The post Acurast Raises $11M to Use Phones for Confidential Compute appeared on BitcoinEthereumNews.com. Smartphone-based decentralized confidential compute project Acurast has raised $11 million, claiming tamper-resistant execution on consumer phones and secure hardware verification. According to a Thursday announcement shared with Cointelegraph, Acurast raised $11 million from Ethereum co-founder and Polkadot founder Gavin Wood, MN Capital founder Michael van de Poppe and GlueNet founder Ogle, among others. The project aims to launch its mainnet on Nov. 17, and plans to release its native token ACU alongside it. Acurast founder Alessandro De Carli said “billions of smartphones are the most battle-tested hardware on earth” and that the company hopes to reduce costs by leveraging them for “verifiable, confidential compute.” The network explorer reports that nearly 150,000 phones have already joined the network and processed over 494 million transactions, enabling the deployment of almost 94,200 services. “We remove the gatekeepers, reduce the costs, and bring secure, trustless computation to anyone, anywhere, and all without a data center,” De Carli claimed. Acurast network data. Source: Acurast Related: Decentralized compute networks will democratize global AI access Confidential compute on third-party hardware? Acurast says it enables confidential computing — where users with physical access to smartphones running the node software cannot access the data used for computation — to be provided by anyone. This requires a setup that ensures, to a high degree of certainty, that the smartphone’s owner cannot alter the software in a way that compromises this secrecy. To this end, the project’s developers implemented a series of checks to ensure that the smartphone is running manufacturer-approved software that would not compromise its security assumptions. Still, similar measures have been implemented by banking app developers for many years, only for communities of custom firmware such as Graphene OS to find workarounds that allow them to run the applications on their non-sanctioned setups. De Carli said that this… The post Acurast Raises $11M to Use Phones for Confidential Compute appeared on BitcoinEthereumNews.com. Smartphone-based decentralized confidential compute project Acurast has raised $11 million, claiming tamper-resistant execution on consumer phones and secure hardware verification. According to a Thursday announcement shared with Cointelegraph, Acurast raised $11 million from Ethereum co-founder and Polkadot founder Gavin Wood, MN Capital founder Michael van de Poppe and GlueNet founder Ogle, among others. The project aims to launch its mainnet on Nov. 17, and plans to release its native token ACU alongside it. Acurast founder Alessandro De Carli said “billions of smartphones are the most battle-tested hardware on earth” and that the company hopes to reduce costs by leveraging them for “verifiable, confidential compute.” The network explorer reports that nearly 150,000 phones have already joined the network and processed over 494 million transactions, enabling the deployment of almost 94,200 services. “We remove the gatekeepers, reduce the costs, and bring secure, trustless computation to anyone, anywhere, and all without a data center,” De Carli claimed. Acurast network data. Source: Acurast Related: Decentralized compute networks will democratize global AI access Confidential compute on third-party hardware? Acurast says it enables confidential computing — where users with physical access to smartphones running the node software cannot access the data used for computation — to be provided by anyone. This requires a setup that ensures, to a high degree of certainty, that the smartphone’s owner cannot alter the software in a way that compromises this secrecy. To this end, the project’s developers implemented a series of checks to ensure that the smartphone is running manufacturer-approved software that would not compromise its security assumptions. Still, similar measures have been implemented by banking app developers for many years, only for communities of custom firmware such as Graphene OS to find workarounds that allow them to run the applications on their non-sanctioned setups. De Carli said that this…

Acurast Raises $11M to Use Phones for Confidential Compute

3 min read

Smartphone-based decentralized confidential compute project Acurast has raised $11 million, claiming tamper-resistant execution on consumer phones and secure hardware verification.

According to a Thursday announcement shared with Cointelegraph, Acurast raised $11 million from Ethereum co-founder and Polkadot founder Gavin Wood, MN Capital founder Michael van de Poppe and GlueNet founder Ogle, among others. The project aims to launch its mainnet on Nov. 17, and plans to release its native token ACU alongside it.

Acurast founder Alessandro De Carli said “billions of smartphones are the most battle-tested hardware on earth” and that the company hopes to reduce costs by leveraging them for “verifiable, confidential compute.”

The network explorer reports that nearly 150,000 phones have already joined the network and processed over 494 million transactions, enabling the deployment of almost 94,200 services.

“We remove the gatekeepers, reduce the costs, and bring secure, trustless computation to anyone, anywhere, and all without a data center,” De Carli claimed.

Acurast network data. Source: Acurast

Related: Decentralized compute networks will democratize global AI access

Confidential compute on third-party hardware?

Acurast says it enables confidential computing — where users with physical access to smartphones running the node software cannot access the data used for computation — to be provided by anyone. This requires a setup that ensures, to a high degree of certainty, that the smartphone’s owner cannot alter the software in a way that compromises this secrecy.

To this end, the project’s developers implemented a series of checks to ensure that the smartphone is running manufacturer-approved software that would not compromise its security assumptions. Still, similar measures have been implemented by banking app developers for many years, only for communities of custom firmware such as Graphene OS to find workarounds that allow them to run the applications on their non-sanctioned setups. De Carli said that this does not apply to Acurast’s app.

