OpenLayer
  • Introduction
    • About OpenLayer
    • Our Mission
    • Our Approach
      • Foundations
        • OpenNodes
        • Restaking
        • Validation services
          • What is OVC
          • How is it done
          • Why is it better
        • Infrastructure
      • Modular Design
        • Modular data source
        • Modular source of security
        • Modular validation
        • Modular data transformation
        • Modular interoperability
      • Lifecycle of a Request
  • Data Validation Light Paper
  • OpenLayer AVS
    • Why Data Layer
    • How OpenLayer Works
    • Crypto Security
      • Websession proofs
      • Parser execution
    • End User Participation
    • On Demand Security
    • Multi Token Staking
    • Zero Bridging Solutions
  • For Node Operators
  • For Developers
    • Public Data Streams
    • VRF (Verifiable Randomness)
    • User Personal Data Proving
  • Privacy Policy
Powered by GitBook
On this page
  1. OpenLayer AVS

Crypto Security

To make sure that OpenLayer's data is authentic, in addition to CryptoEconomic security harnessed from Restaking, actual crypto security is also needed to make sure that every operator could be evaluated objectively against their reports and not have the protocol susceptible to the need of social network consensus or trusted authorities.

This makes sure that when operators follow what they are supposed to do, their assets are 100% safe, and when they act maliciously, they will 100% be slashed.

PreviousHow OpenLayer WorksNextWebsession proofs

Last updated 11 months ago