Overview
boop network is a distributed, privacy-preserving authentication system built on multi-party computation (MPC) principles. The architecture ensures no single entity ever has access to complete biometric data.High-Level Architecture
Component Details
API Gateway
Purpose: Central entry point for all external communications Responsibilities:- Request routing and load balancing
- Authentication and authorization
- Rate limiting and DDoS protection
- Protocol translation (HTTP/WebSocket)
- Request/response transformation
- RESTful API endpoints
- WebSocket support for real-time communication
- OpenAPI documentation
- Metrics and logging
MPC Gateway
Purpose: Orchestrates multi-party computation for biometric matching Responsibilities:- Biometric data splitting across MPC nodes
- Coordinating secure computation protocols
- Result aggregation without revealing individual shares
- Key management and rotation
Bridge Service
Purpose: Manages real-time WebSocket connections Responsibilities:- WebSocket connection management
- Event broadcasting
- Connection pooling
- Message queuing and delivery
- Heartbeat and reconnection logic
- User registration sessions
- Vendor authentication channels
- PVS configuration streams
- Admin monitoring connections
Attribute Service
Purpose: Manages user attributes with privacy controls Responsibilities:- Attribute storage and retrieval
- Permission management
- Consent tracking
- Attribute encryption
- Selective disclosure
Ledger Service
Purpose: Immutable transaction log Responsibilities:- Transaction recording
- Balance management
- Audit trail maintenance
- Settlement processing
- Reporting and analytics
- Payment transactions
- Authentication events
- Attribute updates
- Consent changes
Data Flow Patterns
Registration Flow
Authentication Flow
Scalability Design
Horizontal Scaling
Stateless Services
API Gateway, Bridge Service scale horizontally behind load balancers
Database Sharding
Attribute and Ledger services support sharding by user ID
MPC Node Distribution
MPC nodes can be geographically distributed for resilience
Cache Layer
Redis cache for frequently accessed data
Performance Optimization
Security Architecture
Defense in Depth
-
Network Security
- TLS 1.3 for all communications
- mTLS between internal services
- Network segmentation and firewalls
-
Application Security
- OAuth2/JWT for authentication
- RBAC for authorization
- Input validation and sanitization
- Rate limiting and DDoS protection
-
Data Security
- Encryption at rest (AES-256)
- Encryption in transit (TLS)
- Key rotation policies
- Secure key management (HSM)
-
Operational Security
- Audit logging
- Intrusion detection
- Security scanning
- Incident response
Threat Model
Deployment Topology
Production Deployment
Monitoring & Observability
Metrics Stack
- Prometheus: Metrics collection
- Grafana: Visualization and dashboards
- Tempo: Distributed tracing
- Loki: Log aggregation
- AlertManager: Alert routing
Key Metrics
| Metric | Target | Alert Threshold |
|---|---|---|
| API Latency (p99) | < 100ms | > 200ms |
| MPC Computation Time | < 500ms | > 1000ms |
| Error Rate | < 0.1% | > 1% |
| System Availability | 99.99% | < 99.9% |
Disaster Recovery
Backup Strategy
- Database Backups: Hourly snapshots, daily full backups
- MPC Key Backups: Encrypted, distributed storage
- Configuration Backups: Version controlled in Git
Recovery Procedures
1
Detection
Monitoring alerts trigger incident response
2
Assessment
Determine scope and impact of failure
3
Isolation
Isolate affected components
4
Recovery
Execute recovery procedures
5
Verification
Verify system functionality
6
Post-Mortem
Document lessons learned