For five years, Lambda Core BUIDLers have built a permissionless, secure, and economical decentralized storage network, and have gained tremendous support from the community and HODLers. At the same time, with the rapid development of digital currencies and blockchain technologies, two core application scenarios, Defi and NFT, have emerged. Users can hold assets through encryption technology and trade assets in a decentralized manner. Through the fusion of these two emerging technologies and the unremitting efforts of the core development team, we are proud to announce that a new evolution of the Lambda Network is coming soon. This new Web3 infrastructure is named: The Renaissance.
Staking LAMB to earn rewards
When staking is complete, rewards will start to calculated immediately. At any time, stakers can claim their cumulative reward through dApp.
The first innovative, open, creator-friendly, generative art platform where users from any blockchain ecosystem can create and collect generative art.
Be the first to discover some epic Web3 content.Never miss out on any opportunities, events, knowledges, and news.
Lambda Research Program
Lambda research program is a laboratory for new technologies to promote the combination of industry, university and research. Lambda Foundation will be dedicated to bring top universities, research institutions and top talents together to conduct theoretical research and technological exploration in the field of blockchain storage
Each validator candidate is encouraged to run its operations independently, as diverse setups increase the resilience of the network. Validator candidates should commence their setup phase now in order to be on time for launch.
Tendermint KMS is a signature service with support for Hardware Security Modules (HSMs), such as YubiHSM2 and Ledger Nano . It’s intended to be run alongside Cosmos Validators, ideally on separate physical hosts, providing defense-in-depth for online validator signing keys, double signing protection, and functioning as a central signing service that can be used when operating multiple validators in several Cosmos Zones.
It is mission critical that an attacker cannot steal a validator's key. If this is possible, it puts the entire stake delegated to the compromised validator at risk. Hardware security modules are an important strategy for mitigating this risk.
Sentry Nodes (DDOS Protection)
Validators are responsible for ensuring that the network can sustain denial of service attacks.
One recommended way to mitigate these risks is for validators to carefully structure their network topology in a so-called sentry node architecture.
Validator nodes should only connect to full-nodes they trust because they operate them themselves or are run by other validators they know socially. A validator node will typically run in a data center. Most data centers provide direct links the networks of major cloud providers. The validator can use those links to connect to sentry nodes in the cloud. This shifts the burden of denial-of-service from the validator's node directly to its sentry nodes, and may require new sentry nodes be spun up or activated to mitigate attacks on existing ones.
Sentry nodes can be quickly spun up or change their IP addresses. Because the links to the sentry nodes are in private IP space, an internet based attacked cannot disturb them directly. This will ensure validator block proposals and votes always make it to the rest of the network.