Nillion Network has recently introduced a Petnet Node in collaboration with CloudicianTech. This initiative marks a significant milestone in the expansion of Nillion Network’s privacy-centric infrastructure. Petnet operates on Multi-Party Computation (MPC), a departure from traditional blockchain systems, allowing for data computation without exposing the original content.
We are thrilled to contribute to the advancement of blind computation through the operation of a Petnet Node on the @nillionnetwork with @CloudicianTech.
Unlike conventional blockchain networks, Petnet utilizes Multi-Party Computation (MPC), enabling data processing without disclosing the underlying information… pic.twitter.com/QBNl9XBOTM
— Alibaba Cloud (@alibaba_cloud) June 12, 2025
Petnet is designed for privacy-preserving computation, employing encrypted data fragments processed securely with Nillion’s nilDB and nilCC modules. This approach ensures end-to-end data protection, with the fragments never exposed in plaintext beyond the Trusted Execution Environment (TEE).
Enterprise Cluster Boosts Infrastructure Integrity
Nillion has established a strategic Enterprise Cluster to further bolster the reliability of its network. Key contributors in this consortium include STC Bahrain, Cloudician by Alibaba Cloud, Pairpoint by Vodafone, and Deutsche Telekom. These entities play vital roles in infrastructure development, operational accountability, and global accessibility.
The collaboration between Nillion and Alibaba Cloud fosters a foundation of verifiable trust in node operations, crucial for network scalability and security. These partners assist Petnet in real-time use case testing and infrastructure deployment to pave the way for privacy-centric products.
Privacy Applications Across Major Industries
The deployment of nodes operated by enterprises enables blind computation, unlocking new capabilities in various sectors. Telecom operators can derive insights from user data without compromising privacy, while banks can conduct encrypted risk management and fraud analysis. In the healthcare sector, sensitive research collaborations are feasible without the need to transfer or expose personal data.
This collaborative effort promotes privacy through architectural implementation rather than policy enforcement. Petnet infrastructure can be deployed in a modular fashion, with customizable configurations allowing developers to address jurisdictional, compliance, and performance requirements.