diff --git a/.github/styles/config/vocabularies/Technical/accept.txt b/.github/styles/config/vocabularies/Technical/accept.txt index 4d877b20..d2dba1fe 100644 --- a/.github/styles/config/vocabularies/Technical/accept.txt +++ b/.github/styles/config/vocabularies/Technical/accept.txt @@ -173,7 +173,7 @@ presale presigned untrusted dev -cryptocurrecny +cryptocurrency Unmatching incentivized Whitepaper @@ -190,3 +190,12 @@ chipset auditable Composable Activable +RLC +API +dApp +iApp +IPFS +TEE +SGX +TDX +MCP diff --git a/.vale.ini b/.vale.ini index d8034b30..9455b5cd 100644 --- a/.vale.ini +++ b/.vale.ini @@ -11,3 +11,5 @@ md = markdown [*.md] BasedOnStyles = Vale, Google IgnorePatterns = README.md + +Google.Acronyms = NO \ No newline at end of file diff --git a/.vitepress/sidebar.ts b/.vitepress/sidebar.ts index b0f4074a..05902491 100644 --- a/.vitepress/sidebar.ts +++ b/.vitepress/sidebar.ts @@ -64,8 +64,8 @@ export function getSidebar() { link: '/get-started/overview/protected-data', }, { - text: 'iApp', - link: '/get-started/overview/iapp', + text: 'Privacy iApp', + link: '/get-started/overview/privacy-iapp', }, { text: 'Workerpool', diff --git a/README.md b/README.md index ae4e1421..d3769d57 100644 --- a/README.md +++ b/README.md @@ -171,11 +171,8 @@ please see our [CONTRIBUTING.md](CONTRIBUTING.md) guide.** - Talk about ENS on Bellecour(it's not supported on arbitrum) - Talk about encrypting results in use-iapp - Refactor "advanced" section in build-iapp -- Rework src\get-started\protocol\iexec-doracle.md (transfer to guide or - rewrite) - Talk about encrypting results in use-iapp (link in outputs, iapp generator...) - Rework src\get-started\protocol\oracle.md (transfer to guide or rewrite) -- Talk about iApp secret - Improve Guide in build-iapp section - be more clear for builder ( how to process process protectedData, clarify input-output guide) - Add illustration in the different pages diff --git a/src/assets/rlc/rlc.gif b/src/assets/rlc/rlc.gif deleted file mode 100644 index b980a16f..00000000 Binary files a/src/assets/rlc/rlc.gif and /dev/null differ diff --git a/src/assets/rlc/rlc.webp b/src/assets/rlc/rlc.webp new file mode 100644 index 00000000..46590bc9 Binary files /dev/null and b/src/assets/rlc/rlc.webp differ diff --git a/src/assets/use-cases/mcp-server.png b/src/assets/use-cases/mcp-server.png new file mode 100644 index 00000000..77b8282c Binary files /dev/null and b/src/assets/use-cases/mcp-server.png differ diff --git a/src/assets/use-cases/mpc-server.jpg b/src/assets/use-cases/mpc-server.jpg deleted file mode 100644 index ffc707a0..00000000 Binary files a/src/assets/use-cases/mpc-server.jpg and /dev/null differ diff --git a/src/assets/use-cases/private-image-generator.png b/src/assets/use-cases/private-image-generator.png index 281e7672..097fccdf 100644 Binary files a/src/assets/use-cases/private-image-generator.png and b/src/assets/use-cases/private-image-generator.png differ diff --git a/src/get-started/helloWorld/2-protectData.md b/src/get-started/helloWorld/2-protectData.md index 4f36bbf5..b86aa15a 100644 --- a/src/get-started/helloWorld/2-protectData.md +++ b/src/get-started/helloWorld/2-protectData.md @@ -161,7 +161,7 @@ bun add @iexec/dataprotector import { Address, IExecDataProtector } from '@iexec/dataprotector'; ``` -Create a new instance and call the methods you need +Create a new instance and call the methods you need. diff --git a/src/get-started/overview/iapp.md b/src/get-started/overview/privacy-iapp.md similarity index 81% rename from src/get-started/overview/iapp.md rename to src/get-started/overview/privacy-iapp.md index 3905a895..885d61cc 100644 --- a/src/get-started/overview/iapp.md +++ b/src/get-started/overview/privacy-iapp.md @@ -13,16 +13,18 @@ import CardGrid from '@/components/CardGrid.vue'; import CardWithoutBorder from '@/components/CardWithoutBorder.vue'; -# iApp +# What is an iApp? -An iExec Application (iApp) brings Turnkey Privacy to your regular application -code. Your Python scripts, AI models, or data processors can securely process -protected data inside a TEE (Trusted