Project Update October: Privacy-first DePIN: Towards Confidential and Public Workerpools

Those who have followed for a long time know iExec as pioneers in decentralized computing, recognizing early the need for alternatives to Big Tech and centralized data centers. As AI and data-driven applications grow, along with blockchain’s role in these industries, the importance of DePIN (Decentralized Physical Infrastructure Networks) like iExec Workerpools has never been clearer.

This update shares our progress, the models we’re exploring, and our vision for confidential, decentralized computing within iExec. Stay tuned for further updates on our mid-term vision and how we’ll bring these models to life.

----

iExec: DePIN, before “DePIN”: with a focus on Confidential Computing

Decentralized cloud computing is a network architecture leveraging blockchain technology to create a peer-to-peer marketplace for cloud computing, networking, and storage services. This structure offers computing resources across decentralized nodes, forming a transparent, secure, and resilient network where no single entity has central control, granting users direct access to these resources. 

Recently, this decentralization approach has gained traction under the trend of DePIN (Decentralized Physical Infrastructure Networks), which combines real-world infrastructure (e.g., servers, storage, connectivity) with blockchain. 

Expanding Decentralized Cloud Computing with Confidentiality

The need extends beyond decentralized cloud computing to the decentralization of data control itself. This is not only about access to computing power but about deciding who can access and control your data.

In today’s digital landscape, five companies dominate 95% of web traffic and the revenue it generates—a reminder of the need for a fully decentralized digital economy. As AI and data-heavy applications continue to grow, the demand for secure, scalable solutions that prioritize privacy and transparency has never been more urgent.

This shift is core to the promise of Web3: a future where power, control, and opportunities are more evenly distributed, ensuring transparency, privacy, and fair value for all. At iExec, we’re combining Web3 blockchain technology with innovations like confidential computing to bring this vision to life.

iExec’s strength is in a specific area of DePIN called DeCC (Decentralized Confidential Computing). iExec’s use of trusted computing environments (TEEs) and blockchain integration is what sets us apart, enabling us to offer the privacy and security that decentralized AI and other next-generation technologies require. iExec’s value lies in these confidential computing capabilities, which are essential to shaping the future of Web3.

DePIN empowers users to share resources directly, without intermediaries. iExec takes this further with tools like DataProtector, which allows developers to help their users share data securely and privately, and Privacy Pass, which enables end-users to monetize their email data while maintaining privacy. These solutions underscore our commitment to a user-owned, decentralized infrastructure.

iExec Workerpools: The Focus on Confidentiality and Decentralization and Why It’s Important

The evolution of our Public Workerpools reflects our commitment to pioneering solutions that prioritize both confidentiality and decentralization. As the demand for secure, decentralized infrastructure grows, particularly for AI and data-driven applications, iExec is strategically aligning with DePIN and DeCC objectives. By focusing on the principles of decentralization and confidentiality, iExec provides developers and users the tools they need to engage in a privacy-focused digital economy. 

Evaluating Public Worker Pools: A Strategic Approach Centered on Confidentiality and Decentralization

At iExec, our goal has always been to refine and expand our Workerpool models in line with our vision for a digital economy where privacy, ownership and monetization are prioritized. 

Currently, we have identified six distinct possible models for decentralizing computing power within our ecosystem. We’ve evaluated each one for varying levels of decentralization, the involvement of external partners, their value for the community, and their alignment with our vision for privacy-first computing, to find the optimal balance between confidentiality and decentralization. 

While we see tremendous potential in using TEEs for secure data processing, the limited availability of these technologies on consumer machines presents a challenge. This reality requires a strategic approach to bridge the gap between our long-term vision and current technological capabilities.

Here's what we've learned and where we aim to go:

1. What We’ve Done: The Worker Pass Model

The recent Worker Pass community event was an example of the decentralized approach, allowing community members to connect to iExec and become “iExec Workers” without Trusted Execution Environments (TEEs) enabled machines.

While not incorporating confidential computing, it was highly decentralized. Holders of the iExec Worker Pass Utility NFT joined a public iExec Workerpool and earned RLC tokens by providing computing power. During the event, we saw more than 65,000 computational tasks executed. We've conducted various tests like this in the past.

Long-time followers of iExec will remember the earlier "Workerdrop" events that set the groundwork for this model- demonstrating computing resource contribution within the iExec ecosystem. While these demonstrated decentralization, they cannot support the majority of real-world use cases that need confidential computing. There was still, however, great potential to reach the optimal level by exploring opportunities for external actors to manage the Workerpool.

Based on this experience and extensive communication with our builder community, we know for sure that we need to combine the decentralization of the Worker Pass Model with the privacy and security features provided by TEEs.

2. What We’re Working on: The Partner Workerpool Model

Logically, our next phase has been exploring partnerships. In this Partner Workerpool Model, external entities manage their own Workerpools, operating independently but in compliance with iExec’s governance and security protocols, including Confidential Computing (CC) standards. By using Trusted Execution Environments (TEEs), this model allows partners to ensure that data processed within the workerpool remains private and secure.

The goal is to expand the network’s decentralization by integrating partners who can scale up operations independently while adhering to confidentiality standards. This model’s potential for scalability and enhanced community engagement remains a core focus of our strategy as we continue to seek partners who align with our vision for a privacy-first decentralized ecosystem.

3. What We’d Ideally Like: The Fully External Model

Looking to the future, our ultimate vision is a Fully External Workerpool Model. In this scenario, external entities would independently operate their Workerpools, managing both the infrastructure and community involvement with minimal oversight from iExec.

Confidentiality is ensured through TEEs or other privacy-preserving technologies so that data remains protected even in fully decentralized setups. This model upholds strict security standards, guaranteeing confidentiality while enabling a greater level of decentralization. It represents a fully scalable, transparent, and resilient network, empowering users to take full ownership of their digital assets while maintaining the highest levels of data privacy and security.

Aligning Public Workerpools with DeCC and Our Vision

iExec laid the groundwork for DeCC (Decentralized Confidential Computing) long before the concept emerged as a trend, combining blockchain and confidential computing to secure data processing in decentralized environments.

As we develop our Public Workerpools, we aim to leverage this position, balancing decentralization and confidentiality in light of the current availability of TEE-enabled consumer machines. Our goal is to create an infrastructure that maximizes value for industries like AI and other sectors within DePIN through DeCC.

Moving Forward: Short-Term Focus and Future Possibilities

Our immediate focus is to find the right balance between decentralization and confidentiality, prioritizing Public Workerpool models that integrate Confidential Computing within decentralized structures, ensuring a secure and resilient infrastructure that meets the industry’s current needs, delivering immediate value to sectors like AI, DeFi, and beyond.

Looking ahead, we’re exploring more fully externalized models with advanced Confidential Computing capabilities as technology and market dynamics evolve, allowing iExec to expand the reach of decentralized, privacy-first cloud computing.

Our upcoming Workerpool communications will delve into our mid-term vision, outlining the next steps toward a fully privacy-focused and decentralized digital economy.

Keep an eye on our social media and join our channels to be part of the conversation. Your participation is invaluable as we continue to advance DeCC and set new standards in DePIN and beyond.