Security and Finality

Given there are more than ½*N+1 validators are honest. However, there are still cases where certain amount Byzantine validators may still manage to attack the network, e.g. through the “Clone Attack”. To secure as much as BSC users are encouraged to wait until receiving blocks sealed by more than ⅔*N+1 different validators.

With 21 validators, if the block time is 3 seconds, the ⅔*N+1 different validator seals will need a time period of (⅔*21+1)*3 = 45 seconds. Any critical applications for Bools chain may have to wait for ⅔*N+1 to ensure a relatively secure finality. However, besides such arrangement, Pools chain does introduce Slashing logic to penalize Byzantine validators for double signing or unavailability, which will be covered in the “Staking and Governance” section later. This Slashing logic will expose the malicious validators in a very short time and make the “Clone Attack” very hard or extremely non-beneficial to execute. With this enhancement, ½*N+1 or even fewer blocks are enough as confirmation for most transactions.

Last updated