GH GambleHub

Ecosystem Participant Map

(Section: Ecosystem and Network)

1) Why do I need a membership card

The participant map is a general who's who model in the ecosystem: roles, relationships, rights, boundaries of responsibility, and compliance contours. It eliminates the confusion of terms, accelerates partner onboarding, simplifies incident tracing and increases network manageability (governance, risk, security, development).

2) Role taxonomy (top level)

1. Operators - brands/platforms that own customer experience.
2. Content Providers (Studios/Content Providers) - slots, live games, sports feeds, mini-games.
3. Payment providers (PSP/On-Off Ramp) - cards, APM, stables, crypto wallets.
4. Identification and risk (KYC/KYB/AML/Trust) - verification, scoring, sanction filters.
5. Infrastructure/Network (Nodes/Relays/Edge/CDN/Bridges) - transport, routing, cross-chain connections.
6. Affiliates/Aggregators/Traffic - sources of leads, showcases, media networks.
7. Analytics and data (DWH/BI/Anti-Fraud) - observability, reporting, modeling.
8. Community and DevRel - developers, integrators, partner teams.
9. Regulators and auditors (B2G) - licenses, inspections, reports.
10. Governance and Treasury - rules, budgets, grants.
11. Partner brokers/Market places - exchange of traffic, liquidity, integrations.

💡 Each role is further detailed by sub-roles and accounting objects.

3) Sub-roles and objects (detail)

Operators: B2C brand, White-Label, regional sub-operator, PSP router.
Studios/providers: RGS, live studio, tournament runner, sports feed supplier.
PSP: card acquiring, local APM (Papara, Mefete, etc.), crypto processing, risk rule vendor.
KYC/KYB/AML: KYC provider, source of sanctions lists, PEP/Adverse Media provider, behavioral scoring.
Infrastructure: validator/node, super node/relay, bridge (light/optimistic/ZK), CDN/edge cache.
Traffic/media: showcase, arbitrator, influencer network, retargeting DSP, CRM push partner.
Data: blockchain indexer, CDC connector, anti-fraud DSS, BI.
Community: SDK contributor, integrator, local representative/ambassador.
B2G: regulator, tax reporting, audit (external/internal).
Governance/Treasury: Board of Protocol, Delegates, Grant Committee.
Brokers: integration aggregator (API-market), traffic/liquidity exchange.

4) Models of trust and identity

Legal identity: KYB (reg. number, country, beneficiaries), licenses/permits.
Technical identity: 'org _ id', 'peer _ id' (ed25519/secp256k1), X.509 (mTLS), addresses/wallets.
Trust Tiers: T0 (public), T1 (with basic certification), T2 (advanced verification + deposits), T3 (critical roles/bridges).
Key policy: organization root keys + session keys; rotation/revocation, log of trusted keys.

5) Interaction Matrix (B2B/B2C/B2G)

Operator ↔ Provider: content, limits, tournaments, billing, SLA.
Operator ↔ PSP/KYC: deposits, payments, verification, chargebacks.
Operator ↔ Affiliates: leads, attribution, payouts, QoT.
Provider ↔ Network/Infra: distribution, delays, finalization.
Governance ↔ All: rules, voting, grants.
Regulator/Audit ↔ Operator/PSP: reports, checks, incidents.
Data/BI ↔ Everything: event diagrams, showcases, privacy.

Relationship types: data (events), calls (RPC/API), value (payments/assets), trust (keys/signatures), management (proposal/solutions).

6) Member Lifecycle

1. Onboarding: registration, KYB, license verification, document upload, 'org _ id' generation, key issuance.
2. Technical integration: sandbox → stage → canary → production, test cases, signature of first events.
3. Activation: SLO targets, quotas/limits, inclusion in pools (traffic/liquidity).
4. Growth: Regional/method expansion, grants/marketing, SDK updates.
5. Compliance: periodic reviews, key audits, rotation, DR tests.
6. Evolution/termination: contract migration, withdrawal, archive, key revocation.

7) Register of participants and access (reference model)

Entities:
  • 'org '(organization),' role _ binding '(role and scope),' credential '(key/certificate),' capability '(permission set),' limit '(quotas),' compliance _ record '(CCM/BCW/audit),' contact '(operational).

