LogoLogo
  • Entangle
    • Overview
    • Security Audits
  • Universal Interoperability Protocol
    • Overview
    • Architecture
      • Scalability and Network Stability
        • L2 Utility Blockchains
        • Transmitter Groups
      • Security and Consensus Mechanism
      • Finality
      • Execution Latency
      • Compatibility and Interoperability
    • Developer Guides
      • Getting Started
      • Solidity
        • Simple Abstract Messenger Example
        • Deploying Your Custom EVM Protocol
        • Bridging Tokens with UIP
        • Become an EVM Transmitter
      • Solana
        • Simple Abstract Messenger Example
        • Deploying Your Custom Solana Protocol
        • Become a Solana Transmitter
      • Calculate Cross-Chain Transaction Cost
      • Customizable Message Transmission Options
      • How to Debug Sent Messages
      • SDK Setup
      • Revenue Sharing for Transmitters
      • How to Become a Super Transmitter
    • Endpoints
  • Universal Data Feeds
    • Overview
    • Architecture
      • Data Delivery Methods
        • Pull Model
        • Push Model
      • Oracle Contract & User Interaction
    • Developer Guides
      • Custom Data Feeds
      • Fetch Data via Pull Model (PAYG)
        • EVM Smart Contracts
        • Solana Smart Contracts
      • Fetch Data via Pull Model (Subscriptions)
        • EVM Smart Contracts
        • Solana Smart Contracts
      • Fetch Data via Push Model
        • EVM Smart Contracts
        • Solana Smart Contracts
    • User Guides
      • Accessing Feeds
      • Subscribe to a Data Feed
      • Check Subscription
      • Manage Subscription
      • Renew Subscription
    • Data Endpoints
  • Universal Token Standard
    • Overview
    • Architecture
      • Fee Components
    • Developer Guides
      • Manual Deploy
        • Token Deployment Types
        • Create a Custom Token
        • Factory Blueprint Deployment
        • Examples
          • Initial Setup
          • UTS Connector
            • Mint & Burn Connector Scheme
            • Lock & Unlock Connector Scheme
            • Connector Over Native Currency
          • UTS Token
            • Simple Token
            • Token with Messages
      • Bridge SDK
      • Token Verification
      • Fees Calculation & Gas Estimation Logic
      • Estimations
    • User Guides
      • Launch Universal Token
      • Create a Liquidity Pool
      • Expand Existing Token
      • Transfer Liquidity to Connector
      • Bridging
    • Contract Addresses
  • Entangle Interoperable Blockchain
    • Overview
    • Architecture
    • Developer Guides
      • Set up a Validator Node
      • Delegating to Validators
      • Undelegating from Validators
      • Supported Accounts
  • More
    • Media Kit
    • FAQ
    • Report an Issue
    • Become a Partner
Powered by GitBook
On this page
  • Validators
  • Staking and Voting Power
  • Security and Monitoring
  • Rewards and Incentives
  • Slashing and Penalties
  • Explore

Was this helpful?

Export as PDF
  1. Entangle Interoperable Blockchain

Developer Guides

PreviousArchitectureNextSet up a Validator Node

Last updated 27 days ago

Was this helpful?

This section provides information and guides for developers intending to use Entangle's Interoperable Blockchain (EIB). If you have any questions or need assistance, please feel free to use our to connect with an expert on our team.

Validators

Each transaction processed on the network requires thorough validation to ensure compliance with established rules and protocols. Validators are responsible for verifying these transactions, ensuring that all operations are accurately checked, recorded, and aligned with the network’s governing principles.

Staking and Voting Power

Validators use the native token, to participate in securing the network. Validators stake the native token to gain voting power, with greater stakes or delegated tokens enhancing their influence over the network's security and consensus. This staking mechanism ensures that validators have a vested interest in maintaining the network's security.

Security and Monitoring

Validators actively monitor the network for signs of malicious activity. Their vigilance is crucial in preventing attacks, double-spending, or other behaviors that could compromise the blockchain's security.

Rewards and Incentives

Validators are incentivized through rewards, which come from gas fees generated by the transactions they validate. This reward mechanism is designed to acknowledge and compensate validators for their crucial contributions and encouraging active participation.

Slashing and Penalties

Validators are held accountable through a robust slashing mechanism that discourages malicious behavior and ensures network security

  1. If a validator signs two conflicting blocks, a percentage of their tokens are slashed.

  2. Validators that sign fewer than 50 of the last 100 blocks will have a portion of their staked tokens slashed and be temporarily "jailed" for a set period.

Explore

contact form
Cover

Set up a Validator Node

Cover

Delegating to Validators

Cover

Undelegating from Validators

Cover

Supported Accounts