<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Developers Forum for XinFin XDC Network: 11ppm</title>
    <description>The latest articles on Developers Forum for XinFin XDC Network by 11ppm (@11ppm).</description>
    <link>https://www.xdc.dev/11ppm</link>
    <image>
      <url>https://www.xdc.dev/images/pEA2FE4ha98Yyf_6QoKnICQ4H2jSZQNYm_elC598JDY/rs:fill:90:90/mb:500000/ar:1/aHR0cHM6Ly93d3cu/eGRjLmRldi91cGxv/YWRzL3VzZXIvcHJv/ZmlsZV9pbWFnZS8x/MTIvZDlkZGRhOTYt/NTg5MC00NmM2LWEz/NzQtZWJlMDVmMzRh/MjIwLmpwZWc</url>
      <title>Developers Forum for XinFin XDC Network: 11ppm</title>
      <link>https://www.xdc.dev/11ppm</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://www.xdc.dev/feed/11ppm"/>
    <language>en</language>
    <item>
      <title>Proposal for Redesigning KYC in XDC</title>
      <dc:creator>11ppm</dc:creator>
      <pubDate>Tue, 07 Oct 2025 15:44:28 +0000</pubDate>
      <link>https://www.xdc.dev/11ppm/proposal-for-redesigning-kyc-in-xdc-37fc</link>
      <guid>https://www.xdc.dev/11ppm/proposal-for-redesigning-kyc-in-xdc-37fc</guid>
      <description>&lt;h2&gt;
  
  
  — Toward a Two-Layer Compliance Framework Required for the XDC Network —
&lt;/h2&gt;

&lt;p&gt;　&lt;/p&gt;

&lt;h2&gt;
  
  
  Introduction
&lt;/h2&gt;

&lt;p&gt;The Globiance incident has cast serious doubt on the institutional reliability of the XDC Network’s KYC framework. Concerns are spreading that, in practice, masternode reviews may amount to little more than “submit the documents and you’re approved.” If verification remains merely procedural, it does not guarantee trust; rather, it risks overlooking misconduct and inviting significant threats.&lt;/p&gt;

&lt;p&gt;The XDC team itself originally described “KYC Enabled Masternodes” as “an additional layer of trust and compliance.” In other words, the system was meant to ensure regulatory adherence and to provide a framework in which enterprises and financial institutions could participate with confidence. (&lt;a href="https://www.xdc.dev/vinn_9686/battle-of-the-blockchains-xrp-ripple-vs-xdc-xdc-network-uncovering-the-benefits-41oe"&gt;See referenced article.&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;In actual operation, however, it has been limited to document checks, diverging sharply from that founding intent. This is precisely why XDC now needs a two-layer architecture—long discussed on xdc.dev—that combines outsourcing to traditional-finance KYC/AML vendors to secure trust at the point of entry, with crypto-asset forensics to ensure transparency of fund flows (off-chain KYC + on-chain monitoring).&lt;/p&gt;

&lt;p&gt;This paper organizes why such a structure is necessary and sets out the conclusions and lessons that follow.&lt;/p&gt;

&lt;p&gt;(Note)&lt;br&gt;
Although this article has already been published, we plan to make ongoing corrections to typos, as well as add images and content updates where appropriate. The aim is to further enrich the material and make it more useful to readers.&lt;/p&gt;




&lt;h2&gt;
  
  
  Structure of This Article
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;The Necessity of a Two-Layer Compliance Architecture&lt;/li&gt;
&lt;li&gt;The Limits and Hollowing-Out of the Current KYC&lt;/li&gt;
&lt;li&gt;Risk Scoring by KYC/AML Vendors&lt;/li&gt;
&lt;li&gt;Past Disclosure of KYC Documents and the Risks It Revealed&lt;/li&gt;
&lt;li&gt;The Limits of Formalistic KYC in International Cases&lt;/li&gt;
&lt;li&gt;Risk and Responsibility Diversification via KYC Vendor Adoption&lt;/li&gt;
&lt;li&gt;Proposals for Rebuilding the KYC Regime&lt;/li&gt;
&lt;/ol&gt;




&lt;h2&gt;
  
  
  1. Necessity of a Two-Layer Compliance Architecture
&lt;/h2&gt;

&lt;p&gt;What XDC needs is a two-layer compliance architecture that combines two distinct categories of vendors.&lt;br&gt;
　&lt;/p&gt;

&lt;h3&gt;
  
  
  Layer 1: Trust at the Point of Entry (Traditional-Finance KYC/AML Vendors)
&lt;/h3&gt;

&lt;p&gt;The first requirement is a traditional-finance KYC/AML vendor. Such vendors perform systematic identity verification for individuals and entities; authenticate corporate registrations and licenses; identify ultimate beneficial owners (UBOs); conduct sanctions and politically exposed person (PEP) checks; and screen against adverse media. They also quantify jurisdictional and entity-level trust via risk scoring, thereby safeguarding trust at the entry point to the network.&lt;/p&gt;

&lt;p&gt;Representative vendors include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://complyadvantage.com/"&gt;ComplyAdvantage&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.lexisnexis.com/en-us/gateway.page"&gt;LexisNexis&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.lseg.com/en/risk-intelligence"&gt;World-Check&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;　&lt;/p&gt;

&lt;h3&gt;
  
  
  Layer 2: Transparency of Fund Flows (Blockchain Analytics Vendors)
&lt;/h3&gt;

