, legal, financial — each with domain-specific verification rules.
Investment shape
Equity in consumer-software startups building on the protocol. Risk profile resembles seed-stage consumer SaaS or AI-tooling startups. The protocol creates the underlying primitive; specific applications win or lose based on product-market fit.
Phase III opportunity. Realistically these products start emerging once CPML adoption reaches ~100K users, which the consensus-quiz MVP is designed to bootstrap.
What could go wrong
- The application layer doesn't materialise because the underlying protocol fails to reach critical mass.
- Products built on CPML get out-competed by products with proprietary trust signals that have more network effects.
- Consumer adoption of profile-aware reading turns out to be smaller than the CPML thesis assumes.
- Big platforms (Google, Apple, Microsoft) build similar functionality natively, capturing the value.
This is the broadest opportunity by surface area but the most dependent on protocol-level success.
6Path 5 — anti-hallucination plugins for end users
Build prosumer plugins that ground users' AI assistants against Veritas — independent of whether the AI lab itself integrates.
Browser extensions, mobile apps, vertical-SaaS products. The user pays a subscription. Their ChatGPT / Claude / Gemini / Copilot output gets verification overlays. The validator network earns from user-side queries — even if no AI lab signs up directly.
Why this matters separately from path 1
Path 1 (AI labs paying) depends on Anthropic, OpenAI, Google, Mistral signing up. The critical review flagged this as the single biggest risk — there's no precedent for frontier labs paying for third-party grounding at scale.
Path 5 routes around that. Imagine a Chrome extension that:
- Watches you chat with your AI assistant of choice.
- Pulls out the factual claims from the AI's reply.
- Quietly checks each one against Veritas using your consensus profile.
- Highlights claims that are contested, unsupported, or flagged for retraction — with a click-through to the actual sources.
- Optionally rewrites the AI's answer with citations you can verify.
You pay $10/month. Your AI hallucinates noticeably less. The validator network gets paid per check. Nobody at the AI lab needed to do anything.
Who would build these
- Existing prosumer extension companies (Grammarly, Readwise, NotebookLM-style products).
- Specialised vertical-AI products — legal AI, medical AI, journalism AI — where verification is already mission-critical.
- New independent startups positioning themselves as "AI grounding done right."
- Privacy-focused browsers (Brave, Arc) and open-weight-model platforms (Hugging Face, Together AI) integrating it as a competitive feature.
Numbers
A plugin with 100,000 paying users at $10/month is $12M/year top-line. If 30% flows through the Veritas API as service fees, that's $3–4M/year of service-fee revenue from one product. Several Path-5 products in parallel can plausibly produce $5–20M/year independent of AI-lab adoption.
That's meaningful insulation against the AI-lab risk. Path 5 isn't just another investment opportunity — it's also a fallback for the whole protocol's economics if Path 1 doesn't materialise.
What could go wrong
- Big AI labs build their own grounding. Plugin gets squeezed. But: plugins differentiate on user-owned CPML (your preferences, your way) — a feature big labs structurally can't replicate.
- Plugin distribution is hard. Browser extensions famously suffer from low organic install rates. Mitigation: vertical SaaS (legal, medical) has stronger paths.
- Privacy concerns. A plugin watching your AI conversations is a high-trust ask. Mitigation: client-side processing, no centralised logging.
7Path 6 — defensive patent portfolio (urgent and underappreciated)
Pay to file the patents on Veritas's novel mechanisms — so that nobody else can.
Not glamorous. Not high-yield. But potentially the single most-impactful $2M anyone could put into the project. If a hostile competitor or patent troll files first on the same primitives, the entire protocol could be legally blocked. Filing defensively is insurance against that.
What this is
The working paper describes several mechanisms that are probably patentable: cascading retraction with quorum-scaling, source-authenticated retractions, the CPML composition algorithm, the investigation-market matching, the signed CPML registry, the anti-hallucination-plugin architecture. Roughly 10–20 distinct candidate patents.
Filing defensively means:
- The Veritas Foundation files the patents in the US, EU, Japan, China.
- The patents are committed to a defensive-only licensing scheme — the same model Linux uses (Open Invention Network), or what Twitter uses (Innovator's Patent Agreement).
- Anyone using the Veritas Protocol gets a perpetual royalty-free license.
- Hostile actors who try to file similar claims later get rejected by the patent office because the foundation already has prior art on file.
Why it's urgent
The working paper has been public since April 2026. In Europe, public disclosure starts a clock running on novelty immediately. Patent applications in Europe must be filed before public disclosure — there is no grace period. In the United States there's a 12-month grace period (so US filings have until April 2027), but that's tighter than it sounds once you account for drafting time.
If Path 6 is going to happen, drafting needs to start in the next 3–6 months. After that, the European patents on the most novel pieces are gone, full stop.
Cost
Roughly $1.5M–$3M total over the life of the portfolio for 10 filings across US + EU + Japan. Most spending is front-loaded (drafting + prosecution in years 1–5); maintenance is a long-tail cost that can be dropped if a patent is no longer strategic.
