In the world of Cyber style settings, there are two types of big boss images that are extremely easy to exist.
One is a new plutocrat who focuses on data monopoly; the other is a technology magnate who focuses on artificial intelligence. The former controls the lifeline of the national economy. It holds all the private information of the general population so that people enjoy a more convenient high-tech life than they can imagine on the one hand, but on the other hand, they have no secrets of speaking. The latter invades every ordinary family silently and obtains not only privacy and data but also people’s absolute dependence. At this time, the relationship between humans and AI is unprecedentedly close. Still, the natural face of fundamental simulation and self-awareness of AI, but behind implies very frightening social, ethical, and moral issues.
Of course, all of the above is imaginary. However, the problems behind it are inescapable for human beings. Back to reality, just on the issue of data privacy and security, China has issued the “Network Security Law,” “Data Security Law,” and “Personal Information Protection Law” before and after. But the problem cannot be solved at the root. Just as the instant noodle market hit hard is not a plus version of a master but a group and other take-out platforms. This time the duel winner relies on technological innovation and technological innovation.
In the privacy computing track, what does Phala Network deliver?
We know three mainstream schemes for privacy computing today: Trusted Execution Environment, or TEE for short, Secure Multiparty Computing (the most classic millionaire-is-richer-than-who?), and Federated Learning. In last night’s open house live session, Phala Network’s Lead Researcher Shelves shared the current Trusted Execution Environment they use. This TEE+blockchain solution can be described in 8 words, as TEE itself is the only hardware-level isolation among the three mainstream privacy computing. On the line of data being available but not visible, TEE is direct physical layer isolation of a secure computing environment. For example, a general-purpose CPU defines this particular region. Yet a single TEE cannot be used at scale. So at the verification level, Phala Network is based on blockchain and TEE remote verification to confirm each other, thus guaranteeing code and data trust.
This blockchain global-style decentralized node has another unparalleled advantage of centralized computing in terms of the security of private computing. With Polkadot, cross-chain computing becomes a reality. The identity of the Polkadot parallel chain enables developers to use confidential smart contracts on other Polkadot parallel chains, greatly enhancing the possibility of cross-chain collaboration. Phala Network has ingeniously combined TEE with blockchain, enabling TEE and blockchain to complement each other, ultimately forming a secure and efficient distributed privacy computing cloud!
In the construction of metaverse, privacy computing as an essential infrastructure layer application, Phala Network will speed up the development of ecology and provide secure on-chain solutions for massive data analysis and computing. The battle between information security and data privacy computing has been fought in the digital era. In Web2, domestic and foreign big companies are also struggling to study the solution of Web3, and I believe that Phala Network is not the only one writing. The storm has come, with the time to go!