Validators are critical for maintaining the integrity, value, and trustworthiness of data within the network. Depending on the DLP's architecture, different validators may be required.
TEE Validators - the recommended approach, a group of confidential validators that can perform validation for any DLP
DLP Validators - a group of validators specific to a DLP, useful when TEE validators cannot be used
No Validators - some DLPs may not require validators at all
For most DLPs, TEE Validators are the way to go. They offer a simpler DLP architecture, one where DLPs focus on building out their proof-of-contribution. TEE Validators are DLP agnostic and can run PoC from any DLP.
In specific instances, when running PoC is not possible within the limits of the TEE Validators, a DLP can opt to deploy its own network of DLP validators.
Some DLPs may not require validators; for example, a DLP that generates the proof-of-contribution entirely on the client side using ZK Proofs.