Last updated
Last updated
The entry point for dApps to send and receive encrypted messages via the SendingNetwork SDK.
A user-facing application that interfaces with client nodes, integrating end-to-end encryption for secure message transmission and reception.
Acts as intermediaries in the network, facilitating client-server model-based communication and securely storing encrypted communication history. There are three type of client nodes in the network, , and .
Involves Guardian Nodes that manage a Layer 2 blockchain, verify work proofs, and assess Edge node performance based on data from WatchDog Nodes.
Enables the application developer to host a node which the users can trust for login, messaging, and data storage.
Digital identities that allow users to manage their identities autonomously without centralized authority, enhancing security and verifiability in communications .
A DM room is a private room designed for a maximum of two members.
A method of securing data by encrypting it on the sender's side and only decrypting it on the recipient's side, preventing unauthorized access during transmission.
Maintained by Guardian Nodes to enhance transaction processing and validation off the main chain for improved scalability and efficiency.
Supports developer-hosted private nodes specifically designed for exclusive use by whitelisted users.
Validates Edge Nodes' message forwarding activities, ensuring authentication of each relay.
Used by Guardian Nodes to evaluate Edge Nodes' performance and availability.
A fully decentralized option where the users run P2P nodes on their client devices, storing messages locally.
Users can either join the chat room using the room ID on their own, or they can jump in with an invite.
By Invitation Only. Only admins can send out invites for people to join the chat room, and regular users can't just use the room ID to request to join.
Contains Edge Nodes that facilitate the relay of messages between the Access and Consensus layers, ensuring proper message delivery.
A unique identifier assigned to a specific room.
A unique identifier assigned to a specific user.
Nodes in SendingNetwork that monitor the performance and reliability of Edge Nodes, ensuring network integrity.
Cryptographic techniques that allow one party to prove the truth of a statement to another party without revealing any additional information beyond the validity of the statement itself. Edge Nodes uses zk proofs to prove their handling of messages without revealing content, saving gas fees and compressing the data size.
Nodes that relay message via p2p protocol, incentivized by mechanism.
Verify work proofs from nodes, sequence transactions, and evaluate Edge nodes' performance via . Also, they maintain the protocol-specific layer 2 blockchain.
Customized that enables developers to incorporate tailored features and facilitate on-premise deployments.
Glossary