Network Security
Explanation of SEDA’s Proof-of-Stake security model, where validators stake SEDA tokens, slashing enforces compliance, and usage-driven burn contributes to long-term network security.
Last updated
Was this helpful?
Explanation of SEDA’s Proof-of-Stake security model, where validators stake SEDA tokens, slashing enforces compliance, and usage-driven burn contributes to long-term network security.
Last updated
Was this helpful?
Was this helpful?