Proof of Stake (PoS)
Snapshot
- How PoS Addresses Mining power
- Network Attack Risks
The Proof of Stake (PoS) is a concept in which a user can validate block transactions or can mine based on the number of crypto coins they have; meaning more the coin, more the mining power. The PoS was created as an answer to the problems faced with the Proof of Work (PoW) consensus protocol. Issues related to scalability and environmental sustainability were addressed through PoS.
How PoS Addresses Mining power
The PoW algorithm requires huge energy for mining and also leaves a significant amount of carbon footprint. Bitcoin Energy Consumption Index has estimated that the Bitcoin network consumes 201.89 terawatt-hours per year.
As per a study earlier this year, it was identified that with the increase in the prices of Bitcoin there also has been an increase in the power requirement by the Bitcoin network. An increase in prices has made mining Bitcoin a favorable and more valuable proposition. This has created competition among the miners, as to who will mine more, incentivizing them to spend more on hardware and electricity.
This problem was solved by PoS, as in PoS, staking was done for computational power, and a miner was only able to mine based on the stakes owned. This led to a huge reduction in power consumption for mining.
“Peercoin” was the first cryptocurrency that adopted the PoS method, followed by Blackcoin, Nxt, and ShadowCoin.
Network Attack Risks
In the PoW system, like Bitcoin, it is vulnerable to Tragedy of Commons. In the Tragedy of Commons, sometime in the future, very few Bitcoin miners will be left because of very less or no block reward from mining. Even the fee earned from transactions will diminish as users will pay fewer transaction fees.
In such a situation, with fewer miners left, the network will be vulnerable to 51% attacks. A 51% attack is when a group of miners having 51% of the computational power on the crypto network will use it to create fraudulent blocks of transactions for themselves and will invalidate any other transactions on the network.
Whereas in the case of PoS, an attacker will be required to buy 51% of the cryptocurrency to carry out a 51% attack. For an attacker, who has 51% of the cryptocurrency, it will be very disadvantageous to carry out the attack. Also, acquiring 51% of the cryptocurrency will be very difficult and expensive.
If there is a fall in the prices of the cryptocurrency, there is also a fall in the value of holdings of the investor, so all the investors will be incentivized to ensure that the network is completely secure.
Cryptocurrencies like Bitcoin and Litecoin (LTC) are using the PoW method. The PoS method is used by cryptocurrencies like Cardano (ADA), Algorand (ALGO), Tezos (XTZ), and many more.
Disclaimer: The article should not be considered as any financial advice. It is advisable to conduct thorough research before investing.
Photo by – Tumisu on Pixabay