-
Notifications
You must be signed in to change notification settings - Fork 21
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
How to identify the offiline operators if 1/2 operators are malicious in a cluster #351
Comments
See BFT Forensics |
I have read it. It only identifies the double vote misbehavior, can not solve the liveness vioaltion right? My question is that operators3-4 don't send any protocol(validator duty) messages to the dvt cluster and discard the protocol messages of operators1-2. How to prove the operators3-4 are the faultys ? |
Yes, BFT Forensics can't solve the protocol. On a theoretical point of view, any BFT can only guarantee its properties (agreement, termination, etc) if at maximum We don't have BFT Forensics yet, but multiple strategies could be added, such as idleness, invalid messages and so on. |
I'm also interested in evaluating the performance of operators in ssv (shown bolow)
Now assume, there are four operator1, operator2, operator3, operator4. '' implies the Byzantine. ⚠⚠⚠ |
Your last question is best to be asked on our Discord server this repo is used for discussing issues of the core protocol itself |
ok ,thanks |
for example, Distributed Validator A is handled by operator1,2,3,4.
We assume operators1,2 are honest while operators 3-4 is malicious and pretend to be online, so how can the ssv identify exactly the malicous operators 3-4.
The text was updated successfully, but these errors were encountered: