|
1 | 1 | --- |
2 | | -title: What We Do |
3 | | -description: Discover iExec's decentralized computing platform |
| 2 | +title: Why iExec |
| 3 | +description: |
| 4 | + Discover how iExec empowers developers to build privacy-first applications |
4 | 5 | --- |
5 | 6 |
|
6 | | -# 💡 What We Do |
| 7 | +# 💡 Why iExec |
7 | 8 |
|
8 | | -iExec is a decentralized marketplace for computing resources. We enable |
9 | | -developers to build applications that combine **ownership**, **privacy**, and |
10 | | -**monetization**. |
| 9 | +## Why We Exist |
11 | 10 |
|
12 | | -## Our Mission |
| 11 | +In a world where data privacy is increasingly critical, developers need better |
| 12 | +tools to protect user information while building innovative applications. We |
| 13 | +believe privacy should be a fundamental right, not an afterthought. |
13 | 14 |
|
14 | | -We believe in a future where: |
| 15 | +## How We Make It Happen |
15 | 16 |
|
16 | | -- Data owners maintain control over their information |
17 | | -- Developers can access powerful computing resources on-demand |
18 | | -- Privacy is preserved through trusted execution environments |
19 | | -- Anyone can monetize their data and computing power |
| 17 | +iExec provides a complete toolkit that makes privacy simple and actionable: |
20 | 18 |
|
21 | | -## Key Technologies |
| 19 | +- **Plug & Play Privacy**: Integrate confidentiality features without managing |
| 20 | + complex infrastructure |
| 21 | +- **Programmable Data Control**: Define who can access data, when, and how - all |
| 22 | + through simple tools |
| 23 | +- **Native Interoperability**: Build once, deploy anywhere with EVM |
| 24 | + compatibility |
| 25 | +- **Developer-First Experience**: Focus on building your application, not |
| 26 | + privacy plumbing |
22 | 27 |
|
23 | | -### Protected Data |
| 28 | +## What We Offer |
24 | 29 |
|
25 | | -Secure your data while maintaining control over who can access and use it. |
| 30 | +### Privacy Tools |
26 | 31 |
|
27 | | -### iApps (iExec Applications) |
| 32 | +Ready-to-use components to protect sensitive data and computation: |
28 | 33 |
|
29 | | -Decentralized applications that run on the iExec network, ensuring privacy and |
30 | | -verifiability. |
| 34 | +- **DataProtector**: Secure and control access to sensitive information |
| 35 | +- **iApp Generator**: Create privacy-preserving applications in minutes |
| 36 | +- **Confidential Computing**: Process data in secure enclaves with TEE |
| 37 | + technology |
31 | 38 |
|
32 | | -### Trusted Execution Environments (TEE) |
| 39 | +### Real-World Applications |
33 | 40 |
|
34 | | -Computing in secure enclaves that guarantee privacy and integrity. |
| 41 | +Our tools power privacy-critical use cases like: |
35 | 42 |
|
36 | | -## Get Started |
| 43 | +- Private AI model training and inference |
| 44 | +- Confidential DeFi operations |
| 45 | +- Protected healthcare data processing |
| 46 | +- Secure research computations |
37 | 47 |
|
38 | | -Ready to build with iExec? Check out our |
39 | | -[Hello World guide](/overview/helloWorld) or explore our |
40 | | -[use cases](/overview/use-cases). |
| 48 | +## Start Building |
| 49 | + |
| 50 | +Ready to add privacy to your application? Begin with our |
| 51 | +[Hello World guide](/overview/helloWorld) or explore |
| 52 | +[real-world use cases](/overview/use-cases). |
41 | 53 |
|
42 | 54 | --- |
43 | 55 |
|
44 | | -_This documentation will help you understand and implement iExec's decentralized |
45 | | -computing solutions._ |
| 56 | +_This documentation will guide you through building privacy-first applications |
| 57 | +with iExec's developer tools._ |
0 commit comments