De Carli told Cointelegraph that the Acurast processor application sends hardware-backed key pairs with key attestation to the Acurast protocol. If those do not match those provided by the smartphone producer, “the Acurast processor is not able to get a valid attestation, thus cannot participate in the network.”

De Carli said that “this ensures only genuine and attested hardware can be onboarded” and unsuitable environments “cannot be onboarded, because they don’t get the signed attestation attached to their keys,” meaning the phone’s owner cannot tamper with user data or the execution environment.

Related: Dubai moves to regulate machine economy with DePIN peaq network

The security limitations

Still, the security assumption breaks if a manufacturer-endorsed smartphone operating system — iOS or Android — is exploited in the right way by malware or its rightful owner.

De Carli mostly dismissed the notion, saying that “if you manage to find an exploit that allows you to do so, you effectively are eligible for a multimillion-dollar bounty and the exploit would be fixed shortly thereafter” — pointing to Google’s bug bounty program as an example.

Still, in the past, such vulnerabilities were indeed discovered.

For instance, in Samsung’s TrustZone Operating System, a keymaster AES-GCM IV-reuse attack was discovered in 2022, which allowed protected key extraction and abuse of attestation. Furthermore, an attacker who has already compromised the app process or the kernel will likely be able to encrypt and decrypt content, but won’t be able to extract the private key itself.

AES-GCM IV-reuse attack. Source: USENIX

Magazine: Blockchain’s next big breakthroughs: What to watch

Source: https://cointelegraph.com/news/acurast-raises-11m-for-its-phone-based-confidential-processing-depin?utm_source=rss_feed&utm_medium=feed&utm_campaign=rss_partner_inbound

Market Opportunity
TokenFi Logo
TokenFi Price(TOKEN)
$0.003086
$0.003086$0.003086
-4.95%
USD
TokenFi (TOKEN) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.
Tags:

You May Also Like

Vitalik Buterin Reveals Ethereum’s (ETH) Future Plans – Here’s What’s Planned

Vitalik Buterin Reveals Ethereum’s (ETH) Future Plans – Here’s What’s Planned

The post Vitalik Buterin Reveals Ethereum’s (ETH) Future Plans – Here’s What’s Planned appeared on BitcoinEthereumNews.com. Ethereum founder Vitalik Buterin presented the network’s new roadmap, which includes its short-, medium-, and long-term goals, at the Developer Conference held in Japan today. Scalability, cross-layer compatibility, privacy, and security were the prominent topics in Buterin’s speech. Buterin stated that the short-term focus will be on increasing gas limits on the Ethereum mainnet (L1). He said that tools such as block-level access lists, ZK-EVMs, gas price restructuring, and slot optimization will be used in this context. The goal is to maintain the network’s decentralization while increasing scalability. The medium-term goal is to enable trustless asset transfers between Layer-2 (L2) networks and achieve faster transaction finality. In this context, “Stage 2 Rollup” solutions, proof-of-conduct combinations, and optimizations for reading data from L1 are on the agenda. Furthermore, network optimizations such as shortening slot times, fast finality protocols, and erasure coding are planned to improve user experience and security. Buterin emphasized that privacy is a priority for both the short and medium term. Zero-knowledge (ZK) proofs, anonymous pools, encrypted voting, and scrambling network solutions are highlighted to protect the privacy of users’ on-chain payments, voting, DeFi transactions, and account changes. Furthermore, secure execution environments, secret query techniques, and the ability to conceal fraudulent requests and data access patterns are also targeted when reading data from the chain. Buterin’s long-term vision highlights a minimalist, secure, and simple Ethereum. This roadmap includes resistance to the risks posed by quantum computers, securing the protocol with mathematical methods (formal verification), and transitioning to ideal cryptographic solutions. Buterin stated that these strategic steps will transform Ethereum into a more scalable, user-friendly, and secure infrastructure. With the strengthening of L2 networks, more users will be able to use Ethereum with less trust assumptions. The ultimate goal is for Ethereum to become a reliable foundational infrastructure for global…
Share
BitcoinEthereumNews2025/09/18 15:57
SON DAKİKA: Kara Gecede Sürpriz Altcoin İçin Spot ETF Başvurusu Geldi!

SON DAKİKA: Kara Gecede Sürpriz Altcoin İçin Spot ETF Başvurusu Geldi!

Son dakika bilgisine göre, büyük düşüşlerin yaşandığı şu dakikalarda Bitwise, Uniswap (UNI) spot ETF için S-1 başvurusunda bulundu. UNI, son bir ay içerisinde yaklaşık
Share
Coinstats2026/02/06 06:03
Why a Bloomberg Analyst Thinks Bitcoin Could Still Fall Toward $10,000

Why a Bloomberg Analyst Thinks Bitcoin Could Still Fall Toward $10,000

The post Why a Bloomberg Analyst Thinks Bitcoin Could Still Fall Toward $10,000 appeared on BitcoinEthereumNews.com. Bitcoin broke below $71,000, triggering heavy
Share
BitcoinEthereumNews2026/02/06 05:59