Example schema (pseudo-SQL)

sql
CREATE TABLE orgs (
org_id TEXT PRIMARY KEY,
legal_name TEXT, country TEXT, regulator TEXT,
trust_tier SMALLINT, status TEXT, created_at TIMESTAMPTZ
);

CREATE TABLE role_bindings (
org_id TEXT REFERENCES orgs(org_id),
role TEXT,     -- operator    provider    psp    kyc    relay    bridge    affiliate...
scope JSONB, -- regions/networks/products
PRIMARY KEY (org_id, role)
);

CREATE TABLE credentials (
org_id TEXT REFERENCES orgs(org_id),
peer_id TEXT, type TEXT, public_key TEXT, valid_to TIMESTAMPTZ,
revoked BOOLEAN DEFAULT FALSE,
PRIMARY KEY (org_id, peer_id)
);

CREATE TABLE capabilities (
org_id TEXT REFERENCES orgs(org_id),
capability TEXT,  -- payouts. write, events. publish, traffic. receive, bridge. sign,...
conditions JSONB, -- limits/hours/countries/assets
PRIMARY KEY (org_id, capability)
);

CREATE TABLE compliance_records (
org_id TEXT REFERENCES orgs(org_id),
kyb_status TEXT, licenses JSONB, sanctions_check TEXT,
last_audit TIMESTAMPTZ, next_review TIMESTAMPTZ
);

Sample Policy (YAML)

yaml access:
tiers:
T1: { max_regions: 2, payouts_daily_usd: 100000, assets: [USDC, EUR] }
T2: { max_regions: 6, payouts_daily_usd: 1000000, assets: [USDC, EUR, TRY] }
T3: { max_regions: 32, unlimited: true, bridge_sign: true }
roles:
operator:
caps: [events. publish, payouts. write, users. read]
provider:
caps: [content. serve, limits. read, events. publish]
psp:
caps: [payments. process, payouts. execute]

8) Connection graph and observability contour

Member graph: vertices - 'org _ id', edges - 'relation (type, scope, slas, limits)'.
Edge categories: 'content', 'payments', 'bridge', 'traffic', 'data', 'governance'.
Observability: tracing of P2P-hops, log of trust (signatures), SLI/SLO for each type of edge.

Example of an edge model (pseudo-SQL)

sql
CREATE TABLE edges (
src_org TEXT, dst_org TEXT, edge_type TEXT, -- payments    content    traffic    bridge    data    gov slas JSONB, limits JSONB, status TEXT, since TIMESTAMPTZ,
PRIMARY KEY (src_org, dst_org, edge_type)
);

9) Process and data mapping

Event model: 'signup/kyc/pass', 'deposit/payout', 'game _ start/event', 'bridge. lock/mint`, `traffic. view/click '- a single scheme and idempotency keys.
Catalogs: networks/assets/payment methods/SDK versions/regulators/countries.
Logging and auditing: immutable logs (hash chains), binding to 'proposal _ id' (governance) and 'org _ id'.

10) Health metrics "maps" (KPI/SLO)

Coverage and completeness

Coverage% by role (proportion of ecosystem functions closed by participants).
Region Coverage% (countries × methods × providers).
Version Coverage% (SDK/Protocol).

Quality and risk

Compliance Freshness.
Key Hygiene (rotation on time, share of rotten keys).
Incident Rate by role/edge; MTTA/MTTR.

Economy and growth

New Partners/month, Activation Velocity (onboarding to first events), Net Contribution (contributor's contribution to GTV/MAU/liquidity).
Partner Churn%.

SLO examples

KYB review ≤ 5 working days; keys T3 rotation ≤ 90 days; Incident SEV-1 MTTR ≤ 30 min; Post-mortem ≤ 72 ч.

11) Dashboards (layouts)

Atlas (general map): interactive graph: roles, connections, statuses (zel/yellow/red), filters by country/edge.
Compliance: audit deadlines, overdue QAS/audits, sanctions hits.
Connectivity: p95 latency and success by edge, proportion of direct P2P, relay-percent.
Economy: Contributor (GTV/MAU/Take Rate), top up/down.
Risk: incidents by class, burn-rate SLO, exposures by counterparties.
Governance: proposal activity, vote distribution, grants.

12) Member onboarding: checklist

1. Legal questionnaire + documents (KYB, licenses, beneficiaries).
2. Technical registration 'org _ id', key release/download, mTLS setting.
3. Selection of roles and scopes, assignment of'capabilities' and limits.
4. Connection to sandbox, test suites (events, payouts, limits, bridge).
5. Setting up SLO/alerts and contact ruler (24/7 for critical roles).
6. Approval of SLAs/regulations, publication in the register.
7. Canary period (1-2 weeks), then expansion of quotas.

