You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/use-iapp/getting-started.md
+32-13Lines changed: 32 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,14 +6,17 @@ description:
6
6
7
7
# 🚀 Getting Started with iApps
8
8
9
-
Welcome to the world of secure, privacy-preserving computation! This guide gives you a high-level overview of how to use iApps on the iExec network.
9
+
Welcome to the world of secure, privacy-preserving computation! This guide gives
10
+
you a high-level overview of how to use iApps on the iExec network.
10
11
11
12
## Prerequisites
12
13
13
14
Before you begin, make sure you have:
14
15
15
16
- A Web3 wallet (MetaMask, WalletConnect, etc.)
16
-
- Some RLC tokens for paying computation fees (or access to free vouchers through learning programs) - [Learn about RLC tokens](/overview/rlc) and [how to bridge them](/overview/tooling-and-explorers/bridge)
17
+
- Some RLC tokens for paying computation fees (or access to free vouchers
18
+
through learning programs) - [Learn about RLC tokens](/overview/rlc) and
19
+
[how to bridge them](/overview/tooling-and-explorers/bridge)
17
20
-**Note**: On Arbitrum, you'll need AETH (Arbitrum ETH) instead of RLC
18
21
- Basic understanding of blockchain transactions
19
22
- iExec SDK installed
@@ -44,33 +47,49 @@ Ready to dive in? Let's get started with finding and executing your first iApp!
44
47
45
48
Using iApps involves these main steps:
46
49
47
-
1.**Find iApps** - Browse available applications in the [iExec Explorer](/overview/tooling-and-explorers/iexec-explorer)
50
+
1.**Find iApps** - Browse available applications in the
2.**Prepare Data** - Set up any required protected data or inputs
49
53
3.**Execute** - Run the iApp
50
54
4.**Get Results** - Retrieve your computation results
51
55
52
56
### Understanding Orders
53
57
54
-
iApps are executed through a marketplace system where different actors publish orders:
58
+
iApps are executed through a marketplace system where different actors publish
59
+
orders:
60
+
55
61
-**App orders** - Published by developers with pricing and availability
56
-
-**Workerpool orders** - Published by computation providers with capacity and pricing
57
-
-**Dataset orders** - Published by data owners with access conditions and pricing
62
+
-**Workerpool orders** - Published by computation providers with capacity and
63
+
pricing
64
+
-**Dataset orders** - Published by data owners with access conditions and
65
+
pricing
58
66
59
-
When you execute an iApp, the system matches your request with available orders from all three categories. For a deeper understanding of how orders work and how to manage them, see the [Manage Orders guide](/build-iapp/guides/manage-access#manage-orders) in the Build iApp section.
67
+
When you execute an iApp, the system matches your request with available orders
68
+
from all three categories. For a deeper understanding of how orders work and how
69
+
to manage them, see the
70
+
[Manage Orders guide](/build-iapp/guides/manage-access#manage-orders) in the
71
+
Build iApp section.
60
72
61
73
## Detailed Guides
62
74
63
75
For step-by-step instructions, check out these guides:
64
76
65
-
-**[Find iApps](./guides/find-iapps.md)** - How to discover and evaluate available applications
66
-
-**[Different Ways to Execute](./guides/different-ways-to-execute.md)** - iExec cli, lib, and other execution methods
67
-
-**[Use iApps with Protected Data](./guides/use-iapp-with-protected-data.md)** - Working with sensitive data securely
68
-
-**[Add Inputs to Execution](./guides/add-inputs-to-execution.md)** - How to provide data and parameters to iApps
69
-
-**[How to Pay for Executions](./guides/how-to-pay-executions.md)** - Understanding costs and payment options
77
+
-**[Find iApps](./guides/find-iapps.md)** - How to discover and evaluate
78
+
available applications
79
+
-**[Different Ways to Execute](./guides/different-ways-to-execute.md)** - iExec
80
+
cli, lib, and other execution methods
81
+
-**[Use iApps with Protected Data](./guides/use-iapp-with-protected-data.md)** -
82
+
Working with sensitive data securely
83
+
-**[Add Inputs to Execution](./guides/add-inputs-to-execution.md)** - How to
84
+
provide data and parameters to iApps
85
+
-**[How to Pay for Executions](./guides/how-to-pay-executions.md)** -
86
+
Understanding costs and payment options
70
87
71
88
## Quick Start
72
89
73
-
Ready to jump in? Start with our [Find iApps guide](./guides/find-iapps.md) to discover what's available, then follow the execution guides for detailed instructions.
90
+
Ready to jump in? Start with our [Find iApps guide](./guides/find-iapps.md) to
91
+
discover what's available, then follow the execution guides for detailed
Copy file name to clipboardExpand all lines: src/use-iapp/guides/find-iapps.md
+7-3Lines changed: 7 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,8 +11,10 @@ available iApps on the iExec network.
11
11
12
12
## Using the iExec Explorer
13
13
14
-
The [iExec Explorer](/overview/tooling-and-explorers/iexec-explorer) is the primary tool for
15
-
discovering iApps. For detailed instructions on how to browse and filter iApps, see the [📱 iApps Listing section](/overview/tooling-and-explorers/iexec-explorer#📱-iapps-listing).
14
+
The [iExec Explorer](/overview/tooling-and-explorers/iexec-explorer) is the
15
+
primary tool for discovering iApps. For detailed instructions on how to browse
@@ -23,7 +25,9 @@ When evaluating an iApp, check these key details:
23
25
-**Usage Statistics**: How often is it used?
