Skip to content

Commit 466f392

Browse files
committed
refactor: update welcome page to emphasize iExec's privacy-first approach and developer tools
1 parent eaecd19 commit 466f392

File tree

1 file changed

+38
-26
lines changed

1 file changed

+38
-26
lines changed

src/overview/welcome.md

Lines changed: 38 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -1,45 +1,57 @@
11
---
2-
title: What We Do
3-
description: Discover iExec's decentralized computing platform
2+
title: Why iExec
3+
description:
4+
Discover how iExec empowers developers to build privacy-first applications
45
---
56

6-
# 💡 What We Do
7+
# 💡 Why iExec
78

8-
iExec is a decentralized marketplace for computing resources. We enable
9-
developers to build applications that combine **ownership**, **privacy**, and
10-
**monetization**.
9+
## Why We Exist
1110

12-
## Our Mission
11+
In a world where data privacy is increasingly critical, developers need better
12+
tools to protect user information while building innovative applications. We
13+
believe privacy should be a fundamental right, not an afterthought.
1314

14-
We believe in a future where:
15+
## How We Make It Happen
1516

16-
- Data owners maintain control over their information
17-
- Developers can access powerful computing resources on-demand
18-
- Privacy is preserved through trusted execution environments
19-
- Anyone can monetize their data and computing power
17+
iExec provides a complete toolkit that makes privacy simple and actionable:
2018

21-
## Key Technologies
19+
- **Plug & Play Privacy**: Integrate confidentiality features without managing
20+
complex infrastructure
21+
- **Programmable Data Control**: Define who can access data, when, and how - all
22+
through simple tools
23+
- **Native Interoperability**: Build once, deploy anywhere with EVM
24+
compatibility
25+
- **Developer-First Experience**: Focus on building your application, not
26+
privacy plumbing
2227

23-
### Protected Data
28+
## What We Offer
2429

25-
Secure your data while maintaining control over who can access and use it.
30+
### Privacy Tools
2631

27-
### iApps (iExec Applications)
32+
Ready-to-use components to protect sensitive data and computation:
2833

29-
Decentralized applications that run on the iExec network, ensuring privacy and
30-
verifiability.
34+
- **DataProtector**: Secure and control access to sensitive information
35+
- **iApp Generator**: Create privacy-preserving applications in minutes
36+
- **Confidential Computing**: Process data in secure enclaves with TEE
37+
technology
3138

32-
### Trusted Execution Environments (TEE)
39+
### Real-World Applications
3340

34-
Computing in secure enclaves that guarantee privacy and integrity.
41+
Our tools power privacy-critical use cases like:
3542

36-
## Get Started
43+
- Private AI model training and inference
44+
- Confidential DeFi operations
45+
- Protected healthcare data processing
46+
- Secure research computations
3747

38-
Ready to build with iExec? Check out our
39-
[Hello World guide](/overview/helloWorld) or explore our
40-
[use cases](/overview/use-cases).
48+
## Start Building
49+
50+
Ready to add privacy to your application? Begin with our
51+
[Hello World guide](/overview/helloWorld) or explore
52+
[real-world use cases](/overview/use-cases).
4153

4254
---
4355

44-
_This documentation will help you understand and implement iExec's decentralized
45-
computing solutions._
56+
_This documentation will guide you through building privacy-first applications
57+
with iExec's developer tools._

0 commit comments

Comments
 (0)