bitcoin
bitcoin

$95104.797964 USD

2.19%

ethereum
ethereum

$3291.059953 USD

0.88%

tether
tether

$1.000012 USD

0.01%

xrp
xrp

$2.332336 USD

0.92%

bnb
bnb

$697.122210 USD

1.19%

solana
solana

$190.229113 USD

0.78%

dogecoin
dogecoin

$0.333852 USD

3.17%

usd-coin
usd-coin

$1.000052 USD

0.00%

cardano
cardano

$0.939751 USD

2.20%

tron
tron

$0.243557 USD

0.42%

sui
sui

$5.163519 USD

8.60%

avalanche
avalanche

$36.854429 USD

0.51%

toncoin
toncoin

$5.298149 USD

1.56%

chainlink
chainlink

$20.237285 USD

1.94%

shiba-inu
shiba-inu

$0.000022 USD

0.49%

加密貨幣新聞文章

驗證者在區塊鏈中的作用

2025/01/10 20:29

驗證者是負責保護網路、處理交易和維護 PoS 區塊鏈完整性的實體。

驗證者在區塊鏈中的作用

In proof-of-stake (PoS) blockchains, validators are the key entities responsible for ensuring the smooth operation of the network. These nodes process transactions, secure the blockchain and add new blocks. Unlike proof-of-work (PoW) systems like the Bitcoin blockchain, where miners solve complex mathematical problems to validate transactions, PoS relies on validators who stake cryptocurrency as collateral.

在權益證明(PoS)區塊鏈中,驗證者是負責確保網路平穩運作的關鍵實體。這些節點處理交易、保護區塊鏈並添加新區塊。與比特幣區塊鏈等工作量證明 (PoW) 系統不同,在比特幣區塊鏈中,礦工解決複雜的數學問題來驗證交易,而 PoS 依賴於將加密貨幣作為抵押品的驗證者。

Validators perform multiple critical functions within a PoS blockchain. They validate transactions to ensure they are legitimate, preventing fraudulent activities like double-spending. Additionally, they propose and finalize new blocks, contributing to the blockchain’s continuity and integrity. Validators also play a key role in the consensus protocol, where they collaborate to agree on the network's current state, maintaining its decentralized structure. By staking assets, validators help secure the network, making it resilient to attacks and ensuring its overall reliability.

驗證器在 PoS 區塊鏈中執行多個關鍵功能。他們驗證交易以確保其合法性,防止雙重支出等詐欺活動。此外,他們提出並最終確定新的區塊,有助於區塊鏈的連續性和完整性。驗證者在共識協議中也發揮關鍵作用,他們在其中合作就網路的當前狀態達成一致,維持其去中心化結構。透過抵押資產,驗證器有助於保護網絡,使其能夠抵禦攻擊並確保其整體可靠性。

Decentralization of validators ensures fairness, resilience and censorship resistance in blockchain networks.

驗證者的去中心化確保了區塊鏈網路的公平性、彈性和抗審查性。

Decentralization is a cornerstone of blockchain technology and is especially vital for validators in a PoS system. When power is distributed across many validators, the network becomes more resilient against attacks and disruptions. This distribution also ensures equity, preventing any single entity from gaining disproportionate influence.

去中心化是區塊鏈技術的基石,對於 PoS 系統中的驗證者尤其重要。當權力分佈在許多驗證器上時,網路對攻擊和中斷的抵抗力就會變得更強。這種分配也確保了公平,防止任何單一實體獲得不成比例的影響力。

Decentralized networks are harder to regulate or sanction, enhancing their resistance to censorship and political interference. By avoiding validator centralization, blockchains maintain their integrity and trustworthiness, safeguarding the principles of a trustless ecosystem.

去中心化網路更難監管或製裁,從而增強了它們對審查和政治幹預的抵抗力。透過避免驗證者集中化,區塊鏈可以保持其完整性和可信度,從而維護去信任生態系統的原則。

Several factors, such as reliance on a single client, stake concentration or infrastructure dependence, can lead to validator centralization.

有幾個因素,例如對單一客戶端的依賴、權益集中或基礎設施依賴,可能會導致驗證者集中化。

Despite the emphasis on decentralization, various factors can lead to validator centralization. A significant issue is validator client homogeneity, where most validators rely on the same software. This creates systemic risks if the software is exploited.

儘管強調去中心化,但各種因素都可能導致驗證者中心化。一個重要的問題是驗證器客戶端的同質性,大多數驗證器依賴相同的軟體。如果該軟體被利用,就會產生系統性風險。

Stake weights are another factor, as a few entities controlling a significant portion of the total stake may wield disproportionate influence over the network. Geographic concentration can also be problematic, making the network vulnerable to localized disruptions or regulatory pressures.

股權權重是另一個因素,因為控制總股權很大一部分的少數實體可能會對網路產生不成比例的影響。地理集中也可能有問題,使網路容易受到局部中斷或監管壓力的影響。

Additionally, reliance on major cloud providers like AWS or Google Cloud introduces potential single points of failure. High barriers to entry for new validators, such as expensive hardware or complex setups, can further exacerbate centralization, limiting the diversity of participants.

此外,對 AWS 或 Google Cloud 等主要雲端供應商的依賴會帶來潛在的單點故障。新驗證者的進入門檻很高,例如昂貴的硬體或複雜的設置,可能會進一步加劇中心化,限制參與者的多樣性。

Centralized sequencers used between layer-1 and layer-2 chains are other vectors of centralization. Finally, centralization may occur through maximum extractable value (MEV), where a number of actors within the transaction supply chain can collude and decide how and when transactions are created in a blockchain.

