Binance Square
LIVE
TradingX
@iExec-news
Obserwowani
Obserwujący
Polubione
Udostępniony
Cała zawartość
LIVE
--
Zobacz oryginał
$RLC 🔥
$RLC 🔥
LIVE
iExec RLC - Official
--
Czy zastanawiałeś się kiedyś, w jaki sposób własność danych i monetyzacja mogą bezproblemowo zintegrować się z Twoimi aplikacjami DApps? Zaraz pokażemy, jak iExec sprawia, że ​​jest to łatwiejsze niż kiedykolwiek!

Już wkrótce dostępna będzie wersja#iExecDataProtector „Wersja zarabiania”.⚡

Obserwuj nasze ogłoszenie!🚀

#Web3
Zobacz oryginał
Przyszłość sztucznej inteligencji leży w poufnym przetwarzaniu danych, @iEx_ec jest wiodącym dostawcą technologii w tej dziedzinie, a także rynkiem#web3dla przetwarzania w chmurze, przetwarzania rozproszonego, zaufanych wyroczni, monetyzacji danych AI i aplikacji AI, Web3mail, DataProtector. 👀 Nie przegap tego klejnotu $RLC. Kapitalizacja iExec wynosi zaledwie 245 milionów dolarów, a wszystkie wyemitowane tokeny sprawiają, że projekt ten buduje niesamowitą platformę na przyszłość. iExec#RLCobejmuje#Web3#Oracle #AI , Renderibg, Computing, Dapps, Data, #DePIN , DeCC #RWA
Przyszłość sztucznej inteligencji leży w poufnym przetwarzaniu danych, @iExec RLC - Official jest wiodącym dostawcą technologii w tej dziedzinie, a także rynkiem#web3dla przetwarzania w chmurze, przetwarzania rozproszonego, zaufanych wyroczni, monetyzacji danych AI i aplikacji AI, Web3mail, DataProtector.

👀 Nie przegap tego klejnotu $RLC . Kapitalizacja iExec wynosi zaledwie 245 milionów dolarów, a wszystkie wyemitowane tokeny sprawiają, że projekt ten buduje niesamowitą platformę na przyszłość.

iExec#RLCobejmuje#Web3#Oracle #AI , Renderibg, Computing, Dapps, Data, #DePIN , DeCC #RWA
LIVE
BreakOut_Expert
--
Byczy
$RLC {Aktualizacja} ✨

➡️Aktualny widok: Kolejny wytrzymały produkt.
Kurs nadal utrzymuje się powyżej pierwszego poziomu oporu na poziomie 3,27 USD.
Okazywanie chęci do ruchu w górę.
Kontynuuj monitorowanie. #bitcoin #RLC/USDT #RLC #Binance #BNB $BTC $ETH

@BreakOut_Expert
LIVE
--
Byczy
Zobacz oryginał
Rejestracja do iExec Privacy Pass jest otwarta ($RLC AIRDROP)! Jeśli nie znasz jeszcze Projektu @iEx_ec lub chcesz zarobić RLC, zarejestruj się w kampaniach zarobkowych, które pojawią się w 2024 roku. Uczestnicy, którzy otrzymają przepustkę #NFT , będą mogli uczestniczyć i zarabiać na swoim e-mailu dzięki technologii iExec Web3Mail i zdobywać #RLC tokenów za każdy otrzymany e-mail, bez narażania swojej prywatności lub ujawniania swojego e-maila reklamodawcom. Dzięki iExec Privacy Pass poznasz rewolucyjną technologię#Web3Mailfirmy iExec, która zapewnia prywatność użytkowników w Web3 i pozwala im otrzymywać nagrody za udział w kampaniach marketingowych przy użyciu adresu portfela. Narzędzia programistyczne iExec „Marketing zwiększający prywatność” rozwiązują problemy związane ze zgodą użytkownika i niemożnością bezpośredniego zarabiania na swoich danych, a także problemy marketingowe w Web3, gdzie użytkownicy wchodzą w interakcję za pośrednictwem portfeli kryptograficznych, co komplikuje prywatność, wiążąc użytkowników z adresami publicznymi. Narzędzia te umożliwiają programistom tworzenie zdecentralizowanych aplikacji (DApps) przy użyciu iExec DataProtector i Web3Mail, zapewniając użytkownikom prywatność i umożliwiając im otrzymywanie nagród za udział w działaniach marketingowych. Jest to rozwiązanie korzystne dla wszystkich, którzy prowadzą kampanie reklamowe i użytkowników w Web3! ↪️ Link do rejestracji w dropie: https://privacypass.iex.ec Dołącz do oficjalnych społeczności iExec: Telegram: 🇺🇸@iexec_rlc_official Telegram: 🇷🇺@iExec_russia #iExec #AI #DePIN
Rejestracja do iExec Privacy Pass jest otwarta ($RLC AIRDROP)!

Jeśli nie znasz jeszcze Projektu @iExec RLC - Official lub chcesz zarobić RLC, zarejestruj się w kampaniach zarobkowych, które pojawią się w 2024 roku. Uczestnicy, którzy otrzymają przepustkę #NFT , będą mogli uczestniczyć i zarabiać na swoim e-mailu dzięki technologii iExec Web3Mail i zdobywać #RLC tokenów za każdy otrzymany e-mail, bez narażania swojej prywatności lub ujawniania swojego e-maila reklamodawcom. Dzięki iExec Privacy Pass poznasz rewolucyjną technologię#Web3Mailfirmy iExec, która zapewnia prywatność użytkowników w Web3 i pozwala im otrzymywać nagrody za udział w kampaniach marketingowych przy użyciu adresu portfela.

Narzędzia programistyczne iExec „Marketing zwiększający prywatność” rozwiązują problemy związane ze zgodą użytkownika i niemożnością bezpośredniego zarabiania na swoich danych, a także problemy marketingowe w Web3, gdzie użytkownicy wchodzą w interakcję za pośrednictwem portfeli kryptograficznych, co komplikuje prywatność, wiążąc użytkowników z adresami publicznymi. Narzędzia te umożliwiają programistom tworzenie zdecentralizowanych aplikacji (DApps) przy użyciu iExec DataProtector i Web3Mail, zapewniając użytkownikom prywatność i umożliwiając im otrzymywanie nagród za udział w działaniach marketingowych.

Jest to rozwiązanie korzystne dla wszystkich, którzy prowadzą kampanie reklamowe i użytkowników w Web3!

↪️ Link do rejestracji w dropie: https://privacypass.iex.ec

Dołącz do oficjalnych społeczności iExec:
Telegram: 🇺🇸@iexec_rlc_official
Telegram: 🇷🇺@iExec_russia

#iExec #AI #DePIN
Zobacz oryginał
$RLC Trend sztucznej inteligencji jest z nami poważnie i jeszcze przez długi czas firmy będą w dalszym ciągu wpompowywać w tę branżę ogromne pieniądze i nie ominie to projektów kryptograficznych. Dlaczego? Przychody NVIDIA, wydanie Chat GPT5, sztuczna inteligencja Apple, fundusz Microsoftu na sztuczną inteligencję o wartości 100 miliardów dolarów, Sam Altman zbiera 7 bilionów dolarów na chipy GPU i rozwój sztucznej inteligencji. Jak wszyscy już wiedzą, moim głównym faworytem jest#iExec#RLC, poufna platforma obliczeniowa dla#AIi nie tylko, współpracująca w tym obszarze z takimi firmami jak #Nvidia,#Microsofti #Intel. Token zawiera narracje takie jak #Web3,#AI#Oracle#DePIN#DeCC#RWAi #NFT. Podczas korekty zyskałem średnioterminową pozycję na poziomie 2 USD, biorąc pod uwagę paniczną wyprzedaż, poziom ten okazał się idealnym TVH. Nawet jeśli nie dotarłoby to do zlecenia, możesz bezpiecznie zyskać pozycję poniżej lub powyżej poziomu 2,4 USD (złoty współczynnik 0,318 fib) w zielonym bloku zleceń lub na reteście w fioletowym. W najbliższej przyszłości spodziewam się wybicia i konsolidacji powyżej poziomu 3,3 USD z późniejszym wejściem na poziomy 3,6 USD i 4 USD, cele ustalania pozycji średnioterminowej na poziomach 4,5 - 5 USD - 5,5 USD, pozycja długoterminowa to nadal wstrzymany, zacznę ustalać, kiedy nastąpi szczyt alternatywnego sezonu i spadek dominacji BTC. ✅Instrument wykazuje siłę w porównaniu do całego rynku ✅ Przetestowałem MA200 i dał dobre odbicie MA100 ✅ 4 próby przebicia się przez MA100 od dołu do góry, spodziewam się, że się przebije i zabezpieczy nad czerwonym blokiem porządkowym ✅ Podczas korekty dotarliśmy do poziomu 0,5 Fibo i stąd wzięła się reakcja kupującego. ✅Wyłamanie i konsolidacja powyżej trendu spadkowego Wśród nadchodzących znaczących wydarzeń: ❗️6 czerwca iExec weźmie udział w „Confidential Computing Summit” w San Francisco i zaprezentuje projekt oraz weryfikację koncepcji delegowanej federacyjnej platformy edukacyjnej opartej na zdecentralizowanym rynku przetwarzania w chmurze iExec. Struktura opiera się na technologii blockchain i wielu technologiach TEE (Intel SGX, TDX i nVidia Hopper Confidential Compute), aby wdrożyć branżową platformę zaufanej i poufnej sztucznej inteligencji. #Krypto#Trend#AICoins#Trends2024
$RLC Trend sztucznej inteligencji jest z nami poważnie i jeszcze przez długi czas firmy będą w dalszym ciągu wpompowywać w tę branżę ogromne pieniądze i nie ominie to projektów kryptograficznych. Dlaczego? Przychody NVIDIA, wydanie Chat GPT5, sztuczna inteligencja Apple, fundusz Microsoftu na sztuczną inteligencję o wartości 100 miliardów dolarów, Sam Altman zbiera 7 bilionów dolarów na chipy GPU i rozwój sztucznej inteligencji. Jak wszyscy już wiedzą, moim głównym faworytem jest#iExec#RLC, poufna platforma obliczeniowa dla#AIi nie tylko, współpracująca w tym obszarze z takimi firmami jak #Nvidia,#Microsofti #Intel. Token zawiera narracje takie jak #Web3,#AI#Oracle#DePIN#DeCC#RWAi #NFT.

Podczas korekty zyskałem średnioterminową pozycję na poziomie 2 USD, biorąc pod uwagę paniczną wyprzedaż, poziom ten okazał się idealnym TVH. Nawet jeśli nie dotarłoby to do zlecenia, możesz bezpiecznie zyskać pozycję poniżej lub powyżej poziomu 2,4 USD (złoty współczynnik 0,318 fib) w zielonym bloku zleceń lub na reteście w fioletowym. W najbliższej przyszłości spodziewam się wybicia i konsolidacji powyżej poziomu 3,3 USD z późniejszym wejściem na poziomy 3,6 USD i 4 USD, cele ustalania pozycji średnioterminowej na poziomach 4,5 - 5 USD - 5,5 USD, pozycja długoterminowa to nadal wstrzymany, zacznę ustalać, kiedy nastąpi szczyt alternatywnego sezonu i spadek dominacji BTC.

