OpenLayer
  • Introduction
    • About OpenLayer
    • Our Mission
    • Our Approach
      • Foundations
        • OpenNodes
        • Restaking
        • Validation services
          • What is OVC
          • How is it done
          • Why is it better
        • Infrastructure
      • Modular Design
        • Modular data source
        • Modular source of security
        • Modular validation
        • Modular data transformation
        • Modular interoperability
      • Lifecycle of a Request
  • Data Validation Light Paper
  • OpenLayer AVS
    • Why Data Layer
    • How OpenLayer Works
    • Crypto Security
      • Websession proofs
      • Parser execution
    • End User Participation
    • On Demand Security
    • Multi Token Staking
    • Zero Bridging Solutions
  • For Node Operators
  • For Developers
    • Public Data Streams
    • VRF (Verifiable Randomness)
    • User Personal Data Proving
  • Privacy Policy
Powered by GitBook
On this page
  1. Introduction
  2. Our Approach
  3. Foundations

OpenNodes

Operators for OpenLayer provides the basis of functionality and scalability.

Traditionally when operators or node operators are brought up, we mean only those heavy bare metals, high end machines and significant upfront capital deployment. This was usually due to two things:

  • Hardware requirements for performing the required node executions efficiently

  • Tighter control is needed as the system builds on roughly social consensus and more upfront capital provides more weights and confidence

The result though, is that end users can hardly participate except for delegating their own money to someone else (as in liquid staking protocols). They will need to trust the delegates with their correct execution and also share the APY.

OpenNodes breaks this barrier and brings every user into the system. Our modular system supports various types of tasks, which all have different hardware requirements. Accordingly, different types of operators in the network will be recruited to complete the requests. This could be traditional validators, or a browser extension, or phones and tablets. They will participate in task types that are most suitable to their hardware spec and yield best return.

PreviousFoundationsNextRestaking

Last updated 9 months ago