Galobank in English

How does the PoA protocol work?

How does the PoA protocol work? #

The operation of the PoA protocol is quite simple. First of all, it is required to choose validators randomly in order for the system to work. The inclusion and selection of nodes is possible thanks to a voting system of other previously authorized nodes. This way, it prevents malicious nodes from being included and affecting the operation of the network.

In addition to this, each validator can sign just one block of a series of consecutive blocks during their validation turn. Additionally, PoA does not require a mining scheme like Bitcoin, so it is very eco-friendly.

Use of identity and reputation #

As in PoS, where participation is used as a measure of selection and trust within the network, PoA makes use of identity and reputation. The identity of an individual or institution is limited, and its reputation is really valuable. Its use within the protocol means that the validator must reveal the identity on a voluntary basis.

By making this information public, it is easy to establish responsibilities in the operation of the blockchain. Any act that threatens the reliability and transparency of the network falls directly on that individual or institution, which can undermine or destroy their reputation everywhere.

This way, the validators of a blockchain using the PoA protocol will take care of their reputation and identity. And this is why they will ensure the proper functioning, transparency and reliability of its operation. In this sense, the identity put at stake can serve as a great equalizer, understood and valued by all participants. Individuals or institutions whose identity is at stake will feel encouraged to preserve the network

PoA operating conditions #

PoA operating conditions. The operating conditions of PoA are the steps required to comply with the protocol. We can highlight the following:

Powered by BetterDocs