Polkadot — An Early In-Depth Analysis — Part Three— Limitations and Issues

Security

Validity Check 1 — Security of assigned validators to each parachain

Validity Check 2 — Fishermen

https://www.youtube.com/watch?v=xBfC6uTjvbM&feature=youtu.be&t=1905

Validity Check 3 — Additional checks performed by a few randomly and privately assigned validators

Cost to attack in Polkadot

https://polkadot.js.org/apps/#/staking/targets

Shared State and Shared Safety Assumptions

Censorship Attacks and Front Running

https://github.com/paritytech/polkadot/issues/1348

Interoperability

Conclusion

--

--

--

DLT Enthusiast and Writer. Interoperability is key for DLT to achieve its true potential. Avalanche $AVAX, Injective Protocol $INJ and Quant $QNT

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Passwordless technology for better user experience

How Can IPR Holder Protect Intellectual Property Rights in Vietnam?

Can You Cheat Online Casinos

Can You Cheat Online Casinos

How Indians lost their online & offline privacy?

We don’t want you to put off your learning until it’s too late.

Android Pentesting Lab — Android Studio

The Path to Software Security

{UPDATE} Futoshiki puzzle Hack Free Resources Generator

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Seq

Seq

DLT Enthusiast and Writer. Interoperability is key for DLT to achieve its true potential. Avalanche $AVAX, Injective Protocol $INJ and Quant $QNT

More from Medium

Scalability and interoperability = Astar Network

Acala Ecosystem Update — January 2022

Gauntlet and Acala Extend Partnership for Polkadot Launch

Polkadot — a dive into the architecture of Dot-Sama.