在第 1 層和第 2 層鏈之間使用的集中定序器是集中化的其他載體。最後,集中化可能透過最大可提取價值(MEV)實現,交易供應鏈中的許多參與者可以串通並決定如何以及何時在區塊鏈中創建交易。

Compromised validators can lead to network downtime, financial losses and erosion of trust in the blockchain.

受損的驗證器可能會導致網路停機、財務損失以及對區塊鏈信任的侵蝕。

Validators face multiple threats that can compromise their operations. Key theft is one of the most direct vectors, where attackers steal private keys to sign fraudulent transactions or double-spend funds.

驗證者面臨多種威脅,這些威脅可能會損害其操作。金鑰盜竊是最直接的媒介之一,攻擊者竊取私鑰來簽署詐欺交易或雙花資金。

Bugs in validator software are another risk, as exploits can disrupt operations or threaten the network’s integrity. Infrastructure attacks, like distributed denial-of-service (DDoS) attacks or breaches of cloud services, can take validators offline.

驗證器軟體中的錯誤是另一個風險,因為漏洞利用可能會中斷操作或威脅網路的完整性。基礎設施攻擊,例如分散式阻斷服務 (DDoS) 攻擊或雲端服務破壞,可能會使驗證器離線。

Validators may also collude to manipulate the network, censor transactions or conduct a 51% attack. Regulatory pressure is another concern, as governments could coerce validators to enforce censorship or surveillance.

驗證者也可能串通操縱網路、審查交易或進行 51% 攻擊。監管壓力是另一個問題,因為政府可以強迫驗證者執行審查或監視。

The repercussions of such compromises include slower transaction processing, temporary network halts, financial losses and a loss of trust among users.

此類妥協的後果包括交易處理速度變慢、網路暫時停止、財務損失以及用戶之間失去信任。

The Hyperliquid Protocol faced challenges from validator centralization, highlighting vulnerabilities in its network structure.

超液體協定面臨驗證者中心化的挑戰,凸顯其網路結構中的漏洞。

Hyperliquid Protocol, a blockchain project that focused on offering a trading platform to users, encountered significant challenges related to validator centralization. Reports revealed that the blockchain ran on four validators that relied on the same client software and heavily depended on a single cloud provider for infrastructure. Additionally, a few large staking pools controlled the majority of the protocol’s stake.

Hyperliquid Protocol 是一個專注於為用戶提供交易平台的區塊鏈項目,並遇到了與驗證器中心化相關的重大挑戰。報告顯示,區塊鏈運行在四個驗證器上,這些驗證器依賴相同的客戶端軟體,並且嚴重依賴單一雲端供應商的基礎設施。此外,一些大型權益池控制了該協議的大部分權益。

These factors made the network vulnerable to disruptions as the bridge between the Hyperliquid platform and Arbitrum experienced downtime. This incident led to transaction delays of over four hours, and user funds had to be kept locked on the platform to prevent any hacking incidents. Concerns were also raised about governance, with dominant staking pools having the ability to veto proposals, undermining decentralization.

由於 Hyperliquid 平台和 Arbitrum 之間的橋樑出現停機,這些因素使得網路容易受到干擾。這次事件導致交易延遲四個多小時,用戶資金必須鎖定在平台上,以防止駭客事件發生。人們也對治理提出了擔憂,因為主導的權益池有能力否決提案,從而破壞了權力下放。

Intelligence reports identified suspicious activity by North Korean actors targeting validator nodes, exploiting known vulnerabilities in the client software and cloud setups. It involved attempts to gain control over multiple validators simultaneously, which could have compromised the network’s consensus mechanism. While the attack was mitigated in time, it caused panic in the market, leading to a decline in HYPE’s price (native token of the protocol) by over 30% within 24 hours. The transaction value locked (TVL) on the chain was over $2.7 billion at the time of this incident. The threat also sparked widespread debate about the protocol’s security practices and reliance on centralized infrastructure.

情報報告發現北韓行為者利用客戶端軟體和雲端設定中的已知漏洞,針對驗證器節點進行可疑活動。它涉及同時嘗試控制多個驗證器,這可能會損害網路的共識機制。雖然攻擊得到及時緩解,但引起了市場恐慌,導致 HYPE 價格(協議原生代幣)在 24 小時內下跌超過 30%。此次事件發生時,鏈上鎖定的交易價值(TVL)超過 27 億美元。這項威脅也引發了有關該協議的安全實踐和對中心化基礎設施依賴的廣泛爭論。

In response, the Hyperliquid team took immediate actions, including patching software vulnerabilities, collaborating with cybersecurity firms and transitioning some validators to more diverse and decentralized infrastructures. They also implemented enhanced monitoring systems to proactively detect and respond to similar threats.

作為回應,Hyperliquid 團隊立即採取了行動,包括修補軟體漏洞、與網路安全公司合作以及將一些驗證器過渡到更加多樣化和去中心化的基礎設施。他們還實施了增強的監控系統,以主動偵測和回應類似的威脅。

新聞來源:www.tradingview.com

免責聲明:info@kdj.com

The information provided is not trading advice. kdj.com does not assume any responsibility for any investments made based on the information provided in this article. Cryptocurrencies are highly volatile and it is highly recommended that you invest with caution after thorough research!

If you believe that the content used on this website infringes your copyright, please contact us immediately (info@kdj.com) and we will delete it promptly.

2025年01月11日 其他文章發表於