2.3.2 Security in the Decentralized Network

  • Node Validation: Each user-owned machine in our decentralized network undergoes a rigorous validation process to ensure it meets our security standards before joining the network.

  • Isolated Execution Environments: Computational tasks on decentralized machines are executed in isolated environments to prevent any potential security breaches from affecting the rest of the network or the host machine.

  • Continuous Monitoring: The decentralized network is continuously monitored for unusual activities or potential threats, with automated systems in place to swiftly respond to any security incidents.

Last updated