Confidential computing resources
CPU time, on-chain storage, network bandwidth, off-chain storage, and more resources
Native token for confidential contracts
Phala's diverse and comprehensive infrastructure includes support for cross-chain confidential widgets, trustless general-purpose compute platforms and more.
Gatekeepers and CPU Miners must stake their nodes with PHA which can be slashed in the event of misbehavior, providing a powerful disincentive for malicious activity.
Stakeholders who own a certain amount of PHA, will be able to join the Phala DAO to participate in governance.
70% of PHA is distributed to TEE miners