Oct 29, 2024
iExec’s Nelly Cornejo: True Privacy and Security in AI come from PETs (Privacy Enhancing Technologies) like DeCC
iExec’s Nelly Cornejo: True Privacy and Security in AI come from PETs (Privacy Enhancing Technologies) like DeCC
iExec’s Nelly Cornejo: True Privacy and Security in AI come from PETs (Privacy Enhancing Technologies) like DeCC
We had an amazing conversation with Nelly Cornejo, Head of Adoption at iExec, and although we’re sharing it with a bit of a delay, it’s still worth your undivided attention. Learn how iExec delivers privacy, data ownership, and monetization, and realizes the true promise of the Decentralized AI movement.
First, please clarify for our readers and ETHSofia attendees what decentralized cloud computing is, and why does the world desperately need it?
Decentralized cloud computing is a network architecture based on blockchain technology that enables a peer-to-peer marketplace for cloud computing, networking, and storage services. A key feature is the availability of cloud computing resources over decentralized nodes, this forms a peer-to-peer network where no single entity has central control. As a result, this structure provides more transparency, security, and resilience while giving users direct access to resources in a decentralized way.
This type of decentralization has become more known recently within the trend of DePIN (Decentralized Physical Infrastructure Networks) where real-world infrastructures (like servers, storage, and connectivity) are combined with blockchain. In my view, the world doesn’t just urgently need decentralized cloud computing—it needs the full decentralization of the digital economy.
This is one of the core promises of Web3, the next generation of the internet, where power, control, and opportunities are more evenly distributed, ensuring more transparency, privacy, and value distribution for everyone involved.
The enormous AI hype exacerbated a problem that had existed for years: the fact that 3 or 4 Big Tech corporations control a large portion of the global computing resources. How is iExec mitigating it?
This centralization of control goes far beyond just computing power. Over the last 20 years, the internet has become more and more centralized. Today, 5 companies control about 95% of the internet traffic and the money that flows through it. These companies dominate major parts of the digital economy, including cloud services, communication, social networks, and digital infrastructures. They also have significant control over how data is collected, processed, and monetized, often acting as gatekeepers for ownership, privacy, and who gets to share in the value created from that data.
iExec believes in a future where digital assets are fully owned, protected, and monetized by their rightful owners. That is why our platform provides developers with the tools to build applications that prioritize user ownership and privacy, giving control back to the users.
Not only do we make it easy for developers to create powerful Web3 apps that focus on data ownership, privacy, and monetization, but we also empower individuals to manage and benefit from their digital assets, from an email address to computing power to entire applications. With iExec, anyone can directly own and monetize their digital assets, without having to rely on centralized mechanisms.
Do you believe in the promises of the Decentralized AI (DeAI) movement and narrative, and which elements of AI models’ lifecycle do you think should be decentralized?
Yes, we strongly believe in the promises of Decentralized AI, which aligns perfectly with iExec's commitment to data ownership and privacy. While decentralization is great for transparency and ownership, true privacy and security in AI models come from PETs (Privacy Enhancing Technologies) like confidential computing—an area where iExec is a pioneer in the Web3 space.
Confidential computing helps ensure that both AI models and sensitive data are protected during processing, allowing AI model owners to monetize their models while keeping them private, while privacy-preserving AI training solutions through technologies like decentralized federated learning, enable secure, decentralized model training. This leads to higher-quality data and improved AI models. By combining blockchain and confidential computing, iExec facilitates data monetization, ensures privacy, and creates trust in AI.
Currently, a few different approaches to Decentralized Confidential Computing (DeCC) exist. Tell us which one iExec relies on, and why DeCC is so important.
DeCC will continue to gain momentum in 2024, but iExec has been revolutionizing this space long before it became a trend. Since 2018, we’ve been at the forefront of combining Confidential Computing with blockchain, partnering with Intel to launch the first-ever Trusted Compute Specification for the Ethereum Enterprise Alliance, setting the stage for secure data processing in Web3. In 2019, iExec became the first Web3 company to join the Confidential Computing Consortium, solidifying our role as pioneers in decentralized data protection. These early innovations laid the foundation for what is now known as Decentralized Confidential Computing—a game-changing approach to data privacy and security in Web3.
