File tree Expand file tree Collapse file tree 3 files changed +10
-9
lines changed
Expand file tree Collapse file tree 3 files changed +10
-9
lines changed Original file line number Diff line number Diff line change @@ -450,4 +450,3 @@ mainchain.
450450
451451See [ Sidechain] ( #sidechain ) , [ Bellecour Sidechain] ( #bellecour-sidechain ) or
452452[ Minting] ( #minting ) for more information.
453-
Original file line number Diff line number Diff line change @@ -75,7 +75,8 @@ consensus on a given result. Two blog articles detail its logic:
7575
7676The
7777[ nominal workflow] ( https://github.com/iExecBlockchainComputing/iexec-doc/raw/master/techreport/nominalworkflow-ODB.png )
78- is also available in the [ technical report section] ( /get-started/overview/glossary )
78+ is also available in the
79+ [ technical report section] ( /get-started/overview/glossary )
7980
8081Below are the details of the implementations:
8182
Original file line number Diff line number Diff line change @@ -15,9 +15,9 @@ decentralized cloud.
1515
1616## What is Intel SGX?
1717
18- [ Intel® SGX] ( https://software.intel.com/en-us/sgx ) creates a special secure zone
19- in memory called an "enclave" - think of it as a vault that only the CPU can
20- access. Neither the operating system nor any other software can see what's
18+ [ Intel® SGX] ( https://software.intel.com/en-us/sgx ) creates a special secure
19+ zone in memory called an "enclave" - think of it as a vault that only the CPU
20+ can access. Neither the operating system nor any other software can see what's
2121happening inside this protected area. Your code and data are completely private
2222and secure.
2323
@@ -66,10 +66,11 @@ graph TB
6666
6767### SGX limitations
6868
69- With native Intel® SGX technology, the OS is not a part of the Trusted Computing
70- Base (TCB), hence system calls and kernel services are not available from an
71- Intel® SGX enclave. This can be limiting as the application will not be able to
72- use file system and sockets directly from the code running inside the enclave.
69+ With native Intel® SGX technology, the OS is not a part of the Trusted
70+ Computing Base (TCB), hence system calls and kernel services are not available
71+ from an Intel® SGX enclave. This can be limiting as the application will not be
72+ able to use file system and sockets directly from the code running inside the
73+ enclave.
7374
7475### iExec's SGX infrastructure
7576
You can’t perform that action at this time.
0 commit comments