Acurast Secures $11 Million for Decentralized Confidential Computing Initiative

Acurast has successfully raised $11 million to fuel its innovative project centered on decentralized confidential computing using smartphones. The core objective is to provide a tamper-resistant execution environment on standard consumer phones, coupled with robust hardware verification.

Funding Details and Key Investors

The funding round, announced on Thursday, saw participation from prominent figures including Ethereum co-founder and Polkadot founder Gavin Wood, MN Capital founder Michael van de Poppe, and GlueNet founder Ogle, among others. Acurast is targeting a mainnet launch on November 17, with plans to introduce its native ACU token concurrently.

Acurast's Vision

Alessandro De Carli, founder of Acurast, highlighted that "billions of smartphones are the most battle-tested hardware on earth" and that the company intends to leverage this existing infrastructure to reduce costs for "verifiable, confidential compute." Network data indicates that nearly 150,000 phones have already joined the network, processing over 494 million transactions and enabling the deployment of almost 94,200 services.

Project Goals

De Carli emphasized the project's aim to "remove the gatekeepers, reduce the costs, and bring secure, trustless computation to anyone, anywhere, and all without a data center."

Confidential Computing on Third-Party Hardware

Acurast proposes to enable confidential computing – where users with physical access to smartphones running the node software cannot access the data used for computation – to be provided by virtually anyone. This necessitates a setup that provides a high degree of assurance that the smartphone's owner cannot manipulate the software to compromise data secrecy.

Security Mechanisms Implemented

To address this, the project developers have implemented a series of checks designed to ensure that the smartphone is running manufacturer-approved software that adheres to its security assumptions. While similar measures have been deployed by banking app developers, communities focused on custom firmware like Graphene OS have often found workarounds. De Carli asserts that Acurast's approach mitigates these risks.

Hardware Verification Process

De Carli explained that the Acurast processor application transmits hardware-backed key pairs with key attestation to the Acurast protocol. If these keys do not match those provided by the smartphone manufacturer, "the Acurast processor is not able to get a valid attestation, thus cannot participate in the network."

Ensuring Data Integrity

According to De Carli, "this ensures only genuine and attested hardware can be onboarded," and unsuitable environments "cannot be onboarded because they don’t get the signed attestation attached to their keys," preventing the phone's owner from tampering with user data or the execution environment.

Potential Security Risks

However, the underlying security assumption is compromised if a manufacturer-endorsed smartphone operating system—iOS or Android—is successfully exploited by malware or the phone's rightful owner. De Carli downplayed this scenario, suggesting that "if you manage to find an exploit that allows you to do so, you effectively are eligible for a multimillion-dollar bounty and the exploit would be fixed shortly thereafter," referencing Google's bug bounty program.

Past Vulnerabilities

Nevertheless, vulnerabilities of this nature have been discovered in the past. For example, in Samsung’s TrustZone Operating System, a keymaster AES-GCM IV-reuse attack was identified in 2022, enabling protected key extraction and misuse of attestation. Moreover, an attacker who has already compromised the app process or the kernel is likely able to encrypt and decrypt content, but would likely be unable to extract the private key itself.

Risk Warning: This article is provided for informational purposes only and does not constitute investment advice, investment research, or a recommendation to trade. The views expressed are those of the author and do not necessarily reflect the position of Markets.com. When considering shares, indices, forex (foreign exchange), and commodities for trading and price predictions, remember that trading CFDs involves a significant degree of risk and may not be suitable for all investors. Leveraged products can result in capital loss. Past performance is not indicative of future results. Before trading, ensure you fully understand the risks involved and consider your investment objectives and level of experience. Cryptocurrency CFD trading restrictions may apply depending on jurisdiction.

Latest news

Thursday, 14 May 2026

Indices

Gold Price Today, May 15: XAU/USD Consolidates in $4,650–$4,690 Range Amid Fed Policy Uncertainty

Thursday, 14 May 2026

Indices

Korean Stock Market Crash: Samsung and SK Hynix Power KOSPI to Record Highs

Wednesday, 13 May 2026

Indices

NVDA News Today: Developments in NVIDIA AI Ecosystem Partnerships

Wednesday, 13 May 2026

Indices

Gold price today, May 14: XAU/USD near $4,700, gold steady ahead of Trump-Xi talks

Tuesday, 12 May 2026

Indices

Record Inflows Pour into South African Markets Amid Reform Momentum: $42 Billion Foreign Investment Surge

Tuesday, 12 May 2026

Indices

Gold Price Today, May 13: Gold Plunges Below $4,700 as Hot US CPI & Surging Oil Crush Rate-Cut Hopes

Monday, 11 May 2026

Indices

Latest ETF News Highlights: BTC Price (BTC/USD) Holds at $81,500 Amid Strong Bitcoin ETF Inflows

Monday, 11 May 2026

Indices

Gold Price Today, May 12: XAU/USD Rises Sharply After Fed Cut Live Gold Price at $4,750

Sunday, 10 May 2026

Indices

Stock Market Today: Nifty Slips Below 24,200, Sensex Drops to 77,328 as Oil Crosses $100

Sunday, 10 May 2026

Indices

Gold Price Today, May 11: Gold (XAUUSD) Trading at $4,695, Central Banks Keep Buying as Investors Seek Shelter