Introducing the Super Layer V2 with local mesh-based data transportation
 << Blog >>

Enclave

Core Concepts

Access Data Store

The Access Data Store (ADS) is a decentralized, secure, and highly available data store responsible for storing the public (public addresses, cosmetic configurations, NFTs, and other meta data) and private data (private keys, seed phrases, messages, transaction history) of users in an encrypted format. ADS uses sharding and multiple decentralized storage providers like IPFS to ensure there is no single point of failure and high availability of user data. Additionally, it uses encryption techniques to secure the data while it is at rest.

Address Store

The Address Store is an immutable, distributed public repository that functions as the resolution endpoint for Threely addresses. It stores the Threely addresses, the corresponding public addresses of their mapped wallets, and the associated Access Data Store Decentralized Identifiers (DIDs). The Address Store also serves as an index for Threely addresses, enabling sub-millisecond resolution and translation response times. The Address Store is replicated to the Root Blockchain Directory to ensure high availability and fault tolerance.

Root Blockchain Directory

The Root Blockchain Directory (RBD) is a publicly accessible blockchain directory that is deployed on the Polygon Edge and contains the public Threely addresses and their corresponding Address Store DIDs. It serves as an immutable ledger for registering computational instances, including transactions, cryptographic operations, access logs, and other relevant data.

To ensure the integrity and consistency of the data stored on the RBD, an on-chain Directory-Resolver Consistency Runtime Host (DRCR) runs within the Threely Networks Layer (TNL) to constantly mirror the RBD to the Address Store, thereby ensuring that the RBD is the source of truth. This mechanism allows for real-time syncing of data between the RBD and the Address Store, thus ensuring that the data stored on the RBD is up-to-date, accurate, and can be trusted.

Core Concepts

Networks Layer

Core Concepts

Enclave

Core Concepts

Compute

Core Concepts

Trust and Security