Skip to main content

Energi Blacklist Governance Process

1. Introduction

Energi Bureau of Investigations (EBI) plays a crucial role in resolving wallet compromise incidents and maintaining the integrity and security of the Energi network. The Blacklist Governance Process includes both a manual validation as well as masternode voting process. It serves as a mechanism to identify and block compromised wallet addresses as reported by victims and validated by EBI.

This document outlines the step-by-step business process of how the blacklist is performed in the Energi network. For details technical scripts, view the document below:

2. Wallet Compromise Reporting

When users' wallet addresses are compromised by malicious actors, the victims are responsible for reporting the incident to the Energi Bureau of Investigations (EBI). The victims provide detailed information about the compromise and any supporting evidence.

3. Claim Validation and Blacklist Proposal Creation

To validate the claim, the victim signs a message from the compromised wallet address, from which the loss occurred. This is termed “Proof of Involvement”. It helps EBI assess the genuineness of the case. If the claim is deemed valid, EBI creates a proposal on the blockchain to blacklist the compromised wallet address.

Anyone can create the blacklist proposal by putting up 1000 NRG as collateral. The collateral is in place to avoid malicious abuse of the process. It is returned if the proposal is successful. EBI does not have to provide any collateral.

4. Masternode Voting

The blacklist proposal created requires at least 10% of the masternodes to vote positively for it to pass. This voting process ensures community consensus and participation in addressing wallet compromises.

5. Submission of Proof of Claim/Crime

The victim needs to submit a Proof of Claim/Crime to support their case. This proof may include relevant documentation, transaction history, or any other evidence demonstrating the occurrence and impact of the compromise.

6. Proof of Action Fraud Report - Evidence Collection and Investigation

After the masternode voting concludes, the EBI team initiates the investigation. They collect evidence related to the compromised wallet address, analyzing the transactions, interactions, and any other available data to determine the extent of the compromise.

In case of a crime, such as stolen funds or impersonation, the victim must submit a Proof of Action Fraud Report. This report confirms that the victim has filed an official action fraud report with their local law enforcement authorities and provides evidence of doing so.

7. Drain Proposal

Once sufficient data and evidence have been collected, a drain proposal is submitted to the blockchain for a vote. The drain proposal aims to address the compromised wallet and recover the funds for the victim.

Like before, anyone can submit a drain proposal to the masternodes by putting up 100 NRG as collateral. At least 10% of the masternodes would have to vote positively on the proposal to be approved.

8. Compensate Proposal

The final step involves the victim filling out a Know Your Customer (KYC) form. The victim must provide legal documentation proving their identity and sign certified documents under penalty of perjury, attesting to the accuracy of their provided testimony and data.

A compensate proposal is submitted to the blockchain to pay back the funds to the victim. If initiated by a user, the proposal requires 100 NRG as collateral. The proposal requires 10% positive vote from all masternodes. If and when all the prerequisites are met, the funds will be returned to the legitimate owner.

9. Conclusion

The Energi Bureau of Investigations (EBI) Compromise Wallet Resolution process ensures a systematic and comprehensive approach to address compromised wallet incidents within the Energi network. By incorporating victim reporting, claim validation, masternode voting, evidence collection, drain proposal submission, and necessary KYC processes, EBI strives to provide fair and secure resolution for victims of wallet compromises.