Core Principles
-
User Data Ownership
Users store data locally instead of on corporate servers. Users control data through permissions and trust relationships. -
Schema-Based Access
Data access requires formally defined JSON schemas that specify structure, permissions, and payment requirements. This ensures validation, access control, and monetization. -
Trust-Based Security
Trust distance determines access rights and costs. Lower trust distances indicate higher trust, enabling broader access and lower fees. -
No Direct Data Access
All operations require schema validation, permission checks, and payment verification. This prevents unauthorized access and ensures operation auditing. -
Append-Only Storage
FoldDB creates new versions through atomic operations rather than overwriting data. This preserves change history, enabling version tracking and audit trails. -
Lightning Network Payments
graph LR
U[User] -->|Query + Payment| S[Schema]
S -->|Hold Invoice| U
S -->|Verify| L[Lightning Network]
L -->|Confirm| S
S -->|Results| U
Data access includes micropayments through Lightning Network with hold invoices ensuring atomic operations. This creates a sustainable economy while preventing spam.
-
Schema Marketplace
Schemas earn developers Lightning Network payments when used. Quality schemas rise in popularity, creating a self-regulating marketplace. -
Performance-Optimized Storage
graph TD
D[Data] -->|Store| A[Atoms]
A -->|Reference| R[AtomRefs]
R -->|Cache| C[Fast Access]
A -->|Link| H[Version History]
FoldDB optimizes for quick reads through efficient storage and caching, while maintaining version history and consistency.
-
Thread-Safe Operations
Components support concurrent operations while maintaining data consistency and atomic guarantees. -
Field-Level Control
graph TD
S[Schema] -->|Define| F[Fields]
F -->|Specify| P[Permissions]
F -->|Set| C[Costs]
F -->|Configure| T[Transforms]
Permissions, payments, and transformations operate at the field level, providing granular control over data.
-
Explicit Transformations
Schema transformations require explicit mapping rules to ensure data integrity and maintain permission boundaries. -
Privacy by Default
graph TD
R[Request] -->|Check| S[Schema]
S -->|Verify| P[Permissions]
P -->|Calculate| T[Trust]
T -->|Confirm| Pay[Payment]
Pay -->|Allow/Deny| A[Access]
Access is denied by default. Only permitted operations through validated schemas with proper permissions and payments are allowed.
-
Trust-Based Pricing
Costs scale with trust distance, incentivizing trusted relationships while maintaining security. -
Atomic Guarantees
All operations (reads, writes, transformations) are atomic, ensuring consistency during complex operations or concurrent access. -
Verifiable History
graph LR
A1[Atom v1] -->|Link| A2[Atom v2]
A2 -->|Link| A3[Atom v3]
AR[AtomRef] -->|Latest| A3
The append-only architecture maintains a chain of changes, enabling auditing and version control.
- Resource Fairness
System resources are allocated through:
- Trust-based access control
- Payment requirements
- Usage monitoring
- Performance optimization
- Schema Evolution
Schemas can evolve while maintaining:
- Data integrity
- Permission boundaries
- Payment configurations
- Transform mappings
- Security First
Security features include:
- Public key authentication
- Trust distance validation
- Payment verification
- Schema validation
- Atomic operations
- Error recovery
These principles create a system that balances:
- Security and accessibility
- Performance and consistency
- Privacy and usability
- Cost and value