Network Participants

The X-Project Network comprises of the underlying protocol, technology and documentation developed by X-Project. Developers can leverage the X-Project SDKs to use and contribute to the code to improve the network. Service providers can deliver infrastructure to the network by running nodes that users can select to use.
The X-Project Network provides a means to:
● Decentralize the sharing and discoverability of data
● Decentralize the discovery and trust of end users
● Deliver more equitable distribution of value to participants on the network
● Create and share verified data in a trusted, private, secure, and decentralized manner.
The X-Project Network and token will establish a new data economy that disrupts a range of existing industries and technologies.
As users connect more data, there’s more aggregate value for both the user and network. The value of user data increases as it becomes denser. Incentivising the onboarding of data into the network is outlined in the Network Incentives section.
Value is captured in the X-Project Network through data sharing, messaging, data validation processes, and new market creation. There are many new markets already being explored by X-Project partners that include; Hyper-personalized insurance offers with decentralized claim management, Patient owned healthcare data with data marketplaces for researchers.
People optimize for incentives. The following six archetypes have been considered when designing the network incentives.
  1. 1.
  2. 2.
    End Users
End Users interact with X-Project by creating X-Project Accounts. X-Project Accounts are decentralized identities (DID) registered on the X-Project DID infrastructure and controlled by an end user's private keys. Accounts are created by installing and using a X-Project Network compliant X-Project Vault or using the developer tools.
X-Project Network compliant Vaults enables users to interact with applications and blockchains supported on the X-Project Network. This ensures a self-sustaining data ecosystem where users can own and control their data at little or no cost, while obtaining the full benefits of their data. As the network matures, protocol extensions and upgrades will generate new revenue streams for end users.
End User Examples
● A client for an accountant or lawyer who uses the Vault for secure communications
● A patient wishes to have a copy of their medical records to take to a referral
● A user wants to send cryptocurrency to a friend or participate in a DAO governance vote
● A user wants to sign into a DEX and verify they have been KYC’d in a privacy preserving way.
End Users can also be Verified. Verified X-Project Accounts use software that leverages the X-Project Network and its applications. This includes businesses, government organizations, crypto projects, and nonprofits. These participants become visible on the network by completing a KYC process from a trusted provider and bonding tokens via the X-Project Trust Framework.
Verified User Examples
● A lawyer who needs secure messaging and file sharing with clients
● A government department issuing driver's licenses to citizens
● A doctor who shares medical records with patients
● An airline checking COVID-19 credentials before selling a plane ticket
● A utility company sending bills to customers.
Applications & Developers
Developers are independent software designers or businesses that build out Applications which leverage the X-Project Network. Their software may operate as a traditional SaaS business or generate revenue from earned X-Tokens. Developers are rewarded with X-Tokens tokens as more users are active in their Application.
Developers may earn tokens via:
  1. 1.
    X-Project Network Interactions facilitated by their application, growing proportionally to their user growth
  2. 2.
    X-Project Network Growth Rewards for onboarding new users to the network
  3. 3.
    X-Project Community Incentive Grants for contributing technology and other useful services to the network
Developers may bond tokens to increase the trust of their application across the network. This includes:
  1. 1.
    Claim ownership of an application name on the network
  2. 2.
    Define trusted data schemas for the application
  3. 3.
    Define official smart contract addresses used by the application
  4. 4.
    Promote their application to other users across the network.
Examples
● A startup building payroll software to issue payslips
● A Decentralized Exchange providing DeFi services
● A startup building a next generation decentralized social media application
● A software vendor building COVID-19 hotspot broadcasting for the government
● A software vendor integrating a digital signature and secure document upload into an existing application for lawyers.
Service Providers
Service Providers bond tokens in the Service Provider Registry to make their infrastructure nodes discoverable by other users on the network. Providers can set the price (in $X-Token) to use their infrastructure and earn an ongoing revenue stream
Community Stakers
Community Stakers deposit tokens in the Interactions Registry to secure the network. Those staked tokens are used to secure the X-Project Network, with a percentage of the protocol fees returned to community stakers as compensation for this important role. This allows community members to earn a return and has the benefit of reducing the token circulating supply.