From 9a5760bbb4f908a57f5dd5edecab00874c38789d Mon Sep 17 00:00:00 2001 From: oftenoccur Date: Sat, 18 Jan 2025 13:26:40 +0800 Subject: [PATCH] chore: remove redundant words Signed-off-by: oftenoccur --- claive-ai/introduction.md | 2 +- .../usecases/vrf/using-encrypted-payloads-for-vrf.md | 2 +- .../functions-methods-and-data-structures.md | 2 +- infrastructure/secret-cli/fees-and-gas.md | 2 +- .../ecosystem-overview/secret-network-dictionary.md | 2 +- 5 files changed, 5 insertions(+), 5 deletions(-) diff --git a/claive-ai/introduction.md b/claive-ai/introduction.md index 6b9b1623..0ee2cbd8 100644 --- a/claive-ai/introduction.md +++ b/claive-ai/introduction.md @@ -1,6 +1,6 @@ # 🤝 Introduction -In today's AI landscape, users and organizations share a huge amount of increasingly confidential and intimate information with providers of AI technology, without any solid guarantees of the information safety. Centralized AI providers are opaque and and have strong incentives to utilize user data for their benefit. The emerging decentralized AI industry also lacks guarantees of data protection, and user data may become available to unknown and uncontrolled parties +In today's AI landscape, users and organizations share a huge amount of increasingly confidential and intimate information with providers of AI technology, without any solid guarantees of the information safety. Centralized AI providers are opaque and have strong incentives to utilize user data for their benefit. The emerging decentralized AI industry also lacks guarantees of data protection, and user data may become available to unknown and uncontrolled parties Claive is a Decentralized Confidential Computing solution that brings trusted AI to users who value their privacy. Built on the Secret Network, Claive leverages the NVIDIA Confidential Computing with Trusted Execution Environment (TEE) capabilities to provide fully confidential AI interactions. By addressing the critical issue of privacy in AI conversations, Claive aims to offer a secure, decentralized platform where users can engage with AI models without fear of data leakage or unauthorized access. diff --git a/confidential-computing-layer/ethereum-evm-developer-toolkit/usecases/vrf/using-encrypted-payloads-for-vrf.md b/confidential-computing-layer/ethereum-evm-developer-toolkit/usecases/vrf/using-encrypted-payloads-for-vrf.md index 241bcf7e..2df93805 100644 --- a/confidential-computing-layer/ethereum-evm-developer-toolkit/usecases/vrf/using-encrypted-payloads-for-vrf.md +++ b/confidential-computing-layer/ethereum-evm-developer-toolkit/usecases/vrf/using-encrypted-payloads-for-vrf.md @@ -6,7 +6,7 @@ Need help with using encrypted payloads with Secretpath or want to discuss use c ## Install and import dependencies -First, install all of the the dependencies via NPM: +First, install all of the dependencies via NPM: ```bash npm install @solar-republic/cosmos-grpc @solar-republic/neutrino ethers secure-random diff --git a/confidential-computing-layer/ibc/basics/cross-chain-messaging-with-ibc-hooks/functions-methods-and-data-structures.md b/confidential-computing-layer/ibc/basics/cross-chain-messaging-with-ibc-hooks/functions-methods-and-data-structures.md index 92a44598..91af02f7 100644 --- a/confidential-computing-layer/ibc/basics/cross-chain-messaging-with-ibc-hooks/functions-methods-and-data-structures.md +++ b/confidential-computing-layer/ibc/basics/cross-chain-messaging-with-ibc-hooks/functions-methods-and-data-structures.md @@ -250,7 +250,7 @@ To verify a message that was was signed through a method `cosmos arbitrary (036) fn verify_arbitrary(api: &dyn Api, cred: &CosmosCredential) -> StdResult ``` -The method takes in a `CosmosCredential` struct as an argument which is a a helpful wrapper over essential required fields required for the verification: +The method takes in a `CosmosCredential` struct as an argument which is a helpful wrapper over essential required fields required for the verification: ```rust pub struct CosmosCredential diff --git a/infrastructure/secret-cli/fees-and-gas.md b/infrastructure/secret-cli/fees-and-gas.md index f85655aa..bb828843 100644 --- a/infrastructure/secret-cli/fees-and-gas.md +++ b/infrastructure/secret-cli/fees-and-gas.md @@ -1,6 +1,6 @@ # Fees & Gas -On the Secret Network gas is a special unit used for tracking the the use of resources during code execution (usually paid by the transaction sender). Gas fees are normally paid to execute read / write commands, but can also be used to pay for more resource intensive computational tasks. +On the Secret Network gas is a special unit used for tracking the use of resources during code execution (usually paid by the transaction sender). Gas fees are normally paid to execute read / write commands, but can also be used to pay for more resource intensive computational tasks. Gas primarily serves two purposes: diff --git a/overview-ecosystem-and-technology/ecosystem-overview/secret-network-dictionary.md b/overview-ecosystem-and-technology/ecosystem-overview/secret-network-dictionary.md index a6d4aa83..7e69d742 100644 --- a/overview-ecosystem-and-technology/ecosystem-overview/secret-network-dictionary.md +++ b/overview-ecosystem-and-technology/ecosystem-overview/secret-network-dictionary.md @@ -6,7 +6,7 @@ #### _Alter_ -Private & secure messaging app built on on Secret Network +Private & secure messaging app built on Secret Network #### _Airdrop_