Network Security

Explanation of SEDA’s Proof-of-Stake security model, where validators stake SEDA tokens, slashing enforces compliance, and usage-driven burn contributes to long-term network security.

The SEDA Chain operates under Proof-of-Stake consensus mechanisms. Validators stake SEDA tokens to participate in consensus and secure Oracle Program execution, Data Proxies, data request batching, and signing tamper-resistant proofs.

As circulating supply reduces through usage-based burns, the economic weight securing the network increases, raising the cost of malicious behavior.

Network security scales alongside network growth and security is enforced by bonded stake and protocol rules. Token supply reduction resulting from network usage strengthens network security by increasing the weight of bonded stake, reinforcing integrity of the SEDA Network.

Last updated

Was this helpful?