Developers and institutions are gaining a new way to deploy advanced Web3 applications, as Cubist brings confidential compute to mainnet for private and verifiableDevelopers and institutions are gaining a new way to deploy advanced Web3 applications, as Cubist brings confidential compute to mainnet for private and verifiable

Cubist launches confidential compute platform for Web3 production on mainnet networks

confidential compute

Developers and institutions are gaining a new way to deploy advanced Web3 applications, as Cubist brings confidential compute to mainnet for private and verifiable off-chain logic.

Cubist debuts Confidential Cloud Functions on mainnet

In San Diego, security-focused Web3 infrastructure provider Cubist announced the general availability and production rollout of its Cubist Confidential Cloud Functions (C2F), described as the first Web3 confidential compute platform running live systems on mainnet networks. The platform combines off-chain privacy and speed with on-chain style guarantees, enabling private, compute-intensive and cross-chain logic.

As decentralized applications become more sophisticated, teams typically face a painful tradeoff. They can keep logic entirely on-chain and accept high gas costs, performance limits and full public data exposure. Alternatively, they can move logic off-chain and lose the cryptographic assurances of a smart contract. C2F aims to remove this dilemma by letting developers execute sensitive, custom code in tamper-proof hardware, at scale and across multiple chains.

Moreover, Cubist positions C2F as a new foundation for private smart contracts and verifiable off-chain code, targeting both DeFi protocols and enterprise use cases. The solution is already live in production with Squid, other DeFi projects and institutional clients, according to the company.

How C2F executes private logic at scale

With C2F, developers can write code that uses private data, external API calls, real-time market feeds or sensitive business logic in familiar programming languages. They then deploy that code through existing CI/CD pipelines, avoiding the need to adopt entirely new development workflows or tooling.

Each C2F execution runs inside a secure Trusted Execution Environment (TEE). This hardware-backed enclave ensures that the deployed code cannot be modified or influenced by the host system and that inputs and outputs remain confidential. However, the system still exposes cryptographic attestations, so counterparties can verify exactly what code ran.

That said, the design targets production-grade reliability rather than experimental use. Cubist emphasizes that C2F is live today and powering real systems, not just testnet pilots, which is a key differentiator in the current infrastructure landscape.

Private smart contracts across any chain

C2F enables teams to build private smart contracts, defined here as off-chain logic that enforces contract-like rules at low cost while optionally keeping signing logic hidden from observers. This execution model supports complex workflows that may be impractical or impossible entirely on-chain.

Because the logic is inherently any-chain, teams can write applications once and deploy them across multiple networks. They can also coordinate activity between chains that do not natively support smart contracts, unlocking new designs around liquidity, settlement and risk management.

Moreover, Cubist reports that teams are using C2F-powered private smart contracts for instant private multi chain swaps, private compliance-aware tokenization, programmable escrows and on-chain settlement logic. The company argues that many of these applications simply were not feasible with previous infrastructure, especially on non-smart-contract chains.

Verifiable off-chain code and institutional controls

Beyond private execution, C2F supports verifiable off chain code for critical decision points. In this model, the C2F workload sits in front of sensitive actions and creates a detailed, verifiable record of what logic authorized the action and why it did so.

This design gives regulators, partners and internal risk teams cryptographic evidence about which code path executed, providing a strong audit trail. That said, the underlying data and logic can remain confidential, balancing transparency with privacy for institutional users.

According to Cubist, this foundation enables institutional-grade controls, automated liquidation and repayment mechanisms, proactive risk engines that respond to real-time data and more. Moreover, all of these workflows can include verifiable audit trails suitable for regulatory or compliance reviews.

Squid adopts C2F for cross-chain liquidity

C2F is already integrated into the latest version of Squid‘s Cross-Chain Order Routing and Auction Layer (CORAL). Squid is a leading cross-chain liquidity provider focused on fast, reliable swaps across heterogeneous networks.

“We are thrilled to partner with Cubist to supercharge Squid’s cross-chain liquidity network. By leveraging Cubist Confidential Cloud Functions, we have replaced on-chain smart contracts with private, off-chain logic, enabling sub-second swaps across EVM, non-EVM and even non-smart contract chains like Bitcoin, all with higher reliability and better pricing,” said Fig, Co-Founder of Squid.

Fig added that Squid chose Cubist for its security guarantees and non-custodial design, which align with the project’s decentralization principles. Moreover, he emphasized the goal of delivering seamless solutions for both institutional and retail users as cross-chain activity grows.

Cubist’s vision for Web3 infrastructure

Cubist Co-Founder and CTO Fraser Brown framed C2F as a response to long-standing limitations in Web3 tooling. “Web3 has opened up exciting possibilities across finance and beyond, yet developers are still constrained by tools that force them to choose between transparency and privacy, or between trust and performance,” he said.