Our focus is on hardware-based TEEs, aligning with the zero-trust philosophy and eliminating the need for a centralized authority. However, we are also aware that implementing Confidential Computing into DApps can be complex. That’s why we’ve simplified the integration of this technology with dedicated developer tools, offering pre-packaged codebases that make DeCC implementation easier than ever. Today, our developer tools are highly versatile and have been integrated into projects across verticals such as SoFi, DeFi, DePin, AI, RWA, and even payments.
To make DeCC more accessible to everyone, we created a great example of how iExec and DeCC work hand in hand: the iExec Privacy Pass. It’s an incentive program where users can earn RLC tokens just by receiving marketing emails, all while keeping their email addresses private. Thanks to Confidential Computing, the iExec Privacy Pass securely encrypts and processes the emails, so the sender never actually sees the addresses. It’s a perfect example of how DeCC empowers users to keep their data safe, even when participating in reward-based programs.
For me, this was a huge milestone because, with the Privacy Pass, I could finally explain to my mom and friends what my company does in a way that relates to a problem they’re familiar with—receiving annoying emails from people they don’t know and having their emails monetized by others! Our messaging was incredibly effective, and we also used it during an educational campaign with Revolut this year. The goal was to onboard Web2 audiences into Web3, and it was a great success, with 1.3 million people participating in our class.
The best part is that emails are just the beginning. This same technology can be applied to other digital assets like IDs, documents, videos etc. unlocking a whole new way for users to interact with applications. It ensures privacy while allowing them to benefit from the value their digital assets can generate.
What is iExec’s strategy for accelerating the adoption of DeCC? Is partnering with other DeAI projects part of it? If yes, which ones are you targeting?
Our strategy focuses on facilitating access to DeCC for builders and the public. Collaborations and partnerships are also key in accelerating DeCC adoption.
For example, iExec is a founding member of the DeCC Alliance, a coalition of over 20 projects dedicated to promoting Decentralized Confidential Computing (DeCC). The projects involved in this movement so far include: Acurast, Aleo, Aleph Zero, Automata, Aztec, COTI, Fairblock, Fhenix, Inco, Integritee, Intmax, Marlin, Mind Network, Novapolis, Oasis, Partisia Blockchain Foundation, Phala, Secret Network, Sunscreen, Swisstronik, TEN, Ternoa, Zama — and the list is growing.
It is important to understand that DeCC is a movement with diverse value propositions, offering the ecosystem a deeper understanding of privacy in Web3. The alliance combines projects using different technologies like Trusted Execution Environments (TEEs), Zero-Knowledge Proofs (ZKPs), Multi-Party Computation (MPC), Garbled Circuits (GC), and Fully Homomorphic Encryption (FHE). This approach ensures that we can push DeCC’s potential even further, creating a community-driven movement where secure and confidential data handling is the norm.
Our next event is at Devcon Bangkok, where we’re co-organizing DeCC Day on November 13 with other members of the DeCC Alliance. Anyone can join the event and the alliance, so if you’re interested, just reach out to the iExec team.
At ETHSofia, we have embraced the Cypherpunk ethos and values, and that’s why we pay special attention to privacy. Tell us how iExec goes about preserving the privacy of data and users.
At iExec, privacy isn’t just a feature, it’s a core principle embedded in everything we do. It’s our DNA.
In 2018, iExec had a research collaboration with Intel, being the first to combine Confidential Computing with blockchain, and it’s been at the heart of everything we do since. We’re taking the same values of user control that started the Cypherpunk and eventually the blockchain movement. We believe users should have full control over what they own, having complete governance of how their data and other digital assets are used - no middlemen.
Think about industries that rely on sensitive data, like DeFi, AI, or healthcare. This is where Confidential Computing is most needed. It doesn’t just protect data while it’s stored or in transit, but even during its most vulnerable moment, meaning when it’s being processed. iExec uses Trusted Execution Environments (TEEs) to encrypt and protect data in use, ensuring sensitive information is processed securely. Blockchain acts as a governance layer, verifying the integrity of the data and its processing. This combination ensures that no unauthorized party can access or tamper with data during execution.
Privacy isn’t just part of my job—it’s also something I’m passionate about in my free time. For example, during Devcon, I’ll be speaking on a panel at the Ethereum Cypherpunk Congress alongside some amazing leaders. In fact, with the other panelists, we recently launched the "Women in Web3 Privacy" initiative. It's something we do outside our day jobs to help bring privacy to where it’s most needed and to make it easier for people to understand and access. If you’re interested, feel free to reach out to me on X.
Can iExec be considered a DePIN and why? What’s your approach to incentivizing end-users involvement?
