@@ -13,18 +13,18 @@ import CardGrid from '@/components/CardGrid.vue';
1313import CardWithoutBorder from ' @/components/CardWithoutBorder.vue' ;
1414</script >
1515
16- # Privacy iApp
16+ # What is an iApp?
1717
18- An iExec App (iApp) is an application that runs inside a confidential
18+ An iExec Application (iApp) is an application that runs inside a confidential
1919environment (TEEs) to process Protected Data (created with DataProtector).
2020
2121Your Python scripts, AI models, or data processors can securely process
2222protected data inside a TEE.
2323
24- ## Why iApp Matters ?
24+ ## Why iApp Matters?
2525
26- iApp provide privacy capabilities. Process sensitive data while keeping it
27- private and secure.
26+ iApps provide privacy capabilities, allowing you to process sensitive data while
27+ keeping it private and secure.
2828
2929Imagine you want to build:
3030
@@ -38,15 +38,16 @@ Imagine you want to build:
3838</CardWithoutBorder >
3939
4040Users have this data, but they won't trust your regular app with it. ** With
41- Privacy iApp , they will.**
41+ Privacy iApps , they will.**
4242
4343** You gain their trust. They gain their privacy. Everyone wins.**
4444
4545## Key Concepts
4646
4747<CardWithBorder >
48-
49- ✅ ** True Privacy:** Users never expose their raw data. Your app processes it privately inside secure enclaves
48+
49+ ✅ ** True Privacy:** Users never expose their raw data. Your app processes it
50+ privately inside secure enclaves.
5051
5152✅ ** Trusted Execution:** iExec ensures your code runs inside a Trusted
5253Execution Environment (TEE), guaranteeing only the specified Docker image
@@ -64,18 +65,19 @@ operating system during execution.
6465## How it Works
6566
6667Your code runs in a Trusted Execution Environment (TEE). This secure area exists
67- inside specific processors (Intel Software Guard Extensions (SGX)/Trust Domain
68- Extensions (TDX) chipset ). Everything stays private and protected there, even
69- from the operating system.
68+ inside specific processors (Intel Software Guard Extensions (SGX) or Trust
69+ Domain Extensions (TDX) chipsets ). Everything stays private and protected there,
70+ even from the operating system.
7071
71- Authorized users trigger iApp that process protected data inside this private
72- environment. Your iApp uses the data but never exposes it, not even to you.
72+ Authorized users trigger an iApp that processes protected data inside this
73+ private environment. Your iApp uses the data but never exposes it, not even to
74+ you.
7375
7476<CardWithBorder >
7577
76781 . User provides private data
77792 . Data is protected with DataProtector
78- 3 . User builds and deploys a confidential iApp that processes protected data
80+ 3 . You build and deploy a confidential iApp that processes protected data
79814 . Run the iApp with the corresponding protected data, performing confidential
8082 computing
8183
@@ -90,8 +92,8 @@ the TEE execution environment.
9092
9193<CardGrid >
9294 <CardWithoutBorder >
93-
94- ### Healthcare
95+
96+ ### Healthcare
9597
9698Process medical data for AI diagnosis without exposing patient information
9799
@@ -110,14 +112,16 @@ Analyze financial data for credit scoring while maintaining privacy
110112### Media
111113
112114Content recommendation engines that don't track user behavior
113- </CardWithoutBorder >
115+
116+ </CardWithoutBorder >
114117
115118 <CardWithoutBorder >
116119
117120### Research
118121
119122Collaborative research on sensitive datasets across institutions
120- </CardWithoutBorder >
123+
124+ </CardWithoutBorder >
121125
122126</CardGrid >
123127
@@ -129,7 +133,7 @@ Collaborative research on sensitive datasets across institutions
129133
130134Let's build an iApp that can process protected data in a secure environment
131135using the [ iExec iApp generator tool] ( /references/iapp-generator ) . This tool
132- helps you create, test and deploy iApp with just a few commands.
136+ helps you create, test and deploy iApps with just a few commands.
133137
134138</Banner >
135139
0 commit comments