And learn how to build Privacy-preserving decentralized applications (DApp) with iExec in this interactive guide.
โ 30 minutes journey
Perfect for hackathons ๐
-
+
## What you'll Learn and Build
diff --git a/src/get-started/helloWorld/1-overview.md b/src/get-started/helloWorld/1-overview.md
index 4863a05b..94d9c9ea 100644
--- a/src/get-started/helloWorld/1-overview.md
+++ b/src/get-started/helloWorld/1-overview.md
@@ -6,14 +6,18 @@ description:
protect, and monetize sensitive data.
---
+
+
# ๐ง iExec Overview
> Reading time ๐ 8 min
-
+
Let's start with the basics
and explore how iExec can help you build Privacy-preserving applications and securely manage sensitive data.
-
+
## ๐จโ๐ป Building Privacy-preserving iApp with iExec
diff --git a/src/get-started/helloWorld/2-protectData.md b/src/get-started/helloWorld/2-protectData.md
index 8c2d7526..bbbf95cf 100644
--- a/src/get-started/helloWorld/2-protectData.md
+++ b/src/get-started/helloWorld/2-protectData.md
@@ -7,16 +7,17 @@ description:
# ๐ก๏ธ Let's Protect Data
> Reading time: 6 minutes
-
+
Time to get practical
Let's follow Alice as she learns how to protect her data using DataProtector on Bob's iApp, our developer tool for protecting data creation and management.
-
+
Protected data is encrypted data that remains confidential throughout its entire lifecycle - during storage, transfer and processing.
diff --git a/src/get-started/helloWorld/3-buildIApp.md b/src/get-started/helloWorld/3-buildIApp.md
index 6ab83a99..3db5372c 100644
--- a/src/get-started/helloWorld/3-buildIApp.md
+++ b/src/get-started/helloWorld/3-buildIApp.md
@@ -5,14 +5,18 @@ description:
processing protected data in this comprehensive tutorial.
---
+
+
# ๐ ๏ธ Build and Deploy your First iApp
> Reading time ๐ 10 min
-
+
Time to build!
Let's build an iApp that can process protected data in a secure environment using the iExec iApp generator tool. This tool helps you create, test and deploy iApp with just a few commands.
-
+
If you wanna explore and deep dive in the CLI. You can check the
[iApp-CLI](https://github.com/iExecBlockchainComputing/iapp/tree/main/cli)
diff --git a/src/get-started/helloWorld/4-manageDataAccess.md b/src/get-started/helloWorld/4-manageDataAccess.md
index 61d34b33..44212ba4 100644
--- a/src/get-started/helloWorld/4-manageDataAccess.md
+++ b/src/get-started/helloWorld/4-manageDataAccess.md
@@ -8,6 +8,7 @@ description:
@@ -16,10 +17,10 @@ const { protectedDataAddress } = useWalletConnection();
> Reading time ๐ 6 min
-
+
Control Your Data
Alice will learn how to grant access to her protected data and manage who can use it.
-
+
When you protect your data, you can authorize specific users and applications to access it. This means an authorized user will be able to use an authorized iApp to compute your protected data.
diff --git a/src/get-started/helloWorld/5-bonusChapter.md b/src/get-started/helloWorld/5-bonusChapter.md
index 5466264c..425f9189 100644
--- a/src/get-started/helloWorld/5-bonusChapter.md
+++ b/src/get-started/helloWorld/5-bonusChapter.md
@@ -5,14 +5,18 @@ description:
Hello World tutorial series.
---
+
+
# ๐ Bonus Chapter
> Reading time ๐ 4 min
-
+
Congratulations!
You've successfully completed the Hello World journey and learned how to protect data, deploy iApp, and manage data access. Now it's time to claim your rewards! ๐
-
+
## ๐ Any Questions?
diff --git a/src/get-started/overview/iapp.md b/src/get-started/overview/iapp.md
index fd99fd97..88bc0578 100644
--- a/src/get-started/overview/iapp.md
+++ b/src/get-started/overview/iapp.md
@@ -6,6 +6,10 @@ description:
AI, data analysis, and Web3 apps.
---
+
+
# iApp
An iExec Application (iApp) brings Turnkey Privacy to your regular application
@@ -120,10 +124,10 @@ the TEE execution environment.
## Getting Started
-
+
Time to build!
Let's build an iApp that can process protected data in a secure environment using the iExec iApp generator tool. This tool helps you create, test and deploy iApp with just a few commands.
This is where iExec comes in! We provide tools to easily add privacy and monetization features into your iApp.
-
+
## ๐ท How do we Solve it?
@@ -79,10 +80,10 @@ Execution Environment (TEE) and
Confidential
Computing technologies.
-
+
Our technology allows users to control the ownership,
confidentiality, and monetization of their data and digital assets within the Web3 ecosystem.
-
+
## ๐ The Three Key Elements?
@@ -107,9 +108,9 @@ iExec combines three fundamental elements that work together seamlessly:
- Regain ownership of your data
- Provides transparent governance rules for data access
-
+
By merging blockchain technology with confidential computing, we've pioneered DeCC (Decentralized Confidential Computing) to take privacy and security to the next level in Web3 ecosystems.
-
+
### ๐งธ DeCC Explained Like You're 5
@@ -182,6 +183,6 @@ And many other use cases...
-
+
Now that you understand the fundamentals, let's dive into protecting your first piece of data! With Alice!
-
+
diff --git a/src/get-started/helloWorld/2-protectData.md b/src/get-started/helloWorld/2-protectData.md
index bbbf95cf..998aebaf 100644
--- a/src/get-started/helloWorld/2-protectData.md
+++ b/src/get-started/helloWorld/2-protectData.md
@@ -8,6 +8,7 @@ description:
# ๐ก๏ธ Let's Protect Data
@@ -19,9 +20,9 @@ import Banner from '../../components/Banner.vue'
Let's follow Alice as she learns how to protect her data using DataProtector on Bob's iApp, our developer tool for protecting data creation and management.
-
+
Protected data is encrypted data that remains confidential throughout its entire lifecycle - during storage, transfer and processing.
-
+
## ๐งฉ DataProtector, Key Features
@@ -52,9 +53,9 @@ their DApp with these key features:
## ๐งฉ What Happened Under the Hood
-
+
You won't believe how easy it is to protect your data with DataProtector. Just a few lines of code, and you're done!
-
+
To use it, simply call the `protectData` method from the **DataProtector SDK**
with two arguments.
@@ -170,9 +171,9 @@ const { address: protectedDataAddress } = await dataProtectorCore.protectData({
});
```
-
+
Check out our code sandbox for ready-to-use examples!
In the next chapter, we'll show you how to build, deploy, and run an iApp to process your protected data. Let's go! ๐
-
+
diff --git a/src/get-started/helloWorld/3-buildIApp.md b/src/get-started/helloWorld/3-buildIApp.md
index 3db5372c..fad188c5 100644
--- a/src/get-started/helloWorld/3-buildIApp.md
+++ b/src/get-started/helloWorld/3-buildIApp.md
@@ -5,10 +5,6 @@ description:
processing protected data in this comprehensive tutorial.
---
-
-
# ๐ ๏ธ Build and Deploy your First iApp
> Reading time ๐ 10 min
@@ -78,9 +74,9 @@ Transfer, sell or rent protected content to authorized users.
[Github](https://github.com/iExecBlockchainComputing/dataprotector-sdk/tree/main/packages/protected-data-delivery-dapp)
| [Documentation](/references/dataProtector/dataProtectorSharing)
-
+
These are just a few examples, the possibilities are endless. Want to explore iApp Generator? Check out our documentation and see what you can build!
-
+
## ๐พ Installation (Win / Mac / Linux)
@@ -199,9 +195,9 @@ You will be prompted with the following message:
-
+
We recommend selecting "Hello World" to quickly discover how iApp works! use advanced only if you are familiar with iExec.
-
+
- An iApp project is setup with the selected language
- An ethereum wallet has been created (we use it to sign the iApp creation
@@ -286,11 +282,11 @@ following steps:
The `iapp test` command uses your local Docker to build and execute the app,
simulating how it will run in the iExec network's TEE environment.
-
+
Common Issues:
- If you get Error: Docker daemon is not accessible: Make sure Docker is installed and running.
- If you get Error: Failed to locate iApp project root: Ensure you are in your project folder before proceeding.
-
+
### ๐งฉ Using Arguments
@@ -314,9 +310,9 @@ default protectedData mock.
iapp test --protectedData default
```
-
+
You can check how args and protectedData are processed in src/app.js or src/app.py
-
+
## ๐ Deploy your iApp
@@ -373,7 +369,7 @@ Once you have your token, you can deploy your iApp.
/>
-
+
๐ Make sure to save your iApp address after deployment - you'll need it later!
You can find your iApp address in the iexec-app.json file in your project folder.
The output should include linux/amd64 in the list of supported platforms. If not, update to the latest Docker Desktop version which includes these requirements.
โ ๏ธ If you set the wrong Docker username, you can change it by editing the iapp.config.json file
-
+
## ๐ Run your iApp
@@ -401,9 +397,9 @@ allowing it to run securely in a **Trusted Execution Environment (TEE)** for
**confidential computing**. If you want to explore further, you can check the
protocol documentation [here](https://protocol.docs.iex.ec/).
-
+
๐ Congratulations! You've successfully deployed and run your first iApp on iExec. This is a significant milestone - your application is now ready to securely process confidential data in a trusted environment.
-
+
## ๐ฏ Key Takeaways
@@ -413,15 +409,17 @@ protocol documentation [here](https://protocol.docs.iex.ec/).
- โ๏ธ **Deployment:** Apps are deployed on iExec protocol to run in trusted
environments
-
+
Next up: Alice will learn how to authorize the iApp and Bob to access and use her protected data! ๐
Alice will learn how to grant access to her protected data and manage who can use it.
-
+
When you protect your data, you can authorize specific users and applications to access it. This means an authorized user will be able to use an authorized iApp to compute your protected data.
-
+
## ๐ The Authorization Flow
@@ -54,9 +55,9 @@ Here is a simple diagram to explain the process:
## ๐ Grant the iApp Access to your Data
-
+
Remember the iApp address you saved from the previous chapter? You'll need it now to grant access to your protected data.
-
+
@@ -79,9 +80,9 @@ const grantedAccess = await dataProtectorCore.grantAccess({
- ๐ป **authorizedApp**: The iApp address you want to authorize
- ๐ค **authorizedUser**: User's wallet address (0x... means all users)
-
+
As we don't have the Bob's wallet address, we'll use the zero address to grant access to all users.
-
+
## ๐ Time to Run
@@ -91,9 +92,9 @@ You're now ready to process your protected data in a trusted environment:
iapp run --protectedData {{ protectedDataAddress }}
```
-
+
๐ Congratulations! You've successfully completed the core workflow of protecting and processing data with iExec!
-
+
## What's Next: Data Monetization
@@ -119,6 +120,6 @@ For more technical details, see the
[DataProtector Sharing](/references/dataProtector/dataProtectorSharing)
documentation.
-
+
You have one more step to complete the journey, and it's the easy one. Let's go to the bonus chapter!
-
+
diff --git a/src/get-started/helloWorld/5-bonusChapter.md b/src/get-started/helloWorld/5-bonusChapter.md
index 425f9189..8c2b9b53 100644
--- a/src/get-started/helloWorld/5-bonusChapter.md
+++ b/src/get-started/helloWorld/5-bonusChapter.md
@@ -5,10 +5,6 @@ description:
Hello World tutorial series.
---
-
-
# ๐ Bonus Chapter
> Reading time ๐ 4 min
@@ -32,9 +28,9 @@ import Banner from '../../components/Banner.vue'
-
+
Need help setting up or got some questions? Join our Discord Community for support!
-
+
๐ Claim your Voucher
@@ -56,15 +52,17 @@ import Banner from '../../components/Banner.vue'
Claim your $20 voucher
-
+
Thank you for being part of the iExec journey! We can't wait to see what you'll build next! ๐
-
+
# ๐ก Turnkey Privacy Toolkit
@@ -24,9 +25,9 @@ deserves the power** to build groundbreaking applications while **keeping user
data completely secure**. Your users deserve **absolute confidence** that their
privacy is protected.
-
+
iExec solves this with Turnkey Privacy - a toolkit that simplifies data protection, management, and secure computation, even in untrusted environments. We believe privacy should be plug-and-play simple, not an afterthought.
