You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
A list of beneficiary addresses for the initial round of grants on the Baklava network
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Execution of the downtime slasher with a 8640 blocks block window, approximately 12 hours, requires ~20.8 million gas. With a gas limit of 20 million on the Baklava network, it is not currently possible to execute this function.
Downtime slashing is an important measure to ensure the stability of the Baklava network, as there are no incentives against abandoning elected validator nodes. At the time of writing there are 13 elected validators on the Baklava network which appear to be abandoned. If this number exceeds 1/3 of the elected set, currently 19, the network will stall
This proposal will call the function DowntimeSlasher.setSlashableDowntime(7200) to set the slashing window to 7200 blocks, approximately 10 hours, which will execute with approximately 17.3 million gas, within the gas limit.
After this proposal in enacted, downtime slashing can be used to slash offline validators, which will remove them from their groups and from the elected set if the o
Baklava Beneficiary to ReleaseGold address mapping
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
The notes below describe the approach in designing and writing the initial
reference implementation of Handshake. This is not a prescriptive document and
should not be used as such. This document's goal is to provide a referenece on
the rationale and initial design of the protocol.
Abstract
The foundation for the internet's security has relied upon trusted Certificate
Authorities (CAs) which attest that a user is connecting to the correct server
or node. This has created a reliance upon a handful of trusted actors, many of
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters