You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/Learn/core-concepts/satoshi-plus-consensus/security.md
+19-19Lines changed: 19 additions & 19 deletions
Original file line number
Diff line number
Diff line change
@@ -2,38 +2,38 @@
2
2
sidebar_label: Security
3
3
hide_table_of_contents: false
4
4
sidebar_position: 2
5
-
description: Learn about the Security Model of Core Chain
5
+
description: Learn about Core's Security Model
6
6
---
7
7
8
-
# Core Chain's Approach to Security
8
+
# Core Security
9
9
---
10
10
11
11
## Overview
12
-
Core Chain, as a revolutionary Bitcoin-aligned EVM blockchain, leverages the Satoshi Plus consensus mechanism to ensure an optimal blend of security, decentralization, and scalability. This approach harnesses the intrinsic security features of Bitcoin while enabling robust smart contract functionality and DeFi integration, making it a pioneering platform in the blockchain space.
12
+
Core, as a Bitcoin-aligned EVM blockchain, leverages the Satoshi Plus consensus mechanism to uphold an optimal blend of security, decentralization, and scalability. This approach harnesses the intrinsic security features of Bitcoin while enabling robust smart contract functionality and DeFi integration, making it a pioneering platform in the blockchain space.
13
13
14
14
## Security Components
15
15
### 1. Delegated Proof of Work (DPoW) and Delegated Proof of Stake (DPoS)
16
-
Core Chain incorporates these two powerful mechanisms to form a balanced and secure blockchain environment. The DPoW extends the proven security model of Bitcoin by allowing miners to delegate hashing power to Core Chain, thereby benefiting from Bitcoin’s immense hash rate and security pedigree. On the other hand, DPoS enables both BTC (through non-custodial staking) and CORE token holders to stake their assets with validators on the Core network, promoting a decentralized network governance and additional security layers.
16
+
Core incorporates these two powerful mechanisms to form a balanced and secure blockchain environment. The DPoW extends the proven security model of Bitcoin by allowing miners to delegate hashing power to Core, thereby benefiting from Bitcoin’s immense hash rate and security pedigree. On the other hand, DPoS enables both BTC (through non-custodial staking) and CORE token holders to stake their assets with validators on the Core network, promoting decentralized network governance and additional security layers.
17
17
18
18
### 2. Validator Security
19
-
Validators are central to maintaining the integrity and security of the Core Chain. They are selected based on the combined weight of staked tokens (CORE and BTC) and delegated hash power, ensuring that only the most supported and trusted nodes handle the consensus process. This dual support system mitigates the risk of centralization and security breaches.
19
+
Validators are central to maintaining the integrity and security of the Core blockchain. They are selected based on the combined weight of staked tokens (CORE and BTC) and delegated hash power, so that only the most supported and trusted nodes handle the consensus process. This dual support system mitigates the risk of centralization and security breaches.
20
20
21
21
### 3. Security Through Incentivization
22
22
The Satoshi Plus mechanism incentivizes both miners and stakers (CORE and BTC) by providing rewards in CORE tokens, aligning their interests with the network’s longevity and integrity. This economic incentivization helps sustain a robust participation level, crucial for maintaining a secure and decentralized network.
23
23
24
24
## Security Protocols and Implementations
25
25
1.**Robust Transaction Validation**
26
-
Core Chain validators are responsible for verifying transactions and creating new blocks. The unique combination of DPoW, DPoS, and Non-custodial BTC Staking ensures that these validators have sufficient computational and stake-based support to perform their roles effectively, reducing the likelihood of fraudulent activities and ensuring the accuracy of the blockchain ledger.
26
+
Core validators are responsible for verifying transactions and creating new blocks. The unique combination of DPoW, DPoS, and Non-Custodial BTC Staking involves many stakeholders and significant capital in the election of validators, thus heavily incentivizing the election of trustworthy validators and the honest participation of those validators.
27
27
28
-
2.**Network Resilience Against Attacks**
29
-
The integration of Bitcoin’s hash power with CORE and BTC staking makes the Core Chain exceptionally resilient against various types of attacks. The high cost of attacking such a hybrid system, combined with distributed consensus achieved through delegated mechanisms, significantly enhances network security.
28
+
3.**Network Resilience Against Attacks**
29
+
The integration of Bitcoin’s hash power with CORE and BTC staking makes Core exceptionally resilient against various types of attacks. The high cost of attacking such a hybrid system, combined with distributed consensus achieved through delegated mechanisms, significantly enhances network security.
30
30
31
-
3.**Upgradability and Flexibility**
32
-
Unlike traditional blockchains that rely solely on a single form of consensus, Core Chain’s hybrid model allows for adaptability and upgradability. This flexibility ensures that the network can evolve in response to emerging security threats or advancements in blockchain technology.
31
+
4.**Upgradability and Flexibility**
32
+
Unlike traditional blockchains that rely solely on a single form of consensus, Core’s hybrid model allows for adaptability and upgradability. This flexibility is designed to enable the network to evolve in response to emerging security threats or advancements in blockchain technology.
33
33
34
-
## Attack Vectors and Security Measures in the Core Chain Ecosystem
34
+
## Attack Vectors and Security Measures in the Core Ecosystem
35
35
36
-
The Core Chain employs a robust security architecture to mitigate potential threats, integrating both technological safeguards and economic incentives within the Satoshi Plus consensus mechanism. Here is an expanded view on how these mitigations are achieved for each potential attack vector.
36
+
Core employs a robust security architecture to mitigate potential threats, integrating both technological safeguards and economic incentives within the Satoshi Plus consensus mechanism. Here is an expanded view on how these mitigations are achieved for each potential attack vector.
