There are a lot of directions in which one can go about attempting to design private validator pools.
The goal of this issue is to simply brainstorm around what such a design should aim for and to aid narrow down the possibilities.
[ ] What specifications for client/server nodes? (rasberry Pi?)
[ ] The economics behind slashing mechanics are different for each chain and seems to play a large part in the security of the network providing privacy. Add differences for DPoS/Other Consensus Algo's?
[ ] More general ideas for if A-DCnets can be implemented.
There are a lot of directions in which one can go about attempting to design private validator pools. The goal of this issue is to simply brainstorm around what such a design should aim for and to aid narrow down the possibilities.