Individuals with a conflict of interest, particularly those representing the subject of the article, are strongly advised not to directly edit the article. See Wikipedia:Conflict of interest. You may request corrections or suggest content here on the Talk page for independent editors to review, or contact us if the issue is urgent. |
WARNING: ACTIVE COMMUNITY SANCTIONS The article Proof of stake, along with other pages relating to blockchain and cryptocurrencies, is designated by the community as a contentious topic. The current restrictions are:
Editors who repeatedly or seriously fail to adhere to the purpose of Wikipedia, any expected standards of behaviour, or any normal editorial process may be sanctioned.
|
This article is rated Start-class on Wikipedia's
content assessment scale. It is of interest to the following WikiProjects: | |||||||||||||||||||||||||||||||||||||||||||||||||||||
|
> The biggest proof-of-stake blockchain by market capitalization is Cardano
This isn't the best information to have at the top paragraph, because first, it's factually incorrect as of date (Solana has higher market cap than Cardano): https://web.archive.org/web/20211128014524/https://coinmarketcap.com/), second, it's not a good idea to put something that's subject to constant change at the top paragraph in such a hype-driven market. It reads like an ad piece currently. Ssg ( talk) 18:01, 28 November 2021 (UTC)
From Peercoin:
Limited release rate plus 1% decentralized inflation due to the proof-of-stake system
This article should explain why proof-of-stake means inflation to the cryptocurrency.
-- PabloCastellano ( talk) 21:31, 2 December 2013 (UTC)
TheJediMaster777 ( talk) 10:36, 20 December 2013 (UTC)
I've simplified the article drastically. I removed references to Yacoin, because it is not a notable coin yet. I removed the section on the implementation details of Novacoin, because that's too technical, and if readers want to learn more they can read up on Novacoin. The point of my changes is to easily introduce the concept of Proof of Stake, which can be done simply by comparing it to Bitcoin's Proof of Work implementation and showing the example of Peercoin. -- Philosophistry ( talk) 17:28, 29 December 2013 (UTC)
I would prefer a discussion about the sweeping deletions first before they are redone. The references for example were useful - and people like Buterin are well known and respected. There is little other qualified research to find at this point in time. I reformulated the other passages so that the criticism is taken into account - that's better than deleting them, else the other text was pointless (i.e. why mention POW if you don't mention what's different with POS) - Thomas ( talk) 23:23, 6 February 2015 (UTC)
The following was added today and is unsourced. Needs to be sourced and copyedited to be supported by sources before it is added back.
In order to encourage and reward active and consistent staking to the network, we will take this maximal potential annual inflationary rate and lock it in as the actual annual Proof-of-Stake-Participation inflationary rate. Meaning that CryptoBullion will inflate at a rate of 2% each year through PoSP, regardless of how many coins are staked. I.e. If only 10% of the supply of CBX is staking, then that subset of the overall supply can expect 10x higher interest (or 20% annually), as they will earn the unclaimed stake from non-staked CBX in addition to their own interest potential. CBX owners will have the choice to earn interest by staking their funds and providing a protective service to the network or they can opt not to stake and forfeit their earnings potential to those who are providing a protective service.
- Jytdog ( talk) 21:13, 8 May 2016 (UTC)
It is not true that Proof of Stake is cost less. It has the time cost of money. That is, the cost of maintaining cash balances instead of other assets. To say that it is cost less and to implement technological solutions based on the premise that it is cost less denotes an absolute lack of financial and economic knowledge. It is simply nonsense to say that PoS is cost less. There is no argument to defend it, it is a financial absurdity. — Preceding unsigned comment added by Pablompa ( talk • contribs) 10:23, 28 April 2017 (UTC)
"It has the time cost of money. That is, the cost of maintaining cash balances instead of other assets." This is absurd and is indicative of a lack of understanding of PoS, or the author has another agenda. — Preceding unsigned comment added by Wmoore1131 ( talk • contribs) 02:27, 24 March 2020 (UTC)
There were three list items describing hybrid proof of stake / proof of burn; with my edit there are now two. Did I erroneously merge two distinct list items? If so, names of currencies or implementations should be cited for the original disparate implementations. RichardAlexanderHall ( talk) 18:14, 14 July 2017 (UTC)
It's probably one of the most prominent coins that claim to be PoS today, even though it's built on the bitcoin blockchain. It is a case relevant to the article but not yet included. Imagine Reason ( talk) 04:44, 10 March 2018 (UTC)
I think it's pretty obvious what the problem is regarding these edits, but for clarity I'll spell it out here.