37
37
38
38
### Double Spending Attacks
39
39
-**Description:** Double spending involves an attacker attempting to spend the same digital currency twice.
@@ -44,23 +44,23 @@ The Core Chain employs a robust security architecture to mitigate potential thre
44
44
### 51% Attacks
45
45
-**Description:** These attacks occur when a single entity gains control of more than half of the network's computational power or staking capacity.
46
46
-**Mitigation Achieved By:**
47
-
-**Decentralized Validator Base:** By requiring validators to be backed by substantial staking and hashing contributions, the system ensures a broad distribution of control, diluting the power any single miner or group might have.
47
+
-**Decentralized Validator Base:** By requiring validators to be backed by substantial staking and hashing contributions, the system assigns a broad distribution of control, diluting the power any single miner or group might have.
48
48
-**Economic Disincentives:** The cost associated with acquiring sufficient resources to control more than half of both mining and staking aspects of the network makes such attacks economically disadvantageous.
49
49
50
50
### Sybil Attacks
51
51
-**Description:** An attacker creates numerous fake identities to gain disproportionate influence over the network.
52
52
-**Mitigation Achieved By:**
53
53
-**Economic Barriers:** Staking and mining requirements introduce significant financial barriers to entry, discouraging the proliferation of false identities as each must be backed by substantial real resources.
54
-
-**Identity Verification via Staking and Mining:** Validators are known entities that must continuously prove their commitment through ongoing mining and staking, ensuring only genuine participants control the network.
54
+
-**Identity Verification via Staking and Mining:** Validators are known entities that must continuously prove their commitment through ongoing mining and staking, so only genuine participants control the network.
55
55
56
56
### Long-Range Attacks
57
57
-**Description:** Attackers attempt to revert the blockchain to a previous state by building an alternative chain from a past point.
58
58
-**Mitigation Achieved By:**
59
-
-**Checkpointing:** Core Chain implements periodic checkpointing where the state of the blockchain at certain intervals is solidified, preventing reversion past these points.
59
+
-**Checkpointing:** Core implements periodic checkpointing where the state of the blockchain at certain intervals is solidified, preventing reversion past these points.
60
60
-**Finality Mechanism:** The blockchain employs mechanisms that confer finality on blocks after a certain number of confirmations, making it impossible to alter the chain’s history beyond these confirmed blocks.
61
61
62
62
### Economic Incentive Alignment
63
-
-**Description:**Ensuring all network participants are economically incentivized to act in the network's best interest.
63
+
-**Description:**All network participants are economically incentivized to act in the network's best interest.
64
64
-**Mitigation Achieved By:**
65
65
-**Reward Distribution:** Miners, stakers, and validators receive rewards that correlate with their contribution to network security, aligning their economic incentives with the overall health and security of the blockchain.
66
66
-**Penalties for Dishonest Behavior:** Validators and miners stand to lose their stakes or future earning potential if found to be acting maliciously, adding a layer of financial deterrence against misconduct.
@@ -69,14 +69,14 @@ The Core Chain employs a robust security architecture to mitigate potential thre
69
69
-**Description:** These involve exploiting the governance mechanism to pass unfavorable or malicious proposals.
70
70
-**Mitigation Achieved By:**
71
71
-**Broad Consensus Requirements:** Proposals require broad consensus across a diverse set of stakeholders, minimizing the risk that a small, concentrated group can unilaterally affect changes.
72
-
-**Transparent Proposal and Voting Process:** All governance actions are recorded transparently on the blockchain, ensuring traceability and accountability.
72
+
-**Transparent Proposal and Voting Process:** All governance actions are recorded transparently on the blockchain, fascilitating traceability and accountability.
73
73
74
74
### Smart Contract Vulnerabilities
75
75
-**Description:** Vulnerabilities in smart contract code can be exploited to conduct thefts or manipulate services.
76
76
-**Mitigation Achieved By:**
77
77
-**Code Audits and Security Reviews:** Regular and thorough audits of smart contract code by independent security firms help identify and rectify potential vulnerabilities.
78
-
-**Bug Bounty Programs:** Encouraging the community and security researchers to find and report bugs ensures that many potential exploits are caught early by offering rewards for their discovery.
78
+
-**Bug Bounty Programs:** Encouraging the community and security researchers to find and report bugs, so that many potential exploits are caught early by offering rewards for their discovery.
79
79
80
80
81
81
## Conclusion
82
-
Core Chain's security strategy is deeply integrated with its unique consensus mechanism, Satoshi Plus, which leverages the strengths of both Bitcoin's mining capabilities and the staking mechanisms prevalent in modern blockchains. Furthermore, Core Chain's security strategy is multi-faceted, addressing potential vulnerabilities through technical safeguards, economic incentives, and community-driven processes. This comprehensive approach not only enhances the resilience of the network against attacks but also fosters a robust ecosystem where stakeholders are motivated to maintain and protect the network's integrity. As Core Chain continues to develop and integrate new features, its foundational focus on security remains a critical component in its design and operation, ensuring that it remains a secure and trustworthy platform for users and developers alike.
82
+
Core's security strategy is deeply integrated with its unique consensus mechanism, Satoshi Plus, which leverages the strengths of both Bitcoin's mining capabilities and the staking mechanisms prevalent in modern blockchains. Furthermore, Core's security strategy is multi-faceted, addressing potential vulnerabilities through technical safeguards, economic incentives, and community-driven processes. This comprehensive approach not only enhances the resilience of the network against attacks but also fosters a robust ecosystem where stakeholders are motivated to maintain and protect the network's integrity. As Core continues to develop and integrate new features, its foundational focus on security remains a critical component in its design and operation, so that it remains a secure and trustworthy platform for users and developers alike.
0 commit comments