Skip to content

Commit

Permalink
Update docs/docs/adrs/adr-005-cryptographic-equivocation-verification.md
Browse files Browse the repository at this point in the history
Co-authored-by: Marius Poke <[email protected]>
  • Loading branch information
sainoe and mpoke authored Aug 3, 2023
1 parent b0e9c61 commit e5d97bd
Showing 1 changed file with 1 addition and 1 deletion.
Original file line number Diff line number Diff line change
Expand Up @@ -29,7 +29,7 @@ Headers can be verified in two ways: sequentially, where verification occurs in
and each new header must be signed by ⅔+ of the voting power from the last trusted header validators;
or using skipping, where intermediate headers are verified and must be signed by ⅓+ of the voting power
from the last trusted header validators. The latter is the default method, as it is faster in most cases.
Additionally, light clients are cross-checking new headers obtained from a primary with witnesses to ensure all nodes share the same states.
Additionally, light clients are cross-checking new headers obtained from a primary with witnesses to ensure all nodes share the same state.

A light client attack occurs when a Byzantine validator sends incorrect states to a light client.
As the light client doesn't execute transactions, it can be deceived into trusting corrupted application states.
Expand Down

0 comments on commit e5d97bd

Please sign in to comment.