You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
<pclass="m-0 font-medium">Need help setting up or got some questions? Join our <atarget="_blank"href="https://discord.gg/6yrgRH6ATD">Discord Community</a> for support!</p>
<pclass="m-0! font-medium">Need help setting up or got some questions? Join our <atarget="_blank"href="https://discord.gg/6yrgRH6ATD">Discord Community</a> for support!</p>
<p>This is where <spanclass="text-fuchsia-700 font-semibold">iExec</span> comes in! We provide tools to easily add <spanclass="text-fuchsia-700 font-semibold">privacy</span> and <spanclass="text-fuchsia-700 font-semibold">monetization</span> features into your dApp.</p>
<pclass="m-0!">This is where <spanclass="text-fuchsia-700 font-semibold">iExec</span> comes in! We provide tools to easily add <spanclass="text-fuchsia-700 font-semibold">privacy</span> and <spanclass="text-fuchsia-700 font-semibold">monetization</span> features into your dApp.</p>
64
64
</div>
65
65
66
66
## 👷 How do we solve it?
@@ -75,8 +75,8 @@ Execution Environment (TEE)</a></span> and
<pclass="m-0!">Our technology allows users to control the <spanclass="text-fuchsia-700 font-semibold">ownership</span>,
80
80
<spanclass="text-fuchsia-700 font-semibold">confidentiality</span>, and <spanclass="text-fuchsia-700 font-semibold">monetization</span> of their data and digital assets within the <spanclass="text-fuchsia-700 font-semibold">Web3</span> ecosystem.</p>
81
81
</div>
82
82
@@ -103,8 +103,8 @@ iExec combines three fundamental elements that work together seamlessly:
103
103
- Regain ownership of your data
104
104
- Provides transparent governance rules for data access
<p>By merging <spanclass="text-fuchsia-700 font-semibold">blockchain technology</span> with <spanclass="text-fuchsia-700 font-semibold">confidential computing</span>, we've pioneered <spanclass="text-fuchsia-700 font-semibold"><atarget="_blank"href="https://www.iex.ec/academy/iexec-decentralized-confidential-computing">DeCC</a></span> (Decentralized Confidential Computing) to take <spanclass="text-fuchsia-700 font-semibold">privacy</span> and <spanclass="text-fuchsia-700 font-semibold">security</span> to the next level in <spanclass="text-fuchsia-700 font-semibold">Web3</span> ecosystems.</p>
<pclass="m-0!">By merging <spanclass="text-fuchsia-700 font-semibold">blockchain technology</span> with <spanclass="text-fuchsia-700 font-semibold">confidential computing</span>, we've pioneered <spanclass="text-fuchsia-700 font-semibold"><atarget="_blank"href="https://www.iex.ec/academy/iexec-decentralized-confidential-computing">DeCC</a></span> (Decentralized Confidential Computing) to take <spanclass="text-fuchsia-700 font-semibold">privacy</span> and <spanclass="text-fuchsia-700 font-semibold">security</span> to the next level in <spanclass="text-fuchsia-700 font-semibold">Web3</span> ecosystems.</p>
<p>In the next chapters, we'll follow Alice and Bob's journey step by step, starting with how Alice can <spanclass="text-fuchsia-700 font-semibold">protect her sensitive data</span> and then how Bob can <spanclass="text-fuchsia-700 font-semibold">build and deploy a confidential app</span> to process it.</p>
<pclass="m-0!">In the next chapters, we'll follow Alice and Bob's journey step by step, starting with how Alice can <spanclass="text-fuchsia-700 font-semibold">protect her sensitive data</span> and then how Bob can <spanclass="text-fuchsia-700 font-semibold">build and deploy a confidential app</span> to process it.</p>
Copy file name to clipboardExpand all lines: src/overview/helloWorld/2-protectData.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,8 +11,8 @@ import ProtectData from '../../modules/helloWorld/ProtectData.vue';
11
11
<p>Let's follow Alice as she learns how to protect her data using DataProtector on Bob's dApp, our developer tool for protecting data creation and management.</p>
<p><strong>Protected data</strong> is encrypted data that remains confidential throughout its entire lifecycle - during storage, transfer and processing.</p>
