You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
#!/bin/bash# FnF Exercise 3# 1. KES Mechanism (for rotating operational cert)# - Generate the cold (offline) key pair that is used to evolve the operational certs (using new hot KES keys periodicaly).# - Generate the hot KES (offline/online) key pair for generating the cert.# - Generate the operational cert (offline) based on the evolved KES and VRF key.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
The Hitchhikers Guide To The Shelley - Chapter 3 - The Staking
The Hitchhiker's Guide To The Shelley - Chapter 3 - The Staking
This guide's chapter targets the pool operators for getting their head around of Shelley staking.
To fully understand the staking mechanism we need to define and interpret the following key concepts:
The Hitchhiker's Guide To The Shelley - Chapter 4 - The Shelley Network
The Hitchhiker's Guide To The Shelley - Chapter 4 - The Network
This guide's chapter targets the pool operators for getting their head around of current Shelley's Network stack until P2P (Governor with DeltaQ) arrives.
It also provides some networking practices, for setting up a staking pool environment.
Disclaimer:
All the Information in this gist, only applies to the currently implemented network stack of Haskell Shelley, and
might be inaccurate or even completely wrong.
The Author cannot be held responsible for any consequences after/before using any information from this gist,
therefore, you acknowledge that you are USING THEM AT YOUR OWN RISK.