Involved, unreliable sources should only be used in very limited cases. Wikipedia has a strong preference for independent sources. Additionally, crypto still has not developed a clean, reliable outlet for niche journalism, so many of these are some blurry mix of involved sources and unreliable churnalism. Avoid white papers. Avoid biz-blogs. Avoid press releases or disguised press releases. Summarize what reliable sources say, and any opinion should be clearly attributed based on coverage in a reliable source. Grayfell ( talk) 06:42, 24 November 2018 (UTC)
Guys, could you please cite what's wrong with each of the refs tagged? The edit tagging them, in addition to citing some sources as "unreliable", also called some "primary". The edit did too much in one swoop for that reason alone. Additionally, calling a ref unreliable is often a matter of opinion, in some cases it's a matter of policy, but in any case each needs explanation individually. That shouldn't be too hard for you (two?) given your demonstrated level of interest.
Regarding primary sources, they aren't actually prohibited, they just can't be used to used to establish notability. A primary source does no actual harm, unless it's situated in a way that gives the false-appearance of justification of notability. If the items addressed are not includable because of actual non-notability, then please address that instead of tagging a source as primary.
67.248.17.85 (
talk) 19:56, 25 November 2018 (UTC)
Wikipedia currently cite Playboy (naked-women magazine) as reliable, whereas most UK press unreliable. No press has ever been free. Owners, Editors mean centralized bias. In the UK, you take a number of differing views, and decide yourself who to believe. There is censorship, even on Wikipedia. I think sometimes Wikipedia tries to be a Holy-Grail project of absolute-truth(s). You could equally be arguing Classical Physics versus Quantum-mechanics, but history is now on the side of the science of various shades of grey. I am unsure whether hypothetical Playboy Pam from Pomerana really has a degree in archaeology, and served in US peace-corps, since she is difficult to recognize, draped over a sports-car. As a student, I shared digs with a guy whose dad was a writer, but begrudgingly earnt his living writing such blurb. Proper journalism is a dying-art (as ad revenue goes online), so now filled by volunteers and hacktivists (who have other jobs). Seems to me that David Gerard (if the same guy), is a kind of a crypto-journalistic source, your editors wanted ~ 'Attack of the 50 foot blockchain' and 'Libra Shrugged: How Facebook tried to take over The Money'. https://davidgerard.co.uk . Instead, they threw his contributions in the bin too. What is important is that 'review' is allowed to flourish, and editors do not merely act like God(s). However, I did recently have to moan at Daily Mail for a lazy article implying Britain had been at war with German. An obvious typo missing off the 'y', but given millions who died, maybe Playboy should be given a pulitzer-prize... We are in an electronic-age, where source-references frequently change, revise, and maybe correction / debate is better than outright reversal (counter-)vandalism. The top 25 crytpo-currencies each have more than a billion dollars market-capitalisation. For me that is notable. A bitcoin is between $10-20K, whereas most are a fraction of that, sometimes cents ~ but collectively huge. Notable crypto-currencies should have their own pages, rather than crammed into Proof of Work, Proof of Stake etc pages. I am more concerned about crypto lack of transparent software progress / peer-review ~ than anything an unqualified editor may have. Some like Bona' appear to be Systems Admins on university IT systems, but I would not rate their editorialship any higher than any other IT Admin / Software developer, or indeed mathematician etc. Some of these crypto-currencies are niche, and will have therefore vested interests / conflicts of interest, even on a academic level. I would urge generalist pages link to niche cryptocurrency pages, where such low level slanging matches can take place; and the reader can make their own mind up, without adjective wars... Freedom of Speech and Publication are important matters for Civilization... agree to disagree, in neutral balance, rather than become reasonably accused of 'political' dictat... https://www.pressgazette.co.uk/wikipedia-ban-condemned-by-daily-mail-as-cynical-politically-motivated-attempt-to-stifle-the-free-press/ and https://www.youtube.com/watch?v=EkOnYhZuWHE appears to me to be news-worthy, since Wikipedia called out on an unbalanced stance on crypto ;-) - User:BillCaxton ( talk) 15:41, 17 November 2020 (GMT)
Hi guys. That "too-close-to-source" tag is problematic because there are no specifics. Exactly which editors are considered by you as being too close, and why? You really need to provide some good argument instead of the non-specific over-broad "somebody out there, I'm not saying whom, is a bad actor" accusation. I'm opening up this space for you to document it. Please. Surely you must have some ideas as to who is whom and why he/she is too close. We need to get that written down here to be able to justify a tag. If we can agree on your arguments and evidence, we can add the tag back! :-) 67.248.17.85 ( talk) 19:10, 25 November 2018 (UTC)
There is a move discussion in progress on Talk:Proof-of-work system which affects this page. Please participate on that page and not in this talk page section. Thank you. — RMCD bot 04:29, 2 June 2019 (UTC)
Surely there are peer-reviewed academic sources, at the least, for such a key concept - David Gerard ( talk) 10:09, 5 July 2019 (UTC)
I'm opening up this section to discuss what date should be on that "primary sources" tag. The tag is new, yet Gerard keeps setting the date on it to August 2016 without explanation. I've already given a bunch of explanation in the edit summaries as to why it should be "October 2019". Is there any reason it should be "August 2016"? Please help! 67.248.17.85 ( talk) 20:46, 26 October 2019 (UTC)
May I suggest Cardano get a mention in a POS article? The single most cited proof of stake paper can't be included in the PoS article!? The user 'Bonadea' continually deleted edits and claims the content is contested by who I'm not sure.