&lt;p&gt;The next requirement is blockchain analytics vendors. They handle wallet- and transaction-level risk assessment, trace the movement of funds, detect sanctions evasion and money laundering, and conduct cross-chain investigations—thereby ensuring network-wide transparency of fund flows.&lt;/p&gt;

&lt;p&gt;Representative vendors include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.chainalysis.com/"&gt;Chainalysis&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.elliptic.co/"&gt;Elliptic&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;　&lt;/p&gt;

&lt;h3&gt;
  
  
  The Significance of the Two-Layer Model
&lt;/h3&gt;

&lt;p&gt;Only by integrating KYC/AML to secure trust at the entry point with blockchain analytics to ensure transparency of fund flows does a globally viable compliance regime take institutional shape. &lt;/p&gt;

&lt;p&gt;　&lt;/p&gt;

&lt;h2&gt;
  
  
  2. The Limits and Hollowing-Out of the Current KYC
&lt;/h2&gt;

&lt;p&gt;So where does XDC stand today?&lt;/p&gt;

&lt;p&gt;In May 2025, XDC expanded its integration with Elliptic, advancing the development of Layer 2 (on-chain monitoring). This now covers not only network transaction surveillance but also real-time cross-chain tracing and analytics for RWAs (real-world assets), significantly improving transparency of fund flows. (&lt;a href="https://www.elliptic.co/media-center/elliptic-expands-coverage-to-xdc-network"&gt;See referenced article.&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.xdc.dev/images/ekXAjsLNIAYYSV1I5rmLNT9PShZtHreS_rPOrBVaqwA/w:880/mb:500000/ar:1/aHR0cHM6Ly93d3cu/eGRjLmRldi91cGxv/YWRzL2FydGljbGVz/LzlqMDBrYnlndTg2/emZqNDE5djJjLnBu/Zw" class="article-body-image-wrapper"&gt;&lt;img src="https://www.xdc.dev/images/ekXAjsLNIAYYSV1I5rmLNT9PShZtHreS_rPOrBVaqwA/w:880/mb:500000/ar:1/aHR0cHM6Ly93d3cu/eGRjLmRldi91cGxv/YWRzL2FydGljbGVz/LzlqMDBrYnlndTg2/emZqNDE5djJjLnBu/Zw" alt="Image description" width="880" height="642"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;However, Elliptic does not verify the authenticity of off-chain entities—such as the identities of individuals or corporations, their licenses, or their ultimate beneficial owners (UBOs). In other words, Layer 1, which guarantees “trust at the point of entry,” remains missing, leaving the overall framework incomplete.&lt;/p&gt;

&lt;p&gt;To fill this gap, traditional-finance KYC/AML vendors are indispensable. They go far beyond simple identity verification, providing validation of corporate registrations and licenses, identification of UBOs, screening against sanctions, PEP, and adverse media lists, and even quantifying each entity’s level of trust through risk scoring—thus forming the very foundation of Layer 1.&lt;/p&gt;

&lt;p&gt;In conclusion, the establishment of this Layer 1 is the highest priority. Without it, no matter how robust Layer 2 becomes, the foundation of trust will never be solid.&lt;/p&gt;

&lt;p&gt;　&lt;/p&gt;

&lt;h2&gt;
  
  
  3. Risk Scoring by KYC/AML Vendors
&lt;/h2&gt;

&lt;p&gt;Traditional-finance KYC/AML vendors provide more than simple identity checks. They also quantify jurisdictional trust differentials and entity-level risk, effectively operating with something akin to a “credit-style” risk score.&lt;/p&gt;

&lt;h3&gt;
  
  
  Risk Scoring Used by Vendors
&lt;/h3&gt;

&lt;p&gt;Most KYC/AML vendors assign a risk score to each individual or entity, typically combining the following factors (scored or ranked):&lt;/p&gt;

&lt;p&gt;　&lt;br&gt;
&lt;strong&gt;1. Jurisdiction Risk&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Based on the regulatory environment and the strength of AML controls in the country of registration.
→ Japan and EU countries tend to be low-risk; El Salvador and certain offshore jurisdictions are often treated as high-risk. In making such determinations, vendors and network operators reference evaluations by FATF and the OECD, as well as sanctions-evasion country lists, among other materials.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;　&lt;br&gt;
&lt;strong&gt;2. Entity Risk&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;For entities: industry (e.g., casinos or crypto-related businesses are higher risk), licensing status, and the credibility of supervisory authorities.&lt;/li&gt;
&lt;li&gt;For individuals: PEP status, prior scandals or litigation history, and whether they appear on sanctions lists.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;　&lt;br&gt;
&lt;strong&gt;3. Media &amp;amp; External Information&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Automated collection of negative media, litigation coverage, and regulatory breaches, with relevance reflected in the score.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;　&lt;br&gt;
&lt;strong&gt;4. Relationships &amp;amp; UBO Structure&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Whether the UBOs are high-risk persons and whether ownership structures lack transparency.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;　&lt;/p&gt;

&lt;h3&gt;
  
  
  Handling “Jurisdictional Trust”
&lt;/h3&gt;

