diff --git a/src/pages/developers/architecture/privileged.mdx b/src/pages/developers/architecture/privileged.mdx index 5cec4dae..685616a2 100644 --- a/src/pages/developers/architecture/privileged.mdx +++ b/src/pages/developers/architecture/privileged.mdx @@ -19,14 +19,14 @@ policy account has an admin, an address and a decision policy (threshold of votes, voting period, etc.). The group mechanism on ZetaChain is powered by the [`group` Cosmos SDK -module](https://docs.cosmos.network/v0.46/modules/group/). +module](https://docs.cosmos.network/v0.50/modules/group/). ZetaChain can have any number of groups. Anyone can create a group. In this document we only consider policy accounts that give authorization to perform privileged actions. These "special" policy accounts are defined in the [params of of the observer -module](https://zetachain-athens.blockpi.network/lcd/v1/public/zeta-chain/observer/params). +module](https://zetachain-athens.blockpi.network/lcd/v1/public/zeta-chain/authority/policies). These policy accounts are set during genesis and as any module parameter they can be changed through governance. This is important, because even though the protocol has a notion of admins and privileged policy accounts, they are chosen @@ -40,11 +40,11 @@ module documentation and look for "Authorized" notice next to each message. {" "} - Notice that policy accounts below are called "Group1" and "Group2". These are just names that indicate the level of permissions - and are not related to the actual groups associated with policy accounts. As you can see in testnet there are two entries - ("Group1" and "Group2") and both point to the same policy account. This means that right now even though there are two - levels of permissions ("Group1" and "Group2") there is only one policy account that is authorized to perform privileged - actions. On mainnet this might change.{" "} + Notice that policy accounts below are called "groupEmergency", "groupOperational", "groupAdmin". These are just names that indicate the level of + permissions and are not related to the actual groups associated with policy accounts. As you can see in testnet there are three entries + that both point to the same policy account. This means that right now even though there are three + levels of permissions ("groupEmergency", "groupOperational", "groupAdmin") there is only one policy account that is authorized to perform + privileged actions. {" "}