Acurast and Nodle Launch Open Node: DeepSeek Powered Smartphone AI Clusters

Acurast
2 min readFeb 26, 2025

--

This initiative empowers individuals to build decentralized AI clusters using repurposed smartphones, enhancing self-sovereign computing and decentralized infrastructure (DePIN).

Smartphone-Powered AI Compute

With Open Node, Acurast enables developers to transform old smartphones into AI compute nodes. By leveraging ARM processors, Trusted Execution Environments (TEE), and open-source tooling, anyone can deploy large language models (LLMs) like DeepSeek AI efficiently.

How to Deploy an Acurast AI Cluster:

  • Gather smartphones with ARM processors and TEE.
  • Connect to power, a USB hub, and a network.
  • Install the Acurast app from GitHub, enable USB debugging, and register each device.
  • Deploy AI models and monitor performance via the Acurast Dashboard.

See DeepSeek AI running on an Acurast smartphone cluster: Video

Why This Matters?

Decentralized Compute: Acurast provides a truly decentralized, scalable, and secure compute network powered by smartphones.

Cost-Effective AI: Utilizing widely available hardware, Acurast democratizes access to AI compute.

Self-Sovereign Infrastructure: Eliminating reliance on centralized servers, Open Node fosters digital sovereignty.

Acurast continues to push the boundaries of decentralized computing, ensuring developers and users can harness the power of mobile-driven AI clusters.

To start building with Acurast, visit: GitHub Repository

About Acurast

Acurast is a truly decentralized, scalable, and secure compute network powered by smartphones, driving a mobile-powered disruption for decentralized, confidential, and accessible compute. Acurast redefines decentralized compute from the ground up — starting with smartphones, which are the most battle-tested devices worldwide, trusted by billions. With built-in TEEs and top-tier HSMs, they surpass traditional servers in security.

--

--

Acurast
Acurast

Written by Acurast

Real Decentralized Compute Network Truly Scalable and Secure – Powered by Phones

Responses (2)