EnglishEnglish中文中文اَلْعَرَبِيَّةُاَلْعَرَبِيَّةُDeutschDeutschEspañolEspañolΕλληνικάΕλληνικάFrançaisFrançaisעִבְרִיתעִבְרִיתहिन्दीहिन्दीHrvatskiHrvatskiItalianoItaliano日本語日本語한국어한국어MalayMalayNederlandsNederlandsPortuguêsPortuguêsрусскийрусскийภาษาไทยภาษาไทยTürkTürkTiếng ViệtTiếng Việt粵語粵語
Learn
FAQs
Frequently asked questions by various stakeholders
Why Classic?
Start here to get the lowdown on Ethereum Classic's reason for being and unique value proposition
Knowledge
Further reading on the foundations that underpin ETC
Videos
A collection of videos and podcasts to keep you informed on ETC concepts and happenings
Support ETC by helping to translate this website!
Ethereum Classic Blog

Why You Should LOVE Proof Of Stake Systems — Hybrids!

Christian Seberino
Apps, Development, Education, Mining

0TCSJ3Q0BMHx5tF8E

Proof of work systems are widely used and have been thoroughly scrutinized. There is concern that funds will be at risk if proof of work systems are replaced with proof of stake systems. Fortunately, proof of stake systems can improve security rather than threatening it!

Proof Of Stake

0mf8PsX4EY9YMwj61

In proof of work systems, volunteers assist in the creation and validation of new blocks. Rewards are proportional to the amount of computing resources contributed to the process. There are built in disincentives for acting maliciously or foolishly. For example, contributing computing resources to losing chains will lead to financial losses.

Proof of stake systems attempt to keep the benefits of proof of work systems while eliminating the problems. There are multiple varieties and much ongoing research. Volunteers still assist in the creation and validation of new blocks. Rewards are proportional to the amount of funds (stakes) temporarily placed in escrow. There are still built in disincentives for acting maliciously or foolishly. For example, some systems confiscate escrowed funds if volunteers simultaneously work on multiple chains.

Benefits

0o3cDS0DXPCsQa75m

Proof of stake systems can strengthen proof of work systems rather than replacing them. They can simply add additional steps to the process of approving candidate blocks. This is analogous to adding a second lock on a door. Additional protections are welcome because proof of work systems are vulnerable to participants who control a majority of the computing resources. This can lead to 51% attacks:

"[A] mining pool — an association of people who own specialized hardware that produces Bitcoins by running specific mathematical operations — gained a 51 percent share of computing power used in currency production. That gave it the power to reverse transactions, to pay twice with the same Bitcoins, and to delay or even cancel other people’s transactions. The pool was GHash.io, run by a secretive U.K.-incorporated outfit called CEX.io"

Bloomberg, July 17, 2014

and

"I am Chandler Guo, a 51% attack on Ethereum Classic (ETC) is coming with my 98G hashrate. This is roughly 3 times [the] current ETC network hashrate. This is an action to against Poloniex’s decision to support ETC."

Cointelegraph, July 24, 2016

Such attacks might not be possible with proof of stake system additions.

Concerns

0O ngdM tp4uzOFvA

It is possible that vulnerabilities might be found in proof of stake systems. Although combining proof of work and proof of stake systems would likely be beneficial, there might still be problems. This is analogous to losing the key to a second door lock. Multiple door locks provide additional security, but, they also increase the chances of denying yourself access.

Conclusion

0DOkdlqd73UHBDWZj

Proof of stake systems do not necessarily have to eliminate proof of work systems. Blockchain systems can simultaneously juggle security and innovation.

Feedback

You can contact me by clicking any of these icons:

0cB1Yj6Xct58IQ8vE

0ofPrim7g7Z4s8MyC

0pInE9rfjbCmZujdP

Acknowledgments

I would like to thank IOHK (Input Output Hong Kong) for funding this effort.

License

0GohSlN8oSGd FcXX

This work is licensed under the Creative Commons Attribution ShareAlike 4.0 International License.

This page exists thanks in part to the following contributors:


cseberino
cseberino
  • EnglishEnglish
  • 中文中文
  • اَلْعَرَبِيَّةُاَلْعَرَبِيَّةُ
  • DeutschDeutsch
  • EspañolEspañol
  • ΕλληνικάΕλληνικά
  • FrançaisFrançais
  • עִבְרִיתעִבְרִית
  • हिन्दीहिन्दी
  • HrvatskiHrvatski
  • ItalianoItaliano
  • 日本語日本語
  • 한국어한국어
  • MalayMalay
  • NederlandsNederlands
  • PortuguêsPortuguês
  • русскийрусский
  • ภาษาไทยภาษาไทย
  • TürkTürk
  • Tiếng ViệtTiếng Việt
  • 粵語粵語
Add ETC to MetaMask
The ETC community is active on Discord
Discord
Discord
eth_classic Twitter
eth_classic Twitter
ETC_Network Twitter
ETC_Network Twitter
Github
Github
ETC Labs Github
ETC Labs Github
Reddit
Reddit
This site is powered by Netlify

Learn

  • FAQs
  • Why Classic?
  • Knowledge
  • Videos

Made with <3 for the Original Ethereum Vision

The content on this website is user-generated and solely for informational purposes. Do not interpret any content as an endorsement of any product or service. There's "no official anything" in Ethereum Classic. Always do your own research, and remember: don't trust, verify!