-
+
## ๐ ๏ธ How we Make it Happen
@@ -159,9 +160,9 @@ Confidential Computing made easy
-
+
The next chapters guide you through our Hello World journey. This 30-minute start teaches you everything about iExec. You'll learn protecting sensitive data and building and deploying confidential apps.
-
+
## ๐ Start Building
@@ -196,8 +197,8 @@ _**Join thousands of developers** who are already transforming the future of
privacy. **You have the power** to build the next generation of trust-first
applications. Let's build something amazing together._ ๐
-
+
๐ Join the iExec Community
Be part of a growing movement of developers, data owners, and privacy advocates who are reshaping how the world handles sensitive data.
When you build with iExec, you're not just solving a technical challengeโyou're championing user rights and digital sovereignty. Every application you create makes the web more private, more secure, and more trustworthy for everyone.
This is where iExec comes in! We provide tools to easily add privacy and monetization features into your iApp.
+
+
This is where iExec comes in! We provide tools to easily add privacy and monetization features into your iApp.
## ๐ท How do we Solve it?
Unlike traditional tools, iExec protects your data throughout its entire
lifecycle - during storage, transfer, and even while **being processed by
-applications.**
-
-This is made possible thanks to
-Trusted
-Execution Environment (TEE) and
-Confidential
-Computing technologies.
-
-
-
Our technology allows users to control the ownership,
- confidentiality, and monetization of their data and digital assets within the Web3 ecosystem.
Our technology allows users to control the ownership,
+ confidentiality, and monetization of their data and digital assets within the Web3 ecosystem.
## ๐ The Three Key Elements?
@@ -108,8 +106,8 @@ iExec combines three fundamental elements that work together seamlessly:
- Regain ownership of your data
- Provides transparent governance rules for data access
-
-
By merging blockchain technology with confidential computing, we've pioneered DeCC (Decentralized Confidential Computing) to take privacy and security to the next level in Web3 ecosystems.
+
+
By merging blockchain technology with confidential computing, we've pioneered DeCC (Decentralized Confidential Computing) to take privacy and security to the next level in Web3 ecosystems.
### ๐งธ DeCC Explained Like You're 5
diff --git a/src/get-started/helloWorld/2-protectData.md b/src/get-started/helloWorld/2-protectData.md
index 998aebaf..18db404f 100644
--- a/src/get-started/helloWorld/2-protectData.md
+++ b/src/get-started/helloWorld/2-protectData.md
@@ -20,7 +20,7 @@ import Container from '../../components/Container.vue'
Let's follow Alice as she learns how to protect her data using DataProtector on Bob's iApp, our developer tool for protecting data creation and management.
-
+
Protected data is encrypted data that remains confidential throughout its entire lifecycle - during storage, transfer and processing.
@@ -53,7 +53,7 @@ their DApp with these key features:
## ๐งฉ What Happened Under the Hood
-
+
You won't believe how easy it is to protect your data with DataProtector. Just a few lines of code, and you're done!
Check out our code sandbox for ready-to-use examples!
diff --git a/src/get-started/helloWorld/3-buildIApp.md b/src/get-started/helloWorld/3-buildIApp.md
index fad188c5..d8deba32 100644
--- a/src/get-started/helloWorld/3-buildIApp.md
+++ b/src/get-started/helloWorld/3-buildIApp.md
@@ -74,7 +74,7 @@ Transfer, sell or rent protected content to authorized users.
[Github](https://github.com/iExecBlockchainComputing/dataprotector-sdk/tree/main/packages/protected-data-delivery-dapp)
| [Documentation](/references/dataProtector/dataProtectorSharing)
-
+
These are just a few examples, the possibilities are endless. Want to explore iApp Generator? Check out our documentation and see what you can build!
@@ -195,8 +195,8 @@ You will be prompted with the following message:
-
-
We recommend selecting "Hello World" to quickly discover how iApp works! use advanced only if you are familiar with iExec.
+
+
We recommend selecting "Hello World" to quickly discover how iApp works! use advanced only if you are familiar with iExec.
- An iApp project is setup with the selected language
@@ -282,7 +282,7 @@ following steps:
The `iapp test` command uses your local Docker to build and execute the app,
simulating how it will run in the iExec network's TEE environment.
-
+
Common Issues:
- If you get Error: Docker daemon is not accessible: Make sure Docker is installed and running.
- If you get Error: Failed to locate iApp project root: Ensure you are in your project folder before proceeding.
Alice will learn how to grant access to her protected data and manage who can use it.
-
-
When you protect your data, you can authorize specific users and applications to access it. This means an authorized user will be able to use an authorized iApp to compute your protected data.
+
+
When you protect your data, you can authorize specific users and applications to access it. This means an authorized user will be able to use an authorized iApp to compute your protected data.
## ๐ The Authorization Flow
@@ -55,8 +55,8 @@ Here is a simple diagram to explain the process:
## ๐ Grant the iApp Access to your Data
-
-
Remember the iApp address you saved from the previous chapter? You'll need it now to grant access to your protected data.
+
+
Remember the iApp address you saved from the previous chapter? You'll need it now to grant access to your protected data.
@@ -80,7 +80,7 @@ const grantedAccess = await dataProtectorCore.grantAccess({
- ๐ป **authorizedApp**: The iApp address you want to authorize
- ๐ค **authorizedUser**: User's wallet address (0x... means all users)
-
+
As we don't have the Bob's wallet address, we'll use the zero address to grant access to all users.
diff --git a/src/get-started/overview/protected-data.md b/src/get-started/overview/protected-data.md
index dff4f8e6..d622e3d7 100644
--- a/src/get-started/overview/protected-data.md
+++ b/src/get-started/overview/protected-data.md
@@ -12,8 +12,8 @@ Protected Data refers to any data encrypted using the **iExec Data Protector
tool**. This Turnkey Privacy encryption solution enables users to protect,
manage and monetize their data within the Web3 ecosystem effortlessly.
-
-
Unlike standard datasets, Protected Data exposes its data types on-chain (indicating types like email addresses or photos). This lets anyone identify entries with matching types.
+
+
Unlike standard datasets, Protected Data exposes its data types on-chain (indicating types like email addresses or photos). This lets anyone identify entries with matching types.
## Key Concepts
@@ -185,7 +185,7 @@ manage and monetize their data within the Web3 ecosystem effortlessly.
-
Ready to protect your data? Start with our DataProtector guides. Learn how to secure sensitive information while unlocking its value.
+
Ready to protect your data? Start with our DataProtector guides. Learn how to secure sensitive information while unlocking its value.
## Next Steps
@@ -194,12 +194,12 @@ manage and monetize their data within the Web3 ecosystem effortlessly.
diff --git a/src/get-started/overview/workerpool.md b/src/get-started/overview/workerpool.md
index 86ff86c6..49231e87 100644
--- a/src/get-started/overview/workerpool.md
+++ b/src/get-started/overview/workerpool.md
@@ -10,8 +10,8 @@ A **Workerpool** is a group of computing machines (workers) managed by a
**Workerpool Manager** that provides computational resources to execute iApp in
secure environments on the iExec network.
-
-
Think of a workerpool as a computing cluster where your iApp runs. Each workerpool consists of multiple workers (machines) coordinated by a manager who ensures tasks are executed efficiently and securely.
+
+
Think of a workerpool as a computing cluster where your iApp runs. Each workerpool consists of multiple workers (machines) coordinated by a manager who ensures tasks are executed efficiently and securely.
## Key Concepts
@@ -137,7 +137,7 @@ secure environments on the iExec network.
## Getting Started
-
Want to use workerpool? Start building iApp and the protocol will handle workerpool selection automatically.
+
Want to use workerpool? Start building iApp and the protocol will handle workerpool selection automatically.
## Next Steps
diff --git a/src/get-started/tooling-and-explorers/bridge.md b/src/get-started/tooling-and-explorers/bridge.md
index 547fa1ac..059ee34d 100644
--- a/src/get-started/tooling-and-explorers/bridge.md
+++ b/src/get-started/tooling-and-explorers/bridge.md
@@ -69,7 +69,7 @@ RLC tokens between Ethereum and Arbitrum mainnet in both directions.
link-url="https://stargate.finance/bridge"
/>
-
+
๐ Bidirectional Bridge
The Stargate bridge interface automatically detects your wallet's network and available RLC tokens. The process is similar in both directions - simply select the appropriate source and destination networks to transfer RLC between Ethereum and Arbitrum seamlessly.
@@ -100,7 +100,7 @@ Bellecour, RLC becomes xRLC, the native asset of the Bellecour network.
link-url="https://bridge-bellecour.iex.ec/"
/>
-
+
๐ Bidirectional Bridge
The bridge interface automatically detects your wallet's network and available tokens. The process is similar in both directions - simply switch to the appropriate network (source chain) in your wallet and refresh the page to update the bridge direction, then the bridge will handle the conversion between RLC and xRLC seamlessly.
diff --git a/src/get-started/tooling-and-explorers/builder-dashboard.md b/src/get-started/tooling-and-explorers/builder-dashboard.md
index ab5be872..9327c1c5 100644
--- a/src/get-started/tooling-and-explorers/builder-dashboard.md
+++ b/src/get-started/tooling-and-explorers/builder-dashboard.md
@@ -107,7 +107,7 @@ deployed confidential iApp with detailed statistics and user insights.
### My Confidential iApp Overview
-
+
๐ฑ iApp Portfolio Metrics
Deployed Applications: Complete list of all your confidential iApp currently deployed
diff --git a/src/get-started/tooling-and-explorers/iexec-explorer.md b/src/get-started/tooling-and-explorers/iexec-explorer.md
index 312b491f..86af6ee3 100644
--- a/src/get-started/tooling-and-explorers/iexec-explorer.md
+++ b/src/get-started/tooling-and-explorers/iexec-explorer.md
@@ -62,7 +62,7 @@ Explorer displays data for the network you choose.
-
+
๐๏ธ Understanding iExec Architecture
Deals are the fundamental orchestration unit - each deal coordinates a set of different stakeholders that share resources and execution parameters to execute a confidential computation task.
Use the GraphQL explorer's auto-completion feature to discover available fields and build complex queries. The schema documentation is always up-to-date with the latest protocol changes.
diff --git a/src/get-started/welcome.md b/src/get-started/welcome.md
index 2bea8af9..519e3ef2 100644
--- a/src/get-started/welcome.md
+++ b/src/get-started/welcome.md
@@ -25,8 +25,8 @@ deserves the power** to build groundbreaking applications while **keeping user
data completely secure**. Your users deserve **absolute confidence** that their
privacy is protected.
-
-
iExec solves this with Turnkey Privacy - a toolkit that simplifies data protection, management, and secure computation, even in untrusted environments. We believe privacy should be plug-and-play simple, not an afterthought.
+
+
iExec solves this with Turnkey Privacy - a toolkit that simplifies data protection, management, and secure computation, even in untrusted environments. We believe privacy should be plug-and-play simple, not an afterthought.
## ๐ ๏ธ How we Make it Happen
@@ -161,7 +161,7 @@ Confidential Computing made easy
-
The next chapters guide you through our Hello World journey. This 30-minute start teaches you everything about iExec. You'll learn protecting sensitive data and building and deploying confidential apps.
+
The next chapters guide you through our Hello World journey. This 30-minute start teaches you everything about iExec. You'll learn protecting sensitive data and building and deploying confidential apps.
Need help setting up or got some questions? Join our Discord Community for support!
-
+::: tip Need help setting up or got some questions?
+
+Join our Discord
+Community for support!
+
+:::
diff --git a/src/get-started/helloWorld/1-overview.md b/src/get-started/helloWorld/1-overview.md
index 43f3ce65..80e26910 100644
--- a/src/get-started/helloWorld/1-overview.md
+++ b/src/get-started/helloWorld/1-overview.md
@@ -64,9 +64,13 @@ import Container from '../../components/Container.vue'
-
-
This is where iExec comes in! We provide tools to easily add privacy and monetization features into your iApp.
-
+::: tip
+
+This is where iExec comes in! We provide tools to easily add
+privacy and monetization features into your
+iApp.
+
+:::
## ๐ท How do we Solve it?
@@ -78,10 +82,13 @@ Execution Environment (TEE) and
Confidential
Computing technologies.
-
-
Our technology allows users to control the ownership,
- confidentiality, and monetization of their data and digital assets within the Web3 ecosystem.
