Join this validator. Delegate your stake
This calculator produces an approximate calculation of the delegate's revenue. It based on the current level of reward for block in the network and balance of the network validators. The result is approximate and may not coincide with the real revenue got by the network!
To protect against DDoS attacks, we make maximum use of the capabilities of cloud providers. Including intrusion detection systems, the introduction of barriers and the ability to absorb attacks through the mechanisms of scaling and load balancing.
Also, protection from DDoS is included in the design of the network architecture. We follow the recommendations for Sentry Node Architecture. This provides a hiding of the real location of the Signature Server (Validator) and load balancing across the Full Nodes
Access from the Internet to all nodes is protected by several levels of firewalls.
The validator is located in an isolated network and is completely unavailable from the Internet. The control capability exists only through an encrypted channel with access by a key.