What is typical of this story about computer systems is that computers are the generals and their digital communication system links that are the messengers. Although the problem is formulated by analogy as a decision and security problem, it cannot be solved in electronics by cryptographic digital signatures, as errors can spread like false tensions through the encryption process. As a result, one component may appear defective for one component and defective for another, thus preventing a consensus on whether the component is defective or not. A note from Anthony: If you haven`t done so yet, please read the article “Gaining clarity on key terminology: Bitcoin versus Blockchain versus Technology Distributed Ledger” and “Consensus Explained.” If you are not yet aware of this area, these articles provide a useful context. To make the interactive problem of coherence more understandable, Lamport has developed a colorful allegory in which a group of army geneticists formulates a plan to attack a city. In the original version, the generals were designated as commanders of the Albanian army. The name was changed and eventually placed in “Byzantine,” on Jack Goldberg`s proposal, to make any possible insult safe for the future.  This formulation of the problem, along with some additional findings, were presented by the same authors in their 1982 paper “The Byzantine Generals Problem.”  Some aircraft systems such as boeing 777 Aircraft`s information management system (via its ARINC 659 SAFEbus network)  use the Boeing 777 flight control system and Boeing 787 flight control systems use the Byzantine margin of error; Because these are real-time systems, Byzantine error-tolerance solutions must have very low latency. For example, SAFEbus may obtain a Byzantine margin of error in the order of an additional latency microsecond. The problem of Byzantine generals is the most commonly used analogy to illustrate the consensus requirement for distributional ledger technology (DLT). Byzantine errors are considered the most common and difficult class of errors among error modes. The Fail-Stop-Fail mode takes the simplest end of the spectrum. While fail-stop error mode simply means that the only way to reach the defect is a node crash detected by other nodes, Byzantine errors do not involve constraints, meaning that the undone node can generate any data, including data that make it appear as a functional node.
Thus, Byzantine errors can confuse error detection systems, making the margin of error more difficult. Despite the analogy, a Byzantine failure is not necessarily a security problem with hostile human interventions: it can be the result of electrical or software errors. Several system architectures were designed around 1980, implementing the Byzantine margin of error. These include the “Draper s FTMP”, Honeywells MMFCS, and sri`s SIFT.  It can also be relaxed in a more “realistic” problem where faulty components do not assemble to attract others into an error. It is in this state of mind that practical algorithms have been developed.