From 48262f8e450f02bc08adc9f8ee6dafcee74748c3 Mon Sep 17 00:00:00 2001 From: Patrick | Secret Network <7717686+secretpatrick@users.noreply.github.com> Date: Mon, 5 Aug 2024 12:30:41 -0400 Subject: [PATCH] Add Secret Network docs (#57) * Create _category_.json Add structure for Confidential Computing * Create secret.md Add Secret Network page * Fix sidebar position Fix sidebar position * Update docs/ecosystem/confidential-computing/secret.md * Update docs/ecosystem/confidential-computing/secret.md * Update docs/ecosystem/confidential-computing/secret.md --------- Co-authored-by: Elias Tazartes <66871571+Eikix@users.noreply.github.com> --- .../confidential-computing/_category_.json | 8 ++++++++ .../confidential-computing/secret.md | 19 +++++++++++++++++++ 2 files changed, 27 insertions(+) create mode 100644 docs/ecosystem/confidential-computing/_category_.json create mode 100644 docs/ecosystem/confidential-computing/secret.md diff --git a/docs/ecosystem/confidential-computing/_category_.json b/docs/ecosystem/confidential-computing/_category_.json new file mode 100644 index 0000000..f2303f9 --- /dev/null +++ b/docs/ecosystem/confidential-computing/_category_.json @@ -0,0 +1,8 @@ +{ + "label": "Confidential Computing", + "position": 4, + "link": { + "type": "generated-index", + "description": "Welcome to the Confidential Computing page! Here, you'll find all the information related to decentralized confidential computing available on Kakarot Sepolia testnet." + } +} diff --git a/docs/ecosystem/confidential-computing/secret.md b/docs/ecosystem/confidential-computing/secret.md new file mode 100644 index 0000000..92ca773 --- /dev/null +++ b/docs/ecosystem/confidential-computing/secret.md @@ -0,0 +1,19 @@ +# Secret Network + +On most blockchains, all data is public by default. While this works for many of the popular Web3 applications we see today, having the ability to keep some data confidential unlocks powerful new use-cases. Incorporating decentralized confidential computing (DeCC) enables things like private voting for DAOs, secure random number generation for gaming, encrypted databases for various applications, encrypted data tied to NFTs, sealed-bid auctions, and encrypted order books for DeFi applications. All of this can be built on Kakarot by utilizing [Secret Network](https://scrt.network)’s Confidential Computing Layer. + +## Integrating Secret's Confidential Computing Layer​ + +You can integrate Secret’s CCL into an existing Kakarot application, or design a new application from the ground up to take advantage of the unique use-cases it enables. + +To start, check out Secret Network’s [Confidential Computing Layer](https://scrt.network/confidential-computing-layer) landing page to get an overview of how it works, and example use-cases for inspiration. From there you’ll find multiple links to Secret's CCL documentation: + +1. [Basics](https://docs.scrt.network/secret-network-documentation/confidential-computing-layer/ethereum-evm-developer-toolkit/basics) - explains the cross-chain communication technologies used, and how to connect a MetaMask wallet to Secret Network. + +2. [Use-cases](https://docs.scrt.network/secret-network-documentation/confidential-computing-layer/ethereum-evm-developer-toolkit/usecases) - provides tutorials showing how to build various types of EVM applications using Secret’s CCL. All of these tutorials can be used to deploy a contract on Etherlink. + +3. [Supported Networks](https://docs.scrt.network/secret-network-documentation/confidential-computing-layer/ethereum-evm-developer-toolkit/supported-networks) - provides a list of gateway contract addresses. This is how your Lisk application will communicate with Secret. + +## Get Support + +To get CCL development help, you can join the Secret Network Discord at https://scrt.network/discord or Telegram at https://scrt.network/SCRTCommunity. You can also [get in touch](mailto:info@scrt.network) with the Secret Network devrel team directly.