Phala Network
      • Sharing URL Link copied
      • /edit
      • View mode
        • Edit mode
        • View mode
        • Book mode
        • Slide mode
        Edit mode View mode Book mode Slide mode
      • Customize slides
      • Note Permission
      • Read
        • Owners
        • Signed-in users
        • Everyone
        Owners Signed-in users Everyone
      • Write
        • Owners
        • Signed-in users
        • Everyone
        Owners Signed-in users Everyone
      • Engagement control Commenting, Suggest edit, Emoji Reply
    • Invite by email
      Invitee

      This note has no invitees

    • Publish Note

      Share your work with the world Congratulations! 🎉 Your note is out in the world Publish Note

      Your note will be visible on your profile and discoverable by anyone.
      Your note is now live.
      This note is visible on your profile and discoverable online.
      Everyone on the web can find and read all notes of this public team.
      See published notes
      Unpublish note
      Please check the box to agree to the Community Guidelines.
      View profile
    • Commenting
      Permission
      Disabled Forbidden Owners Signed-in users Everyone
    • Enable
    • Permission
      • Forbidden
      • Owners
      • Signed-in users
      • Everyone
    • Suggest edit
      Permission
      Disabled Forbidden Owners Signed-in users Everyone
    • Enable
    • Permission
      • Forbidden
      • Owners
      • Signed-in users
    • Emoji Reply
    • Enable
    • Versions and GitHub Sync
    • Note settings
    • Note Insights
    • Engagement control
    • Transfer ownership
    • Delete this note
    • Insert from template
    • Import from
      • Dropbox
      • Google Drive
      • Gist
      • Clipboard
    • Export to
      • Dropbox
      • Google Drive
      • Gist
    • Download
      • Markdown
      • HTML
      • Raw HTML
Menu Note settings Versions and GitHub Sync Note Insights Sharing URL Help
Menu
Options
Engagement control Transfer ownership Delete this note
Import from
Dropbox Google Drive Gist Clipboard
Export to
Dropbox Google Drive Gist
Download
Markdown HTML Raw HTML
Back
Sharing URL Link copied
/edit
View mode
  • Edit mode
  • View mode
  • Book mode
  • Slide mode
Edit mode View mode Book mode Slide mode
Customize slides
Note Permission
Read
Owners
  • Owners
  • Signed-in users
  • Everyone
Owners Signed-in users Everyone
Write
Owners
  • Owners
  • Signed-in users
  • Everyone
Owners Signed-in users Everyone
Engagement control Commenting, Suggest edit, Emoji Reply
  • Invite by email
    Invitee

    This note has no invitees

  • Publish Note

    Share your work with the world Congratulations! 🎉 Your note is out in the world Publish Note

    Your note will be visible on your profile and discoverable by anyone.
    Your note is now live.
    This note is visible on your profile and discoverable online.
    Everyone on the web can find and read all notes of this public team.
    See published notes
    Unpublish note
    Please check the box to agree to the Community Guidelines.
    View profile
    Engagement control
    Commenting
    Permission
    Disabled Forbidden Owners Signed-in users Everyone
    Enable
    Permission
    • Forbidden
    • Owners
    • Signed-in users
    • Everyone
    Suggest edit
    Permission
    Disabled Forbidden Owners Signed-in users Everyone
    Enable
    Permission
    • Forbidden
    • Owners
    • Signed-in users
    Emoji Reply
    Enable
    Import from Dropbox Google Drive Gist Clipboard
       owned this note    owned this note      
    Published Linked with GitHub
    Subscribed
    • Any changes
      Be notified of any changes
    • Mention me
      Be notified of mention me
    • Unsubscribe
    Subscribe
    --- title: Phala Network介绍-EN tags: 项目文档,Phala,EN --- ## /// 用词规范 /// | CN | EN | | -- | -- | | 公链 | permissionless (block)chain | | 私有链 | permissioned (block)chain | | 联盟链 | consortium (block)chain | | 不可篡改 | tamper-proof | | 可信执行环境 | Trusted Execution Environment | | 去信任化、无需信任(有时也叫可信) | trustless | | 生态 | ecosystem | | 上线 | launch | | 链上(计算等) | on-chain | | 封闭式拍卖 | sealed-bid auctions | | 可用性 | availability | | 抵押(特指抵押操作) | stake | | 公众号 | subscription account | | | ## Introduction Phala Network is a light, powerful, and secure TEE-based confidential smart contract, dedicating itself to be a novel privacy computing cloud and provide privacy computing and services for all users and companies. Phala Network will be a parachain on Polkadot and a solution to the next-generation privacy protection. Member of the Confidential Computing Consortium (CCC). Recipient of 2 Web3 Foundation Grants. ### Vision Build a Trustless World ### Summary * Phala Network TEE-blockchain solution can be quickly commercialized * Web3 Analytics will come soon based on Phala Network. * Phala Network would be the very earlist parachain on Polkadot. Since it's been Web3 Foundation Grant Program & Substrate Builders' Program. * Jointly with Fudan University System Software and Security Lab ## Why do we do this ? Blockchain's openness, transparency, and tamperproof characteristics become the technical foundation of digital currencies and smart contracts more honest than the original society. However, it is precisely because of these characteristics that they need to be fully open and fully on-chain, which hinders their further development. For example, the following data cannot be on-chain: * Trade secrets:Finance, medical, credit reporting, supply chain * Strategy:Trading, online games * Personal privacy information The blockchain industry needs to complete the last three building block: * Expand trust coverage by building a trusted environment * Run general purpose smart contracts that preserve confidentiality * Ability to perform trusted joint computing on off-chain data ## What do we want to solve ? **Privacy and trust issues in permissionless and consortium blockchains:** 1. On permissionless chains such as Ethereum, all transactions and computation data is completely public, and it cannot handle business data and user privacy that needs to be kept secret, which greatly limits the application of permissionless chains 2. Consortium chains are better in data confidentiality. The data is only shared within the alliance, and data access rights can be set for users outside the alliance. But since data can be copied, trust issues remain: * Members of the Alliance may knowingly or unintentionally disclose; * When members do not want to fully share data, they still need to introduce trusted third parties to execute business logic In order to solve the above deficiencies, we have introduced trusted computing technology, combined with the hardware trusted execution environment (TEE) to provide a reliable and efficient data confidential computing layer for permissonless and consortium chains. ## About the technology we use ![](https://i.imgur.com/H9nNInM.png) Phala Network implements **Confidential Smart Contract** with a **TEE-Blockchain Hybrid Architecture**. Confidential smart contracts run in a special enclave inside the CPU. Contract execution is completely isolated from the outside world, which guarantees the confidentiality. At the same time, by combining blockchain, it solves the problems of functionality, security, and ease of use of TEE. It makes TEE truly usable. More specifically: * Introduce Layered Design and Event Sourcing. Allow contracts to interoperate with other contracts and even external blockchains * The layered design guarantees security. The miner's downtime will not affect the network * Anyone with an Intel CPU can become a miner. The blockchain is responsible for verifying each execution of the miner. Users can safely use confidentiality contracts without any special hardware Moreover, Phala Network is based on Substrate. It provides cross-chain confidential contract support. Eventually all the blockchains can share Phala infrastructure, which dilutes computing power costs。 ## Why Now? ### It's time to run this on blockchain * In the Web 2.0 world, the market does not have high demand to be "trustless". Data protection technology is mainly used in the DRM field. * Bitcoin was born in 2009. Since then, the world has gradually lost trust in large Internet companies like Facebook. The concept of Web 3.0 has been proposed, blockchain has been used to solve trust issues, and the market has gradually developed * The existing blockchains cannot achieve data confidentiality, which greatly limits the application scenarios. ### Data privacy technology is ready * Zero-knowledge proof, homomorphic encryption / multi-party computing has a long history, but not practical * Intel SGX TEE was launched in 2016. After 3 years of development, it has gradually become popular. The hardware and ecosystem are maturing TEE still has limited security and application scenarios when use it alone, but the blockchain and TEE is perfectly match with each other. ## Products ### Infrastructure Phala Network is a Polkadot parachain based on Substrate. After launch, it will be added to the Web3.0 technology stack, becoming an off-chain trusted computing infrastructure that can be used by any developer ### Layer2 serving any blockchain ![](https://i.imgur.com/puD8XEB.png) #### Permissionless Chain Customize off-chain computation Layer2 for existing chains so that the chain's smart contracts can interoperate with Phala's confidential smart contracts. The first batch of the custom components include: * pETH: An important infrastructure that offers confidentiality of trading positions and strategy for DeFi * pEOS, pTRON:Provide confidential smart contract capabilities for DAPPs with high performance requirements, so that PvP games can be implemented on the blockchain * pLIBRA: As Libra will become a semi-permissioned blockchain, our customized Layer2 that can protect confidentiality will attract billions of transactions and millions of dollars in revenue from Libra #### Consortium Chains As a supplier of the consortium chains, we can provide technical solutions: * Provide the ability of confidential smart contract to the consortium chains * Provide a trusted intermediary to calculate corporate confidential data jointly on-chain ### Web3 Analytics With the power of Phala Network confidential contract, we found it possible to create a purely decentralized Google Analytics alternative – Web3 Analytics – to provide web performance measurement, customized statistics, and data visualization dashboard, in a decentralized way. Web3 Analytics is a decentralized Google Analytics alternative aiming to give users the full control of their data. It provides web performance measurement, customized statistics, and data visualization dashboard. With the power of TEE, users' personal data are kept secretly and can only be used in an approved way. As a result, users literally get the 100% control of their data. ![](https://i.imgur.com/ngmT4sx.jpg) #### The Problem We are going to build a decentralized off-chain data management and statistics tool to solve the following problems: - Web3 developers have no choice but to trust big internet companies and use online statistics tools like Google Analytics. (More than 70% of the websites are using Google Analytics) - However in such centralized solutions, the big companies control all the users data. Users have no way to download or delete their data, neither decide how the data is used by others. - Finally, users and developers cannot profit from the additional value created by their data. #### How to Protect Personal Data? - In Web3 Analytics SDK, the user data is end-to-end encrypted. The encrypted data is stored in a decentralized storage network. - Only the user and the confidential smart contract has the access of the encryption key. Therefore users can manage the data, the access permission of the data, and can also delete the