Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
25 commits
Select commit Hold shift + click to select a range
466f392
refactor: update welcome page to emphasize iExec's privacy-first appr…
akugone Aug 4, 2025
19461d4
refactor: rename welcome page to 'About iExec' and enhance descriptio…
akugone Aug 4, 2025
25c2a85
refactor: standardize headings and improve consistency in welcome pag…
akugone Aug 4, 2025
5108325
refactor: enhance welcome page content for clarity and user engagemen…
akugone Aug 4, 2025
4a3890d
refactor: enhance AI integration documentation to guide developers in…
akugone Aug 4, 2025
5debf3a
refactor: update welcome page headings and content for improved clari…
akugone Aug 4, 2025
685e817
refactor: refine welcome page content to enhance clarity on user info…
akugone Aug 4, 2025
44d894b
refactor: update welcome page heading from 'What we offer' to 'What w…
akugone Aug 4, 2025
7787687
refactor: enhance welcome and helloWorld pages with structured real-w…
akugone Aug 4, 2025
2f4a85b
refactor: revamp welcome page to highlight iExec as a comprehensive p…
akugone Aug 4, 2025
1c3c992
refactor: update protectData documentation to include AR.io as an add…
akugone Aug 4, 2025
50619d0
refactor: update welcome page content to specify iExec as a toolkit f…
akugone Aug 4, 2025
72d708b
refactor: enhance AI integration documentation to include new section…
akugone Aug 4, 2025
114cb8b
Update src/overview/welcome.md
Le-Caignec Aug 4, 2025
32664e6
Update src/overview/welcome.md
Le-Caignec Aug 4, 2025
93c4fd9
Update src/overview/welcome.md
Le-Caignec Aug 4, 2025
4f9acfc
Update src/overview/welcome.md
Le-Caignec Aug 4, 2025
4482925
refactor: rename AI integration link and replace with new 'Develop wi…
Le-Caignec Aug 4, 2025
615ec76
fix: correct formatting in iApp Generator description
Le-Caignec Aug 4, 2025
b420a04
Merge branch 'main' into feature/get-started
Le-Caignec Aug 5, 2025
33bff93
Apply suggestions from code review
akugone Aug 5, 2025
d09c07e
fix: update link in 'RevokedAccess' section to remove emoji from refe…
Le-Caignec Aug 5, 2025
8a0cdd7
refactor: enhance clarity in 'welcome.md' by updating multi-chain int…
akugone Aug 5, 2025
d1892b4
refactor: improve terminology in 'welcome.md' by clarifying privacy f…
akugone Aug 5, 2025
2686fe9
refactor: remove redundant introductory text in 'welcome.md' to strea…
akugone Aug 5, 2025
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 2 additions & 2 deletions .vitepress/sidebar.ts
Original file line number Diff line number Diff line change
Expand Up @@ -39,8 +39,8 @@ export function getSidebar() {
link: '/overview/use-cases',
},
{
text: '🤖 Use the docs in your AI',
link: '/overview/ai-integration',
text: '🤖 Develop with AI',
link: '/overview/develop-with-ai',
},
],
},
Expand Down
2 changes: 1 addition & 1 deletion src/manage-data/dataProtector/types.md
Original file line number Diff line number Diff line change
Expand Up @@ -84,7 +84,7 @@ Types in DataProtector.

## ❌ RevokedAccess

### access: <span class="text-yellow">[`GrantedAccess`](#🔑-grantedaccess)</span>
### access: <span class="text-yellow">[`GrantedAccess`](#-grantedaccess)</span>

- The granted access that was revoked.

Expand Down
10 changes: 0 additions & 10 deletions src/overview/ai-integration.md

This file was deleted.

61 changes: 61 additions & 0 deletions src/overview/develop-with-ai.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,61 @@
---
title: Develop with AI
description:
Learn how to leverage AI tools like Vibe Coding and Context7 to build
privacy-first applications with iExec
---

# 🤖 Develop with AI

Building privacy-first applications with iExec can be accelerated using
AI-powered development tools. This guide covers how to effectively use AI
assistants while maintaining security best practices.

## 📚 Documentation for LLMs and AI code editors

You can use some MCP (Model Control Protocol) servers like
[Context7](https://context7.com/iexecblockchaincomputing/documentation-tools) to
provide:

- Code completion with iExec-specific knowledge
- Architecture suggestions for privacy-first apps
- Code explanation and best practices

## 🎨 Vibe Coding Integration

Vibe coding is a modern way to build applications by describing what you want in
plain language. An AI assistant (like Cursor or ChatGPT) then generates code
based on your description.

It's fast, creative, and helps you prototype ideas quickly. Even if you're not a
technical expert you can:

- Write a prompt like: "I want to create a form able to protect my data with
DataProtector"

- The AI suggests code using iExec tools like DataProtector or iApp Generator

- You review and adjust until it works

## ⚠️ Security Considerations

While vibe coding is powerful, it's important to keep privacy and security in
mind:

- **Review the code**: Always check AI-generated code for bugs or
vulnerabilities

- **Don't share secrets**: Never paste API keys, private keys, or sensitive
logic into the AI

- **Validate privacy logic**: Make sure your confidential computing flow is
correctly implemented

- **Test thoroughly**: Especially when handling protected data or smart contract
logic