&lt;p&gt;This approach enables practical differentiation: even if two applicants both call themselves “banks,” Japan versus El Salvador leads to different treatments in practice.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Japan/Singapore → strict supervision by the FSA or MAS → “low-risk jurisdictions.”&lt;/li&gt;
&lt;li&gt;El Salvador and some emerging markets → underdeveloped regulation or political instability → “high-risk jurisdictions.”&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Consequently, the weight of a banking license differs by country in real-world operations.&lt;/p&gt;

&lt;p&gt;　&lt;/p&gt;

&lt;h3&gt;
  
  
  How Scores Are Used
&lt;/h3&gt;

&lt;p&gt;Vendors return categorizations or numeric values such as low/medium/high risk. Recipients (banks, network operators, exchanges, etc.) then set thresholds consistent with their risk tolerance. Scales differ by vendor, and re-KYC (periodic refresh) or event-driven reviews are assumed.&lt;/p&gt;

&lt;p&gt;Example operational policy:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Decline high-risk (e.g., scores ≥ 80)&lt;/li&gt;
&lt;li&gt;Request additional documentation for medium-risk&lt;/li&gt;
&lt;li&gt;Approve low-risk promptly&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;　&lt;/p&gt;

&lt;h3&gt;
  
  
  Meaning in a Blockchain Context
&lt;/h3&gt;

&lt;p&gt;For a network like XDC:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Use vendor risk scores to decide whether to approve a node application;&lt;/li&gt;
&lt;li&gt;Present those scores to investors and regulators as evidence of entry-point trust.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Because these scores aggregate jurisdictional regulation, industry, PEP/sanctions, and adverse information, they go beyond identity alone and form a fitness criterion for masternode operation. For example, decline high-risk applicants, require supplemental documentation for medium-risk ones—directly supporting practical decision-making.&lt;/p&gt;

&lt;p&gt;Moreover, such scores provide a rational basis to explain “why this node was accepted,” serving as reassurance to investors and as a documented risk-management procedure for regulators—thus institutionalizing transparency and accountability.&lt;/p&gt;

&lt;p&gt;This is how risk scoring can be realistically applied.&lt;/p&gt;

&lt;p&gt;　&lt;/p&gt;

&lt;h3&gt;
  
  
  Building Out Layer 1 as the Trust Foundation
&lt;/h3&gt;

&lt;p&gt;Traditional-finance KYC/AML vendors employ credit-like risk scoring that clearly reflects differences in regulatory environments across countries. Thus, even if two applicants both call themselves “banks,” the treatment differs between, say, Japan and El Salvador.&lt;/p&gt;

&lt;p&gt;From the outset, XDC embedded KYC in its design to interface with traditional finance and international financial infrastructure—hence it intentionally did not adopt a fully permissionless model like Ethereum, Polygon, or Avalanche (where anyone can run a node), despite being EVM-compatible.&lt;/p&gt;

&lt;p&gt;Requiring a substantial stake of 10 million XDC plus KYC submissions effectively gives XDC leverage over who can operate a node. In practice, this means operators are significantly filtered by these conditions.&lt;/p&gt;

&lt;p&gt;Yet the operation became overly formalistic. Allowing PDFs uploaded alongside a 10-million-XDC stake to “pass” without thorough examination by personnel with adequate domain expertise entails serious risk. In AML and international fraud cases, document forgery and alteration are basic, common tactics; without the capacity to detect them, KYC becomes hollow.&lt;/p&gt;

&lt;p&gt;Therefore, to win international trust, Layer 2 transparency is not enough. Building out Layer 1 is the most urgent task right now.&lt;/p&gt;

&lt;p&gt;　&lt;/p&gt;

&lt;h2&gt;
  
  
  4. Past KYC Document Disclosure and the Risks It Revealed
&lt;/h2&gt;

&lt;p&gt;　&lt;/p&gt;

&lt;h3&gt;
  
  
  How Document Disclosure Exposed Institutional Hollowing-Out
&lt;/h3&gt;

&lt;p&gt;Regarding the PDFs uploaded alongside a 10-million-XDC stake: while they are now fully private, there was reportedly a period during which XDC masternode KYC documents were accessible externally. The exact timeframe is unclear, but since they were later made private following complaints from node operators, XDC should be aware that this occurred.&lt;/p&gt;

&lt;p&gt;This episode illuminated several important realities of the KYC process. Of course, external accessibility was itself a serious security risk. What I wish to highlight, however, is how the hollowing-out of the system became visible as a secondary effect.&lt;/p&gt;

&lt;p&gt;In practice, submissions showed large regional and individual disparities. One operator attached driver’s licenses and multiple ID copies, while another submitted only a single notarized page—revealing that stringency was not applied consistently.&lt;/p&gt;

&lt;p&gt;　&lt;/p&gt;

&lt;h3&gt;
  
  
  The Risks of a Single Notarial Certificate and Offshore Entities
&lt;/h3&gt;

&lt;p&gt;What does “a single notarized page” mean? It is merely a document on which a notary certifies, with signature and seal, that “this person is affiliated with the company.” In many jurisdictions, a notary’s role is limited to verifying the signer’s identity and the fact of signing; the truth of the document’s contents is not guaranteed. Functionally, it resembles a sworn statement that still requires independent corroboration for substantive accuracy.&lt;/p&gt;

