Matic AMA Recap with Razor Network

SEGMENT 1

  • A fair and wide distribution of tokens
  • The protocol is permissionless. We, or anyone else, don’t have the power to decide who is allowed or otherwise, to participate in the network.
  • Queries are randomly assigned to the stakers, making collusion and bribing difficult.
  • Secret voting and dispute mechanism makes it secure from bribery attacks.

SEGMENT 2

  1. A fair and wide distribution of tokens
  2. The protocol is permissionless. We, or anyone else, don’t have the power to decide who is allowed or otherwise, to participate in the network.
  3. Queries are randomly assigned to the stakers, making collusion and bribing difficult.
  4. Secret voting and dispute mechanism makes it secure from bribery attacks.
  1. Proof of stake provides Sybil attack resistance. This is because becoming a validator requires staking tokens and doing that without owning tokens is not possible.
  2. The algorithm rewards honest validators with new tokens. This incentivizes the validators to behave honestly and report valid data.
  3. Dishonest/incoherent validators are penalized and their stake is reduced. This disincentives bad behavior. A part of the tokens collected as a penalty is distributed to honest stakers, further incentivizing honest behavior.

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Ima-Abasi Pius Joseph

Ima-Abasi Pius Joseph

Research Writer ǀ Blockchain Enthusiast ǀ Petroleum Engineer ǀ Part-time Journalist