📄️ Encryption
The Lit network uses an identity (ID) based encryption scheme to encrypt data, which means that decryption is only permitted to those who satisfy a certain identity.
📄️ JWT Auth
Access control conditions can be used to "gate" the signing of JWTs that are used to load dynamic content from a server.
🗃️ Types of Conditions
2 items
🗃️ EVM
5 items
🗃️ Other Chains
3 items
🗃️ Off-Chain
1 items