4.Email and Hardware

As the earliest way to transmit information and has been used ever since, email has been used for many years. It not only fulfilled the early function of transmitting information, but also evolved a variety of additional capabilities. For example, many traditional email systems provide network disk functions to store users' private data. In the Web3.0, email has been given more capabilities. It can not only save email data, but also personal data and other private data. A piece of hardware that can be placed in your home or other personal space - we temporarily call it an "Data encryption box" - can better carry related functions. With such personal hardware, peer-to-peer email transmission can be easily completed, allowing users to have hardware wallets, and more functions based on private physical devices. The network connected by many email secret hardware will also produce huge network effects and added value, allowing users to enjoy more benefits, and also provide hardware facilities for the construction of Web3.0.

4.1. Hardware and blockchain storage

Comparing the structure of the "world computer" of the blockchain with the traditional von Neumann structure computer, we will find that this world computer will also have a similar structure. As shown below,

Currently, most public chains are fulfilling the functions of calculators in the von Neumann structure, consensus protocols are fulfilling the functions of controllers, and oracles are the input and output devices of the blockchain world. The development of blockchain storage is still in its early stages, and multiple projects have explored or are exploring the field of blockchain storage.

Let’s take the following figure as an example to compare traditional computer storage and blockchain storage. Storage on the data blocks of the underlying public chain, that is, Layer 1 storage in the diagram, is equivalent to register-level storage in traditional computers; data storage on the second-layer extended public chain, that is, Layer 2 storage in the diagram, is equivalent to Compared to Cache or memory-level data storage in traditional computers; real blockchain storage is equivalent to disk storage in traditional computers and external optical disk and tape device storage. This layer of storage also requires a "file management system", which consists of two main functions: the incentive layer and the file management layer. The file management layer needs to embody user-centered thinking and complete the storage of network data. The incentive layer is the ability to use the blockchain economic model to maintain the healthy development of storage networks, and smart contracts running on the file management layer will form a broad range of blockchain storage applications in the future.

In the world of Web 3.0, blockchain storage has always been needed, but has not been well satisfied. For example, generally picture NFTs are stored in centralized storage, so they may be deleted and modified. Some teams are also trying to use special processing methods such as SVG in the blockchain, which is a compromise solution when the blockchain storage is imperfect. In the world of blockchain, looking forward to the emergence of fully functional blockchain storage solutions, this field requires time to develop and build.

Blockchain storage is difficult to implement not only for technical reasons, but also for entry barriers in business models. Currently, typical blockchain storage faces the challenge of establishing a two-sided market at the same time. On the one hand, users are encouraged to provide storage space and bandwidth, and on the other hand, users are encouraged to use the blockchain storage that has been provided. In the case of imperfect technology, product performance and user use are unsatisfactory, the establishment of a two-sided market is difficult, and application promotion is slow.

In the field of email, given the sensitivity of users to private data, there is an inherent desire to use private storage. With the current mainstream network speed reaching the level of 4G and 5G, users have little sense of difference between accessing local storage and accessing network storage. If you place a small home storage device at home - "Data encryption box", it can meet the various needs of users. It can not only meet the storage of email information, but also can be used as a private network disk for individuals or families. The data on it can be Well encrypted and well managed with permissions. Users can use space that they do not usually use as device space for blockchain storage. The system encourages this sharing behavior through rewards. At the same time, it can provide blockchain storage for users who do not place their own "Data encryption box". This startup method can very well turn the cold start of the two-sided market into the hot start of the unilateral market, and can use centralized storage as a supplement when the blockchain storage is imperfect.

The existence of "Data encryption box" physical hardware can also provide users with the function of a hardware wallet, or become part of the MPC wallet, providing a hardware foundation for user identity establishment and better security.

This is part of the project planning and is currently not implemented. There is only theoretical analysis and research.

4.2. Hardware and BCDN

The existence of personal "Data encryption box", in addition to providing storage space for users, can also provide network bandwidth and computing resources, which will bring about overall changes in the future network structure and make our network more decentralized.

In today's network, CDN (Content Delivery Network) is a major service, but traditional CDN has fierce competition, serious homogeneity, and small profit margins. For the changes in network structure brought about by "Data encryption box", a new CDN service can be generated. We can call this service BCDN (Blockchain-Content Delivery Network). With the support of blockchain technology and economic capabilities, this service will be able to provide stronger capabilities, lower prices, and better services than CDN services in the Web 2.0. At the same time, it can also use the value of the economic model to Redistribution capabilities enable end users, network service providers, Business buyers, and data centers in this ecosystem to all receive their due distribution of benefits.

This is part of the project planning. It can be explored when personal hardware exists. There has been some theoretical analysis and research, and some understanding of the needs of CDN target customers.

4.3. Hardware and edge computing

The computing power of "Data encryption box" is also a broad field that can be developed in the future. With the development of Web3.0, more intelligent hardware and Internet of Things devices will be added to the future large network. There are many IOT devices in the Internet of Things, and there are many computing requirements, which are very fragmented and random. If the request is sent to the cloud for calculation every time, the efficiency is too low, and the delay is unacceptable. The end computing that "Data encryption box" can provide will form a series of computing networks with the current cloud computing and the developing edge computing. In this network, end computing, edge computing, and cloud computing will form a complete future computing system.

This is an area that can be explored in the project. The imagination space and uses will be huge in the future. At present, our project team has no in-depth research and only has some theoretical analysis.

4.4. Data management in the Web3.0

In the above points, we have analyzed the possibility of changes in infrastructure in the blockchain era. The data and applications generated on these infrastructures have a broader market. For example, user data, user-created pictures, files, or other knowledge achievements can complete transactions and payments in the Web3.0. Compared with the current NFT market, picture market, and other crowdsourcing platforms, everyone's data products can form a broader trading market.

At the application layer, the transaction process can even be embedded into file information. The micropayment system based on the blockchain, combined with actions such as file reading and copying, can be bound to smart contracts to complete user reading rights, personal use rights, Commercial copyright and other payment and copy functions. For example, when a user wants to open and read a file, he or she can pay directly based on how much content the user reads. If the user chooses to save a copy, the payment can also be completed directly by the smart contract bound to the file. If it is a picture, photo or other work that is used for commercial purposes, payment transactions can be completed during the copying process, and you can even pay based on usage. If an individual acts as a creator, he or she can directly earn income from these external actions. The control of read permissions in other more scenarios is relatively easy to implement in the Web3.0.

The content of this part is limited to simple analysis and future prospects, and is not included in the short and medium-term implementation plan of the project.

Last updated