✅Instrument wykazuje siłę w porównaniu do całego rynku
✅ Przetestowałem MA200 i dał dobre odbicie MA100
✅ 4 próby przebicia się przez MA100 od dołu do góry, spodziewam się, że się przebije i zabezpieczy nad czerwonym blokiem porządkowym
✅ Podczas korekty dotarliśmy do poziomu 0,5 Fibo i stąd wzięła się reakcja kupującego.
✅Wyłamanie i konsolidacja powyżej trendu spadkowego

Wśród nadchodzących znaczących wydarzeń:

❗️6 czerwca iExec weźmie udział w „Confidential Computing Summit” w San Francisco i zaprezentuje projekt oraz weryfikację koncepcji delegowanej federacyjnej platformy edukacyjnej opartej na zdecentralizowanym rynku przetwarzania w chmurze iExec. Struktura opiera się na technologii blockchain i wielu technologiach TEE (Intel SGX, TDX i nVidia Hopper Confidential Compute), aby wdrożyć branżową platformę zaufanej i poufnej sztucznej inteligencji.
#Krypto#Trend#AICoins#Trends2024
Zobacz oryginał
$RLC to jedna z najbardziej obiecujących monet pod względem wzrostu wśród innych kryptowalut. Dlaczego tak myślę? Ponieważ sztuczna inteligencja potrzebuje ochrony danych, iExec opracowuje nowe standardy poufnego przetwarzania danych wraz z firmami Nvidia, Microsoft, Intel i innymi gigantami branżowymi. Marketplace iExec umożliwia monetyzację AI Dapps, monetyzację zestawów danych dla AI przy zachowaniu kontroli nad prawami do tych danych, a także pozwala w bardzo łatwy i szybki sposób tworzyć wyrocznie danych, monetyzować zasoby obliczeniowe Twojego komputera i odpowiednio je wynajmować. Ten projekt jest wyjątkowym diamentem wśród innych projektów. Dowiedz się więcej o tym projekcie i tym, co budują. #AI #iExec #DePIN #RWA #Trends2024
$RLC to jedna z najbardziej obiecujących monet pod względem wzrostu wśród innych kryptowalut. Dlaczego tak myślę? Ponieważ sztuczna inteligencja potrzebuje ochrony danych, iExec opracowuje nowe standardy poufnego przetwarzania danych wraz z firmami Nvidia, Microsoft, Intel i innymi gigantami branżowymi. Marketplace iExec umożliwia monetyzację AI Dapps, monetyzację zestawów danych dla AI przy zachowaniu kontroli nad prawami do tych danych, a także pozwala w bardzo łatwy i szybki sposób tworzyć wyrocznie danych, monetyzować zasoby obliczeniowe Twojego komputera i odpowiednio je wynajmować. Ten projekt jest wyjątkowym diamentem wśród innych projektów. Dowiedz się więcej o tym projekcie i tym, co budują.

#AI #iExec #DePIN #RWA #Trends2024
LIVE
LIVE
TradingX
--
Talent Layer has integrated its Web3 stack, powered by #iExec, on the ChatGPT App Store! Search over 1 million job opportunities with Freelance Search - currently Top1 in its category 🏆 $RLC #AI

Talent Layer has integrated its Web3 stack, powered by #iExec, on the ChatGPT App Store! Search over 1 million job opportunities with Freelance Search - currently Top1 in its category 🏆 $RLC #AI

Zobacz oryginał
Buduj kompleksowe zaufanie do sztucznej inteligencji. iExec $RLC będzie wystawcą na festiwalu World AI w Cannes! Na festiwalu World AI w Cannes pokażemy, jak iExec i Web3 mogą zapewnić przejrzystość, zarządzanie i poufność sztucznej inteligencji. Jak w obliczu rosnącej integracji#AImożemy zagwarantować zaufanie do sposobu, w jaki modele przetwarzają nasze dane? Dołącz do naszych warsztatów na temat „Jak zaufana i prywatna sztuczna inteligencja staje się rzeczywistością” 🗓️ 2 lutego Oczekuje się, że zaufana sztuczna inteligencja będzie głównym trendem w 2024 r. – jest to również ważny punkt planu działania iExec. #iExec #AI #Web3 #blockchain
Buduj kompleksowe zaufanie do sztucznej inteligencji.

iExec $RLC będzie wystawcą na festiwalu World AI w Cannes! Na festiwalu World AI w Cannes pokażemy, jak iExec i Web3 mogą zapewnić przejrzystość, zarządzanie i poufność sztucznej inteligencji.

Jak w obliczu rosnącej integracji#AImożemy zagwarantować zaufanie do sposobu, w jaki modele przetwarzają nasze dane?

Dołącz do naszych warsztatów na temat „Jak zaufana i prywatna sztuczna inteligencja staje się rzeczywistością” 🗓️ 2 lutego

Oczekuje się, że zaufana sztuczna inteligencja będzie głównym trendem w 2024 r. – jest to również ważny punkt planu działania iExec.

#iExec #AI #Web3 #blockchain
Zobacz oryginał
Zespół badawczy iExec znajduje się w czołówce technologii zwiększających prywatność (PET). W 2024 roku będziemy badać dalsze rozwiązania sprzętowe, takie jak Intel Trust Domain Extensions (Intel® TDX) i rozpoczynać badania z procesorami graficznymi NVIDIA pod kątem zaufanych aplikacji AI. Aktywnie przyglądamy się także roli rozwiązań programowych, takich jak Zero-Knowledge Proofs, w naszej infrastrukturze. Jedno jest pewne: iExec jest gotowy zdefiniować nadchodzącą erę bezpieczeństwa i prywatności #AI. Możliwości oparte na sztucznej inteligencji to wiodące technologie przyszłości! $RLC #iExec #cloudcomputing #blockchain #cloudcomputing
Zespół badawczy iExec znajduje się w czołówce technologii zwiększających prywatność (PET).
W 2024 roku będziemy badać dalsze rozwiązania sprzętowe, takie jak Intel Trust Domain Extensions (Intel® TDX) i rozpoczynać badania z procesorami graficznymi NVIDIA pod kątem zaufanych aplikacji AI. Aktywnie przyglądamy się także roli rozwiązań programowych, takich jak Zero-Knowledge Proofs, w naszej infrastrukturze.
Jedno jest pewne: iExec jest gotowy zdefiniować nadchodzącą erę bezpieczeństwa i prywatności #AI.
Możliwości oparte na sztucznej inteligencji to wiodące technologie przyszłości!

$RLC #iExec #cloudcomputing #blockchain #cloudcomputing
Zobacz oryginał
Główna kryptoteza DePIN na rok 2024 #iExec $RLC przedstawiono w sekcjach branżowych #DePIN na stronie 186 - w raporcie Messari „#Cryptothesis na rok 2024” iExec zapewnia programistom narzędzia do tworzenia aplikacji chroniących prywatność. Dzięki iExec właściciele wytrenowanych modeli #AI mogą zarabiać na wykorzystaniu swojego modelu jako zbioru danych, zachowując jednocześnie pełną własność. Infrastruktura iExec rozwiązuje jeden z kluczowych problemów sztucznej inteligencji i pomaga chronić dane. Dowiedz się, jak innowacyjne podejście iExec kształtuje przyszłość sztucznej inteligencji i #blockchain. Pełny raport: https://resources.messari.io/pdf/crypto-theses-for-2024.pdf
Główna kryptoteza DePIN na rok 2024

#iExec $RLC przedstawiono w sekcjach branżowych #DePIN na stronie 186 - w raporcie Messari „#Cryptothesis na rok 2024”
iExec zapewnia programistom narzędzia do tworzenia aplikacji chroniących prywatność. Dzięki iExec właściciele wytrenowanych modeli #AI mogą zarabiać na wykorzystaniu swojego modelu jako zbioru danych, zachowując jednocześnie pełną własność. Infrastruktura iExec rozwiązuje jeden z kluczowych problemów sztucznej inteligencji i pomaga chronić dane. Dowiedz się, jak innowacyjne podejście iExec kształtuje przyszłość sztucznej inteligencji i #blockchain.

Pełny raport: https://resources.messari.io/pdf/crypto-theses-for-2024.pdf
Zobacz oryginał
Sztuczna inteligencja i infrastruktura kryptograficzna! Przełom na skrzyżowaniu kryptowalut i sztucznej inteligencji! iExec pojawił się w analizie Messari Crypto, która pokazała, jak przeniesienie obliczeń poza łańcuchem z powrotem do łańcucha może zwiększyć weryfikowalność obliczeń dla sztucznej inteligencji. Korzystając z platformy iExec, właściciele wyszkolonych modeli AI mogą monetyzować je w postaci zbiorów danych, zachowując jednocześnie nad nimi pełną kontrolę. iExec rozwiązuje problemy podkreślone w raporcie Messari i nie tylko. Dowiedz się, jak innowacyjne podejście iExec kształtuje przyszłość sztucznej inteligencji i blockchain. ⏯️ Obejrzyj całą prezentację tutaj: https://youtu.be/hCsMOOxdsU8?si=pvCwwVbUoZ2TBavT&t=142 #DePIN #iExec $RLC #Messari #AI #blockchain
Sztuczna inteligencja i infrastruktura kryptograficzna!

Przełom na skrzyżowaniu kryptowalut i sztucznej inteligencji!
iExec pojawił się w analizie Messari Crypto, która pokazała, jak przeniesienie obliczeń poza łańcuchem z powrotem do łańcucha może zwiększyć weryfikowalność obliczeń dla sztucznej inteligencji. Korzystając z platformy iExec, właściciele wyszkolonych modeli AI mogą monetyzować je w postaci zbiorów danych, zachowując jednocześnie nad nimi pełną kontrolę. iExec rozwiązuje problemy podkreślone w raporcie Messari i nie tylko. Dowiedz się, jak innowacyjne podejście iExec kształtuje przyszłość sztucznej inteligencji i blockchain.

