diff --git a/src/get-started/overview/iapp.md b/src/get-started/overview/iapp.md new file mode 100644 index 00000000..ef36dc4f --- /dev/null +++ b/src/get-started/overview/iapp.md @@ -0,0 +1,177 @@ +--- +title: What is an iApp? +description: + Learn about iExec Applications (iApp) - confidential computing apps that + process sensitive data in secure TEE environments. Build privacy-preserving + AI, data analysis, and Web3 apps. +--- + + + +# What is an iApp? + +An iExec Application (iApp) is an application that runs inside a confidential +environment (TEEs) to process Protected Data (created with DataProtector). + +Your Python scripts, AI models, or data processors can securely process +protected data inside a TEE. + +## Why iApp Matters? + +iApps provide privacy capabilities, allowing you to process sensitive data while +keeping it private and secure. + +Imagine you want to build: + + + +- An AI that analyzes personal health data +- An email tool that needs access to contact lists +- A financial advisor that processes bank statements +- A content filter that reads private messages + + + +Users have this data, but they won't trust your regular app with it. **With +Privacy iApps, they will.** + +**You gain their trust. They gain their privacy. Everyone wins.** + +## Key Concepts + + + +✅ **True Privacy:** Users never expose their raw data. Your app processes it +privately inside secure enclaves. + +✅ **Trusted Execution:** iExec ensures your code runs inside a Trusted +Execution Environment (TEE), guaranteeing only the specified Docker image +executes in a secure, isolated environment. + +✅ **Decentralized Infrastructure:** No single point of failure. Your app runs +across a distributed network of workers. + +✅ **Zero Trust Architecture:** User data is protected by hardware-based TEEs, +keeping data confidential and inaccessible to the host, cloud provider, or +operating system during execution. + + + +## How it Works + +Your code runs in a Trusted Execution Environment (TEE). This secure area exists +inside specific processors (Intel Software Guard Extensions (SGX) or Trust +Domain Extensions (TDX) chipsets). Everything stays private and protected there, +even from the operating system. + +Authorized users trigger an iApp that processes protected data inside this +private environment. Your iApp uses the data but never exposes it, not even to +you. + + + +1. User provides private data +2. Data is protected with DataProtector +3. You build and deploy a confidential iApp that processes protected data +4. Run the iApp with the corresponding protected data, performing confidential + computing + + + +Your iApp can send emails, update contracts, make transactions, trigger +notifications - anything your code needs. This isn't about trust. We provide +**cryptographic and hardware-enforced guarantees** that preserve privacy within +the TEE execution environment. + +## Use Cases + + + + +### Healthcare + +Process medical data for AI diagnosis without exposing patient information + + + + + +### Finance + +Analyze financial data for credit scoring while maintaining privacy + + + + + +### Media + +Content recommendation engines that don't track user behavior + + + + + +### Research + +Collaborative research on sensitive datasets across institutions + + + + + +## Getting Started + + + +## Time to build + +Let's build an iApp that can process protected data in a secure environment +using the [iExec iApp generator tool](/references/iapp-generator). This tool +helps you create, test and deploy iApps with just a few commands. + + + +### Quick Start Path + +1. **Protect your data** with [DataProtector](/references/dataProtector) +2. **Build your iApp** using the [iApp Generator](/references/iapp-generator) +3. **Deploy and test** your application +4. **Process protected data** securely + +### What You'll Learn + +- How to create a Docker container for your application +- How to handle inputs and outputs securely +- How to deploy to the iExec network +- How to process protected data in TEE environments + +::: tip + +These are just a few examples, the possibilities are endless. Want to explore +iApp Generator? Check out our [documentation](/references/iapp-generator) and +see what you can build! + +::: + +## Technical Requirements + +- **Docker**: Your application must be containerized +- **Input/Output**: Define clear input and output schemas +- **TEE Compatibility**: Ensure your code runs in secure enclaves +- **Network Access**: Configure any external API calls or dependencies + +## Next Steps + +Ready to build your first privacy-preserving application? Start with our +[Hello World tutorial](/get-started/helloWorld) or dive into the +[iApp Generator documentation](/references/iapp-generator). + +For more technical details, see the +[DataProtector Sharing](/references/dataProtector/dataProtectorSharing) +documentation. diff --git a/src/get-started/overview/rlc.md b/src/get-started/overview/rlc.md index 75fbb27c..6063b9f5 100644 --- a/src/get-started/overview/rlc.md +++ b/src/get-started/overview/rlc.md @@ -68,9 +68,9 @@ payment. ### 📊 Ecosystem Growth Metrics -::: info +::: info Circulating Supply -Circulating Supply The entire circulating supply of RLC has already been minted. +The entire circulating supply of RLC has already been minted. There are no pending token unlocks or private allocations that could impact the market. Since launch, iExec has been self-funded, without relying on VCs.