Skip to content

Commit

Permalink
Update docs/docs/adrs/adr-005-cryptographic-equivocation-verification.md
Browse files Browse the repository at this point in the history
Co-authored-by: Marius Poke <[email protected]>
  • Loading branch information
sainoe and mpoke committed Aug 3, 2023
1 parent e5d97bd commit f60110f
Showing 1 changed file with 1 addition and 1 deletion.
Original file line number Diff line number Diff line change
Expand Up @@ -31,7 +31,7 @@ or using skipping, where intermediate headers are verified and must be signed by
from the last trusted header validators. The latter is the default method, as it is faster in most cases.
Additionally, light clients are cross-checking new headers obtained from a primary with witnesses to ensure all nodes share the same state.

A light client attack occurs when a Byzantine validator sends incorrect states to a light client.
A light client attack occurs when a Byzantine validator sends invalid headers to a light client.
As the light client doesn't execute transactions, it can be deceived into trusting corrupted application states.
For instance, if a light client receives header A from the primary and header `B` from the witness for the same block height `H`,
and both headers are successfully verified, it indicates a light client attack.
Expand Down

0 comments on commit f60110f

Please sign in to comment.