Yes, absolutely! In fact, iExec was a DePIN platform before the term even existed.
Since our launch in 2017, iExec built the first decentralized marketplace for computing resources, allowing users to contribute and monetize their unused computing power and other digital assets. This embodies the core concept of DePIN—rewarding physical infrastructure in decentralized networks. By integrating Confidential Computing, we ensure that both developers and everyday users can participate, earn, and maintain control over their assets, such as data that can be used and monetized without being exposed.
Today, iExec ranks among the top 30 DePIN projects by market cap and has been recognized by Messari for its DePIN infrastructure for AI.
DePIN is also about using Web3 to incentivize participation in the network. Some iExec initiatives include offering utility NFTs for end-users who contribute their computing resources to the network, learn & earn campaigns, and products like the iExec Privacy Pass, that allows users to earn while protecting their privacy—all rewarded in iExec RLC tokens. Builders benefit from accelerator programs, grants, marketing campaigns, partnerships, mentorship for go-to-market strategies, and tools to help them forecast costs and plan their projects more efficiently.
Our approach is always driven by what our community needs. We make it a priority to listen to them and constantly look for the best ways to encourage, incentivize and recognize their participation in our ecosystem.
What motivated you to join ETHSofia? What do you expect from the inaugural edition?
We’re excited about this hackathon because our goal is to help developers get access to decentralized cloud computing (DeCC) through our tools, so they can build the future they envision. It’s not about us—it’s about connecting with the people building the next killer app in Ethereum.
What makes ETHSofia even more special is how it embraces the Cypherpunk ethos and values, which is exactly why we put such an emphasis on privacy. At iExec, privacy is key to everything we do, and it plays a huge role in deciding which projects we support. We’re always looking to back initiatives that prioritize privacy and decentralization, just like this one.
Plus, we have a growing community in Bulgaria, and one of our community managers, Fryderyk, lives in Sofia, and he will be at the event. He started with us as an ambassador, and now he’s part of the team, which shows how much we value the people who believe in what we’re building. This hackathon is a great opportunity to connect and grow that community even more.
We had an amazing conversation with Nelly Cornejo, Head of Adoption at iExec, and although we’re sharing it with a bit of a delay, it’s still worth your undivided attention. Learn how iExec delivers privacy, data ownership, and monetization, and realizes the true promise of the Decentralized AI movement.
First, please clarify for our readers and ETHSofia attendees what decentralized cloud computing is, and why does the world desperately need it?
Decentralized cloud computing is a network architecture based on blockchain technology that enables a peer-to-peer marketplace for cloud computing, networking, and storage services. A key feature is the availability of cloud computing resources over decentralized nodes, this forms a peer-to-peer network where no single entity has central control. As a result, this structure provides more transparency, security, and resilience while giving users direct access to resources in a decentralized way.
This type of decentralization has become more known recently within the trend of DePIN (Decentralized Physical Infrastructure Networks) where real-world infrastructures (like servers, storage, and connectivity) are combined with blockchain. In my view, the world doesn’t just urgently need decentralized cloud computing—it needs the full decentralization of the digital economy.
This is one of the core promises of Web3, the next generation of the internet, where power, control, and opportunities are more evenly distributed, ensuring more transparency, privacy, and value distribution for everyone involved.
The enormous AI hype exacerbated a problem that had existed for years: the fact that 3 or 4 Big Tech corporations control a large portion of the global computing resources. How is iExec mitigating it?
This centralization of control goes far beyond just computing power. Over the last 20 years, the internet has become more and more centralized. Today, 5 companies control about 95% of the internet traffic and the money that flows through it. These companies dominate major parts of the digital economy, including cloud services, communication, social networks, and digital infrastructures. They also have significant control over how data is collected, processed, and monetized, often acting as gatekeepers for ownership, privacy, and who gets to share in the value created from that data.
iExec believes in a future where digital assets are fully owned, protected, and monetized by their rightful owners. That is why our platform provides developers with the tools to build applications that prioritize user ownership and privacy, giving control back to the users.
Not only do we make it easy for developers to create powerful Web3 apps that focus on data ownership, privacy, and monetization, but we also empower individuals to manage and benefit from their digital assets, from an email address to computing power to entire applications. With iExec, anyone can directly own and monetize their digital assets, without having to rely on centralized mechanisms.
