Builders and establishments are gaining a brand new strategy to deploy superior Web3 purposes, as Cubist brings confidential compute to mainnet for personal and verifiable off-chain logic.
Cubist debuts Confidential Cloud Features on mainnet
In San Diego, security-focused Web3 infrastructure supplier Cubist introduced the final availability and manufacturing rollout of its Cubist Confidential Cloud Features (C2F), described as the primary Web3 confidential compute platform operating stay programs on mainnet networks. The platform combines off-chain privateness and velocity with on-chain model ensures, enabling non-public, compute-intensive and cross-chain logic.
As decentralized purposes turn out to be extra subtle, groups sometimes face a painful tradeoff. They will maintain logic fully on-chain and settle for excessive fuel prices, efficiency limits and full public information publicity. Alternatively, they’ll transfer logic off-chain and lose the cryptographic assurances of a sensible contract. C2F goals to take away this dilemma by letting builders execute delicate, customized code in tamper-proof {hardware}, at scale and throughout a number of chains.
Furthermore, Cubist positions C2F as a brand new basis for personal good contracts and verifiable off-chain code, concentrating on each DeFi protocols and enterprise use instances. The answer is already stay in manufacturing with Squid, different DeFi initiatives and institutional shoppers, in keeping with the corporate.
How C2F executes non-public logic at scale
With C2F, builders can write code that makes use of non-public information, exterior API calls, real-time market feeds or delicate enterprise logic in acquainted programming languages. They then deploy that code by current CI/CD pipelines, avoiding the necessity to undertake fully new growth workflows or tooling.
Every C2F execution runs inside a safe Trusted Execution Atmosphere (TEE). This hardware-backed enclave ensures that the deployed code can’t be modified or influenced by the host system and that inputs and outputs stay confidential. Nevertheless, the system nonetheless exposes cryptographic attestations, so counterparties can confirm precisely what code ran.
That stated, the design targets production-grade reliability slightly than experimental use. Cubist emphasizes that C2F is stay at present and powering actual programs, not simply testnet pilots, which is a key differentiator within the present infrastructure panorama.
Non-public good contracts throughout any chain
C2F permits groups to construct non-public good contracts, outlined right here as off-chain logic that enforces contract-like guidelines at low price whereas optionally retaining signing logic hidden from observers. This execution mannequin helps complicated workflows that could be impractical or unattainable fully on-chain.
As a result of the logic is inherently any-chain, groups can write purposes as soon as and deploy them throughout a number of networks. They will additionally coordinate exercise between chains that don’t natively help good contracts, unlocking new designs round liquidity, settlement and threat administration.
Furthermore, Cubist experiences that groups are utilizing C2F-powered non-public good contracts for immediate non-public multi chain swaps, non-public compliance-aware tokenization, programmable escrows and on-chain settlement logic. The corporate argues that many of those purposes merely weren’t possible with earlier infrastructure, particularly on non-smart-contract chains.
Verifiable off-chain code and institutional controls
Past non-public execution, C2F helps verifiable off chain code for crucial determination factors. On this mannequin, the C2F workload sits in entrance of delicate actions and creates an in depth, verifiable report of what logic approved the motion and why it did so.
This design provides regulators, companions and inside threat groups cryptographic proof about which code path executed, offering a robust audit path. That stated, the underlying information and logic can stay confidential, balancing transparency with privateness for institutional customers.
In accordance with Cubist, this basis permits institutional-grade controls, automated liquidation and reimbursement mechanisms, proactive threat engines that reply to real-time information and extra. Furthermore, all of those workflows can embrace verifiable audit trails appropriate for regulatory or compliance critiques.
Squid adopts C2F for cross-chain liquidity
C2F is already built-in into the newest model of Squid‘s Cross-Chain Order Routing and Public sale Layer (CORAL). Squid is a number one cross-chain liquidity supplier targeted on quick, dependable swaps throughout heterogeneous networks.
“We’re thrilled to companion with Cubist to supercharge Squid’s cross-chain liquidity community. By leveraging Cubist Confidential Cloud Features, now we have changed on-chain good contracts with non-public, off-chain logic, enabling sub-second swaps throughout EVM, non-EVM and even non-smart contract chains like Bitcoin, all with larger reliability and higher pricing,” stated Fig, Co-Founding father of Squid.
Fig added that Squid selected Cubist for its safety ensures and non-custodial design, which align with the venture’s decentralization ideas. Furthermore, he emphasised the objective of delivering seamless options for each institutional and retail customers as cross-chain exercise grows.
Cubist’s imaginative and prescient for Web3 infrastructure
Cubist Co-Founder and CTO Fraser Brown framed C2F as a response to long-standing limitations in Web3 tooling. “Web3 has opened up thrilling prospects throughout finance and past, but builders are nonetheless constrained by instruments that drive them to decide on between transparency and privateness, or between belief and efficiency,” he stated.
“C2F is totally different: it’s stay at present, constructed particularly for the calls for of manufacturing programs and already enabling groups to construct what merely was not attainable earlier than, from implementing good contract logic on chains that don’t help good contracts, to making use of customized, auditable signing guidelines to high-value transactions,” Brown continued. “We’re proud to be the primary to ship this resolution in manufacturing and sit up for making off-chain logic enforcement an ordinary a part of each Web3 tech stack.”
That stated, Cubist additionally highlights integration depth as a aggressive benefit. C2F works with CubeSigner, the corporate’s secure-by-design, non-custodial key storage and signing infrastructure, and connects to current key administration programs, which ought to ease enterprise adoption.
Availability, integrations and structure
C2F is now usually out there, and groups can request a demo or entry a take a look at setting to judge efficiency and safety properties. Furthermore, its integration with CubeSigner permits organizations to outline customized signing insurance policies which can be enforced by verifiable code operating inside TEEs.
The platform is meant to help off chain confidential compute for a variety of Web3 and fintech purposes, from DeFi protocols to tokenization platforms and exchanges. As a result of it operates throughout a number of chains and leverages hardware-backed isolation, it additionally aligns with rising enterprise necessities round information safety and regulatory compliance.
Builders can incorporate C2F as a constructing block for cross chain non-public execution, complicated governance workflows and threat engines, whereas retaining the efficiency advantages of off-chain processing. Nevertheless, they nonetheless get hold of sturdy assurances about what code executed and below which circumstances.
About Cubist
Cubist is a key administration infrastructure firm based in 2022 and backed by traders together with Polychain, dao5, Blizzard and Paxos. The founding group features a former fintech COO and professors from Carnegie Mellon College and the College of California San Diego, who collectively have printed greater than 90 peer-reviewed security-related papers.
Members of the Cubist group have designed and specified cryptography for networks similar to Ethereum and Avalanche, deployed fine-grained isolation in Firefox, found critical bugs in Google Chrome and Linux, and constructed automated reasoning instruments utilized by corporations like Amazon and Certora.
In abstract, Cubist’s C2F platform brings hardware-backed privateness and verifiable execution to mainnet Web3 environments, providing builders a strategy to mix off-chain efficiency with on-chain model ensures throughout a number of blockchains.