Execution Environment). +An iExec Application (iApp) is an application that runs inside a confidential +environment (TEEs) to process Protected Data (created with DataProtector). -## Why iApp Matter ? +Your Python scripts, AI models, or data processors can securely process +protected data inside a TEE. -iApp provide Turnkey Privacy capabilities. Process sensitive data while keeping -it private and secure. +## Why iApp Matters? + +iApp provide privacy capabilities, allowing you to process sensitive data while +keeping it private and secure. Imagine you want to build: @@ -36,15 +38,16 @@ Imagine you want to build: Users have this data, but they won't trust your regular app with it. **With -Turnkey Privacy iApp, they will.** +Privacy iApp, they will.** **You gain their trust. They gain their privacy. Everyone wins.** ## Key Concepts - - ✅ **True Privacy:** Users never expose their raw data. Your app processes it privately inside secure enclaves + +✅ **True Privacy:** Users never expose their raw data. Your app processes it +privately inside secure enclaves. ✅ **Trusted Execution:** iExec ensures your code runs inside a Trusted Execution Environment (TEE), guaranteeing only the specified Docker image @@ -62,18 +65,19 @@ operating system during execution. ## How it Works Your code runs in a Trusted Execution Environment (TEE). This secure area exists -inside specific processors (Intel Software Guard Extensions (SGX)/Trust Domain -Extensions (TDX) chipset). Everything stays private and protected there, even -from the operating system. +inside specific processors (Intel Software Guard Extensions (SGX) or Trust +Domain Extensions (TDX) chipsets). Everything stays private and protected there, +even from the operating system. -Authorized users trigger iApp that process protected data inside this private -environment. Your iApp uses the data but never exposes it, not even to you. +Authorized users trigger an iApp that processes protected data inside this +private environment. Your iApp uses the data but never exposes it, not even to +you. 1. User provides private data 2. Data is protected with DataProtector -3. User builds and deploys a confidential iApp that processes protected data +3. You build and deploy a confidential iApp that processes protected data 4. Run the iApp with the corresponding protected data, performing confidential computing @@ -88,8 +92,8 @@ the TEE execution environment. - - ### Healthcare + +### Healthcare Process medical data for AI diagnosis without exposing patient information @@ -108,14 +112,16 @@ Analyze financial data for credit scoring while maintaining privacy ### Media Content recommendation engines that don't track user behavior - + + ### Research Collaborative research on sensitive datasets across institutions - + + diff --git a/src/get-started/overview/protected-data.md b/src/get-started/overview/protected-data.md index 520876d1..ecde6b19 100644 --- a/src/get-started/overview/protected-data.md +++ b/src/get-started/overview/protected-data.md @@ -16,9 +16,12 @@ import Container from '@/components/Container.vue'; # Protected Data Protected Data refers to any data encrypted using the **iExec Data Protector -tool**. This Turnkey Privacy encryption solution enables users to protect, +tool**. This Privacy Toolkit encryption solution enables users to protect, manage and monetize their data within the Web3 ecosystem effortlessly. +This Protected Data can only be decrypted and used inside TEE enclaves, by +authorized actors (Requester, iApp, Worker) + ::: tip Unlike standard datasets, Protected Data exposes its **data types on-chain** @@ -53,7 +56,7 @@ entries with matching types**. 