Do you believe in the promises of the Decentralized AI (DeAI) movement and narrative, and which elements of AI models’ lifecycle do you think should be decentralized?
Yes, we strongly believe in the promises of Decentralized AI, which aligns perfectly with iExec's commitment to data ownership and privacy. While decentralization is great for transparency and ownership, true privacy and security in AI models come from PETs (Privacy Enhancing Technologies) like confidential computing—an area where iExec is a pioneer in the Web3 space.
Confidential computing helps ensure that both AI models and sensitive data are protected during processing, allowing AI model owners to monetize their models while keeping them private, while privacy-preserving AI training solutions through technologies like decentralized federated learning, enable secure, decentralized model training. This leads to higher-quality data and improved AI models. By combining blockchain and confidential computing, iExec facilitates data monetization, ensures privacy, and creates trust in AI.
Currently, a few different approaches to Decentralized Confidential Computing (DeCC) exist. Tell us which one iExec relies on, and why DeCC is so important.
DeCC will continue to gain momentum in 2024, but iExec has been revolutionizing this space long before it became a trend. Since 2018, we’ve been at the forefront of combining Confidential Computing with blockchain, partnering with Intel to launch the first-ever Trusted Compute Specification for the Ethereum Enterprise Alliance, setting the stage for secure data processing in Web3. In 2019, iExec became the first Web3 company to join the Confidential Computing Consortium, solidifying our role as pioneers in decentralized data protection. These early innovations laid the foundation for what is now known as Decentralized Confidential Computing—a game-changing approach to data privacy and security in Web3.
Our focus is on hardware-based TEEs, aligning with the zero-trust philosophy and eliminating the need for a centralized authority. However, we are also aware that implementing Confidential Computing into DApps can be complex. That’s why we’ve simplified the integration of this technology with dedicated developer tools, offering pre-packaged codebases that make DeCC implementation easier than ever. Today, our developer tools are highly versatile and have been integrated into projects across verticals such as SoFi, DeFi, DePin, AI, RWA, and even payments.
To make DeCC more accessible to everyone, we created a great example of how iExec and DeCC work hand in hand: the iExec Privacy Pass. It’s an incentive program where users can earn RLC tokens just by receiving marketing emails, all while keeping their email addresses private. Thanks to Confidential Computing, the iExec Privacy Pass securely encrypts and processes the emails, so the sender never actually sees the addresses. It’s a perfect example of how DeCC empowers users to keep their data safe, even when participating in reward-based programs.
For me, this was a huge milestone because, with the Privacy Pass, I could finally explain to my mom and friends what my company does in a way that relates to a problem they’re familiar with—receiving annoying emails from people they don’t know and having their emails monetized by others! Our messaging was incredibly effective, and we also used it during an educational campaign with Revolut this year. The goal was to onboard Web2 audiences into Web3, and it was a great success, with 1.3 million people participating in our class.
The best part is that emails are just the beginning. This same technology can be applied to other digital assets like IDs, documents, videos etc. unlocking a whole new way for users to interact with applications. It ensures privacy while allowing them to benefit from the value their digital assets can generate.
What is iExec’s strategy for accelerating the adoption of DeCC? Is partnering with other DeAI projects part of it? If yes, which ones are you targeting?
Our strategy focuses on facilitating access to DeCC for builders and the public. Collaborations and partnerships are also key in accelerating DeCC adoption.
For example, iExec is a founding member of the DeCC Alliance, a coalition of over 20 projects dedicated to promoting Decentralized Confidential Computing (DeCC). The projects involved in this movement so far include: Acurast, Aleo, Aleph Zero, Automata, Aztec, COTI, Fairblock, Fhenix, Inco, Integritee, Intmax, Marlin, Mind Network, Novapolis, Oasis, Partisia Blockchain Foundation, Phala, Secret Network, Sunscreen, Swisstronik, TEN, Ternoa, Zama — and the list is growing.
It is important to understand that DeCC is a movement with diverse value propositions, offering the ecosystem a deeper understanding of privacy in Web3. The alliance combines projects using different technologies like Trusted Execution Environments (TEEs), Zero-Knowledge Proofs (ZKPs), Multi-Party Computation (MPC), Garbled Circuits (GC), and Fully Homomorphic Encryption (FHE). This approach ensures that we can push DeCC’s potential even further, creating a community-driven movement where secure and confidential data handling is the norm.
