Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

...

  • The solution would consist of nodes which would relay messages between FIO Protocol users to.

  • The message would be routed to recipient using FIO Addresses.

  • Recipient would fetch the message using their FIO Address or a search index contemplated in FIP-5 to further enhance privacy.

  • The messages would be signed with FIO Private Key which owns sender’s FIO Address.

    • The recipient would fetch the FIO Public Key which owns the sender’s FIO Address from the FIO Chain and use it to cryptographically validate that the message was created by the owner of the private key which owns the sender’s FIO Address.

  • The message could be further encrypted using Diffie-Hellman Key Exchange scheme similar to how FIO Request content is encrypted today.

...

  • Non-replicated - allow FIO Address owner to specify which node to use to send or receive L2 messages. Only that node would contain the relevant content. Similar approach has been described in FIP-24.

    • The downside of this approach is that:

      • Data can be irreversibly lost if the node is lost.

      • Data is not accessible if node is down or is being censored.

    • See related discussion regarding Request for Signature.

  • Replicated - the messages are simultaneously stored on and are accessible by querying any node.

    • The downside of this approach is that:

      • High overhead of having to maintain and sync messages across multiple nodes.

...