1. **Protect:** Encrypt and register your data on the iExec network -2. **Share:** Authorize specific users and iApps to access your data +2. **Share:** Authorize specific users and iApp to access your data 3. **Monitor:** Track usage and maintain control 4. **Monetize:** Earn from your data while keeping it private 5. **Compute:** Authorized users can compute on your data with authorized iApp diff --git a/src/get-started/overview/rlc.md b/src/get-started/overview/rlc.md index ee693463..75fbb27c 100644 --- a/src/get-started/overview/rlc.md +++ b/src/get-started/overview/rlc.md @@ -1,35 +1,28 @@ --- title: RLC Token description: - RLC (Run on Lots of Computers) is the cryptocurrency powering iExec's - confidential computing ecosystem. Learn about RLC tokenomics, utility, and how - it drives privacy-first Web3 apps. + RLC is the cryptocurrency powering iExec's confidential computing ecosystem. + Learn about RLC tokenomics, utility, and how it drives privacy-first Web3 + apps. --- -RLC Token Animation +RLC Token # RLC Token The native cryptocurrency that powers the entire iExec decentralized confidential computing ecosystem -RLC (Run on Lots of Computers) powers all privacy apps on iExec. Every -confidential computation requires RLC. Every piece of protected data consumed -requires RLC. Every app execution requires RLC. The more builders use iExec -tools, the more utility RLC gains in real apps. - -::: tip Info - -On the iExec sidechain (Bellecour), the RLC token symbol becomes **xRLC**. xRLC -is the native token of the Bellecour chain and is used for all transactions and -payments on this network. - -::: +RLC powers all privacy apps running on iExec. Every confidential computation +requires RLC. Every piece of protected data consumed requires RLC. Every app +execution requires RLC. The more builders use iExec tools, the more RLC has to +be bought and used by builder leveraging iExec's technology. ## 🎯 Why RLC Matters -**Stack adoption = token usage.** When developers build with iExec tools, RLC -gets used. More privacy apps deployed means more RLC demand. +**iExec's adoption is linearly correlated to the real-time usage of the RLC +token** When developers build with iExec tools, RLC gets used. More privacy apps +deployed means more RLC demand. ### For users @@ -38,13 +31,13 @@ data private while making it usable. ### For providers -Build apps, provide data, or run workers. All earn RLC when people use your -contributions. +Build apps, provide data, or [run workers](/get-started/overview/workerpool). +All stakeholders earn RLC when people use their contributions. ### For holders -**Clear positioning:** More developers using iExec's privacy tools means more -RLC utility in real dApps. iExec builds actionable privacy, not just protocols. +More developers using iExec's privacy tools means more RLC utility in real +dApps. iExec builds actionable privacy, not just protocols. ## 💰 Transparent Payment Flow @@ -75,6 +68,14 @@ payment. ### 📊 Ecosystem Growth Metrics +::: info + +Circulating Supply The entire circulating supply of RLC has already been minted. +There are no pending token unlocks or private allocations that could impact the +market. Since launch, iExec has been self-funded, without relying on VCs. + +::: + **RLC operates** on a utility-driven economic model where demand for confidential computing services drives token value: @@ -84,7 +85,7 @@ scarcity and value preservation. **Network Effects**: As more users and providers join the iExec ecosystem, the demand for RLC increases, driving token value through network effects. -**Utility-Driven Growth**: Every interaction in the **Turnkey Privacy** +**Utility-Driven Growth**: Every interaction in the **Privacy Toolkit** ecosystem requires RLC: - iApp executions consume RLC for computation @@ -148,5 +149,5 @@ Ready to dive into the iExec ecosystem? Here are the next steps: import FeatureCard from '@/components/FeatureCard.vue'; // Assets -import rlcGif from '@/assets/rlc/rlc.gif'; +import rlcWebp from '@/assets/rlc/rlc.webp'; diff --git a/src/get-started/toolkit.md b/src/get-started/toolkit.md index 5ed98ea3..e39ba702 100644 --- a/src/get-started/toolkit.md +++ b/src/get-started/toolkit.md @@ -5,7 +5,7 @@ description: Essential tools and resources for building on iExec # iExec Toolkit -Build faster and smarter with our turnkey toolkit designed to streamline your +Build faster and smarter with our privacy toolkit designed to streamline your iExec development experience. ## iApp Generator @@ -39,7 +39,7 @@ users to pay for access. - **Asset visualization** to easily view and explore protected asset types on the iExec protocol - **Content consumption** capabilities for accessing protected data through - confidential iExec applications (iApps) + confidential iExec applications (iApp) - **Governance management** to control who accesses your data, when, and at what price diff --git a/src/get-started/use-cases.md b/src/get-started/use-cases.md index e70380c7..a7ea69d2 100644 --- a/src/get-started/use-cases.md +++ b/src/get-started/use-cases.md @@ -33,6 +33,31 @@ technologies. githubUrl="https://github.com/iExecBlockchainComputing/web3-messaging-usecase-demo" /> +## iExec Confidential AI + +### At the crossroads of DePIN and AI + +iExec provides the confidential computing infrastructure for AI, enabling +developers to protect and monetize the entire AI pipeline. With the Confidential +AI framework, you can: + +- **Train models collaboratively.** +- **Monetize and reward contributors.** +- **Ensure integral, end-to-end encryption across the workflow.** + +### End-to-end confidential AI pipeline + +- **Trusted Execution Environments (TEEs):** Secure, tamper-proof enclaves for + AI training and inference. +- **Models and data stay encrypted at all times—processed without being + exposed.** +- **Execution and results are traced on-chain, ensuring verifiability and + accountability.** + + + +
+ diff --git a/src/get-started/welcome.md b/src/get-started/welcome.md index 89072b6f..d6b75ee9 100644 --- a/src/get-started/welcome.md +++ b/src/get-started/welcome.md @@ -1,7 +1,7 @@ --- title: About iExec description: - Build privacy-first Web3 applications with iExec's turnkey privacy toolkit. + Build privacy-first Web3 applications with iExec's privacy toolkit. Confidential computing, TEE technology, and blockchain data protection made simple for developers. --- @@ -13,14 +13,14 @@ import CardWithoutBorder from '../components/CardWithoutBorder.vue' import CardGrid from '../components/CardGrid.vue' -# Turnkey Privacy Toolkit +# Your Toolkit to Build Privacy Apps ## Welcome to iExec -Your complete toolkit for building privacy-first Web3 applications that protect -and use sensitive data +Your complete toolkit for building privacy-first crypto applications that +protect and use sensitive data. @@ -33,15 +33,16 @@ privacy is protected. ::: tip -iExec solves this with **Turnkey Privacy** - a toolkit that simplifies data +iExec solves this with **Privacy tools** - a toolkit that simplifies data protection, management, and secure computation, even in untrusted environments. + iExec believes privacy should be **plug-and-play simple**, not an afterthought. ::: ## How iExec works -iExec provides Turnkey Privacy tools that make confidential computing simple and +iExec provides Privacy tools that make confidential computing simple and actionable: - **Privacy:** Integrate confidentiality features without managing complex @@ -53,16 +54,30 @@ actionable: - **Available Tools:** Composable toolkit, SDK, and ready-to-use components for straightforward development -## What we Provide +## Tools & support to build with confidence + +Building with iExec means you don't just get the tech—you get a partner. + +### The iExec toolkit + +**DataProtector:** Secure and control access to sensitive information + +**iApp Generator:** Bootstrap your Privacy Apps on TEEs. Confidential Computing +made easy + +**Web3Messaging:** Integrate Web3Mail and/or Web3Telegram to communicate with +Ethereum accounts without having access to their personal data. + +### Support & guidance + +**Grants & Incentives:** Financial support to help builders bring their ideas to +life -Ready-to-use components to protect sensitive data and computation: +**Hands-on Guidance:** Our team works alongside you to overcome challenges and +scale your project -- **DataProtector:** Secure and control access to sensitive information -- **iApp Generator:** Bootstrap your Privacy Apps on TEEs. Confidential - Computing made easy -- **Decentralized Confidential Computing:** Process data securely in secure