type of cyber/attacks involving malicious behavior

in proof of stake consensus

where a validator signs two different blocks at the same block height

effectively supporting multiple forks of the blockchain

this can compromise the liveness and security of the network

by creating conflicting versions of the blockchain

to prevent and mitigate consensus implement measures such as double sign protection

Local Graph