&lt;p&gt;There were also indications that some nodes were registered to offshore companies established in tax havens. Such entities often serve as paper companies with little real business activity, making UBOs hard to identify and enabling asset concealment or money laundering—problems widely criticized internationally. FATF’s Recommendations 24/25 (R.24/25) call on countries to strengthen transparency of beneficial ownership to mitigate these risks.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.fatf-gafi.org/en/publications/Fatfrecommendations/Guidance-Beneficial-Ownership-Legal-Persons.html"&gt;FATF’s Recommendations 24&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.fatf-gafi.org/en/publications/Fatfrecommendations/Guidance-Beneficial-Ownership-Transparency-Legal-Arrangements.html"&gt;FATF’s Recommendations 25&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If approvals could be granted on the strength of a single notarial document, that would hollow out entry-point trust and risk creating a breeding ground for crime. We must not rely on good-faith assumptions; AML and international fraud lessons require that we design systems on the premise of potential abuse, eliminating gaps proactively.&lt;/p&gt;

&lt;p&gt;To close those gaps, traditional-finance KYC/AML vendors are indispensable—not only to authenticate registrations, licenses, and UBOs, but also to conduct PEP checks, screen against UN/OFAC/EU sanctions lists, and run adverse-media searches across public records and court filings to detect past misconduct, among other layers of scrutiny.&lt;/p&gt;

&lt;p&gt;This is the core mechanism to institutionalize entry-point trust, and it is the foundation XDC needs most urgently. Crucially, the fragility of formalistic KYC is not unique to XDC; it has been exposed repeatedly in international financial scandals.&lt;/p&gt;

&lt;p&gt;Below, we review emblematic cases showing how formalistic KYC has hit its limits.&lt;/p&gt;

&lt;p&gt;　&lt;/p&gt;

&lt;h2&gt;
  
  
  5. Limits of Formalistic KYC in International Cases
&lt;/h2&gt;

&lt;p&gt;The weaknesses of formalistic KYC are not unique to XDC; they have recurred across international financial scandals. More troubling still is when professionals—lawyers, accountants—facilitate such misconduct.&lt;/p&gt;

&lt;p&gt;In the 2016 Panama Papers, massive leaks from a Panamanian law firm revealed how politicians and the wealthy worldwide used tax havens for asset concealment, tax evasion, and money laundering. The law firm itself provided company-formation schemes—i.e., legally dubious or outright illicit structures—thereby participating in laundering. In short:&lt;/p&gt;

&lt;p&gt;It is not “safe because professionals are involved”; rather, there is a risk precisely because professionals are involved.&lt;/p&gt;

&lt;p&gt;The pattern extends beyond the Panama Papers.&lt;/p&gt;

&lt;p&gt;In the 2017 Paradise Papers, documents leaked from the major law firm Appleby and corporate service providers exposed large-scale tax avoidance via complex offshore schemes, showing how professionals and large firms actively provided “loopholes.”&lt;/p&gt;

&lt;p&gt;In 2018, the Danske Bank money-laundering case revealed that around €200 billion in suspicious funds flowed through its Estonian branch, demonstrating that even a leading European bank can become a conduit when entry-point AML checks are hollowed out.&lt;/p&gt;

&lt;p&gt;In 2020, the Wirecard scandal showed that even with audits by one of the Big Four (EY), massive fraud can go undetected—professional assurances do not automatically guarantee trust.&lt;/p&gt;

&lt;p&gt;Hence the institutional necessity of independent third-party audits and continuous monitoring. If basics such as verifying registrations and licenses, confirming regulatory registrations, and screening against sanctions and adverse media are missing, KYC becomes KYC in name only. These cases demonstrate that the limits of formalistic KYC are a global issue, and XDC is no exception. The past episode where XDC KYC documents became externally viewable—and thereby exposed vulnerabilities—shows the same problem arises here as well.&lt;/p&gt;

&lt;p&gt;　&lt;/p&gt;

&lt;h2&gt;
  
  
  6. Diversifying Responsibility by Introducing KYC Vendors
&lt;/h2&gt;

&lt;p&gt;These institutional shortcomings are not merely theoretical. They materialized in practice—namely, in the Globiance incident.&lt;/p&gt;

&lt;p&gt;Counterfactually, had an external KYC/AML vendor been engaged at the time of Globiance’s masternode application (or at a functioning re-KYC interval), the authenticity or deficiencies of any banking/exchange licenses, and any presence on regulatory warning lists, might have undergone closer scrutiny. As a result, Globiance may have been flagged early as high-risk, potentially preventing entry into the network’s core.&lt;/p&gt;

&lt;p&gt;This also benefits XDC itself.&lt;/p&gt;

&lt;p&gt;So long as XDC conducts KYC on its own, responsibility concentrates within XDC. If an independent vendor formally performs the review, XDC can clearly demonstrate reliance on a professional determination, thereby improving procedural propriety and relatively reducing risk (though ultimate governance responsibility still remains with XDC). In this sense, vendor adoption functions not only as risk reduction but also as responsibility sharing.&lt;/p&gt;

&lt;p&gt;Thus, the Globiance incident was not a random mishap; it exposed design flaws. The issue is not transient; it indicates structural fragility, which makes reform imperative.&lt;/p&gt;

&lt;p&gt;　&lt;/p&gt;

&lt;h2&gt;
  
  
  7. Proposals for Rebuilding the KYC Regime
&lt;/h2&gt;

&lt;p&gt;From the design stage, XDC adopted KYC with an eye toward integration with traditional finance and international financial infrastructure. In practice, however, implementation tilted toward paper-based reviews, leaving the checking apparatus insufficient. The result was a de facto reliance on the good faith of masternode operators.&lt;/p&gt;

