diff --git a/src/get-started/helloWorld/1-overview.md b/src/get-started/helloWorld/1-overview.md index 692adc8..01264e9 100644 --- a/src/get-started/helloWorld/1-overview.md +++ b/src/get-started/helloWorld/1-overview.md @@ -11,13 +11,13 @@ description: > Reading time ๐Ÿ•’ 8 min
-

Let's start with the basics

-

and explore how iExec can help you build Privacy-preserving applications and securely manage sensitive data.

+

Start with the basics

+

and explore how iExec can help you build Privacy-preserving apps and securely manage sensitive data.

## ๐Ÿ‘จโ€๐Ÿ’ป Building Privacy-preserving iApp with iExec -

Imagine you're building a decentralized application (iApp) that needs to handle sensitive user data, for example:

+

Imagine you're building a decentralized app (dApp) that needs to handle sensitive user data, for example:

@@ -60,7 +60,7 @@ description:
-

This is where iExec comes in! We provide tools to easily add privacy and monetization features into your iApp.

+

This is where iExec comes in. iExec provides tools to easily add privacy and monetization features into your iApp.

## ๐Ÿ‘ท How do we Solve it? @@ -76,7 +76,7 @@ Execution Environment (TEE) and Computing technologies.
-

Our technology allows users to control the ownership, +

The technology allows users to control the ownership, confidentiality, and monetization of their data and digital assets within the Web3 ecosystem.

@@ -104,7 +104,7 @@ iExec combines three fundamental elements that work together seamlessly: - Provides transparent governance rules for data access
-

By merging blockchain technology with confidential computing, we've pioneered DeCC (Decentralized Confidential Computing) to take privacy and security to the next level in Web3 ecosystems.

+

By merging blockchain technology with confidential computing, iExec pioneered DeCC (Decentralized Confidential Computing) to take privacy and security to the next level in Web3 ecosystems.

### ๐Ÿงธ DeCC Explained Like You're 5 @@ -174,10 +174,10 @@ And many other use cases...
๐Ÿ”Œ -

Wide Application: From AI to finance, enabling confidential data processing across various industries

+

Wide application: From AI to finance, enabling confidential data processing across various industries

-

Now that you understand the fundamentals, let's dive into protecting your first piece of data! With Alice!

+

Now that you understand the fundamentals, dive into protecting your first data with Alice.

diff --git a/src/get-started/helloWorld/2-protectData.md b/src/get-started/helloWorld/2-protectData.md index 8c2d752..a167ef0 100644 --- a/src/get-started/helloWorld/2-protectData.md +++ b/src/get-started/helloWorld/2-protectData.md @@ -1,5 +1,5 @@ --- -title: Let's Protect Data +title: Protect Data description: Learn how to protect your data using iExec's DataProtector SDK in this hands-on tutorial step. @@ -9,17 +9,17 @@ description: import ProtectData from '@/modules/helloWorld/ProtectData.vue'; -# ๐Ÿ›ก๏ธ Let's Protect Data +# ๐Ÿ›ก๏ธ Protect Data > Reading time: 6 minutes

Time to get practical

-

Let's follow Alice as she learns how to protect her data using DataProtector on Bob's iApp, our developer tool for protecting data creation and management.

+

Follow Alice as she learns how to protect her data using DataProtector on Bob's dApp, the developer tool for protecting data creation and management.

-

Protected data is encrypted data that remains confidential throughout its entire lifecycle - during storage, transfer and processing.

+

Protected data refers to encrypted data that remains confidential throughout its entire lifecycle - during storage, transfer and processing.

