What happens if nodes are malicious at Geeq?

By: Geeq  on Apr 15, 2024

The technical answer in one sentence: Nodes who do not follow protocol while building a block are easily identified because they will be unable to present the uniquely correct chain state view, which is a required step in the protocol as the next block is built.

Consequences for the Nodes

Dishonest nodes are automatically audited out of the active network. If a node becomes malicious while working on a public chain, it loses its Good Behavior Bond as well as its status as a paid contributor to the network.

In addition, users are given the ability to tell which nodes are honest and which are not.

Forewarned is forearmed: users are urged to count only on the services and information provided by honest nodes. Users can protect themselves by ignoring the data hosted by dishonest nodes. This protection applies equally to users of public and private chains.

Remarkably, dishonest nodes cannot find safety in numbers by slashing honest nodes and they cannot force an honest minority to accept the results of a majority vote.

Nodes who follow the pure logic of the protocol are the essential workers in a Geeq blockchain’s network. Even if they make up a small proportion of the network’s validators, they are the ones who methodically process transactions correctly and without bias. These are the nodes who preserve the integrity of the timeline for the rest of us and they are rewarded for it.

Wealth, authority, and influence have no place in Geeq networks because each node builds and maintains their own blockchain. Thus, dishonest nodes are helpless. They’re unable to make malicious changes to an honest node’s blockchain and, if they try, they expose themselves as untrustworthy.

Are there any Second Chances? Only if You’re Honest

To rejoin the network for a chain, a validator would have to re-initiate a different node which requires syncing with a provably correct blockchain. After the validator has achieved a ready state, it still must wait to be selected for the active network.

That’s a lot of trouble when the node already had a seat at the table, could have followed protocol, and earned fees for their honest work. There are no upsides to becoming a rogue node. Any user who runs the automatic software (also known as a user client, like an email client) is protected from a malicious node stealing their assets.

Conclusion

Geeq’s technology has gone to great lengths to protect users from dishonest nodes and adversarial network conditions. Compared to protocols where nodes have incentives to compete to extract value (MEV), Geeq is radically different:

  • The economic incentives of nodes are completely aligned with users who want correct and neutral services.
  • Regardless of nodes’ potential desires to change the system for selfish reasons, incorrect behavior is detected and punishment is enforced – automatically and within protocol.
  • By alerting users of malicious or untrustworthy nodes through their user client (an automatic piece of software, like an email client), malicious nodes cannot steal their assets or fool them into believing information that was incorrectly validated.

At Geeq, it pays to be honest. Nodes with bad intentions are better off elsewhere.

Interested in details about our token?

Join Us For a Chat

To learn more about Geeq™ follow us:

Website ~ Grab a Coffee ~ http://www.geeq.io/news/

Telegram ~ Join us for a chat ~ https://t.me/GeeqOfficial

Twitter ~ Keep up to date ~ https://twitter.com/GeeqOfficial

YouTube ~ Feast your eyes ~ https://www.youtube.com/c/GeeqOfficial