⏯️ Obejrzyj całą prezentację tutaj: https://youtu.be/hCsMOOxdsU8?si=pvCwwVbUoZ2TBavT&t=142

#DePIN #iExec $RLC #Messari #AI #blockchain
Tłumacz
iExec $RLC is proud to wrap up the ONTOCHAIN program, a 3-year collaboration with the European Commission. iExec tech, particularly decentralized oracles and computing, powered ONTOCHAIN projects. Read more about iExec's role & some other milestones: [iExec x European Union: Concluding the ONTOCHAIN initiative](https://www.binance.com/en/feed/post/1996227681178) #iExec #blockchain #Oracle #Web3 #AI
iExec $RLC is proud to wrap up the ONTOCHAIN program, a 3-year collaboration with the European Commission.
iExec tech, particularly decentralized oracles and computing, powered ONTOCHAIN projects.
Read more about iExec's role & some other milestones: iExec x European Union: Concluding the ONTOCHAIN initiative

#iExec
#blockchain
#Oracle
#Web3
#AI
Tłumacz
iExec x European Union: Concluding the ONTOCHAIN initiativeThe ONTOCHAIN project, funded by the European Commission, aims to explore how blockchain can create a more secure internet. What is ONTOCHAIN? Launched in 2020, ONTOCHAIN was a European initiative that aims to create an ecosystem for trusted, traceable & transparent ontological knowledge. For that purpose, ONTOCHAIN empowers innovators to develop blockchain-based knowledge management solutions, with funding, mentoring by reputed organizations, and access to existing infrastructure. iExec has been a core partner of this initiative for the past 3 years, collaborating with a consortium of academic and industrial members. This prestigious list includes the Athens University of Economics, the University of Ljubljana and IntelliSemantic. This initiative is focused on creating a multifaceted platform featuring a suite of new protocols, libraries, and tools. These innovations are designed to create applications in various domains, such as healthcare, public services, distributed logistics, marketplace, automotive and real estate. The ONTOCHAIN ecosystem is based on Ethereum Virtual Machines (EVMs), and it has since expanded to other decentralized networks, including EOSIO, Solid, Tezos, KeeeX and Convex DLT. This achievement is the result of the joint efforts of 44 research and innovation teams which were selected and funded during three open calls. iExec’s role in ONTOCHAIN iExec played a pivotal role, providing the selected sub-parties with expertise, mentoring, and tech infrastructure support for decentralized and trusted computing. iExec serves as a key technology provider in the ONTOCHAIN project thanks to its unique expertise in Blockchain and decentralized computing. Particularly relevant to ONTOCHAIN has been iExec’s framework for building complex Decentralized Oracles. This allows developers to integrate real-world data into a blockchain with high trust levels. Our participation in ONTOCHAIN has opened several opportunities. Here are just some of the milestone from the last couple of years: iExec’s active engagement in EU events, including conferences and hackathons, coupled with the success of ONTOCHAIN, has boosted our visibility and fostered new partnerships.In response to iExec’s popularity among the developer community, we launched a developer incentives program.The iExec Sidechain (bellecour) became the used as the main blockchain used by projects within ONTOCHAIN. iExec waw also able to benefit from valuable insight into the chain, leading to further optimization and enhancement.The integration of feedback from developers and innovators has led to massive improvements in the iExec platform.The iExec team has also established a robust support platform, which serves as a valuable resource for both ONTOCHAIN developers and those yet to come.3 years ago, the integration of projects from the open calls marked the first external projects running on iExec. The remarkable success of these initial projects and the growing use of our platform features have not only expanded the iExec network but also propelled the platform into a state of continuous innovation. Closing Thoughts on the ONTOCHAIN Project Throughout the three-year span of the ONTOCHAIN project, iExec, bolstered by the successes of third-party teams, has made significant advancements in various fields, ranging from mentorship to accelerating the development of the technology within the protocol itself. The ONTOCHAIN project has provided deep insights into the influences that project collaborations can have on a company, particularly for iExec in its capacity as a technical partner. iExec is keen on extending these collaborations with other European projects to contribute more broadly to blockchain innovation and to benefit the whole ecosystem. $RLC #AI #Web3 #blockchain #iExec #DeFi

iExec x European Union: Concluding the ONTOCHAIN initiative

The ONTOCHAIN project, funded by the European Commission, aims to explore how blockchain can create a more secure internet.

What is ONTOCHAIN?
Launched in 2020, ONTOCHAIN was a European initiative that aims to create an ecosystem for trusted, traceable & transparent ontological knowledge. For that purpose, ONTOCHAIN empowers innovators to develop blockchain-based knowledge management solutions, with funding, mentoring by reputed organizations, and access to existing infrastructure.
iExec has been a core partner of this initiative for the past 3 years, collaborating with a consortium of academic and industrial members. This prestigious list includes the Athens University of Economics, the University of Ljubljana and IntelliSemantic.
This initiative is focused on creating a multifaceted platform featuring a suite of new protocols, libraries, and tools. These innovations are designed to create applications in various domains, such as healthcare, public services, distributed logistics, marketplace, automotive and real estate.
The ONTOCHAIN ecosystem is based on Ethereum Virtual Machines (EVMs), and it has since expanded to other decentralized networks, including EOSIO, Solid, Tezos, KeeeX and Convex DLT.
This achievement is the result of the joint efforts of 44 research and innovation teams which were selected and funded during three open calls.
iExec’s role in ONTOCHAIN
iExec played a pivotal role, providing the selected sub-parties with expertise, mentoring, and tech infrastructure support for decentralized and trusted computing.
iExec serves as a key technology provider in the ONTOCHAIN project thanks to its unique expertise in Blockchain and decentralized computing. Particularly relevant to ONTOCHAIN has been iExec’s framework for building complex Decentralized Oracles. This allows developers to integrate real-world data into a blockchain with high trust levels.
Our participation in ONTOCHAIN has opened several opportunities. Here are just some of the milestone from the last couple of years:
iExec’s active engagement in EU events, including conferences and hackathons, coupled with the success of ONTOCHAIN, has boosted our visibility and fostered new partnerships.In response to iExec’s popularity among the developer community, we launched a developer incentives program.The iExec Sidechain (bellecour) became the used as the main blockchain used by projects within ONTOCHAIN. iExec waw also able to benefit from valuable insight into the chain, leading to further optimization and enhancement.The integration of feedback from developers and innovators has led to massive improvements in the iExec platform.The iExec team has also established a robust support platform, which serves as a valuable resource for both ONTOCHAIN developers and those yet to come.3 years ago, the integration of projects from the open calls marked the first external projects running on iExec.
The remarkable success of these initial projects and the growing use of our platform features have not only expanded the iExec network but also propelled the platform into a state of continuous innovation.
Closing Thoughts on the ONTOCHAIN Project
Throughout the three-year span of the ONTOCHAIN project, iExec, bolstered by the successes of third-party teams, has made significant advancements in various fields, ranging from mentorship to accelerating the development of the technology within the protocol itself.
The ONTOCHAIN project has provided deep insights into the influences that project collaborations can have on a company, particularly for iExec in its capacity as a technical partner. iExec is keen on extending these collaborations with other European projects to contribute more broadly to blockchain innovation and to benefit the whole ecosystem.
$RLC #AI #Web3 #blockchain #iExec #DeFi
Tłumacz
⚡️#iExec $RLC collaborated with #Revolut to introduce the masses to iExec and the $RLC token. Over 18 million users of the Revolut app were notified of the Learn and Earn campaign, propelling iExec RLC to an astonishing #14 on the platform's Popularity Ranking! Revolut’s Earn & Learn Campaign: Onboarding Non-Crypto Users Revolut’s Earn & Learn campaigns typically target non-crypto Revolut users to onboard them into the crypto space and incentivize them to buy crypto.Today, RLC holds the rank of number 57 within Revolut’s crypto offerings, with the ambitious goal of propelling RLC closer to the top 10. The iExec-Revolut partnership is poised to revolutionize how mainstream users perceive and interact with cryptocurrencies, especially tokens like RLC. By focusing on education and rewards, this collaboration builds a bridge that benefits both the curious learner and the seasoned investor. As we usher in this new era of financial literacy and empowerment, we invite everyone to join in, learn, and, of course, earn. Read more: [Revolut Launches iExec Learn & Earn Campaign for RLC](https://www.binance.com/en/feed/post/1995303432145) #AI #blockchain #Web3
⚡️#iExec $RLC collaborated with #Revolut to introduce the masses to iExec and the $RLC token.

Over 18 million users of the Revolut app were notified of the Learn and Earn campaign, propelling iExec RLC to an astonishing #14 on the platform's Popularity Ranking!

Revolut’s Earn & Learn Campaign: Onboarding Non-Crypto Users
Revolut’s Earn & Learn campaigns typically target non-crypto Revolut users to onboard them into the crypto space and incentivize them to buy crypto.Today, RLC holds the rank of number 57 within Revolut’s crypto offerings, with the ambitious goal of propelling RLC closer to the top 10.
The iExec-Revolut partnership is poised to revolutionize how mainstream users perceive and interact with cryptocurrencies, especially tokens like RLC. By focusing on education and rewards, this collaboration builds a bridge that benefits both the curious learner and the seasoned investor. As we usher in this new era of financial literacy and empowerment, we invite everyone to join in, learn, and, of course, earn.

Read more: Revolut Launches iExec Learn & Earn Campaign for RLC

#AI #blockchain #Web3
Tłumacz
Revolut Launches iExec Learn & Earn Campaign for RLCRevolut Launches iExec Learn & Earn Campaign for RLC In a groundbreaking move designed to significantly boost mainstream awareness of iExec, the leading Marketplace for Web3 Resources, iExec is thrilled to announce its partnership with Revolut, a prominent fintech and neobank platform. This collaboration opens an unprecedented opportunity for over 30 million Revolut retail customers across 87 countries to delve into the realm of iExec and its native RLC token. Why This Matters for the iExec RLC Ecosystem The significance of this campaign cannot be overstated. While seasoned crypto enthusiasts are well-versed in the potential of blockchain, the vast majority of Revolut’s mainstream user base may not be. By introducing these “non crypto-native” users to the wonders of iExec and the RLC token, the initiative aims not only to raise awareness but to foster understanding and encourage informed participation in the crypto space. For iExec and the RLC token, this campaign amplifies visibility, credibility, and usability. These are essential for long-term growth and stability. About Crypto Learn & Earn on Revolut Driving this awareness campaign is Revolut’s “Crypto Learn & Earn” feature — an intuitive in-app education tool. Users are incentivized to explore lessons tailored to demystify the complex world of cryptocurrencies, earning rewards for their curiosity and effort. To access the Learn and Earn campaign: Launch your Revolut app.Head to your hub and tap the ‘Crypto’ icon.Scroll down to the ‘Learn’ section and tap “See all” to view all the available courses. Alternatively, access it directly from the ‘Learn’ icon in the Hub. As part of this collaboration, users will be introduced to iExec and the RLC token. For every completed lesson, users will be rewarded with a certain amount of RLC tokens, the specifics of which can be checked within the app before starting any lesson. Revolut’s Earn & Learn Campaign: Onboarding Non-Crypto Users Revolut’s Earn & Learn campaigns typically target non-crypto Revolut users to onboard them into the crypto space and incentivize them to buy crypto.Today, RLC holds the rank of number 57 within Revolut’s crypto offerings, with the ambitious goal of propelling RLC closer to the top 10. The iExec-Revolut partnership is poised to revolutionize how mainstream users perceive and interact with cryptocurrencies, especially tokens like RLC. By focusing on education and rewards, this collaboration builds a bridge that benefits both the curious learner and the seasoned investor. As we usher in this new era of financial literacy and empowerment, we invite everyone to join in, learn, and, of course, earn. $RLC #iExec #AI #Web3 #blockchain #Revolut