-
+::: tip
+
+Our technology allows users to control the ownership,
+confidentiality, and monetization of their
+data and digital assets within the Web3 ecosystem.
+
+:::
## ๐ The Three Key Elements?
@@ -106,9 +113,15 @@ iExec combines three fundamental elements that work together seamlessly:
- Regain ownership of your data
- Provides transparent governance rules for data access
-
-
By merging blockchain technology with confidential computing, we've pioneered DeCC (Decentralized Confidential Computing) to take privacy and security to the next level in Web3 ecosystems.
-
+::: tip
+
+By merging blockchain technology with confidential
+computing, we've pioneered
+DeCC
+(Decentralized Confidential Computing) to take privacy and
+security to the next level in Web3 ecosystems.
+
+:::
### ๐งธ DeCC Explained Like You're 5
diff --git a/src/get-started/helloWorld/2-protectData.md b/src/get-started/helloWorld/2-protectData.md
index 18db404f..d372c773 100644
--- a/src/get-started/helloWorld/2-protectData.md
+++ b/src/get-started/helloWorld/2-protectData.md
@@ -20,9 +20,12 @@ import Container from '../../components/Container.vue'
Let's follow Alice as she learns how to protect her data using DataProtector on Bob's iApp, our developer tool for protecting data creation and management.
-
-
Protected data is encrypted data that remains confidential throughout its entire lifecycle - during storage, transfer and processing.
-
+::: tip
+
+Protected data is encrypted data that remains confidential
+throughout its entire lifecycle - during storage, transfer and processing.
+
+:::
## ๐งฉ DataProtector, Key Features
@@ -53,9 +56,12 @@ their DApp with these key features:
## ๐งฉ What Happened Under the Hood
-
-
You won't believe how easy it is to protect your data with DataProtector. Just a few lines of code, and you're done!
-
+::: tip
+
+You won't believe how easy it is to protect your data with DataProtector. Just a
+few lines of code, and you're done!
+
+:::
To use it, simply call the `protectData` method from the **DataProtector SDK**
with two arguments.
@@ -171,9 +177,13 @@ const { address: protectedDataAddress } = await dataProtectorCore.protectData({
});
```
-
-
Check out our code sandbox for ready-to-use examples!
-
+::: tip
+
+Check out our
+code
+sandbox for ready-to-use examples!
+
+:::
## ๐ฏ Key Takeaways
diff --git a/src/get-started/helloWorld/3-buildIApp.md b/src/get-started/helloWorld/3-buildIApp.md
index d8deba32..20df5d3b 100644
--- a/src/get-started/helloWorld/3-buildIApp.md
+++ b/src/get-started/helloWorld/3-buildIApp.md
@@ -74,9 +74,14 @@ Transfer, sell or rent protected content to authorized users.
[Github](https://github.com/iExecBlockchainComputing/dataprotector-sdk/tree/main/packages/protected-data-delivery-dapp)
| [Documentation](/references/dataProtector/dataProtectorSharing)
-
-
These are just a few examples, the possibilities are endless. Want to explore iApp Generator? Check out our documentation and see what you can build!
-
+::: tip
+
+These are just a few examples, the possibilities are endless. Want to explore
+iApp Generator? Check out our
+documentation and see
+what you can build!
+
+:::
## ๐พ Installation (Win / Mac / Linux)
@@ -195,9 +200,12 @@ You will be prompted with the following message:
-
-
We recommend selecting "Hello World" to quickly discover how iApp works! use advanced only if you are familiar with iExec.
-
+::: tip
+
+We recommend selecting "Hello World" to quickly discover how
+iApp works! use advanced only if you are familiar with iExec.
+
+:::
- An iApp project is setup with the selected language
- An ethereum wallet has been created (we use it to sign the iApp creation
@@ -282,11 +290,14 @@ following steps:
The `iapp test` command uses your local Docker to build and execute the app,
simulating how it will run in the iExec network's TEE environment.
-
-
Common Issues:
+::: tip
+
+Common Issues:
+
- If you get Error: Docker daemon is not accessible: Make sure Docker is installed and running.
-
- If you get Error: Failed to locate iApp project root: Ensure you are in your project folder before proceeding.
-
+
- If you get Error: Failed to locate iApp project root: Ensure you are in your project folder before proceeding.
+
+ :::
### ๐งฉ Using Arguments
@@ -310,9 +321,12 @@ default protectedData mock.
iapp test --protectedData default
```
-
-
You can check how args and protectedData are processed in src/app.js or src/app.py
-
+::: tip
+
+You can check how args and protectedData are processed in
+src/app.js or src/app.py
+
+:::
## ๐ Deploy your iApp
@@ -369,8 +383,11 @@ Once you have your token, you can deploy your iApp.
/>
-
-
๐ Make sure to save your iApp address after deployment - you'll need it later!
+::: tip
+
+๐ Make sure to save your iApp address after deployment -
+you'll need it later!
+
You can find your iApp address in the iexec-app.json file in your project folder.
โ ๏ธ If you encounter issues during deployment, make sure the Docker BuildKit feature is enabled and supports AMD64 architecture:
The output should include linux/amd64 in the list of supported platforms. If not, update to the latest Docker Desktop version which includes these requirements.
โ ๏ธ If you set the wrong Docker username, you can change it by editing the iapp.config.json file
-
+
+:::
## ๐ Run your iApp
diff --git a/src/get-started/helloWorld/4-manageDataAccess.md b/src/get-started/helloWorld/4-manageDataAccess.md
index 7e78112a..810edec2 100644
--- a/src/get-started/helloWorld/4-manageDataAccess.md
+++ b/src/get-started/helloWorld/4-manageDataAccess.md
@@ -23,9 +23,13 @@ const { protectedDataAddress } = useWalletConnection();
Alice will learn how to grant access to her protected data and manage who can use it.
-
-
When you protect your data, you can authorize specific users and applications to access it. This means an authorized user will be able to use an authorized iApp to compute your protected data.
-
+::: tip
+
+When you protect your data, you can authorize specific users
+and applications to access it. This means an authorized user
+will be able to use an authorized iApp to compute your protected data.
+
+:::
## ๐ The Authorization Flow
@@ -55,9 +59,12 @@ Here is a simple diagram to explain the process:
## ๐ Grant the iApp Access to your Data
-
-
Remember the iApp address you saved from the previous chapter? You'll need it now to grant access to your protected data.
-
+::: tip
+
+Remember the iApp address you saved from the previous chapter?
+You'll need it now to grant access to your protected data.
+
+:::
@@ -80,9 +87,12 @@ const grantedAccess = await dataProtectorCore.grantAccess({
- ๐ป **authorizedApp**: The iApp address you want to authorize
- ๐ค **authorizedUser**: User's wallet address (0x... means all users)
-
-
As we don't have the Bob's wallet address, we'll use the zero address to grant access to all users.
-
+::: tip
+
+As we don't have the Bob's wallet address, we'll use the zero address to grant
+access to all users.
+
+:::
## ๐ Time to Run
diff --git a/src/get-started/overview/protected-data.md b/src/get-started/overview/protected-data.md
index d622e3d7..9b47486e 100644
--- a/src/get-started/overview/protected-data.md
+++ b/src/get-started/overview/protected-data.md
@@ -12,9 +12,13 @@ Protected Data refers to any data encrypted using the **iExec Data Protector
tool**. This Turnkey Privacy encryption solution enables users to protect,
manage and monetize their data within the Web3 ecosystem effortlessly.
-
-
Unlike standard datasets, Protected Data exposes its data types on-chain (indicating types like email addresses or photos). This lets anyone identify entries with matching types.
-
+::: tip
+
+Unlike standard datasets, Protected Data exposes its data types
+on-chain (indicating types like email addresses or photos). This lets
+anyone identify entries with matching types.
+
+:::
## Key Concepts
diff --git a/src/get-started/overview/workerpool.md b/src/get-started/overview/workerpool.md
index 49231e87..4227bd87 100644
--- a/src/get-started/overview/workerpool.md
+++ b/src/get-started/overview/workerpool.md
@@ -10,9 +10,13 @@ A **Workerpool** is a group of computing machines (workers) managed by a
**Workerpool Manager** that provides computational resources to execute iApp in
secure environments on the iExec network.
-
-
Think of a workerpool as a computing cluster where your iApp runs. Each workerpool consists of multiple workers (machines) coordinated by a manager who ensures tasks are executed efficiently and securely.
-
+::: tip
+
+Think of a workerpool as a computing cluster where your iApp
+runs. Each workerpool consists of multiple workers (machines) coordinated by a
+manager who ensures tasks are executed efficiently and securely.
+
+:::
## Key Concepts
diff --git a/src/get-started/tooling-and-explorers/bridge.md b/src/get-started/tooling-and-explorers/bridge.md
index 059ee34d..d0f194ac 100644
--- a/src/get-started/tooling-and-explorers/bridge.md
+++ b/src/get-started/tooling-and-explorers/bridge.md
@@ -69,10 +69,12 @@ RLC tokens between Ethereum and Arbitrum mainnet in both directions.
link-url="https://stargate.finance/bridge"
/>
-
+::: tip
+
๐ Bidirectional Bridge
The Stargate bridge interface automatically detects your wallet's network and available RLC tokens. The process is similar in both directions - simply select the appropriate source and destination networks to transfer RLC between Ethereum and Arbitrum seamlessly.
-
+
+:::
## ๐ Bellecour Bridge
@@ -100,10 +102,12 @@ Bellecour, RLC becomes xRLC, the native asset of the Bellecour network.
link-url="https://bridge-bellecour.iex.ec/"
/>
-
+::: tip
+
๐ Bidirectional Bridge
The bridge interface automatically detects your wallet's network and available tokens. The process is similar in both directions - simply switch to the appropriate network (source chain) in your wallet and refresh the page to update the bridge direction, then the bridge will handle the conversion between RLC and xRLC seamlessly.
-
+
+:::
## ๐ Security & Audits
diff --git a/src/get-started/tooling-and-explorers/builder-dashboard.md b/src/get-started/tooling-and-explorers/builder-dashboard.md
index 9327c1c5..b4378beb 100644
--- a/src/get-started/tooling-and-explorers/builder-dashboard.md
+++ b/src/get-started/tooling-and-explorers/builder-dashboard.md
@@ -107,7 +107,8 @@ deployed confidential iApp with detailed statistics and user insights.
### My Confidential iApp Overview
-
+::: tip
+
๐ฑ iApp Portfolio Metrics
Deployed Applications: Complete list of all your confidential iApp currently deployed
@@ -115,7 +116,8 @@ deployed confidential iApp with detailed statistics and user insights.
Unique Users: Track total unique users who have run each application
Revenue Insights: Track earnings and profitability per application
-
+
+:::
### Application Statistics Dashboard
diff --git a/src/get-started/tooling-and-explorers/iexec-explorer.md b/src/get-started/tooling-and-explorers/iexec-explorer.md
index 86af6ee3..378343b8 100644
--- a/src/get-started/tooling-and-explorers/iexec-explorer.md
+++ b/src/get-started/tooling-and-explorers/iexec-explorer.md
@@ -62,7 +62,8 @@ Explorer displays data for the network you choose.
-
+::: tip
+
๐๏ธ Understanding iExec Architecture
Deals are the fundamental orchestration unit - each deal coordinates a set of different stakeholders that share resources and execution parameters to execute a confidential computation task.
Each Deal brings together:
@@ -72,7 +73,8 @@ Explorer displays data for the network you choose.
Dataset: The data that will be processed by the iApp
Workerpool: The decentralized network of workers providing computation power
Use the GraphQL explorer's auto-completion feature to discover available fields and build complex queries. The schema documentation is always up-to-date with the latest protocol changes.
-
+
+:::
From 8a67b5433fe65427b912d78c36e2071628aabc18 Mon Sep 17 00:00:00 2001
From: ErwanDecoster
Date: Mon, 25 Aug 2025 15:09:34 +0200
Subject: [PATCH 09/29] fix: remove unnecessary class from iApp generator tool
link for improved readability
---
src/get-started/helloWorld/3-buildIApp.md | 2 +-
src/get-started/helloWorld/5-bonusChapter.md | 2 +-
src/get-started/overview/iapp.md | 2 +-
3 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/src/get-started/helloWorld/3-buildIApp.md b/src/get-started/helloWorld/3-buildIApp.md
index 3dd83aa2..056b359a 100644
--- a/src/get-started/helloWorld/3-buildIApp.md
+++ b/src/get-started/helloWorld/3-buildIApp.md
@@ -11,7 +11,7 @@ description:
Time to build!