## Learn More

- [iExec MCP Server](https://www.iex.ec/news/mcp-server-secure-interoperability-autonomous-ai-agents)
- [Agentic AI](https://www.iex.ec/academy/what-is-agentic-ai)
- [ElizaOS TDX use case](https://www.iex.ec/news/elizaos-ai-agents-iexec-intel-tdx)
79 changes: 3 additions & 76 deletions src/overview/helloWorld/1-overview.md
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ description:
<p>and explore how iExec can help you build Privacy-preserving applications and securely manage sensitive data.</p>
</div>

## 👨‍💻 Why build Privacy-preserving dApps with iExec
## 👨‍💻 Building Privacy-preserving dApps with iExec

<p>Imagine you're building a decentralized application (dApp) that needs to <strong> handle sensitive user data</strong>, for example:</p>
<div class="bg-[var(--vp-c-bg-soft)] rounded-[6px] p-6 mb-6">
Expand Down Expand Up @@ -80,13 +80,13 @@ Computing</a></span> technologies.
<span class="text-fuchsia-700 font-semibold">confidentiality</span>, and <span class="text-fuchsia-700 font-semibold">monetization</span> of their data and digital assets within the <span class="text-fuchsia-700 font-semibold">Web3</span> ecosystem.</p>
</div>

## 🔒 What are the three key elements?
## 🔒 The three key elements?

iExec combines three fundamental elements that work together seamlessly:

#### 1. Protect data with our devtool [DataProtector](../../tools/dataProtector/getting-started)

- Encrypt your sensitive data and store it securely on IPFS
- Encrypt your sensitive data and store it securely on Arweave or IPFS
- Only you control who can access it and when
- Perfect for private information like research data, business analytics, or
personal records
Expand Down Expand Up @@ -152,79 +152,6 @@ Depending on the dApp's use case, Alice could:

And many other use cases...

## 💡 Possible use cases

<div class="grid grid-cols-1 md:grid-cols-2 gap-6 my-6">
<div class="bg-[var(--vp-c-bg-soft)] rounded-[6px] p-6 flex flex-col gap-2">
<div class="flex items-baseline gap-2 text-lg">
<span>💰</span>
<h3 class="font-semibold m-0!">Finance</h3>
</div>
<ul class="list-disc ml-6">
<li>Analyze sensitive financial data</li>
<li>Process credit scores without exposing personal information</li>
</ul>
</div>

<div class="bg-[var(--vp-c-bg-soft)] rounded-[6px] p-6 flex flex-col gap-2">
<div class="flex items-baseline gap-2 text-lg">
<span>🤖</span>
<h3 class="font-semibold m-0!">AI/ML</h3>
</div>
<ul class="list-disc ml-6">
<li>Train models on private datasets</li>
<li>Perform confidential predictions</li>
</ul>
</div>

<div class="bg-[var(--vp-c-bg-soft)] rounded-[6px] p-6 flex flex-col gap-2">
<div class="flex items-baseline gap-2 text-lg">
<span>🔬</span>
<h3 class="font-semibold m-0!">Research</h3>
</div>
<ul class="list-disc ml-6">
<li>Share and analyze research data securely</li>
<li>Collaborate while protecting intellectual property</li>
</ul>
</div>

<div class="bg-[var(--vp-c-bg-soft)] rounded-[6px] p-6 flex flex-col gap-2">
<div class="flex items-baseline gap-2 text-lg">
<span>📊</span>
<h3 class="font-semibold m-0!">Business Analytics</h3>
</div>
<ul class="list-disc ml-6">
<li>Process competitive market data</li>
<li>Analyze business metrics confidentially</li>
</ul>
</div>

<div class="bg-[var(--vp-c-bg-soft)] rounded-[6px] p-6 flex flex-col gap-2">
<div class="flex items-baseline gap-2 text-lg">
<span>🎮</span>
<h3 class="font-semibold m-0!">Gaming</h3>
</div>
<ul class="list-disc ml-6">
<li>Protect player data and game assets</li>
<li>Process in-game transactions securely</li>
</ul>
</div>
<div class="bg-[var(--vp-c-bg-soft)] rounded-[6px] p-6 flex flex-col gap-2">
<div class="flex items-baseline gap-2 text-lg">
<span>🏥</span>
<h3 class="font-semibold m-0!">Healthcare</h3>
</div>
<ul class="list-disc ml-6">
<li>Process patient records privately</li>
<li>Run medical analyses while preserving patient confidentiality</li>
</ul>
</div>
</div>

<div class="bg-gradient-to-r from-fuchsia-400/10 to-fuchsia-400/5 rounded-[6px] p-6 border-l-4 border-fuchsia-700 mb-6">
<p class="m-0!">In the next chapters, we'll follow Alice and Bob's journey step by step, starting with how Alice can <span class="text-fuchsia-700 font-semibold">protect her sensitive data</span> and then how Bob can <span class="text-fuchsia-700 font-semibold">build and deploy a confidential app</span> to process it.</p>
</div>

## 🎯 Key takeaways

<div class="flex flex-col my-6">
Expand Down
5 changes: 3 additions & 2 deletions src/overview/helloWorld/2-protectData.md
Original file line number Diff line number Diff line change
Expand Up @@ -24,8 +24,9 @@ their dApps with these key features:
- 🔐 **Data Privacy and Security**

Utilizes end-to-end encryption and decentralized storage
(<a href="https://ipfs.tech/" target="_blank">IPFS</a>) to ensure protection
and confidentiality, leveraging advanced confidential computing technology.
(<a href="https://ipfs.tech/" target="_blank">IPFS</a> or
<a href="https://ar.io/" target="_blank">AR.io</a>) to ensure protection and
confidentiality, leveraging advanced confidential computing technology.

- 🎮 **Dynamic Access Management**

Expand Down
Loading