Threshold Access Control
Use Threshold Access Control for end-to-end encrypted, end-to-end decentralized data sharing and communication.
-> See Threshold Access Control in the Fundamentals section for an overview of the over-arching concepts and value propositions.
There are multiple products and versions under the umbrella of 'Threshold Access Control':
Conditions-Based Decryption, Proof-of-Concept Use this version to familiarize yourself with the SDK, API and developer-facing configuration/parametrization. Get started here.
Last updated
Was this helpful?