Revolut Launches iExec Learn & Earn Campaign for RLC

Revolut Launches iExec Learn & Earn Campaign for RLC
In a groundbreaking move designed to significantly boost mainstream awareness of iExec, the leading Marketplace for Web3 Resources, iExec is thrilled to announce its partnership with Revolut, a prominent fintech and neobank platform. This collaboration opens an unprecedented opportunity for over 30 million Revolut retail customers across 87 countries to delve into the realm of iExec and its native RLC token.
Why This Matters for the iExec RLC Ecosystem
The significance of this campaign cannot be overstated. While seasoned crypto enthusiasts are well-versed in the potential of blockchain, the vast majority of Revolut’s mainstream user base may not be. By introducing these “non crypto-native” users to the wonders of iExec and the RLC token, the initiative aims not only to raise awareness but to foster understanding and encourage informed participation in the crypto space.
For iExec and the RLC token, this campaign amplifies visibility, credibility, and usability. These are essential for long-term growth and stability.
About Crypto Learn & Earn on Revolut
Driving this awareness campaign is Revolut’s “Crypto Learn & Earn” feature — an intuitive in-app education tool. Users are incentivized to explore lessons tailored to demystify the complex world of cryptocurrencies, earning rewards for their curiosity and effort.
To access the Learn and Earn campaign:
Launch your Revolut app.Head to your hub and tap the ‘Crypto’ icon.Scroll down to the ‘Learn’ section and tap “See all” to view all the available courses.
Alternatively, access it directly from the ‘Learn’ icon in the Hub.
As part of this collaboration, users will be introduced to iExec and the RLC token. For every completed lesson, users will be rewarded with a certain amount of RLC tokens, the specifics of which can be checked within the app before starting any lesson.
Revolut’s Earn & Learn Campaign: Onboarding Non-Crypto Users
Revolut’s Earn & Learn campaigns typically target non-crypto Revolut users to onboard them into the crypto space and incentivize them to buy crypto.Today, RLC holds the rank of number 57 within Revolut’s crypto offerings, with the ambitious goal of propelling RLC closer to the top 10.
The iExec-Revolut partnership is poised to revolutionize how mainstream users perceive and interact with cryptocurrencies, especially tokens like RLC. By focusing on education and rewards, this collaboration builds a bridge that benefits both the curious learner and the seasoned investor. As we usher in this new era of financial literacy and empowerment, we invite everyone to join in, learn, and, of course, earn.
$RLC #iExec #AI #Web3 #blockchain #Revolut
Zobacz oryginał
TalentLayer integruje narzędzia deweloperskie iExec do marketingu zapewniającego większą prywatnośćTalentLayer, innowator przekształcający stos technologii do pracy, integruje zmieniające zasady gry narzędzia programistyczne Web3 firmy iExec na potrzeby marketingu zwiększającego prywatność (PEM). Blockchain iExec i poufne przetwarzanie danych ustępują miejsca nowej erze, w której skupienie się na użytkowniku i zwiększona prywatność stają się filarami komunikacji cyfrowej. TalentLayer współpracuje z iExec w zakresie narzędzi marketingu e-mailowego chroniących prywatność dla platform rekrutacyjnych Współczesny krajobraz cyfrowy niesie ze sobą dylemat: skuteczny marketing często oznaczał naruszenie prywatności użytkowników. Jednak wraz z przejściem na Web3 następuje wyraźny zwrot w kierunku autonomii i prywatności użytkowników. Jak możemy skutecznie wprowadzać na rynek produkty bez naruszania tych zasad?

TalentLayer integruje narzędzia deweloperskie iExec do marketingu zapewniającego większą prywatność

TalentLayer, innowator przekształcający stos technologii do pracy, integruje zmieniające zasady gry narzędzia programistyczne Web3 firmy iExec na potrzeby marketingu zwiększającego prywatność (PEM). Blockchain iExec i poufne przetwarzanie danych ustępują miejsca nowej erze, w której skupienie się na użytkowniku i zwiększona prywatność stają się filarami komunikacji cyfrowej.
TalentLayer współpracuje z iExec w zakresie narzędzi marketingu e-mailowego chroniących prywatność dla platform rekrutacyjnych

Współczesny krajobraz cyfrowy niesie ze sobą dylemat: skuteczny marketing często oznaczał naruszenie prywatności użytkowników. Jednak wraz z przejściem na Web3 następuje wyraźny zwrot w kierunku autonomii i prywatności użytkowników. Jak możemy skutecznie wprowadzać na rynek produkty bez naruszania tych zasad?
Tłumacz
DataProtector & Web3Mail: The Tech Behind the ToolsiExec recently unveiled new developer tools to address the use case of ‘Privacy-Enhancing Marketing’. These tools are the iExec DataProtector and iExec Web3Mail. These developer tools, existing as simple-to-use npm code packets, aim to revolutionize the way DApps handle data privacy and communication. This article will deep-dive into the technical functions of DataProtector and Web3Mail. iExec DataProtector The iExec DataProtector is a tool designed to protect user data by utilizing an encryption mechanism and managing access rights through smart contracts. Data owners can grant permission to applications, enabling them to use data — without actually disclosing the data itself. This tool is an efficient solution for handling data; it bundles and simplifies iExec dataset functionalities such as data encryption and access rights management. Furthermore, DataProtector facilitates the retrieval of all protected data associated with a specific owner or a specific data schema (see below an example of data schema). It also provides the user with the capability to revoke one or all access rights to data. In other words, data owners have the ability to dynamically manage and control access permissions, which ensures robust security and privacy of their data, with a user-friendly tool. In the iExec ecosystem, a dataset is a Non-Fungible Token (NFT) used as a governing mechanism for confidential data. In the iExec Marketplace, dataset providers create and sign ‘datasetorders’ which specify the governance of the dataset, e.g. which Dapp can use the dataset. In DataProtector, data owners define higher-level access rules that are automatically translated into datasetorders. DataProtector can easily be integrated into any software project (Quick start) to make protected data seamlessly accessible to authorized Confidential Computing applications. DataProtector relies on: 1/ a DataProtector smart contract that interacts with DatasetRegistry smart contract to create dataset; 2/ a DataProtector subgraph, an off-chain server that continually observes events on blockchain, and then stores, indexes, and retrieves data protected by DataProtector, and uses the following components of iExec protocol: The DatasetRegistry smart contract to create/mint the corresponding dataset associated with the protected datathe PoCo smart contract to manage access rightsthe iExec Marketplace to share ordersthe Secret Management Service (SMS) to store the users’ secrets The six functions of DataProtector 1/ ProtectData encrypts users’ data and records ownership on a smart contract. To protect his data, a user calls the protectData function by providing the data data as input. Optionally, the user can also specify a name for the data, which will be public information and remain unencrypted. If no name is provided, it is assigned as “Untitled”. Here, an example of a data object: data: { email: 'example@gmail.com', SMTPserver: { port: 5000, smtp_server: 'smtp.gmail.com' } } In this example, the data object consists of two keys: email and SMTPserver. The value of email is example@gmail.com. The value of SMTPserver comprises two other key/value pairs: port with the value 5000 and smtp_server with the value smtp.gmail.com. Then, the protectData function runs the following steps: Extract the data schema, i.e. the different key and type of each value. Here, the corresponding data schema of the previous data example: dataSchema: { "email": "string", "SMTPserver": { "port": "int", "smtp_server": "string" } } 2. Create an archive of data which is seen as a folder. In this folder, a file is created for each key. The type of each file matches the type of the corresponding key and the file contains the corresponding value specified in the data. It is possible to have sub-data that correspond to the sub key/value pairs of a key. This key is created as a folder in which a file is created for each sub-key/value pair. The global folder is zipped into an archive. Here, the corresponding archive of the previous data example: Example: right part to include This tree structure allows you to protect any type of data such as files, text, image, and more. Additionally, the resulting archive can be easily uploaded to any storage platform, facilitating data storage and retrieval processes. 3. Generate an encryption key and encrypt the archive. The AES-256-CBC standard encryption scheme is used in this encryption. Then, the encrypted archive is pushed into the IPFS public storage. 4. Send to the DataProtector smart contract the data schema along with classic datasets creation arguments: DataProtector smart contract calls the DatasetRegistry smart contract to mint the corresponding dataset and broadcasts the data schema in a blockchain event.DataProtector subgraph observes this event and indexes the protected data. 5. Push the encryption secret key to the SMS. 6. Return to the user the protectedData and metadata values. 2/ grantAccess that authorizes an application to use users’ data without ever revealing the data itself. A data owner uses the grantAccess function to authorize an application and a requester to access his or her protected data. This function takes as inputs protectedData, authorizedApp and authorizedUser that are the addresses of the protected data, the application and the user respectively. Then, the grantAccess function runs the following steps: Create a datasetorder to set the governance rules, i.e. the access rights for authorizedApp and authorizedUser, signed by the owner of the dataset.Publish datasetorder on the iExec Marketplace.Return to the user the datasetorder. 3/ revokeAllAccessObservable that revokes all applications’ access to a specific protected data. The revokeAllAccessObservable function is called by a data owner with the protectedData value and optionally, the authorizedApp filter and/or the authorizedUser filter. Then, the revokeAllAccessObservable function runs the following steps: Query datasetorders to the marketplace and if provided, matches the filters.For each datasetorder, it revokes datasetorder with a call to the PoCo smart contract that emits an event of this revocation. The Marketplace API observes this event and clears the corresponding order.For each revoked access, it returns the datasetorder and the transaction signed by the owner that revokes this access. 4/ revokeOneAccess that revokes an application's access to a specific protected dataset. The revokeOneAccess function is similar to the revokeAllAccessObservable function except that the revocation is for one access. A data owner calls revokeOneAccess with grantedAccess as input to initiate the revocation of this access. The grantedAccess value can be obtained from the fetchGrantedAccess function. Then, revokeOneAccess runs the following steps: Request a revocation of the corresponding datasetoder to the PoCo smart contract that emits an event of this revocation. The Marketplace API observes this event and clears the corresponding order.Return the datasetorder and the transaction signed by the owner that revokes the access. 5/ fetchProtectedData that retrieves encrypted data protected by DataProtector. A user calls the fetchProtectedData function with optionally, an owner filter (to obtain only the encrypted data of a particular user) and/or a dataSchema filter (to retrieve the encrypted data with a specific schema). Then, the fetchProtectedData function processes the following steps: Query the protected data to the DataProtector subgraph, optionally matching the filters.Return to the user an array of the requested protected data, i.e. name, address, owner and schema of each protected data, optionally matching the filters. 6/ fetchGrantedAccess that provides the list of accesses granted on a specific protected data. The fetchGrantedAccess function has a similar mechanism to the fetchProtectedData function except that the request is for the granted accesses of a given protected data. This request works as follows: A user calls fetchGrantedAccess with protectedData as input. Optionally, the user can request only the authorized applications and/or the authorized requester by specifying the authorizedApp and authorizedUser filters respectively.fetchGrantedAccess queries datasetorder matching the filters to the Marketplace API and returns an array of the all granted accesses. Example use case: Web3Mail Using DataProtector, Web3Mail is a tool for developers to create applications that enable sending an email to Ethereum account holders without knowing their email address. By leveraging this tool, end-users can eliminate the requirement of sharing their email address with multiple third parties, significantly mitigating the risks associated with data breaches and spam. Web3Mail relies on DataProtector to protect email addresses and interact with the iExec protocol, the sendEmail DApp and mailjet service to send emails. In the iExec Marketplace, application providers create and sign ‘apporders’ that specify the governance of the application, e.g. the fee for each execution of the DApp. In Web3Mail, the sendEmail DApp is already deployed and the corresponding apporder has been signed and published in the iExec Marketplace. The sendEmail DApp takes the subject and the content of the email as requester secrets and sends an email to the protected email address. In the iExec protocol, the requester secrets are parameters only exposed to authorized applications inside enclaves and never leave them. In Web3Mail, only sendEmail DApp can access the subject and the content of emails. First of all, the Ethereum account holders use DataProtector to protect their email addresses and grant permission to other users to send them emails. An Ethereum account holder can specify a predetermined limit for accessing his protected email. Once this limit is reached, the account holder must call the grantAccess function of DataProtector to grant permission for further emails to be sent to him. For each protected email, a dataset has been created and the corresponding datasetorder has been signed and published in the iExec Marketplace and indexed by the Graph. Web3Mail comprises of two functions: fetchMyContacts that returns the list of Ethereum accounts whose owners have authorized to email them. A user calls the fetchMyContactsfunction that runs the following steps: Send a request to the Marketplace API to recover the list of datasetorders for which the owners have granted permission to the user to access and utilize their protected dataset.Request the corresponding protected datasets to the Graph.Verify whether each dataset includes an email field, ensuring that the schema of each protected dataset matches with ‘email:string’.Return to the user the list of valid contacts, including the protected dataset and owner addresses. sendEmail that sends an email to a user by knowing only the Ethereum account A user invokes the sendEmail function to send an email to an authorized Ethereum account holder, who can be retrieved using the fetchMyContacts function. The user specifies the email subject emailSubject, the email content emailContent and the protected email address protectedData. The sendEmail function creates and signs an order called ‘requestorder’ to request an execution of the sendEmail DApp. Therefore, the process of this function is similar to creating a request for a task in the iExec protocol. In the iExec ecosystem, a task is an instance where computing power is required. The task is the execution of a deal between a datasetorder, an apporder, a requestorder and a workerpoolorder, indicating which workers are available for which category of tasks. In Web3Mail, a task is an execution of sendEmail DApp with the protected email as dataset, the email subject and the email content as requester secrets. sendEmail processes the following steps: Query the SMS to check the existence of the storage token. This token is used as an authentication token for the worker to upload the result of the task. This ensures that only the authorized worker is able to submit the task result.Request the corresponding protected dataset to the Graph and verify whether each dataset includes an email field.Request to the Marketplace API: The datasetorder of the protected email with the protectedData address, the apporder of sendEmail DApp, the workerpoolorderPush emailSubject and emailContent as requester secrets (see iExec Technical Documentation for further details).Create and sign a requestorder to request an execution of the sendEmail DApp with the emailSubject and emailContent as requester secrets. In the requestorder, the user can specify the price he is willing to pay for the execution of the task.Notify the PoCo smart contract that there is an orders’ match between the apporder, datasetorder, workerpoolorder and requesterorder. Then, the PoCo smart contract: verifies and validates the match, emits an orders match and a notification to the scheduler of the workerpool, returns the dealidRequest to compute the corresponding task of the deal to the PoCo smart contract. The scheduler that has already watched the orders match and the notification from the PoCo smart contract initiates the task which triggers the sendEmail DApp execution.Return the taskid to the user. Limitations of these tools DataProtector and so Web3Mail utilize the Confidential Computing (CC) developed by iExec. The SMS used in iExec CC is a centralized component in which users send their secrets, e.g. the secret key for encrypting data. When a secret is received, the SMS creates a secure session within the CAS (Configuration and Attestation Service), pushes in the secret and grants the application associated with the requestorder to access it. However, due to the centralized nature of the SMS, there exists a potential single point of failure. If either the CAS or the SMS undergo an update or is down, there is a risk of losing the stored secrets. To address this concern, iExec is actively working towards decentralizing the SMS, thereby mitigating the aforementioned issue and enhancing overall system resilience. It is important to note that Web3Mail utilizes Mailjet services, employing an intermediate email address to facilitate the sending of emails. The level of trust in Web3Mail is directly linked to the trust placed in both the mailjet service and iExec operating it and having the ability to access the email addresses and the email content. Thanks for reading! 💬 If you’d like to ask anything about these tools, or learn funding opportunities, feel free to reach out to the iExec team in our official Discord server. 📚Get started with these tools, check out the iExec Documentation $RLC #iExec #AI #Web3 #blockchain #Dapps