data on their own. The confidential contract only analyze the data in ways authorized by the user in a TEE enclave. - Authorized confidential contract can analyze the encrypted user data and output the analysis results. The results are displayed on W3A data visualization dashboard. - All the analysis requests are logged on the blockchain. When the analysis is a part of the data trading, the value of the deal is recorded transparently on the blockchain, and the profit of the deal can be distributed to the data owners in a transparent way.Details are discussed in the next section. #### what is the business model for Web3 Analytics? Data is hard to trade because it's too easy to copy. Aiming at the trsut issues of data exchange between Internet companies, we have designed a universal data exchange market. With confidential smart contracts, merchants can sell data utilization rights while retaining the ownership. Participants do not have to expose the original data, but also can complete the joint computation and analysis of the data, which protects the interests of all parties to the transaction. * Demo is ready * Security Federation Computing Service for Enterprise Alliance * Public Web3 Data Marketplace ### About the Future * Data quality ratings and trust propogation protocol in the data market * Provide TEE-based password and sensitive information management tools for DID services * Provide trading data and strategy confidential-preserving technologies for high-performance DEX (Decentralized Exchange) or DeFi projects * Provides trusted environment DRM support for blockchain content projects * DAPP games that support PvP gameplay * Non-transparent financial services such as sealed-bid auctions ## Competitor ### Different kinds of Confidential computing technologies <table> <thead> <tr> <th>Technology</th> <th>Overview</th> <th>Features</th> <th>Project</th> </tr> </thead> <tbody> <tr> <td>Zero-Knowledge Proof</td> <td> Algorithms for provers to prove to any third party that they do own specific data without revealing the private data </td> <td> Can only be used in specific scenarios such as transferring privacy. Cannot be used for general purpose contracts </td> <td>Zcash, Aztec</td> </tr> <tr> <td>Homomorphic Encryption / Multi-party computing</td> <td> Compute a targeted function securely and obtain verifiable results without leaking participates' inputs and without a trusted third party </td> <td> Extremely inefficient in general computing (1M times performance penalty). It can achieve 1-10 times performance penalty in some carefully designed scenarios. </td> <td>ARPA</td> </tr> <tr> <td>Trusted Computing</td> <td> Combining hardware, it constructs an independent enclave inside the CPU. It can achieve secure general-purpose computing without revealing inputs, outputs, or intermediate information. </td> <td> Security and efficiency are balanceed. High-performance multi-party computing can be achieved by common hardwares. The industry is mature. </td> <td>Oasis Labs, TEEX, Phala</td> </tr> </tbody> </table> ### TEE Blockchain Solution #### Technical characteristics | Project | TEE | Status<1> | Availability<2> | cross-contract interoperability<3> | Cross-chain | |---------------|-------|----------|--------|----------|----| | Oasis Labs | ✓ | ✓ | ✓ | × | × | | TEEX | ✓ | × | × | × | × | | Phala Network | ✓ | ✓ | ✓ | ✓ | ✓ | Notes: * Status <1>:Stateless contracts are only suitable for one-time execution of computing tasks. Since they cannot associate multiple executions before and after, they are not suitable for general purpose smart contracts. Typical contracts are stateful: ERC20 token balance, DEX position data, DID identity information, etc. Stateful contracts are used in various situation. * Availability<2>:Means that the execution of the contract is automatic and mandatory, and will not be stalled by the malicious actions of any party (such as not providing the data required by the contract). Availability is one of the basic security guarantees of blockchains such as Ethereum. * Cross-contract interoperability<3>:Refers to the invocation and combination between contracts. For reference, 80% of the top 10 contracts on Ethereum use invocation and combinations of contracts. In DeFi projects, the combination of multiple ERC20 tokens is the most common usage of smart contract. #### Product Features | Project | Provide confidential contracts to other chains | Run confidential smart contracts | Build complex applications<1> | |---------------|------------|----------|-------------| | Oasis Labs | × | ✓ | × | | TEEX | ✓ | × | × | | Phala Network | ✓ | ✓ | ✓ | Notes: * Build complex applications<1>:Complex applications are applications that use any or more than one of the following services * Interoperability between more than one contract * Joint computation of confidential data * Contract cross-chain interoperability ## Business Model ### Fiat Money revenue #### BaaS Service * The revenue from technical services for the consortium chains * The revenue from blockchain SaaS service #### Platform service * Sell trusted computing power * The revenue from Web3 Data Marketplace ### Token 1. Phala Token is the intermediary of confidential contract transaction fee in each chain: * Confidential Smart Contract gas fee * pLIBRA transaction Fees * Other trusted computing contract's transaction fees 2. Gatekeeper staking and rewards 3. TEE computing power incentive ## Financing ### Token Financing Round Round | Equity transfer | Fund Need(USD)| Status| --------|------|--------|--------| Seed | 5% | $70000 | Closed at Oct.2019 Strategic Private Equity Round | 10%~15% | $ 800000 | Running ### Financing Usage Financing use | Percentage | Business Value| --------|------|--------| R&D | 40% | Development testnet, mainnet; Develop Layer2 based on mainstream permissionless chains;Develop data marketplace;Sonsortium chain service development Marketing & BD | 40% | Sales; Web3.0 deveploper marketing Computing Power | 20% | Trusted Computing Miners ### Token ecosystem #### Token name Phala #### Total tokens 1B #### Core roles | Roles| Function | Incentive| |-----------|----|---------| | Gatekeepers | In confidential contracts, all the data is encrypted and stored to ensure the availability of the data. We need Gatekeepers to be online and securely hold the key at all times | Stake Phala to be elected. The main income is inflationary income. A small amount of income is transaction fees | | Miners | Provide trusted computing power for Phala to schedule | The main income is transaction fees for providing the trusted computing power. A small amount of income is inflation subsidy, which will gradually decline to 0| #### Additional rules * Initial inflation rate 5%: Subsidies are halved each year,until 0 * Final inflation rate: 3.25% #### Destruction rules The transaction fee needs to burn Phala. 65% of the fee goes to the miner. 15% goes to the gatekeeper. 20% is destroyed. #### Locked release rules(BETA) | Category | % | Number of tokens(10thousand) | Time | |-----------|----|---------|-----------------------------------------------------| | Angel | 5 | 10000 | The cornerstone wheel is unlocked 30% after IEO. 25% unlock every 6 months after initial unlock, 20% unlock in last 6 months | | Strategic Private Equity Round | 10-15 | 10000 | The cornerstone wheel is unlocked 30% after IEO. 25% unlock every 6 months after initial unlock, 20% unlock in last 6 months | | Secondary | 15 | 15000 | The unlocking mechanism is related to the exchange's IEO rules | | Ecological incentive | 20 | 20000 | IEO will be unlocked 3 months after IEO, 10% unlocked every month, and unlocked in 10 months. Including airdrops, consultants, strategic sales, etc. | | R&D | 15 | 15000 | Phala releases 20% after the mainnet is launched, and then unlocks 10% every 3 months, for a total of 8 periods and 24 months | | Foundation | 30 | 30000 | Released 20% after launching on the mainnet, starting to unlock 12.5% every 3 months for a total of 8 periods of 24 months | ## Who we are ### Co-founder& CEO:[Marvin Tong](https://www.linkedin.com/in/marvintong/) * Rich experience in product strategy, product operation, and management. * Former Product Manager at Tencent, leading design of Tencent Dingdang and Tencent Auto Intelligence, achieving cooperation with Mercedes Benz, Guangzhou Automobile, Changan and other automotive companies. * Former Senior Product Manager at Didi, leading million-users-level trading strategy design with profound experience in strategy design, data-driven decision and business model design. * Co-founder of EOSnameSwap * M.S., Data Mining, Communication University of China. ### Co-founder& Chief Scientist:Hang Yin * Former Senior Software Engineer at Google, leading projects of Mandarin recognition, Mandarin voice search, and Gmail intelligent semantic assistant, with profound experience and accumulation in artificial intelligence; * Founder and Chief Developer of Bitcoin Gold; * B.S., Computer Science and Technology, Fudan University (enrolled through Early Decision). ### Co-founder:Zhe Wang * COO of Bitcoin Gold China; * CEO of Xiaohei AI Games, raising over 10 million RMB at Angel round; * Former CEO at Miooc; * Former CTO of Haha AI Vending Machine, raising over 50 million RMB for 4 rounds; * Profound experience in the structuring, design, mass production of hardware and supplier matching; * M.S., Computer Science and Technology, Huazhong University of Science and Technology. ### Scientific research director:Shunfan Zhou * PhD, System Software and Security Lab, Fudan University,whose research area covers binary vulnerability mining, blockchain security research, etc.。 * Studied with the chief scientist of the National 973 Project、Director of China Cyberspace Security Association **ProfessorYangMin**,China's youngest group of mobile security and blockchain security experts * Published several safety related papers in top journals,《Identifying User-Input Privacy in Mobile Applications at a Large Scale》Indexed by IEEE。USENIX Security Symposium 2015 Lecturer, Published a paper on mobile security《 UIPicker : User-Input Privacy Identification in Mobile Applications》。 * Participated in National 973 Project“Basic theory and key technologies of mobile application malicious behavior detection and control”、National Natural Science Foundation of China“Vulnerability analysis and countermeasures for mobile networks and terminal equipment”a number of national key issues and national issues. 9th in the BCFT2018 Global Finals, the world's top security competition ### Research Director:Jun Jiang * Former CTO, Chief Developer at KnewOne; * Former Software Architect at DJI, responsible for establishing internal risk control system and team building; * Influential in Chinese Tech Communities as Head of Ruby China, incharge of RubyConf which has successfully held for 9 sessions with over 5,000+ people attended; holding geek events like RailGirls, Rubyists BEijing which once attracted lots of famous Chinese blockchain KOLs such as @xiaolai. ### Senior engineer:Xiaoxuan Tang * Co-founder and CTO at Liwushuo Online Gift E-business Platform with team building and management experience on 10-million-user product; raising nearly 100 million RMB at C round. * Chief Developer in 3 more Chinese 10-million-user games and products; one of the first generation of Cocos2d-x contributors; * Invited Speaker at Apple SWIFT 2017 & 2018; * B.S., Software Engineering, Zhongshan University (enrolled through Early Decision). ### Community & Growth:Antonia Yang * 3-year experience in community building and event holding; * Former Community Operation, CryptoGeek Tech Community; * Assistant Interpreter of Translators Association of China; * B.A., Language and Translation, Zhejiang University (enrolled through Early Decision). ## Milestone Time | Milestone | --------------------|------------------| 2018,Q3 |Team building, focusing on research and exploration in the field of blockchain data security | 2019,June | After Libra released the white paper, the team set up the LibraChina community | 2019,July | The pLibra project was established. After communicating with Boca's core development team, Phala Network's technical plan was determined | 2019,August | Web3 Foundation announces pLIBRA project as official partner and signs funding contract| 2019,August | Phala Network releases technical white paper | 2019,October | Phala Network completes seed round provided by Candaq | 2019,December | The first TEE blockchain-based data market PoC based on Substrate | 2020,January | The first phase of the Phala Network test network is launched and the pLIBRA test prototype is completed: confidential smart contracts can be run on the Libra test network and bridged to the Poca test network | 2020,February | Phala Network connects with Libra test network and releases pLIBRA beta | 2020,February | Complete the second round of fundraising | 2020,Q1 | Complete Gatekeeper Super Node Recruitment | 2020,Q2 | After Polkadot Mainnet launch, Phala Network Mainnet launch | ## Source ### More about us Product | Links | Open source address | --------------------|------------------|------------------| Phala Network | https://phala.network | https://github.com/Phala-Network| pLIBRA | https://plibra.io | /| Privacy Token PoC | / | https://github.com/libra-china-org/sgx-token-poc | Libra open source browser | https://librablock.io | https://github.com/libra-china-org/librabock-backend| ### Community community | Numbers of member | Links | --------------------|------------------|------------------| Wechat | 2000+ | /| Telegram | 20 | https://t.me/phalanetwork| Twitter | 130+ | https://twitter.com/PhalaNetwork | Medium | / |https://medium.com/phala-network

