SLP1 Protocol - An Overview
In case the DAG is too significant, this type of breadth initially research is usually truncated at a wanted depth at which point proxy results can be utilised (see Transaction Validation Protection Product).It'll then use consensus and validation to filter out invalid "sound" or phony token transactions and collate the legitimate success appropria