-
Let's build an iApp that can process protected data in a secure environment using the iExec iApp generator tool. This tool helps you create, test and deploy iApp with just a few commands.
+
Let's build an iApp that can process protected data in a secure environment using the iExec iApp generator tool. This tool helps you create, test and deploy iApp with just a few commands.
If you wanna explore and deep dive in the CLI. You can check the
diff --git a/src/get-started/helloWorld/5-bonusChapter.md b/src/get-started/helloWorld/5-bonusChapter.md
index 459ee0c1..2a8fb07c 100644
--- a/src/get-started/helloWorld/5-bonusChapter.md
+++ b/src/get-started/helloWorld/5-bonusChapter.md
@@ -11,7 +11,7 @@ description:
Congratulations!
-
You've successfully completed the Hello World journey and learned how to protect data, deploy iApp, and manage data access. Now it's time to claim your rewards! ๐
+
You've successfully completed the Hello World journey and learned how to protect data, deploy iApp, and manage data access. Now it's time to claim your rewards! ๐
## ๐ Any Questions?
diff --git a/src/get-started/overview/iapp.md b/src/get-started/overview/iapp.md
index 88bc0578..13dfe440 100644
--- a/src/get-started/overview/iapp.md
+++ b/src/get-started/overview/iapp.md
@@ -126,7 +126,7 @@ the TEE execution environment.
Time to build!
-
Let's build an iApp that can process protected data in a secure environment using the iExec iApp generator tool. This tool helps you create, test and deploy iApp with just a few commands.
+
Let's build an iApp that can process protected data in a secure environment using the iExec iApp generator tool. This tool helps you create, test and deploy iApp with just a few commands.
Imagine you're building a decentralized application (iApp) that needs to handle sensitive user data, for example:
+Imagine you're building a decentralized application (iApp) that needs to
+**handle sensitive user data**, for example:
+
@@ -66,9 +68,8 @@ import Container from '../../components/Container.vue'
::: tip
-This is where iExec comes in! We provide tools to easily add
-privacy and monetization features into your
-iApp.
+This is where **iExec** comes in! We provide tools to easily add **privacy** and
+**monetization** features into your iApp.
:::
@@ -84,9 +85,9 @@ Computing technologies.
::: tip
-Our technology allows users to control the ownership,
-confidentiality, and monetization of their
-data and digital assets within the Web3 ecosystem.
+Our technology allows users to control the **ownership**, **confidentiality**,
+and **monetization** of their data and digital assets within the **Web3**
+ecosystem.
:::
@@ -115,11 +116,11 @@ iExec combines three fundamental elements that work together seamlessly:
::: tip
-By merging blockchain technology with confidential
-computing, we've pioneered
-DeCC
-(Decentralized Confidential Computing) to take privacy and
-security to the next level in Web3 ecosystems.
+By merging **blockchain technology** with **confidential computing**, we've
+pioneered
+**DeCC**
+(Decentralized Confidential Computing) to take **privacy** and **security** to
+the next level in **Web3** ecosystems.
:::
diff --git a/src/get-started/helloWorld/2-protectData.md b/src/get-started/helloWorld/2-protectData.md
index 19943e98..f4d71f6d 100644
--- a/src/get-started/helloWorld/2-protectData.md
+++ b/src/get-started/helloWorld/2-protectData.md
@@ -22,8 +22,8 @@ import Container from '../../components/Container.vue'
::: tip
-Protected data is encrypted data that remains confidential
-throughout its entire lifecycle - during storage, transfer and processing.
+**Protected data** is encrypted data that remains confidential throughout its
+entire lifecycle - during storage, transfer and processing.
:::
diff --git a/src/get-started/helloWorld/3-buildIApp.md b/src/get-started/helloWorld/3-buildIApp.md
index 056b359a..95dfe7e4 100644
--- a/src/get-started/helloWorld/3-buildIApp.md
+++ b/src/get-started/helloWorld/3-buildIApp.md
@@ -202,8 +202,8 @@ You will be prompted with the following message:
::: tip
-We recommend selecting "Hello World" to quickly discover how
-iApp works! use advanced only if you are familiar with iExec.
+We recommend selecting **"Hello World"** to quickly discover how iApp works! use
+**advanced** only if you are familiar with iExec.
:::
@@ -387,8 +387,8 @@ Once you have your token, you can deploy your iApp.
::: tip
-๐ Make sure to save your iApp address after deployment -
-you'll need it later!
+๐ Make sure to save your **iApp address** after deployment - you'll need it
+later!
You can find your iApp address in the iexec-app.json file in your
project folder.
diff --git a/src/get-started/helloWorld/4-manageDataAccess.md b/src/get-started/helloWorld/4-manageDataAccess.md
index be6a828d..95dcae50 100644
--- a/src/get-started/helloWorld/4-manageDataAccess.md
+++ b/src/get-started/helloWorld/4-manageDataAccess.md
@@ -25,9 +25,9 @@ const { protectedDataAddress } = useWalletConnection();
::: tip
-When you protect your data, you can authorize specific users
-and applications to access it. This means an authorized user
-will be able to use an authorized iApp to compute your protected data.
+When you protect your data, you can authorize specific **users** and
+**applications** to access it. This means an authorized user will be able to use
+an authorized iApp to compute your protected data.
:::
@@ -61,8 +61,8 @@ Here is a simple diagram to explain the process:
::: tip
-Remember the iApp address you saved from the previous chapter?
-You'll need it now to grant access to your protected data.
+Remember the **iApp address** you saved from the previous chapter? You'll need
+it now to grant access to your protected data.
:::
diff --git a/src/get-started/helloWorld/5-bonusChapter.md b/src/get-started/helloWorld/5-bonusChapter.md
index 2a8fb07c..a0a2861d 100644
--- a/src/get-started/helloWorld/5-bonusChapter.md
+++ b/src/get-started/helloWorld/5-bonusChapter.md
@@ -31,8 +31,8 @@ description:
Need help setting up or got some questions? Join our
-Discord
-Community for support!
+**Discord
+Community** for support!
diff --git a/src/get-started/overview/protected-data.md b/src/get-started/overview/protected-data.md
index a906e72d..ef4e7fac 100644
--- a/src/get-started/overview/protected-data.md
+++ b/src/get-started/overview/protected-data.md
@@ -14,9 +14,9 @@ manage and monetize their data within the Web3 ecosystem effortlessly.
::: tip
-Unlike standard datasets, Protected Data exposes its data types
-on-chain (indicating types like email addresses or photos). This lets
-anyone identify entries with matching types.
+Unlike standard datasets, Protected Data exposes its **data types on-chain**
+(indicating types like email addresses or photos). This lets anyone **identify
+entries with matching types**.
:::
@@ -190,9 +190,8 @@ anyone identify entries with matching types.
-Ready to protect your data? Start with our DataProtector
-guides. Learn how to secure sensitive information while unlocking its
-value.
+Ready to protect your data? Start with our **DataProtector guides**. Learn how
+to secure sensitive information while unlocking its value.
diff --git a/src/get-started/overview/workerpool.md b/src/get-started/overview/workerpool.md
index 41232bc7..fdde73b0 100644
--- a/src/get-started/overview/workerpool.md
+++ b/src/get-started/overview/workerpool.md
@@ -12,9 +12,9 @@ secure environments on the iExec network.
::: tip
-Think of a workerpool as a computing cluster where your iApp
-runs. Each workerpool consists of multiple workers (machines) coordinated by a
-manager who ensures tasks are executed efficiently and securely.
+Think of a workerpool as a **computing cluster** where your iApp runs. Each
+workerpool consists of multiple workers (machines) coordinated by a manager who
+ensures tasks are executed efficiently and securely.
:::
@@ -142,8 +142,8 @@ manager who ensures tasks are executed efficiently and securely.
-Want to use workerpool? Start building iApp and the protocol
-will handle workerpool selection automatically.
+Want to **use workerpool**? Start building iApp and the protocol will handle
+workerpool selection automatically.
diff --git a/src/get-started/tooling-and-explorers/builder-dashboard.md b/src/get-started/tooling-and-explorers/builder-dashboard.md
index a087d30c..0ba8bad9 100644
--- a/src/get-started/tooling-and-explorers/builder-dashboard.md
+++ b/src/get-started/tooling-and-explorers/builder-dashboard.md
@@ -54,11 +54,10 @@ monitoring with detailed task execution history and real-time balance tracking.
::: warning ๐ฐ Voucher Balance Overview
-- Current Balance: View your remaining voucher credits and
- compute capacity
-- Claim New Vouchers: Request additional vouchers directly from
- the dashboard
-- Expiration Alerts: Get notified before vouchers expire
+- **Current Balance**: View your remaining voucher credits and compute capacity
+- **Claim New Vouchers**: Request additional vouchers directly from the
+ dashboard
+- **Expiration Alerts**: Get notified before vouchers expire
:::
@@ -110,10 +109,12 @@ deployed confidential iApp with detailed statistics and user insights.
::: tip ๐ฑ iApp Portfolio Metrics
-- Deployed Applications: Complete list of all your confidential iApp currently deployed
-- Execution Statistics: See exactly how many times each iApp has been executed
-- Unique Users: Track total unique users who have run each application
-- Revenue Insights: Track earnings and profitability per application<
+- **Deployed Applications**: Complete list of all your confidential iApp
+ currently deployed
+- **Execution Statistics**: See exactly how many times each iApp has been
+ executed
+- **Unique Users**: Track total unique users who have run each application
+- **Revenue Insights**: Track earnings and profitability per application<
:::
diff --git a/src/get-started/tooling-and-explorers/iexec-explorer.md b/src/get-started/tooling-and-explorers/iexec-explorer.md
index 0ced76cc..13d99c5d 100644
--- a/src/get-started/tooling-and-explorers/iexec-explorer.md
+++ b/src/get-started/tooling-and-explorers/iexec-explorer.md
@@ -64,14 +64,17 @@ Explorer displays data for the network you choose.
::: tip ๐๏ธ Understanding iExec Architecture
-Deals are the fundamental orchestration unit - each deal coordinates a set of different stakeholders that share resources and execution parameters to execute a confidential computation task.
+**Deals** are the fundamental orchestration unit - each deal coordinates a set
+of different stakeholders that share resources and execution parameters to
+execute a confidential computation task.
-Each Deal brings together:
+Each **Deal** brings together:
-- Requester: The entity requesting the computation
-- iApp: The confidential computation logic
-- Dataset: The data that will be processed by the iApp
-- Workerpool: The decentralized network of workers providing computation power
+- **Requester**: The entity requesting the computation
+- **iApp**: The confidential computation logic
+- **Dataset**: The data that will be processed by the iApp
+- **Workerpool**: The decentralized network of workers providing computation
+ power
:::
diff --git a/src/get-started/welcome.md b/src/get-started/welcome.md
index b7549dd2..2e055de2 100644
--- a/src/get-started/welcome.md
+++ b/src/get-started/welcome.md
@@ -27,10 +27,9 @@ privacy is protected.
::: tip
-iExec solves this with Turnkey Privacy - a toolkit that
-simplifies data protection, management, and secure computation, even in
-untrusted environments. We believe privacy should be plug-and-play
-simple, not an afterthought.
+iExec solves this with **Turnkey Privacy** - a toolkit that simplifies data
+protection, management, and secure computation, even in untrusted environments.
+We believe privacy should be **plug-and-play simple**, not an afterthought.
:::
@@ -168,9 +167,8 @@ Confidential Computing made easy
The next chapters guide you through our **Hello World journey**. This 30-minute
-start teaches you everything about iExec. You'll learn protecting
-sensitive data and building and deploying confidential
-apps.
+start teaches you everything about iExec. You'll learn **protecting sensitive
+data** and **building and deploying confidential apps**.
@@ -183,19 +181,19 @@ Ready to build privacy-first applications? Choose your path:
โก
- Quick Start: Follow our Hello World guide to build your first confidential app in minutes
+ Quick Start: Follow our Hello World guide to build your first confidential app in minutes
๐
- Explore Use Cases: Browse real-world examples to see what you can build with iExec
+ Explore Use Cases: Browse real-world examples to see what you can build with iExec
๐ฌ
- Join the Community: Connect with other builders and get support on our Discord
+ Join the Community: Connect with other builders and get support on our Discord
@@ -210,11 +208,11 @@ applications. Let's build something amazing together._ ๐
Be part of a growing movement of developers, data owners, and privacy advocates
-who are reshaping how the world handles sensitive data.