13) Change management and interoperability

API/Event/Schema Versioning: Add-Only Policy, Deprecate Window ≥ 90 days.
Capability negotiation: declaring supported capabilities when handshake.
Role/scoop migrations: applications through governance, timelock, audit.

14) Security and privacy

Minimum necessary rights (PoLP) by roles and edges.
E2E encryption for sensitive topics (payments/CCM).
DLP/PII control: tokenization, pseudonymization, regional showcases.
Anti-Sybil for critical roles: deposits/insurance, proof-of-authority.
Key rotation/recall: "double keys," shift log, partner notifications.

15) Playbook incidents (by "edge" and "role")

Member Key Compromise (T2/T3):
  • Immediate recall, publication of'revoke-event', block by ACL, rotation of dependent keys, report ≤ 24 hours.
Payment/bridge edge SLA violation:
  • Route switching, increasing K-confirmations, throttle volumes, communications, SLO compensation.
Sanctions/AML triggers:
  • Freezing links/scopes, manual review, compliance report, updating lists.
Invalid affiliate/receiver reports:
  • Clash of logs (signatures/receipts), arbitration, temporary greylist, adjustment of payments.

16) Examples of "map" analytics (pseudo-SQL)

Coverage by role and country

sql
SELECT role, country, COUNT(DISTINCT org_id) AS orgs
FROM role_bindings rb
JOIN orgs o USING (org_id)
GROUP BY role, country;

Compliance (delay) period

sql
SELECT org_id, last_audit, next_review,
CASE WHEN next_review < now() THEN 'overdue' ELSE 'ok' END AS status
FROM compliance_records
ORDER BY next_review ASC;

Rib health (success/latency)

sql
SELECT edge_type,
PERCENTILE_CONT(0. 95) WITHIN GROUP (ORDER BY latency_ms) AS p95_latency,
100. 0 SUM(CASE WHEN status='success' THEN 1 ELSE 0 END)/COUNT() AS success_rate
FROM edge_metrics
WHERE ts >= now() - INTERVAL '7 days'
GROUP BY edge_type;

17) Registers and catalogs (reference-YAML)

yaml catalogs:
networks: [eth-mainnet, polygon, solana, tron]
assets:
- { symbol: USDC, decimals: 6, chains: [eth-mainnet, polygon] }
- { symbol: TRYX, decimals: 2, chains: [tron] }
regulators:
- { code: UKGC, country: GB }
- { code: MGA, country: MT }
sdk_versions:
required: { min: "2. 4. x", lts: "2. 6. x" }

18) Operating Regulations

Daily: edge monitoring (SLO), key recall check, onboarding status reports.
Weekly: card committee - new roles/scopes, compliance delays, grant/MVP recommendations integrations.
Monthly: asset/network catalog audit, SDK revision, incident report, and time-to-fix.
Quarterly: Trust Tiers review, DR stress test and emergency procedures.

19) Card implementation checklist

1. Agree on the taxonomy of roles/sub-roles and data schemas.
2. Deploy member registry, directories, ACLs, and capability policies.
3. Include edge observability (SLI/SLO) and burn-rate alerts.
4. Set up an onboarding pipeline (KYB, keys, sandbox→prod).
5. Link the map to governance (proposals, timelock, solution log).
6. Regularly revamp coverage, risks and compliance delays.
7. Publish an "ecosystem atlas" for internal/partner users.

20) Glossary

org_id is the unique technical identity of the organization.
Trust Tier - member trust/certification level.
Edge/Edge - formalized communication between participants with SLO and limits.
Capability - allowed operation/rights in a specific loop.
Coverage% - the share of closed functions/regions/versions.
Burn-rate SLO - the rate of "burning" the error budget.

Bottom line: the participant map is the ecosystem's "organizational topology." Its implementation provides a single language of roles and connections, transparent boundaries of responsibility, predictable SLOs, fast onboarding and manageable risks. With this foundation, the network is easier to scale, monitor and develop - without surprises and with maximum benefit for all parties.

Contact

Get in Touch

Reach out with any questions or support needs.We are always ready to help!

Telegram
@Gamble_GC
Start Integration

Email is required. Telegram or WhatsApp — optional.

Your Name optional
Email optional
Subject optional
Message optional
Telegram optional
@
If you include Telegram — we will reply there as well, in addition to Email.
WhatsApp optional
Format: +country code and number (e.g., +380XXXXXXXXX).

By clicking this button, you agree to data processing.