Relayer Background
To meet the needs of enterprise while using a large, global network of capacity offered by ScPrime Storage Providers, Xa Net Services has developed the “Relayer” enterprise renter. Supporting S3-capable applications to compliment existing workflows, the Relayer handles the heavy lift of security, performance, and data integrity.
Getting started on the XNS cloud platform begins in the Console, where access and billing is maintained. Payment for services is handled traditionally via credit card or PO for qualifying customers. Relayer instances use an account’s credential token, and connect to one of XNS’ contract servers to provide blockchain level contract negotiation. This is performed under-the-hood and without intervention beyond initial install.
Relayers work with data through the S3 protocol – accessed as a local endpoint, remote URL, or even mounted as a local drive. These configurations deliver native support to thousands of S3 compatible applications, many of which are outlined in the S3 App Integrations resource.
When data is transferred to a Relayer a series of steps are performed. When ingested, the data is encrypted with an NSA-grade XChaCha cipher before entering an internal cache awaiting upload to the ScPrime Distributed Datacenter. The encrypted data is packed into consistent sized blocks that are processed via Reed-Solomon erasure codes for a performant redundancy schema before finally reaching end-nodes. Data never leaves customer control and is encrypted at rest on the customer side, encrypted in transit, and encrypted at rest on over 100 individual nodes. An additional factor for durability and security is rooted in the underlying smart contracts connecting the Storage Providers with the XNS contractor. Each storage node is required to put Collateral into their contract equal to the dollar amount stored on their device. If the storage is somehow compromised, altered or otherwise not proven to be exactly as originally uploaded, the Provider loses the potential income AND their collateral, making it a real loss. The combination of security practice and technology makes for the world’s most secure cloud storage environment, bar none.
The docs available on the following pages will assist you with getting the products operational and help to determine best configurations and practices for the highest levels of performance.