jzhao.xyz

Search IconIcon to open search

 .
  \_.
  /

Bluesky

Last updated June 21, 2022

# ADX

From ARCHITECTURE.md

Bluesky is building a protocol for large-scale distributed social applications, and in doing so released ADX (Authenticated Data eXperiment)

In ADX, user social data will live in Personal Data Repositories (PDR) owned by the user.

While these components are common to peer-to-peer networks, ADX uses a federated networking model. Federation was chosen to ensure the network is convenient to use and reliably available.

ADX then creates a larger, more interconnected view of the network by crawling the PDRs with indexers.

Google collects, ranks, and filters that content into a service that it surfaces for users when they search. Our “Crawling Indexers” are much the same, except they collect the content for social applications.

# Moderation

Decentralizing components of existing social networks is about creating a balance that gives users the right to speech, and services the right to provide or deny reach.

Our model is that speech (data, networking) and reach (crawling, aggregation, algorithm) should be two separate layers, built to work with each other. The “speech” layer should remain neutral, distributing authority and designed to ensure everyone has a voice. The “reach” layer lives on top, built for flexibility and designed to scale.

There’s no one company that can decide what gets published; instead there is a marketplace of companies deciding what to carry to their audiences.

# DID Consortium

Source of truth for DIDs on ADX, operated by multiple different operators (organizations) who share ownership of service. They all operate a shared append-only log. Client send transactions to operators. Auditors can monitor the append-only log to ensure the consortium is operating as it should.

# Key management

We believe users should be given the options to use both custodial and non-custodial solutions. Key management is (at this stage) difficult for average consumers and so a custodial solution should be made available, but for professionals and security-conscious users a non-custodial option should also be supported.

The key manager has the following responsibilities:


Interactive Graph