๐Phala Network¶
- ๐ค Author: [20200167 / Kim Jinhwan]
- ๐ Presentation Date: [YYYY-MM-DD]
1. Overview¶
- Project Name:
- Category: [e.g., Decentralized AI Infrastructure, AI Payment Rails, etc.]
- Key Technologies / Platforms: [e.g., Solana, Bittensor, Sahara AI, ZKML, etc.]
- Official Links:
- Website
- Docs
- GitHub
- X
- Discord
๐ Summary¶
Phala Network is a privacy-preserving AI infrastructure that enables secure data processing. It combines blockchain with Trusted Execution Environments (TEEs) to ensure decentralized, verifiable AI execution. User data remains encrypted, and all operations are logged immutably on-chain. The project is already live with real AI agents and dApps in production. Phala offers a compelling Web3 solution to trust, privacy, and governance in AI.
2. Background & Problem Statement¶
-
What real-world problem does this project aim to solve?
Phala Network addresses a fundamental issue in modern AI infrastructure: the centralization of computation and data control, and the lack of robust privacy guarantees. Todayโs AI services are primarily operated by a few cloud giants (e.g., AWS, Google Cloud), which leads to:- Monopolized control over data and models
- Privacy risks for user data
- High costs and lack of transparency
- Potential censorship or restriction by governments or corporations
As AI becomes critical to more aspects of society, issues such as data ownership, trust in computation, and equitable access to AI services are becoming increasingly important.
-
What are the limitations of existing (centralized) approaches?
Centralized AI infrastructure has structural limitations:- Censorship and control risks: Corporations or governments can unilaterally restrict access to certain models or datasets
- Data exposure threats: Central servers present high risks of hacking or misuse of personal data
- Lack of transparency: Users cannot verify how models are run or what data is used
- Cost barriers and monopolies: Only large companies can afford to operate or use enterprise-level AI infrastructure
- Slower innovation: Centralized control limits experimentation with open-source or alternative AI models
-
Why is this problem especially relevant in the context of AI? AI relies on massive computing power and access to sensitive data, making trust, transparency, and privacy essential. But centralized systems create friction in all three areas:
- Black-box behavior: Internal processes are opaque and unverifiable
- Weak privacy protection: Input data can be leaked or exposed
- Limited accessibility: Open participation in AI development is restricted
Phala addresses these challenges by: - Using TEE (Trusted Execution Environments) to securely execute AI workloads - Enabling verifiable outputs via zkCompute and on-chain proofs - Creating an open, decentralized AI ecosystem where computation is transparent and censorship-resistant
In a world where AI is reshaping economies, governance, and daily life, these problemsโand their solutionsโare becoming more critical than ever.
-
ํด๊ฒฐํ๋ ค๋ ์ค์ ๋ฌธ์ ํ์ค ์ธ๊ณ์์ Phala Network๊ฐ ์ฃผ๋ชฉํ๋ ์ฃผ์ ๋ฌธ์ ๋ AI ์ฐ์ฐ๊ณผ ๋ฐ์ดํฐ ์ฒ๋ฆฌ์ ์ค์ํ ๋ฐ ํ๋ผ์ด๋ฒ์ ๋ณดํธ์ ๊ตฌ์กฐ์ ํ๊ณ์ ๋๋ค. ํ์ฌ ๋๋ถ๋ถ์ AI ์๋น์ค๋ AWS, Google Cloud ๋ฑ ๊ฑฐ๋ ์ค์ ํด๋ผ์ฐ๋ ์ฌ์ ์์ ์ํด ์ด์๋๊ณ ์์ด ๋ค์๊ณผ ๊ฐ์ ๋ฌธ์ ๊ฐ ๋ฐ์ํฉ๋๋ค:
- ๋ฐ์ดํฐ์ AI ๋ชจ๋ธ์ ๋ํ ๋ ์ ์ ํต์
- ์ฌ์ฉ์ ๋ฐ์ดํฐ ํ๋ผ์ด๋ฒ์ ์นจํด ์ํ
- ๋์ ๋น์ฉ๊ณผ ๋ฎ์ ํฌ๋ช ์ฑ
- ํน์ ์ ๋ถ๋ ๊ธฐ๊ด์ ์ํ ๊ฒ์ด ๋ฐ ์ ๊ทผ ์ ํ ๊ฐ๋ฅ์ฑ
AI๊ฐ ์ ์ ๋ ๋ง์ ์์ญ์์ ํต์ฌ ์ธํ๋ผ๋ก ์๋ฆฌ ์ก์ผ๋ฉด์, ๋ฐ์ดํฐ ์์ ๊ถ, ๊ฒฐ๊ณผ์ ์ ๋ขฐ์ฑ, AI ์ ๊ทผ์ ๋ฏผ์ฃผํ ๋ฌธ์ ๊ฐ ์ ์ ๋ ์ค์ํด์ง๊ณ ์์ต๋๋ค.