Cardano's Ouroboros[14] is the first proof of stake protocol that has mathematically been shown to be provably secure, and the first to have gone through peer review through its acceptance to Crypto 2017, the leading cryptography conference. The level of security demonstrated by Ouroboros compares to that of Bitcoin’s blockchain, which has never been compromised. Cardano have deferred to a formal methods approach with high assurance code. Cardano's diligent research is available to read in over 60 peer-reviewed whitepapers[15]. While the project has met with some delays, the innovative features such as Extended UTXO and Hydra[16] lend credibility to it's claim to be a 3rd generation cryptocurrency. Cardano addresses (scalability, interoperability, sustainability) challenges which have derailed many other projects in the space.
https://link.springer.com/chapter/10.1007/978-3-319-63688-7_12 — Preceding unsigned comment added by Johnnygreeney ( talk • contribs) 15:32, 24 March 2020 (UTC) "Ouroboros". Cardano. Retrieved 2020-03-24. "Research papers - IOHK Research". IOHK. Retrieved 2020-03-24. cardanians.io (2020-03-19). "Hydra: Cardano scalability solution". Medium. Retrieved 2020-03-24.
Johnnygreeney ( talk) 15:10, 24 March 2020 (UTC)
I was just coming here to say "wow, this is the worst-referenced Cardano spam being added to the article". Charles Hoskinson from Cardano put up a video call-to-action today; as such, I'm putting this article under extended-confirmed under WP:GS/Crypto. Any admin who disagrees, feel free to reverse - David Gerard ( talk) 02:27, 25 March 2020 (UTC)
Strictly speaking, proof of stake is not a consensus algorithm but a Sybil-resistance mechanism. Its primary purpose is to define the identities of participants in a protocol. However, there are multiple blockchain protocols (based on so-called Nakamoto consensus) which use PoS in place of proofs of work. In order to do this, it is necessary to make further design decisions which leads to an entire class of proof-of-stake blockchain consensus mechanisms. This is what people generally refer to when speaking of PoS being a consensus mechanism, as is stated currently in the first sentence of the article.
Classical (pre-blockchain) consensus protocols rely on a fixed list of participants which is common knowledge for everyone running the protocol. Therefore, most of these algorithms are based on majority votes. On the other hand, proof-of-work based blockchain protocols do not require a list of known participants. Instead, they rely on a lottery (based on miners computing proofs of work) for the right to create a new block. Proofs of stake can be used in the former (where the list of coins substitutes the list of identities) [1] or the latter [2] [3], where coins are used as the base for the lottery. Additionally, proposals for Ethereum attempt to use proof-of-stake as an addition to proof-of-work to achieve finality [4]. While seemingly different, this example falls into the former case, where stake is used primarily to determine a set of validators.
Additionally, the current distinction between "Block selection variants" is artificial, as the "Coin age-based selection" is simply a case of "Randomized block selection" but with additional parameters (the age of the coin makes the probability higher). Additionally, the choice of coins to exemplify this is strange, as this is the only mention of BlackCoin in Wikipedia that I could find and Firefox flags NXT's website as dangerous. While it is true that there is no PoS project that is notable outside of cryptocurrency circles (or is notable for negative reasons, as is the case of EOS), there must be something better to exemplify this (or alternatively bring into question the notability of this article).
