Explore apps built with iExec that show how privacy can be easily integrated into any apps.
Explore use cases built with iExec that show how privacy can be added to any app.
Explore apps built with iExec that show how privacy can be easily integrated into any apps.
Telegram
Telegram / Mail
Storage Key
Each card showcases a real use case built with iExec’s privacy tools, highlighting the specific dataset type being protected.
Invoice metadata
A privacy-preserving expense system for DAOs, using iExec's DataProtector and TEE to anonymize receipt data. Submissions are processed securely off-chain, signed, and posted to Polkadot, then indexed on OriginTrail for transparent, trustless auditing.
AI credit distribution rules
Universal Basic AI ensures fair global access to AI compute. iExec stack is used to securely run country-based credit rules via TEE, preserving privacy. Data is protected and processed confidentially, enabling equitable distribution without exposing identities.
User Privy identity data
EncryptTransfer leverages iExec’s TEE and sidechain relayers to enable secure, permissioned data sharing and meta-transactions for two-sided marketplaces. This proof-of-concept ensures confidential handling of user credentials and marketplace data while hacking what seemed impossible.
Humane genome
PrivateGenome predicts genetic disease risk while keeping DNA data confidential. Using iExec's stack, the ML model runs inside a Trusted Execution Environment (TEE), ensuring data remains private and protected. No raw genome data is ever exposed or stored insecurely.
Sensitive legal documents
PrivyLex is an AI legal assistant that uses iExec’s DataProtector to securely process sensitive legal data. With TEE-based confidential computing, it ensures encrypted storage, controlled access, and privacy-preserving AI tasks like contract analysis and summarization.
Photo of the identity document
This KYC solution leverages iExec’s Trusted Execution Environments (TEE) to securely process biometric checks, encrypt and analyze documents, and generate verifiable identities, all without exposing raw data. The TEE ensures end-to-end privacy and integrity, enabling interoperable identity proofs without relying on trusted third parties.
User profiles and connection data
ChainedIn leverages iExec’s TEE technology to enable private, verifiable networking between Web3 professionals. Users connect and share credentials without exposing identities, wallet addresses, or chat metadata, preserving privacy while building trusted connections
Survey and all answer related to a survey
Sum is a decentralized app for confidential employee surveys. It uses iExec's TEE stack to ensure encrypted responses are processed securely and anonymously. Admins receive only aggregated results, enabling honest feedback without exposing individual data.
Wallet addresses of invitees
SHIELD SPACE uses iExec’s TEE technology to protect sensitive user information during private event creation and verification. Wallet-based invitations and optional identity proofs are processed securely, ensuring participants remain anonymous and shielded from unwanted exposure.
Anonymous messages and identity proof
Yes, ZKing enables anonymous user-business communication. Using iExec’s DataProtector and Web3Mail, it secures message access and identity-linked messaging without storing personal info, offering privacy-preserving interactions within a decentralized framework.