Canopy Network Docs
  • 👋Welcome to Canopy
    • Overview
    • What is Canopy?
      • Introduction
      • Why Canopy?
        • Blockchain 101
        • Background
        • Industry State
        • Seeding the Future
        • Comparables
          • Ethereum
          • Tendermint
          • Polkadot
          • Avalanche
          • Rollups
      • Core Features
        • Peer-To-Peer Security
        • Progressive Sovereignty
        • Capital Efficient Restaking
        • Composable Architecture
        • One-Way Interoperability
        • Built-In Liquidity
        • Chain Halt Rescue
        • NestBFT
          • PoS Is Trusted
          • PoAge Is Trustless
          • VRF Leader Election
        • Checkpoints as a Service
        • United Governance
      • Tokenomics
        • CNPY
        • Staking
        • DAO Treasury Fund
        • Recursive Rewards
        • Subsidies
      • Who is Canopy for?
        • New Blockchains
        • Existing Ecosystems
        • Token Participants
    • How does Canopy work?
      • Utility
      • Consensus
      • P2P
      • State Machine
      • Storage
      • Specifications
        • CLI
        • RPC
        • Config
        • Governance Params
        • Nested Chain IDs
  • ⚒️Build
    • Build a new L1
      • Introduction
      • Building
        • Application
        • Governance
        • Testing
        • Upgrading
      • Governance
        • Straw Polling
        • Proposals
    • Connect an external chain
      • Introduction
      • Building
        • Connecting
        • Testing
        • Upgrading
      • Governance
        • Straw Polling
  • 👨‍💻Node Runner
    • Setup
    • Install
    • Configure
    • Manage
    • Debug
    • Validate
      • Get CNPY
      • Plugins Config
      • Stake
      • Manage
      • Slashing
    • Govern
  • 💪Participate
    • How To Get CNPY
    • What to do with CNPY
      • Manage
      • Earn
      • Subsidize
      • Govern
Powered by GitBook
On this page
  • Leader Selection in Consensus
  • Distributed Denial of Service Attacks
  • Grinding Attacks
  • NestBFT Leader Election
  1. Welcome to Canopy
  2. What is Canopy?
  3. Core Features
  4. NestBFT

VRF Leader Election

PreviousPoAge Is TrustlessNextCheckpoints as a Service

Last updated 1 month ago

Leader Selection in Consensus

In most Byzantine Fault Tolerant systems, a proposer is elected to produce the subsequent block in the chain. This function allows simplicity and minimized communication as the Validator Set decides on the contents of the next block.

→ However, if designed incorrectly — the network may be or tokens may be distributed unfairly, threatening the integrity and confidence of the entire system.

Distributed Denial of Service Attacks

💡A DDoS attack is a coordinated exploit where multiple sources overload a system by overwhelming a server with requests.

Performing a DDoS attack on a series of BFT leader would cause an extended non-liveness event for the chain — essentially halting the system.

An example of weak DDoS protection is any chain built with Tendermint / Cosmos SDK:

  • Utilizes Round-Robin Leader selection which makes future leaders predictable as long as the set remains constant.

  • Asks Validators to run 'Sentry Nodes' in front of any Validator to protect against this, but since Sentries also may be DDoS'd — this methodology is weakly effective at best.

Grinding Attacks

💡 A stake grinding attack (pre-computation attack) is an exploit where the current leader biases the future leader selection by modifying block contents or election parameters until they have a higher likelihood of being a future leader.

Executing a grinding attack on a blockchain system leads to significant bias in token distribution and control — effectively undermining the decentralization and fairness of the crypto-economy.

As many blockchains attempt to Randomness in the leader election to address attacks — they inadvertently cause another serious threat in Grinding Attacks:

  • NXT

  • Early Cardano

  • Pre-Merge Ethereum

NestBFT Leader Election

NestBFT implements a DDoS resistant and highly available leader selection algorithm that is immune to grinding attacks:

  • Mult-candidate

  • Stake-Weighted

  • Blind / reveal cycle

  • Non-biasable seed input

→ By combining simplicity with cryptographic integrity, this design enhances security and resilience in decentralized environments.

👋
DDoS
halted