Node Protocol#
This section describes the processing algorithm for Ergo modifiers in all security modes, consensus-critical validation rules that every node in the network should perform and the P2P Protocol and peer management
This section describes the processing algorithm for Ergo modifiers in all security modes, consensus-critical validation rules that every node in the network should perform and the P2P Protocol and peer management