Deployment Guides
Described below are the top three technical use cases for Super Protocol.
Confidential Tunnels
Confidential tunnels, as introduced by Super Protocol, are a combination of confidential computing and network tunneling, where both ends of the tunnels - tunnel server and tunnel client - are deployed inside a TEE and interlinked via secure authorization tokens. The TEE protects data-in-use and the content inside the tunnel client, while tunnel server protects from external attacks.
Any type of dynamic or static content may be deployed using tunnels in Super Protocol. Read this guide on how to deploy Node.js applications with tunnels, using examples such as Minecraft and Super Chat.
Off-Chain Computing
Off-chain computing - as in taking certain calculations to off-chain and then recording the results back on-chain - is used in Super Protocol to run blockchain-integrated Web3 services in real time inside the TEE, ensuring confidentiality and protection from unauthorized third parties.
As a showcase we have developed our own Oracle application to show how TEE may protect from possible vulnerabilities in the process of providing external information or real-world data to a smart contract.
Read this guide to learn how to deploy a confidential oracle service on Super Protocol.
Distributed Jobs
Jobs can encompass a wide variety of applications and services, but one of the most promising cases that we see is, of course, AI training and inference on sensitive and private data, computed inside the TEE.
While Super Protocol support for NVIDIA GPU confidential computing is in development, you can deploy less resource-intensive Python models. Read this guide to learn how to deploy Python-based solutions on Super Protocol.