Validator Internals


#1

Some questions on how Validator works …

  1. What is the function of Validator node ? Is it signing the block with the validator key?
  2. Why cant more than one node sign it before block gets added? What if the validator node signing is malicious?
  3. How is it detected and how is the block corrected?
  4. Any other projects other than Oracles using Proof of Authority? I understand proof of authority is a form of proof of stake?

#2
  1. What is the function of Validator node ? Is it signing the block with the validator key?

Validator nodes generate blocks. Only validator nodes owning valid validator keys have rights to generate blocks.

  1. Why cant more than one node sign it before block gets added? What if the validator node signing is malicious?
  2. How is it detected and how is the block corrected?

The nodes generate blocks in rotation. It is defined by protocol. Please take a look to Aura protocol. POA Network uses on-chain governance to prevent malicious actions from nodes.

  1. Any other projects other than Oracles using Proof of Authority? I understand proof of authority is a form of proof of stake?

One of a good starting point to learn PoA is https://medium.com/poa-network/proof-of-authority-consensus-model-with-identity-at-stake-d5bd15463256


#3

Thank you for the insights. I understood voting process for on-chain governance… just wanted to see what are all the attack vectors that are covered and how they are mitigated in real-time…what’s the ETA from say a 51% attack to getting the network resolve the malicious blocks…


#4

Please take a look at https://github.com/poanetwork/wiki/wiki/POA-Network-Whitepaper#security-risks


#5

found the below link that explains some of fundamental questions I had…