Opinion Share Share this article Copy linkX (Twitter)LinkedInFacebookEmail Hoskinson might be wrong about the future of Opinion Share Share this article Copy linkX (Twitter)LinkedInFacebookEmail Hoskinson might be wrong about the future of

Hoskinson might be wrong about the future of decentralized compute

2026/03/15 02:30
8 min read
For feedback or concerns regarding this content, please contact us at crypto.news@mexc.com
Share
Share this article
Copy linkX (Twitter)LinkedInFacebookEmail

Hoskinson might be wrong about the future of decentralized compute

Cardano’s founder recently made an argument about hyperscalers that needs to be addressed, says Fan.

By Leo Fan|Edited by Betsy Farber
Mar 14, 2026, 6:30 p.m.
Make us preferred on Google
Charles Hoskinson during Consensus Hong Kong 2026. (Photo by Michael Perini/Consensus)

The blockchain trilemma reared its head once more at Consensus in Hong Kong in February, to some extent, putting Charles Hoskinson, the founder of Cardano, on the back foot – having to reassure attendees that hyperscalers like Google Cloud and Microsoft Azure are not a risk to decentralisation.

The point was made that major blockchain projects need hyperscalers, and that one shouldn’t be concerned about a single point of failure because:

  • Advanced cryptography neutralizes the risk
  • Multi-party computation distributes key material
  • Confidential computing shields data in use

The argument rested on the idea that ‘if the cloud cannot see the data, the cloud cannot control the system,’ and it was left there due to time constraints.

But there’s an alternative to Hoskinson’s argument in favor of hyperscalers that deserves more attention.

MPC and Confidential Computing Reduce Exposure

This was somewhat of a strategic bastion in Charles’ argument – that technologies like multi-party computation (MPC) and confidential computing ensure that hardware providers wouldn’t have access to the underlying data.

They are powerful tools. But they do not dissolve the underlying risk.

MPC distributes key material across multiple parties so that no single participant can reconstruct a secret. That meaningfully reduces the risk of a single compromised node. However, the security surface expands in other directions. The coordination layer, the communication channels and the governance of participating nodes all become critical.

Instead of trusting a single key holder, the system now depends on a distributed set of actors behaving correctly and on the protocol being implemented correctly. The single point of failure does not disappear. In fact, it simply becomes a distributed trust surface.

Confidential computing, particularly trusted execution environments, introduces a different trade-off. Data is encrypted during execution, which limits exposure to the hosting provider.

But Trusted Execution Environments (TEEs) rely on hardware assumptions. They depend on microarchitectural isolation, firmware integrity and correct implementation. Academic literature, for example, here and here, has repeatedly demonstrated that side-channel and architectural vulnerabilities continue to emerge across enclave technologies. The security boundary is narrower than traditional cloud, but it is not absolute.

More importantly, both MPC and TEEs often operate on top of hyperscaler infrastructure. The physical hardware, virtualization layer and supply chain remain concentrated. If an infrastructure provider controls access to machines, bandwidth or geographic regions, it retains operational leverage. Cryptography may prevent data inspection, but it does not prevent throughput restrictions, shutdowns, or policy interventions.

Advanced cryptographic tools make specific attacks harder, but they still do not remove infrastructure-level failure risk. They simply replace a visible concentration with a more complex one.

The ‘No L1 Can Handle Global Compute’ Argument

Hoskinson made the point that hyperscalers are necessary because no single Layer 1 can handle the computational demands of global systems, referencing the trillions of dollars that have helped to build such data centres.

Of course, Layer 1 networks were not built to run AI training loops, high-frequency trading engines, or enterprise analytics pipelines. They exist to maintain consensus, verify state transitions and provide durable data availability.

He is correct on what Layer 1 is for. But global systems mainly need results that anyone can verify, even if the computation happens elsewhere.

In modern crypto infrastructure, heavy computation increasingly happens off-chain. What matters is that results can be proven and verified onchain. This is the foundation of rollups, zero-knowledge systems and verifiable compute networks.

Focusing on whether an L1 can run global compute misses the core issue of who controls the execution and storage infrastructure behind verification.