&lt;p&gt;The Globiance incident demonstrated the practical limits of XDC continuing to in-house KYC reviews. Tasks such as verifying registrations and licenses, identifying UBOs, and screening against regulatory lists should be handled continuously and systematically by specialized KYC/AML vendors. It is neither operationally nor from a governance standpoint reasonable for XDC—whose core vocation is blockchain development—to shoulder these as well.&lt;/p&gt;

&lt;p&gt;While Globiance is primarily responsible and deserves strong censure, there is also room to acknowledge potential improvements on the XDC side in system design and operation. It would not be surprising if investor perceptions of “network trustworthiness” were influenced, to some degree, by weaknesses in the KYC framework.&lt;/p&gt;

&lt;p&gt;Therefore, it is essential to standardize both layers: traditional-finance KYC/AML to secure entry-point trust, and blockchain analytics to ensure transparency of fund flows. With Layer 2 advanced via Elliptic integration, XDC should prioritize completing Layer 1—off-chain verification of organizational and individual authenticity. This two-layer architecture is the shortest path to restoring, and sustaining, trust in the network.&lt;/p&gt;

&lt;p&gt;Above all, XDC itself must proactively pursue reform. Leaving defects unaddressed invites recurrence and erodes ecosystem-wide trust. For a project aspiring to connect with international financial infrastructure, allowing KYC to remain merely formalistic is fatal. Reform is not optional—it is imperative.&lt;/p&gt;

&lt;p&gt;Let this be a turning point, and let us take the next step forward together with XDC.&lt;/p&gt;

&lt;p&gt;11ppm&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Repeated Error When Setting Up XDC Node</title>
      <dc:creator>11ppm</dc:creator>
      <pubDate>Tue, 14 Jan 2025 11:11:52 +0000</pubDate>
      <link>https://www.xdc.dev/11ppm/repeated-error-when-setting-up-xdc-node-3aoo</link>
      <guid>https://www.xdc.dev/11ppm/repeated-error-when-setting-up-xdc-node-3aoo</guid>
      <description>&lt;p&gt;I am attempting to set up an XDC node on a server that was hard reset, but I keep encountering the following error repeatedly. Despite trying various solutions, the issue remains unresolved. I have tested this on two servers, and the result was the same. Additionally, it seems that others are experiencing the same error. I would like the XDC team to look into this issue.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;ERROR[01-14|03:10:09] Failed to retrieve block author          err="recovery failed"                                                                number=0 hash=4a9d74…42d6b1
ERROR[01-14|03:10:24] Failed to retrieve block author          err="recovery failed"                                                                number=0 hash=4a9d74…42d6b1
WARN [01-14|03:10:44] Full stats report failed                 err="ping timed out"
WARN [01-14|03:10:44] Failed to retrieve stats server message  err="read tcp 172.18.0.2:39586-&amp;gt;45.82.64.150:3000: use of closed network connection"
WARN [01-14|03:10:54] Stats server unreachable                 err="dial tcp 45.82.64.150:3000: i/o timeout"
WARN [01-14|03:11:10] Stats server unreachable                 err="read tcp 172.18.0.2:34086-&amp;gt;45.82.64.150:3000: i/o timeout"
WARN [01-14|03:11:30] Stats server unreachable                 err="read tcp 172.18.0.2:37066-&amp;gt;45.82.64.150:3000: i/o timeout"
ERROR[01-14|03:11:49] Failed to retrieve block author          err="recovery failed"                                                                number=0 hash=4a9d74…42d6b1
WARN [01-14|03:12:09] Full stats report failed                 err="ping timed out"
WARN [01-14|03:12:09] Failed to retrieve stats server message  err="read tcp 172.18.0.2:36694-&amp;gt;45.82.64.150:3000: use of closed network connection"
WARN [01-14|03:12:19] Stats server unreachable                 err="read tcp 172.18.0.2:43042-&amp;gt;45.82.64.150:3000: i/o timeout"
ERROR[01-14|03:12:41] Failed to retrieve block author          err="recovery failed"                                                                number=0 hash=4a9d74…42d6b1
WARN [01-14|03:13:01] Full stats report failed                 err="ping timed out"
WARN [01-14|03:13:01] Failed to retrieve stats server message  err="read tcp 172.18.0.2:58750-&amp;gt;45.82.64.150:3000: use of closed network connection"
WARN [01-14|03:13:11] Stats server unreachable                 err="read tcp 172.18.0.2:35534-&amp;gt;45.82.64.150:3000: i/o timeout"
WARN [01-14|03:13:31] Stats server unreachable                 err="read tcp 172.18.0.2:35760-&amp;gt;45.82.64.150:3000: i/o timeout"
WARN [01-14|03:13:51] Stats server unreachable                 err="read tcp 172.18.0.2:52106-&amp;gt;45.82.64.150:3000: i/o timeout"
WARN [01-14|03:14:11] Stats server unreachable                 err="read tcp 172.18.0.2:53050-&amp;gt;45.82.64.150:3000: i/o timeout"
WARN [01-14|03:14:31] Stats server unreachable                 err="read tcp 172.18.0.2:58428-&amp;gt;45.82.64.150:3000: i/o timeout"
WARN [01-14|03:14:51] Stats server unreachable                 err="read tcp 172.18.0.2:54984-&amp;gt;45.82.64.150:3000: i/o timeout"
WARN [01-14|03:15:11] Stats server unreachable                 err="read tcp 172.18.0.2:36082-&amp;gt;45.82.64.150:3000: i/o timeout"
WARN [01-14|03:15:31] Stats server unreachable                 err="dial tcp 45.82.64.150:3000: i/o timeout"
WARN [01-14|03:15:50] Stats server unreachable                 err="read tcp 172.18.0.2:38446-&amp;gt;45.82.64.150:3000: i/o timeout"
WARN [01-14|03:16:10] Stats server unreachable                 err="read tcp 172.18.0.2:49742-&amp;gt;45.82.64.150:3000: i/o timeout"
WARN [01-14|03:16:27] Stats server unreachable                 err="read tcp 172.18.0.2:39772-&amp;gt;45.82.64.150:3000: i/o timeout"
WARN [01-14|03:16:47] Stats server unreachable                 err="read tcp 172.18.0.2:57710-&amp;gt;45.82.64.150:3000: i/o timeout"
WARN [01-14|03:17:07] Stats server unreachable                 err="read tcp 172.18.0.2:38510-&amp;gt;45.82.64.150:3000: i/o timeout"
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



