You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
<pclass="m-0!">This is where <spanclass="text-fuchsia-700 font-semibold">iExec</span> comes in! We provide tools to easily add <spanclass="text-fuchsia-700 font-semibold">privacy</span> and <spanclass="text-fuchsia-700 font-semibold">monetization</span> features into your iApp.</p>
63
+
<pclass="m-0!">This is where <spanclass="text-fuchsia-700 font-semibold">iExec</span> comes in. iExec provides tools to easily add <spanclass="text-fuchsia-700 font-semibold">privacy</span> and <spanclass="text-fuchsia-700 font-semibold">monetization</span> features into your iApp.</p>
64
64
</div>
65
65
66
66
## 👷 How do we Solve it?
@@ -76,7 +76,7 @@ Execution Environment (TEE)</a></span> and
<pclass="m-0!">Our technology allows users to control the <spanclass="text-fuchsia-700 font-semibold">ownership</span>,
79
+
<pclass="m-0!">The technology allows users to control the <spanclass="text-fuchsia-700 font-semibold">ownership</span>,
80
80
<spanclass="text-fuchsia-700 font-semibold">confidentiality</span>, and <spanclass="text-fuchsia-700 font-semibold">monetization</span> of their data and digital assets within the <spanclass="text-fuchsia-700 font-semibold">Web3</span> ecosystem.</p>
81
81
</div>
82
82
@@ -104,7 +104,7 @@ iExec combines three fundamental elements that work together seamlessly:
104
104
- Provides transparent governance rules for data access
<pclass="m-0!">By merging <spanclass="text-fuchsia-700 font-semibold">blockchain technology</span> with <spanclass="text-fuchsia-700 font-semibold">confidential computing</span>, we've pioneered <spanclass="text-fuchsia-700 font-semibold"><atarget="_blank"href="https://www.iex.ec/academy/iexec-decentralized-confidential-computing">DeCC</a></span> (Decentralized Confidential Computing) to take <spanclass="text-fuchsia-700 font-semibold">privacy</span> and <spanclass="text-fuchsia-700 font-semibold">security</span> to the next level in <spanclass="text-fuchsia-700 font-semibold">Web3</span> ecosystems.</p>
107
+
<pclass="m-0!">By merging <spanclass="text-fuchsia-700 font-semibold">blockchain technology</span> with <spanclass="text-fuchsia-700 font-semibold">confidential computing</span>, iExec pioneered <spanclass="text-fuchsia-700 font-semibold"><atarget="_blank"href="https://www.iex.ec/academy/iexec-decentralized-confidential-computing">DeCC</a></span> (Decentralized Confidential Computing) to take <spanclass="text-fuchsia-700 font-semibold">privacy</span> and <spanclass="text-fuchsia-700 font-semibold">security</span> to the next level in <spanclass="text-fuchsia-700 font-semibold">Web3</span> ecosystems.</p>
108
108
</div>
109
109
110
110
### 🧸 DeCC Explained Like You're 5
@@ -174,10 +174,10 @@ And many other use cases...
174
174
</div>
175
175
<divclass="flex items-center gap-3">
176
176
<span class="text-xl">🔌</span>
177
-
<p class="m-0"><strong>Wide Application:</strong> From AI to finance, enabling confidential data processing across various industries</p>
177
+
<p class="m-0"><strong>Wide application:</strong> From AI to finance, enabling confidential data processing across various industries</p>
<h2class="text-2xl font-bold mt-0 border-none!">Time to get practical</h2>
18
-
<p>Let's follow Alice as she learns how to protect her data using DataProtector on Bob's iApp, our developer tool for protecting data creation and management.</p>
18
+
<p>Follow Alice as she learns how to protect her data using DataProtector on Bob's iApp, the developer tool for protecting data creation and management.</p>
<pclass="m-0!"><strong>Protected data</strong> is encrypted data that remains confidential throughout its entire lifecycle - during storage, transfer and processing.</p>
22
+
<pclass="m-0!"><strong>Protected data</strong> refers to encrypted data that remains confidential throughout its entire lifecycle - during storage, transfer and processing.</p>
23
23
</div>
24
24
25
25
## 🧩 DataProtector, Key Features
@@ -45,7 +45,7 @@ their DApp with these key features:
45
45
Features an SDK for easy integration into your DApp, enhancing functionality
[try the interactive DataProtector sandbox](https://codesandbox.io/p/github/iExecBlockchainComputing/dataprotector-sandbox/main?file=%2Fsrc%2FApp.tsx&preventWorkspaceRedirect=true).
81
81
Here's a quick overview of what happened when you clicked the **Protect Data**
{.light-only}
85
+
{.dark-only}
<h2class="text-2xl font-bold mt-0 border-none!">Time to build!</h2>
14
-
<p>Let's build an iApp that can process protected data in a secure environment using the <ahref="/references/iapp-generator"target="_blank"class="!text-gray-900 !font-bold underline hover:!text-black">iExec iApp generator tool</a>. This tool helps you create, test and deploy iApp with just a few commands.</p>
13
+
<h2class="text-2xl font-bold mt-0 border-none!">Time to build</h2>
14
+
<p>Build an iApp that can process protected data in a secure environment using the <ahref="/references/iapp-generator"target="_blank"class="!text-gray-900 !font-bold underline hover:!text-black">iExec iApp generator tool</a>. This tool helps you create, test, and deploy iApp with just a few commands.</p>
15
15
</div>
16
16
17
-
If you wanna explore and deep dive in the CLI. You can check the
<pclass="m-0!">Don't worry! All secrets used in this tutorial stay on your machine and aren’t shared with anyone. You’ll only need them to run the <code>iapp run</code> command.</p>
49
+
<pclass="m-0!">Don't worry. All secrets used in this tutorial stay on your machine and aren't shared with anyone. You'll only need them to run the <code>iapp run</code> command.</p>
50
50
</div>
51
51
52
-
## 🚀 Types of iApp you Can Build
52
+
## 🚀 Types of iApp you can build
53
53
54
54
iExec enables you to build various types of Privacy-preserving applications.
