iExec@EDCON #2: Understanding iEx.ec security

iExec@EDCON #2: Understanding iEx.ec security

In this series of articles we present the technology behind the iEx.ec Distributed Cloud. In the previous article we discussed the architecture. This article will introduce our security considerations. It is assumed that the reader is already familiar with the architecture and the main principles of the system as described in previous articles.

https://medium.com/iex-ec/iexec-edcon-2-understanding-iex-ec-security-4b45f470e3c1#.uzdkt2fva