💡Validator

Validator Overview

The validator is a pivotal component with dual functions: initiating and verifying web transactions. Its design is adaptable, allowing for various implementations that align with the evolving network architecture.

Transaction Verification and Encryption

Validators use a unique set of encryption keys to establish secure TLS connections, selecting appropriate cipher suites for communication with target web servers. All traffic used to assess node reputation is encrypted with supported algorithms:

Supported Algorithms Include

  • AEAD (primary)

  • RSA, RC4

  • MD5 (Hash-based)

  • Diffie-Hellman, DSA (Digital Signature Algorithm)

  • Triple DES, SHA (SHA-1 and SHA-2)

  • ECDH (Elliptic Curve Diffie-Hellman), ECDSA (Elliptic Curve Digital Signature Algorithm)

  • AES (128-bits and 256-bits variants)

  • SRP (Secure Remote Password), IDEA, Camellia, ChaCha20

Session management involves the creation and secure storage of pre-master, master, and session keys, essential for assessing traffic quality from network nodes. After data validation, the validator passes the data to the ZK processor to generate a proof for each node's session data, which is then batched on the blockchain for settlement.

Security Measures

Currently, the validator operates under its security protocols as it does not derive security from any underlying Layer 1 technology. If the validator goes down, network users can directly submit session data on the Layer 1 for settlement. Future developments aim to implement economically collateralized validators to provide robust security guarantees, preventing any single entity from manipulating network transactions.

Last updated