-
Notifications
You must be signed in to change notification settings - Fork 336
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. Weβll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ePBS breakout room #2 #1060
Comments
If time permits, I'd love to chat about the current status of (block, slot) fork choice analysis for ePBS. As analysis done in these documents:
Besides the current post-anti and ex-anti analysis of two slots sandwich attacks, what other analysis/attack is worth studying over. One example is multi-slot liveness attack. As the performance of network conditions becomes worse, chain growth stops completely if block latency is > 3 seconds. Whether a backoff scheme is necessary to facilitate chain progression during periods of extended latency |
@potuz |
Lol copied from a different issue :) |
If there's time (writing here mostly for the next breakout) I'd like to brainstorm how an "off-protocol" solution actually would play out. It seems to me that ePBS makes any out of protocol solution very very hard to be viable. |
I wrote a post today on out-of-protocol timelines under ePBS: https://hackmd.io/@ttsao/comp_epbs_timelines. It's the worst of both worlds. |
Call notes https://hackmd.io/@ttsao/epbs-breakout2 |
Was the call recorded? Can you share the recording @timbeiko |
Recording: https://youtu.be/w7Wa6oprEhQ Please refer ePBS Playlist for other meetings. |
Thanks @poojaranjan! |
Agenda
The text was updated successfully, but these errors were encountered: