iExec Confidential Computing Demo for Beginners

This article was first published on iExec - Medium
-----

iExec presents the latest in the series of onboarding demos: an introduction to confidential computing and privacy-preserving applications. The demo shows how easy it is to encrypt data and put it to use. The interface demonstrates that after private data is encrypted by the user, it is decrypted only when in a trusted hardware enclave (like a safe) running a trusted application, guaranteeing that no-one will ever have access to the user data unless the owner explicitly allows it.

➡️ https://confidential-computing.iex.ec — Try the demo: see how an application can protect the privacy of data-in-use.

iExec - Confidential Computing

iExec is a decentralized infrastructure for cloud computing resources. With a complete solution to run privacy-preserving executions of any application, iExec is a leader in solutions using blockchain with confidential compute. Developers and enterprises can use the iExec tools to monetize data, and make it accessible for only a select list of purposes.

Confidential Computing and Privacy-Preserving Applications for Beginners

The demo shows how a marketing company that wants to make use of a user’s private data can do so without ever having direct access to it. Within the UI, it is possible for a user to encrypt their private data. In the case of the demo, the privata data will be an email address. The user encrypts it before the data is passed into a hardware enclave. This ‘hardware enclave’ is considered a ‘Trusted Execution Environment’ and is where all processing of the data takes place. This hardware technology ensures that data remains confidential during the processing, meaning that even the owner of the hardware cannot access or tamper with the data. This guarantees that no-one will ever have access to the user data unless the owner explicitly allows it. It’s like a digital safe.

The demo introduces ‘privacy-by-design’ features ...

-----
To keep reading, please go to the original article at:
iExec - Medium

Comments (No)

Leave a Reply