That's small compared to the other paths. But the timing window is uniquely tight.
Returns
Defensive patent portfolios are not high-yield investments. The return shows up as continued protocol existence rather than as cash flow.
If a $2M portfolio prevents a hostile blocking patent that would otherwise cost the protocol $10M–$100M in legal exposure or forced redesign, that's a 5–50× implicit return on capital. Cash licensing income from non-aligned commercial users is modest — maybe $50K–$500K/year — but that's not why you'd fund this. You'd fund it because the alternative (no defensive portfolio, exposure to hostile filings) puts everything else at risk.
What could go wrong
- Defensive-only commitment slips. Pressure can build over years to enforce offensively. Mitigation: legally-irrevocable defensive-license commitments to established frameworks (Open Invention Network model).
- Software patents are increasingly hard to enforce. US case law has narrowed eligibility substantially. Some patents may issue but fail in court. Mitigation: target the most-eligible categories (cryptographic methods, specific data-structure-plus-process); accept that the abstract method claims may not survive.
- Patent trolls file first anyway. Mitigation: file fast on highest-priority mechanisms; publish detailed prior-art descriptions for the rest (defensive publication).
- Foundation gets captured. An IP-holding entity is a high-value target. Mitigation: irrevocable defensive licensing commitments + multi-stakeholder governance + OIN-style external pool participation.
Investment shape
The cleanest model: the Veritas Foundation files the patents and commits them to a defensive-only license framework. Investors who fund the prosecution get a board seat or governance influence rather than direct cash returns.
Other models (separate IP-holding entity; consortium pool with multiple parties co-filing) are possible but more complex. Foundation-held with defensive-license commitment is the recommended starting structure.
If you're a serious investor thinking about Veritas at the protocol level — not just one path — funding Path 6 alongside one of the operational paths (validators, the token, plugins, or the application layer) is almost certainly the right move. The patents protect everything else you've invested in.
8Putting the six together
| Path | What you fund | When realistic | Risk | Upside |
|---|---|---|---|---|
| 1. Verification center | Operating institution / staff / infra | Phase II (now-ish) | Low | Modest stable revenue |
| 2. Utility token | Network medium of exchange | Phase II launch | High (regulatory, adoption) | Network-value upside if successful |
| 3. AI-augmented verification | Tooling startups serving centers | Phase III | Medium-high | Vertical SaaS multiples |
| 4. CPML application layer | Consumer / B2B apps using CPML | Phase III | Medium-high | Broadest market, most dependent on protocol |
| 5. Anti-hallucination plugins | Prosumer products that ground AI output | Phase II–III | Medium | Direct B2C revenue, insulates from AI-lab risk |
| 6. Defensive patents | Patent prosecution + licensing entity | Phase I (urgent — clock running) | Low–medium (defensive) | Asymmetric: prevents blocking; modest direct yield |
A diversified position across multiple paths approximates a bet on the whole protocol succeeding. A concentrated position in one path is a bet on a specific layer. Path 6 is special: it's the path most worth combining with whichever other path you choose, because it protects all the others.
9Public-interest path — alongside or instead of investment
Veritas is designed to function as public infrastructure, not as a financial vehicle first. Foundations and donor-funded paths work alongside (and in some cases instead of) the investment paths above:
- Foundation grants to the protocol foundation itself — supports specification work, reference implementations, governance bodies, dispute panel.
- Public-interest investigation fund — donate to the foundation-administered fund that commissions investigations on behalf of under-resourced parties (counters the asymmetry where rich actors can pay to muddy claims poor actors can't defend).
- Validator endowments — fund a specific verification center as part of an institutional mission (university libraries, journalism schools, research institutes).
- Sponsored research — fund the ongoing pluralism-coherence work, validator-reputation algorithms, formal CPML specification.
These paths are tax-deductible in many jurisdictions, return mission impact rather than financial return, and create no token / equity / regulatory exposure.
10What we need to honestly say
The verification centers do not yet exist as protocol-credentialed institutions. The token has not been issued. The AI-augmented verification firms are years away. The CPML application layer requires CPML adoption to first reach scale. None of the four paths is currently accepting investment.
This page describes what these paths would look like once the protocol reaches operational stage. The Phase II roadmap is 6–18 months away. Token-related paths require completing the regulatory work in v0.3. The application layer is Phase III.
If any of this resonates and you can help — fund a pilot, operate a validator, charter a domain, build a starter app — there's a contact form on the brief page. We are not currently accepting capital under any specific structure; we're documenting what the eventual structures could look like.
The contact form on the brief is the way in. The form has a "role" dropdown that includes "Foundation / funder / grantmaker" — pick that and tell us what you're thinking. We respond by email and aim for a 2-week turnaround. We won't take capital under any specific structure until the structures are in place; we will talk seriously about which path makes sense once they are.
ELI5 home · The proposal (plain) · Critics' findings (plain) · v0.3 plan (plain) · Questions