+who are **reshaping how the world handles sensitive data**.
When you build with iExec, you're not just solving a technical
-challengeโyou're championing user rights and digital
-sovereignty. Every application you create makes the web more private,
-more secure, and more trustworthy for everyone.
+challengeโ**you're championing user rights and digital sovereignty**. Every
+application you create makes the web more private, more secure, and more
+trustworthy for everyone.
From a0b5fdfc1998c667029200e537a2fe4700f6013f Mon Sep 17 00:00:00 2001
From: ErwanDecoster
Date: Mon, 25 Aug 2025 15:26:37 +0200
Subject: [PATCH 11/29] fix: update link formatting for consistency in iExec
overview documentation
---
src/get-started/helloWorld/1-overview.md | 8 ++++----
1 file changed, 4 insertions(+), 4 deletions(-)
diff --git a/src/get-started/helloWorld/1-overview.md b/src/get-started/helloWorld/1-overview.md
index 10291138..1e1f8394 100644
--- a/src/get-started/helloWorld/1-overview.md
+++ b/src/get-started/helloWorld/1-overview.md
@@ -78,10 +78,10 @@ This is where **iExec** comes in! We provide tools to easily add **privacy** and
Unlike traditional tools, iExec protects your data throughout its entire
lifecycle - during storage, transfer, and even while **being processed by
applications.** This is made possible thanks to
-Trusted
-Execution Environment (TEE) and
-Confidential
-Computing technologies.
+**Trusted
+Execution Environment (TEE)** and
+**Confidential
+Computing** technologies.
::: tip
From ee7bc8cdd5ae067778a1b949ffc3e1e24459ddc8 Mon Sep 17 00:00:00 2001
From: ErwanDecoster
Date: Mon, 25 Aug 2025 16:35:08 +0200
Subject: [PATCH 12/29] refactor: simplify content structure by removing
unnecessary HTML wrappers for improved readability
---
src/get-started/welcome.md | 82 +++++---------------------------------
1 file changed, 10 insertions(+), 72 deletions(-)
diff --git a/src/get-started/welcome.md b/src/get-started/welcome.md
index 2e055de2..447076b2 100644
--- a/src/get-started/welcome.md
+++ b/src/get-started/welcome.md
@@ -38,62 +38,19 @@ We believe privacy should be **plug-and-play simple**, not an afterthought.
iExec provides Turnkey Privacy tools that make confidential computing simple and
actionable:
-
-
-
- ๐
-
- Privacy: Integrate confidentiality features without managing complex infrastructure
-
-
-
- ๐ฎ
-
- Governance and Ownership: Control your assets through orders, choose who can access your data, with which privacy applications, and at what price
-
-
-
- โ๏ธ
-
- Multi-Chain Interoperability: Build privacy-first applications on supported networks
-
-
-
- ๐ง
-
- Available Tools: Composable toolkit, SDK, and ready-to-use components for straightforward development
-
-
-
-
+- **Privacy:** Integrate confidentiality features without managing complex infrastructure
+- **Governance and Ownership:** Control your assets through orders, choose who can access your data, with which privacy applications, and at what price
+- **Multi-Chain Interoperability:** Build privacy-first applications on supported networks
+- **Available Tools:** Composable toolkit, SDK, and ready-to-use components for straightforward development
## ๐ง What we Provide
Ready-to-use components to protect sensitive data and computation:
-
-
-
- ๐
-
- DataProtector: Secure and control access to sensitive information
-
-
-
- โก
-
- iApp Generator: Bootstrap your Privacy Apps on TEEs.
+- **DataProtector:** Secure and control access to sensitive information
+- **iApp Generator:** Bootstrap your Privacy Apps on TEEs.
Confidential Computing made easy
-
-
-
- ๐ก๏ธ
-
- Decentralized Confidential Computing: Process data securely in secure and confidential environments while controlling access and monetization through blockchain
-
-
-
-
+- **Decentralized Confidential Computing:** Process data securely in secure and confidential environments while controlling access and monetization through blockchain
## ๐ก Real-world Use Cases
@@ -176,28 +133,9 @@ data** and **building and deploying confidential apps**.
Ready to build privacy-first applications? Choose your path:
-
-
-
- โก
-
- Quick Start: Follow our Hello World guide to build your first confidential app in minutes
-
-
-
- ๐
-
- Explore Use Cases: Browse real-world examples to see what you can build with iExec
-
-
-
- ๐ฌ
-
- Join the Community: Connect with other builders and get support on our Discord
-
-
-
-
+- **Quick Start:** Follow our Hello World guide to build your first confidential app in minutes
+- **Explore Use Cases:** Browse real-world examples to see what you can build with iExec
+- **Join the Community:** Connect with other builders and get support on our Discord
---
From 4d44e484ff9a49671688690e6ecb4cca55565281 Mon Sep 17 00:00:00 2001
From: ErwanDecoster
Date: Mon, 25 Aug 2025 16:35:32 +0200
Subject: [PATCH 13/29] refactor: streamline content structure by removing
unnecessary HTML elements for improved readability
---
src/get-started/overview/protected-data.md | 122 +++------------------
src/get-started/overview/rlc.md | 34 +++---
2 files changed, 34 insertions(+), 122 deletions(-)
diff --git a/src/get-started/overview/protected-data.md b/src/get-started/overview/protected-data.md
index ef4e7fac..78aac4ab 100644
--- a/src/get-started/overview/protected-data.md
+++ b/src/get-started/overview/protected-data.md
@@ -24,120 +24,32 @@ entries with matching types**.
### Data Governance
-
-
-
-
-
- โข
-
- You own your data: The original data never leaves your control
-
-
-
- โข
-
- Granular permissions: Decide who can access and use your data
-
-
-
- โข
-
- Revocable access: Grant and revoke permissions at any time
-
-
-
-
+- You own your data: The original data never leaves your control
+- Granular permissions: Decide who can access and use your data
+- Revocable access: Grant and revoke permissions at any time
### Privacy-preserving Computation
-
-
-
-
-
- โข
-
- Encrypted Processing: Maintains a complete chain of trust.
-
-
-
- โข
-
- TEE (Trusted Execution Environment): Secure enclaves protect data during processing
-
-
-
- โข
-
- Secret storage: iExec's protocol secrets in a TEE database.
-
-
-
-
+- Encrypted Processing: Maintains a complete chain of trust.
+- TEE (Trusted Execution Environment): Secure enclaves protect data during processing
+- Secret storage: iExec's protocol secrets in a TEE database.
### Monetization
-
-
-
-
-
- โข
-
- Data marketplaces: Sell access to your protected data
-
-
-
- โข
-
- Usage tracking: Monitor how your data is being used
-
-
-
- โข
-
- Fair compensation: Get paid for data usage
-
-
-
-
+- Data marketplaces: Sell access to your protected data
+- Usage tracking: Monitor how your data is being used
+- Fair compensation: Get paid for data usage
## How it Works
-
-
-
- 1.
-
- Protect: Encrypt and register your data on the iExec network
-
-
-
- 2.
-
- Share: Authorize specific users and applications to access your data
-
-
-
- 3.
-
- Monitor: Track usage and maintain control
-
-
-
- 4.
-
- Monetize: Earn from your data while keeping it private
-
-
-
- 5.
-
- Compute: Authorized users can compute on your data with authorized iApp
-
-
-
+
+
+1. Protect: Encrypt and register your data on the iExec network
+2. Share: Authorize specific users and applications to access your data
+3. Monitor: Track usage and maintain control
+4. Monetize: Earn from your data while keeping it private
+5. Compute: Authorized users can compute on your data with authorized iApp
+
## Use Cases
diff --git a/src/get-started/overview/rlc.md b/src/get-started/overview/rlc.md
index ebcb51a0..868891a3 100644
--- a/src/get-started/overview/rlc.md
+++ b/src/get-started/overview/rlc.md
@@ -6,11 +6,11 @@ description:
it drives privacy-first Web3 applications.
---
-
-
-
RLC Token
-
The native cryptocurrency that powers the entire iExec decentralized confidential computing ecosystem
-
+
+
+# RLC Token
+
+The native cryptocurrency that powers the entire iExec decentralized confidential computing ecosystem
RLC (Run on Lots of Computers) powers all privacy apps on iExec. Every
confidential computation requires RLC. Every piece of protected data consumed
@@ -51,21 +51,21 @@ protocols.
When you pay for a task execution with RLC, your payment is automatically and
transparently distributed to all iExec protocol participants:
-
-
๐ How Your RLC Payment is Distributed
-
- **1. App Provider** - Gets paid for providing the confidential application
-
- **2. Protected Data Provider** - Gets paid for providing access to protected confidential datasets
-
- **3. Worker** - Gets paid for running the confidential computation on their decentralized machine
-
+::: tip How Your RLC Payment is Distributed
+
+**1. App Provider** - Gets paid for providing the confidential application
+
+**2. Protected Data Provider** - Gets paid for providing access to protected confidential datasets
+
+**3. Worker** - Gets paid for running the confidential computation on their decentralized machine
+
+:::
-**๐ก Transparent:** Payments are distributed based on pricing and conditions
+**Transparent:** Payments are distributed based on pricing and conditions
defined by each provider (iApp, Protected Data, Worker) in their marketplace
orders.
-**๐ RLC Staking:** To run a task on the protocol (executing an application with
+**RLC Staking:** To run a task on the protocol (executing an application with
protected data on a decentralized workerpool), you need to **lock RLC** in the
protocol during the task period. In exchange, you receive **sRLC (staked RLC)**.
Once the task is completed, you can recover the RLC that wasn't consumed for the
@@ -73,7 +73,7 @@ task payment.
### ๐ Ecosystem Growth Metrics
-RLC operates on a utility-driven economic model where demand for confidential
+**RLC operates** on a utility-driven economic model where demand for confidential
computing services drives token value:
**Fixed Supply**: RLC has a maximum supply of 87 million tokens, ensuring
From 4ee4cc0fadfbdbb4bea986e4f94550030e99a587 Mon Sep 17 00:00:00 2001
From: ErwanDecoster
Date: Tue, 26 Aug 2025 11:18:29 +0200
Subject: [PATCH 14/29] refactor: remove emoji from headings for improved
clarity and consistency
---
.vitepress/sidebar.ts | 2 +-
src/get-started/welcome.md | 39 +++++++++++++++++++++++---------------
2 files changed, 25 insertions(+), 16 deletions(-)
diff --git a/.vitepress/sidebar.ts b/.vitepress/sidebar.ts
index a14553b0..fb43a4cb 100644
--- a/.vitepress/sidebar.ts
+++ b/.vitepress/sidebar.ts
@@ -6,7 +6,7 @@ export function getSidebar() {
{
text: 'GET STARTED',
items: [
- { text: '๐ก Welcome', link: '/get-started/welcome' },
+ { text: 'Welcome', link: '/get-started/welcome' },
{
text: 'Toolkit',
link: '/get-started/toolkit',
diff --git a/src/get-started/welcome.md b/src/get-started/welcome.md
index 447076b2..049a30be 100644
--- a/src/get-started/welcome.md
+++ b/src/get-started/welcome.md
@@ -11,14 +11,14 @@ import Banner from '../components/Banner.vue'
import Container from '../components/Container.vue'
-# ๐ก Turnkey Privacy Toolkit
+# Turnkey Privacy Toolkit
Welcome to iExec
Your complete toolkit for building privacy-first Web3 applications that protect and use sensitive data
-## ๐ค Why iExec?
+## Why iExec?
You shouldn't have to choose between innovation and privacy. **Every developer
deserves the power** to build groundbreaking applications while **keeping user
@@ -33,26 +33,32 @@ We believe privacy should be **plug-and-play simple**, not an afterthought.
