Pavel Dorf, CEO of Telegram, recely announced the deceralized network Cocoon Officially launched on the TON blockchain platform. The project aims to end the dominance of ceralized gias like Amazon and Microsoft over AI infrastructure. Dorf believes that these companies have become expensive iermediaries that both drive up prices and violate users’ privacy. But what exactly is Cocoon and how does it work? In the following, you will get to know more about this network and its technical architecture.
What is Cocoon telegram network?
Simply put, Cocoon, an acronym Confideial Compute Open Network or “Confideial computing open network“, is a deceralized platform for running artificial ielligence models built on the TON blockchain. This network acts like a free market where two groups are connected:
- Hardware Owners: Those who have powerful servers and wa to re their processing power.
- Developers: Those who need processing power to run their AI applications but don’t wa to pay the exorbita costs of traditional cloud services.


The main difference between Cocoon and the competition is the use of “trusted execution environmes” (TEE). This technology ensures that the user’s data (for example, the question he asks the chatbot) is not visible even to the owner of the server and is processed completely encrypted.
Technical architecture of Cocoon Telegram network
To understand the security and efficiency of this network, we need to know its compones in more detail. Cocoon consists of three main compones (clie, proxy, and worker), all of which run in TEE protected environmes:
1. the clie
This part is a software library that runs on the developer side (for example, in Telegram’s backend infrastructure). Its task is to send artificial ielligence inference requests to the network and pay fees. Before sending any sensitive data, the clie checks the proxy’s security certificate to make sure it is connected to a secure node.
2. proxy
Proxies play the role of an iellige ierface and themselves run in a secure environme (TEE). The proxy takes the request from the clie and sends it to the most appropriate Worker based on the type of artificial ielligence model and network traffic. Currely, proxies are managed by the Cocoon team, but in the future, anyone can take on the role of proxy.
3. Worker
Workers are the main part of this network; In fact, these are the servers equipped with graphics cards (GPU) that do the actual processing. Workers run AI models inside a protected virtual machine (TEE). Due to the use of Iel TDX technology, even the physical owner of the server (Host) cannot access the model’s requests or responses.


In general, in the Cocoon network, when you ask an artificial ielligence (for example, “draw a picture of a cat” or “summarize this text”), your application (the clie) packages the question or request and sends it to a proxy to deliver it to the appropriate server.
Because there is no ceral bank or company to guaraee that you will pay later, you have to send the fee to do it right away (in TON cryptocurrency). The proxy keeps this money and only gives it to the server owner (Worker) when the work is done.
Security in Cocoon also goes beyond simple encryption; All communication between clie, proxy and worker is done through RA-TLS protocol. In this method, before establishing a connection, each party must provide a digital certificate to the other party to prove that it is running in a secure hardware environme (TEE) and that its software has not been tampered with.
Applications and advaages of the Cocoon network
If you own a data ceer or powerful servers, Cocoon is a golden opportunity to earn passive income. By becoming a Worker, you will receive TON cryptocurrency for every request you process. Of course, you need professional equipme to join this network:
- Linux operating system (Kernel 6.16 or higher for full TDX support).
- Processor with Iel TDX capability to create a reliable processing environme (5th generation Iel Xeon Scalable or Iel Xeon 6 processor is required to enable TDX).
- Nvidia graphics card with confideial processing capability such as H100 series and above.


However, why should AI application developers use Cocoon instead of Amazon and Microsoft? This platform has three advaages:
- If you’re building an app that deals with sensitive data (medical, financial, or personal), Cocoon is the only place you can guaraee users that their data won’t be seen by anyone (not even you or the cloud infrastructure).
- By removing iermediaries such as AWS and Azure and creating a competitive market between GPU suppliers, processing costs are greatly reduced.
- Paymes are made through the fast TON blockchain, which allows for the processing of millions of micro-requests.




