Happy Wednesday & welcome to this week’s #fromtheArKYVE ✨
This week, we’re taking a closer look at @KYVENetwork's recently launched protocol update & how users now MUST have new $KYVE tokens to use the network. Follow along ⬇️
In order to vote on proposals and participate in the @KYVENetwork, one needs voting power, which is only issued via delegation.
Through the new update, the KYVE team has worked to improve and further secure delegation in the network.
Before the update, if one delegated to a node and that node was slashed in the network, the delegation delegated to the node would also be slashed.
This was not ideal because we wanted the delegation to be as risk-free as possible.
So to make delegation a completely risk-free affair, we introduced the idea of ✨ voting power ✨
After users set up their node, they need to get voting power via delegation to participate in the network. But they need to run their node first.
Some tips on how to run a node ⬇️
Now there are up to 50 nodes instead of 20. Users now need a new $KYVE testnet token.
Make sure that you add it to Metamask and claim it from the faucet with one click here: app.kyve.network/faucet
To run a node, users need $AR tokens. The KYVE team recommends 0.5 $AR.
You can get 0.02 $AR for free from the Arweave faucet here: faucet.arweave.net
For a detailed guide on how exactly to start a node, be sure to check out our documentation ⬇️
Introducing #fromtheArKYVE, a new series where the KYVE team will break down different aspects of the KYVE network & answer questions about decentralized data storage 🌐
This week, we’re diving into what it means to store data with in-built validation 🧵⬇️
Before we get into the technicalities, let’s take a step back and define what data validation & why it’s important.
Data validation, at a high level, refers to the process of checking the accuracy & quality of data before using or importing it elsewhere.
Why do we validate data?
The gathering, organization & distribution of data is extremely critical to all systems around us. But data collection is also vulnerable to manipulation. Malicious actors could tamper with data, compromising their integrity & accuracy in the process.