</description>
      <category>masternode</category>
    </item>
    <item>
      <title>Proposal: Enhancing the Validator Node Rotation System in the XDC Network</title>
      <dc:creator>11ppm</dc:creator>
      <pubDate>Fri, 27 Dec 2024 12:22:00 +0000</pubDate>
      <link>https://www.xdc.dev/11ppm/proposal-enhancing-the-validator-node-rotation-system-in-the-xdc-network-2c55</link>
      <guid>https://www.xdc.dev/11ppm/proposal-enhancing-the-validator-node-rotation-system-in-the-xdc-network-2c55</guid>
      <description>&lt;h2&gt;
  
  
  Introduction
&lt;/h2&gt;

&lt;p&gt;Currently, XDC masternodes are promoted to validator nodes using a round-robin system. This system ensures fairness while assigning validator roles to standby nodes. However, the existing approach has a potential drawback: certain nodes may remain as validators for extended periods, which raises concerns about decentralization.&lt;/p&gt;

&lt;p&gt;This proposal aims to address this issue by presenting a refined mechanism to promote decentralization, while balancing fairness and efficiency.&lt;/p&gt;




&lt;h2&gt;
  
  
  Proposal Details
&lt;/h2&gt;

&lt;h3&gt;
  
  
  1. Periodic Rotation of Validator Nodes
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Objective:&lt;/strong&gt; &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Prevent any single node from operating as a validator for extended periods and enable more operators to participate.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Details:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Set a maximum tenure of 1 year for validator nodes.&lt;/li&gt;
&lt;li&gt;After the tenure ends, the node returns to the standby pool.&lt;/li&gt;
&lt;li&gt;Introduce a 3-year cooldown period, during which the node cannot serve as a validator again.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  2. Improved Selection Mechanism: Combination of Registration Order and VRF
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Objective:&lt;/strong&gt; &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Balance fairness and unpredictability while prioritizing nodes with stable performance.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Details:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Split the selection process into two components:&lt;/li&gt;
&lt;/ul&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Registration Order RotationAllocate 50% of slots based on the order in which standby nodes were registered.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Performance-Based VRF SelectionUse Verifiable Random Function (VRF) provided by the decentralized oracle Plugin to randomly select the remaining 50% from nodes with stable performance.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Benefits:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Maintains fairness based on registration order.&lt;/li&gt;
&lt;li&gt;Introduces unpredictability via VRF, enhancing security and decentralization.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  3. Transparent Performance Evaluation Criteria for Standby Nodes
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Objective:&lt;/strong&gt; &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Ensure a transparent selection process and maintain network reliability.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Details:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Establish criteria such as uptime, response times, and historical performance for evaluating nodes.&lt;/li&gt;
&lt;li&gt;Nodes failing to meet these performance standards will be excluded from selection.&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Benefits of the Proposal
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Promoting DecentralizationReduces the risk of network dominance by specific nodes over extended periods.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Improved FairnessCombines registration order and VRF to create a balanced and inclusive selection system.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Enhanced Efficiency and StabilityPerformance-based criteria ensure network-wide reliability.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Encouraging New ParticipantsCooldown periods create more opportunities for new nodes to serve as validators.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;




&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;This proposal provides a practical and effective approach to improving decentralization and fairness in the XDC network. By enhancing the round-robin system with registration order rotation and performance-based VRF, it ensures the stability and security of the network while enabling broader participation.&lt;/p&gt;

&lt;p&gt;Implementing this mechanism will help the XDC network evolve into a more decentralized and sustainable ecosystem, driving its long-term growth and success.&lt;/p&gt;

&lt;p&gt;This is merely one proposal, but it represents a realistic and meaningful approach to enhancing decentralization, fairness, and efficiency within the XDC network. By incorporating detailed implementation plans, this proposal can become even more feasible and effective.&lt;/p&gt;

&lt;p&gt;This proposal is intended to serve as a starting point for discussion and thought within the community. My goal is not to present a final solution, but rather to raise key questions and ideas that could spark further exploration. I believe that by engaging in thoughtful discussions, we can refine and develop this concept to better suit the needs of the XDC network and its stakeholders.&lt;/p&gt;

