Design Principles
BRC-100 is an extensible decentralized computing protocol based on Ordinals Theory
The BRC-100 protocol is designed based on three principles: security, extension, and consistency. The BRC-100 extension and improvement protocols must also conform to these three principles.
1. Security
Security is the foundation of all decentralized applications. Protocol design needs to consider two aspects: user asset security and protocol/application security, including:
No centralized custody of user assets
Users can fully control their own assets
Application cannot censor users
Computing logic of applications is open and transparent
Application supports decentralized governance
2. Extension
The protocol should have great extension, and can support the logic of currently known decentralized applications and possible future innovations. BRC-100 protocol achieves extension and modularity through the support for inheritance and nesting. Protocol can inherit from BRC-100 or its extension protocol to extend protocol’s computing capabilities. Applications deployed based on BRC-100 and its extension protocol can create child application to utilize the computing capabilities of the child application, to implement the modularity of building application.
3. Consistency
The protocol must meet the consistency requirements, and any indexer can compute a completely consistent state based on the inscriptions on Bitcoin and the computing logic of the protocol. The BRC-100 protocol consists of three parts: attribute, operation and computing operation. The operation represents token operation, which is based on the UTXO model and cannot be extended, which ensures the compatibility and consistency of tokens for all extension protocols. The computing operation part is expressed using a state machine model, which requires the BRC-100 extension protocols to have the rigorous and unambiguous description of the computing logic to ensure the consistency of indexer.
Last updated