DataProtector & Web3Mail: The Tech Behind the Tools

iExec recently unveiled new developer tools to address the use case of ‘Privacy-Enhancing Marketing’. These tools are the iExec DataProtector and iExec Web3Mail. These developer tools, existing as simple-to-use npm code packets, aim to revolutionize the way DApps handle data privacy and communication. This article will deep-dive into the technical functions of DataProtector and Web3Mail.
iExec DataProtector
The iExec DataProtector is a tool designed to protect user data by utilizing an encryption mechanism and managing access rights through smart contracts. Data owners can grant permission to applications, enabling them to use data — without actually disclosing the data itself.
This tool is an efficient solution for handling data; it bundles and simplifies iExec dataset functionalities such as data encryption and access rights management. Furthermore, DataProtector facilitates the retrieval of all protected data associated with a specific owner or a specific data schema (see below an example of data schema). It also provides the user with the capability to revoke one or all access rights to data. In other words, data owners have the ability to dynamically manage and control access permissions, which ensures robust security and privacy of their data, with a user-friendly tool.
In the iExec ecosystem, a dataset is a Non-Fungible Token (NFT) used as a governing mechanism for confidential data. In the iExec Marketplace, dataset providers create and sign ‘datasetorders’ which specify the governance of the dataset, e.g. which Dapp can use the dataset. In DataProtector, data owners define higher-level access rules that are automatically translated into datasetorders.
DataProtector can easily be integrated into any software project (Quick start) to make protected data seamlessly accessible to authorized Confidential Computing applications.
DataProtector relies on:
1/ a DataProtector smart contract that interacts with DatasetRegistry smart contract to create dataset;
2/ a DataProtector subgraph, an off-chain server that continually observes events on blockchain, and then stores, indexes, and retrieves data protected by DataProtector, and uses the following components of iExec protocol:
The DatasetRegistry smart contract to create/mint the corresponding dataset associated with the protected datathe PoCo smart contract to manage access rightsthe iExec Marketplace to share ordersthe Secret Management Service (SMS) to store the users’ secrets
The six functions of DataProtector
1/ ProtectData encrypts users’ data and records ownership on a smart contract.

To protect his data, a user calls the protectData function by providing the data data as input. Optionally, the user can also specify a name for the data, which will be public information and remain unencrypted. If no name is provided, it is assigned as “Untitled”.
Here, an example of a data object:
data:
{
email: 'example@gmail.com',
SMTPserver: {
port: 5000,
smtp_server: 'smtp.gmail.com'
}
}
In this example, the data object consists of two keys: email and SMTPserver. The value of email is example@gmail.com. The value of SMTPserver comprises two other key/value pairs: port with the value 5000 and smtp_server with the value smtp.gmail.com.
Then, the protectData function runs the following steps:
Extract the data schema, i.e. the different key and type of each value. Here, the corresponding data schema of the previous data example:
dataSchema:
{
"email": "string",
"SMTPserver": {
"port": "int",
"smtp_server": "string"
}
}
2. Create an archive of data which is seen as a folder. In this folder, a file is created for each key. The type of each file matches the type of the corresponding key and the file contains the corresponding value specified in the data. It is possible to have sub-data that correspond to the sub key/value pairs of a key. This key is created as a folder in which a file is created for each sub-key/value pair. The global folder is zipped into an archive.
Here, the corresponding archive of the previous data example:
Example: right part to include
This tree structure allows you to protect any type of data such as files, text, image, and more. Additionally, the resulting archive can be easily uploaded to any storage platform, facilitating data storage and retrieval processes.
3. Generate an encryption key and encrypt the archive. The AES-256-CBC standard encryption scheme is used in this encryption. Then, the encrypted archive is pushed into the IPFS public storage.
4. Send to the DataProtector smart contract the data schema along with classic datasets creation arguments:
DataProtector smart contract calls the DatasetRegistry smart contract to mint the corresponding dataset and broadcasts the data schema in a blockchain event.DataProtector subgraph observes this event and indexes the protected data.
5. Push the encryption secret key to the SMS.
6. Return to the user the protectedData and metadata values.
2/ grantAccess that authorizes an application to use users’ data without ever revealing the data itself.

A data owner uses the grantAccess function to authorize an application and a requester to access his or her protected data. This function takes as inputs protectedData, authorizedApp and authorizedUser that are the addresses of the protected data, the application and the user respectively. Then, the grantAccess function runs the following steps:
Create a datasetorder to set the governance rules, i.e. the access rights for authorizedApp and authorizedUser, signed by the owner of the dataset.Publish datasetorder on the iExec Marketplace.Return to the user the datasetorder.
3/ revokeAllAccessObservable that revokes all applications’ access to a specific protected data.

The revokeAllAccessObservable function is called by a data owner with the protectedData value and optionally, the authorizedApp filter and/or the authorizedUser filter. Then, the revokeAllAccessObservable function runs the following steps:
Query datasetorders to the marketplace and if provided, matches the filters.For each datasetorder, it revokes datasetorder with a call to the PoCo smart contract that emits an event of this revocation. The Marketplace API observes this event and clears the corresponding order.For each revoked access, it returns the datasetorder and the transaction signed by the owner that revokes this access.
4/ revokeOneAccess that revokes an application's access to a specific protected dataset.

The revokeOneAccess function is similar to the revokeAllAccessObservable function except that the revocation is for one access. A data owner calls revokeOneAccess with grantedAccess as input to initiate the revocation of this access. The grantedAccess value can be obtained from the fetchGrantedAccess function. Then, revokeOneAccess runs the following steps:
Request a revocation of the corresponding datasetoder to the PoCo smart contract that emits an event of this revocation. The Marketplace API observes this event and clears the corresponding order.Return the datasetorder and the transaction signed by the owner that revokes the access.
5/ fetchProtectedData that retrieves encrypted data protected by DataProtector.

A user calls the fetchProtectedData function with optionally, an owner filter (to obtain only the encrypted data of a particular user) and/or a dataSchema filter (to retrieve the encrypted data with a specific schema). Then, the fetchProtectedData function processes the following steps:
Query the protected data to the DataProtector subgraph, optionally matching the filters.Return to the user an array of the requested protected data, i.e. name, address, owner and schema of each protected data, optionally matching the filters.
6/ fetchGrantedAccess that provides the list of accesses granted on a specific protected data.

