Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  • Is it too much of a security risk to allow validators to pick their own regions?
  • What will be used as cryptographic evidence for various performance requirements (or performance failures)?
  • Is it a good idea to give the tokens from a valid slash to the accuser?
    • On the one hand it gives an economic incentive to slash other validators
    • But on the other hand it gives an unbonding backdoor. A pair of validators could have an agreement that one slashes the other then returns the stake, allowing an unbond which circumvents the holding period.
  • What to do with tokens deducted due to failed slash?
  • At what rate are new tokens minted in validator rewards? How does this minting interact with the blessed Rev mint contract (which can only exist in a single namespace)?