In this section, we discuss common concerns related to security of the collaborative training.
Q: If I join a collaborative training, do I allow other people to execute code on my computer?
A: During the training, participants only exchange data (gradients, statistics, model weights) and never send code to each other. No other peer can execute code on your computer.
To join the training, you typically need to run the code (implementing the model, data streaming, training loop, etc.) from a repository or a Colab notebook provided by the authors of the experiment. This is no different from running any other open source project/Colab notebook.
Q: Can a malicious participant influence the training outcome?
A: It is indeed possible unless we use some defense mechanism. For instance, a malicious participant can damage model weights by sending large numbers instead of the correct gradients. The same can happen due to broken hardware or misconfiguration.
One possible defense is using authentication combined with model checkpointing. In this case, participants should log in (e.g. with their Hugging Face account) to interact with the rest of the collaboration. In turn, moderators can screen potential participants and add them to an allowlist. If something goes wrong (e.g. if a participant sends invalid gradients and the model diverges), the moderators remove them from the list and revert the model to the latest checkpoint unaffected by the attack.
Spoiler (TODO): How to implement authentication in a decentralized system efficiently?
Nice bonus: using this data, the moderators can acknowledge the personal contribution of each participant.
Another defense is replacing the naive averaging of the peers' gradients with an aggregation technique robust to outliers. Karimireddy et al. (2020) suggested such a technique (named CenteredClip) and proved that it does not significantly affect the model's convergence.
Spoiler (TODO): How does CenteredClip protect from outliers? (Interactive Demo)
In our case, CenteredClip is useful but not enough to protect from malicious participants, since it implies that the CenteredClip procedure itself is performed by a trusted server. In contrast, in our decentralized system, all participants can aggregate a part of the gradients and we cannot assume all of them to be trusted.
Recently, Gorbunov et al. (2021) proposed a robust aggregation protocol for decentralized systems that does not require this assumption. This protocol uses CenteredClip as a subroutine but is able to detect and ban participants who performed it incorrectly.
In this section, we provide a roadmap for you to run the collaborative training yourself.
Got confused? Feel free to ask any questions at our Discord!
initial_peers
).
host_maddrs
and identity_path
arguments to hivemind.DHT
(these are forwarded to the underlying libp2p daemon).