Configuration scheme of Phala miner for development of Phala mining system


Phala network is a cloud computing service that provides privacy protection. Its computing power is comparable to that of existing cloud services and protects the privacy of hosted programs.

We all know that centralized cloud service providers, including Alibaba cloud, Tencent cloud and AWS, can provide efficient and convenient cloud services to individuals and enterprises. What does Phala network use to compete?

At present, Phala has made its debut as a computing project of Poka ecology, and the popularity of the community has been rising in recent months. However, many people still do not fully understand the practical application value of Phala. Therefore, today we will take an inventory of the application value and future prospects of Phala for your reference.
Configuration scheme of Phala miner for development of Phala mining system
What is Phala?
The core of Phala is cloud computing network. Compared with current cloud services, it can provide computing power; At the same time, it can provide privacy protection to regulated programs (that is, the internal state of the program and the interaction between users and programs are not publicly visible), and maintain the security and distrust attributes of the blockchain. Phala obtains additional security assurance by combining the P2P network running trusted hardware of the trusted open source software (Phala runtime) with the blockchain. Because there is no centralized executor or data controller, all computing operations on Phala are de trusted: Phala only serves as a bridge between computing power and users, while the blockchain ensures the transaction order and security, and will not disclose any relevant information.

Phala is more than just a smart contract platform. Developers and users can run any program on Phala, including smart contract and Turing complete program, and even update and maintain them after network deployment. Phala combines the advantages of Web 2.0 and Web 3.0, that is, the performance of centralized programs and the de trusted privacy of distributed applications. However, it is worth noting that Phala has another dimension: because Phala can ensure that all parties use data without disclosing data (for example, for machine learning or user identity management), it can also become an infrastructure for large-scale data exchange between parties without mutual trust.

Decentralized computing requires technical support from tee
Decentralization as we all know, this is the general trend of the Internet in the future, but with the decentralization, the following problems also appear. This problem is “trust”.

For example, if you want to complete a calculation task, so you find a third party to do the calculation for you, how can you prove that the result he gives you is correct? If you want to verify, you need to calculate it again. What is the significance of third-party calculation? For a malicious third party, you can just give a wrong result back. After all, it will save more cost.

How to avoid such an embarrassing thing has become the most important problem.

Generally, there are many ways to solve this problem. For example, zero knowledge proof can be achieved, but it is very resource-consuming to achieve this through zero knowledge proof (like ZK snark in the commit phase of filecoin)

Phala adopts a more reasonable scheme – tee technology
Generally speaking, tee (trusted execution environment) technology uses a special area in the CPU for calculation. For operation in this area, even the owner of the machine cannot obtain the data inside, which is very safe. At present, tee technology has been relatively mature and widely used in various fields such as industry, finance, big data and so on.

Through tee technology and the very stable Boca chain technology at the bottom, Phala has become a head project in the field of decentralized computing.
Configuration scheme of Phala miner for development of Phala mining system

What is the development prospect of PHA?
Phala is the most important privacy protection agreement in Web3.0 infrastructure. As we all know, foreign countries pay special attention to privacy, so Phala is particularly popular in overseas markets.

From the perspective of token distribution, 70% of PHA needs to be produced by miners, and 9% is obtained free through parallel chain slot auction. In this way, 79% are distributed to the community, the team only occupies 5%, and 1% is released only after the main network is online. It should be said that token distribution is conscience enough. The founding team has a pattern and is willing to distribute most of the cake to the community.

Therefore, the online circulation of Phala will be very small, and the lineup of Phala’s investment institutions is particularly luxurious, such as candaq, iosg, SNZ and other institutions. In addition, Huo coin independently opened the Poka ecological plate, which shows that Huo coin is also farsighted in the layout of Poka ecology. It is conceivable that Phala is the first Poka ecological project of Huo coin.

When can I dig?
Phala’s official mining will start after successfully photographing the Kusama card slot. At present, online users can use the beta version to dig the head mine and enjoy the benefits brought by the head mine. The main network is expected to go online in late June. The formal mining is subject to the official announcement.