Learn

Get to know Acurast. Explore our story, dive into the technical documentation, and see who we’re partnered up with in the ecosystem.

Real Decentralized
Compute Network

Truly Scalable and Secure – Powered by Phones

Got a spare phone?

Provide Compute & Receive Rewards

Need decentralized compute?

Access Decentralized Compute

Become part of the cloud

Become part of the already growing Cloud Rebellion.

Thousands are already on board!

 

Join the Cloud Rebellion community and receive MIST ☁️ by completing quests, deploying apps to Acurast’s decentralized Cloud, onboarding your mobile phone as a Processor, referring friends, and more. Get started now.

VERIFIABLE DECENTRALIZATION THROUGH PHONES

The Phone is the new foundation of the decentralized compute

Acurast redefines decentralized compute from the ground up—starting with the hardware.
Smartphones are the most battle-tested devices worldwide, trusted by billions. With built-in TEEs and top-tier HSMs, they surpass traditional servers in security.

Key Capabilities & Use Cases

Confidential Execution
Decentralized Bandwidth & Compute
On-Chain Automation & Secure Secret Management
High-Performance Distributed Compute

The Trustless Gateway to Compute:

Staked Compute

  • Staked compute plays a significant role for Acurast: 70% of the inflation is allocated to “Staked Compute”
  • Accessible first design: Onboard smartphone compute without token purchase or gatekeepers
  • People without hardware can still receive rewards by delegating their stake to compute providers
  • Compute providers can accept delegation and receive additional rewards
  • Staked compute can be restaked