Skip to content

Commit bedd591

Browse files
committed
fix: lisibility & ton
1 parent 3975cae commit bedd591

File tree

23 files changed

+71
-77
lines changed

23 files changed

+71
-77
lines changed

src/get-started/helloWorld.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ import ChainSelector from '@/components/ChainSelector.vue'
3737
<div class="text-3xl">📚</div>
3838
<div class="flex flex-col h-full min-h-[120px]">
3939
<h3 class="m-0! text-lg leading-tight text-[var(--vp-c-text-1)]">1 - iExec Overview</h3>
40-
<p class="my-4 text-sm text-[var(--vp-c-text-2)]">Discover how iExec technologies work and the problem they solves</p>
40+
<p class="my-4 text-sm text-[var(--vp-c-text-2)]">Discover how iExec technologies work and the problems they solve</p>
4141
<div class="mt-auto pt-3">
4242
<span class="inline-block text-sm bg-[var(--vp-c-bg-soft)] rounded text-[var(--vp-c-text-4)]">8 min read</span>
4343
</div>

src/get-started/helloWorld/1-overview.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,9 @@
11
---
22
title: iExec Overview
33
description:
4-
Explore how iExec enables developers to build privacy-preserving dApps using
5-
confidential computing, blockchain, and secure data management. Learn how
6-
tools like DataProtector and iApps empower users to control, protect, and
7-
monetize sensitive data across Web3 applications.
4+
Explore how iExec's confidential computing toolkit helps developers build
5+
privacy-preserving dApps. Learn how DataProtector and iApps let users control,
6+
protect, and monetize sensitive data.
87
---
98

109
# 🧐 iExec Overview
@@ -67,7 +66,7 @@ description:
6766
## 👷 How do we Solve it?
6867

6968
Unlike traditional tools, iExec protects your data throughout its entire
70-
lifecycle, during storage, transfer, and even while **being processed by
69+
lifecycle - during storage, transfer, and even while **being processed by
7170
applications.**
7271

7372
This is made possible thanks to
@@ -159,7 +158,7 @@ And many other use cases...
159158
<p>In this chapter, we covered the core concepts of iExec:</p>
160159
<div class="flex items-center gap-3">
161160
<span class="text-xl">🔒</span>
162-
<p class="m-0"><strong>Privacy-preserving Solution:</strong> iExec provides tools to protect sensitive data throughout its entire lifecycle - storage, transfer, and processing</p>
161+
<p class="m-0"><strong>Privacy-preserving Toolkit:</strong> iExec provides tools to protect sensitive data throughout its entire lifecycle - storage, transfer, and processing</p>
163162
</div>
164163
<div class="flex items-center gap-3">
165164
<span class="text-xl">💡</span>

src/get-started/helloWorld/2-protectData.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -95,11 +95,11 @@ button:
9595
</div>
9696
<div class="flex items-center gap-3">
9797
<span class="bg-gray-950 text-sm text-white w-6 h-6 rounded-full flex items-center justify-center font-medium">3</span>
98-
<span>The encrypted data is stored on IPFS</span>
98+
<span>iExec's protocol stores the encrypted data on IPFS</span>
9999
</div>
100100
<div class="flex items-center gap-3">
101101
<span class="bg-gray-950 text-sm text-white w-6 h-6 rounded-full flex items-center justify-center font-medium">4</span>
102-
<span>The symmetric key is stored in a secure enclave (TEE) in the Secret Management Service</span>
102+
<span>iExec's protocol stores the symmetric key in a secure enclave (TEE) in the Secret Management Service</span>
103103
</div>
104104
<div class="flex items-center gap-3">
105105
<span class="bg-gray-950 text-sm text-white w-6 h-6 rounded-full flex items-center justify-center font-medium">5</span>
@@ -179,7 +179,8 @@ const { address: protectedDataAddress } = await dataProtectorCore.protectData({
179179

180180
- 📦 **Protected Data** is encrypted and stored on decentralized storage
181181

182-
- ⛓️ **Ownership** is stored on the blockchain and linked to your wallet
182+
- ⛓️ **Ownership** iExec's protocol writes ownership on the blockchain and links
183+
it to your wallet
183184

184185
- 🔌 **Integration** is simple with our developer tools
185186

src/get-started/overview/what-is-iapp.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -54,15 +54,15 @@ Turnkey Privacy iApps, they will.**
5454
</div>
5555
<div class="bg-[var(--vp-c-bg-soft)] rounded-[6px] p-4 flex items-center gap-3">
5656
<span class="text-green-500 text-xl">✅</span>
57-
<p class="m-0"><strong>Trusted Execution:</strong> iExec ensures that your code runs inside a Trusted Execution Environment (TEE), which guarantees that only the specified Docker image is executed in a secure and isolated environment.</p>
57+
<p class="m-0"><strong>Trusted Execution:</strong> iExec ensures your code runs inside a Trusted Execution Environment (TEE), guaranteeing only the specified Docker image executes in a secure, isolated environment.</p>
5858
</div>
5959
<div class="bg-[var(--vp-c-bg-soft)] rounded-[6px] p-4 flex items-center gap-3">
6060
<span class="text-green-500 text-xl">✅</span>
6161
<p class="m-0"><strong>Decentralized Infrastructure:</strong> No single point of failure. Your app runs across a distributed network of workers.</p>
6262
</div>
6363
<div class="bg-[var(--vp-c-bg-soft)] rounded-[6px] p-4 flex items-center gap-3">
6464
<span class="text-green-500 text-xl">✅</span>
65-
<p class="m-0"><strong>Zero Trust Architecture:</strong> User data is protected by hardware-based TEEs, which keep data confidential and inaccessible to the host, cloud provider, or operating system during execution.</p>
65+
<p class="m-0"><strong>Zero Trust Architecture:</strong> User data is protected by hardware-based TEEs, keeping data confidential and inaccessible to the host, cloud provider, or operating system during execution.</p>
6666
</div>
6767
</div>
6868

src/get-started/overview/what-is-iexec.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,14 +7,13 @@ description:
77

