Validators are a critical part of Ping’s decentralized infrastructure.
Ping’s architecture is built with strict data boundaries — validators never have access to user traffic or private content.
AVS operates strictly at the network level. It does not access or analyze user traffic. Its role is to maintain the integrity of the system without compromising privacy.
All reward and validation logic is transparent, verifiable, and executed on L2.
In early phases, validators are directly paid for securing the network. If a validator misbehaves and a majority confirms it, slashing is applied — burning part of their funds.