학습

Acurast에 대해 알아보세요. 당사의 스토리를 살펴보고, 기술 문서를 살펴보고, 에코시스템의 파트너가 누구인지 알아보세요.

Truly Decentralized Compute

Acurast transforms everyday smartphones into a global network of secure, high-performance compute, redefining how the world connects, processes, and scales.

“When we started Acurast, our idea was simple: don’t rebuild the cloud from scratch — activate what already exists. Phones. Billions of them. It’s sustainable, accessible, and radically inclusive.”

“When we started Acurast, our idea was simple: don’t rebuild the cloud from scratch — activate what already exists. Phones. Billions of them. It’s sustainable, accessible, and radically inclusive.

What we’re doing and why

Power Without Gatekeepers

Acurast is building the world’s most decentralized compute network using everyday smartphones — no need for centralized data centers anymore. By harnessing consumer devices with already built-in hardware security (TEEs and HSMs), the network offers verifiable and confidential compute that’s permissionless and affordable for developers & enterprises to use.

This solves the pressing issues of data privacy, inefficiency, and infrastructural bottlenecks faced by traditional cloud systems. Across 140+ countries, hundreds of thousands of smartphones now power this global compute network, processing hundreds of millions of transactions and powering secure mission-critical workloads.

Acurast’s approach transforms idle personal devices into decentralized infrastructure, unlocking compute for developers, enterprises, and AI applications, creating a truly inclusive and global compute ecosystem.

왜 모바일인가

A Compute Network for Everyone

Smartphones are the most battle-tested devices worldwide, and with billions in use, Acurast achieves a scale unmatched by traditional servers. Using hardware-based, manufacturer-issued proofs, Acurast ensures verifiable trust and enables secure, confidential processing of sensitive data.

Decentralized by Design

Smartphones are the most battle tested devices worldvide – billions rely on their security. With built-in Trusted Execution Environments (TEEs) and best in class Hardware Security Modules (HSMs), smartphones offer a higher level of security than servers ever can.

Scalable by Design

Acurast는 전 세계에서 가장 많이 분산되고 새로워진 컴퓨팅 하드웨어인 수십억 대의 스마트폰에서 컴퓨팅을 활용합니다. 연간 13억 9천만 대의 스마트폰이 판매되고 교체 주기가 2.75년이라는 점을 고려하면 기존 서버로는 감당할 수 없는 규모를 구현할 수 있습니다.

Verifiable by Design

Acurast requires the security chip to create the official hardware certification a issued by the Original Equipment Manufacturer (OEM). This ensures verifiability through cryptographically proven attestations rather than unverifiable claims.

Confidential by Design

Acurast delivers confidential compute, allowing sensitive Al models, mission-critical data, and privacy-focused operations to be processed securely without risk of tampering or interception.

탈중앙화 파괴자

킬러 사용 사례: 업사이클링

중고 시장에는 화면은 깨졌지만 프로세서는 온전한 모바일 기기가 가득하며, Acurast를 통해 강력한 컴퓨팅 파워하우스로 변신할 준비가 되어 있습니다.약 2,933달러짜리 서버가, 중고 시장에서 약 25달러에 구할 수 있는 Pixel로 대체됩니다

2933달러짜리 서버에서 중고 시장에서 약 25달러의 업사이클 픽셀까지.

117배 더 저렴하게

Poweredge R350

Dell 랙 서버

가격

$2'933

업사이클 픽셀 7a

BY GOOGLE

가격

~$25 $499

기회

디바이스를 위한 제2의 삶, Acurast를 위한 컴퓨팅

신뢰할 수 없는 컴퓨팅 게이트웨이:

Staked Compute