Skip to content

Acurast Transforms Smartphones into Secure Computing Nodes, Onboards 100K Devices

Acurast is revolutionizing cloud computing. By turning smartphones into secure nodes, it's making decentralized computing a reality.

In this image we can see the information board, buildings, shed, trees, electric cables and sky...
In this image we can see the information board, buildings, shed, trees, electric cables and sky with clouds.

Acurast Transforms Smartphones into Secure Computing Nodes, Onboards 100K Devices

Acurast, a decentralized cloud platform, transforms smartphones like the iPhone 15 and iPhone 14 into secure computing nodes, eliminating the need for centralized data centers. It has onboarded over 100,000 devices and executed over 300 million transactions, demonstrating its scalability and security.

Acurast achieves this through its modular architecture, comprising three layers. The Execution Layer uses Trusted Execution Environments (TEEs) in smartphones for secure and confidential computations, ensuring data privacy and computational integrity. It has been built by over 100,000 devices and executed over 300 million transactions.

The Consensus Layer employs a Nominated Proof-of-Stake (NPoS) mechanism with an orchestrator, reputation engine, and attestation service for network reliability and security. This layer ensures that the network functions smoothly and maintains trust among participants.

The Application Layer hosts decentralized applications that can offload computations to the network without relying on traditional servers. Acurast supports confidential AI processing, decentralized oracles, cross-chain asset management, and ethical web scraping, showcasing its versatility.

Acurast's native token, $ACU, is used for transaction fees, staking, and governance, with a total supply capped at 1 billion tokens. The platform's mission is to democratize access to computing power, enabling smartphone users, including those with iPhone 13 and iPhone 16, to contribute to and benefit from a decentralized cloud. By leveraging the security features of modern smartphones, Acurast offers a scalable, confidential, and verifiable compute network.

Read also:

Latest