Checkpoints as a Service
Due to NestBFT's Verifiable Delay Function mechanism, Canopy is uniquely resilient to Long-Range-Attacks.
You can learn more about Long-Range Attacks in the Canopy white paper.
Canopy extends this security to its Nested chains through decentralized checkpointing.
Where:
While nested or
After independence (not recommended)
Chains may utilize a Canopy root to publish succinct cryptographic proofs of blocks of the chain β enabling proper 'fork-choice' selection when under attack.
The core feature of being a decentralized 'checkpointing-as-a-service' provider...
Enhances Canopy chain security by offering decentralized access to critical information
Helps thwart Long-Range Attacks by ensuring chains can verify past states
Enables subjectivity even under adversarial conditions, preventing attackers from rewriting history
When a chain goes independent, checkpoints may be exported at their convenience to move to another provider or method. π€ Chains are never locked with Canopy, and history is always preserved.
Last updated