[bisq-network/roles] BTC donation address owner (#80)

Gordon E. notifications at github.com
Fri Nov 1 13:28:56 UTC 2019


Can this mechanism and DAO guarantee the user funds will be reimbursed if needed? Do we have protocols in place that would detect malicious behaviour before it's too late?

-------- Original Message --------
On 1 Nov 2019, 15:26, wiz wrote:

> [@gordonel](https://github.com/gordonel) Security for trusted roles in the Bisq DAO is actually pretty well thought out. Of course, the donation address keyholder is a very trusted role, right up there with domain name owner and github admin, but this is why it requires posting such a large bond and requires the accountability with monthly reports. I simply made the mistake thinking the role was already active, when it actually just started a few days ago (check the address on block explorer).
>
> If the donation address owner does anything to betray the trust, the DAO can vote to revoke the bond and change the donation address parameter easily. In other words, it would be painful but Bisq is prepared to survive such an attack.
>
>> You are receiving this because you were mentioned.
> Reply to this email directly, [view it on GitHub](https://github.com/bisq-network/roles/issues/80?email_source=notifications&email_token=AKYUTQXZ4SEATI6N5Z6RR4DQRQVARA5CNFSM4G7LBGWKYY3PNVWWK3TUL52HS4DFVREXG43VMVBW63LNMVXHJKTDN5WW2ZLOORPWSZGOEC25GMA#issuecomment-548786992), or [unsubscribe](https://github.com/notifications/unsubscribe-auth/AKYUTQTNPNYDHE2A3RGO3NLQRQVARANCNFSM4G7LBGWA).

-- 
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/bisq-network/roles/issues/80#issuecomment-548787741
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.bisq.network/pipermail/bisq-github/attachments/20191101/5a0f5375/attachment.html>


More information about the bisq-github mailing list