88
# What is iExec?
99

10-
iExec is a **decentralized computing platform** that enables developers to build
11-
and deploy privacy-preserving applications using confidential computing
12-
technology.
10+
iExec is a **decentralized confidential computing toolkit** that helps
11+
developers build privacy-preserving applications.
1312

1413
## 🎯 **Mission**
1514

16-
iExec's mission is to democratize access to **confidential computing** by
17-
providing a decentralized infrastructure that combines:
15+
iExec democratizes **confidential computing** by providing a toolkit that
16+
combines:
1817

1918
- **🔐 Privacy Protection** - Data remains encrypted during computation
2019
- **⚡ Scalable Computing** - Access to distributed computing resources

src/get-started/overview/what-is-protected-data.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ manage and monetize their data within the Web3 ecosystem effortlessly.
6666
<div class="flex items-center gap-3">
6767
<span>•</span>
6868
<div>
69-
<strong>Secret storage:</strong> Secrets stored in a TEE database.
69+
<strong>Secret storage:</strong> iExec's protocol secrets in a TEE database.
7070
</div>
7171
</div>
7272
</div>
@@ -130,7 +130,7 @@ manage and monetize their data within the Web3 ecosystem effortlessly.
130130
<div class="flex items-center gap-3">
131131
<span class="text-xl font-bold text-fuchsia-700">5.</span>
132132
<div>
133-
<strong>Compute:</strong> Authorized users can compute on your data with the authorized iApps
133+
<strong>Compute:</strong> Authorized users can compute on your data with authorized iApps
134134
</div>
135135
</div>
136136
</div>

src/get-started/protocol/proof-of-contribution.md

Lines changed: 3 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -50,11 +50,11 @@ take the form of data, applications or computing power.
5050
Workers must achieve consensus on the execution result to get the requester’s
5151
funds. If consensus is not achieved, the requester is reimbursed.
5252

53-
Worker and scheduler must stake RLC to participate as a computing providers. Bad
53+
Worker and scheduler must stake RLC to participate as computing providers. Bad
5454
behaviour from an actor results in a loss of stake.
5555

5656
This is essential on the public blockchain, but all values can be set to 0 for
57-
private blockchain solutions.
57+
private blockchain networks.
5858

5959
### Permissioning
6060

@@ -766,9 +766,6 @@ An application can only perform result encryption inside an enclave. No
766766
encryption key will be provided by the SMS to an application that doesn't run
767767
outside an enclave.
768768

769-
(TODO: potential issue, key leaking to malicious application with the requester
770-
attacking a beneficiary)
771-
772769
**[Dataset owner] How do I limit the usage of my dataset to a specific
773770
application?**
774771

@@ -820,7 +817,7 @@ A scheduler could therefore emit two kinds of workerpoolorder:
820817

821818
### Callback
822819

823-
Some requester might want an onchain callback with the result of the execution.
820+
Some requesters might want an onchain callback with the result of the execution.
824821
The callback mechanism is based on
825822
[[EIP-1154]](proof-of-contribution.md#references-1). The result is a `bytes`
826823
value that is set during the `finalize`. The `IexecProxy` implements both side

src/get-started/protocol/worker/quick-start.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -34,13 +34,12 @@ configuration documentation of the
3434
For security reason, it is **highly recommended** to launch your worker in a
3535
virtual machine.
3636

37-
After having loaded some <TokenSymbol /> and deposited them to your iExec
38-
account, you can start your worker.
37+
After loading some <TokenSymbol /> and depositing them to your iExec account,
38+
you can start your worker.
3939

40-
When the worker initialization process is complete, the worker will be started
41-
and you will get something like: **You worker is all set**. Your worker will now
42-
be able to compute some tasks coming from the iExec network to earn some
43-
<TokenSymbol />s.
40+
When the worker initialization process is complete, the worker will start and
41+
you will get: **Your worker is all set**. Your worker will now be able to
42+
compute tasks from the iExec network to earn <TokenSymbol />.
4443

4544
## Wallet restriction
4645

src/get-started/tooling-and-explorers/bridge.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,13 +7,12 @@ description:
77

88
# RLC Bridge
99

10-
**RLC** (RLC Token) is the essential cryptocurrency for interacting with the
11-
iExec protocol. Whether you are executing tasks, accessing protected data, or
12-
participating in the iExec decentralized confidential computing network, you
13-
will need RLC tokens on the appropriate network.
10+
**RLC** (RLC Token) powers all iExec protocol interactions. You need RLC tokens
11+
whether you're executing tasks, accessing protected data, or participating in
12+
the iExec confidential computing network.
1413

1514
This guide helps you bridge RLC tokens to **Bellecour** (becoming xRLC) and
16-
**Arbitrum** networks using dedicated bridge solutions.
15+
**Arbitrum** networks using the Bellecour Bridge and Stargate Bridge.
1716

1817
## 🗂️ Available Bridges
1918

src/get-started/use-cases.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,9 +7,9 @@ description:
77

88
# Use Cases Showcase
99

10-
Explore our demo applications showcasing iExec's privacy-preserving technologies
11-
in action. Each use case demonstrates real-world applications of confidential
12-
computing and decentralized data protection.
10+
Explore our demo applications showcasing iExec's confidential computing toolkit
11+
in action. Each use case shows real-world applications of privacy-preserving
12+
technologies.
1313

1414
<div class="grid grid-cols-1 gap-8 my-8">
1515
<UseCaseCard

0 commit comments

Comments
 (0)