If you like Hyve, give us a follow on X
Protocol
Security
Slashing Rules
Overview

Slashing Overview

Hyve is a completely permissionless data availability layer, which means that anyone can join the network and start providing data availability attestations. Instead of relying on a consensus mechanism, Hyve utilizes cryptographic proofs and precise slashing rules to ensure all nodes are disincentivized from behaving in an adversarial way.

This documentation will go into the slashing rules that Hyve will employ. The documentation of the exact implementation on-chain in Symbiotic and off-chain in Hyve software will be released soon as well.

Slashing rules

The slashing rules in Hyve are designed to create strong economic incentives that encourage honest behavior among nodes. By leveraging principles of game theory, the slashing mechanism ensures that acting honestly is the most rational strategy for nodes, deterring adversarial behavior. These rules are applied across two key phases of the data availability process:

  1. DA Attestation: in the attestation phase, nodes follow rules to make attestations for a chunk of data. We are currently in the advanced stages of researching and finalizing the slashing mechanism for data attestation. Our goal is to ensure that the solution we implement is both secure and effective in maintaining the integrity of the network. Updates on this development will be provided soon.
  2. Data retrieval: in the data retrieval phase, nodes should return the data that they attested for earlier.