55
55
Here are some popular use cases:
56
56
57
-
### 📧 Web3 Mail
57
+
### 📧 Web3 mail
58
58
59
59
Send privacy-preserving emails to registered Ethereum account holders without
<pclass="m-0!">We recommend selecting <spanclass="text-fuchsia-700 font-semibold">"Hello World"</span> to quickly discover how iApp works! use <spanclass="text-fuchsia-700 font-semibold">advanced</span> only if you are familiar with iExec.</p>
199
+
<pclass="m-0!">We recommend selecting <spanclass="text-fuchsia-700 font-semibold">"Hello World"</span> to quickly discover how iApp works. Use <spanclass="text-fuchsia-700 font-semibold">advanced</span> only if you are familiar with iExec.</p>
200
200
</div>
201
201
202
202
- An iApp project is setup with the selected language
@@ -288,7 +288,7 @@ simulating how it will run in the iExec network's TEE environment.
288
288
<pclass="m-0!">- If you get <code>Error: Failed to locate iApp project root</code>: Ensure you are in your project folder before proceeding.</p>
289
289
</div>
290
290
291
-
### 🧩 Using Arguments
291
+
### 🧩 Using arguments
292
292
293
293
You can pass arguments to your iApp using the `--args` option. This allows you
294
294
to provide necessary inputs during runtime (you can use your name for example).
@@ -297,7 +297,7 @@ to provide necessary inputs during runtime (you can use your name for example).
297
297
iapp test --args your-name
298
298
```
299
299
300
-
### 🔒 Using Protected Data
300
+
### 🔒 Using protected data
301
301
302
302
You can pass a protectedData that you are authorized to process to your iApp
303
303
using the `--protectedData` option.
@@ -370,7 +370,7 @@ Once you have your token, you can deploy your iApp.
<pclass="m-0!">📝 Make sure to save your <spanclass="text-fuchsia-700 font-semibold">iApp address</span> after deployment - you'll need it later!</p>
373
+
<pclass="m-0!">📝 Make sure to save your <spanclass="text-fuchsia-700 font-semibold">iApp address</span> after deployment - you'll need it later.</p>
374
374
<pclass="m-0!">You can find your iApp address in the <code>iexec-app.json</code> file in your project folder.</p>
375
375
<br>
376
376
<pclass="m-0!">⚠️ If you encounter issues during deployment, make sure the Docker BuildKit feature is enabled and supports AMD64 architecture:</p>
@@ -401,7 +401,7 @@ allowing it to run securely in a **Trusted Execution Environment (TEE)** for
401
401
<pclass="m-0!">🎉 Congratulations! You've successfully deployed and run your first iApp on iExec. This is a significant milestone - your application is now ready to securely process confidential data in a trusted environment.</p>
402
402
</div>
403
403
404
-
## 🎯 Key Takeaways
404
+
## 🎯 Key takeaways
405
405
406
406
- 🔒 **iApp:** Special applications that run in TEEs to process protected data
407
407
- 🛠️ **iApp CLI:** Command-line tool for building, testing, and deploying iApp
@@ -410,7 +410,7 @@ allowing it to run securely in a **Trusted Execution Environment (TEE)** for
Copy file name to clipboardExpand all lines: src/get-started/overview/protected-data.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ description:
6
6
controls, and secure data monetization.
7
7
---
8
8
9
-
# Protected Data
9
+
# Protected data
10
10
11
11
Protected Data refers to any data encrypted using the **iExec Data Protector
12
12
tool**. This Turnkey Privacy encryption solution enables users to protect,
@@ -16,9 +16,9 @@ manage and monetize their data within the Web3 ecosystem effortlessly.
16
16
<pclass="m-0!">Unlike standard datasets, Protected Data exposes its <spanclass="text-fuchsia-700 font-semibold">data types on-chain</span> (indicating types like email addresses or photos). This lets anyone <spanclass="text-fuchsia-700 font-semibold">identify entries with matching types</span>.</p>
17
17
</div>
18
18
19
-
## Key Concepts
19
+
## Key concepts
20
20
21
-
### Data Governance
21
+
### Data governance
22
22
23
23
<divclass="mb-4"></div>
24
24
@@ -112,7 +112,7 @@ manage and monetize their data within the Web3 ecosystem effortlessly.
@@ -188,7 +188,7 @@ manage and monetize their data within the Web3 ecosystem effortlessly.
188
188
<pclass="m-0!">Ready to protect your data? Start with our <spanclass="text-green-700 font-semibold">DataProtector guides</span>. Learn how to secure sensitive information while unlocking its value.</p>
0 commit comments