🗃️ Data Storage
How data is stored and made accessible
📄️ Applications
The root entities that collect user data
📄️ Data Standards
Fhir Resources and available schemas
📄️ Key Derivation
How root keys are managed and purposefully derived
Here we explain the building blocks necessary to run a permissionless health data protocol
How data is stored and made accessible
The root entities that collect user data
Fhir Resources and available schemas
How root keys are managed and purposefully derived