Centralized information networks, ones that are owned and/or managed by a azygous entity, person been structurally breached for years. Why? Single points of failure. If 1 entity (or adjacent a few) has entree to a database, past determination is lone 1 “point” to compromise successful bid to summation afloat access. This is simply a superior occupation for networks holding delicate information similar lawsuit information, authorities files, and fiscal records, and those with power of infrastructure similar powerfulness grids.
Billions of integer records were stolen successful 2024 alone, causing an estimated $10 trillion successful damages! Notable breaches see nearly each of AT&T’s lawsuit accusation and telephone logs, half of America’s idiosyncratic wellness information, 700 cardinal end-user records from companies utilizing Snowflake, 10 cardinal unsocial passwords stored connected RockYou24, and Social Security records for 300 cardinal Americans.
Source: Statista, 2024
This is not conscionable a backstage assemblage contented — governments and important nationalist infrastructure besides trust connected centralized networks. Notable caller breaches see records connected 22 cardinal Americans stolen from the U.S. Office of Personnel Management, sensitive authorities communications from aggregate U.S. national agencies, personal biometric information connected 1.1 cardinal Indian citizens, and the ongoing Chinese infiltration of respective U.S. net work providers.
Although hundreds of billions of dollars are spent each twelvemonth connected cyber security, information breaches are getting larger and happening much frequently. It’s go wide that incremental products cannot hole these web vulnerabilities — the infrastructure indispensable beryllium wholly rearchitected.
Source: market.us, 2024
AI magnifies the issue
Recent advancements successful generative AI person made it easier to automate mundane tasks and heighten enactment productivity. But the astir utile and invaluable AI applications necessitate context, i.e. entree to delicate idiosyncratic health, financial, and idiosyncratic information. Because these AI models besides necessitate monolithic computing power, they mostly can’t tally connected user devices (computer, mobile), and alternatively indispensable entree nationalist unreality networks, similar AWS, to process much analyzable inference requests. Given the superior limitations inherent successful centralized networks illustrated earlier, the inability to securely link delicate idiosyncratic information with unreality AI has go a important hurdle for adoption.
Even Apple pointed this retired during their announcement for Apple Intelligence earlier this year, stating the request to beryllium capable to enlist assistance from larger, much analyzable models successful the unreality and how the accepted unreality exemplary isn’t viable anymore.
They sanction 3 circumstantial reasons:
Privacy and information verification: Providers' claims, similar not logging idiosyncratic data, often deficiency transparency and enforcement. Service updates oregon infrastructure troubleshooting tin inadvertently log delicate data.
Runtime lacks transparency: Providers seldom disclose bundle details, and users cannot verify if the work runs unmodified oregon observe changes, adjacent with open-source tools.
Single constituent of failure: Administrators necessitate high-level entree for maintenance, risking accidental information vulnerability oregon maltreatment by attackers targeting these privileged interfaces.
Fortunately, Web3 unreality platforms connection the cleanable solution.
Blockchain-Orchestrated Confidential Cloud (BOCC)
BOCC networks are similar AWS — but built wholly connected confidential hardware and governed by astute contracts. Though inactive aboriginal days, this infrastructure has been successful improvement for years and is yet starting to onboard Web3 projects and Web2 endeavor customers. The champion illustration of this architecture is Super Protocol, an off-chain enterprise-grade unreality level managed wholly by on-chain astute contracts and built connected trustless execution environments (TEEs). These are unafraid hardware enclaves that support codification and information verifiably confidential and secure.
Source: Super Protocol
The implications of this exertion code each of Apple’s concerns noted earlier:
Privacy and information verification: With nationalist astute contracts orchestrating the network, users tin verify whether idiosyncratic information was transported and utilized arsenic promised.
Workload and programme transparency: The web besides verifies the enactment done wrong the confidential TEEs, cryptographically proving the close hardware, data, and bundle were used, and that the output wasn’t tampered with. This accusation is besides submitted on-chain for each to audit.
Single constituent of failure: Network resources (data, software, hardware) are lone accessible by the owner’s backstage key. Therefore, adjacent if 1 idiosyncratic is compromised, lone that user’s resources are astatine risk.
While unreality AI represents an tremendous accidental for Web3 to disrupt, BOCCs tin beryllium applied to immoderate benignant of centralized information web (power grid, integer voting infrastructure, subject IT, etc.), to supply superior and verifiable privateness and security, without sacrificing show oregon latency. Our integer infrastructure has ne'er been much vulnerable, but blockchain-orchestration tin hole it.