-
๊ธฐ์กด(์ค์ํ) ๋ฐฉ์์ ํ๊ณ ์ค์ ์ง์คํ AI ์ธํ๋ผ๋ ๋ค์๊ณผ ๊ฐ์ ๊ตฌ์กฐ์ ํ๊ณ๋ฅผ ๊ฐ์ง๋๋ค:
- ๊ฒ์ด ๋ฐ ํต์ ๊ฐ๋ฅ์ฑ: ํน์ ๊ธฐ์ ์ด๋ ์ ๋ถ๊ฐ AI ๋ชจ๋ธ ๋๋ ๋ฐ์ดํฐ ์ ๊ทผ์ ์์๋ก ์ ํํ๊ฑฐ๋ ์ฐจ๋จํ ์ ์์
- ๋ฐ์ดํฐ ๋ ธ์ถ ์ํ: ์ค์ ์๋ฒ์์ ๋ฐ์ดํฐ๊ฐ ์ด์๋๋ฉฐ, ํดํนยท์ค๋จ์ฉ ๋ฑ ๋ณด์ ์ํ ์กด์ฌ
- ํฌ๋ช ์ฑ/์ ๋ขฐ์ฑ ๋ถ์กฑ: AI ๋ชจ๋ธ์ด ์ด๋ป๊ฒ ์๋ํ๋์ง, ์ด๋ค ๋ฐ์ดํฐ๋ฅผ ๊ธฐ๋ฐ์ผ๋ก ์ฐ์ฐ๋์๋์ง ์ธ๋ถ์์ ๊ฒ์ฆ ๋ถ๊ฐ๋ฅ
- ๋น์ฉ ๋ฐ ๋ ์ ๊ตฌ์กฐ: ๊ณ ๋น์ฉ ์ธํ๋ผ ์ด์์ผ๋ก ์ธํด ์์ ๋๊ธฐ์ ๋ง ์์ฅ ์ง์ ๊ฐ๋ฅ
- ํ์ ์๋ ์ ํ: ์ค์ํ๋ ํต์ ๊ตฌ์กฐ๋ ์คํ์ AI ๋ชจ๋ธ ๊ฐ๋ฐ๊ณผ ์คํ์์ค ํ์ ์ ์ ํดํจ
-
AI ๋งฅ๋ฝ์์์ ๋ฌธ์ ์ค์์ฑ AI๋ ๋ง๋ํ ์ฐ์ฐ๋ ฅ๊ณผ ๋ฏผ๊ฐํ ๋ฐ์ดํฐ๋ฅผ ๊ธฐ๋ฐ์ผ๋ก ๋์ํ๊ธฐ ๋๋ฌธ์, ์ ๋ขฐ์ฑ, ํฌ๋ช ์ฑ, ํ๋ผ์ด๋ฒ์๊ฐ ๋ชจ๋ ์ค์ํ ์์์ ๋๋ค. ๊ทธ๋ฌ๋ ์ค์ํ๋ ์์คํ ์ ๋ค์๊ณผ ๊ฐ์ ์ ์ฝ์ด ์กด์ฌํฉ๋๋ค:
- AI์ โ๋ธ๋๋ฐ์คโ ๋ฌธ์ : ๋ด๋ถ ๊ตฌ์กฐ๊ฐ ๋ถํฌ๋ช ํ๊ณ ์ธ๋ถ ๊ฒ์ฆ์ด ์ด๋ ค์
- ํ๋ผ์ด๋ฒ์ ๋ณดํธ ๋ถ์กฑ: AI ๋ชจ๋ธ์ ์ ๋ ฅ๋๋ ๋ฐ์ดํฐ๊ฐ ์ธ๋ถ์ ๋ ธ์ถ๋ ๊ฐ๋ฅ์ฑ
- ๊ณต์ ํ ์ ๊ทผ์ฑ ๋ถ์กฑ: ๋๊ตฌ๋ AI๋ฅผ ํ์ฉํ๊ณ ๊ฐ๋ฐํ ์ ์๋ ํ๊ฒฝ์ด ๋ถ์กฑํจ
Phala Network๋ ์ด๋ฌํ ๋ฌธ์ ๋ฅผ ํด๊ฒฐํ๊ธฐ ์ํด, - ์ ๋ขฐ ์คํ ํ๊ฒฝ(TEE)์ ํ์ฉํด ๋ฐ์ดํฐ๋ฅผ ๋ณดํธํ๋ฉฐ - zkCompute๋ฅผ ํตํด ์ฐ์ฐ ๊ฒฐ๊ณผ๋ฅผ ์จ์ฒด์ธ์์ ๊ฒ์ฆํ๊ณ - ๋ถ์ฐํ AI ์ํ๊ณ๋ฅผ ๊ตฌ์ถํ์ฌ AI์ ์์ ๋ก์ด ์ ๊ทผ์ฑ๊ณผ ํฌ๋ช ์ฑ์ ํ๋ณดํ๋ ค๊ณ ํฉ๋๋ค.
