Skip to content

Commit

Permalink
Merge pull request #127 from leopardracer/simple1
Browse files Browse the repository at this point in the history
Spelling and Grammar Corrections
  • Loading branch information
crypblizz8 authored Nov 27, 2024
2 parents dedeb82 + 37dad17 commit 14f56c8
Show file tree
Hide file tree
Showing 4 changed files with 5 additions and 5 deletions.
2 changes: 1 addition & 1 deletion docs/data-wars.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
# Data Wars: Community Ranks

This is not the allowlist you are looking you're looking for. Join the multi-week [Nillion bootcamp](https://zealy.io/cw/nillion) to be fully onboarded into the Nil Army. Every week you will have the potential to be whitelisted for the upcoming Nillion Blindfolded PFP NFT release.
This is not the allowlist you are looking for. Join the multi-week [Nillion bootcamp](https://zealy.io/cw/nillion) to be fully onboarded into the Nil Army. Every week you will have the potential to be whitelisted for the upcoming Nillion Blindfolded PFP NFT release.

![An image from the static](/img/data-wars.png)

Expand Down
4 changes: 2 additions & 2 deletions docs/glossary.md
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ layout:

#### Information-theoretic security (ITS)

Information-theoretic security is a measure of security that doesn't depend on computational hardness assumptions. ITS guarantees security even against adversaries with unlimited computational power. This type of security is achieved by ensuring that the information required to break the encryption is not present in the cipher text. A classic example of ITS is a one-time pad cipher, which is provably unbreakable as long as the key is truly random, never reused, and kept secret.
Information-theoretic security is a measure of security that doesn't depend on computational hardness assumptions. ITS guarantees security even against adversaries with unlimited computational power. This type of security is achieved by ensuring that the information required to break the encryption is not present in the ciphertext. A classic example of ITS is a one-time pad cipher, which is provably unbreakable as long as the key is truly random, never reused, and kept secret.

#### Linear Secret Sharing Scheme (LSSS)

Expand Down Expand Up @@ -44,7 +44,7 @@ Preprocessing refers to a computation that is executed before one is given the i

Each online protocol requires a different amount and type of preprocessing elements. A "preprocessing service" inside each node is responsible for calculating these preprocessing elements and makes them available to the Nillion VM. The "preprocessing service" will try to make sure that there are enough available preprocessing elements in the node at any time.

Computing these preprocessing elements usually requires an MPC protocol. This is because there needs to be some syncrhonisation in the way these elements are created and used by the nodes.
Computing these preprocessing elements usually requires an MPC protocol. This is because there needs to be some synchronisation in the way these elements are created and used by the nodes.

#### Privacy-enhancing technologies (PETs)

Expand Down
2 changes: 1 addition & 1 deletion docs/nada-libraries.md
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ The Nillion Network leverages [Nada](/nada-lang) for defining programs. We are d

## Nada AI

[nada-ai](/nada-ai-introduction) is a Python library for performing ML/AI tasks using Nada DSL and the Nillion Network. It offers an intuitive interface and seamless integration with ML frameworks like PyTorch and Sci-kit learn. Key Features include
[nada-ai](/nada-ai-introduction) is a Python library for performing ML/AI tasks using Nada DSL and the Nillion Network. It offers an intuitive interface and seamless integration with ML frameworks like PyTorch and Scikit-learn. Key Features include

- Exporting Model State: Integrates with models from existing ML frameworks, making it easy to export them to the Nillion network for use in Nada programs.
- AI Modules: Provides a PyTorch-like interface to create ML models in Nada by stacking pre-built common components, with the option to create custom components.
Expand Down
2 changes: 1 addition & 1 deletion docs/welcome.md
Original file line number Diff line number Diff line change
Expand Up @@ -17,4 +17,4 @@ Developers can use Nillion to build secure, [high value data](high-value-data.md
<br/>
<LinkButton text="Learn about Nillion" link="/what-is-nillion"/>

<LinkButton text="Build a Blind App"link="/quickstart"/>
<LinkButton text="Build a Blind App" link="/quickstart"/>

0 comments on commit 14f56c8

Please sign in to comment.