    Import from clipboard

    Paste your markdown or webpage here...

    Advanced permission required

    Your current role can only read. Ask the system administrator to acquire write and comment permission.

    This team is disabled

    Sorry, this team is disabled. You can't edit this note.

    This note is locked

    Sorry, only owner can edit this note.

    Reach the limit

    Sorry, you've reached the max length this note can be.
    Please reduce the content or divide it to more notes, thank you!

    Import from Gist

    Import from Snippet

    or

    Export to Snippet

    Are you sure?

    Do you really want to delete this note?
    All users will lose their connection.

    Create a note from template

    Create a note from template

    Oops...
    This template has been removed or transferred.
    Upgrade
    All
    • All
    • Team
    No template.

    Create a template

    Upgrade

    Delete template

    Do you really want to delete this template?
    Turn this template into a regular note and keep its content, versions, and comments.

    This page need refresh

    You have an incompatible client version.
    Refresh to update.
    New version available!
    See releases notes here
    Refresh to enjoy new features.
    Your user state has changed.
    Refresh to load new user state.

    Sign in

    Forgot password

    or

    By clicking below, you agree to our terms of service.

    Sign in via Facebook Sign in via Twitter Sign in via GitHub Sign in via Dropbox Sign in with Wallet
    Wallet ( )
    Connect another wallet

    New to HackMD? Sign up

    Help

    • English
    • 中文
    • Français
    • Deutsch
    • 日本語
    • Español
    • Català
    • Ελληνικά
    • Português
    • italiano
    • Türkçe
    • Русский
    • Nederlands
    • hrvatski jezik
    • język polski
    • Українська
    • हिन्दी
    • svenska
    • Esperanto
    • dansk

    Documents

    Help & Tutorial

    How to use Book mode

    Slide Example

    API Docs

    Edit in VSCode

    Install browser extension

    Contacts

    Feedback

    Discord

    Send us email

    Resources

    Releases

    Pricing

    Blog

    Policy

    Terms

    Privacy

    Cheatsheet

    Syntax Example Reference
    # Header Header 基本排版
    - Unordered List
    • Unordered List
    1. Ordered List
    1. Ordered List
    - [ ] Todo List
    • Todo List
    > Blockquote
    Blockquote
    **Bold font** Bold font
    *Italics font* Italics font
    ~~Strikethrough~~ Strikethrough
    19^th^ 19th
    H~2~O H2O
    ++Inserted text++ Inserted text
    ==Marked text== Marked text
    [link text](https:// "title") Link
    ![image alt](https:// "title") Image
    `Code` Code 在筆記中貼入程式碼
    ```javascript
    var i = 0;
    ```
    var i = 0;
    :smile: :smile: Emoji list
    {%youtube youtube_id %} Externals
    $L^aT_eX$ LaTeX
    :::info
    This is a alert area.
    :::

    This is a alert area.

    Versions and GitHub Sync
    Get Full History Access

    • Edit version name
    • Delete

    revision author avatar     named on  

    More Less

    Note content is identical to the latest version.
    Compare
      Choose a version
      No search result
      Version not found
    Sign in to link this note to GitHub
    Learn more
    This note is not linked with GitHub
     

    Feedback

    Submission failed, please try again

    Thanks for your support.

    On a scale of 0-10, how likely is it that you would recommend HackMD to your friends, family or business associates?

    Please give us some advice and help us improve HackMD.

     

    Thanks for your feedback

    Remove version name

    Do you want to remove this version name and description?

    Transfer ownership

    Transfer to
      Warning: is a public team. If you transfer note to this team, everyone on the web can find and read this note.

        Link with GitHub

        Please authorize HackMD on GitHub
        • Please sign in to GitHub and install the HackMD app on your GitHub repo.
        • HackMD links with GitHub through a GitHub App. You can choose which repo to install our App.
        Learn more  Sign in to GitHub

        Push the note to GitHub Push to GitHub Pull a file from GitHub

          Authorize again
         

        Choose which file to push to

        Select repo
        Refresh Authorize more repos
        Select branch
        Select file
        Select branch
        Choose version(s) to push
        • Save a new version and push
        • Choose from existing versions
        Include title and tags
        Available push count

        Pull from GitHub

         
        File from GitHub
        File from HackMD

        GitHub Link Settings

        File linked

        Linked by
        File path
        Last synced branch
        Available push count

        Danger Zone

        Unlink
        You will no longer receive notification when GitHub file changes after unlink.

        Syncing

        Push failed

        Push successfully