If computation happens offchain but relies on centralized infrastructure, the system inherits centralized failure modes. Settlement remains decentralized in theory, but the pathway to producing valid state transitions is concentrated in practice.

The issue should be about dependency at the infrastructure layer, not computational capacity inside Layer 1.

Cryptographic Neutrality Is Not the Same as Participation Neutrality

Cryptographic neutrality is a powerful idea and something Hoskinson used in his argument. It means rules cannot be arbitrarily changed, hidden backdoors cannot be introduced and the protocol remains fair.

But cryptography runs on hardware.

That physical layer determines who can participate, who can afford to do so and who ends up excluded, because throughput and latency are ultimately constrained by real machines and the infrastructure they run on. If hardware production, distribution, and hosting remain centralized, participation becomes economically gated even when the protocol itself is mathematically neutral.

In high-compute systems, hardware is the game-changer. It determines cost structure, who can scale, and resilience under censorship pressure. A neutral protocol running on concentrated infrastructure is neutral in theory but constrained in practice.

The priority should shift toward cryptography combined with diversified hardware ownership.

Without infrastructure diversity, neutrality becomes fragile under stress. If a small set of providers can rate-limit workloads, restrict regions, or impose compliance gates, the system inherits their leverage. Rule fairness alone does not guarantee participation fairness.

Specialization Beats Generalization in Compute Markets

Competing with AWS is often framed as a question of scale, but this too is misleading.

Hyperscalers optimize for flexibility. Their infrastructure is designed to serve thousands of workloads simultaneously. Virtualization layers, orchestration systems, enterprise compliance tooling and elasticity guarantees – these features are strengths for general-purpose compute, but they are also cost layers.

Zero-knowledge proving and verifiable compute are deterministic, compute-dense, memory-bandwidth constrained, and pipeline-sensitive. In other words, they reward specialization.

A purpose-built proving network competes on proof per dollar, proof per watt and proof per latency. When hardware, prover software, circuit design, and aggregation logic are vertically integrated, efficiency compounds. Removing unnecessary abstraction layers reduces overhead. Sustained throughput on persistent clusters outperforms elastic scaling for narrow, constant workloads.

In compute markets, specialization consistently outperforms generalization for steady, high-volume tasks. AWS optimizes for optionality. A dedicated proving network optimizes for one class of work.

The economic structure differs as well. Hyperscalers' price for enterprise margins and broad demand variability. A network aligned around protocol incentives can amortize hardware differently and tune performance around sustained utilization rather than short-term rental models.

The competition becomes about structural efficiency for a defined workload.

Use Hyperscalers, But Do Not Be Dependent on Them

Hyperscalers are not the enemy. They are efficient, reliable, and globally distributed infrastructure providers. The problem is dependence.

A resilient architecture uses major vendors for burst capacity, geographic redundancy, and edge distribution, but it does not anchor core functions to a single provider or a small cluster of providers.

Settlement, final verification and the availability of critical artifacts should remain intact even if a cloud region fails, a vendor exits a market, or policy constraints tighten.

This is where decentralized storage and compute infrastructure become a viable alternative. Proof artifacts, historical records and verification inputs should not be withdrawable at a provider’s discretion. Instead, they should live on infrastructure that is economically aligned with the protocol and structurally difficult to turn off.

Hypescalers should be used as an optional accelerator rather than something foundational to the product. Cloud can still be useful for reach and bursts, but the system’s ability to produce proofs and persist what verification depends on is not gated by a single vendor.

In such a system, if a hyperscaler disappears tomorrow, the network would only slow down, because the parts that matter most are owned and operated by a broader network rather than rented from a big-brand chokepoint.

This is how to fortify crypto’s ethos of decentralization.

Decentralization

Note: The views expressed in this column are those of the author and do not necessarily reflect those of CoinDesk, Inc. or its owners and affiliates.

More For You

The Emperor has no wallet

Why crypto still hasn’t solved a single everyday problem, argues VerifiedX’s Pollak.

