Confidential compute on mainnet: Cubist launches C2F
The post Confidential compute on mainnet: Cubist launches C2F appeared on BitcoinEthereumNews.com.
Developers and institutions are gaining a new way to deploy advanced Web3 applications, as Cubist brings confidential compute to mainnet for private and verifiable off-chain logic. Cubist debuts Confidential Cloud Functions on mainnet In San Diego, security-focused Web3 infrastructure provider Cubist announced the general availability and production rollout of its Cubist Confidential Cloud Functions (C2F), described as the first Web3 confidential compute platform running live systems on mainnet networks. The platform combines off-chain privacy and speed with on-chain style guarantees, enabling private, compute-intensive and cross-chain logic. As decentralized applications become more sophisticated, teams typically face a painful tradeoff. They can keep logic entirely on-chain and accept high gas costs, performance limits and full public data exposure. Alternatively, they can move logic off-chain and lose the cryptographic assurances of a smart contract. C2F aims to remove this dilemma by letting developers execute sensitive, custom code in tamper-proof hardware, at scale and across multiple chains. Moreover, Cubist positions C2F as a new foundation for private smart contracts and verifiable off-chain code, targeting both DeFi protocols and enterprise use cases. The solution is already live in production with Squid, other DeFi projects and institutional clients, according to the company. How C2F executes private logic at scale With C2F, developers can write code that uses private data, external API calls, real-time market feeds or sensitive business logic in familiar programming languages. They then deploy that code through existing CI/CD pipelines, avoiding the need to adopt entirely new development workflows or tooling. Each C2F execution runs inside a secure Trusted Execution Environment (TEE). This hardware-backed enclave ensures that the deployed code cannot be modified or influenced by the host system and that inputs and outputs remain confidential. However, the system still exposes cryptographic attestations, so counterparties can verify exactly what code ran. That said, theā¦
Filed under: News - @ December 16, 2025 10:20 pm