:::
-## ๐ ๏ธ How we Make it Happen
+## How we Make it Happen
iExec provides Turnkey Privacy tools that make confidential computing simple and
actionable:
-- **Privacy:** Integrate confidentiality features without managing complex infrastructure
-- **Governance and Ownership:** Control your assets through orders, choose who can access your data, with which privacy applications, and at what price
-- **Multi-Chain Interoperability:** Build privacy-first applications on supported networks
-- **Available Tools:** Composable toolkit, SDK, and ready-to-use components for straightforward development
+- **Privacy:** Integrate confidentiality features without managing complex
+ infrastructure
+- **Governance and Ownership:** Control your assets through orders, choose who
+ can access your data, with which privacy applications, and at what price
+- **Multi-Chain Interoperability:** Build privacy-first applications on
+ supported networks
+- **Available Tools:** Composable toolkit, SDK, and ready-to-use components for
+ straightforward development
-## ๐ง What we Provide
+## What we Provide
Ready-to-use components to protect sensitive data and computation:
- **DataProtector:** Secure and control access to sensitive information
-- **iApp Generator:** Bootstrap your Privacy Apps on TEEs.
-Confidential Computing made easy
-- **Decentralized Confidential Computing:** Process data securely in secure and confidential environments while controlling access and monetization through blockchain
+- **iApp Generator:** Bootstrap your Privacy Apps on TEEs. Confidential
+ Computing made easy
+- **Decentralized Confidential Computing:** Process data securely in secure and
+ confidential environments while controlling access and monetization through
+ blockchain
-## ๐ก Real-world Use Cases
+## Real-world Use Cases
@@ -133,9 +139,12 @@ data** and **building and deploying confidential apps**.
Ready to build privacy-first applications? Choose your path:
-- **Quick Start:** Follow our Hello World guide to build your first confidential app in minutes
-- **Explore Use Cases:** Browse real-world examples to see what you can build with iExec
-- **Join the Community:** Connect with other builders and get support on our Discord
+- **Quick Start:** Follow our Hello World
+ guide to build your first confidential app in minutes
+- **Explore Use Cases:** Browse real-world
+ examples to see what you can build with iExec
+- **Join the Community:** Connect with other builders and get support on our
+ Discord
---
From c84767f8fcbcf719714b0296e49d8347809ddbd8 Mon Sep 17 00:00:00 2001
From: ErwanDecoster
Date: Tue, 26 Aug 2025 11:18:44 +0200
Subject: [PATCH 15/29] refactor: improve content readability by breaking long
lines into shorter ones
---
src/get-started/overview/rlc.md | 13 ++++++++-----
1 file changed, 8 insertions(+), 5 deletions(-)
diff --git a/src/get-started/overview/rlc.md b/src/get-started/overview/rlc.md
index 868891a3..b73a0bf3 100644
--- a/src/get-started/overview/rlc.md
+++ b/src/get-started/overview/rlc.md
@@ -10,7 +10,8 @@ description:
# RLC Token
-The native cryptocurrency that powers the entire iExec decentralized confidential computing ecosystem
+The native cryptocurrency that powers the entire iExec decentralized
+confidential computing ecosystem
RLC (Run on Lots of Computers) powers all privacy apps on iExec. Every
confidential computation requires RLC. Every piece of protected data consumed
@@ -55,9 +56,11 @@ transparently distributed to all iExec protocol participants:
**1. App Provider** - Gets paid for providing the confidential application
-**2. Protected Data Provider** - Gets paid for providing access to protected confidential datasets
+**2. Protected Data Provider** - Gets paid for providing access to protected
+confidential datasets
-**3. Worker** - Gets paid for running the confidential computation on their decentralized machine
+**3. Worker** - Gets paid for running the confidential computation on their
+decentralized machine
:::
@@ -73,8 +76,8 @@ task payment.
### ๐ Ecosystem Growth Metrics
-**RLC operates** on a utility-driven economic model where demand for confidential
-computing services drives token value:
+**RLC operates** on a utility-driven economic model where demand for
+confidential computing services drives token value:
**Fixed Supply**: RLC has a maximum supply of 87 million tokens, ensuring
scarcity and value preservation.
From da401af836801db1d1f8892b534f6d14becc5020 Mon Sep 17 00:00:00 2001
From: ErwanDecoster
Date: Thu, 28 Aug 2025 09:56:31 +0200
Subject: [PATCH 16/29] feat: add CardWithBorder and CardWithoutBorder
components for improved layout in documentation
---
src/components/CardWithBorder.vue | 7 +
src/components/CardWithoutBorder.vue | 7 +
src/get-started/helloWorld.md | 7 +-
src/get-started/helloWorld/1-overview.md | 54 ++----
src/get-started/helloWorld/3-buildIApp.md | 4 +-
.../helloWorld/4-manageDataAccess.md | 27 +--
src/get-started/helloWorld/5-bonusChapter.md | 3 +
src/get-started/overview/iapp.md | 161 +++++++++---------
src/get-started/overview/protected-data.md | 147 ++++++++--------
src/get-started/overview/workerpool.md | 161 ++++--------------
10 files changed, 238 insertions(+), 340 deletions(-)
create mode 100644 src/components/CardWithBorder.vue
create mode 100644 src/components/CardWithoutBorder.vue
diff --git a/src/components/CardWithBorder.vue b/src/components/CardWithBorder.vue
new file mode 100644
index 00000000..f6f7eb65
--- /dev/null
+++ b/src/components/CardWithBorder.vue
@@ -0,0 +1,7 @@
+
+
+
diff --git a/src/get-started/helloWorld.md b/src/get-started/helloWorld.md
index 849d3d32..1330f07a 100644
--- a/src/get-started/helloWorld.md
+++ b/src/get-started/helloWorld.md
@@ -10,18 +10,19 @@ import InfoIcon from '@/components/InfoIcon.vue'
import ChainSelector from '@/components/ChainSelector.vue'
import Banner from '../components/Banner.vue'
import Container from '../components/Container.vue'
+import CardWithBorder from '../components/CardWithBorder.vue'
# ๐ Welcome to iExec
> Reading time ๐ 2 min
-
-
+
+
๐ Select Your Network :
-
+
Start Your Web3 Privacy Journey
diff --git a/src/get-started/helloWorld/1-overview.md b/src/get-started/helloWorld/1-overview.md
index 1e1f8394..2bf02bd4 100644
--- a/src/get-started/helloWorld/1-overview.md
+++ b/src/get-started/helloWorld/1-overview.md
@@ -9,6 +9,7 @@ description:
# ๐ง iExec Overview
@@ -25,46 +26,21 @@ import Container from '../../components/Container.vue'
Imagine you're building a decentralized application (iApp) that needs to
**handle sensitive user data**, for example:
-
-
-
- ๐ค
- An AI model training on sensitive data
-
-
- ๐ฐ
- A financial app handling financial data
-
-
- ๐ฌ
- A research platform working with private datasets
-
-
- ๐ฅ
- A healthcare app processing confidential patient records
-
-
+
-
-
You'll need a way to:
-
- ๐
- Keep the data confidential
-
-
- ๐ฎ
- Control who can access it
-
-
- โก
- Process it securely
-
-
- ๐
- Potentially monetize it
-
-
-
+- ๐ค An AI model training on sensitive data
+- ๐ฐ A financial app handling financial data
+- ๐ฌ A research platform working with private datasets
+- ๐ฅ A healthcare app processing confidential patient records
+
+You'll need a way to:
+
+- ๐ Keep the data confidential
+- ๐ฎ Control who can access it
+- โก Process it securely
+- ๐ Potentially monetize it
+
+
::: tip
diff --git a/src/get-started/helloWorld/3-buildIApp.md b/src/get-started/helloWorld/3-buildIApp.md
index 95dfe7e4..8a7a91d9 100644
--- a/src/get-started/helloWorld/3-buildIApp.md
+++ b/src/get-started/helloWorld/3-buildIApp.md
@@ -290,9 +290,7 @@ following steps:
The `iapp test` command uses your local Docker to build and execute the app,
simulating how it will run in the iExec network's TEE environment.
-::: tip
-
-**Common Issues:**
+::: warning Common Issues:
- If you get Error: Docker daemon is not accessible: Make sure
Docker is installed and running.
diff --git a/src/get-started/helloWorld/4-manageDataAccess.md b/src/get-started/helloWorld/4-manageDataAccess.md
index 95dcae50..31788fa0 100644
--- a/src/get-started/helloWorld/4-manageDataAccess.md
+++ b/src/get-started/helloWorld/4-manageDataAccess.md
@@ -10,6 +10,7 @@ import GrantAccess from '@/modules/helloWorld/GrantAccess.vue';
import { useWalletConnection } from '@/hooks/useWalletConnection.vue';
import Banner from '../../components/Banner.vue'
import Container from '../../components/Container.vue'
+import CardWithBorder from '../../components/CardWithBorder.vue'
const { protectedDataAddress } = useWalletConnection();
@@ -38,24 +39,14 @@ Here is a simple diagram to explain the process:
{.light-only}
{.dark-only}
-
-
- 1
- Protect your data using DataProtector SDK
-
-
- 2
- Authorize a user (wallet address) to access your data
-
-
- 3
- Authorize the iApp to access your data
-
-
- 4
- Authorized user can now run your iApp to process your protected data
-
-
+
+
+ 1. Protect your data using DataProtector SDK
+ 2. Authorize a user (wallet address) to access your data
+ 3. Authorize the iApp to access your data
+ 4. Authorized user can now run your iApp to process your protected data
+
+
## ๐ Grant the iApp Access to your Data
diff --git a/src/get-started/helloWorld/5-bonusChapter.md b/src/get-started/helloWorld/5-bonusChapter.md
index a0a2861d..ca6761df 100644
--- a/src/get-started/helloWorld/5-bonusChapter.md
+++ b/src/get-started/helloWorld/5-bonusChapter.md
@@ -56,6 +56,9 @@ Community** for support!
Claim your $20 voucher
+
+
+
Thank you for being part of the iExec journey! We can't wait to see what you'll
diff --git a/src/get-started/overview/iapp.md b/src/get-started/overview/iapp.md
index 13dfe440..34b056c5 100644
--- a/src/get-started/overview/iapp.md
+++ b/src/get-started/overview/iapp.md
@@ -8,6 +8,9 @@ description:
# iApp
@@ -23,22 +26,14 @@ it private and secure.
Imagine you want to build:
-
-
-
- An AI that analyzes personal health data
-
-
- An email tool that needs access to contact lists
-
-
- A financial advisor that processes bank statements
-
-
- A content filter that reads private messages
-
-
-
+
+
+- An AI that analyzes personal health data
+- An email tool that needs access to contact lists
+- A financial advisor that processes bank statements
+- A content filter that reads private messages
+
+
Users have this data, but they won't trust your regular app with it. **With
Turnkey Privacy iApp, they will.**
@@ -47,24 +42,22 @@ Turnkey Privacy iApp, they will.**
## Key Concepts
-
-
- โ
-
True Privacy: Users never expose their raw data. Your app processes it privately inside secure enclaves.
-
-
- โ
-
Trusted Execution: iExec ensures your code runs inside a Trusted Execution Environment (TEE), guaranteeing only the specified Docker image executes in a secure, isolated environment.
-
-
- โ
-
Decentralized Infrastructure: No single point of failure. Your app runs across a distributed network of workers.
-
-
- โ
-
Zero Trust Architecture: User data is protected by hardware-based TEEs, keeping data confidential and inaccessible to the host, cloud provider, or operating system during execution.
-
-
+
+
+ โ **True Privacy:** Users never expose their raw data. Your app processes it privately inside secure enclaves
+
+โ **Trusted Execution:** iExec ensures your code runs inside a Trusted
+Execution Environment (TEE), guaranteeing only the specified Docker image
+executes in a secure, isolated environment.
+
+โ **Decentralized Infrastructure:** No single point of failure. Your app runs
+across a distributed network of workers.
+
+โ **Zero Trust Architecture:** User data is protected by hardware-based TEEs,
+keeping data confidential and inaccessible to the host, cloud provider, or
+operating system during execution.
+
+
## How it Works
@@ -75,26 +68,15 @@ protected there, even from the operating system.
Authorized users trigger iApp that process protected data inside this private
environment. Your iApp uses the data but never exposes it, not even to you.
-
-
-
- 1
- User provides private data
-
-
- 2
- Data is protected with DataProtector
-
-
- 3
- User builds and deploys a confidential iApp that processes protected data
-
-
- 4
- Run the iApp with the corresponding protected data, performing confidential computing
-
-
-
+
+
+1. User provides private data
+2. Data is protected with DataProtector
+3. User builds and deploys a confidential iApp that processes protected data
+4. Run the iApp with the corresponding protected data, performing confidential
+ computing
+
+
Your iApp can send emails, update contracts, make transactions, trigger
notifications - anything your code needs. This isn't about trust. We provide
@@ -103,30 +85,50 @@ the TEE execution environment.
