Peer-To-Peer Security
Last updated
Last updated
Canopy Network's stack is recursive and self-reinforcing in nature:
New chains config a Security Root chain that alleviates the cold start problem of L1s by:
Utilizing the Total Locked Value (TLV) to prevent hostile takeover
Provides interconnection with its ecosystem
Lends its diverse validator set for decentralization
Enables instant liquidity through token swaps to chains outside of the ecosystem
Cross populate tokens through block rewards
Once matured or independent, they become security roots to seed the next generation:
See point 1 ⚡️
This stack adopts the ease of Ethereum's dApp model but couples it with the true independence of a L0 and fortifies the security mesh with each new blockchain that is added.
Hint: Because Canopy enables a mesh of L0 peers - this design addresses the Monolith problem too!