Skip to content

Commit

Permalink
Remove   characters in overview
Browse files Browse the repository at this point in the history
They represent single spaces that we can just remove. See #2
  • Loading branch information
cygnusv committed Sep 26, 2024
1 parent dff7254 commit c720fa4
Show file tree
Hide file tree
Showing 2 changed files with 13 additions and 13 deletions.
12 changes: 6 additions & 6 deletions simple-overview.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,26 +2,26 @@

TACo is a plug-in service that enables the safe sharing of private or sensitive data within Web3 applications.
Private data is encrypted by a data producer and remains encrypted until it reaches the device of a recipient.
From a privacy point of view, it is comparable to the end-to-end encryption that a mobile messaging service like Signal offers. 
From a privacy point of view, it is comparable to the end-to-end encryption that a mobile messaging service like Signal offers.

Whether or not a recipient qualifies to see a given piece of data depends on whether they are able to show that they fulfill certain conditions.
These conditions are chosen in advance by the producer of the encrypted data, and often (but not exclusively) involve holding a special-purpose NFT. 
These conditions are chosen in advance by the producer of the encrypted data, and often (but not exclusively) involve holding a special-purpose NFT.

Here are some real-world examples of TACo in action: \
\
_(1) A graphic novelist wants to sell her work as a digital product, and include some bonus pages for those who pay a little more.
She paywalls access to the main novel using NFT-A, and the bonus material with NFT-B._ 
She paywalls access to the main novel using NFT-A, and the bonus material with NFT-B._

_Those who buy the NFT-A are able to see the main part of the novel, and those who buy and hold both NFTs A & B are able to view the entire thing.
Actually, anyone can download the novel in encrypted form, but without one of the two NFTs it can't be decrypted and is therefore useless._ \
\
_(2) A game developer wants to include a special map in their latest version for players who downloaded the original game in 2021, as a thanks for those who helped support the game studio in its early days._ 
_(2) A game developer wants to include a special map in their latest version for players who downloaded the original game in 2021, as a thanks for those who helped support the game studio in its early days._

_They encrypt the map build file and link it to two conditions; (i) that the player holds an NFT in their wallet that they would have received when they originally purchased the game, and (ii) that the player held this NFT before January 1st 2022.
In this case, just holding the NFT is not enough to access the special map._ 
In this case, just holding the NFT is not enough to access the special map._

In both these cases, the person (or device) trying to see the private data (the graphic novel and the game map) has to prove to the Threshold network that they are supposed to have access.
More specifically, they have to contact a group of Threshold nodes running TACo software that [holds a distributed key](../key-concepts.md), and prove to them that they hold the correct NFTs – and satisfy any other specified conditions, like having held them for a certain time. 
More specifically, they have to contact a group of Threshold nodes running TACo software that [holds a distributed key](../key-concepts.md), and prove to them that they hold the correct NFTs – and satisfy any other specified conditions, like having held them for a certain time.

If a sufficient number of nodes confirm that the requesting person/device qualifies to see the data, they will reply with some decryption fragments.
These fragments can be put together by the requestor on their device to decrypt the original private data.
14 changes: 7 additions & 7 deletions value-propositions.md
Original file line number Diff line number Diff line change
@@ -1,26 +1,26 @@
# Value Propositions

### TACo is a programmable access control plug-in that makes your Web3 app more secure, more private, and much more decentralized. 
### TACo is a programmable access control plug-in that makes your Web3 app more secure, more private, and much more decentralized.

**End-to-end encryption for everything**\
Built on the privacy-for-everyone principles of mainstream end-to-end encrypted messengers, but useful across a wider set of domains and use cases.
Everything from live-streaming to connected vehicles, from secret recovery to decentralized AI compute, from journalist protection to reproductive health care. 
Everything from live-streaming to connected vehicles, from secret recovery to decentralized AI compute, from journalist protection to reproductive health care.

**Trust-minimization via threshold cryptography and a collusion-resistant node array**\
Key material management and access condition verification are operationally distributed across a diverse array of machines/servers, run by economically independent individuals and commercial entities. 
Key material management and access condition verification are operationally distributed across a diverse array of machines/servers, run by economically independent individuals and commercial entities.

**Powerful, per-ciphertext conditionality**\
Future access to data can be made contingent on the fulfillment of predefined conditions, and those conditions attached to any granularity of data payload – a single message, an entire table, or a petabyte of video footage. 
Future access to data can be made contingent on the fulfillment of predefined conditions, and those conditions attached to any granularity of data payload – a single message, an entire table, or a petabyte of video footage.

**Flexible condition composability**\
Conditions of all types – NFT-holding, RPC, time-based, known keypairs – can be mixed-and-matched using logical operators and flexible prefix notation into virtually any desired combination.
Conditions can also be flexibly surfaced at different stages of runtime. 
Conditions can also be flexibly surfaced at different stages of runtime.

**Full control over access managers & network parameters**\
Developers have total and perpetual control over the cohort(s) of nodes which manage access to a given data payload, user segment or entire application.
Network parameters, such as the size or composition of the cohort, can be tuned directly by the developer, or packaged into user-facing optionality to accommodate diverse risk preferences.
_Note: parameter tuning will be available in future versions of TACo._ 
_Note: parameter tuning will be available in future versions of TACo._

**Threshold's track record for uptime, reliability and competence**\
The Threshold network's multi-app model incentivizes all TACo nodes to simultaneously provision service to tBTC, and abide by its strict availability requirements.
With over [$130m](https://dune.com/threshold/tbtc) in TVL protected by Threshold nodes, TACo 'piggybacks' on tBTC's uptime, reliability, technical competence, and security track record. 
With over [$130m](https://dune.com/threshold/tbtc) in TVL protected by Threshold nodes, TACo 'piggybacks' on tBTC's uptime, reliability, technical competence, and security track record.

0 comments on commit c720fa4

Please sign in to comment.