๐Ÿ”ตOverlay Nodes

Overlay Nodes are verifiably randomly selected by the SEDA Chain to execute the binaries referenced by Data Request. Random secret selection relies on cryptographic primitives such as Verifiable Random Functions (VRFs). Additionally, data reporting follows a commit/reveal scheme to deter malicious behaviors that may affect data request quality (e.g., coordinated attacks, free-riding. etc.).

Last updated