&lt;p&gt;I look forward to hearing your thoughts and feedback on how we can improve the validator node rotation system, and how we can ensure that decentralization remains at the core of the network's future development.&lt;/p&gt;

&lt;p&gt;Thank you for taking the time to consider this proposal, and I’m excited to continue the conversation with all of you!&lt;/p&gt;

</description>
      <category>masternode</category>
      <category>validator</category>
      <category>vrf</category>
      <category>plugin</category>
    </item>
    <item>
      <title>[Solved] Issue with One-Click Installer Download Availability</title>
      <dc:creator>11ppm</dc:creator>
      <pubDate>Tue, 06 Feb 2024 23:05:53 +0000</pubDate>
      <link>https://www.xdc.dev/11ppm/issue-with-one-click-installer-download-availability-k5</link>
      <guid>https://www.xdc.dev/11ppm/issue-with-one-click-installer-download-availability-k5</guid>
      <description>&lt;p&gt;Hi, I want to test the "One-Click Installer", but I am unable to download it on Windows, Linux, and Mac. Please fix so that the download is available.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.xdc.dev/images/tjbhCTR_05HhIdgo_ZiSCDVa3QVJ0r7iveSIhAOAV6M/w:880/mb:500000/ar:1/aHR0cHM6Ly93d3cu/eGRjLmRldi91cGxv/YWRzL2FydGljbGVz/L3U1MXE5MXBidnRn/Z3EwZGR0YnBiLnBu/Zw" class="article-body-image-wrapper"&gt;&lt;img src="https://www.xdc.dev/images/tjbhCTR_05HhIdgo_ZiSCDVa3QVJ0r7iveSIhAOAV6M/w:880/mb:500000/ar:1/aHR0cHM6Ly93d3cu/eGRjLmRldi91cGxv/YWRzL2FydGljbGVz/L3U1MXE5MXBidnRn/Z3EwZGR0YnBiLnBu/Zw" alt="Image description" width="880" height="295"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.xdc.dev/images/HGGvVxOYazzfPZjeKLJKUvdjR8abSweyZhmiujQfTvc/w:880/mb:500000/ar:1/aHR0cHM6Ly93d3cu/eGRjLmRldi91cGxv/YWRzL2FydGljbGVz/L2YxdHM4cnJjOWIz/NGdjZHBxMHM5LnBu/Zw" class="article-body-image-wrapper"&gt;&lt;img src="https://www.xdc.dev/images/HGGvVxOYazzfPZjeKLJKUvdjR8abSweyZhmiujQfTvc/w:880/mb:500000/ar:1/aHR0cHM6Ly93d3cu/eGRjLmRldi91cGxv/YWRzL2FydGljbGVz/L2YxdHM4cnJjOWIz/NGdjZHBxMHM5LnBu/Zw" alt="Image description" width="880" height="276"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>oneclickinstaller</category>
      <category>masternode</category>
    </item>
    <item>
      <title>[Query] Query on Recent Masternode Snapshot Alterations</title>
      <dc:creator>11ppm</dc:creator>
      <pubDate>Mon, 15 Jan 2024 00:38:52 +0000</pubDate>
      <link>https://www.xdc.dev/11ppm/query-on-recent-masternode-snapshot-alterations-5f2b</link>
      <guid>https://www.xdc.dev/11ppm/query-on-recent-masternode-snapshot-alterations-5f2b</guid>
      <description>&lt;p&gt;I have a question regarding the mainnet snapshot of the masternode. Previously, when I unzipped the file, an XDC directory was created in the current directory, containing a large number of ldb files. However, when I try it now, the XDC directory is not created, and a large number of files appear directly in the current directory. Has the handling of the snapshot changed? Previously, after unzipping, I believe the XDC directory that was created was moved to the xdcchain directory.&lt;/p&gt;

</description>
      <category>snapshot</category>
      <category>masternode</category>
    </item>
    <item>
      <title>[Solved] Query about XDC Mainnet Gas Price Post-XDPoS 2.0 Upgrade</title>
      <dc:creator>11ppm</dc:creator>
      <pubDate>Fri, 17 Nov 2023 04:42:12 +0000</pubDate>
      <link>https://www.xdc.dev/11ppm/query-about-xdc-mainnet-gas-price-post-xdpos-20-upgrade-1ma0</link>
      <guid>https://www.xdc.dev/11ppm/query-about-xdc-mainnet-gas-price-post-xdpos-20-upgrade-1ma0</guid>
      <description>&lt;p&gt;Hi XDC community,&lt;/p&gt;

&lt;p&gt;If there are any developers from the XDC team present here, I have a question regarding XDPoS 2.0. I understand that on the Apothem network, the &lt;code&gt;Gas Price&lt;/code&gt; has changed as follows:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Before the upgrade:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Gas Limit &amp;amp; Gas Used By Txn: 21,000 | 21,000 (100.00%)&lt;/li&gt;
&lt;li&gt;Gas Price: 0.00000000025 XDC (0.25 Gwei)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;After the upgrade:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Gas Limit &amp;amp; Gas Used By Txn: 21,000 | 21,000 (100.00%)&lt;/li&gt;
&lt;li&gt;Gas Price: 0.0000000125 XDC (12.5 Gwei)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;I would like to know if this change to 12.5 Gwei for Gas Price in Apothem will also be applied to the Mainnet. The reason I ask is that when the Apothem network transitioned to XDPoS 2.0, transactions on the Plugin 2.0 nodes failed to complete because the Gas Price exceeded the set limit. Adjusting the settings resolved the issue, allowing transactions to complete. Since a similar situation could occur on the Mainnet, if the Gas Price is expected to be 12.5 Gwei with XDPoS 2.0 there as well, it might be wise to start setting up validator nodes from now to prepare for this change.&lt;/p&gt;

