File tree Expand file tree Collapse file tree 1 file changed +6
-5
lines changed
Expand file tree Collapse file tree 1 file changed +6
-5
lines changed Original file line number Diff line number Diff line change 11---
2- title : Why iExec
2+ title : About iExec
33description :
44 Discover how iExec empowers developers to build privacy-first applications
55---
66
7- # 💡 Why iExec
7+ # 💡 About iExec
88
9- ## Why We Exist
9+ ## Why iExec?
1010
1111In a world where data privacy is increasingly critical, developers need better
1212tools to protect user information while building innovative applications. We
@@ -33,8 +33,9 @@ Ready-to-use components to protect sensitive data and computation:
3333
3434- ** DataProtector** : Secure and control access to sensitive information
3535- ** iApp Generator** : Create privacy-preserving applications in minutes
36- - ** Confidential Computing** : Process data in secure enclaves with TEE
37- technology
36+ - ** Decentralized Confidential Computing** : Process data securely in secure and
37+ confidential environments while controlling access and monetization through
38+ blockchain
3839
3940### Real-World Applications
4041
You can’t perform that action at this time.
0 commit comments