## ๐Ÿงฉ DataProtector, Key Features @@ -45,7 +45,7 @@ their DApp with these key features: Features an SDK for easy integration into your DApp, enhancing functionality and user experience. -## ๐Ÿงฉ Let's Create Protected Data +## ๐Ÿงฉ Create protected data @@ -77,12 +77,12 @@ const { address: protectedDataAddress } = await dataProtectorCore.protectData({ For this tutorial, you can try out the code directly in our interactive CodeSandbox demo -[here](https://codesandbox.io/p/github/iExecBlockchainComputing/dataprotector-sandbox/main?file=%2Fsrc%2FApp.tsx&preventWorkspaceRedirect=true). +[try the interactive DataProtector sandbox](https://codesandbox.io/p/github/iExecBlockchainComputing/dataprotector-sandbox/main?file=%2Fsrc%2FApp.tsx&preventWorkspaceRedirect=true). Here's a quick overview of what happened when you clicked the **Protect Data** button: -![alt](/assets/hello-world/dataprotector_light.png){.light-only} -![alt](/assets/hello-world/dataprotector_dark.png){.dark-only} +![DataProtector workflow diagram showing the 4-step process: SDK called, data encrypted with symmetric key, protected data address returned to user, and protected data encrypted and stored on decentralized storage](/assets/hello-world/dataprotector_light.png){.light-only} +![DataProtector workflow diagram showing the 4-step process: SDK called, data encrypted with symmetric key, protected data address returned to user, and protected data encrypted and stored on decentralized storage](/assets/hello-world/dataprotector_dark.png){.dark-only}
@@ -91,7 +91,7 @@ button:
2 - The data is encrypted with a symmetric key + DataProtector encrypts the data with a symmetric key
3 @@ -107,7 +107,7 @@ button:
6 - The protected data address is returned to the user + The system returns the protected data address to the user
@@ -177,7 +177,9 @@ const { address: protectedDataAddress } = await dataProtectorCore.protectData({ - ๐Ÿ”’ **DataProtector** ensures data protection, management, and confidentiality -- ๐Ÿ“ฆ **Protected Data** is encrypted and stored on decentralized storage +- ๐Ÿ“ฆ **Protected Data** - DataProtector encrypts and stores data on + decentralized storage such as [ar.io](https://ar.io) or + [IPFS](https://ipfs.io) - โ›“๏ธ **Ownership** iExec's protocol writes ownership on the blockchain and links it to your wallet @@ -185,5 +187,5 @@ const { address: protectedDataAddress } = await dataProtectorCore.protectData({ - ๐Ÿ”Œ **Integration** is simple with our developer tools
-

In the next chapter, we'll show you how to build, deploy, and run an iApp to process your protected data. Let's go! ๐Ÿš€

+

In the next chapter, learn how to build, deploy, and run an iApp to process your protected data.

diff --git a/src/get-started/helloWorld/3-buildIApp.md b/src/get-started/helloWorld/3-buildIApp.md index 32da000..c571efb 100644 --- a/src/get-started/helloWorld/3-buildIApp.md +++ b/src/get-started/helloWorld/3-buildIApp.md @@ -5,18 +5,18 @@ description: processing protected data in this comprehensive tutorial. --- -# ๐Ÿ› ๏ธ Build and Deploy your First iApp +# ๐Ÿ› ๏ธ Build and deploy your first iApp > Reading time ๐Ÿ•’ 10 min
-

Time to build!

-

Let's build an iApp that can process protected data in a secure environment using the iExec iApp generator tool. This tool helps you create, test and deploy iApp with just a few commands.

+

Time to build

+

Build an iApp that can process protected data in a secure environment using the iExec iApp generator tool. This tool helps you create, test, and deploy iApp with just a few commands.

-If you wanna explore and deep dive in the CLI. You can check the -[iApp-CLI](https://github.com/iExecBlockchainComputing/iapp/tree/main/cli) -github repository. Follow the instructions carefully for a smooth development +If you wanna explore and deep dive in the command-line tool. You can check the +[iApp Generator ](https://github.com/iExecBlockchainComputing/iapp/tree/main/cli) +GitHub repository. Follow the instructions carefully for a smooth development experience. ## ๐Ÿ“‹ Prerequisites @@ -46,29 +46,29 @@ Before getting started, make sure you have:
-

Don't worry! All secrets used in this tutorial stay on your machine and arenโ€™t shared with anyone. Youโ€™ll only need them to run the iapp run command.

