The blacklist checks reported data and conducts re-examinations to determine if the data has been altered. It aims to exclude technical modifications and old versions, helping to ensure that the stored files are unaltered and available in their current version.

If it is determined that a node has intentionally altered a file, the blacklist takes action. The stake of the affected node is reduced (slashed) and the node is permanently placed on the blacklist. These sanctions are designed to protect the network from fraudulent activities and ensure that only trustworthy nodes participate in the network.

The slashed stake is sent to the treasury. This mechanism creates incentives for node operators to adhere to the rules and operate their nodes properly.

It is important to note that the blacklist is not based on IP addresses but on hardware IDs and other combinations or metrics. This ensures that nodes cannot simply rejoin the network, reducing the possibility of an operator who is on the blacklist for misconduct circumventing the system by registering with new identities.

The decision to remove nodes from the blacklist rests with the CTO. Node operators who end up on the blacklist have the opportunity to request a personal review. This allows them to explain their case and potentially remove their node from the blacklist if they meet the required conditions and can restore trust in their integrity. In any case, when reinstated into the network, the data from the node is removed and the node is re-evaluated.

Overall, the blacklist plays a crucial role in maintaining data integrity and adherence to network rules in the WeSendit network. Through its actions, it protects the network from fraudulent activities and contributes to the security and trustworthiness of the system.

Last updated