The fetchGrantedAccess function has a similar mechanism to the fetchProtectedData function except that the request is for the granted accesses of a given protected data. This request works as follows:
A user calls fetchGrantedAccess with protectedData as input. Optionally, the user can request only the authorized applications and/or the authorized requester by specifying the authorizedApp and authorizedUser filters respectively.fetchGrantedAccess queries datasetorder matching the filters to the Marketplace API and returns an array of the all granted accesses.
Example use case: Web3Mail
Using DataProtector, Web3Mail is a tool for developers to create applications that enable sending an email to Ethereum account holders without knowing their email address. By leveraging this tool, end-users can eliminate the requirement of sharing their email address with multiple third parties, significantly mitigating the risks associated with data breaches and spam.
Web3Mail relies on DataProtector to protect email addresses and interact with the iExec protocol, the sendEmail DApp and mailjet service to send emails.
In the iExec Marketplace, application providers create and sign ‘apporders’ that specify the governance of the application, e.g. the fee for each execution of the DApp. In Web3Mail, the sendEmail DApp is already deployed and the corresponding apporder has been signed and published in the iExec Marketplace. The sendEmail DApp takes the subject and the content of the email as requester secrets and sends an email to the protected email address.
In the iExec protocol, the requester secrets are parameters only exposed to authorized applications inside enclaves and never leave them. In Web3Mail, only sendEmail DApp can access the subject and the content of emails.
First of all, the Ethereum account holders use DataProtector to protect their email addresses and grant permission to other users to send them emails. An Ethereum account holder can specify a predetermined limit for accessing his protected email. Once this limit is reached, the account holder must call the grantAccess function of DataProtector to grant permission for further emails to be sent to him.
For each protected email, a dataset has been created and the corresponding datasetorder has been signed and published in the iExec Marketplace and indexed by the Graph.
Web3Mail comprises of two functions:
fetchMyContacts that returns the list of Ethereum accounts whose owners have authorized to email them. A user calls the fetchMyContactsfunction that runs the following steps:
Send a request to the Marketplace API to recover the list of datasetorders for which the owners have granted permission to the user to access and utilize their protected dataset.Request the corresponding protected datasets to the Graph.Verify whether each dataset includes an email field, ensuring that the schema of each protected dataset matches with ‘email:string’.Return to the user the list of valid contacts, including the protected dataset and owner addresses.
sendEmail that sends an email to a user by knowing only the Ethereum account
A user invokes the sendEmail function to send an email to an authorized Ethereum account holder, who can be retrieved using the fetchMyContacts function. The user specifies the email subject emailSubject, the email content emailContent and the protected email address protectedData.
The sendEmail function creates and signs an order called ‘requestorder’ to request an execution of the sendEmail DApp. Therefore, the process of this function is similar to creating a request for a task in the iExec protocol.
In the iExec ecosystem, a task is an instance where computing power is required. The task is the execution of a deal between a datasetorder, an apporder, a requestorder and a workerpoolorder, indicating which workers are available for which category of tasks. In Web3Mail, a task is an execution of sendEmail DApp with the protected email as dataset, the email subject and the email content as requester secrets.
sendEmail processes the following steps:
Query the SMS to check the existence of the storage token. This token is used as an authentication token for the worker to upload the result of the task. This ensures that only the authorized worker is able to submit the task result.Request the corresponding protected dataset to the Graph and verify whether each dataset includes an email field.Request to the Marketplace API: The datasetorder of the protected email with the protectedData address, the apporder of sendEmail DApp, the workerpoolorderPush emailSubject and emailContent as requester secrets (see iExec Technical Documentation for further details).Create and sign a requestorder to request an execution of the sendEmail DApp with the emailSubject and emailContent as requester secrets. In the requestorder, the user can specify the price he is willing to pay for the execution of the task.Notify the PoCo smart contract that there is an orders’ match between the apporder, datasetorder, workerpoolorder and requesterorder. Then, the PoCo smart contract: verifies and validates the match, emits an orders match and a notification to the scheduler of the workerpool, returns the dealidRequest to compute the corresponding task of the deal to the PoCo smart contract. The scheduler that has already watched the orders match and the notification from the PoCo smart contract initiates the task which triggers the sendEmail DApp execution.Return the taskid to the user.
Limitations of these tools
DataProtector and so Web3Mail utilize the Confidential Computing (CC) developed by iExec. The SMS used in iExec CC is a centralized component in which users send their secrets, e.g. the secret key for encrypting data. When a secret is received, the SMS creates a secure session within the CAS (Configuration and Attestation Service), pushes in the secret and grants the application associated with the requestorder to access it. However, due to the centralized nature of the SMS, there exists a potential single point of failure. If either the CAS or the SMS undergo an update or is down, there is a risk of losing the stored secrets. To address this concern, iExec is actively working towards decentralizing the SMS, thereby mitigating the aforementioned issue and enhancing overall system resilience.
It is important to note that Web3Mail utilizes Mailjet services, employing an intermediate email address to facilitate the sending of emails. The level of trust in Web3Mail is directly linked to the trust placed in both the mailjet service and iExec operating it and having the ability to access the email addresses and the email content.
Thanks for reading!
💬 If you’d like to ask anything about these tools, or learn funding opportunities, feel free to reach out to the iExec team in our official Discord server.
📚Get started with these tools, check out the iExec Documentation

$RLC #iExec #AI #Web3 #blockchain #Dapps
Tłumacz
Introducing Privacy-Enhancing Marketing: The Future of Marketing in Web3TL;DR: Revolutionizing Web3 marketing, iExec releases new developer tools that enable Privacy-Enhanced Marketing, prioritizing user privacy and consent control. Traditional Web2 marketing has repeatedly proven to be a failure in safeguarding privacy and obtaining consent. The pursuit of never-ending performance optimization has led to invasive data collection practices, opaque algorithms, a blatant disregard for user rights, and the implementation of data monetization mechanisms that never benefit the user. This is one of the main reasons why an increasing population of tech-savvy users gravitate towards Web3 solutions. However, the new Web3 paradigm, where users authenticate and connect to services using wallet addresses, has led to direct marketing becoming exceedingly challenging for Web3 companies. Can technology enable a web3 version of digital marketing that ensures user privacy and provides full control over consent? To tackle these obstacles, iExec has developed an innovative approach that transforms how marketing actions can be run in Web3. Our solution empowers decentralized apps and their users by fostering consent, preserving privacy, and building powerful and secure connections. What is Privacy-Enhanced Marketing (PEM)? Keeping in mind the top challenges Web2 and Web3 face today, iExec has developed an innovative approach. It is based on the following principles: User consent management mechanisms should be used to ensure that users explicitly authorize sharing their personal data with third parties. Secure Data Sharing Protocols powered by confidential computing can facilitate secure data sharing between users and third parties. Privacy-Preserving communication channels should be used to enable third parties to communicate with users without directly accessing users’ personal data.  Marketing techniques should enable targeted marketing campaigns without exposing users’ personal data. Users should be able to monetize their engagement with direct marketing campaigns by earning rewards, such as cryptocurrency or utility tokens.  Users should be incentivized to share their preferences and interests while maintaining control over their privacy. Introducing New iExec Developer Tools Our new developer tools iExec DataProtector and iExec Web3Mail were designed to give developers a seamless experience for integrating the following capabilities into their DApps: iExec DataProtector means users can allow a decentralized application to use their data without having to reveal the data itself. The iExec DataProtector tool provides users with unparalleled ownership over their data. Their personal information remains secure and under their control, giving them the confidence to explore and engage with DApps without compromising their privacy. It works thanks to Confidential Computing end-to-end encryption combined with blockchain. As an npm package, it has never been so easy to implement this technology into your app! iExec Web3Mail makes it possible to email registered Ethereum account holders without knowing or storing their email addresses. Developers will be able to integrate this in a few clicks, using the npm packages. What would this look like in practice? Dapps can now email an Ethereum account holder without knowing their email address. Imagine sending important notifications, updates, or even marketing emails directly to your Ethereum account users all while keeping their email address completely anonymous. This is a real game-changer for Web3 user engagement. This is the future of marketing in Web3! Together, we have an incredible opportunity to shape a Web3 ecosystem that prioritizes, user-centricity and the seamless integration of privacy and rewards in communication channels. Learn more with the documentation and example application demo: ➡️ https://tools.docs.iex.ec/overview/use-case-demo/privacy-enhancing-marketing

Introducing Privacy-Enhancing Marketing: The Future of Marketing in Web3

TL;DR: Revolutionizing Web3 marketing, iExec releases new developer tools that enable Privacy-Enhanced Marketing, prioritizing user privacy and consent control.
Traditional Web2 marketing has repeatedly proven to be a failure in safeguarding privacy and obtaining consent. The pursuit of never-ending performance optimization has led to invasive data collection practices, opaque algorithms, a blatant disregard for user rights, and the implementation of data monetization mechanisms that never benefit the user.
This is one of the main reasons why an increasing population of tech-savvy users gravitate towards Web3 solutions. However, the new Web3 paradigm, where users authenticate and connect to services using wallet addresses, has led to direct marketing becoming exceedingly challenging for Web3 companies.
Can technology enable a web3 version of digital marketing that ensures user privacy and provides full control over consent?
To tackle these obstacles, iExec has developed an innovative approach that transforms how marketing actions can be run in Web3. Our solution empowers decentralized apps and their users by fostering consent, preserving privacy, and building powerful and secure connections.
What is Privacy-Enhanced Marketing (PEM)?
Keeping in mind the top challenges Web2 and Web3 face today, iExec has developed an innovative approach. It is based on the following principles:
User consent management mechanisms should be used to ensure that users explicitly authorize sharing their personal data with third parties.
Secure Data Sharing Protocols powered by confidential computing can facilitate secure data sharing between users and third parties.
Privacy-Preserving communication channels should be used to enable third parties to communicate with users without directly accessing users’ personal data. 
Marketing techniques should enable targeted marketing campaigns without exposing users’ personal data.
Users should be able to monetize their engagement with direct marketing campaigns by earning rewards, such as cryptocurrency or utility tokens. 
Users should be incentivized to share their preferences and interests while maintaining control over their privacy.
Introducing New iExec Developer Tools
Our new developer tools iExec DataProtector and iExec Web3Mail were designed to give developers a seamless experience for integrating the following capabilities into their DApps:
iExec DataProtector means users can allow a decentralized application to use their data without having to reveal the data itself.
The iExec DataProtector tool provides users with unparalleled ownership over their data. Their personal information remains secure and under their control, giving them the confidence to explore and engage with DApps without compromising their privacy. It works thanks to Confidential Computing end-to-end encryption combined with blockchain.
As an npm package, it has never been so easy to implement this technology into your app!
iExec Web3Mail makes it possible to email registered Ethereum account holders without knowing or storing their email addresses.
Developers will be able to integrate this in a few clicks, using the npm packages.
What would this look like in practice? Dapps can now email an Ethereum account holder without knowing their email address. Imagine sending important notifications, updates, or even marketing emails directly to your Ethereum account users all while keeping their email address completely anonymous. This is a real game-changer for Web3 user engagement.
This is the future of marketing in Web3!
Together, we have an incredible opportunity to shape a Web3 ecosystem that prioritizes, user-centricity and the seamless integration of privacy and rewards in communication channels.
Learn more with the documentation and example application demo:
➡️ https://tools.docs.iex.ec/overview/use-case-demo/privacy-enhancing-marketing
Tłumacz
iExec Strengthens Ties with Intel, becoming a Gold Member in Intel Partner AllianceWe are thrilled to announce that iExec is now a proud Gold Member of the Intel Partner Alliance. This achievement not only marks a new chapter in the continued collaboration with Intel, but also highlights iExec’s dedication to privacy-preserving solutions through the combination of Confidential Computing and Blockchain technologies. Over the past 5 years, iExec’s collaboration with Intel has flourished, which is evident from our collaborative efforts centered on the use of Intel SGX hardware enclaves with blockchain. This joint venture has been instrumental in the development of our state-of-the-art privacy-preserving infrastructure. Back in 2018, Intel and iExec worked together to construct the very first end-to-end secured solution combining confidential computing and blockchain, presented together at the Consensus 2018 event in New York City. The collaborative milestones didn’t stop there. We also co-authored the Off-Chain Trusted Compute Specification with Intel, a groundbreaking initiative for the Ethereum Enterprise Alliance (EEA) consortium. We’ve continued to work alongside Intel on various research papers and Proofs-of-Concept (POC), including a demo using 5G connected ‘rescue robots’ showcased at the 2019 Mobile World Congress event. As a member of the Intel AI Builder Program, iExec and Intel offered a solution for AI model renting to empower owners to securely monetize valuable AI assets. The below demo shows an AI Car Detection app utilizing a trained AI model. Owners can monetize their valuable trained AI models, determine user access, while retaining complete ownership. The encrypted dataset remains secure and prevents unauthorized inspection. iExec’s confidential computing, Intel SGX, and blockchain work together to make sure the AI model’s intellectual property remains protected. Owners can be paid each time it is used; essentially this means being able to ‘rent out’ trained AI models. ⏯ [WATCH: iExec Demo: How to Rent a Trained AI Model using Intel SGX & Blockchain](https://www.binance.com/en/feed/post/1721363213042) Monetizing Training AI Models using iExec blockchain tech and Intel SGX Moving the collaboration forward: Intel Partner Alliance Gold Member The Intel Partner Alliance Program is the evolution of the earlier Intel AI Builders program, designed to enhance collaboration and innovation among its members. With our new status as a Gold Member, the prospects are brighter than ever. We’re positioned to widen our range of privacy-preserving solutions. iExec remains committed to staying at the forefront of innovation in this quickly evolving industry. Most recently, our team has been hard at work deploying Intel TDX (Trust Domain Extensions). Intel TDX is another confidential computing technology designed to enhance data protection and confidentiality by creating isolated environments known as “trust domains”. These can be combined with Intel SGX hardware enclaves, which focus on application-level confidential computing while TDX offers VM-level protection. This research lays the groundwork for a new use case that we’re excited to present. Watch this space! Thanks for reading! $RLC #iExec #AI #Partnership #Intel #blockchain

