The DePIN Explorer - DePIN Scan

DePIN Scan is the explorer for DePIN crypto projects. There are 295 DePIN Projects with a combined DePIN market cap of $35,923,458,196 and total DePIN devices of 19,362,616. Click into the projects below to learn how to start earning passive income today.
Project
Token
Category
Social Following
Market Cap
Token Price
24h Trade VOL
1D
7D
30D
Total Devices
Last 7 days
Solana's logo
Solana
SOL
Chain
2,931,309
$108,971,358,324
$227.55$7,304,244,665
+7.5%
-0.7%
+4.3%
-
Render's logo
Render
RNDR
ServerAI
211,074$4,974,182,097$9.61$439,851,898
+10.4%
+9.9%
+45.8%
-
Filecoin's logo
Filecoin
FIL
Server
667,930$4,105,555,226$6.71$689,803,650
+8.2%
-18.2%
+55.3%
3,553
Theta's logo
Theta
THETA
ServerAI
271,975$2,588,920,595$2.59$142,577,860
+8.0%
-13.1%
+71.3%
5,885
Helium's logo
Helium
HNT
Wireless
215,635$1,449,162,825$8.3$28,691,172
+2.1%
-2.5%
+26.3%
-
Akash's logo
Akash
AKT
ServerAI
120,876$1,002,039,612$4.05$16,435,840
+7.5%
-6.3%
+43.0%
472
Grass's logo
Grass
GRASS
ComputeAI
525,726$763,810,606$3.12$165,625,534
+11.4%
+5.3%
-7.8%
-
io.net's logo
io.net
IO
ComputeAI
513,270$506,823,304$4.03$561,253,680
+17.0%
+17.4%
+53.0%
-
IoTeX's logo
IoTeX
IOTX
Chain
310,608
$461,437,301
$0.04887$44,134,922
+5.7%
-20.9%
+7.8%
-
Aethir's logo
Aethir
ATH
Compute
849,608$427,108,330$0.08178$70,180,822
+8.3%
+13.0%
+33.5%
-
peaq's logo
peaq
PEAQ
Chain
280,349
$429,179,329
$0.6650$89,209,383
-3.6%
+42.6%
-
-
Nosana's logo
Nosana
NOS
ComputeAI
59,404$326,527,375$3.92$5,743,468
+5.9%
+6.7%
+1.5%
-
Aleph.im integrates GPUs to power advanced decentralized AI cover
7 hours ago
Aleph.im integrates GPUs to power advanced decentralized AI
The integration of confidential decentralized computation (CDC) and GPU acceleration is transforming the landscape of secure and efficient data processing. These technologies offer a groundbreaking approach to protecting sensitive information while achieving unparalleled computational performance. By harnessing CDC to ensure data privacy and leveraging GPUs for high-speed processing, we can securely manage and analyze data across distributed networks, unlocking new possibilities for innovation. ## Confidential Decentralized Computation [Confidential decentralized computation](https://www.twentysix.cloud/blog/articles/confidential-virtual-machine-overview/), or CDC, is a paradigm shift in data processing. It enables secure computation on sensitive data without compromising its privacy. By leveraging cryptographic techniques and secure hardware enclaves, CDC ensures that data remains encrypted throughout the entire computation process, even from the computing nodes themselves. This approach mitigates the risk of data breaches and unauthorized access. The Power of GPUs, originally designed for rendering graphics, have evolved into powerful parallel processing engines. Their ability to perform numerous calculations simultaneously makes them ideal for accelerating a wide range of computational tasks, from machine learning and scientific simulations to data mining and cryptography. By integrating GPU acceleration into CDC, we can unlock the full potential of both technologies. This combination offers several significant advantages: * Enhanced Privacy: CDC ensures that data remains encrypted during computation, while GPU acceleration can be used to perform complex cryptographic operations efficiently. * Improved Performance: GPUs can significantly accelerate the execution of computationally intensive tasks, such as training large machine learning models or breaking cryptographic ciphers. * Scalability: CDC can be scaled across multiple nodes, and GPU acceleration can be used to distribute the workload among these nodes, further improving performance and scalability. * Reduced Latency: By offloading computationally intensive tasks to GPUs, we can reduce the overall latency of the computation process. ### Our approach: QEMU Hypervisor and PCI-Passthrough To realize the benefits of CDC and GPU acceleration, we employed a novel approach using the [QEMU hypervisor](https://www.qemu.org/) and PCI-passthrough technology. This approach allows us to securely isolate GPU resources within a confidential computing environment. * QEMU Hypervisor: QEMU, a versatile virtualization platform, provides a secure and isolated environment for running virtual machines. By leveraging QEMU’s capabilities, we can create a trusted execution environment (TEE) for confidential computation. * PCI-Passthrough: PCI-passthrough enables direct access to hardware devices, such as GPUs, from within a virtual machine. This allows us to harness the full power of the GPU for accelerating computations within the TEE. By combining QEMU and PCI-passthrough, we can create a powerful and flexible platform for [confidential decentralized computation](https://aleph.im/) with GPU acceleration. This approach offers a high degree of security and performance, making it suitable for a wide range of applications, including: * Secure AI and Machine Learning: Training and deploying machine learning models on sensitive data without compromising privacy. * Private Data Analytics: Analyzing large datasets while preserving data confidentiality. * Blockchain and Cryptocurrency: Securing blockchain transactions and mining operations. * Secure Remote Rendering: Rendering complex graphics and virtual reality experiences remotely without exposing sensitive data. ### Conclusion The combination of confidential decentralized computation and GPU acceleration marks a pivotal advancement in secure and efficient data processing. By capitalizing on the strengths of these technologies, we can tackle pressing challenges in data privacy, security, and computational performance. Our innovative use of QEMU and PCI-passthrough offers a flexible and scalable framework, unlocking the transformative potential of secure data computation across diverse applications.
