Sekėjai

Ieškoti šiame dienoraštyje

2025 m. gruodžio 24 d., trečiadienis

Cocoon Is a Confidential Decentralized Compute Network Where GPU Owners Execute AI Requests and Receive Rewards in TON Tokens


Cocoon (Confidential Compute Open Network), a new decentralized AI network built on The Open Network (TON) by Telegram founder Pavel Durov, which lets GPU owners earn TON by processing private AI tasks (like translation or image generation) in secure enclaves, creating a privacy-focused alternative to big cloud AI services. It functions as a marketplace where developers pay for compute, and GPU owners provide power, all within a confidential, encrypted environment, integrated deeply with Telegram's massive user base for a "new kind of mining".

Key Aspects of Cocoon:

 

    Confidential Computing: Uses secure enclaves (like Intel TDX [1]) so data and prompts remain encrypted, preventing even network operators from seeing them.

    Decentralized GPU Network: Connects idle GPUs to AI workloads, reducing costs for developers.

    TON Token Rewards: GPU providers are paid in TON tokens, fostering the Telegram/TON ecosystem.

    Telegram Integration: Aims to embed AI features directly into Telegram, utilizing its massive user base for privacy-focused AI.

    AI Compute Mining: Shifts focus from traditional crypto mining to useful AI inference tasks, turning hardware into revenue.

 

How it Works (Simplified):

 

    Developer sends encrypted AI request to Cocoon.

    Proxy Node finds an available GPU (Worker) on the network.

    Worker runs the task in a secure enclave (Trusted Execution Environment).

    Encrypted Result returns to the developer.

    TON Blockchain handles settlement and rewards, with 95% going to the GPU owner.

 

1. Intel TDX (Trust Domain Extensions) is Intel's confidential computing technology for hardware-level isolation of Virtual Machines (VMs) into secure "Trust Domains" (TDs), protecting them from hypervisors, admins, and other software by encrypting memory and isolating guest state, enabling secure data processing in untrusted cloud or shared environments with features like remote attestation for verification. Introduced with 4th Gen Xeon Scalable Processors, TDX creates a hardware root of trust, making data safe while in use.

 

Key Features & How it Works:

 

    Hardware Isolation: Creates Trust Domains (TDs) that are isolated from the host's VMM (hypervisor) and other software, even with physical access.

    Data Protection: Encrypts VM memory and protects guest register state, keeping data confidential while in use.

    Trusted Execution Environment (TEE): Offers a secure, attested environment for sensitive workloads, preventing unauthorized access.

    Remote Attestation: Provides cryptographic proof that the TD is running securely on genuine hardware.

    TDX Module: A special component that manages the isolation between the host and the TD.

 

Benefits & Use Cases:

 

    Cloud Security: Enables cloud providers to offer secure, multi-tenant environments without compromising customer data.

    Data Privacy: Protects sensitive data like medical records, financial information, and intellectual property.

    Compliance: Helps meet strict data privacy regulations (e.g., GDPR) for data transfers.

 

Availability:

 

    Requires supported hardware, first appearing in 4th Gen Intel Xeon Scalable Processors (Sapphire Rapids).

 

Komentarų nėra: