Rules

The primary criteria for winning GoS is the number of generated blocks. We want to incentivize a balance between offensive and defensive strategies to keep with the goals of the game. Some examples of adversarial behavior within the scope of GoS include:

  • Making any unsanctioned changes to the software and coordinating with other players against competitors, thus preventing the latter from taking part in block generation and stake accumulation.

  • Exploiting improperly configured validator setups in attempts at blocking competitors or other players from accumulating stakes.

  • Targeting the nodes of other players via false traffic or other deceptive channels.

At the beginning of the game, every validator will receive a predetermined amount of stake to start. To win, the validators will need to produce blocks. In order to remain in the role of validators, they will need to save and increase their stake, and this can be done by:

  • Being online and producing blocks

  • Using the faucet that will be deployed on the network

  • Monitoring the funds received, as the network will produce airdrops of a significant number of tokens

While participants are encouraged to behave adversarially on the network, engaging in the following specific harmful adversarial actions is prohibited and could be cause for disqualification from the game. Some examples of these actions include:

  • Any attacks against nodes that violate Amazon Web Services Acceptable Use Policy and Google Cloud Platform's Acceptable Use Policy and other specific services you use. Please familiarize yourself with those policies, since violating them could not only disqualify you from GoS, but could also get you suspended or permanently banned from those services.

  • Social engineering attacks against other validators. Social engineering is the term used for a broad range of malicious activities accomplished through human interactions that use psychological manipulation to trick users into making security mistakes or giving away sensitive information. Activities like phishing, cloud account credential compromise, malware distribution, and physical security attacks on data centers are out of bounds for this competition.

  • Attacking any networks other than the official GoS networks

  • Causing long-term harm to a validator setup.