You can also find this article in the XYO Network General Help Center.
- What is an XYO Bridge?
- Can any device be an XYO Bridge?
- Why can we trust the data?
- How does the cryptographic tech work?
What is an XYO Bridge?
In the XYO Network, XYO Bridges transport the data from an XYO Sentinel's ledger, to the Archivist, where it is store for later use!(Back to Summary)
Can any device be an XYO Bridge?
Currently, we sell pre-made devices that function as XYO Bridges. However, developers and companies can add our SDK (Software Development Kit) to their devices, make them XYO-enabled! This can increase the amount of Bridges we have in the network. For example, a developer could make their thermometer XYO-enabled, and contribute a location's temperature data to the network, or they could make their smartphone app XYO-enabled. (If you're interested in our APIs and SDKs, check our developer website.)(Back to Summary)
Why can we trust the data?
Bridges can vouch for the certainty and accuracy data on an XYO Sentinel's ledger. Bridges essentially relay the Sentinel's ledger full of data to Archivists, which store the information. This means that a key component of a trustworthy Bridge is that it does not alter the data between the Sentinel and Archivist components. Bridges have a reputation and payment component, which means as an XYO Bridge continues to provide trustworthy data that aligns with its peers' data, its reputation increases and it is paid in XYO Tokens.(Back to Summary)
I know a lot about blockchain and cryptographic technology. Could you give me a more detailed explanation of the XYO Bridge?
If you want a more detailed explanation of the XYO Bridge and its relationship to the other 4 components of the XYO network, you can read the XYO Network White Paper. The section pertaining to Bridges is included below:
"Bridges are location data transcribers. They securely relay location ledgers from Sentinels to Archivists. The most important aspect of a Bridge is that an Archivist can be sure that the heuristic ledgers that are received from a Bridge have not been altered in any way. The second most important aspect of a Bridge is that they add an additional Proof of Origin. Given that the XYO Network is a trustless system, Bridges must be incentivized to provide an honest relaying of heuristics. This is done by combining a reputation component with a payment component. A Bridge is rewarded with XYO Network Tokens (XYO) when the information that they have relayed is used to answer a query. To increase their odds of being rewarded, they must create ledgers that are consistent with that of their peers and provide Proof of Origin to identify themselves as the relay of the heuristic.