์ด๋ AI๊ฐ ์ฌํ ์ ๋ฐ์ ๋ฏธ์น๋ ์ํฅ๋ ฅ์ด ์ปค์ง๋ ์ค๋๋ , ๋ฐ๋์ ํด๊ฒฐํด์ผ ํ ํต์ฌ ๊ณผ์ ์ ๋๋ค.
3. How It Works¶
๐ 3.1 Project Approach¶
-
How does this project intend to solve the problem defined in Section 2? Phala Network combines decentralized AI infrastructure with Trusted Execution Environments (TEE) to ensure privacy and trust in AI execution and data handling. Key strategies include:
- Using TEE hardware (e.g., Intel SGX) to securely process AI tasks and sensitive data on a distributed network
- Enabling the creation of AI-Agent smart contracts that autonomously operate in natural language across dynamic environments
- Making all AI results verifiable on-chain, ensuring full transparency and auditability
-
What is the core idea behind the solution?
Phalaโs core innovation is to decentralize the entire AI pipeline โ from execution and data privacy to economic incentives:- Secure computation without exposing sensitive data
- Dual-layer verification: protected execution within TEE + on-chain zkProof validation
- An AI-Agent Economy where developers can build, deploy, and monetize AI agents in a permissionless Web3 environment
-
What makes this approach different from existing methods?
