Skip to content

Commit ecf1e18

Browse files
committed
feat: RLC edits
1 parent 8c0e6b3 commit ecf1e18

File tree

2 files changed

+24
-22
lines changed

2 files changed

+24
-22
lines changed

src/get-started/overview/rlc.md

Lines changed: 15 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -13,23 +13,16 @@ description:
1313
The native cryptocurrency that powers the entire iExec decentralized
1414
confidential computing ecosystem
1515

16-
RLC (Run on Lots of Computers) powers all privacy apps on iExec. Every
17-
confidential computation requires RLC. Every piece of protected data consumed
18-
requires RLC. Every app execution requires RLC. The more builders use iExec
19-
tools, the more utility RLC gains in real apps.
20-
21-
::: tip Info
22-
23-
On the iExec sidechain (Bellecour), the RLC token symbol becomes **xRLC**. xRLC
24-
is the native token of the Bellecour chain and is used for all transactions and
25-
payments on this network.
26-
27-
:::
16+
RLC powers all privacy apps running on iExec. Every confidential computation
17+
requires RLC. Every piece of protected data consumed requires RLC. Every app
18+
execution requires RLC. The more builders use iExec tools, the more RLC has to
19+
be bought and used by builder leveraging iExec's technology.
2820

2921
## 🎯 Why RLC Matters
3022

31-
**Stack adoption = token usage.** When developers build with iExec tools, RLC
32-
gets used. More privacy apps deployed means more RLC demand.
23+
**iExec's adoption is linearly correlated to the real-time usage of the RLC
24+
token** When developers build with iExec tools, RLC gets used. More privacy apps
25+
deployed means more RLC demand.
3326

3427
### For users
3528

@@ -38,13 +31,13 @@ data private while making it usable.
3831

3932
### For providers
4033

41-
Build apps, provide data, or run workers. All earn RLC when people use your
42-
contributions.
34+
Build apps, provide data, or [run workers](/get-started/overview/workerpool).
35+
All stakeholders earn RLC when people use their contributions.
4336

4437
### For holders
4538

46-
**Clear positioning:** More developers using iExec's privacy tools means more
47-
RLC utility in real dApps. iExec builds actionable privacy, not just protocols.
39+
More developers using iExec's privacy tools means more RLC utility in real
40+
dApps. iExec builds actionable privacy, not just protocols.
4841

4942
## 💰 Transparent Payment Flow
5043

@@ -81,6 +74,10 @@ confidential computing services drives token value:
8174
**Fixed Supply**: RLC has a maximum supply of 87 million tokens, ensuring
8275
scarcity and value preservation.
8376

77+
The entire circulating supply of RLC has already been minted. There are no
78+
pending token unlocks or private allocations that could impact the market. Since
79+
launch, iExec has been self-funded, without relying on VCs.
80+
8481
**Network Effects**: As more users and providers join the iExec ecosystem, the
8582
demand for RLC increases, driving token value through network effects.
8683

src/get-started/use-cases.md

Lines changed: 9 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -37,17 +37,22 @@ technologies.
3737

3838
### At the crossroads of DePIN and AI
3939

40-
iExec provides the confidential computing infrastructure for AI, enabling developers to protect and monetize the entire AI pipeline. With the Confidential AI framework, you can:
40+
iExec provides the confidential computing infrastructure for AI, enabling
41+
developers to protect and monetize the entire AI pipeline. With the Confidential
42+
AI framework, you can:
4143

4244
- **Train models collaboratively.**
4345
- **Monetize and reward contributors.**
4446
- **Ensure integral, end-to-end encryption across the workflow.**
4547

4648
### End-to-end confidential AI pipeline
4749

48-
- **Trusted Execution Environments (TEEs):** Secure, tamper-proof enclaves for AI training and inference.
49-
- **Models and data stay encrypted at all times—processed without being exposed.**
50-
- **Execution and results are traced on-chain, ensuring verifiability and accountability.**
50+
- **Trusted Execution Environments (TEEs):** Secure, tamper-proof enclaves for
51+
AI training and inference.
52+
- **Models and data stay encrypted at all times—processed without being
53+
exposed.**
54+
- **Execution and results are traced on-chain, ensuring verifiability and
55+
accountability.**
5156

5257
<UseCaseCard
5358
title="AI Agent"

0 commit comments

Comments
 (0)