March 29, 2024

Screenshots of the Ethereum 2.0 deposit contract interface got into the network

Ethereum 2.0 Deposit Contract Interface Prototype Step-by-Step Description of the Validator Accession Processto the Proof-of-Stake-network Beacon Chain, was posted in the public domain. Published his team Deep Work Studio, preparing the broadcast for the transition to a new system.

At the beginning of the process is information on the current amount of ether contributed for staking and the total number of coins needed to launch the mainnet.

Screenshots of the Ethereum 2.0 deposit contract interface got into the network

</p>

The classification of interest rates for PoS validators is also given.

Screenshots of the Ethereum 2.0 deposit contract interface got into the network

</p>

This is followed by information on generating a key pair for various operating systems.

Screenshots of the Ethereum 2.0 deposit contract interface got into the network

</p>

One of the keys is intended for validation of a network member as a steaker, the other corresponds to a cold wallet and is required to deposit funds (32 ETH) and obtain the corresponding status.

During the process, the user is warned about the risks of losing the mnemonic phrase, which entails the loss of funds.

Screenshots of the Ethereum 2.0 deposit contract interface got into the network

</p>

Next, you can select the number of createdvalidators, as well as download the client to run the node. At the end of the process, users are congratulated on the successful deposit of funds and offered to familiarize themselves with the current status of the network.

“This is an early prototype, Said Karl Bikheisen, researcher at the Ethereum Foundation. -There's still a lot of work to be done."

A report is expected at the end of this week.the results of the audit of Ethereum 2.0, and in April the launch of the multi-client test network should take place. The start of the deposit contract is expected in May, possibly during the Ethereal Summit in New York.

Recall in the course of a comprehensive auditEthereum 2.0 security was analyzed, in particular, for susceptibility to DoS attacks and susceptibility to resource abuse, which leads to unintentional hard forks.