Feature | Centralized AI | Phala Network |
---|---|---|
Data Privacy | Low | Very High (TEE-protected execution) |
Transparency & Trust | Limited | Very High (on-chain verifiable outputs) |
Scalability & Cost | Expensive, Closed | Low-cost, Open participation |
AI Agent Deployment | Centralized | Fully decentralized, Open marketplace |
Censorship Resistance | Low | Very High (censorship-proof by design) |
-
๋ฌธ์ ํด๊ฒฐ ๋ฐฉ๋ฒ (Project Approach) Phala Network๋ ํ์ค์ํ๋ AI ์ธํ๋ผ์ ์ ๋ขฐ ์คํ ํ๊ฒฝ(TEE) ๊ธฐ์ ์ ๊ฒฐํฉํ์ฌ, AI ๋ฐ์ดํฐ ์ฒ๋ฆฌ์ ์คํ ๊ณผ์ ์์์ ํ๋ผ์ด๋ฒ์ ๋ณดํธ์ ๊ฒฐ๊ณผ์ ์ ๋ขฐ์ฑ ํ๋ณด๋ผ๋ ๋ฌธ์ ๋ฅผ ํด๊ฒฐํ๊ณ ์ ํฉ๋๋ค. ์ฃผ์ ์ ๋ต์ ๋ค์๊ณผ ๊ฐ์ต๋๋ค:
- TEE ํ๋์จ์ด(์: Intel SGX)๋ฅผ ํ์ฉํด AI ์ฐ์ฐ ๋ฐ ๋ฐ์ดํฐ ์ฒ๋ฆฌ๋ฅผ ๋ถ์ฐ ๋คํธ์ํฌ ์์์ ์์ ํ๊ฒ ์ํ
- AI-Agent ์ค๋งํธ์ปจํธ๋ํธ๋ฅผ ํตํด ์์ฐ์ด ๊ธฐ๋ฐ AI ์์ด์ ํธ ์์ฑ ๋ฐ ์คํ ๊ฐ๋ฅ โ ์ ํต์ ์ธ ์ค๋งํธ์ปจํธ๋ํธ์ ํ๊ณ๋ฅผ ๋์ด ๋ค์ํ ์ธ๋ถ ํ๊ฒฝ์์ ์์จ ๋์
- AI ์ฐ์ฐ ๊ฒฐ๊ณผ๋ ๋ธ๋ก์ฒด์ธ ๊ธฐ๋ฐ์ผ๋ก ๊ฒ์ฆ๋๋ฉฐ ๋๊ตฌ๋ ๊ฒ์ฆ ๊ฐ๋ฅ
-
ํต์ฌ ์์ด๋์ด (Core Idea) Phala์ ํต์ฌ ์์ด๋์ด๋ AI์ ์คํ, ๋ฐ์ดํฐ ์ฒ๋ฆฌ, ๋ณด์ ๊ตฌ์กฐ๋ฅผ ๋ชจ๋ ํ์ค์ํํ๋ ๋ฐ ์์ต๋๋ค.
- ๋ฏผ๊ฐํ ๋ฐ์ดํฐ๋ฅผ ์ธ๋ถ์ ๋ ธ์ถํ์ง ์๊ณ ์์ ํ๊ฒ ์ฐ์ฐํ ์ ์๋ ํ๊ฒฝ ์ ๊ณต
- TEE ๋ด๋ถ ์ฐ์ฐ โ zkProof๋ก ๊ฒฐ๊ณผ ์ฆ๋ช โ ์จ์ฒด์ธ ์ ์ถ์ด๋ผ๋ ์ด์ค ๊ฒ์ฆ ๊ตฌ์กฐ
- ๋๊ตฌ๋ AI ์์ด์ ํธ๋ฅผ ๊ฐ๋ฐํด Web3 ์ธํ๋ผ์ ์ฐ๋, ์์ตํ ๊ฐ๋ฅํ AI-Agent Economy ๊ตฌํ
-
๊ธฐ์กด ๋ฐฉ์๊ณผ ์ฐจ๋ณ์ (What Makes It Different?)
๊ตฌ๋ถ | ๊ธฐ์กด ์ค์ํ AI | Phala Network |
---|---|---|
๋ฐ์ดํฐ ํ๋ผ์ด๋ฒ์ | ๋ฎ์ | ๋งค์ฐ ๋์ (TEE ๊ธฐ๋ฐ ์ํธํ ์ฐ์ฐ) |
์ ๋ขฐ์ฑยทํฌ๋ช ์ฑ | ์ ํ์ | ๋งค์ฐ ๋์ (์จ์ฒด์ธ ๊ฒ์ฆ ๊ฐ๋ฅ) |
ํ์ฅ์ฑ ๋ฐ ๋น์ฉ | ๊ณ ๋น์ฉ, ํ์์ | ๋ฎ์ ๋น์ฉ, ๊ฐ๋ฐฉํ ์ฐธ์ฌ ๊ฐ๋ฅ |
AI ์์ด์ ํธ ๋ฐฐํฌ | ์ค์ ์ง์คํ | ์์ ํ์ค์ํ, ์คํ ๋ง์ผํ๋ ์ด์ค |
๊ฒ์ด ์ ํญ์ฑ | ๋ฎ์ | ๋งค์ฐ ๋์ (๊ฒ์ด ๋ถ๊ฐ ๊ตฌ์กฐ) |
๐๏ธ 3.2 Architecture¶
-
Provide a high-level overview of the system architecture.