I only reference papers that have been presented in the top conferences for their area or are notable because of their author, as is the case for Turing award-winner Silvio Micali with Algorand. The Ouroboros protocol has been presented in top cryptography [5] [6] ( IACR) and computer security [7] ( ACM) conferences and is considered state-of-the-art in cryptographic academic circles. The Cardano blockchain is created/maintained by a foundation that also employs many of the academics involved in Ouroboros and has claimed it as the basis for its protocol since its inception, although at the current moment this is not the case. The Sleepy family of consensus protocols has been presented in ASIACRYPT [8].
All of these analyses, however, are heavily abstracted and rely on an honesty majority assumption. Such an assumption is common in the field of cryptography, especially Secure multi-party computation, but by definition does not take into account economic or "rational' incentives". This means that "mathematically-proven" secure, which is a very common claim, comes with many caveats and must not be taken at face value. Incentive analysis of proof-of-stake protocols exists, but I am not too familiar with it. Animyr ( talk) 22:36, 25 March 2020 (UTC)
References
The Cardano paragraph is overly promotional and inappropriate for an encyclopedia. There also appears to be undisclosed COI by several accounts trying to re-add the content to the article without trying to come to a consensus on what is appropriate. This leads into WP:SOCK territory. Please have a civil discussion on the talk page here before trying to add that content back to the article. Please take some time to understand how Wikipedia works and what the editors here are trying to build. If the re-written content is appropriate and conforms to Wikipedia's WP:RS, I am happy to work with the new editors and add appropriate and relevant content to improve the page. ---- Molochmeditates ( talk) 23:42, 25 March 2020 (UTC)
cited by MITis almost completely meaningless, as is being hosted on a government website. Reliability is determined by a reputation for accuracy and fact checking, usually indicated by a strong track-record of editorial oversight, corrections, and things like that. Good, legitimate peer review would be a plus, but "appear review" is a problem in many fields, especially crypto, so it's not an assumption we can take for granted.
References
{{
cite web}}
: Missing or empty |title=
(
help)
this source, but that's not the only problem. Before we can discuss whether or not a source should be used, we have to figure out what it's going to be used for. Figure out what reliable, independent sources are saying, and then propose a specific change based on those reliable sources.
VerusCoin's 50% Proof of Stake protocol uses the "Stake Guard" crypto-condition, a form of smart transaction that enables conditional transaction validation using an implementation of the Crypto-Condition IETF draft, to penalize double-staking of the same UTXO on two fork versions of a chain. The Stake Guard algorithm is a decentralized activity, where mining and staking participants on the network can look for double-staking protocol violations and use the signed stake transaction for the coins in question on one of the chain forks as the authorization, or proof of violation, which allows them to spend the double staker’s reward on the main chain to their own address. — Preceding unsigned comment added by Oink1970 ( talk • contribs) 19:21, 17 May 2020 (UTC)
Using Wikipedia's own pages... (probably needs table-layout)... the 25 currencies listed here, are AS IMPORTANT as the other subjects (See Wars / Nuclear-Weapons). Maybe the most famous unknowns. Would I know from XYZ Corp? Yeah, but those has smaller annual-revenues! This is not a very general-public 'niche'.
Is it a space populated by spurious claim and counter-claim, probably. Any more so than football labelling a player 'crap' or not 'value for money'? I have no idea who Champions-League, Kylian Mbappe of Paris Saint-Germain is. He has Market-value of equivalent crypto-currency ranking, 219th. Which will break a leg (and be worth zero) first? Sometimes 'risk' is unavoidable ~ someone needs to play, and you need to be good to win trophies / leagues.
By (decreasing) Market Capitalisation, % of crypto-currencies, and comparison with Annual GDP (UN) of countries / Revenue of companies
Bitcoin is not quite at ~ GDP of Israel 32nd (90 nuclear weapons) is $370Bn. Bitcoin BTC is $310,587,319,501 or 66.0%, ~GDP of Columbia 38th / Chile 39th > GDP of Chile,Pakistan,Finland,Bangladesh,Egypt,Czech-Republic,Vietnam,Portugal,Romania,Peru,Greece,Iraq,Venezuela,New Zealand,Qatar,Algeria,Hungary,Kuwait...Ethiopia...(Many oil producing-states, notable International/Civil-Wars, or famines) ~ Revenue Saudi-Aramco > Revenue of Volkswagen, BP, Amazon, Toyota, Exxon, Apple... Samsung,AT&T,Alphabet/Google... General Motors, Microsoft...
Ethereum ETH is $52,587,881,990 or 10.5% ~ GDP Lithuania 82nd / Serbia 83rd > Revenue Caterpiller,Pfizer,American-Express,Merck/MSD,Oracle,Coca-Cola. Due to ERC20 token being on Ethereum, it is associated with many other crypto-currencies; so may be worth much more in terms of Annual GDP of a country.