Empowering Data Ownership in Web3 with iExec cover
a day ago
Empowering Data Ownership in Web3 with iExec
In the evolving landscape of Web3, data ownership has emerged as a critical concern for developers and users alike. As decentralized applications (dApps) gain traction, questions surrounding who can access user data, how it is utilized, and whether users can reclaim control after sharing become paramount. The promise of Web3 is to empower users with control over their personal information, necessitating a shift in how developers approach data security and governance. iExec offers a suite of solutions designed to address these challenges, ensuring that users retain full control over their data even after it has been shared. Developers face several key challenges regarding data ownership, including security, control, and trust. Users often hesitate to engage with dApps due to concerns about unauthorized access to their data. iExec's tools, such as DataProtector, provide robust encryption for both data storage and sharing, allowing users to encrypt files before sharing them on decentralized platforms. Additionally, iExec's on-chain data tokenization system enables users to transform their information into digital assets, granting them the ability to grant or revoke access as needed. This ensures that users can share sensitive information, like medical records, while maintaining control over who can access it and for how long. Moreover, iExec's privacy-enhancing tools, such as Privacy Pass, empower Web3 users to monetize their personal data without sacrificing ownership or privacy. By allowing users to participate in targeted marketing campaigns while keeping their personal information confidential, iExec facilitates a secure environment for data monetization. The combination of blockchain technology and Trusted Execution Environments (TEEs) ensures that sensitive data remains protected during processing, allowing third-party applications to interact with encrypted datasets without ever accessing raw information. As developers navigate the complexities of data ownership in Web3, iExec provides the necessary tools to build trust and empower users in the decentralized ecosystem.
JOINER Project: Paving the Way for 6G and Beyond in the UK cover
a day ago
JOINER Project: Paving the Way for 6G and Beyond in the UK
The telecom industry is on the brink of a transformative era with the advent of 6G technology, which promises to redefine connectivity and innovation. The JOINER project, the UK’s first national accelerator program for 6G and beyond, aims to unite researchers, businesses, and government entities to address significant challenges in the telecom sector. By fostering collaboration and breaking down silos, JOINER creates a shared platform that facilitates resource sharing and the development of innovative solutions, ultimately driving the industry forward. A standout feature of the JOINER initiative is the implementation of Hypervisor as a Service (HaaS), based on Weaver Labs’ Cell-Stack software. This service introduces a layer of cloud automation that simplifies the management of complex Telco-Cloud platforms, such as Kubernetes and OpenStack. By enabling zero-touch deployment and management, HaaS allows researchers to concentrate on innovation without the burden of technical complexities associated with cloud infrastructure. This streamlined approach enhances collaboration and accelerates the development of new technologies, positioning the UK as a leader in telecom innovation. JOINER's mission extends beyond HaaS, as it aims to facilitate large-scale research, create shared telecom testbeds, and foster collaboration among various stakeholders. With plans to host experiments across multiple interconnected locations and deliver the UK’s first full-scale 6G demonstration by March 2025, JOINER is set to play a pivotal role in shaping the future of telecom. By training the next generation of professionals and strengthening the UK's leadership in global telecom standards, JOINER, supported by Weaver Labs, is paving the way for a smarter, more connected world powered by 6G and beyond.
Navigating Privacy in Digital Marketing: The Role of Web3 Technologies cover
a day ago
Navigating Privacy in Digital Marketing: The Role of Web3 Technologies
In the evolving landscape of digital marketing, the tension between delivering personalized experiences and respecting user privacy is becoming increasingly pronounced. Marketers are often likened to oil drillers, eager to extract value from data but sometimes neglecting the ethical implications of their actions. The recent missteps by companies, such as Kaiser Permanente's accidental sharing of private health information affecting millions, highlight the urgent need for a shift towards privacy-first strategies. As consumers grow more cautious about their personal information, the challenge for marketers is to balance innovative data protection methods with business objectives. Web3 technology presents a transformative opportunity for marketers to rebuild trust with consumers by prioritizing privacy and consent. Traditional marketing practices, often perceived as intrusive, are losing their effectiveness as users demand transparency and control over their data. Issues such as data breaches and lack of user consent are driving customers away, leading to a loss of trust that can be devastating for brands. The Ticketmaster data breach serves as a stark reminder of the consequences of failing to protect user data, emphasizing the need for a new approach that respects user rights and fosters loyalty. iExec's R3ach tool exemplifies how marketers can navigate this complex landscape by implementing privacy-first strategies. By utilizing confidential computing technologies, R3ach enables secure communication with users without accessing their personal information. This innovative solution not only facilitates targeted marketing campaigns but also empowers users by allowing them to control their data-sharing choices. As brands embrace these privacy-centric practices, they can reclaim consumer trust and establish long-lasting relationships, ultimately positioning themselves for success in a privacy-conscious market.
Signup for latest DePIN news and updates