&lt;p&gt;Thanks for your time and insights,&lt;br&gt;
11ppm&lt;/p&gt;

</description>
    </item>
    <item>
      <title>[Solved] 502 Error on Apothem Network WebSocket</title>
      <dc:creator>11ppm</dc:creator>
      <pubDate>Mon, 11 Sep 2023 11:44:36 +0000</pubDate>
      <link>https://www.xdc.dev/11ppm/502-error-on-apothem-network-websocket-5a5i</link>
      <guid>https://www.xdc.dev/11ppm/502-error-on-apothem-network-websocket-5a5i</guid>
      <description>&lt;p&gt;Apothem Network's websocket is constantly giving a 502 error. I would like it to be fixed. If there are any other websockets that can be used, please let me know. Currently, there is only one option: &lt;code&gt;wss://ws.apothem.network/&lt;/code&gt;. I would like another one to be provided. Thank you.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.xdc.dev/images/6RKejwNg5hgZqVOGEYBkwWc-ChsnMCw4eUWvw7rZMJo/w:880/mb:500000/ar:1/aHR0cHM6Ly93d3cu/eGRjLmRldi91cGxv/YWRzL2FydGljbGVz/L3FnZjZnYnJsdjVz/NWp2a2F6MTlwLnBu/Zw" class="article-body-image-wrapper"&gt;&lt;img src="https://www.xdc.dev/images/6RKejwNg5hgZqVOGEYBkwWc-ChsnMCw4eUWvw7rZMJo/w:880/mb:500000/ar:1/aHR0cHM6Ly93d3cu/eGRjLmRldi91cGxv/YWRzL2FydGljbGVz/L3FnZjZnYnJsdjVz/NWp2a2F6MTlwLnBu/Zw" alt="Image description" width="880" height="67"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>apothem</category>
      <category>websocket</category>
      <category>502</category>
      <category>wss</category>
    </item>
    <item>
      <title>(It happened again.)The dissociation between "Current Value" and "Estimated Value on Day of Txn On the Explorer</title>
      <dc:creator>11ppm</dc:creator>
      <pubDate>Fri, 21 Oct 2022 15:46:13 +0000</pubDate>
      <link>https://www.xdc.dev/11ppm/it-happened-againthe-dissociation-between-current-value-and-estimated-value-on-day-of-txn-on-the-explorer-7e6</link>
      <guid>https://www.xdc.dev/11ppm/it-happened-againthe-dissociation-between-current-value-and-estimated-value-on-day-of-txn-on-the-explorer-7e6</guid>
      <description>&lt;p&gt;The same issue happened. Please fix it.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.xdc.dev/11ppm/the-dissociation-between-current-value-and-estimated-value-on-day-of-txn-on-the-explorer-49an"&gt;https://www.xdc.dev/11ppm/the-dissociation-between-current-value-and-estimated-value-on-day-of-txn-on-the-explorer-49an&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>The dissociation between "Current Value" and "Estimated Value on Day of Txn On the Explorer</title>
      <dc:creator>11ppm</dc:creator>
      <pubDate>Tue, 27 Sep 2022 22:48:05 +0000</pubDate>
      <link>https://www.xdc.dev/11ppm/the-dissociation-between-current-value-and-estimated-value-on-day-of-txn-on-the-explorer-49an</link>
      <guid>https://www.xdc.dev/11ppm/the-dissociation-between-current-value-and-estimated-value-on-day-of-txn-on-the-explorer-49an</guid>
      <description>&lt;p&gt;On the Explorer the dissociation between "Current Value" and "Estimated Value on Day of Txn" is unusually large . It is clearly wrong, and I would like to have it corrected.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://explorer.xinfin.network/txs/0x5b7ec19ccc74c36c88a04f7ac44867648da936afb48b5b7882aa02dce370b065#overview"&gt;https://explorer.xinfin.network/txs/0x5b7ec19ccc74c36c88a04f7ac44867648da936afb48b5b7882aa02dce370b065#overview&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.xdc.dev/images/8iyWG0qZYWFrRbYzkgN_o0ee6GkQsxz5qfpdcT48B1Y/w:880/mb:500000/ar:1/aHR0cHM6Ly93d3cu/eGRjLmRldi91cGxv/YWRzL2FydGljbGVz/LzhzbzVvaGs2Z2Q4/eXgwaTQ0d25yLnBu/Zw" class="article-body-image-wrapper"&gt;&lt;img src="https://www.xdc.dev/images/8iyWG0qZYWFrRbYzkgN_o0ee6GkQsxz5qfpdcT48B1Y/w:880/mb:500000/ar:1/aHR0cHM6Ly93d3cu/eGRjLmRldi91cGxv/YWRzL2FydGljbGVz/LzhzbzVvaGs2Z2Q4/eXgwaTQ0d25yLnBu/Zw" alt="Image description" width="880" height="556"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>blocksscan</category>
      <category>explorer</category>
    </item>
  </channel>
</rss>
