OKTC is based on Tendermint and relies on a set of validators responsible for submitting blocks. These validators participate in the consensus protocol by broadcasting votes which contain cryptographic signatures signed by each validator’s private key.
Token holders can delegate staking rights through the “delegation” command, and select the validators that they think are meaningful to the ecosystem. These token holders are called delegators.
To have a look at a practical guide on how to become a delegator, please click here.
In OKTC, any user who has staked OKT tokens can add staking rights to target validators. Each user is allowed to add staking rights for up to 30 validator candidates using the full weight of their stake. For example, if a user has staked OKT, he has staking rights to share to up to 30 validators. The top 21 validators are determined by the total number of OKT staking rights gathered . Additional validators, ranked by their total number of OKT staked, are also compensated by the network to serve as validator candidates.
OKTC is implementing a delegative governance. Users have the option to add staking rights directly to the validators, but they can also delegate their staking rights to other accounts in order to allow others to participate in the POS protocol on their behalf. The delegated account, called a proxy, has no control over the original user’s account — the user can proxy his staking rights trustlessly without handing over any keys. The proxy has the power to use the delegated staking power towards certain validators, but the user can revoke this staking power from the proxy at any point of time.
In the proxy staking mechanism, there are two roles:
The weight of the number of staking rights reduces on a weekly basis (0:00 UTC time every Saturday). The ballot weights will be calculated using the following formula:
start_timestamp = 946684800 (ie 00:00:00 UTC on January 1, 2000)
weeks_per_year = 52
weight = (now_timestamp - start_timestamp) / (seconds_per_day * 7) / weeks_per_year
shares = delegated_tokens * 2^weight
The best staking management strategy consists in increasing the level of staking rights once a week to ensure that the staking powers held are always up to date.
OKTC has an automatic penalty mechanism on-chain, that is currently implemented for two types of behavior:
The best way to minimize the risk of theft or loss of OKT is to have a strong storage and backup strategy for your private keys. The safest way to store your keys is offline, either in a cryptocurrency hardware wallet or on any type of other device that you never connect to the internet. The best backup strategy for your keys is to ensure that you have multiple copies of them stored in a few safe places, and to take specific measures to protect at least one copy of your keys from any kind of natural disaster that could happen.
To protect your OKT, do not share your 12 words with anyone. The only person who should ever need to know them is you. You do not need to share your private keys if you’re delegating OKT to a validator on the network or to use custodial services.
To protect yourself and ensure you’re using the safest , you need use the latest version of softwares available, and to update them as soon as you can when new versions are released. This is important for your laptops, mobile devices, cryptocurrency wallets, and anything else that may be linked to your crypto-assets.
To protect your OKT, you should only download software directly from official sources, and make sure that you’re always using the latest and most secure version of exchaincli
when you’re performing any recovery involving your 12 words. The latest versions of Tendermint
, the OKTC-SDK
, and exchaincli
will always be available from our official Github repositories.
No one from OKTC, the Tendermint team or the Interchain Foundation will ever send an email that asks for you to download a software attachment after sending out a security advisory or making a patch available.
Be extra cautious when receiving advice that comes from people you do not know in forums and on group chat channels. Familiarize yourself with important commands, especially those that will help you carry out high-risk actions, and consult our official documentation to make sure that you’re not being tricked into doing something that will harm you or your validators.
When sending transactions or doing anything that may spend tokens, you should always verify those transactions before hitting send. While address strings are long, it is important to visually compare them in blocks of 4 characters at a time to ensure that you are sending them to the right address.
One of the most important things you can do to protect your cryptocurrency and to reduce risk is to highly protect all of your sensitive online accounts. Attackers will try to gain foothold wherever they can, and will use that foothold to pivot from one place to another. Unprotected accounts like email, social media, your Github account, the OKTC Forum and anything in between could give an attacker opportunities to access and steal your data.
For people who hold cryptocurrency, there are two specific account security actions that can be taken to reduce specific risks that come with being part of the blockchain world.
First, it is important to enable 2-factor authentication everywhere you can, and to make sure that you are using a code generator or U2F hardware key as a second factor.
Second, be mindful of account recovery methods used to regain access to your most important accounts and make sure that you do not use SMS as a recovery method. If you haven’t done so yet, start using an authenticator app or a hardware key immediately for your personal email account and anything else you use to manage and store your tokens, especially if you use online exchanges.
Whether you’re buying a hardware or a hardware wallet, it is important to purchase whatever you need directly from the supplier or from a trusted source. This is the only way to eliminate the risk of a compromised device or chip from stealing your private keys, especially since there are reports of compromised wallets being sold on Amazon and through other popular online marketplaces.