LogoLogo
search
Ctrlk
Support
  • Introduction
  • SEDA Token Infochevron-right
  • For Developers
    • Getting Started with SEDA
    • SEDA Corechevron-right
    • SEDA FASTchevron-right
    • Browse Supported Feedschevron-right
    • Example Oracle Programschevron-right
    • Build an Oracle Programchevron-right
  • For Community
    • Getting Startedchevron-right
    • Tools and Dashboardschevron-right
    • Research & Educationchevron-right
  • For Data Providers
    • Operating a Data Proxychevron-right
  • For Chain Operators
    • SEDA Chain Guide and Requirementschevron-right
  • Resources
    • Auditschevron-right
    • Legalchevron-right
gitbookPowered by GitBook
Page cover
block-quoteOn this pagechevron-down
  1. Archviechevron-right
  2. SEDA Overview

arrows-to-circleSecure & Trustless Verification - The SEDA IVM

🌉Intro to Interop 3.0 & Emerging Verification Marketschevron-rightbinary-circle-checkProgrammable Moduleschevron-rightup-right-and-down-left-from-centerTriggering A Verification Data Request With An IVMchevron-rightshield-checkSEDA IVM Securitychevron-rightrectangle-historyAn IVM Summarychevron-right

Last updated 11 months ago

Was this helpful?

Was this helpful?