-
Notifications
You must be signed in to change notification settings - Fork 214
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
continuously send new activations and malfeasance proofs to peers #5306
Comments
Related: #3987 (comment) |
i think we can do something simpler for malfeasance proofs, following the pattern in #5599. we can ask 5-10 peers for all equivocating identities every 10-30 minutes. and then download full missing proofs. we don't expect this number to be significant, as it effectively cancels all rewards. the ultimate attack here is that if all identities will equivocate, and this is bounded by the number of atxs. this will enable distributed verification significantly faster. |
proposed protocol:
for example, we have ~600 malfeasance/canceled identities, if this number grows to 3000 then every query will have to download 10KB of data. if we ask 10 peers every 30 minutes (not concurrently), thats 55 bytes per second. |
I think this approach should work quite well at least for a few years (unless the number of malfeasant identities grows for some unanticipated reason, which is unlikely) |
Can we then try to expedite that to the mainnet? It will make us able to use distributed verification. |
## Motivation Need to sync malfeasance proofs continuously to facilitate distributed verification. See #5306
we are not syncing activations and malfeasence proofs reliably (#4831)
this code should start working after we executed initial sync that tries to download data from the very beggining without additional logic.
The text was updated successfully, but these errors were encountered: