Category: Industry Insights

  • Blockchain: Back to Basics

    Blockchain: Back to Basics

    We are releasing a series of articles explaining the nature and mechanics behind blockchain technology. In this article, you’ll learn about the basics surrounding the underlying concept, including its main features. A blockchain is a digital set of sequentially connected blocks that work as a ledger, recording information. There are some major differences between a…

  • From Web 2.0 to Web3: A Step Forward

    From Web 2.0 to Web3: A Step Forward

    Imagine being rushed to the emergency room one day for serious injuries from a car crash. You’ll be asked to provide all your private information to the clerk so you can be admitted. What if after a few months, your bank calls asking for the thousands of euros you spent on airplane tickets, hotels, and…

  • XCM Integration: What Is It and How Does It Work?

    XCM Integration: What Is It and How Does It Work?

    Here’s what you need to know about XCM integrations. XCM integrations are already happening all over the Polkadot & Kusama universe. But what is this acronym and what does it stand for? Here’s an explainer of what it does and why is it so important for Integritee and the ecosystem we’re in. In layman’s terms,…

  • Here’s What You Need to Know About XCM Integration on Polkadot

    Here’s What You Need to Know About XCM Integration on Polkadot

    XCM integrations are already happening all over the Polkadot & Kusama universe. But what is this acronym and what does it stand for? Here’s an explainer of what it does and why is it so important for Integritee and the ecosystem we’re in. In layman’s terms, it can be said that XCM – cross-consensus messaging…

  • How Can Integritee Help Prevent Fraud Schemes?

    How Can Integritee Help Prevent Fraud Schemes?

    What if your identity was suddenly stolen by criminals and used for fraud schemes? That’s what happened to the sensitive private information of 24 million people in the US. Earlier this month, the SSNOB marketplace — an illegal data market — was taken down by the authorities, according to a recent article from Bleeping Computer. It is…

  • How Integritee combines the benefits of Web2 and Web3 technologies

    How Integritee combines the benefits of Web2 and Web3 technologies

    Web3 has a lot of promise, but there is a fundamental problem that hinders adoption: the blockchain trilemma. While the trilemma is sometimes used as a tool for competitive analyses between blockchains, Web2 infrastructure can also be positioned within it. A centralized server is akin to a network with only “one node”. This provides a scalable…

  • A Healthier Approach to Wearables

    A Healthier Approach to Wearables

    Everybody wants a fitness tracker, but nobody wants that much of their personal data exposed. Here’s how providers can protect sensitive information while still offering all the smart benefits. From pedometers to smartwatches, wearables have risen in remarkably little time to a popular must-have. Whether you want to improve your sleep habits, your fertility, or…

  • Event Series: Learn How Integritee Is Taking Gaming to the Next Level With Ajuna

    Event Series: Learn How Integritee Is Taking Gaming to the Next Level With Ajuna

    Did you know that the Integritee Network can be used to power a new generation of fast, decentralized, Web3 games? Through our partnership with the games platform Ajuna Network, we will enable fast, graphically rich, Web3 games that balance performance with decentralization. But how do Web3 games work in practice and how does Integritee fit…

  • TEE 101: How Intel SGX works and  why we use it at Integritee

    TEE 101: How Intel SGX works and why we use it at Integritee

    Integritee uses a technology known as trusted execution environments (TEEs) to process sensitive data off-chain. But what exactly are TEEs and how do they work? In this post, we will take a look at one of the most common & powerful TEE architectures, which we also use at Integritee: Intel Software Guard Extensions (SGX). Data…

  • Confidential Computing Will Secure Our Secrets in Web3

    Confidential Computing Will Secure Our Secrets in Web3

    Web2 was built on data harvesting but the next phase of development must be about protecting that data, not exploiting it. Often the true consequences of a technological shift only become clear later – and when they do, they can drive the next shift. That is certainly true of the “social web”, or Web2, which…