Table of Contents
ToggleHave you ever heard about what Phala Network is? This is a project aimed at providing a distributed computing platform that features high security and privacy. Such a platform employs the TEEs (secure execution environments) available on numerous CPUs with the goal of achieving the development of a blockchain that features advanced capabilities in terms of smart contracts and privacy.
Among the features that make this project ideal to meet the above objectives are confidentiality, since it prevents the leakage of input, output or intermediate state of a confidential smart contract and only responds to authorized queries to the contract. Another feature is the integrity of its code. This is because any user has the power to verify that an output has been performed by a given smart contract published on the blockchain.
Another feature to note is availability. This is because there is no single point of failure if a miner is disconnected. The last feature I would like to highlight is interoperability. This feature in the blockchain world is extremely important and this project features it, as contracts can operate with each other with other external blockchains. If you want to learn how this project works and what it can offer you, stay reading this article because I will tell you all about it below.
This project employs a technology known as Polkadot’s Substrate. Thanks to this technology, Phala Network can become a blockchain platform with confidential smart contracts, powered by a block production system that uses the power offered by CPUs in addition to a set of specialized functions called “Secure Enclaves“. Through these functions, Phala Network seeks to offer users certain confidential computing and data protection services.
At present, this project is built on the Polkadot network and is mainly oriented to take over one of the parachains that are available on this network. It should be noted that Phala has a Canary Islands network known as Khala. This network is based on the Kusama network.
To achieve the main goals of the project, the developers created Phala Network to support the operation of their network in the Trusted Execution Environment (TEE). TEEs are a special feature of CPUs. It is worth remembering that CPUs are processors that can be found in both computers and cell phones.
The function of the TEEs allows this project to develop an execution environment that is highly secure for smart contracts. Through this operation, leaks of users’ private information are prevented.
The Phala Network is supported by the following components for proper operation:
Users are able to verify data on the blockchain and also assist in cryptographic testing by running the project client or an entire node. It should be noted that no special hardware is required for users to employ confidential contracts. This capability is available on all current processors from 2015 onwards.
It should be noted that to be part of PHA mining it is necessary to stake about 1,620 PHA tokens for each CPU core used in mining.