Truly Decentralized Compute
Acurast transforms everyday smartphones into a global network of secure, high-performance compute, redefining how the world connects, processes, and scales.
“When we started Acurast, our idea was simple: don’t rebuild the cloud from scratch — activate what already exists. Phones. Billions of them. It’s sustainable, accessible, and radically inclusive.”
“When we started Acurast, our idea was simple: don’t rebuild the cloud from scratch — activate what already exists. Phones. Billions of them. It’s sustainable, accessible, and radically inclusive.”
What we’re doing and why
Power Without Gatekeepers
Acurast is building the world’s most decentralized compute network using everyday smartphones — no need for centralized data centers anymore. By harnessing consumer devices with already built-in hardware security (TEEs and HSMs), the network offers verifiable and confidential compute that’s permissionless and affordable for developers & enterprises to use.
This solves the pressing issues of data privacy, inefficiency, and infrastructural bottlenecks faced by traditional cloud systems. Across 140+ countries, hundreds of thousands of smartphones now power this global compute network, processing hundreds of millions of transactions and powering secure mission-critical workloads.
Acurast’s approach transforms idle personal devices into decentralized infrastructure, unlocking compute for developers, enterprises, and AI applications, creating a truly inclusive and global compute ecosystem.
Why Mobile
A Compute Network for Everyone
Smartphones are the most battle-tested devices worldwide, and with billions in use, Acurast achieves a scale unmatched by traditional servers. Using hardware-based, manufacturer-issued proofs, Acurast ensures verifiable trust and enables secure, confidential processing of sensitive data.
Decentralized by Design
Smartphones are the most battle tested devices worldvide – billions rely on their security. With built-in Trusted Execution Environments (TEEs) and best in class Hardware Security Modules (HSMs), smartphones offer a higher level of security than servers ever can.
Scalable by Design
Acurast harnesses compute in billions of smartphones, the most distributed and refreshed computing hardware globally. With 1.39 billion smartphones sold annually and a 2.75-year replacement cycle, it enables a scale conventional servers can’t match.
Verifiable by Design
Acurast requires the security chip to create the official hardware certification a issued by the Original Equipment Manufacturer (OEM). This ensures verifiability through cryptographically proven attestations rather than unverifiable claims.
Confidential by Design
Acurast delivers confidential compute, allowing sensitive Al models, mission-critical data, and privacy-focused operations to be processed securely without risk of tampering or interception.
THE DECENTRALIZED DISRUPTORS
The Killer Use Case: Upcycling
The second-hand market is filled with mobile devices with broken screens but fully intact processors, poised to transform into potent compute powerhouses on Acurast.
From a $2933 server to an upcycled Pixel of ~$25 on the second hand market.
117X CHEAPER
Poweredge R350
DELL RACK SERVER
Price
$2’933
Upcycled Pixel 7a
BY GOOGLE
Price
~$25 $499
Opportunity
A Second Life for Devices, Compute for Acurast
The Trustless Gateway to Compute:
Staked Compute
- Staked compute plays a significant role for Acurast: 70% of the inflation is allocated to “Staked Compute”
- Accessible first design: Onboard smartphone compute without token purchase or gatekeepers
- People without hardware can still earn by delegating their stake to compute providers
- Compute providers can accept delegation and earn additional rewards
- Staked compute can be restaked
Everything to get started
Buy Phone racks by