Step 2. Choose a data sourceUse a storage assetorChoose a data blockRequest access to restricted data
Step 3. Choose processing algorithmsUse a custom blockorChoose processing blocksRequest access to restricted data