Read full story
Latest Crypto News

Crypto’s multi-million F1 sponsorship under fire as Middle East war hits region's biggest events

Ethereum Foundation sells 5,000 ether to Tom Lee's BitMine in $10.2 million deal

Boris Johnson calling Bitcoin a ‘Ponzi’ draws rebuttal from Michael Saylor and others

Wall Street pushes tokenized stocks, but institutions aren’t eager to trade them

Brazil industry giants representing 850 companies decry stablecoin tax threat

The math behind Strategy’s path to 1 million bitcoin by the end of 2026

Top Stories

Bitcoin holds $71,000 despite Trump warning of strikes on Iran's oil-rich Kharg Island

Bitcoin can survive 72% of the world's submarine cables being cut, but a targeted attack on five hosting providers could cripple it

AI developers may not be keen on crypto, but stablecoins are the secret to agentic finance, crypto insiders say

A huge gap between network use and token value is the most important thing happening in XRP right now

Court closes Custodia fight with Federal Reserve just as Fed opens master-account door

Arthur Hayes: Strong Revenue and Real Trading Could Send HYPE to $150

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact crypto.news@mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Horror Thriller ‘Bring Her Back’ Gets HBO Max Premiere Date

Horror Thriller ‘Bring Her Back’ Gets HBO Max Premiere Date

The post Horror Thriller ‘Bring Her Back’ Gets HBO Max Premiere Date appeared on BitcoinEthereumNews.com. Jonah Wren Phillips in “Bring Her Back.” A24 Bring Her Back, a new A24 horror movie from the filmmakers of the smash hit Talk to Me, is coming soon to HBO Max. Bring Her Back opened in theaters on May 30 before debuting on digital streaming via premium video on demand on July 1. The official logline for Bring Her Back reads, “A brother and sister uncover a terrifying ritual at the secluded home of their new foster mother.” Forbes‘South Park’ Season 27 Updated Release Schedule: When Do New Episodes Come Out?By Tim Lammers Directed by twin brothers Danny Philippou and Michael Philippou, Bring Her Back stars Billy Barratt, Sora Wong, Jonah Wren Philips, Sally–Anne Upton, Stephen Philips, Mischa Heywood and Sally Hawkins. Warner Bros. Discovery announced on Wednesday that Bring Her Back will arrive on streaming on HBO Max on Friday, Oct. 3, and on HBO linear on Saturday, Oct. 4, at 8 p.m. ET. Prior to the debut of Bring Her Back on HBO on Oct. 4, the cable outlet will air the Philippou brothers’ 2022 horror hit Talk to Me. ForbesHit Horror Thriller ’28 Years Later’ Is New On Netflix This WeekBy Tim Lammers For viewers who don’t have HBO Max, the streaming platform offers three tiers: The ad-based tier costs $9.99 per month, while an ad-free tier is $16.99 per month. Additionally, an ad-free tier with 4K Ultra HD programming costs $20.99 per month. The Success Of ‘Talk To Me’ Weighed On The Minds Of Philippou Brothers While Making ‘Bring Her Back’ During the film’s theatrical run, Bring Her Back earned $19.3 million domestically and nearly $19.8 million internationally for a worldwide box office tally of $39.1 million. Bring Her Back had a production budget of $17 million before prints and advertising, according to The Numbers.…
Share
BitcoinEthereumNews2025/09/18 09:23
Aave: Will launch Aave Shield feature, which will by default block redemptions where the price affects the transaction by more than 25%.

Aave: Will launch Aave Shield feature, which will by default block redemptions where the price affects the transaction by more than 25%.

PANews reported on March 15th that a user who exchanged $50 million worth of USDT for AAVE through the Aave interface on March 12th failed to notice slippage warnings
Share
PANews2026/03/15 09:47
Iranian official: Ukraine has become a legitimate target for Iranian strikes

Iranian official: Ukraine has become a legitimate target for Iranian strikes

PANews reported on March 15 that, according to Xinhua News Agency, Ibrahim Aziz, chairman of the Iranian Parliament's National Security and Foreign Policy Committee
Share
PANews2026/03/15 10:46