Validators

Secure the Tenzro network and earn rewards by becoming a validator.

Validators

Validators in the Tenzro ecosystem operate in a two-tier system, securing the network through a combination of hardware-based validation and staking requirements. Using the Proof of Authenticity consensus mechanism, validators must both maintain substantial TUXT token stakes and provide hardware verification to participate in network validation.

Validator Tiers

Territory Validators

  • Staking Requirement: Base tier staking requirement of TUXT tokens
  • Hardware Level: Aggregator Node type or higher
  • Role: Regional transaction validation and territory management
  • Responsibilities:
    • Cross-Datachain transaction validation
    • Territory resource management
    • Regional consensus maintenance
    • Asset transfer verification
  • Rewards:
    • Base dividend from territory transaction fees
    • Performance-based rewards
    • Territory-level participation rewards

Global Validators

  • Staking Requirement: Higher tier staking requirement (multiple of Territory requirement)
  • Hardware Level: Training Node type or higher
  • Role: Global ledger maintenance and cross-territory coordination
  • Responsibilities:
    • Cross-Territory synchronization
    • External blockchain anchoring
    • Global consensus management
    • Interoperability bridge validation
  • Rewards:
    • Enhanced dividend rate from global network fees
    • Global coordination bonuses
    • Interoperability bridge fees
    • Special protocol rewards

Hardware Requirements

Mandatory Security Features

  • Trusted Platform Module (TPM) 2.0
  • Trusted Execution Environment (TEE)
  • Secure Enclave
  • Hardware Root of Trust

Minimum Specifications

Territory Validators

  • CPU: 8+ cores
  • RAM: 16GB minimum
  • Storage: 500GB SSD
  • Network: 100+ Mbps
  • Uptime: 99.5% minimum

Global Validators

  • CPU: 16+ cores
  • RAM: 32GB minimum
  • Storage: 1TB SSD
  • Network: 1Gbps dedicated
  • Uptime: 99.9% minimum

Staking and Rewards

Staking Mechanism

  • Lock Period: Minimum staking duration required
  • Slashing Conditions: Penalties for malicious behavior or extended downtime
  • Stake Adjustments: Ability to increase stake for enhanced rewards
  • Unstaking Period: Cool-down period before stake withdrawal

Reward Structure

  • Base Rewards: Regular dividend distributions from network fees
  • Performance Incentives: Additional rewards for maintaining high uptime
  • Territory/Global Bonuses: Tier-specific reward multipliers
  • Special Protocol Rewards: Additional earnings from specific network services

Validation Process

Hardware Verification

  1. Initial Authentication

    • Hardware security feature verification
    • TPM attestation
    • Secure key generation
    • Identity establishment
  2. Continuous Monitoring

    • Real-time security status checks
    • Hardware health monitoring
    • Performance metrics tracking
    • Security patch verification

Transaction Validation

  1. Local Validation

    • Hardware-based signature verification
    • Transaction integrity checks
    • Fee-free processing
    • Real-time confirmation
  2. Territory-Level Validation

    • Cross-Datachain verification
    • Territory consensus achievement
    • Resource allocation monitoring
    • Regional synchronization
  3. Global Validation

    • Cross-Territory coordination
    • External blockchain anchoring
    • Global state maintenance
    • Interoperability management

Becoming a Validator

Prerequisites

  1. Token Requirements

    • Acquire required TUXT tokens
    • Complete stake lock-up
    • Maintain minimum balance
  2. Hardware Setup

    • Meet minimum specifications
    • Install security features
    • Configure network settings
  3. Node Configuration

    • Install Tenzro Node Service
    • Configure validator settings
    • Complete security verification

Maintenance Requirements

  • Regular Updates: Keep software and security patches current
  • Performance Monitoring: Maintain required uptime and performance metrics
  • Stake Management: Monitor and maintain staking requirements
  • Security Compliance: Adhere to network security protocols

Risk Management

Security Measures

  • Multi-layer Security: Hardware and software security protocols
  • Continuous Monitoring: Real-time threat detection
  • Automated Responses: Immediate action on security events
  • Regular Audits: Security and performance assessments

Slashing Conditions

  • Downtime Penalties: Reduced rewards for missed validations
  • Security Breaches: Stake slashing for compromised systems
  • Malicious Behavior: Complete stake forfeiture for harmful actions
  • Performance Issues: Graduated penalties for under-performance

Support and Resources

  • Documentation: Comprehensive guides and technical specifications
  • Community Support: Validator community forums and chat
  • Technical Assistance: Direct support for critical issues
  • Training Materials: Best practices and optimization guides