Skip to content

Commit 9f3e32b

Browse files
ilariaeeshaben
andauthored
Update learn/infrastructure/guardians.md
Co-authored-by: Erin Shaben <eshaben@icloud.com>
1 parent 1d64d82 commit 9f3e32b

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

learn/infrastructure/guardians.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ Next, the ways by which Wormhole achieves this will be examined individually.
2727

2828
Decentralization is the biggest concern. Previous interoperability solutions have largely been entirely centralized, and even newer solutions utilizing things like adversarial relayers still tend to have single points of failure or collusion thresholds as low as one or two.
2929

30-
When designing a decentralized oracle network, the first option to consider is likely a Proof-of-Stake (PoS) system; this is a suboptimal solution. PoS is designed for blockchain consensus in smart-contract enabled environments, so it's less suitable when the network verifies the output of many blockchains and does not support its own smart contracts. While it looks appealing from a decentralization perspective, network security remains to be seen, and it can make some other outlined goals more challenging to achieve. Different options need to be explored.
30+
When designing a decentralized oracle network, the first option to consider is likely a Proof-of-Stake (PoS) system; this is a suboptimal solution. PoS is designed for blockchain consensus in smart contract-enabled environments, so it's less suitable when the network verifies the output of many blockchains and does not support its own smart contracts. While it looks appealing from a decentralization perspective, network security remains to be seen, and it can make some of the other outlined goals more challenging to achieve. Different options need to be explored.
3131

3232
Another option is to use Zero-Knowledge Proofs (ZKP) to secure the network. This would be a good solution from a decentralization perspective, as it's trustless. However, ZKPs are still a nascent technology, and verifying them on-chain is not feasible, especially on chains with limited computational environments. That means a form of multisig will be needed to secure the network.
3333

0 commit comments

Comments
 (0)