Accédez à la Bêta de Compute
Hivenet lance un programme de bêta privée pour Compute, où les utilisateurs acceptés recevront 500 heures de temps de calcul gratuit en échange de leurs retours et de leur collaboration au développement et à la promotion de Compute.
Fermer <Esc>
👍
Merci de votre intérêt.
Notre équipe étudiera votre demande. Si nous voyons un potentiel de collaboration, nous vous contacterons. Veuillez entrer en contact si vous avez des questions. Nous sommes heureux de vous aider.

J'ai compris !
Quelque chose s'est mal passé. Pourrais-tu réessayer ?

La sécurité de HivenetSecurity

Security and isn’t an add-on—it’s built into the very way Hivenet works.

Here’s a breakdown of our approach to security for Compute with Hivenet, detailing the differences between Hivenet-Certified and Community/Spot providers

Certified providers

Audited and Supported: Hivenet-certified providers have undergone an audit to ensure they meet our rigorous security standards, and we stand behind their compliance.
Dedicated Machines and Isolated Locations: Hivenet-certified providers use dedicated machines housed in secure, isolated locations with controlled access to minimize security and privacy risks.
Strict Terms & Service Agreements: Our Terms of Service and Service Level Agreement (SLA) with Hivenet-certified hosts explicitly prohibit hosts from inspecting user instance data or monitoring usage patterns.
Our Terms of Service (ToS) and Service Level Agreement (SLA) explicitly prohibit Hivenet-certified hosts from attempting to inspect user data, monitor usage patterns, or interfere with instances. This ensures that users’ data privacy is maintained at all times when using Hivenet-certified infrastructure.

Spot providers

Not Audited by Hivenet: Community and spot instances are sourced from unverified providers, including idle high-end gaming computers. These resources can introduce security and privacy risks depending on the user’s specific needs.
Potential Risks: Given that spot instances operate on crowd-sourced hardware, they may present a higher level of security risk. We encourage users with sensitive workloads to use Hive-certified providers for enhanced security.