and - confidential environments while controlling access and monetization through - blockchain +**Shared Vision:** Join a community that's shaping the future of privacy-first +applications ## Real-world Use Cases diff --git a/src/guides/build-iapp/advanced/build-your-first-tdx-iapp.md b/src/guides/build-iapp/advanced/build-your-first-tdx-iapp.md index 2d1025db..796e85c9 100644 --- a/src/guides/build-iapp/advanced/build-your-first-tdx-iapp.md +++ b/src/guides/build-iapp/advanced/build-your-first-tdx-iapp.md @@ -62,7 +62,7 @@ application need to be changed in order to run securely in a TEE. Only two files need to be changed compared to the usual SGX workflow: `chain.json` and `iexec.json`. -iApps using Intel TDX technology follow the same format as non-TEE applications; +iApp using Intel TDX technology follow the same format as non-TEE applications; follow the instructions on [Build your first application](/guides/build-iapp/advanced/build-your-first-sgx-iapp) to create and Dockerize your iApp. @@ -223,8 +223,8 @@ await dataProtector.core.processProtectedData({ :::warning Protected Data Requirements -**TDX iApps may require TDX-compatible protected data.** Check compatibility -before using protected data with TDX iApps. +**TDX iApp may require TDX-compatible protected data.** Check compatibility +before using protected data with TDX iApp. ::: @@ -237,7 +237,7 @@ documentation for TDX-specific requirements. #### 1. **Local Testing** ```bash -# Test locally (same as regular iApps) +# Test locally (same as regular iApp) iapp test --protectedData "mock_name" # TDX only affects remote deployment/execution diff --git a/src/guides/build-iapp/inputs.md b/src/guides/build-iapp/inputs.md index 2843d1b5..d7c6f7e9 100644 --- a/src/guides/build-iapp/inputs.md +++ b/src/guides/build-iapp/inputs.md @@ -26,7 +26,7 @@ within the TEE environment. ::: tip -You can also execute iApps outside of DataProtector using other methods. See the +You can also execute iApp outside of DataProtector using other methods. See the [Use an iApp guide](/guides/use-iapp/introduction) for more information. ::: diff --git a/src/guides/use-iapp/how-to-pay-executions.md b/src/guides/use-iapp/how-to-pay-executions.md index 3b83021a..68c1f18c 100644 --- a/src/guides/use-iapp/how-to-pay-executions.md +++ b/src/guides/use-iapp/how-to-pay-executions.md @@ -55,7 +55,7 @@ await iexec.account.deposit(1_000_000_000); // Deposit 1 RLC Now you are ready to run a task on the iExec Protocol and pay for it. See our guide on -[running iApps with ProtectedData](/guides/use-iapp/run-iapp-with-ProtectedData.md) +[running iApp with ProtectedData](/guides/use-iapp/run-iapp-with-ProtectedData.md) for detailed execution steps. ## Paying with Vouchers diff --git a/src/index.md b/src/index.md index 506537be..29926f4d 100644 --- a/src/index.md +++ b/src/index.md @@ -3,9 +3,9 @@ layout: home hero: - name: 'Build on iExec Privacy Layer ' + name: 'Build with iExec’s Privacy Stack ' tagline: - 'Build decentralized applications that combine governance, privacy, and + 'Build decentralized applications that combine data governance, privacy, and monetization.' image: src: /iexec-illustration-large.webp @@ -182,7 +182,7 @@ features: details: Create revenue streams from your data while maintaining full control and privacy - link: /guides/use-iapp/how-to-pay-executions + link: /guides/manage-data/monetize-protected-data - icon: + ## S diff --git a/src/references/iapp-generator.md b/src/references/iapp-generator.md index 28f393dc..1ec9e24f 100644 --- a/src/references/iapp-generator.md +++ b/src/references/iapp-generator.md @@ -30,7 +30,8 @@ SGX/TDX secure enclaves where data stays private during processing. Start here to understand what iApp are and how they work: -- **[iApp](/get-started/overview/iapp)** - Core concepts and TEE overview +- **[iApp](/get-started/overview/privacy-iapp)** - Core concepts and TEE + overview - **[Getting Started](/references/iapp-generator/getting-started)** - Your first iApp in 15 minutes - **[Building Your iApp](/references/iapp-generator/building-your-iexec-app)** -