dankrad

Results 62 comments of dankrad

> If you're keeping track of the last time that a validator attested then wouldn't it be simpler to just apply the quadratic leak to all validators at all times...

> If, for example, 10% of validators created a slashing event it would have ~0 impact on the safety/liveness of the chain (assuming the other validators are honest), but they...

> Comes phase 1, the remote [slashing protection service](https://github.com/prysmaticlabs/prysm/tree/master/slasher) will need more work to support catching and preventing invalid custody attestations This is not a viable alternative, because in order...

> Does it lose all such protection? Surely regardless of the weight behind it, an invalid state transition (for example) would be rejected by all nodes. Well, an incorrect state...

> This feels like a large and significant change to the requirements for a signer rather than a slight increase. Absolutely, it's a huge increase, that's why I started this...

> There seems to be a lot resting on this assumption. Why _a bit_, and not _a lot_? I am going to paste my answers from the secret shared validators...

Here is another suggestion to get the best of both worlds: Explicitly split Beacon Nodes into the part that verifies state transitions and all the rest. Allow compiling a "State...

> 4\. In response to @dankrad mentioning that slashing for fraud could exacerbate the verifier's dilemma, as it would make validators want to wait to see others' signatures to make...

> I don't see how we can make a good decision on this until we have a better understanding of whether or not (beacon chain) fraud proofs will be too...

> It would open up the validator to being slashed, which neither party would want. A sane staking service would treat their validator keys with as much, if not more,...