Phala Network implements a decentralized AI computing infrastructure that combines Trusted Execution Environments (TEEs) with blockchain to ensure maximum privacy and trust for data and model execution. This hybrid design enables secure, verifiable, and transparent AI workloads in a decentralized setting.
-
Include a diagram or describe the components and how they are connected.
Component | Description |
---|---|
Phala Blockchain (on-chain) | A Substrate-based blockchain that manages transactions, user identities, governance, and network state |
pRuntime (TEE enclave) | Off-chain execution layer based on Intel SGX or AMD SEV; runs AI computations, Phat Contracts, and processes user data securely |
Pherry (Bridge Relayer) | Acts as a secure bridge between the blockchain and pRuntime, relaying encrypted messages and proofs |
Worker Nodes | TEE-enabled machines distributed across the network that execute AI models and data processing tasks |
Gatekeepers | Special nodes responsible for secure key management, access control, and resource distribution within the network |
Clients / Users | End-users or developers who interact with Phala via dApps or interfaces to send AI requests and receive results |
-
Focus on how data flows between users, models, smart contracts, etc.
Data Flow (Step-by-Step) 1. The user/client sends a transaction (e.g., AI request) to the Phala blockchain 2. The blockchain validates and logs the request, and sends it through Pherry to the pRuntime enclave 3. The pRuntime executes the smart contract (Phat Contract) and runs the AI model using TEE-protected computation 4. Results are sent back through Pherry to the blockchain, where they are verified and logged 5. he user receives the result, and any reward or staking logic is handled on-chain 6. f needed, external APIs or data sources can be securely accessed by pRuntime to support computation
Key Architectural Advantages - Privacy: All computations are performed inside secure hardware enclaves (TEE), with no data leakage - Trust: Every result is cryptographically verifiable and logged on-chain - Scalability: Distributed worker nodes allow for horizontal scaling - Interoperability: External APIs and Web2 data can be integrated securely - Token Incentives: All rewards and staking are processed trustlessly via smart contracts
๐ฏ 3.3 Core Components¶
-
Describe the key components or modules (e.g., data capsule, model registry, token system)
-
Data Capsule Concept: Encrypted containers designed to securely store and process sensitive data Role: Ensures that user data remains inaccessible to any party outside of the TEE (pRuntime); data is only decrypted and processed within the secure enclave Key Features:
- Access and usage are controlled via smart contracts
- Supports compliance and privacy-by-design
- Enables fine-grained data permissioning and auditability
-
Model Registry Concept: A decentralized repository for managing and versioning AI models Role: Allows developers to register, identify, license, and track AI models deployed in the network Key Features:
- Transparent access control and version history
- Only verified models can be selected for execution
- All changes and usage are recorded on-chain
-
Token System (PHA Token) Concept: A crypto-native economic layer powering payments, incentives, and governance Role:Users pay native tokens (e.g., PHA) to request AI services. Node operators, developers, and data providers are rewarded based on their contributions Supports staking, governance, and dynamic resource allocation Key Features:
- Incentivizes decentralized participation and sustainability
- Aligns economic rewards with network utility
-
Phala Blockchain (On-chain Layer) Role: Serves as the core infrastructure for transaction validation, contract execution, rewards distribution, and governance Key Features:
- Built on Substrate for scalability and customizability
- Ensures transparency and immutability of all on-chain records
-
pRuntime (TEE Execution Layer) Role: Executes all AI computations and Phat Contracts inside trusted hardware environments like Intel SGX Key Features:
- Off-chain yet secure execution
- Guarantees that sensitive data is never exposed outside the enclave
- Forms the computational backbone of Phala
-
Pherry (Bridge Relayer) Role: Facilitates secure and reliable message transmission between the on-chain blockchain and off-chain pRuntime Key Features:
- Ensures data consistency and integrity across both layers
- Acts as a trusted bridge between different trust domains
-
Gatekeepers Role: Handle secure key management, resource distribution, and permission control within the network Key Features:
- Operate as a collectively trusted management layer
- Coordinate secure operations across nodes and enclaves
-
๐ 3.4 Workflow Overview¶
Explain the overall process or user flow in 3โ5 steps.
-
User Request & Data Submission The user sends an AI request via dApp or smart contract, optionally attaching encrypted data or linking external APIs.
-
On-chain Logging & Off-chain Delivery The request is recorded on the Phala Blockchain and securely relayed to the off-chain pRuntime via Pherry.
-
TEE-based Secure Computation A Worker Node executes the AI model inside a Trusted Execution Environment (TEE), ensuring data remains private.
-
Result Verification & Return The result is sent back on-chain with proof and made accessible to the user.
-
Token Rewards & Incentives The user pays in PHA tokens; contributors (node operators, model developers, data providers) are rewarded automatically.
(You may include a diagram or link to an official architecture diagram if helpful.)
4. Token Economy (if applicable)¶
Token Overview
Token Name: PHA
Type: Utility / Governance / Staking
Standard: Substrate-based native token (not ERC-20)
Use Cases in the Ecosystem
- Payments: Users pay in PHA to use AI services and interact with Phat Contracts
- Rewards: Contributors (e.g., node operators, model developers) earn PHA for participating
- Staking: Gatekeepers and worker nodes stake PHA as economic security
- Governance: PHA holders can vote on protocol upgrades and parameter changes
Incentive Mechanism
- PHA creates a sustainable ecosystem where key actors are rewarded based on their role and contribution:
Stakeholder | How They Use / Earn the Token |
---|---|
Data Provider | Earns PHA for contributing quality datasets |
Model Developer | Receives PHA based on model usage and licensing |
TEE Node Operator | Earns PHA by executing AI computations securely in TEE |
Gatekeeper | Staked PHA enables them to manage keys and secure the network |
User | Pays PHA to access AI services or deploy Phat Contracts |
Tokenomics - Supply Model: Inflationary - Emission: Block rewards + service-based rewards - Staking Mechanism: Required for node/gatekeeper participation - Vesting: Early contributors and team allocations are subject to vesting schedules - Burning: No default burn mechanism, but may occur via governance proposals
5. Project Status & Plan¶
Project Status: Live and Evolving Mainnet Launch: - Phala Network is fully operational. It launched on the Ethereum mainnet in January 2025, following prior deployments on Polkadot and testnets.
Recent Expansion: - The release of Phala Network 2.0 introduced the first OP Succinct Layer 2 on Ethereum, signaling continued technical innovation and a move toward cross-chain AI computation.
User Base & Community - Developer Ecosystem: As of March 2025, Phalaโs Ambassador Program includes โ 2 Head Ambassadors, โ 4 Senior Ambassadors, โ 15+ active contributors driving education, marketing, and global community growth. - GitHub Activity & Open Source: Phala is fully open source with 278+ public repositories (as of July 2025). Active development includes regular commits, updates, and feature enhancements, reflecting a transparent and engaged contributor base.
Partnerships & Funding - Strategic Collaborations: Partnered with BUIDL_QUESTS 2025, Autonomys, and APRO to expand privacy-first AI and confidential computing. Phala also collaborates with Bitcoin Gold on secure cross-chain bridges and with several DeFi protocols to integrate privacy-preserving features. - Investments & Grants: Received investment from DWF Labs (June 2025), which now supports PHA with liquidity provisioning and market-making services, enhancing token accessibility and market health.
Real-World Use & Adoption (Hype vs. Traction) - Use Cases: Phala powers real dApps in confidential fintech AI, decentralized cloud computing, and Web3 AI agents. For example, the โNewtonโ confidential AI agent launched on Base chain in 2025, offering practical automation in the fintech sector. - Growing Ecosystem: Support for Phat Contracts continues to grow, enabling more composable, privacy-preserving applications in DeFi, analytics, and AI.
Token (PHA): Listing & Market Activity - Availability: PHA is actively traded on major exchanges (e.g., Binance, KuCoin), with increasing liquidity supported by market makers like DWF Labs. - 2025 Price Activity: Analysts project a wide range ($0.05 to $1.50) for PHA in 2025 due to high volatility in the AI + crypto sector, with price movements tied to major launches and partnerships, not mere speculation. - Utility: PHA powers governance, staking, and reward mechanisms. Contributors (nodes, developers, ambassadors, data providers) are rewarded through decentralized token flows.
Key Takeaways - Not Just Hype: Phala is a live, production-ready Web3 project with real technical delivery, developer traction, and open-source transparency. - Community-Led Growth: A global contributor base and structured Ambassador Program are actively expanding the ecosystem. - PHA Token in Action: PHA is used daily for service payments, governance, and rewards โ not just speculation. - Balanced Perspective: While Phala shows strong momentum and real-world deployments, future success still depends on continued developer adoption and execution in a competitive and volatile space.
6. User Experience & Hands-on Review (if applicable)¶
Try to actually use the project if possible โ via a demo, public app, testnet, or simulation. This section should capture your experience as a user or a developer, not just as a researcher.
Here are some prompts to help you reflect:
- What features did you explore?
- What did you do step-by-step?
- Was the onboarding intuitive or confusing?
- How did you deal with a crypto wallet or tokens?
- What felt different from traditional (non-blockchain) services?
- What worked well? What didnโt?
You can also include: - Screenshots - Links to testnet/demo activity - Errors or bugs you encountered
7. Why Blockchain¶
- Why Does This Problem Require Blockchain? Phala tackles problems deeply embedded in centralized AI systems: privacy vulnerabilities, lack of trust, opaque processes, and potential censorship. Blockchain provides the structural capabilities to overcome these issues:
- Tamper-proof Execution and Logging: Every computation, data access, and AI model interaction is immutably recorded on-chain, preventing any party from secretly modifying histories or results. This transparent execution ledger ensures sensitive data is processed correctlyโand can be verified.
- Trustless Collaboration: Users and developers donโt need to trust any central intermediary. Blockchain enables peer-to-peer interaction, reducing risk of fraud, data abuse, or censorship by centralized authorities.
-
Automated, Enforceable Incentives: Smart contracts ensure that all actorsโdata providers, model developers, node operatorsโare automatically compensated according to rules. Such trustless, programmable reward systems are nearly impossible in traditional off-chain setups.
-
What Does Blockchain Enable That Traditional Solutions Cannot? Censorship Resistance: No single actor (e.g., government, company) can block access to models, freeze assets, or remove services arbitrarily. This is critical as AI becomes embedded in finance, communications, and personal infrastructure.
-
Verifiable Processing: Through cryptographic proofs and TEE attestation, users donโt need to take the platformโs wordโthey get on-chain proof that computation was secure and private.
- Open Participation & Programmability: Anyone can join the network, deploy models, or build on existing services without permission. Traditional platforms restrict participation to selected partnersโblockchain removes that barrier.
-
Transparent Data/Model Usage: Who used which dataset, how the model behaved, and how incentives were distributedโall of it is recorded permanently on-chain. This enhances auditability, regulatory compliance, and scientific reproducibility
-
Is Decentralization Critical in This Use Case? Absolutely. Decentralization is fundamental to the integrity and fairness of Phalaโs AI ecosystem:
-
Prevents Monopoly & Abuse: Centralized AI gives disproportionate power over data, access, and governance to a few corporations. Decentralization distributes this control, reducing bias, privacy violations, and monopolistic outcomes.
- Enables User Sovereignty: With decentralized custody and computation, users can control their data, decide what to share or monetize, and avoid surveillance-driven business models.
- Improves Resilience: Distributed networks are more resistant to downtime, cyberattacks, or political interferenceโno single point of failure can halt critical AI services.