24
26
-**Orders Availability**: Are there active orders available for execution?
25
27
26
-
> **Note**: Detailed descriptions and specific requirements are not available in the iExec explorer. You may need to check the developer's documentation, community forums, or contact the developer directly for this information.
28
+
> **Note**: Detailed descriptions and specific requirements are not available in
29
+
> the iExec explorer. You may need to check the developer's documentation,
30
+
> community forums, or contact the developer directly for this information.
Copy file name to clipboardExpand all lines: src/use-iapp/introduction.md
+35-16Lines changed: 35 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,39 +7,52 @@ description:
7
7
8
8
# 📝 Introduction to Using iApps
9
9
10
-
In the iExec network, multiple actors work together in a coordinated process to ensure secure, decentralized computation. Here's how the ecosystem operates:
10
+
In the iExec network, multiple actors work together in a coordinated process to
11
+
ensure secure, decentralized computation. Here's how the ecosystem operates:
11
12
12
13
### Key Actors in the Network
13
14
14
15
-**👤 Requesters**: Users who need computation performed on protected data
15
-
-**🏭 Workerpool Managers**: Operators who manage groups of workers and coordinate task execution
16
+
-**🏭 Workerpool Managers**: Operators who manage groups of workers and
17
+
coordinate task execution
16
18
-**⚙️ Workers**: Individual machines that execute the actual computations
17
-
-**👨💻 iApp Developers**: Developers who create and deploy applications to the iExec marketplace
19
+
-**👨💻 iApp Developers**: Developers who create and deploy applications to the
20
+
iExec marketplace
18
21
-**🔐 Data Providers**: Users who own and protect the data being processed
19
22
20
23
### Network Assets
21
24
22
25
-**📱 iApps**: Applications that process the data securely
23
26
-**💾 Data**: Protected information that needs to be processed
24
27
-**⚡ Computational Power**: Processing resources provided by workers
25
-
-**💰 PoCo**: Proof of Contribution system that matches all actors through marketplace
28
+
-**💰 PoCo**: Proof of Contribution system that matches all actors through
29
+
marketplace
26
30
27
31
### Network Coordination
28
32
29
-
The iExec network coordinates all actors through the PoCo (Proof of Contribution) system, which automatically matches requesters with the appropriate applications, data, and computational resources based on availability, requirements, and pricing.
33
+
The iExec network coordinates all actors through the PoCo (Proof of
34
+
Contribution) system, which automatically matches requesters with the
35
+
appropriate applications, data, and computational resources based on
36
+
availability, requirements, and pricing.
30
37
31
38
### Deal Execution Flow
32
39
33
40
When a deal is triggered, the following sequence occurs:
34
41
35
42
1.**Request Creation**: Requester submits a computation request with parameters
36
-
2.**Resource Matching**: PoCo system matches the request with available applications, data, and computational resources
37
-
3.**Deal Creation**: When compatible resources are found, a deal is created containing multiple tasks
38
-
4.**Task Distribution**: Selected workerpool manager distributes tasks to their workers
39
-
5.**Secure Execution**: Workers download the iApp and execute it in TEE environments
40
-
6.**Data Processing**: iApp processes protected data without accessing raw content
43
+
2.**Resource Matching**: PoCo system matches the request with available
44
+
applications, data, and computational resources
45
+
3.**Deal Creation**: When compatible resources are found, a deal is created
46
+
containing multiple tasks
47
+
4.**Task Distribution**: Selected workerpool manager distributes tasks to their
48
+
workers
49
+
5.**Secure Execution**: Workers download the iApp and execute it in TEE
50
+
environments
51
+
6.**Data Processing**: iApp processes protected data without accessing raw
52
+
content
41
53
7.**Result Generation**: Computation results are generated
42
-
8.**Result Delivery**: Results are returned to the requester through the network
54
+
8.**Result Delivery**: Results are returned to the requester through the
55
+
network
43
56
9.**Payment Settlement**: RLC tokens are distributed to all participants
44
57
45
58
### Network Architecture Diagram
@@ -48,15 +61,21 @@ When a deal is triggered, the following sequence occurs:
48
61
49
62
### Detailed Interaction Flow
50
63
51
-
1.**Request Submission**: Requester creates a request specifying the iApp, Protected Data, etc.
64
+
1.**Request Submission**: Requester creates a request specifying the iApp,
65
+
Protected Data, etc.
52
66
2.**PoCo Processing**: PoCo system validates the request and matches resources
53
67
3.**Deal Creation**: When resources are matched, PoCo creates a deal
54
-
4.**Secure Environment Setup**: Workers initialize TEE environments and download the iApp
55
-
5.**Data Access**: iApp requests access to protected data through secure channels
68
+
4.**Secure Environment Setup**: Workers initialize TEE environments and
69
+
download the iApp
70
+
5.**Data Access**: iApp requests access to protected data through secure
71
+
channels
56
72
6.**Computation**: iApp processes data within the TEE, maintaining privacy
57
-
7.**Payment Distribution**: RLC tokens are distributed to all participants based on completed tasks
73
+
7.**Payment Distribution**: RLC tokens are distributed to all participants
74
+
based on completed tasks
58
75
59
-
This decentralized architecture ensures that no single entity has control over the entire process, while the use of TEEs guarantees that sensitive data remains protected throughout the computation.
76
+
This decentralized architecture ensures that no single entity has control over
77
+
the entire process, while the use of TEEs guarantees that sensitive data remains
0 commit comments