“C2F is different: it is live today, built specifically for the demands of production systems and already enabling teams to build what simply was not possible before, from enforcing smart contract logic on chains that do not support smart contracts, to applying custom, auditable signing rules to high-value transactions,” Brown continued. “We are proud to be the first to deliver this solution in production and look forward to making off-chain logic enforcement a standard part of every Web3 tech stack.”

That said, Cubist also highlights integration depth as a competitive advantage. C2F works with CubeSigner, the company’s secure-by-design, non-custodial key storage and signing infrastructure, and connects to existing key management systems, which should ease enterprise adoption.

Availability, integrations and architecture

C2F is now generally available, and teams can request a demo or access a test environment to evaluate performance and security properties. Moreover, its integration with CubeSigner allows organizations to define custom signing policies that are enforced by verifiable code running inside TEEs.

The platform is intended to support off chain confidential compute for a wide range of Web3 and fintech applications, from DeFi protocols to tokenization platforms and exchanges. Because it operates across multiple chains and leverages hardware-backed isolation, it also aligns with emerging enterprise requirements around data protection and regulatory compliance.

Developers can incorporate C2F as a building block for cross chain private execution, complex governance workflows and risk engines, while retaining the performance benefits of off-chain processing. However, they still obtain strong assurances about what code executed and under which conditions.

About Cubist

Cubist is a key management infrastructure company founded in 2022 and backed by investors including Polychain, dao5, Blizzard and Paxos. The founding team includes a former fintech COO and professors from Carnegie Mellon University and the University of California San Diego, who together have published more than 90 peer-reviewed security-related papers.

Members of the Cubist team have designed and specified cryptography for networks such as Ethereum and Avalanche, deployed fine-grained isolation in Firefox, discovered serious bugs in Google Chrome and Linux, and built automated reasoning tools used by companies like Amazon and Certora.

In summary, Cubist’s C2F platform brings hardware-backed privacy and verifiable execution to mainnet Web3 environments, offering developers a way to combine off-chain performance with on-chain style guarantees across multiple blockchains.

Piyasa Fırsatı
Cloud Logosu
Cloud Fiyatı(CLOUD)
$0.08204
$0.08204$0.08204
-2.13%
USD
Cloud (CLOUD) Canlı Fiyat Grafiği
Sorumluluk Reddi: Bu sitede yeniden yayınlanan makaleler, halka açık platformlardan alınmıştır ve yalnızca bilgilendirme amaçlıdır. MEXC'nin görüşlerini yansıtmayabilir. Tüm hakları telif sahiplerine aittir. Herhangi bir içeriğin üçüncü taraf haklarını ihlal ettiğini düşünüyorsanız, kaldırılması için lütfen service@support.mexc.com ile iletişime geçin. MEXC, içeriğin doğruluğu, eksiksizliği veya güncelliği konusunda hiçbir garanti vermez ve sağlanan bilgilere dayalı olarak alınan herhangi bir eylemden sorumlu değildir. İçerik, finansal, yasal veya diğer profesyonel tavsiye niteliğinde değildir ve MEXC tarafından bir tavsiye veya onay olarak değerlendirilmemelidir.

Ayrıca Şunları da Beğenebilirsiniz

Bitcoin ETF Investors React to Fed’s Decision

Bitcoin ETF Investors React to Fed’s Decision

The post Bitcoin ETF Investors React to Fed’s Decision appeared on BitcoinEthereumNews.com. In a surprise move, spot Bitcoin ETFs experienced their first significant daily outflows in over a week, following the Federal Reserve’s adjusted policy outlook. This shift reflects the market’s readiness to respond to any hint of change on the regulatory landscape, as well as its sensitivity to central bank cues. Continue Reading:Bitcoin ETF Investors React to Fed’s Decision Source: https://en.bitcoinhaber.net/bitcoin-etf-investors-react-to-feds-decision
Paylaş
BitcoinEthereumNews2025/09/18 18:51
US Senators Introduce SAFE Crypto Act to Target Rising Crypto Scams

US Senators Introduce SAFE Crypto Act to Target Rising Crypto Scams

The post US Senators Introduce SAFE Crypto Act to Target Rising Crypto Scams appeared first on Coinpedia Fintech News Crypto scams are getting faster, smarter and
Paylaş
CoinPedia2025/12/17 18:33
From Idea to App Store: The Complete Guide to Mobile App Development in Saudi Arabia

From Idea to App Store: The Complete Guide to Mobile App Development in Saudi Arabia

Saudi Arabia is at the forefront of digital transformation. With Vision 2030 driving innovation and a rapidly growing population of tech-savvy users, mobile apps have become a core driver of business growth in the Kingdom. From e-commerce and fintech to healthcare, logistics, and on-demand services, Saudi businesses are embracing mobile apps to connect with customers and scale faster. But how do you take a mobile app idea and turn it into a successful launch on the App Store or Google Play? This guide breaks down the complete mobile app development process in Saudi Arabia — step by step. Step 1: Validate Your App Idea for the Saudi Market Before you start building, ask: What problem does my app solve for Saudi users? Is there a cultural or market gap my app can fill? How do local competitors approach the same challenge? For example, apps related to digital payments, e-learning, delivery services, and healthcare are in high demand across Saudi Arabia. Conducting market research and aligning your app idea with local user behavior is critical. Step 2: Plan Features with Local Needs in Mind Your app should start with an MVP (Minimum Viable Product) — a core version that solves the main problem. Later, you can scale with advanced features. In Saudi Arabia, consider adding: Arabic language support (essential for user adoption) Integration with local payment gateways like STC Pay, Mada, or Apple Pay Regulatory compliance (especially for fintech and health apps) Localization for user preferences (Hijri calendar, cultural UI elements) Step 3: Select the Right Development Approach You can choose: Native Apps (Swift for iOS, Kotlin for Android) — Great for scalability and performance. Cross-Platform Apps (Flutter, React Native) — Cost-effective for startups targeting both iOS and Android simultaneously. Hybrid Apps — Suitable for simpler apps with limited features. For Saudi startups and enterprises, cross-platform development is often preferred to reach a wider audience quickly and efficiently. Step 4: Design With a Local Touch The design must balance global usability standards with local cultural relevance. UI (User Interface): Clean, modern visuals that align with Saudi branding. UX (User Experience): Simple navigation, clear Arabic text support, and intuitive flows. Wireframing & Prototyping: Test early with Saudi users to ensure adoption. A user-friendly design is one of the top reasons apps succeed in the Kingdom’s competitive market. Step 5: Develop Your Mobile App Once the design is ready, the coding begins. Saudi app development companies often follow Agile methodology, ensuring flexibility and faster delivery. Front-End Development: Interface and user interactions. Back-End Development: Databases, servers, and APIs. Integration: Secure connections between front-end and back-end. Strong collaboration between developers, designers, and business analysts ensures your app aligns with Saudi market needs. Step 6: Testing Across Devices and Networks Saudi users rely on different devices and network speeds. That’s why rigorous testing is critical: Functionality Testing: Features work as expected. Performance Testing: The app runs smoothly on both 4G and 5G networks. Localization Testing: Arabic text displays correctly, without alignment issues. Security Testing: Data protection compliance with Saudi cybersecurity standards. Step 7: App Store & Google Play Launch in Saudi Arabia To publish your app: Apple App Store (iOS): Requires an Apple Developer account and strict guideline compliance. Google Play Store (Android): Faster approval but still requires detailed app info. You’ll also need metadata in both English and Arabic — titles, descriptions, and screenshots — to maximize visibility among Saudi users. Step 8: Market Your App in Saudi Arabia Launching an app is only the beginning. You need a marketing strategy tailored to the Kingdom: App Store Optimization (ASO): Use Arabic and English keywords. Social Media Campaigns: Leverage platforms like Snapchat, Twitter (X), and Instagram, which are highly popular in Saudi Arabia. Influencer Marketing: Collaborate with Saudi influencers for early traction. Paid Ads: Google Ads and Saudi-focused Facebook/Instagram ads. Partnerships: Collaborate with local businesses to reach a wider audience. Step 9: Gather Feedback and Optimize Once your app is live, monitor: User reviews on app stores Analytics on engagement, retention, and churn rates Suggestions from Saudi users for culturally relevant features Continuous updates and improvements are vital to stay competitive. Step 10: Scale With Advanced Features Once your MVP gains traction, you can expand with advanced features such as: AI and machine learning for personalization Blockchain-based payments for fintech apps AR/VR features for retail and gaming apps IoT integration for smart home and mobility solutions Saudi Arabia’s digital ecosystem is growing rapidly — apps that adapt quickly will thrive. Conclusion Mobile app development in Saudi Arabia is not just about building an app — it’s about aligning with Vision 2030, cultural needs, and user expectations. By following a clear process — from idea validation to launch and beyond — you can transform your concept into a profitable digital product. Whether you’re a startup or an enterprise in Saudi Arabia, the opportunity is massive. With the right strategy, you can move from idea to App Store and create an app that truly resonates with Saudi users. From Idea to App Store: The Complete Guide to Mobile App Development in Saudi Arabia was originally published in Coinmonks on Medium, where people are continuing the conversation by highlighting and responding to this story
Paylaş
Medium2025/09/18 14:46