22title : iExec Overview
33description :
44 Explore how iExec's confidential computing toolkit helps developers build
5- privacy-preserving dApps . Learn how DataProtector and iApps let users control,
5+ privacy-preserving iApp . Learn how DataProtector and iApp let users control,
66 protect, and monetize sensitive data.
77---
88
99# 🧐 iExec Overview
1010
11- > Reading time 🕒 8 mins
11+ > Reading time 🕒 8 min
1212
1313<div class =" bg-gradient-to-r from-[#fcd15a] to-[#ffad4d] rounded-[6px] px-8 pb-4 text-gray-800 max-w-3xl mx-auto mb-6 " >
1414 <h2 class =" text-2xl font-bold mt-0 border-none! " >Let's start with the basics</h2 >
1515 <p >and explore how iExec can help you build Privacy-preserving applications and securely manage sensitive data.</p >
1616</div >
1717
18- ## 👨💻 Building Privacy-preserving dApps with iExec
18+ ## 👨💻 Building Privacy-preserving iApp with iExec
1919
20- <p >Imagine you're building a decentralized application (dApp ) that needs to <strong > handle sensitive user data</strong >, for example:</p >
20+ <p >Imagine you're building a decentralized application (iApp ) that needs to <strong > handle sensitive user data</strong >, for example:</p >
2121<div class =" bg-[var(--vp-c-bg-soft)] rounded-[6px] p-6 mb-6 " >
2222 <div class =" flex flex-col gap-2.5 " >
2323 <div class="flex items-center gap-2 text-base">
@@ -60,7 +60,7 @@ description:
6060</div >
6161
6262<div class =" bg-gradient-to-r from-purple-400/10 to-purple-400/5 rounded-[6px] p-6 border-l-4 border-fuchsia-700 mb-6 " >
63- <p class =" m-0! " >This is where <span class =" text-fuchsia-700 font-semibold " >iExec</span > comes in! We provide tools to easily add <span class =" text-fuchsia-700 font-semibold " >privacy</span > and <span class =" text-fuchsia-700 font-semibold " >monetization</span > features into your dApp .</p >
63+ <p class =" m-0! " >This is where <span class =" text-fuchsia-700 font-semibold " >iExec</span > comes in! We provide tools to easily add <span class =" text-fuchsia-700 font-semibold " >privacy</span > and <span class =" text-fuchsia-700 font-semibold " >monetization</span > features into your iApp .</p >
6464</div >
6565
6666## 👷 How do we Solve it?
@@ -84,14 +84,14 @@ Computing</a></span> technologies.
8484
8585iExec combines three fundamental elements that work together seamlessly:
8686
87- #### 1. Protect Data with our Devtool [ DataProtector] ( /references/dataProtector/getting-started )
87+ #### 1. Protect Data with our DevTool [ DataProtector] ( /references/dataProtector/getting-started )
8888
8989- Encrypt your sensitive data and store it securely on Arweave or IPFS
9090- Only you control who can access it and when
9191- Perfect for private information like research data, business analytics, or
9292 personal records
9393
94- #### 2. Compute Data with iExec Apps (iApps ) Running in Secure Environment
94+ #### 2. Compute Data with iExec Apps (iApp ) Running in Secure Environment
9595
9696- Special applications that can work with protected data
9797- Run in secure environments (called TEEs) that keep your data private
@@ -115,17 +115,17 @@ inside stays **safe** and **private**.
115115With a tool called ** DataProtector** , your data becomes ** protected** and can
116116only be read and processed inside this secure room.
117117
118- Special applications called ** iApps ** (applications built to run in secure
118+ Special applications called ** iApp ** (applications built to run in secure
119119environments) can enter the room to work with your data. You stay in ** control**
120120by setting ** access rules** that only you can modify about who can access it and
121121when.
122122
123- ## 🔍 Building your First Privacy-preserving dApp
123+ ## 🔍 Building your First Privacy-preserving iApp
124124
125125Let's meet Bob and Alice to understand how iExec enables Privacy-preserving
126126applications:
127127
128- ### 1. Meet Bob: the dApp Developer 👨💻
128+ ### 1. Meet Bob: the iApp Developer 👨💻
129129
130130Bob is building a decentralized application that uses iExec's technology. His
131131platform consists of:
@@ -135,7 +135,7 @@ platform consists of:
135135- Thanks to DataProtector, end users can protect their data, manage access, and
136136 process it seamlessly.
137137
138- ### 2. Meet Alice: the dApp User 👩💼
138+ ### 2. Meet Alice: the iApp User 👩💼
139139
140140When using Bob's platform, Alice can:
141141
@@ -144,7 +144,7 @@ When using Bob's platform, Alice can:
144144- Authorize specific iExec Apps and persons like Bob to use her data in a secure
145145 environment
146146
147- Depending on the dApp 's use case, Alice could:
147+ Depending on the iApp 's use case, Alice could:
148148
149149- Apply algorithms to her data and get results confidentially
150150- Share her data with other users privately (and get paid for it)
@@ -166,7 +166,7 @@ And many other use cases...
166166 </div >
167167 <div class =" flex items-center gap-3 " >
168168 <span class="text-xl">📦</span>
169- <p class="m-0"><strong>iApps (iExec App):</strong> Special applications that can process protected data</p>
169+ <p class="m-0"><strong>iApp (iExec App):</strong> Special applications that can process protected data</p>
170170 </div >
171171 <div class =" flex items-center gap-3 " >
172172 <span class="text-xl">⛓️</span>
0 commit comments