Security
Given there are more than ½*N+1 validators are honest, PoA based networks usually work securely and properly. However, there are still cases where a certain amount Byzantine validators may still manage to attack the network, e.g. through Clone Attack. CTC Chain does introduce Slashing logic to penalize Byzantine validators for double signing or inavailability. This Slashing logic will expose the malicious validators in a very short time and make the "Clone Attack" very hard or extremely non-beneficial to execute.