## Use Cases
-
-
-
Healthcare
-
Process medical data for AI diagnosis without exposing patient information
-
-
-
Finance
-
Analyze financial data for credit scoring while maintaining privacy
-
-
-
Media
-
Content recommendation engines that don't track user behavior
-
-
-
Research
-
Collaborative research on sensitive datasets across institutions
-
-
+
+
+
+ ### Healthcare
+
+Process medical data for AI diagnosis without exposing patient information
+
+
+
+
+
+### Finance
+
+Analyze financial data for credit scoring while maintaining privacy
+
+
+
+
+
+### Media
+
+Content recommendation engines that don't track user behavior
+
+
+
+
+### Research
+
+Collaborative research on sensitive datasets across institutions
+
+
+
## Getting Started
-
Time to build!
-
Let's build an iApp that can process protected data in a secure environment using the iExec iApp generator tool. This tool helps you create, test and deploy iApp with just a few commands.
+
+## Time to build!
+
+Let's build an iApp that can process protected data in a secure environment
+using the iExec iApp
+generator tool. This tool helps you create, test and deploy iApp with just a
+few commands.
+
### Quick Start Path
@@ -143,9 +145,14 @@ the TEE execution environment.
- How to deploy to the iExec network
- How to process protected data in TEE environments
-
-
These are just a few examples, the possibilities are endless. Want to explore iApp Generator? Check out our documentation and see what you can build!
-
+::: tip
+
+These are just a few examples, the possibilities are endless. Want to explore
+iApp Generator? Check out our
+documentation and see
+what you can build!
+
+:::
## Technical Requirements
diff --git a/src/get-started/overview/protected-data.md b/src/get-started/overview/protected-data.md
index 78aac4ab..e1c5f82e 100644
--- a/src/get-started/overview/protected-data.md
+++ b/src/get-started/overview/protected-data.md
@@ -6,6 +6,13 @@ description:
controls, and secure data monetization.
---
+
+
# Protected Data
Protected Data refers to any data encrypted using the **iExec Data Protector
@@ -24,81 +31,75 @@ entries with matching types**.
### Data Governance
-- You own your data: The original data never leaves your control
-- Granular permissions: Decide who can access and use your data
-- Revocable access: Grant and revoke permissions at any time
+- **You own your data:** The original data never leaves your control
+- **Granular permissions:** Decide who can access and use your data
+- **Revocable access:** Grant and revoke permissions at any time
### Privacy-preserving Computation
-- Encrypted Processing: Maintains a complete chain of trust.
-- TEE (Trusted Execution Environment): Secure enclaves protect data during processing
-- Secret storage: iExec's protocol secrets in a TEE database.
+- **Encrypted Processing:** Maintains a complete chain of trust.
+- **TEE (Trusted Execution Environment):** Secure enclaves protect data during
+ processing
+- **Secret storage:** iExec's protocol secrets in a TEE database.
### Monetization
-- Data marketplaces: Sell access to your protected data
-- Usage tracking: Monitor how your data is being used
-- Fair compensation: Get paid for data usage
+- **Data marketplaces:** Sell access to your protected data
+- **Usage tracking:** Monitor how your data is being used
+- **Fair compensation:** Get paid for data usage
## How it Works
-
+
-1. Protect: Encrypt and register your data on the iExec network
-2. Share: Authorize specific users and applications to access your data
-3. Monitor: Track usage and maintain control
-4. Monetize: Earn from your data while keeping it private
-5. Compute: Authorized users can compute on your data with authorized iApp
+1. **Protect:** Encrypt and register your data on the iExec network
+2. **Share:** Authorize specific users and applications to access your data
+3. **Monitor:** Track usage and maintain control
+4. **Monetize:** Earn from your data while keeping it private
+5. **Compute:** Authorized users can compute on your data with authorized iApp
-
+
## Use Cases
-
-
-
-
Personal Data
-
-
-
Health records
-
Financial data
-
Personal preferences
-
-
-
-
-
-
Business Intelligence
-
-
-
Market research
-
Customer analytics
-
Proprietary datasets
-
-
-
-
-
-
AI Training
-
-
-
Training models without exposing sensitive data
-
Federated learning
-
Privacy-preserving ML
-
-
-
-
-
-
Research
-
-
-
Collaborative research with privacy guarantees
-
Cross-institutional studies
-
Clinical trial data
-
-
-
+
+
+
+ ### Personal Data
+
+ - Health records
+ - Financial data
+ - Personal preferences
+
+
+
+
+
+ ### Business Intelligence
+ - Market research
+ - Customer analytics
+ - Proprietary datasets
+
+
+
+
+
+ ### AI Training
+ - Training models without exposing sensitive data
+ - Federated learning
+ - Privacy-preserving ML
+
+
+
+
+
+ ### Research
+ - Collaborative research with privacy guarantees
+ - Cross-institutional studies
+ - Clinical trial data
+
+
+
@@ -109,17 +110,13 @@ to secure sensitive information while unlocking its value.
## Next Steps
-
+
+
+**Learn More:** Complete
+DataProtector Documentation
+
+**Getting Started:**
+DataProtector Quick Start
+Guide
+
+
diff --git a/src/get-started/overview/workerpool.md b/src/get-started/overview/workerpool.md
index fdde73b0..eaacaeb9 100644
--- a/src/get-started/overview/workerpool.md
+++ b/src/get-started/overview/workerpool.md
@@ -4,6 +4,10 @@ description:
Learn about workerpool in iExec - the computing resources that execute iApp
---
+
+
# Workerpool
A **Workerpool** is a group of computing machines (workers) managed by a
@@ -22,121 +26,32 @@ ensures tasks are executed efficiently and securely.
### Workerpool Manager
-
-
-
-
-
- โข
-
- Resource Coordinator: Manages and organizes available computing resources
-
-
-
- โข
-
- Task Scheduler: Distributes tasks among available workers
-
-
-
- โข
-
- Network Interface: Connects the workerpool to the iExec marketplace
-
-
-
-
+- **Resource Coordinator:** Manages and organizes available computing resources
+- **Task Scheduler:** Distributes tasks among available workers
+- **Network Interface:** Connects the workerpool to the iExec marketplace
### Workers (Computing Machines)
-
-
-
-
-
- โข
-
- TEE-enabled Hardware: Machines equipped with Trusted Execution Environments
-
-
-
- โข
-
- Task Execution: Run iApp and process protected data securely
-
+- **TEE-enabled Hardware:** Machines equipped with Trusted Execution
+ Environments
+- **Task Execution:** Run iApp and process protected data securely
+- **RLC Rewards:** Earn RLC tokens for successfully completed tasks
### Security & Privacy
-
-
-
-
-
- โข
-
- TEE Protection: All computations happen inside secure enclaves
-
-
-
- โข
-
- Data Isolation: Protected data never leaves the secure environment
-
-
-
- โข
-
- Proof of Contribution: Cryptographic verification of task completion
-
-
-
-
+- **TEE Protection:** All computations happen inside secure enclaves
+- **Data Isolation:** Protected data never leaves the secure environment
+- **Proof of Contribution:** Cryptographic verification of task completion
## How Workerpool Work
-
-
-
- 1.
-
- Task Request: User submits a task to execute an iApp on protected data
-
-
-
- 2.
-
- Workerpool Selection: PoCo system matches request with available workerpool
-
-
-
- 3.
-
- Task Distribution: Workerpool manager assigns task to an available worker
-
-
-
- 4.
-
- Secure Execution: Worker downloads iApp and executes it in TEE environment
-
-
-
- 5.
-
- Result Delivery: Encrypted results are returned to the requester
-
-
-
-
+1. **Task Request:** User submits a task to execute an iApp on protected data
+2. **Workerpool Selection:** PoCo system matches request with available
+ workerpool
+3. **Task Distribution:** Workerpool manager assigns task to an available worker
+4. **Secure Execution:** Worker downloads iApp and executes it in TEE
+ environment
+5. **Result Delivery:** Encrypted results are returned to the requester
## Getting Started
@@ -149,22 +64,18 @@ workerpool selection automatically.
## Next Steps
-
+
+
+**Start Using:**
+Build
+your first iApp and see a workerpool in action
+
+**Join as Worker:**
+Contact us on
+Discord for guidance and support
+
+**Manage Workerpool:**
+Contact us on
+Discord for deployment assistance
+
+
From 3e2990abc576dc35d50b1a58d6ba54fe939cd1c6 Mon Sep 17 00:00:00 2001
From: ErwanDecoster
Date: Thu, 28 Aug 2025 10:22:00 +0200
Subject: [PATCH 17/29] refactor: replace HTML links with Markdown syntax for
improved readability
---
src/get-started/helloWorld/2-protectData.md | 4 +---
src/get-started/helloWorld/3-buildIApp.md | 9 ++++-----
src/get-started/helloWorld/5-bonusChapter.md | 4 ++--
src/get-started/overview/iapp.md | 6 ++----
src/get-started/overview/protected-data.md | 7 ++-----
src/get-started/overview/workerpool.md | 12 +++---------
src/get-started/welcome.md | 10 +++++-----
.../dataProtectorSharing/read/getCollectionOwners.md | 3 +--
.../read/getCollectionSubscriptions.md | 3 +--
.../read/getCollectionsByOwner.md | 3 +--
.../read/getProtectedDataInCollections.md | 3 +--
.../read/getProtectedDataPricingParams.md | 3 +--
.../dataProtectorSharing/read/getRentals.md | 3 +--
13 files changed, 25 insertions(+), 45 deletions(-)
diff --git a/src/get-started/helloWorld/2-protectData.md b/src/get-started/helloWorld/2-protectData.md
index f4d71f6d..db146dcd 100644
--- a/src/get-started/helloWorld/2-protectData.md
+++ b/src/get-started/helloWorld/2-protectData.md
@@ -35,9 +35,7 @@ their DApp with these key features:
- ๐ **Data Privacy and Security**
- Uses end-to-end encryption and decentralized storage
- (IPFS or
- AR.io) to ensure protection and
+ Uses end-to-end encryption and decentralized storage ([IPFS](https://ipfs.tech/) or [AR.io](https://ar.io/)) to ensure protection and
confidentiality, leveraging advanced confidential computing technology.
- ๐ฎ **Dynamic Access Management**
diff --git a/src/get-started/helloWorld/3-buildIApp.md b/src/get-started/helloWorld/3-buildIApp.md
index 8a7a91d9..dc137d93 100644
--- a/src/get-started/helloWorld/3-buildIApp.md
+++ b/src/get-started/helloWorld/3-buildIApp.md
@@ -11,7 +11,7 @@ description:
Time to build!
-
Let's build an iApp that can process protected data in a secure environment using the iExec iApp generator tool. This tool helps you create, test and deploy iApp with just a few commands.
+
Let's build an iApp that can process protected data in a secure environment using the [iExec iApp generator tool](/references/iapp-generator). This tool helps you create, test and deploy iApp with just a few commands.
If you wanna explore and deep dive in the CLI. You can check the
@@ -77,8 +77,7 @@ Transfer, sell or rent protected content to authorized users.
::: tip
These are just a few examples, the possibilities are endless. Want to explore
-iApp Generator? Check out our
-documentation and see
+iApp Generator? Check out our [documentation](/references/iapp-generator) and see
what you can build!
:::
@@ -335,11 +334,11 @@ Deploy your iApp on the iExec protocol.
1
- Go to Docker Hub Security Settings
+ Go to [Docker Hub Security Settings](https://hub.docker.com/settings/security)
2
- Click "Personal access tokens" โ "Generate new token"
+ Click ["Personal access tokens"](https://app.docker.com/settings/personal-access-tokens) โ "Generate new token"
3
diff --git a/src/get-started/helloWorld/5-bonusChapter.md b/src/get-started/helloWorld/5-bonusChapter.md
index ca6761df..5a9b9a6d 100644
--- a/src/get-started/helloWorld/5-bonusChapter.md
+++ b/src/get-started/helloWorld/5-bonusChapter.md
@@ -21,7 +21,7 @@ description:
If you have any questions, please schedule an appointment with our DevRel team who will be happy to help!
- ๐ Book a meeting
+ [๐ Book a meeting](https://calendly.com/martin-leclercq-iexec/30min)
@@ -42,7 +42,7 @@ Community** for support!
What is a Voucher?
