BRCLife Network protocol design structure
The effort to decentralize the BRCLife metaverse network hopes to structurally change the balance of power so that users can easily change services and control their own identity and data by themselves.
The BRCLife network protocol design structure chooses a peer-to-peer (P2P) protocol that is structured in such a way that more power can be given to the users. In a P2P network, there is no distinction between client and server, and each user's device can act as both roles, making them functionally equivalent to the peer end.

● P2P protocol
The P2P protocol enables users to communicate directly with each other because all devices in the network are peer-to-peer, both requesting data and responding to requests. the BRCLife social network public bootstrap nodes help new users connect to the network, but each node remains functionally equivalent. This design gives the user the most control while also giving him or her the most responsibility.
● Identity
In the BRCLife network protocol, users are identified by their public key.
Its data structure is a DAG (directed acyclic graph) and users can choose a human-readable nickname to associate with their key, but nicknames are not unique and key management is one of the biggest challenges because users inevitably lose and forget their keys. Users have full control over their identity. Keys are also currently stored on the device, so there is no way to log into one account across multiple devices - a basic feature that social network users have in mind.
To solve the key management problem, the Social Money App project in the BRCLife ecosystem implemented a social key recovery system. It stores keys in pieces with trusted family and friends, through whom they can help rebuild lost keys.
● Audit
At the BRCLife protocol layer, there is a FLAG function for sending strong negative signals about bad actors. There is no global review and no dedicated moderator. Applications built on top of BRC Life allow users to 'block' and 'ignore'. blocking in BRC Life is more powerful than blocking in centralized networks because it means that the data of the blocked users no longer passes through these nodes. If enough people block a user or group of users, then the part of the network they are on is isolated from the rest.
Last updated