
Acurast, a groundbreaking decentralized compute network, has unveiled Staked Compute, a revolutionary protocol update transforming the way compute power is utilized across a decentralized network. By turning billions of smartphones into a reliable compute infrastructure, Acurast is poised to disrupt traditional, centralized data centers and introduce a seamless, secure, and scalable solution for enterprises and developers alike.
Revolutionizing Decentralized Compute with Smartphone Technology
Staked Compute leverages the Trusted Execution Environments (TEEs) already built into modern iOS and Android devices. These TEEs provide hardware-level verification, ensuring the integrity of processing while maintaining data security. Coupled with stake-backed availability commitments, providers are incentivized to deliver consistent reliability, aligning with the performance needs of businesses without depending on centralized intermediaries.
According to Alessandro De Carli, Founder of Acurast, “Smartphones are already shipping secure hardware that’s world-class, and they’re everywhere. Staked Compute turns that ubiquity into reliability so that providers make clear availability promises, back them with stake, and earn more when they consistently deliver. No more data centers or intermediaries, just a protocol that pays for performance.”
How Staked Compute Works
Each participating smartphone in the network undergoes several key processes:
- Hardware verification: Devices attest to their integrity using their TEEs.
- Performance benchmarking: A unique protocol benchmarks each device to measure its real capabilities.
- Stake-backed commitments: Devices lock portions of capacity for specific workloads based on pre-agreed epochs. Rewards are distributed if commitments are met, while penalties are applied for non-performance, ensuring fairness within the ecosystem.
This innovative design ensures that tasks—whether they involve artificial intelligence (AI) models, automation workflows, or secure data processing—are assigned to the most suitable devices, minimizing reliance on high-end devices or traditional centralized resources.
Affordable, Confidential, and Decentralized
One primary advantage of Acurast’s model is its cost efficiency and confidentiality. Enterprise workloads are executed in secure, sealed TEEs, keeping sensitive data protected while also reducing costs compared to conventional service-class compute solutions. By tapping into the widespread diversity of smartphones, Acurast eliminates the need for data centers and instead uses the global fleet of devices for decentralized, scalable computing.
To date, Acurast has onboarded over 119,000 smartphones globally, with more than 35,000 compute deployments, proving its ability to handle mission-critical workloads. The network has also processed over 360 million blockchain transactions, marking its position as the most decentralized and verifiable compute network available.
Bridging Reliability and Scalability with Natural Diversity
The decentralized approach ensures resilience by utilizing a wide range of smartphone devices at different price tiers and capabilities. Not all tasks demand high-end performance, making room for broader device participation. This natural diversity reduces dependency on a specific class of hardware and improves resilience within the network.
Unlike traditional ‘mobile mining,’ which often wastes energy on synthetic puzzles, Acurast’s protocol focuses on productive computational work such as AI inference, secure data management, and automation. This eco-conscious approach combines sustainability with high utility.
Join the Acurast Revolution
Developers can harness the power of this decentralized computing network through Acurast Processor apps or the Acurast Hub. With comprehensive documentation and benchmarking methodologies, setting up workloads on Acurast is seamless.
Learn more about Acurast’s Staked Compute and its game-changing impact on decentralized computing by visiting their official website. The platform offers an innovative alternative for businesses looking for cost-effective, reliable, and scalable computing solutions without compromising privacy.
Related Product Recommendation
For developers relying on secure and efficient operations, we recommend trying the iPhone 15 Pro Max, equipped with advanced security features and high-performance hardware to support the growing demand for decentralized infrastructures like Acurast’s Staked Compute. Its cutting-edge chipset and energy efficiency make it an ideal device for participating in decentralized compute networks.