
Let’s assume that we are in phase 1, as the network grows in value, it could be easy and profitable for malicious actors to intimidate our 3 validators and/or their family members. In a worst case scenario, criminals could coordinate in a way in which every validator is attacked at the same time and thus these criminals would control the network. Furthermore, from their primary residence, validators can be followed and routines can be identified, which is enough for a criminal mind to predict the best time for an attack on the network.