A Voucher is your all-in-one solution for iExec development to use iExec's technology, access to premium support, technical guidance and mentorship to help you build and monetize your projects. ๐
-
Claim your $20 voucher to kickstart your development journey. Want to learn more about Voucher ? ๐
+
Claim your $20 voucher to kickstart your development journey. Want to learn more about [Voucher](https://www.iex.ec/voucher) ? ๐
diff --git a/src/get-started/overview/iapp.md b/src/get-started/overview/iapp.md
index 34b056c5..69618128 100644
--- a/src/get-started/overview/iapp.md
+++ b/src/get-started/overview/iapp.md
@@ -125,8 +125,7 @@ Collaborative research on sensitive datasets across institutions
## Time to build!
Let's build an iApp that can process protected data in a secure environment
-using the iExec iApp
-generator tool. This tool helps you create, test and deploy iApp with just a
+using the [iExec iApp generator tool](/references/iapp-generator). This tool helps you create, test and deploy iApp with just a
few commands.
@@ -148,8 +147,7 @@ few commands.
::: tip
These are just a few examples, the possibilities are endless. Want to explore
-iApp Generator? Check out our
-documentation and see
+iApp Generator? Check out our [documentation](/references/iapp-generator) and see
what you can build!
:::
diff --git a/src/get-started/overview/protected-data.md b/src/get-started/overview/protected-data.md
index e1c5f82e..662eab7d 100644
--- a/src/get-started/overview/protected-data.md
+++ b/src/get-started/overview/protected-data.md
@@ -112,11 +112,8 @@ to secure sensitive information while unlocking its value.
-**Learn More:** Complete
-DataProtector Documentation
+**Learn More:** [Complete DataProtector Documentation](/guides/manage-data/manage-access)
-**Getting Started:**
-DataProtector Quick Start
-Guide
+**Getting Started:** [DataProtector Quick Start Guide](/references/dataProtector/getting-started)
diff --git a/src/get-started/overview/workerpool.md b/src/get-started/overview/workerpool.md
index eaacaeb9..0e22c6c8 100644
--- a/src/get-started/overview/workerpool.md
+++ b/src/get-started/overview/workerpool.md
@@ -66,16 +66,10 @@ workerpool selection automatically.
-**Start Using:**
-Build
-your first iApp and see a workerpool in action
+**Start Using:** [Build your first iApp](/get-started/helloWorld) and see a workerpool in action
-**Join as Worker:**
-Contact us on
-Discord for guidance and support
+**Join as Worker:** [Contact us on Discord](https://discord.com/invite/pbt9m98wnU) for guidance and support
-**Manage Workerpool:**
-Contact us on
-Discord for deployment assistance
+**Manage Workerpool:** [Contact us on Discord](https://discord.com/invite/pbt9m98wnU) for deployment assistance
diff --git a/src/get-started/welcome.md b/src/get-started/welcome.md
index 049a30be..1afbfd61 100644
--- a/src/get-started/welcome.md
+++ b/src/get-started/welcome.md
@@ -139,12 +139,12 @@ data** and **building and deploying confidential apps**.
Ready to build privacy-first applications? Choose your path:
-- **Quick Start:** Follow our Hello World
- guide to build your first confidential app in minutes
-- **Explore Use Cases:** Browse real-world
- examples to see what you can build with iExec
+- **Quick Start:** Follow our [Hello World guide](/get-started/helloWorld) to
+ build your first confidential app in minutes
+- **Explore Use Cases:** Browse [real-world examples](/get-started/use-cases) to
+ see what you can build with iExec
- **Join the Community:** Connect with other builders and get support on our
- Discord
+ [Discord](https://discord.gg/9h25DQFSCU)
---
diff --git a/src/references/dataProtector/dataProtectorSharing/read/getCollectionOwners.md b/src/references/dataProtector/dataProtectorSharing/read/getCollectionOwners.md
index 460dd499..d2747ff1 100644
--- a/src/references/dataProtector/dataProtectorSharing/read/getCollectionOwners.md
+++ b/src/references/dataProtector/dataProtectorSharing/read/getCollectionOwners.md
@@ -61,8 +61,7 @@ import type { GetCollectionOwnersResponse } from '@iexec/dataprotector';
import type { CollectionOwner, SubscriptionParams } from '@iexec/dataprotector';
```
-See
-Type โ๏ธ
+[See Type โ๏ธ](https://github.com/iExecBlockchainComputing/dataprotector-sdk/blob/c83e30e6ce8b55ecf8a35ecb4eb1014cd4ecefe9/packages/sdk/src/lib/types/sharingTypes.ts)
### hasActiveSubscription
diff --git a/src/references/dataProtector/dataProtectorSharing/read/getCollectionSubscriptions.md b/src/references/dataProtector/dataProtectorSharing/read/getCollectionSubscriptions.md
index 64a724fc..4a922cb2 100644
--- a/src/references/dataProtector/dataProtectorSharing/read/getCollectionSubscriptions.md
+++ b/src/references/dataProtector/dataProtectorSharing/read/getCollectionSubscriptions.md
@@ -102,8 +102,7 @@ import { type GetCollectionSubscriptionsResponse } from '@iexec/dataprotector';
import { type CollectionSubscription } from '@iexec/dataprotector';
```
-See
-Type โ๏ธ
+[See Type โ๏ธ](https://github.com/iExecBlockchainComputing/dataprotector-sdk/blob/c83e30e6ce8b55ecf8a35ecb4eb1014cd4ecefe9/packages/sdk/src/lib/types/sharingTypes.ts)
# Turnkey Privacy Toolkit
-
Welcome to iExec
-
Your complete toolkit for building privacy-first Web3 applications that protect and use sensitive data
+
+## Welcome to iExec<
+
+Your complete toolkit for building privacy-first Web3 applications that protect
+and use sensitive data
+
## Why iExec?
@@ -60,72 +66,61 @@ Ready-to-use components to protect sensitive data and computation:
## Real-world Use Cases
-
-
-
- ๐ฐ
-
Finance
-
-
-
Analyze sensitive financial data
-
Process credit scores without exposing personal information
-
-
-
-
-
- ๐ค
-
AI/ML
-
-
-
Train models on private datasets
-
Perform confidential predictions
-
-
-
-
-
- ๐ฌ
-
Research
-
-
-
Share and analyze research data securely
-
Collaborate while protecting intellectual property
-
-
-
-
-
- ๐
-
Business Analytics
-
-
-
Process competitive market data
-
Analyze business metrics confidentially
-
-
-
-
-
- ๐ฎ
-
Gaming
-
-
-
Protect player data and game assets
-
Process in-game transactions securely
-
-
-
-
- ๐ฅ
-
Healthcare
-
-
-
Process patient records privately
-
Run medical analyses while preserving patient confidentiality
-
-
-
+
+
+
+### ๐ฐ Finance
+
+- Analyze sensitive financial data
+- Process credit scores without exposing personal information
+
+
+
+
+
+### ๐ค AI/ML
+
+- Train models on private datasets
+- Perform confidential predictions
+
+
+
+
+
+### ๐ฌ Research
+
+- Share and analyze research data securely
+- Collaborate while protecting intellectual property
+
+
+
+
+
+### ๐ Business Analytics
+
+- Process competitive market data
+- Analyze business metrics confidentially
+
+
+
+
+
+### ๐ฎ Gaming
+
+- Protect player data and game assets
+- Process in-game transactions securely<
+
+
+
+
+
+### ๐ฅ Healthcare
+
+- Process patient records privately
+- Run medical analyses while preserving patient confidentiality
+
+
+
@@ -157,9 +152,9 @@ applications. Let's build something amazing together._ ๐
Be part of a growing movement of developers, data owners, and privacy advocates
who are **reshaping how the world handles sensitive data**.
-When you build with iExec, you're not just solving a technical
-challengeโ**you're championing user rights and digital sovereignty**. Every
-application you create makes the web more private, more secure, and more
-trustworthy for everyone.
+When you build with iExec, you're not just solving a technical challenge
+**you're championing user rights and digital sovereignty**. Every application
+you create makes the web more private, more secure, and more trustworthy for
+everyone.
From 93f21105204b87d5fd9de38fe6f481abb3ca7117 Mon Sep 17 00:00:00 2001
From: ErwanDecoster
Date: Thu, 28 Aug 2025 13:52:45 +0200
Subject: [PATCH 22/29] fix: update text color for display address in
AddressChip component
---
src/components/AddressChip.vue | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/src/components/AddressChip.vue b/src/components/AddressChip.vue
index 90598dac..261d7bcc 100644
--- a/src/components/AddressChip.vue
+++ b/src/components/AddressChip.vue
@@ -2,7 +2,7 @@
-
{{ displayAddress }}
+
{{ displayAddress }}
diff --git a/src/components/Container.vue b/src/components/Container.vue
index d2263195..5761a742 100644
--- a/src/components/Container.vue
+++ b/src/components/Container.vue
@@ -20,7 +20,8 @@ const props = withDefaults(defineProps(), {
});
const containerClasses = computed(() => {
- const baseClasses = 'rounded-[6px] p-6 border-l-4';
+ const baseClasses =
+ 'rounded-[6px] p-6 border-l-4 [&>:first-child]:mt-0! [&>:last-child]:mb-0!';
const variantClasses = {
success:
From 3dcc3bdfd0182f3a4390b0df5b60bec8899b2648 Mon Sep 17 00:00:00 2001
From: ErwanDecoster
Date: Thu, 28 Aug 2025 13:53:06 +0200
Subject: [PATCH 24/29] fix: correct header formatting in welcome.md
---
src/get-started/welcome.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/src/get-started/welcome.md b/src/get-started/welcome.md
index 87074c18..955fa1ed 100644
--- a/src/get-started/welcome.md
+++ b/src/get-started/welcome.md
@@ -17,7 +17,7 @@ import CardGrid from '../components/CardGrid.vue'
-## Welcome to iExec<
+## Welcome to iExec
Your complete toolkit for building privacy-first Web3 applications that protect
and use sensitive data
From b91c1ddfc7e8e7216fcb81294545f51b997ecda8 Mon Sep 17 00:00:00 2001
From: ErwanDecoster
Date: Thu, 28 Aug 2025 13:53:15 +0200
Subject: [PATCH 25/29] refactor: replace HTML div with Markdown info block for
better readability in 3-buildIApp.md
---
src/get-started/helloWorld/3-buildIApp.md | 9 ++++++---
1 file changed, 6 insertions(+), 3 deletions(-)
diff --git a/src/get-started/helloWorld/3-buildIApp.md b/src/get-started/helloWorld/3-buildIApp.md
index bde3cc98..87adf967 100644
--- a/src/get-started/helloWorld/3-buildIApp.md
+++ b/src/get-started/helloWorld/3-buildIApp.md
@@ -50,9 +50,12 @@ Before getting started, make sure you have:
-
-
Don't worry! All secrets used in this tutorial stay on your machine and arenโt shared with anyone. Youโll only need them to run the iapp run command.
-
+::: info
+
+Don't worry! All secrets used in this tutorial stay on your machine and arenโt
+shared with anyone. Youโll only need them to run the `iapp run` command.
+
+:::
## ๐ Types of iApp you Can Build
From 4372701245111ea8fd5892c90de13ab5ac3df7f3 Mon Sep 17 00:00:00 2001
From: ErwanDecoster
Date: Thu, 28 Aug 2025 13:53:23 +0200
Subject: [PATCH 26/29] fix: remove unnecessary class from network link for
cleaner styling in ProtectData.vue
---
src/modules/helloWorld/ProtectData.vue | 1 -
1 file changed, 1 deletion(-)
diff --git a/src/modules/helloWorld/ProtectData.vue b/src/modules/helloWorld/ProtectData.vue
index 8e6000c2..876fb8a5 100644
--- a/src/modules/helloWorld/ProtectData.vue
+++ b/src/modules/helloWorld/ProtectData.vue
@@ -7,7 +7,6 @@
({{ networkName }})
From f72e9974241bcffe665331f9d2a2c266e313c510 Mon Sep 17 00:00:00 2001
From: ErwanDecoster
Date: Thu, 28 Aug 2025 14:36:58 +0200
Subject: [PATCH 27/29] fix: add variant prop to Button for consistent styling
in ImageViewer component
---
src/components/ImageViewer.vue | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/src/components/ImageViewer.vue b/src/components/ImageViewer.vue
index e8abc4e6..061e0b22 100644
--- a/src/components/ImageViewer.vue
+++ b/src/components/ImageViewer.vue
@@ -20,10 +20,10 @@