+

Don't worry. All secrets used in this tutorial stay on your machine and aren't shared with anyone. You'll only need them to run the iapp run command.

-## ๐Ÿš€ Types of iApp you Can Build +## ๐Ÿš€ Types of iApp you can build iExec enables you to build various types of Privacy-preserving applications. Here are some popular use cases: -### ๐Ÿ“ง Web3 Mail +### ๐Ÿ“ง Web3Mail Send privacy-preserving emails to registered Ethereum account holders without knowing or storing their email addresses. [Github](https://github.com/iExecBlockchainComputing/web3mail-sdk/tree/main/dapp) | [Documentation](/references/web3mail) -### ๐Ÿ’ฌ Web3 Telegram +### ๐Ÿ’ฌ Web3Telegram Send privacy-preserving Telegram messages without knowing or storing their Telegram handles. [Github](https://github.com/iExecBlockchainComputing/web3telegram-sdk/tree/main/dapp) | [Documentation](/references/web3telegram) -### ๐ŸŒ Content Delivery +### ๐ŸŒ Content delivery Transfer, sell or rent protected content to authorized users. [Github](https://github.com/iExecBlockchainComputing/dataprotector-sdk/tree/main/packages/protected-data-delivery-dapp) @@ -171,7 +171,7 @@ You will be prompted with the following message: '๐Ÿณ Added Dockerfile', 'โš™๏ธ Added iExec configuration' ]" - :successMessage="'Your iApp is ready!'" + :successMessage="'Your iApp is ready'" />
@@ -196,7 +196,7 @@ You will be prompted with the following message:
-

We recommend selecting "Hello World" to quickly discover how iApp works! use advanced only if you are familiar with iExec.

+

We recommend selecting "Hello World" to quickly discover how iApp works. Use advanced only if you are familiar with iExec.

- An iApp project is setup with the selected language @@ -288,7 +288,7 @@ simulating how it will run in the iExec network's TEE environment.

- If you get Error: Failed to locate iApp project root: Ensure you are in your project folder before proceeding.

-### ๐Ÿงฉ Using Arguments +### ๐Ÿงฉ Using arguments You can pass arguments to your iApp using the `--args` option. This allows you to provide necessary inputs during runtime (you can use your name for example). @@ -297,7 +297,7 @@ to provide necessary inputs during runtime (you can use your name for example). iapp test --args your-name ``` -### ๐Ÿ”’ Using Protected Data +### ๐Ÿ”’ Using protected data You can pass a protectedData that you are authorized to process to your iApp using the `--protectedData` option. @@ -370,7 +370,7 @@ Once you have your token, you can deploy your iApp.
-

๐Ÿ“ Make sure to save your iApp address after deployment - you'll need it later!

+

๐Ÿ“ Make sure to save your iApp address after deployment - you'll need it later.

You can find your iApp address in the iexec-app.json file in your project folder.


โš ๏ธ If you encounter issues during deployment, make sure the Docker BuildKit feature is enabled and supports AMD64 architecture:

@@ -401,7 +401,7 @@ allowing it to run securely in a **Trusted Execution Environment (TEE)** for

๐ŸŽ‰ Congratulations! You've successfully deployed and run your first iApp on iExec. This is a significant milestone - your application is now ready to securely process confidential data in a trusted environment.

-## ๐ŸŽฏ Key Takeaways +## ๐ŸŽฏ Key takeaways - ๐Ÿ”’ **iApp:** Special applications that run in TEEs to process protected data - ๐Ÿ› ๏ธ **iApp CLI:** Command-line tool for building, testing, and deploying iApp @@ -410,7 +410,7 @@ allowing it to run securely in a **Trusted Execution Environment (TEE)** for environments
-

Next up: Alice will learn how to authorize the iApp and Bob to access and use her protected data! ๐Ÿš€

+

Next up: Alice will learn how to authorize the iApp and Bob to access and use her protected data.