iExec Strengthens Ties with Intel, becoming a Gold Member in Intel Partner Alliance

We are thrilled to announce that iExec is now a proud Gold Member of the Intel Partner Alliance. This achievement not only marks a new chapter in the continued collaboration with Intel, but also highlights iExec’s dedication to privacy-preserving solutions through the combination of Confidential Computing and Blockchain technologies.
Over the past 5 years, iExec’s collaboration with Intel has flourished, which is evident from our collaborative efforts centered on the use of Intel SGX hardware enclaves with blockchain. This joint venture has been instrumental in the development of our state-of-the-art privacy-preserving infrastructure.
Back in 2018, Intel and iExec worked together to construct the very first end-to-end secured solution combining confidential computing and blockchain, presented together at the Consensus 2018 event in New York City. The collaborative milestones didn’t stop there. We also co-authored the Off-Chain Trusted Compute Specification with Intel, a groundbreaking initiative for the Ethereum Enterprise Alliance (EEA) consortium. We’ve continued to work alongside Intel on various research papers and Proofs-of-Concept (POC), including a demo using 5G connected ‘rescue robots’ showcased at the 2019 Mobile World Congress event.

As a member of the Intel AI Builder Program, iExec and Intel offered a solution for AI model renting to empower owners to securely monetize valuable AI assets. The below demo shows an AI Car Detection app utilizing a trained AI model. Owners can monetize their valuable trained AI models, determine user access, while retaining complete ownership. The encrypted dataset remains secure and prevents unauthorized inspection. iExec’s confidential computing, Intel SGX, and blockchain work together to make sure the AI model’s intellectual property remains protected. Owners can be paid each time it is used; essentially this means being able to ‘rent out’ trained AI models.
WATCH: iExec Demo: How to Rent a Trained AI Model using Intel SGX & Blockchain
Monetizing Training AI Models using iExec blockchain tech and Intel SGX
Moving the collaboration forward: Intel Partner Alliance Gold Member
The Intel Partner Alliance Program is the evolution of the earlier Intel AI Builders program, designed to enhance collaboration and innovation among its members.
With our new status as a Gold Member, the prospects are brighter than ever. We’re positioned to widen our range of privacy-preserving solutions. iExec remains committed to staying at the forefront of innovation in this quickly evolving industry.
Most recently, our team has been hard at work deploying Intel TDX (Trust Domain Extensions). Intel TDX is another confidential computing technology designed to enhance data protection and confidentiality by creating isolated environments known as “trust domains”. These can be combined with Intel SGX hardware enclaves, which focus on application-level confidential computing while TDX offers VM-level protection. This research lays the groundwork for a new use case that we’re excited to present. Watch this space!
Thanks for reading!
$RLC #iExec #AI #Partnership #Intel #blockchain
LIVE
LIVE
TradingX
--
iExec Demo: How to Rent a Trained AI Model using Intel SGX & Blockchain

iExec Demo: How to Rent a Trained AI Model using Intel SGX & Blockchain

Tłumacz
iExec Roadmap 2024, Strategy and Milestones (Part 2)At the beginning of the month, iExec hosted an X Spaces session to update the community and its plans for the future. In part 1 of this 2-part series, we touched base on the evolving iExec vision and strategy and summarized some key milestones from the second half of 2023. If you haven’t already, [you can read Part 1 here.](https://www.binance.com/en/feed/post/1715346041809) This article (Part 2) will recap the more exciting part of the Spaces update — where we took a first-look at what’s already been added to the roadmap for 2024! We’ve split these roadmap elements into 4 subject areas: Adoption, Product, Tech Upgrades, and Research. Consider this as a ‘first look’ at the roadmap for 2024, being a non-exhaustive list that will be continuously added to with new elements and further details as we move into the new year. So although we’ll likely see more updates later, there’s still a lot we can share with you already. Let’s dive in! Product The product team works closely with both the Technology and Adoption teams to ensure that the products meet market needs and user expectations while leveraging the latest technological advancements. New version of the iExec Dappstore iExec will launch a webpage where users can discover and access a variety of applications built with iExec’s technology. This Dappstore upgrade will focus on showcasing the best practical applications of iExec, highlighting how developers are leveraging the latest dev tools to create innovative dApps. Developer Tools: Content industry use case The Product team is focusing on developing a suite of developer tools tailored to empower back the content creators from all industries. This new suite of developer tools permits builders to create dApps which: Focus on preserving the intellectual property of creatorsEnable them to have total and exclusive control over their contentFacilitates direct and personalized monetizationAllow the management of access, for example one-time access, or a subscription, or even transferring complete ownership On top of that, these tools will also provide people different ways to engage with the content, for example by buying it, renting, or subscribing. Privacy Pass Dashboard Currently in beta, the Privacy Pass is an incentive program that enables Web3 users to monetize the act of receiving marketing emails. The “Privacy Pass” enhances user privacy by enabling companies to send marketing emails to subscribers without storing or knowing their email addresses. An upcoming Privacy Pass Dashboard is in the works, which will provide a user-friendly interface for participants to manage the subscriptions to campaigns, and view their RLC earnings. This dashboard is part of iExec’s effort to enhance user experience and provide greater transparency and control over their participation in iExec’s ecosystem, allowing users to interact with iExec without the need of technical knowledge. New IDE for iExec Oracles iExec is set to launch an improved Integrated Development Environment (IDE) for iExec Oracles. This new IDE is designed to streamline the development process, making it more intuitive and efficient for developers to create decentralized oracles using iExec’s technology. The enhanced IDE will feature advanced tools and functionalities that simplify the coding, testing, and deployment of oracles, thereby accelerating the innovation in decentralized data feeds and smart contract interactions. Website Upgrade iExec is planning a significant upgrade to its website. This new version will feature improved navigation and fresh content, to enhance UX and provide better access to information about the iExec ecosystem. The new version of the website is expected to be more intuitive, informative, and aligned with the evolving needs of users, developers, and partners. This upgrade reflects iExec’s commitment to maintaining a strong online presence that better reflects the vision and the direction of the company. Adoption The Adoption Team at iExec is the driving force behind the go-to-market strategy and community engagement for the company’s products. This team facilitates the adoption of the protocol, here’s just some of what they’ll be working on. Worker Pass Round 2 iExec has announced it has plans to go ahead with the second phase of the iExec Worker Pass Utility NFT project. As a reminder, the iExec Worker Pass is a Utility NFT allows holders access to a public iExec Worker Pool for a special operation period. This means connecting their machine to the network, becoming “iExec Workers”. These iExec Workers were then able to provide computing power by executing computational tasks, getting paid in RLC tokens based on the number of tasks completed. These worker events are key in stress-testing the capacity of Worker Pools made up of a large amount of distributed individual machines. It also provides individual community members a chance to become an integral part of the iExec ecosystem! Privacy Pass Campaigns As explained, the holders of the Privacy Pass can earn money by allowing companies to send them marketing emails without storing or knowing their email addresses. Campaigns within the context of the Privacy Pass project (temporary name) will be a big focus for the Adoption team. By participating in these campaigns, users can earn RLC tokens, adding a layer of incentive to the aspect of privacy and data security. This initiative not only provides value to users in terms of rewards but also reinforces the commitment of iExec to uphold data privacy while fostering a more secure and beneficial ecosystem for its users. Web3 companies and product can use the iExec Privacy Pass to send marketing campaigns to a wide array of Web3 users, without owning their email addresses. Developer Bounties Season 3 iExec is set to launch Season 3 of the developer Bounties on the Questbook platform, a program that encourages developers to engage with iExec’s technology. Through this initiative, developers can claim, deliver, and earn RLC tokens by completing various development bounties. This approach incentivizes innovation and practical application development within the iExec ecosystem, creating a dynamic and active developer community. iExec Web3 Incubator Season 3 & Season 4 The iExec Web3 Incubator is entering its third and fourth seasons, continuing to offer invaluable support to participants. This program provides expert mentorship from iExec, assisting with product development and marketing strategies. Participants benefit from peer learning within a community of entrepreneurial peers, gaining insights and experiences that are vital for startup growth. The incubator also provides networking opportunities, connecting participants with top Web3 experts, investors, and mentors. This initiative is pivotal in nurturing new talent and innovative projects in the Web3 space, aligning with iExec’s vision of fostering a thriving and collaborative ecosystem. Tech Upgrades The Technology team at iExec puts in place what is needed following briefs of the product team, as well as maintaining and constantly upgrading the tech to ensure it is robust, scalable, developer and user-friendly. iExec V9 Upgrade The Tech team at iExec is set to make significant strides with the implementation of iExec V9, focusing on major improvements in confidential computing. One of the key goals is to substantially reduce the time involved in confidential computing processes. By leveraging the research on pre-computing and post-computing phases, the team aims to cut down the time required for confidential computing by a factor of three. This enhancement will not only accelerate the computing processes but also enhance the overall efficiency and usability of the platform. This initiative represents iExec’s commitment to pushing the limits of what’s possible in confidential computing, ensuring faster, more efficient, and secure processing of sensitive data. iExec SMS The Tech team is also working on continuous improvements of its Secret Message Service (SMS), this future upgrade will significantly improve the reliability of the SMS, with a major feature being upgradability. Research iExec has been built by a team of PhDs, and has played an important role in iExec innovating and being ahead of the curve in the Web3 space. This year, the research team will have a strong focus on Privacy Enhancing Technologies (PETs) and AI. AI and LLMs Trusted AI is one of the core research subjects. Current AI models raise a number of challenges: knowledge base, bias, confidentiality. We think that iExec can be a solution to these challenges and more such protect a model, model monetization. The team will leverage the long history we have with Intel, and the work done in 2023 for Intel AI Builders, which led to iExec becoming a Gold member in the Intel Partner Alliance. Privacy-Enhancing Technologies The research into Privacy-Enhancing Technologies (PETs) is a crucial aspect of iExec’s commitment to data security and privacy. The team is focusing on hardware advancements, particularly Intel Trust Domain Extensions (Intel® TDX) — seen as the next step in the evolution of Inte confidential computing technology. This involves exploring how these hardware advancements can be integrated into iExec’s framework to enhance trusted computing capabilities. Additionally, the team is looking into leveraging NVIDIA GPUs for trusted AI applications, aiming to bring the power of GPU computing to secure and private AI operations. The team is also exploring Zero-Knowledge Proofs (ZKPs) to enhance scalability and privacy in blockchain transactions, a vital component for maintaining confidentiality in decentralized computing. PoCo Consensus Algorithm Upgrade The upgrade of the PoCo (Proof-of-Contribution) consensus algorithm, under the PoCo Boost project, is a major initiative aimed at enhancing the efficiency and throughput of the iExec protocol. The PoCo algorithm is integral to ensuring trust and consensus in off-chain computing on a network of untrusted machines. The current limitation of gas consumption, especially in smart contracts, hinders the platform’s throughput. The PoCo Boost project aims to improve this throughput by 2–5 times. This enhancement will be achieved by minimizing operations and data requirements in smart contracts and blockchain for deals, all while preserving the platform’s decentralized nature. Driven by a robust strategy and vision, iExec’s ever-growing team is aligned to continue to make advancements in the Web3 space, and is set to mark 2024 as a pivotal year for technological innovations, community engagement and market expansion. But that’s not all! iExec will be continuously adding to the roadmap, so keep an eye out. We can’t wait to show you what’s in store for the year ahead! $RLC #iExec #AI #Web3 #blockchain #Dapps

