Oyster
A confidential computing platform offering both CVM and Serverless options for secure, private computation in untrusted environments.
What is Oyster?
Oyster is a confidential computing platform built on top of the Marlin Protocol that provides developers with secure, private computation capabilities in untrusted environments.
It offers two primary deployment models: Oyster CVM (Confidential Virtual Machine) for dedicated computing instances, and Oyster Serverless for on-demand function execution.
Both options leverage Trusted Execution Environments (TEEs) to ensure that even the node operators cannot access the data or code being executed, providing strong privacy and security guarantees.
CVM
Serverless
Privacy
Deployment Options
Choose the right deployment model for your confidential computing needs
Oyster CVM
Confidential Virtual Machines allow dedicated computing instances to be rented individually for any amount of time, similar to traditional cloud providers but with the added security of TEEs.
Key Features
- ✓No execution time limits
- ✓Full Linux environment in a TEE
- ✓Dedicated CPU and memory resources
- ✓Flexible networking capabilities
- ✓Ideal for long-running applications
Oyster Serverless
Execute functions on-demand without managing instances. Pay only for execution time with automatic scaling and resource management, all with the security guarantees of TEEs.
Key Features
- ✓Zero fixed costs (pay-as-you-go)
- ✓JS or WASM sandbox in a TEE
- ✓Automatic horizontal scaling
- ✓Custom HTTP/HTTPS endpoints
- ✓Ideal for request-response workloads
Use Cases
Discover how Oyster can be applied to solve real-world problems
Secure Oracles
Build tamper-proof oracles that can access off-chain data and provide verifiable results to smart contracts.
Private DeFi
Execute sensitive financial computations off-chain while maintaining privacy and security for user data.
AI/ML Inference
Run machine learning models in a secure environment, protecting both the model and the input data.