- Fosters Innovation: A decentralized, open ecosystem attracts a diverse global contributor base, encourages experimentation, and accelerates breakthroughs through permissionless, community-driven development.
8. Insights & Limitations¶
โ Key Takeaways¶
Deep Privacy Integration By leveraging Trusted Execution Environments (TEEs) for off-chain compute, Phala ensures that sensitive data is only decrypted and processed within secure enclavesโminimizing the risks of leaks or misuse. This architecture is especially powerful for privacy-first AI.
Open, Programmable Infrastructure Anyone can deploy AI agents or services using smart contracts (Phat Contracts), fostering a permissionless innovation environment. This enables rapid iteration and decentralization of AI development.
Verifiable, Trustless Execution All AI-related activitiesโmodel calls, data usage, execution resultsโare logged immutably on-chain, providing full auditability and reducing reliance on trust.
Clear Incentive Alignment via Token Economy The PHA token enables transparent, automated, and on-chain distribution of rewards to data providers, model developers, and node operatorsโsustaining long-term ecosystem engagement.
Active Community & Real Adoption Phala is not just theoretical. With a live mainnet, real integrations in DeFi and confidential computing, and an active ambassador/dev community, it demonstrates traction beyond hype.
โ Limitations / Open Questions¶
Technical Challenges TEE Limitations - Hardware vulnerabilities (e.g., Intel SGX), limited memory, and reliance on specific chip vendors pose risks to decentralization, trust, and resilience.
Performance Overheads - Secure enclave execution introduces latency and can be costly, especially for resource-intensive AI workloads.
High Developer Learning Curve - From Phat Contracts to testnet setups, the platform requires considerable technical skill compared to traditional AI stacks.
Scalability & Adoption Risks Network Throughput Bottlenecks - TEEs and blockchains both have scalability constraints; handling large-scale AI traffic remains a future challenge.
Cold Start Problem in AI Marketplace - A decentralized AI ecosystem needs enough agents, users, and models to kickstart a vibrant marketplaceโwhich takes time.
9. Reflections & Discussion¶
๐ก Personal Reflections¶
One of the most surprising insights from studying Phala Network was realizing that a privacy-preserving, decentralized AI infrastructure is not just theoreticalโitโs live and working.
Before this, I saw blockchain mainly as a tool for transparency and security. But combining it with TEEs showed that even sensitive AI computations can be performed privately, verifiably, and without centralized control.
This project shifted my understanding of Web3: itโs not just about token economiesโitโs about reshaping how we think about data ownership, access, and digital trust in the AI era.
โ Discussion Questions¶
KOR: ํ์ค์ํ๋ AI ์์คํ ์ด ์ค์ ๋ก ์์ฉํ๋๋ ค๋ฉด, ๊ธฐ์ ์ธ์ ์ด๋ค ์ฌํ์ ยท์ ๋์ ์กฐ๊ฑด๋ค์ด ์ถฉ์กฑ๋์ด์ผ ํ ๊น์? ENG: What non-technical (social, legal, or economic) factors must be addressed for decentralized AI infrastructure to reach mainstream adoption?
KOR: Phala์ ๊ฐ์ ํ๋ก์ ํธ๊ฐ ๋ฏผ๊ฐํ ์๋ฃยท๊ธ์ต ๋ฐ์ดํฐ์ ์ ์ฉ๋๋ค๋ฉด ์ด๋ค ๊ฐ๋ฅ์ฑ๊ณผ ์ํ์ด ์์๊น์? ENG: If systems like Phala are applied to sensitive fields (e.g., healthcare or finance), what new opportunitiesโand risksโcould arise?
10. Insight from others¶
After each presentation in class, we will form small groups for each case for discussion. At that time, please discuss with your group the questions posed in Section 9, and write any key points or insights from your discussion group here.
11. References¶
- https://phala.network/
- https://docs.phala.network/
- https://messari.io/report/phala-network-introduction
- https://www.intel.com/content/www/us/en/products/docs/accelerator-engines/software-guard-extensions.html
- https://www.rocketx.exchange/blog/guide-to-phala-network-buying-pha-tokens/