2.3.2 Security in the Decentralized Network
Node Validation: Each user-owned machine in our decentralized network undergoes a rigorous validation process to ensure it meets our security standards before joining the network.
Isolated Execution Environments: Computational tasks on decentralized machines are executed in isolated environments to prevent any potential security breaches from affecting the rest of the network or the host machine.
Continuous Monitoring: The decentralized network is continuously monitored for unusual activities or potential threats, with automated systems in place to swiftly respond to any security incidents.
Last updated