01_
TEE Computing
Environment
TEE (Trust Execution Environment) is a special hardware component isolated from the rest of the system. With independent registers, cache and encrypted memory area, its operation is completely independent of the operating system, virtual machine monitor (VMM) , BIOS and other core components. Separate TEE has limited functionalities, but Phala combines TEE and blockchain to complement the advantages of TEE and blockchain to form a secure and efficient distributed computing cloud.
02_
Full lifetime
trusted
communication
We have completed the construction of the TEE network through the full-lifetime trusted communication between “TEE - Blockchain - User”. All the TEE workers are registered on the blockchain with verification done by the remote attestation protocol. The built-in GRANDPA light client in the TEE secures the communication between the blockchain and the TEE. Finally, the communication between the user and the TEE is end-to-end encrypted with the Diffie-Hellman algorithm.
03_
Separation
of consensus and
computation
Phala adopts a distributed computing architecture that separates computation and consensus. Thanks to the flexibility of the TEE network, Phala facilitates highly scalable confidential cloud computing.
Phala utilises Polkadot's Nominated Proof of Stake (NPoS) algorithm to ensure that the elected validator set is optimised for system security and efficiency. The Phragmén algorithm prevents any group from being over-representative or under-representative.
Phala’s computation layer adopts permissionless node registration, staking economics and random scheduling. Computation tasks are randomly and securely distributed across the global TEE network. The design of confidential contract guarantees the data availability.
04_
Composability
of blockchains
and contracts
Phala is built on Substrate, the blockchain framework that Polkadot is built on, for maximum interoperability with the whole Polkadot ecosystem of chains. We plans to become a Polkadot parachain, which can serve the entire Polkadot parachain ecosystem, as well as other blockchain developers.
The highlight of Phala Network's heterogeneous architecture is that Phala confidential contracts are designed with interoperability in mind. It's based on XCMP to achieve interoperability and composability between contract and blockchains.
05_
Applications
and use cases
Confidential DeFi and Dapps
Cross-chain Confidentiality Layer
Trustless Privacy Data Computation and Exchange
Artificial Intelligence & Healthcare
Joint Risk Control
06_
Your first
confidential
contract
In this tutorial, we will help you set up a "Hello World" development environment. You will deploy the complete core blockchain stack and connect the Web UI to the blockchain. At the end of this tutorial, you will be able to:

- Send a confidential transaction
- Get a ready-to-hack version of Phala Network to build your own confidential contract Dapp
check tutorial