Skip to content

Institutional Entry

The Entry Point is the immutable gateway for institutional intent.

It is the high-performance anchor that encapsulates routing logic, active shielding, and vault-grade security into a single, authenticated signal path.

Edge Intent Routing

Backpac utilizes a specialized subdomain architecture to enforce performance at the global edge. By encoding network metadata into the hostname, we eliminate DNS bottlenecks and minimize cross-regional latency.

https://{chain}-{network}.backpac.xyz/<YOUR_ENTRY_POINT_KEY>

Latency Mandate

Every request is steered to the nearest physical Backpac Edge Location. The {chain}-{network} prefix ensures the global load balancer routes traffic directly to optimized hardware clusters, physically accelerating the settlement path.

Active Shielding

Entry Points provide active defense mechanisms that protect your intents from network turbulence before they reach the mempool.

1. Latency Hedging

Backpac eliminates tail-latency spikes through parallel execution.

  • The Mechanism: If a provider fails to respond within the configured Hedge Delay (e.g., 50ms), the engine automatically fires a parallel intent to a secondary healthy node.
  • The Result: Your application receives the fastest successful response, maintaining a smooth performance profile regardless of provider instability.

2. The Block Cache

Reduce latency for high-frequency READ operations using the Backpac edge cache.

  • State Awareness: The cache is physically aware of the blockchain tip. It automatically invalidates and refreshes data the moment a new block/slot is detected, ensuring you never serve stale state.

3. Solana Write Dedup

Prevents "Transaction Exhaustion" and redundant fees on the Solana network.

  • Idempotency Logic: Backpac tracks transaction signatures at the edge. Duplicate intents within a 60-second window are intercepted and returned with the existing status, protecting the network and your wallet.

Vault-Grade Integrity

Security is not a feature; it is the atmospheric requirement for moving money.

Perimeter Control

  • Origin Restrictions: Edge-level validation of browser origins to prevent unauthorized access.
  • Active Firewall: Apply headers or IP-based profiles to block malicious actors from the signal path.
  • Throughput Guard: Redis-backed sliding window enforcement protects your Reliability Pool from unexpected traffic surges.

The Entry Point is the constant bridge between your application and the mempool.

Settlement Certainty Layer