- The IC VDPE is designed for rapid data processing on a public replicated compute network. This means that data cannot be sensitive, or private in nature as it’s shared to a network of node operators (ie. The Internet Computer).
- The ZK VDPE is designed for private data processing. This means that data can be sensitive, or private in nature as it’s processed within a zkVM. The tradeoff is that ZK Proving times are typically 40 seconds or more on GPU-accelerated hardware, and can be north of an hour on CPU-only hardware.
IC VDPE
If you have chosen the IC as the VDPE, then theic module is the most important for you.
Verifying and processing TLS proofs all within the IC does NOT require
verify-remote or verify-local modules.ZK VDPE
If you have private or sensitive data that you must retain full data privacy over, even during data processing, and TLS proof redactions are not enough, then the ZK VDPE is the most appropriate choice for you. Here, we will be using theverify-remote and verify-local modules.
- The
verify-remoteallows the host environment to prepare and optimise TLS proofs on remote replicated compute for compatibility with our zkVM. We extract and verify only public facets of the TLS proofs to do this. - The
verify-localoperates within the zkVM. With our prepared remote proof, we can present the TLS proof, and the remote prepared proof to the zkVM, and verify using theverify-localmodule.

