LogoLogo
HomeDiscover WeSenditLanguage
  • WeSendit at a Glance
  • WeSendit Introduction
    • Meet the Team
    • WeSendit Token
    • Social Media
    • FAQ
  • Problem
  • Our Solution Strategy
  • Technology
  • WeSendit Token / Usecases
    • Access to Data Management and Administrative Functions
    • WSI Rewards for Data Sharing
    • Level Rank and NFT Rewards
    • Web3-Referral-System
    • Reward System for Node Operators
  • Data Protection at WeSendit: Core Principles and Innovations
  • Blockchain Integration
    • 👨‍💻Smart Contract
    • 🔎Contract Audit (Hacken)
  • Tokenomics
    • DEX & CEX Listings
    • Vesting Schedule
    • Token Burn Strategy
    • Token Allocation
  • Competitive Analysis
    • Market Situation and Developments
    • Market Segments and Target Audiences
    • Competitors
    • Market Success Factors
    • Summary and Outlook
  • Roadmap
    • WeSendit Roadmap: Detailed Outlook
      • Current Developments Q2 2024
      • A Glimpse into the Future: Our Exciting Roadmap for Q3/2024
    • Planned Feature Expansions and Foundational Activities Q3 & Q4 2024
    • AI Integration Planning and Development 2024-2026
  • Security Protocols and Privacy Measures in Web3
  • Comparative Analysis with Existing Web3 Storage Solutions
  • WeSendit Node Network
    • Preparation for Operation
    • The Multiplier
    • Functionality
      • Security and Redundancy
      • Encryption
      • Score and Rewards
      • Processes and Requirements
      • Network Schema
    • The Participants
      • Master Node
      • Node Balancer
      • Indexer
      • Storage Node
      • Blacklist
    • The Networks
      • Checknet
      • Testnet
      • Mainnet
    • Onboarding for Node Operators
      • Get a NodeNFT
      • Minimum Requirements
      • Installation Instructions
      • Operating Multiple Nodes
      • Troubleshooting
      • Install FAQ
    • FAQ
  • Terms of Service
    • Privacy Policy
    • WeSendit General Terms of Service
    • Node Presale Terms of Service
    • Legal Notice
Powered by GitBook
LogoLogo
On this page

Was this helpful?

  1. WeSendit Node Network
  2. The Participants

Blacklist

The blacklist checks reported data and conducts re-examinations to determine if the data has been altered. It aims to exclude technical modifications and old versions, helping to ensure that the stored files are unaltered and available in their current version.

If it is determined that a node has intentionally altered a file, the blacklist takes action. The stake of the affected node is reduced (slashed) and the node is permanently placed on the blacklist. These sanctions are designed to protect the network from fraudulent activities and ensure that only trustworthy nodes participate in the network.

The slashed stake is sent to the treasury. This mechanism creates incentives for node operators to adhere to the rules and operate their nodes properly.

It is important to note that the blacklist is not based on IP addresses but on hardware IDs and other combinations or metrics. This ensures that nodes cannot simply rejoin the network, reducing the possibility of an operator who is on the blacklist for misconduct circumventing the system by registering with new identities.

The decision to remove nodes from the blacklist rests with the CTO. Node operators who end up on the blacklist have the opportunity to request a personal review. This allows them to explain their case and potentially remove their node from the blacklist if they meet the required conditions and can restore trust in their integrity. In any case, when reinstated into the network, the data from the node is removed and the node is re-evaluated.

Overall, the blacklist plays a crucial role in maintaining data integrity and adherence to network rules in the WeSendit network. Through its actions, it protects the network from fraudulent activities and contributes to the security and trustworthiness of the system.

PreviousStorage NodeNextThe Networks

Last updated 1 year ago

Was this helpful?