Our next event is at Devcon Bangkok, where we’re co-organizing DeCC Day on November 13 with other members of the DeCC Alliance. Anyone can join the event and the alliance, so if you’re interested, just reach out to the iExec team.
At ETHSofia, we have embraced the Cypherpunk ethos and values, and that’s why we pay special attention to privacy. Tell us how iExec goes about preserving the privacy of data and users.
At iExec, privacy isn’t just a feature, it’s a core principle embedded in everything we do. It’s our DNA.
In 2018, iExec had a research collaboration with Intel, being the first to combine Confidential Computing with blockchain, and it’s been at the heart of everything we do since. We’re taking the same values of user control that started the Cypherpunk and eventually the blockchain movement. We believe users should have full control over what they own, having complete governance of how their data and other digital assets are used - no middlemen.
Think about industries that rely on sensitive data, like DeFi, AI, or healthcare. This is where Confidential Computing is most needed. It doesn’t just protect data while it’s stored or in transit, but even during its most vulnerable moment, meaning when it’s being processed. iExec uses Trusted Execution Environments (TEEs) to encrypt and protect data in use, ensuring sensitive information is processed securely. Blockchain acts as a governance layer, verifying the integrity of the data and its processing. This combination ensures that no unauthorized party can access or tamper with data during execution.
Privacy isn’t just part of my job—it’s also something I’m passionate about in my free time. For example, during Devcon, I’ll be speaking on a panel at the Ethereum Cypherpunk Congress alongside some amazing leaders. In fact, with the other panelists, we recently launched the "Women in Web3 Privacy" initiative. It's something we do outside our day jobs to help bring privacy to where it’s most needed and to make it easier for people to understand and access. If you’re interested, feel free to reach out to me on X.
Can iExec be considered a DePIN and why? What’s your approach to incentivizing end-users involvement?
Yes, absolutely! In fact, iExec was a DePIN platform before the term even existed.
Since our launch in 2017, iExec built the first decentralized marketplace for computing resources, allowing users to contribute and monetize their unused computing power and other digital assets. This embodies the core concept of DePIN—rewarding physical infrastructure in decentralized networks. By integrating Confidential Computing, we ensure that both developers and everyday users can participate, earn, and maintain control over their assets, such as data that can be used and monetized without being exposed.
Today, iExec ranks among the top 30 DePIN projects by market cap and has been recognized by Messari for its DePIN infrastructure for AI.
DePIN is also about using Web3 to incentivize participation in the network. Some iExec initiatives include offering utility NFTs for end-users who contribute their computing resources to the network, learn & earn campaigns, and products like the iExec Privacy Pass, that allows users to earn while protecting their privacy—all rewarded in iExec RLC tokens. Builders benefit from accelerator programs, grants, marketing campaigns, partnerships, mentorship for go-to-market strategies, and tools to help them forecast costs and plan their projects more efficiently.
Our approach is always driven by what our community needs. We make it a priority to listen to them and constantly look for the best ways to encourage, incentivize and recognize their participation in our ecosystem.
What motivated you to join ETHSofia? What do you expect from the inaugural edition?
We’re excited about this hackathon because our goal is to help developers get access to decentralized cloud computing (DeCC) through our tools, so they can build the future they envision. It’s not about us—it’s about connecting with the people building the next killer app in Ethereum.
What makes ETHSofia even more special is how it embraces the Cypherpunk ethos and values, which is exactly why we put such an emphasis on privacy. At iExec, privacy is key to everything we do, and it plays a huge role in deciding which projects we support. We’re always looking to back initiatives that prioritize privacy and decentralization, just like this one.
Plus, we have a growing community in Bulgaria, and one of our community managers, Fryderyk, lives in Sofia, and he will be at the event. He started with us as an ambassador, and now he’s part of the team, which shows how much we value the people who believe in what we’re building. This hackathon is a great opportunity to connect and grow that community even more.
Over the months leading to ETHSofia, we had the pleasure of interviewing part of our amazing speakers and sponsors. Check our blog post series to learn more about the crypto journeys of SSV Network’s Alex Lipton, DeFi Collective’s TokenBrice, Diana Tlupova from ComPilot, Daedalus Angels’ Valentin Mihov, Lido’s Will Shannon, Zerion’s Evgeny Yurtaev and Grayson Ho, Village DAO's Stilyan Mitrev, Serotonin's Vanina Ivanova and many others.
Follow ETHSofia on X and LinkedIn, join our official Telegram group, and subscribe to our newsletter to get the latest news!