Difference between revisions of "Trustnet"

From Snowblossom Wiki
Jump to: navigation, search
(Created page with "==Trustnet== The concept of trustnet is that with sharding, we will eventually reach network where no one node has all of the chain data. However, in order to mine a block o...")
 
 
Line 1: Line 1:
 
==Trustnet==
 
==Trustnet==
  
The concept of trustnet is that with sharding, we will eventually reach network where no one node has all of the chain data.  However, in order to mine a block on a shard, it may need to import blocks from other shards.  Including incorrect blocks will result in the new mined block being invalid so a miner must completely trust the source of data about validity of other shard.
+
The concept of trustnet is that with sharding, we will eventually reach a network where no one node has all of the chain data.  However, in order to mine a block on a shard, it may need to import blocks from other shards.  Including incorrect blocks will result in the new mined block being invalid so a miner must completely trust the source of data about validity of other shards.
  
 
The solution is the trustnet.  The most basic use is a mining pool operator will run their nodes with the same trustnet keys so that they trust each other for other shard validation and can safely import blocks
 
The solution is the trustnet.  The most basic use is a mining pool operator will run their nodes with the same trustnet keys so that they trust each other for other shard validation and can safely import blocks

Latest revision as of 22:39, 25 February 2022

Trustnet

The concept of trustnet is that with sharding, we will eventually reach a network where no one node has all of the chain data. However, in order to mine a block on a shard, it may need to import blocks from other shards. Including incorrect blocks will result in the new mined block being invalid so a miner must completely trust the source of data about validity of other shards.

The solution is the trustnet. The most basic use is a mining pool operator will run their nodes with the same trustnet keys so that they trust each other for other shard validation and can safely import blocks from those chains.

For clients, a client may be configured to prefer to use nodes of a specified trustnet in order use trusted nodes that are giving correct information and not acting as address honeypots.