• type of attacks involving malicious behavior
  • in proof of stake consensus
  • where a validator signs two different blocks at the same block height
  • effectively supporting multiple forks of the blockchain
  • this can compromise the liveness and security of the network
  • by creating conflicting versions of the blockchain
  • to prevent and mitigate consensus implement measures such as double sign protection