Proof of…Tank?
One such solution is proof of stake (PoS), which utilizes a miner’s ‘stake’ in the platform. This is based on the ownership of coins/tokens or the length of time as a miner — which is then randomized. Upon block validation, miners are then rewarded in a similar way as with PoW. Proponents have argued that this type of validation system would eliminate many of the problems associated with PoW. For example, the cost of energy to create a block would drop drastically. Furthermore, the risk of a 51-percent attack, like the recent ETC attack, would end completely. While it may seem to be functionally similar, this model does not have the same level of research as the original Bitcoin PoW protocol does. For this reason, many within the crypto community are beginning to reject the concept as faulty.Simply understanding the PoW protocol and seeking to replace the key component of the equation is not a solution for the best management of validation. Instead, this leaves the blockchain open to a number of major weaknesses which are just now being explored.Replacing PoW with PoS is like thinking a tank has the attributes of a tank because of its shape, then replacing the armor with paper, and rolling off to war.
— Samson Mow (@Excellion) January 23, 2019
Problems on the rise
The weaknesses in a PoS system have not had the time to be fully considered. Almost immediately, detractors have pointed out that a PoS protocol would allow miners to follow any number of chain histories — because nothing is risked. Called the ‘nothing at stake’ problem, this failure would ultimately make consensus on the chain impossible. However, PoS devotees have argued that this problem could be easily solved with some protocol adjustments. Still, there are more problems surfacing.There are at least three different new vulnerabilities that are possible.I've been pointing out for awhile that while PoS proponents often claim without explanation that PoS is a scalability improvement, it's obviously much easier to scale PoW because checking PoW is cheap.
— Peter Todd (@peterktodd) January 23, 2019
This attack is a perfect example of that problem.
https://t.co/A1f0Uiu70b
- The first is a vulnerability on an individual node that requires no stake whatsoever.
- The second is a variation of the first, which allows an attacker to create ‘apparent stake’ — while not actually having any stake.
- The third allows an attacker to falsely amplify their stake with self-spends in order to arbitrarily save falsified numbers onto individual victim nodes.
Disclaimer
In adherence to the Trust Project guidelines, BeInCrypto is committed to unbiased, transparent reporting. This news article aims to provide accurate, timely information. However, readers are advised to verify facts independently and consult with a professional before making any decisions based on this content. Please note that our Terms and Conditions, Privacy Policy, and Disclaimers have been updated.