<pclass="m-0!"><strong>Protected data</strong> is encrypted data that remains confidential throughout its entire lifecycle - during storage, transfer and processing.</p>
16
16
</div>
17
17
18
18
## 🧩 DataProtector, key features
@@ -37,8 +37,8 @@ their dApps with these key features:
37
37
Features an SDK for easy integration into your DApp, enhancing functionality
<p> DataProtector interacts with iExec's <ahref="https://chainlist.org/?search=bellecour"target="_blank">Bellecour sidechain</a>, which is gasless, meaning you can use it completely free without needing any tokens!</p>
<pclass="m-0!">DataProtector interacts with iExec's <ahref="https://chainlist.org/?search=bellecour"target="_blank">Bellecour sidechain</a>, which is gasless, meaning you can use it completely free without needing any tokens!</p>
42
42
</div>
43
43
44
44
## 🧩 Let's create protected data
@@ -47,8 +47,8 @@ their dApps with these key features:
<p>Check out our <atarget="_blank"href="https://codesandbox.io/p/github/iExecBlockchainComputing/dataprotector-sandbox/main?file=%2Fsrc%2Fmain.tsx%3A18%2C7">code sandbox</a> for ready-to-use examples!</p>
<pclass="m-0!">Check out our <atarget="_blank"href="https://codesandbox.io/p/github/iExecBlockchainComputing/dataprotector-sandbox/main?file=%2Fsrc%2Fmain.tsx%3A18%2C7">code sandbox</a> for ready-to-use examples!</p>
<p>Don't worry! All secrets used in this tutorial stay on your machine and aren’t shared with anyone. You’ll only need them to run the <code>iApp run</code> command.</p>
<pclass="m-0!">Don't worry! All secrets used in this tutorial stay on your machine and aren’t shared with anyone. You’ll only need them to run the <code>iApp run</code> command.</p>
47
47
</div>
48
48
49
49
## 🚀 Types of iApps You Can Build
@@ -71,8 +71,8 @@ Transfer, sell or rent protected content to authorized users.
<p>These are just a few examples, the possibilities are endless. Want to explore iApp Generator? Check out our <ahref="../../tools/iapp-generator"target="_blank">documentation</a> and see what you can build!</p>
<pclass="m-0!">These are just a few examples, the possibilities are endless. Want to explore iApp Generator? Check out our <ahref="../../tools/iapp-generator"target="_blank">documentation</a> and see what you can build!</p>
76
76
</div>
77
77
78
78
## 💾 Installation (win / mac / linux)
@@ -158,8 +158,8 @@ You will be prompted with the following message:
<p>We recommend selecting <spanclass="text-fuchsia-700 font-semibold">"Hello World"</span> to quickly discover how iApp works! use <spanclass="text-fuchsia-700 font-semibold">advanced</span> only if you are familiar with iExec.</p>
<pclass="m-0!">We recommend selecting <spanclass="text-fuchsia-700 font-semibold">"Hello World"</span> to quickly discover how iApp works! use <spanclass="text-fuchsia-700 font-semibold">advanced</span> only if you are familiar with iExec.</p>
163
163
</div>
164
164
165
165
```txt
@@ -184,10 +184,10 @@ iapp test
184
184
185
185
It uses your local docker to build and execute the app.
<pclass="m-0!">- If you have <code>Error: Docker daemon is not accessible</code> Make sure Docker is installed and running.</p>
189
189
<br>
190
-
<p>- If you have <code>Error: Failed to locate iApp project root</code> error: Ensure you are in your project folder before proceeding.</p>
190
+
<pclass="m-0!">- If you have <code>Error: Failed to locate iApp project root</code> error: Ensure you are in your project folder before proceeding.</p>
191
191
</div>
192
192
193
193
You can see the output of the computation by saying yes to the question:
<p>🎉 Congratulations! You've successfully deployed and run your first iApp on iExec. This is a significant milestone - your application is now ready to securely process confidential data in a trusted environment.</p>
<pclass="m-0!">🎉 Congratulations! You've successfully deployed and run your first iApp on iExec. This is a significant milestone - your application is now ready to securely process confidential data in a trusted environment.</p>
0 commit comments