Skip to content

Commit

Permalink
Update docs/docs/adrs/adr-005-cryptographic-equivocation-verification.md
Browse files Browse the repository at this point in the history
  • Loading branch information
sainoe authored Aug 4, 2023
1 parent 2de5aad commit 0f0cfd8
Showing 1 changed file with 1 addition and 1 deletion.
Original file line number Diff line number Diff line change
Expand Up @@ -82,7 +82,7 @@ In a nutshell, consumer heights are mapped to provider heights through VSCPacket
When an infraction occurs on the consumer, a SlashPacket containing the vscID obtained from mapping the consumer infraction height
is sent to the provider. Upon receiving the packet, the provider maps the consumer infraction height to a local infraction height,
which is used to slash the misbehaving validator. In the context of untrusted consumer chains, all their states, including vscIDs,
could be corrupted and the ore cannot be used for slashing purposes.
could be corrupted and therefore cannot be used for slashing purposes.

- Currently, the endpoint can only handle "equivocation" light client attacks. This is because the "lunatic" attacks require the endpoint to possess the ability to dissociate which header is conflicted or trusted upon receiving a misbehavior message. Without this information, it's not possible to define the Byzantine validators from the conflicting headers (see [comment](https://github.com/cosmos/interchain-security/pull/826#discussion_r1268668684)).

Expand Down

0 comments on commit 0f0cfd8

Please sign in to comment.