Update assumptions.md
This commit is contained in:
parent
26942d7edb
commit
c2c50b3326
|
@ -88,7 +88,8 @@ proposal and a DAO that offsets operational costs and rewards operators.
|
|||
This should go without saying - in the context of a single node, we assume that an adversary cannot read or write host
|
||||
memory, execute code, or otherwise compromise the running host operating system or platform while or after the node is
|
||||
running. If a supermajority of nodes is compromised, an attacker can produce arbitrary VAAs. If a superminority of nodes
|
||||
is compromised, the network may temporarily lose consensus (there's no way to intentionally void a guardian key).
|
||||
is compromised, the network may temporarily lose consensus (there's no way to intentionally void a guardian key or
|
||||
prevent it from being replaced by the supermajority).
|
||||
|
||||
Contrary to popular belief, hardware security modules do _not_ significantly change the risks associated with host
|
||||
compromise when dealing with cryptocurrency keys. A compromised host could easily abuse the HSM as a signing oracle,
|
||||
|
|
Loading…
Reference in New Issue