
In a blockchain, a set of blocks records transactions details upon the authentication and verification proceeded by network participants (nodes). Thousands of participants keep a copy of the ledger with themselves, so they double-check and validate all transactions before new blocks are added.
Still, as transactions made in the blockchain are public, it is not impossible to identify someone by crossing data and proceeding with detail-oriented research (even considering all transactions are done peer-to-peer).
To solve it, Phala Network created an innovative solution based on smart contracts to help users reclaim their utmost privacy when transacting in the blockchain ecosystem.
Public Blockchain vs. Maximum User Privacy – Is it Even Possible?
Public blockchains are one of the most intriguing and unique innovations ever created by mankind. Yet, like everything else in life, they are not perfect. Although it is impossible to deny the innovations brought by public blockchains, there has been a rising concern about privacy and confidentiality associated with them.
In a public blockchain, all transitions that have ever occurred on a specific network are recorded. This way, it is a challenge to balance between maintaining this detailed database while scaling in terms of security and user privacy.
Nowadays, hackers, central agencies, spies, and security agencies could track individuals using public ledgers, considering every P2P (peer-to-peer) transaction is recorded and maintained in the digital database.
Further reading: What is a Blockchain impact on the financial industry?
Hence, both the anonymity and privacy of the participants in a public blockchain are at constant risk. For example, the US National Security Agency (NSA) has been reportedly tracking and monitoring participants in the Bitcoin network.
Although some may say it is all “conspiracy theory,” the fact is any public ledger is always vulnerable, exposed to hack attacks, tampering, data-stealing tactics, and network clogging.
What is Phala Network?
Essentially, Phala Network is a cloud computing solution. Its primary goal is to offer next-level cloud computing power to protect the privacy of managed programs and preserve blockchain’s secure and trustless properties.
In this context, the term “managed programs” means that the programs’ internal states and the interactions between users and the program have no public visibility.
Structurally, it combines the peer-to-peer (P2P) functionalities of hardware running open-source software with blockchain functionalities for extra security. On Phala, there is no centralized executor nor data controller, meaning the platform is completely trustless.
Further reading: What are the most secure DeFi wallets this year?
At the end of the day, the network simply acts as an intermediary, a mediator between computing power and users. This way, blockchain-based functionalities keep the transactions in order, without revealing the substance to ensure their absolute security.
Plus, the solution offers much more than a smart-contract platform. Phala Network reunites the best aspects of Web 2.0 and Web 3.0, meaning users can enjoy the capacity of a centralized program while benefiting from decentralized aspects (trustlessness, privacy, etc.).
Within the project’s own design, Phala provides a solid infrastructure for huge – and trustless- data exchanges between different parties. Hence, the parties do not need to trust each other, as the data can be used without being revealed.
How Does Phala Work? – In Detail
The platform’s website provides an extensive, thorough whitepaper explaining all the essential aspects that represent the core of the project. First, they introduce their mindset, their security-oriented approach, how user privacy can be attained, and the underlying mechanisms that make it possible.
Based on Polkadot, the confidential smart contract network is based on two types of nodes – TEE (Trusted Execution Environment) workers and gatekeepers. When compared to mining functions in PoW (Proof-of-Work) networks, TEE workers are responsible for transaction processing.
The TEEs operate the hardware behind the network’s structure, securing all the code and data stored inside to be protected with their full integrity. In essence, these are tamper-proof processors, globally connected in a permissionless manner.
Further reading: Find out the new generation of blockchain financial products
While Bitcoin miners need a colossal hardware structure to participate in the world’s most disputed network, the TEEs in Phala Network have more average people-friendly requirements.
In this sense, it is possible to connect to Phala and run its code with a home-based personal computer. The focus on making the network the most user-friendly as possible is part of the decentralized aspect, which is a key factor to maintain Phala’s censorship-resistant properties.
Gatekeepers are responsible for verifying all hardware and software-related aspects are intact and secure, handling and managing several processing phases (e.g., worker rotation, factoring replication, recording inputs and outputs, etc.).
Managing the connection between users and TEEs, Phala’s gatekeepers run the nodes to maintain the blockchain. Neither the TEE workers nor gatekeepers have access to the actual inputs and outputs to Phala, as only the software inside TEEs does.
When compared to other blockchains such as Ethereum, Tezos, or EOS, Phala Network is very lightweight. The project aims to launch its blockchain as a parachain on Polkadot, seizing advantages like interoperability, scalability, and next-level functionality.
Explaining the PHA Token
The PHA token is Phala’s native utility token. As expected, the token has governance purposes, as stakeholders who own a required amount of PHA may join the PhalaDAO and participate in the community.
The network offers a multi-pronged infrastructure that encompasses cross-chain confidential widgets, trustless computing tools, and other features that are only accessible by PHA holders.
Also, only stakeholders who own a certain amount of PHA can be gatekeepers. If a gatekeeper betrays the rules, the stake may be fined and took. Users can also utilize PHA tokens to pay for specific services or products across different chains.
Most importantly, PHA is a tradable asset on several exchanges, including Binance, Huobi, OKEx, KuCoin, Uniswap, 1inch, and Gate.
What Lies Ahead for the Project?
Founded in 2018, the project invested plenty of time into building a strong community in its native country, China. Phala’s co-founder and lead developer is Hang Yin, a former senior software engineer at Google with extensive experience in artificial intelligence and blockchain applications.
After releasing the project’s whitepaper in 2019, Phala earned the title of “China’s Polkadot Ambassador.” In early 2020, the team started its release on testnet, completing the so-called “planned stress-testing of the computing task module for the PoC3 stage.”
In 2021, Phala became a parachain on Kusama and the PHA token got listed on different exchanges like Binance, OKEx, and KuCoin. Currently, the platform is ready to become a parachain on Polkadot, waiting to serve nodes and devs with unique privacy cloud properties and confidential smart contracts.
Conclusion
When the infamous Satoshi Whitepaper first came out, the world witnessed the rise of a new way of storing and managing intangible data. However, public blockchains are not perfect, as they are still at-risk regarding user privacy.
Phala Network is a Polkadot-based solution that utilizes smart-contract technology and innovative Web3 tools to provide a confidentiality layer between users and the blockchain. Powered by tamper-proof, trustless execution of contracts, the network processes sensitive data in isolated enclaves secured by hardware-based technology.
Phala is building a platform to provide general-purpose privacy-preserving smart contracts, based on key factors such as confidentiality, code integrity, consistency, availability, and interoperability.
Not fully launched yet, the platform plans to launch its privacy cloud and confidential smart-contract technology until the end of 2021.