ZC-1's BFT implementation defends against various malicious behaviors and attack strategies:
🕳️ Double Spending Attack
Malicious validators attempt to approve conflicting transactions spending the same funds to different recipients.
🛡️ Defense: Cryptographic Commitments
Two-phase voting with cryptographic commitments prevents double-spending by requiring 2/3+ validator agreement before finalization.
🔀 Equivocation Attack
Byzantine nodes send different messages to different honest nodes, attempting to split the network's view.
🛡️ Defense: Message Authentication
All messages are digitally signed and broadcasted to all validators, making equivocation detectable and punishable.
⏰ Timing Attack
Malicious validators manipulate message timing to cause honest nodes to make decisions based on incomplete information.
🛡️ Defense: Timeout Mechanisms
Adaptive timeout periods and view change protocols ensure progress even under timing attacks or network delays.
👥 Collusion Attack
Multiple Byzantine validators coordinate their actions to maximize disruption or attempt to break consensus.
🛡️ Defense: Stake Distribution
Economic incentives and stake slashing make collusion expensive while VRF prevents coordinated proposer selection.