Learn

Get to know Acurast. Explore our story, dive into the technical documentation, and see who we’re partnered up with in the ecosystem.

Truly Decentralized Compute

Acurast transforms everyday smartphones into a global network of secure, high-performance compute, redefining how the world connects, processes, and scales.

“When we started Acurast, our idea was simple: don’t rebuild the cloud from scratch — activate what already exists. Phones. Billions of them. It’s sustainable, accessible, and radically inclusive.”

“When we started Acurast, our idea was simple: don’t rebuild the cloud from scratch — activate what already exists. Phones. Billions of them. It’s sustainable, accessible, and radically inclusive.

What we’re doing and why

Power Without Gatekeepers

Acurast is building the world’s most decentralized compute network using everyday smartphones — no need for centralized data centers anymore. By harnessing consumer devices with already built-in hardware security (TEEs and HSMs), the network offers verifiable and confidential compute that’s permissionless and affordable for developers & enterprises to use.

This solves the pressing issues of data privacy, inefficiency, and infrastructural bottlenecks faced by traditional cloud systems. Across 140+ countries, hundreds of thousands of smartphones now power this global compute network, processing hundreds of millions of transactions and powering secure mission-critical workloads.

Acurast’s approach transforms idle personal devices into decentralized infrastructure, unlocking compute for developers, enterprises, and AI applications, creating a truly inclusive and global compute ecosystem.

Why Mobile

A Compute Network for Everyone

Smartphones are the most battle-tested devices worldwide, and with billions in use, Acurast achieves a scale unmatched by traditional servers. Using hardware-based, manufacturer-issued proofs, Acurast ensures verifiable trust and enables secure, confidential processing of sensitive data.

Decentralized by Design

Smartphones are the most battle tested devices worldvide – billions rely on their security. With built-in Trusted Execution Environments (TEEs) and best in class Hardware Security Modules (HSMs), smartphones offer a higher level of security than servers ever can.

Scalable by Design

Acurast harnesses compute in billions of smartphones, the most distributed and refreshed computing hardware globally. With 1.39 billion smartphones sold annually and a 2.75-year replacement cycle, it enables a scale conventional servers can’t match.

Verifiable by Design

Acurast requires the security chip to create the official hardware certification a issued by the Original Equipment Manufacturer (OEM). This ensures verifiability through cryptographically proven attestations rather than unverifiable claims.

Confidential by Design

Acurast delivers confidential compute, allowing sensitive Al models, mission-critical data, and privacy-focused operations to be processed securely without risk of tampering or interception.

THE DECENTRALIZED DISRUPTORS

The Killer Use Case: Upcycling

The second-hand market is filled with mobile devices with broken screens but fully intact processors, poised to transform into potent compute powerhouses on Acurast.

From a $2933 server to an upcycled Pixel of ~$25 on the second hand market.

117X CHEAPER

Poweredge R350

DELL RACK SERVER

Price

$2’933

Upcycled Pixel 7a

BY GOOGLE

Price

~$25 $499

Opportunity

A Second Life for Devices, Compute for Acurast

The Trustless Gateway to Compute:

Staked Compute