You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/get-started/use-cases.md
+9-4Lines changed: 9 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,17 +37,22 @@ technologies.
37
37
38
38
### At the crossroads of DePIN and AI
39
39
40
-
iExec provides the confidential computing infrastructure for AI, enabling developers to protect and monetize the entire AI pipeline. With the Confidential AI framework, you can:
40
+
iExec provides the confidential computing infrastructure for AI, enabling
41
+
developers to protect and monetize the entire AI pipeline. With the Confidential
42
+
AI framework, you can:
41
43
42
44
-**Train models collaboratively.**
43
45
-**Monetize and reward contributors.**
44
46
-**Ensure integral, end-to-end encryption across the workflow.**
45
47
46
48
### End-to-end confidential AI pipeline
47
49
48
-
-**Trusted Execution Environments (TEEs):** Secure, tamper-proof enclaves for AI training and inference.
49
-
-**Models and data stay encrypted at all times—processed without being exposed.**
50
-
-**Execution and results are traced on-chain, ensuring verifiability and accountability.**
50
+
-**Trusted Execution Environments (TEEs):** Secure, tamper-proof enclaves for
51
+
AI training and inference.
52
+
-**Models and data stay encrypted at all times—processed without being
53
+
exposed.**
54
+
-**Execution and results are traced on-chain, ensuring verifiability and
0 commit comments