iExec Roadmap 2024, Strategy and Milestones (Part 2)

At the beginning of the month, iExec hosted an X Spaces session to update the community and its plans for the future.
In part 1 of this 2-part series, we touched base on the evolving iExec vision and strategy and summarized some key milestones from the second half of 2023. If you haven’t already, you can read Part 1 here.
This article (Part 2) will recap the more exciting part of the Spaces update — where we took a first-look at what’s already been added to the roadmap for 2024!
We’ve split these roadmap elements into 4 subject areas: Adoption, Product, Tech Upgrades, and Research.
Consider this as a ‘first look’ at the roadmap for 2024, being a non-exhaustive list that will be continuously added to with new elements and further details as we move into the new year. So although we’ll likely see more updates later, there’s still a lot we can share with you already.
Let’s dive in!
Product
The product team works closely with both the Technology and Adoption teams to ensure that the products meet market needs and user expectations while leveraging the latest technological advancements.
New version of the iExec Dappstore

iExec will launch a webpage where users can discover and access a variety of applications built with iExec’s technology.
This Dappstore upgrade will focus on showcasing the best practical applications of iExec, highlighting how developers are leveraging the latest dev tools to create innovative dApps.
Developer Tools: Content industry use case

The Product team is focusing on developing a suite of developer tools tailored to empower back the content creators from all industries.
This new suite of developer tools permits builders to create dApps which:
Focus on preserving the intellectual property of creatorsEnable them to have total and exclusive control over their contentFacilitates direct and personalized monetizationAllow the management of access, for example one-time access, or a subscription, or even transferring complete ownership
On top of that, these tools will also provide people different ways to engage with the content, for example by buying it, renting, or subscribing.
Privacy Pass Dashboard

Currently in beta, the Privacy Pass is an incentive program that enables Web3 users to monetize the act of receiving marketing emails.
The “Privacy Pass” enhances user privacy by enabling companies to send marketing emails to subscribers without storing or knowing their email addresses.
An upcoming Privacy Pass Dashboard is in the works, which will provide a user-friendly interface for participants to manage the subscriptions to campaigns, and view their RLC earnings.
This dashboard is part of iExec’s effort to enhance user experience and provide greater transparency and control over their participation in iExec’s ecosystem, allowing users to interact with iExec without the need of technical knowledge.
New IDE for iExec Oracles

iExec is set to launch an improved Integrated Development Environment (IDE) for iExec Oracles.
This new IDE is designed to streamline the development process, making it more intuitive and efficient for developers to create decentralized oracles using iExec’s technology. The enhanced IDE will feature advanced tools and functionalities that simplify the coding, testing, and deployment of oracles, thereby accelerating the innovation in decentralized data feeds and smart contract interactions.
Website Upgrade

iExec is planning a significant upgrade to its website. This new version will feature improved navigation and fresh content, to enhance UX and provide better access to information about the iExec ecosystem.
The new version of the website is expected to be more intuitive, informative, and aligned with the evolving needs of users, developers, and partners.
This upgrade reflects iExec’s commitment to maintaining a strong online presence that better reflects the vision and the direction of the company.
Adoption
The Adoption Team at iExec is the driving force behind the go-to-market strategy and community engagement for the company’s products. This team facilitates the adoption of the protocol, here’s just some of what they’ll be working on.
Worker Pass Round 2

iExec has announced it has plans to go ahead with the second phase of the iExec Worker Pass Utility NFT project.
As a reminder, the iExec Worker Pass is a Utility NFT allows holders access to a public iExec Worker Pool for a special operation period. This means connecting their machine to the network, becoming “iExec Workers”.
These iExec Workers were then able to provide computing power by executing computational tasks, getting paid in RLC tokens based on the number of tasks completed.
These worker events are key in stress-testing the capacity of Worker Pools made up of a large amount of distributed individual machines. It also provides individual community members a chance to become an integral part of the iExec ecosystem!
Privacy Pass Campaigns

As explained, the holders of the Privacy Pass can earn money by allowing companies to send them marketing emails without storing or knowing their email addresses.
Campaigns within the context of the Privacy Pass project (temporary name) will be a big focus for the Adoption team.
By participating in these campaigns, users can earn RLC tokens, adding a layer of incentive to the aspect of privacy and data security. This initiative not only provides value to users in terms of rewards but also reinforces the commitment of iExec to uphold data privacy while fostering a more secure and beneficial ecosystem for its users.
Web3 companies and product can use the iExec Privacy Pass to send marketing campaigns to a wide array of Web3 users, without owning their email addresses.
Developer Bounties Season 3

iExec is set to launch Season 3 of the developer Bounties on the Questbook platform, a program that encourages developers to engage with iExec’s technology.
Through this initiative, developers can claim, deliver, and earn RLC tokens by completing various development bounties. This approach incentivizes innovation and practical application development within the iExec ecosystem, creating a dynamic and active developer community.
iExec Web3 Incubator Season 3 & Season 4

The iExec Web3 Incubator is entering its third and fourth seasons, continuing to offer invaluable support to participants.
This program provides expert mentorship from iExec, assisting with product development and marketing strategies. Participants benefit from peer learning within a community of entrepreneurial peers, gaining insights and experiences that are vital for startup growth.
The incubator also provides networking opportunities, connecting participants with top Web3 experts, investors, and mentors. This initiative is pivotal in nurturing new talent and innovative projects in the Web3 space, aligning with iExec’s vision of fostering a thriving and collaborative ecosystem.
Tech Upgrades
The Technology team at iExec puts in place what is needed following briefs of the product team, as well as maintaining and constantly upgrading the tech to ensure it is robust, scalable, developer and user-friendly.
iExec V9 Upgrade

The Tech team at iExec is set to make significant strides with the implementation of iExec V9, focusing on major improvements in confidential computing.
One of the key goals is to substantially reduce the time involved in confidential computing processes. By leveraging the research on pre-computing and post-computing phases, the team aims to cut down the time required for confidential computing by a factor of three.
This enhancement will not only accelerate the computing processes but also enhance the overall efficiency and usability of the platform. This initiative represents iExec’s commitment to pushing the limits of what’s possible in confidential computing, ensuring faster, more efficient, and secure processing of sensitive data.
iExec SMS

The Tech team is also working on continuous improvements of its Secret Message Service (SMS), this future upgrade will significantly improve the reliability of the SMS, with a major feature being upgradability.
Research
iExec has been built by a team of PhDs, and has played an important role in iExec innovating and being ahead of the curve in the Web3 space. This year, the research team will have a strong focus on Privacy Enhancing Technologies (PETs) and AI.
AI and LLMs

Trusted AI is one of the core research subjects. Current AI models raise a number of challenges: knowledge base, bias, confidentiality. We think that iExec can be a solution to these challenges and more such protect a model, model monetization.
The team will leverage the long history we have with Intel, and the work done in 2023 for Intel AI Builders, which led to iExec becoming a Gold member in the Intel Partner Alliance.
Privacy-Enhancing Technologies

The research into Privacy-Enhancing Technologies (PETs) is a crucial aspect of iExec’s commitment to data security and privacy.
The team is focusing on hardware advancements, particularly Intel Trust Domain Extensions (Intel® TDX) — seen as the next step in the evolution of Inte confidential computing technology.
This involves exploring how these hardware advancements can be integrated into iExec’s framework to enhance trusted computing capabilities. Additionally, the team is looking into leveraging NVIDIA GPUs for trusted AI applications, aiming to bring the power of GPU computing to secure and private AI operations.
The team is also exploring Zero-Knowledge Proofs (ZKPs) to enhance scalability and privacy in blockchain transactions, a vital component for maintaining confidentiality in decentralized computing.
PoCo Consensus Algorithm Upgrade

The upgrade of the PoCo (Proof-of-Contribution) consensus algorithm, under the PoCo Boost project, is a major initiative aimed at enhancing the efficiency and throughput of the iExec protocol.
The PoCo algorithm is integral to ensuring trust and consensus in off-chain computing on a network of untrusted machines. The current limitation of gas consumption, especially in smart contracts, hinders the platform’s throughput.
The PoCo Boost project aims to improve this throughput by 2–5 times. This enhancement will be achieved by minimizing operations and data requirements in smart contracts and blockchain for deals, all while preserving the platform’s decentralized nature.
Driven by a robust strategy and vision, iExec’s ever-growing team is aligned to continue to make advancements in the Web3 space, and is set to mark 2024 as a pivotal year for technological innovations, community engagement and market expansion. But that’s not all! iExec will be continuously adding to the roadmap, so keep an eye out. We can’t wait to show you what’s in store for the year ahead!
$RLC #iExec #AI #Web3 #blockchain #Dapps
Zapoznaj się z najnowszymi wiadomościami na temat krypto
⚡️ Weź udział w najnowszych dyskusjach na temat krypto
💬 Współpracuj ze swoimi ulubionymi twórcami
👍 Ciesz się treściami, które Cię interesują
E-mail / Numer telefonu

Najnowsze wiadomości

--
Zobacz więcej
Mapa strony
Cookie Preferences
Regulamin platformy