๐Ÿ„Permissionless

In contrast to traditional oracles, where a single entity with majority control poses a risk of data manipulation and introduces a single point of failure, the SEDA protocol is designed to be a fully permissionless and decentralized network. This distinctive approach effectively prevents the existence of centralized gatekeepers and mitigates the potential for individual entities to manipulate data.

SEDA is structured as a fully permissionless network for all stakeholders. Any SEDA token holder can seamlessly join the network by either delegating their tokens or running a validator. Whether opting to function as a SEDA Chain Validator, Overlay Node, or taking on other essential roles within the network, SEDA provides an open and decentralized environment for everyone involved.

Last updated