How Web3 and Super Protocol fit together

Super Protocol
5 min readApr 14, 2022


Before the blockchain revolution, the world was at Web2 (focus on user-generated content, usability, interoperability — but still on centralized platforms and services). Web3 is supposed to do away with centralization. Until it does, we’re stuck in this quasi-state of Web2.5, the transition period. And Super Protocol will be one of the key forces bringing us to full Web3. How? Read on.

What’s Web3?

One of the key technologies underpinning Web3 is a decentralized digital currency and blockchain with a distributed consensus mechanism. Thanks to Turing-complete smart contracts of the Ethereum network, thousands of distributed systems and applications brought millions of users (and billions of dollars) to new industries such as DeFi, NFTs, and GameFi. Ultimately, Web3 aims to replace the current closed, centralized structure of core Internet services and platforms with open, decentralized alternatives. Below you can see some popular Web2 services and their current Web3 counterparts:

Thanks Messari

Into the cloud

Decentralization is only the first step. Big Data, AI, IoT, and VR/AR are all going to play a huge role in Web3. These technologies require a lot of computational capacity and access to data. Most cloud services are dominated by AWS, Azure, and Google Cloud, which makes it very centralized while not eliminating outages (as AWS customers recently found out). At the same time, the millions of GPUs used worldwide for crypto mining could be used as a decentralized alternative to the centralized cloud services oligopoly.

However, with the exponential growth in the number of data sources, the volume and variety of data, as well as ever more complex algorithms for data processing mean that data anonymization and confidential computing are of utmost importance. To execute on the holy grail of decentralized confidential computing that is so important to Web3, Super Protocol is using the latest Trusted Execution Environment (TEE) technology, which allows code to be executed in an isolated environment, protecting data integrity and confidentiality.

By creating a universal decentralized protocol for distributed confidential computing, Super Protocol finally creates a fully decentralized and confidential cloud computing — aka, the secure computational backbone of the Web3 era. The significance of this is that without massive computational power that protects data at all stages, Web3 simply cannot gain adoption in the corporate world and many other aspects of our society.

The 3 stages of data

Effectively, data could only be in three states: at rest, in transit, and in use. There are many encryption methods to protect data in storage or during transmission. But not during processing. Confidential computing resorts to hardware protection during processing to solve this problem. Clearly, data protected only 2/3 of the time is not protected data.

Market demand

That “main street” is embracing confidential computing is no secret. Gartner anticipates that by 2025, 50% of large companies will be using confidential computing. And not in siloed centralized systems either. Corporations understand the value of integrated networks of millions of computational providers. McKinsey expects that: “The integrated network economy could represent a global revenue pool of $60 trillion in 2025 with a potential increase in total economy share from about 1 to 2 percent today to approximately 30 percent by 2025.”

Since Super Protocol is a decentralized trustless system, it makes confidential computing an indispensable element at the core of the protocol itself. We offers the market an open, decentralized platform that features infinite computational resource scalability, supports complete confidentiality at the hardware level, and provides a unique environment for creating an ecosystem of thousands of data sources, algorithms for data processing and unique solutions in the areas of AI, IoT, VR/AR, etc. It’s a fair system, where any developer, be it an individual or a large corporation, will enjoy equal opportunities with respect to making additional contributions to the ecosystem and getting rewarded for them.

Audience: Computational Resource Owners

As essentially a marketplace, we have two types of users: resource providers and resource requesters. Anyone with computational resources to share can earn a guaranteed, stable stream of income by providing computational power in an open, fully decentralized public blockchain-based protocol. No intermediaries. No centralized monopolies.

Audience: Data Owners

High-quality anonymization is not always possible without losing data utility. Additionally, many of today’s analytical tools enable successful data de-anonymization. Meanwhile, Super Protocol offers data owners a simple and convenient route for monetizing their data — with no intermediaries involved and while maintaining full data confidentiality.

Audience: Service Developers

As technology becomes more and more complex, technological solutions require more labor, more in-depth expertise, and more computational capacity. And as development costs rise, the need to protect intellectual property becomes paramount. At the same time, any solutions in today’s fast-paced world must be constantly updated and provide easy scalability.

It is therefore far easier and more economical for software developers to offer Super Protocol as a direct sales channel to consumers, bypassing intermediaries, as well as providing all the tools necessary to quickly scale the solutions while protecting intellectual property.

Audience: Consumers of Data Analysis and Services

You are a company (large or small) with data to process. But you don’t want your data to fall into the wrong hands (competitors, criminals, etc.). You can process it internally very slowly and at a great cost. You can use one of the big 3 cloud computing providers (cheaper and faster, but there is a risk of downtime, censorship, and more). Or you can use a system that protects your data at all three stages (rest, transit, and processing) while leaving it not only secure but totally confidential. Not to mention, you’ll get the computational power of possibly millions of computers around the world.

That’s the massive advantage of Super Protocol: an open, decentralized ecosystem of computational resources, innovative products and services, data sources (including those previously unavailable for confidentiality reasons), and data processing tools.

And that’s exactly what is needed in a truly Web3 world. No intermediaries, no half-steps, no compromises. Your data is too valuable for any of that.



Super Protocol

Super Protocol is for those who need decentralized, permissionless, trustless and easily scalable computing resources.