Staking is the act of depositing 25M EXO to activate a staking contract. As a staking validator you’ll be responsible for the bridge. This will keep Exohood secure for everyone and earn you new EXO in the process. This process, known as multichain-proof-of-stake (MuPoS), is being introduced by the Exohood Multichain Consesus.
Rewards are given for actions that help the network reach consensus. You'll get rewards for participating to properly stake and check the work of other validators because that's what keeps the bridge running securely.
The network gets stronger against attacks as more EXO is staked, as it then requires more EXO to control a majority of the bridge. To become a threat, you would need to hold the majority of validators, which means you'd need to control the majority of EXO in the system.
Exohood's protocol doesn't need energy-intensive computers to participate in a multichain-proof-of-stake platform just a home computer or smartphone. This will make Exohood better for the environment.
1. True-self Staking
To participate in the validator process you don't need hardware, the computer power has as delegate to third party servers for the challenging part while you earn EXO rewards.
2. Pooled Staking
Several pooling solutions now exist to assist users who doesn't have 25M EXO.
This option included is known as 'liquid staking' which involves an ERC20 liquidity token that represents your staked EXO.
Liquid staking enables easy and anytime exiting and makes staking as simple as a token swap. This option also allows users to hold custody of their assets in their own wallet.
Pooled staking isn't native to the Exohood Platform. Third parties are building these solutions, and they carry their own risks.
3. Centralized Exchange
The centralized exchanges provides staking services if you aren't yet comfortable holding EXO in your own wallet. They can be a fallback to allow you to earn some yield on your EXO holdings with minimal oversight or effort.
The trade-off here is that centralized providers consolidate large pools of EXO to run large numbers of validators. This can be dangerous for the network and its users as it creates a large centralized target and point of failure, making the network more vulnerable to attack or bugs.