Introducing the Super Layer V2 with local mesh-based data transportation
 << Blog >>

Trust and Security

Core Concepts

Security

Threely currently employs a sharding strategy to distribute and store user data across decentralized storage providers, effectively eliminating the risk of a single point of failure. These storage providers offer robust inbuilt security mechanisms to protect user data. As an example, when utilizing InterPlanetary File System (IPFS) as one of the storage providers, Threely further enhances the security of the user data stored by implementing additional security measures such as cryptographic encryption and access control within the Threely Networks Layer (TNL).

Securing Cross-Blockchain Communication from TNL to Threely Link

Threely Link, a cross-blockchain communication endpoint built on libp2p, utilizes avant cryptographic protocols, Noise, and kadDHT, to provide a secure and decentralized peer-to-peer network. The Noise Protocol is employed to establish secure connections between peers. This protocol provides a secure key exchange, authenticated encryption, and decryption of messages and guarantees forward secrecy between communicating peers.

The kadDHT, a Kademlia-based Distributed Hash Table, is used as the payload storage and retrieval mechanism. Each node in the network is identified by a unique ID, and payload is stored in the network using a key-value pair. The nodes are organized in a tree-like structure, known as a routing table, allowing for efficient and effective data storage and retrieval. kadDHT provides a decentralized and fault-tolerant mechanism for data storage and retrieval, ensuring that the network can withstand the failure of individual Threely Link nodes and ensuring that communication is private and authenticated. With the integration of these cryptographic protocols, Threely Link guarantees secure and efficient data transfer across different blockchain networks.

Tria's temporary instances are instantiated on a per-function basis. They are terminated post-execution of the specific function (e.g., wallet creation), thus reducing the attack surface by limiting/eliminating client-side computation, enhancing security, and safeguarding user data. The TNL, as a result, plays a vital role in facilitating the secure and efficient utilization of data computation that Threely Enter and other Threely components utilize.

Core Concepts

Enclave

Core Concepts

Trust and Security

Core Concepts

Compute