Dealin Network Protocol Design Structure
Dealin Network decentralization efforts hope to change the balance of power from the structure, so that users can easily change services, and control their own identity and data.Dealin Network protocol design structure selects point-to-point (P2P) protocol, in structure, it can give users more power. In P2P network, there is no difference between client and server, and each user's device can play both roles, making them equivalent to peer in function.
The P2P Protocol
Dealin The P2P protocol allows users to communicate directly with each other because all devices in the network are peer and can both request data and respond to requests. Dealin Network public boot nodes help new users connect to the network, but each node is still functionally equivalent. This design gives the user the most control, while also giving it the most responsibility.
Status
In the Dealin network protocol, the user is identified by the public key. Its data structure is a DAG (directed acyclic graph), and users can choose a human-readable nickname to associate with their keys, but nicknames are not unique, and key management is one of the biggest challenges, because users will inevitably lose and forget their keys. The user has full control over their identity. Keys are also currently stored on devices, so it is impossible to log in to an account across multiple devices, which is a basic function in the minds of social network users. To address the key management problem, a social key recovery system was implemented in the Dealin Web4.0 ecosystem. It stores the keys into pieces with trusted family and friends, through which they can help rebuild the lost keys.
Examine and Verify
In the Dealin protocol layer, there is a FLAG function used to send a strong negative signal about the bad actors. There is no global audit, and no dedicated moderators. Applications built on the Dealin allow users to "mask" and "ignore".The mask in Dealin is stronger than the mask in the centralized network, because it means that the masked user's data no longer passes through these nodes. If enough people cover one or a group of users, then the part of the network they are in is isolated from the rest.
Last updated
Was this helpful?