Acurast is a decentralized compute network that leverages the power of smartphones to create a global, secure, and scalable cloud infrastructure. By transforming idle smartphones into compute nodes, Acurast provides a cost-effective and censorship-resistant alternative to traditional centralized cloud providers. The project emphasizes security through the use of Trusted Execution Environments (TEEs) available on modern smartphones, ensuring that computations are performed in a confidential and verifiable manner.

The Acurast ecosystem is powered by its native utility token, the Acurast token (ACU). The ACU token is essential for accessing compute resources on the network, as developers use it to pay for the services provided by the smartphone-based compute providers. This creates a circular economy where providers earn ACU for sharing their device’s processing power, and developers use ACU to run their applications and services. The acurast token is therefore central to the functioning and security of the entire network.

With a focus on Web3, AI, and other data-intensive applications, Acurast aims to democratize cloud computing and empower a new generation of decentralized applications. The project’s innovative approach of utilizing existing smartphone hardware presents a unique solution to the growing demand for affordable and secure computation. The Acurast network, with its ACU token, is building a more resilient and accessible cloud for the future.

What does Acurast do?

Acurast is building a decentralized compute network where anyone can contribute processing power using smartphones. To ensure this network stays reliable and doesn’t degrade over time, Acurast uses a staking mechanism that creates economic incentives for consistent hardware availability.

What are the different types of Acurast?

The Acurast protocol now spans across three networks: Acurast Testnet, Acurast Canary, and Acurast Mainnet, each with distinct purposes and governance models.

What blockchain is Acurast on?

Acurast is multichain in nature and the token is available on the Acurast mainnet as well as on various other blockchains and ecosystems. Deployed on its native chain, it can be bridged to Ethereum using the Acurast HyperDrive bridge and further from Ethereum to various EVM chains via LayerZero bridges.

Where does Acurast get its compute power from?

Acurast is a revolutionary decentralized compute network whose core concept is to utilize the idle computing power of billions of smartphones worldwide to build a truly scalable, secure, and decentralized computing infrastructure.

How does Acurast work?

Acurast (ACU) is a decentralized compute network that transforms smartphones into a global, permissionless cloud infrastructure, powered by its native token for governance, staking, and cross-chain transactions.

What is an Acurast processor?

The Acurast processor is the app that is run on smartphones which take part in the Acurast Decentralized Compute Network. Acurast Processors are the infrastructure providers for Acurast’s decentralized compute network.

What is the purpose of Acurast?

It provides verifiable, confidential computing resources without centralized data centers, targeting the decentralized physical infrastructure (DePIN) sector.

What is the technology behind Acurast?

It operates as a Substrate-based Polkadot parachain, leveraging smartphones’ built-in trusted execution environments (TEEs) for secure processing.

What is the role of the ACU token?

The ACU token is used for network fees, staking to secure compute capacity, and on-chain governance, with a fixed 5% annual inflation rewarding participants.

What is an Acurast processor?

The Acurast processor is the app that is run on smartphones which take part in the Acurast Decentralized Compute Network. Acurast Processors are the infrastructure providers for Acurast’s decentralized compute network.

How does Acurast ensure the privacy of computations?

Its key innovation is using the trusted execution environments (TEEs) already embedded in modern smartphones. These hardware-secured zones enable phones to act as verifiable “worker nodes,” ensuring computations are private and tamper-proof.

+8,083 subscribers
To top