Cubist C2F Aims to Bridge On-Chain Security and Off-Chain Privacy
- Mainnet Launch: Cubist C2F is now in production use on Mainnet networks.
- Chain-Agnostic Platform: C2F supports deployment across multiple blockchains, including those without native smart contract capabilities.
- Trusted Execution Environments (TEEs): The platform uses TEEs to ensure cryptographic security and verifiable off-chain computation.
Experts view Cubist C2F as a significant advancement in bridging on-chain security with off-chain privacy, offering a flexible, chain-agnostic solution that could unlock complex, institutional-grade Web3 applications.
Cubist C2F Aims to Bridge On-Chain Security and Off-Chain Privacy
SAN DIEGO, CA – December 16, 2025 – Web3 infrastructure provider Cubist has officially launched its Confidential Cloud Functions (C2F) platform, introducing a novel solution designed to resolve one of the most persistent challenges in the blockchain space: the trade-off between on-chain security and off-chain privacy and performance. The platform, now in production use on Mainnet networks, enables developers to execute sensitive, compute-intensive logic in a private environment while retaining the strong cryptographic guarantees of a smart contract.
For years, developers have faced a difficult choice. Building entirely on-chain ensures transparency and trust but comes with high costs, slow performance, and a complete lack of data privacy. Moving logic off-chain solves for speed and confidentiality but sacrifices the verifiable, trustless nature that defines blockchain technology. Cubist aims to offer the best of both worlds, providing a new foundation for private smart contracts and verifiable off-chain code that could unlock a new wave of complex, institutional-grade applications.
A New Approach in a Maturing Privacy Landscape
While Cubist bills C2F as the first Web3 confidential compute platform of its kind on Mainnet, it enters a market where the pursuit of privacy is already well-established. Pioneers like Secret Network, which launched in 2020, offer a Layer 1 blockchain with privacy-preserving smart contracts by default, using Trusted Execution Environments (TEEs) to encrypt data throughout its lifecycle. Similarly, Oasis Network has provided a confidential smart contract environment on its mainnet since late 2020, with its Sapphire ParaTime being a notable confidential EVM-compatible network.
Cubist’s key differentiation lies not in creating another privacy-centric blockchain, but in offering a flexible, chain-agnostic platform. C2F allows developers to write sensitive logic in familiar programming languages and deploy it via standard development pipelines. This off-chain logic, which can handle private data or call external APIs, is then executed within a secure TEE. The result is then verifiably reported back on-chain. This "any-chain" approach means teams can write complex applications once and deploy them across multiple blockchains, even those without native smart contract capabilities, without migrating their entire stack to a new ecosystem.
“Web3 has opened up exciting possibilities across finance and beyond, yet developers are still constrained by tools that force them to choose between transparency and privacy, or between trust and performance,” commented Cubist Co-Founder and CTO Fraser Brown. “C2F is different…it’s already enabling teams to build what simply wasn’t possible before – from enforcing smart-contract logic on chains that don’t support smart contracts, to applying custom, auditable signing rules to high-value transactions.”
Under the Hood: The Power of Trusted Execution Environments
The technology underpinning Cubist’s platform is the Trusted Execution Environment (TEE), a secure and isolated area within a computer’s main processor. A TEE functions like a hardware-enforced "black box," ensuring that the code and data inside are protected from being viewed or altered by any other part of the system, including the host operating system or a cloud provider.
When a confidential function is executed via C2F, the process is cryptographically secured. Encrypted data is sent to the TEE, where it is decrypted, processed by the specified logic, and then re-encrypted before it leaves the enclave. This ensures end-to-end confidentiality. Crucially, TEEs provide a mechanism called "attestation," a cryptographic proof that allows a remote user to verify that their code ran, unmodified, within a genuine and secure TEE. This attestation provides the verifiable, on-chain guarantee that has historically been missing from off-chain computation.
While TEEs, such as Intel's SGX, offer a powerful security model, they are not a silver bullet. The model introduces a degree of trust in the hardware manufacturer to have designed the technology without backdoors. Furthermore, academic researchers have demonstrated theoretical side-channel attacks that could potentially leak information by observing the hardware's physical operating characteristics. Despite these considerations, TEEs represent a mature and battle-tested approach to confidential computing that is increasingly seen as a pragmatic solution for bringing privacy to public networks.
Paving the Way for Institutional Web3 Adoption
The launch of C2F comes at a time when the demand for privacy and performance in Web3 has never been greater, particularly from institutional and enterprise players. The inherent transparency of public blockchains has been a major barrier to entry for large financial institutions concerned with protecting sensitive trading strategies, client data, and proprietary business logic.
Cubist’s platform directly addresses these pain points by enabling two primary capabilities: private smart contracts and verifiable off-chain computation. Private smart contracts allow for the enforcement of contract-like rules off-chain at low cost, with the option to keep signing logic confidential. Verifiable off-chain computation provides regulators, partners, or internal audit teams with indisputable evidence of what code executed and what data it used, creating a clear audit trail for critical decisions.
These capabilities open the door to a host of previously impractical applications, including:
* Private Compliance-Aware Tokenization: Creating digital representations of real-world assets where sensitive ownership or compliance data remains private but verifiable by authorized parties.
* Automated Risk and Liquidation Engines: Building sophisticated systems that react to real-time market data to manage risk or execute liquidations without exposing their strategies to front-runners.
* Programmable Escrows and On-Chain Settlement: Coordinating complex, multi-party transactions with custom logic that remains confidential until settlement.
Real-World Impact with Squid's Cross-Chain Swaps
The most concrete example of C2F’s impact is its integration with Squid, a leading cross-chain liquidity provider. Squid is using the platform to power its new Cross-Chain Order Routing and Auction Layer (CORAL), replacing on-chain smart contracts with private, high-speed off-chain logic.
This allows Squid to facilitate complex swaps across a multitude of blockchain networks, including those that do not natively support smart contracts, like Bitcoin. By moving the heavy computational logic for order routing and auctions into C2F's confidential environment, Squid can protect its users from front-running and other forms of value extraction while dramatically improving performance.
“By leveraging Cubist Confidential Cloud Functions, we've replaced on-chain smart contracts with private, off-chain logic, enabling sub-second swaps across EVM, non-EVM, and even non-smart contract chains like Bitcoin, all with higher reliability and better pricing,” said Fig, Co-Founder of Squid. “We chose Cubist for their unmatched security and non-custodial standards, ensuring we advance next-gen crypto tech while upholding decentralization.”
With a team founded by security experts and academics from Carnegie Mellon University and the University of California San Diego, Cubist is positioning itself not just as a tool provider but as a foundational infrastructure layer for a more secure, private, and scalable Web3. By providing a pragmatic solution that integrates with existing developer workflows, Cubist’s C2F may prove to be a critical catalyst in making off-chain logic enforcement a standard component of the modern Web3 technology stack.