Tether USDT is $17,956,103,024 or 3.6% ~ GDP of Laos 115th / Botswana 114th / North Korea 117th (30-40 nuclear weapons). Xrp XRP is $13,542,790,720 or 2.7% ~ GDP of Brunei 130th (I think this is called Ripple). Chainlink LINK is $4,997,964,439 or 1.0% ~ GDP Barbados 156th. Litecoin LTC is $4,824,900,868. Bitcoin Cash BCH is $4,662,622,386. Polkdot is DOT $4,218,937,933. Binance Coin BNB is $4,127,237,871.
Cardano ADA is $3,434,883,850 or 0.7% ~ GDP of Suriname 160th / Burundi 161st (this is the Crypto being 'suppressed' as some would argue). Suriname has a population of 575,990; whilst Burundi is 10,524,117. Does anyone know how many ADA holders? Even between Suriname and Burundi, there's a disparity in GDP per person.
Bitcoin SV (BSV) is $3,111,100,106. Usd Coin (USDC) is $2,802,331,393. Eos (EOS) is $2,539,355,639 or 0.51% ~ GDP of Timor' 166th / Lesotho 165th. Wrap'Bitcoin (WTBC) is $2,180,434,314. Monero (XMR) is $2,163,902,199. Tron (TRX) is $1,892,606,089 ~ GDP Belize 171st. Stellar (XLM) is $1,802,892,070. Tezos (XTZ) is $1,597,766,836. Crypto-Com (CRO) is $1,438,770,628. Unus Sed (LEO) is $1,294,305,684 or 0.26%. Nem (XEM) is $1,206,828,517. Neo (NEO) is $1,150,419,265 ~ GDP of Grenada 179th. Filecoin (FIL) is $1,071,556,057. Cosmos (ATOM) is $1,064,642,612. Dai (DAI) is $1,013,250,400 or 0.20% ~ GDP of 180th Country, St Kitts & Nevis (population 52,441).
Where do you set 'notable' for a Crypto-Currency market capitalisation?
Top25 > $1Bn? Top-5 > 1% Market-Share? Top-13 > 0.5% Market-Share? Top-20 > 0.25% Market-Share? Daily-Volume? Token Interchangeability (Technology stream)?
Music Singles were currently weekly Top40 listed, over many countries, over 70+ historical years. But which are 'classics' we all know? Maybe few hundreds to a thousand?
230-260 countries/ currencies; Similarly, there may be thousands of current Politicians, over 1-200 years democracy.
St.Kitts & Nevis ~ around 180th country, with a GDP of around $1Bn; has 4 politicians/heads listed.
25+ crypto-currencies with larger market-capitalisation than many smaller countries, suddenly doesn't seem so many to cover. Those growing, or holding market share / position would be more interesting; than those in decline. Maybe list as many as there are countries? St Kitts has 52,000 people, compared to how many holders of Dai?
As of 17th November 2020, on Coinmarketcap.com (one of a few listings), Bitcoin represents 66% of crypto-currency market capitalisation. The top 25 coins have more than $1Bn market capitalisation EACH; more than 8x industry average (notable). Bitcoin (BTC), in pole-position, has 2555x, whilst 10th coin, Cardano (ADA), has over 27x. Dai (DAI) is 25th, whilst Sologenic (SOLO) at 225th, is around the average market-cap, at $125-130m. Hacken Token (HAI) at 1213rd, has a market-cap just over $1m. At 2374th, Innovative Bioresearch combined worth is just $32; intending good-causes biomedical-research for HIV, cancer and COVID.
Apologies for a length 'rant', you guys all need heads knocking together, and come up with something agreed with editors! - User:BillCaxton ( talk) 20:19, 17 November 2020 (GMT)
I am almost loathe to post this because it seems improvements to this article are stymied by an ongoing edit war. I will refrain from editing directly, both because I don't think that'd be helpful to an ongoing edit war and also because there are COI concerns which I'd be subject to. I can try to list some specific criticisms:
Looking at this article, as something of an expert on Proof-of-Stake, I'm not sure what if anything in it is salvageable whatsoever. I'd frankly recommend a "scorched earth" strategy, discussing verifiable sources from which a new article can be constructed here on the talk page, and rebuild it from there after rough consensus of a new structure.
Here are a few tangible suggestions I have:
I'm sorry if this post comes off as overly harsh, and I would like to see it improved, but I'm not sure how to make forward progress here and I find the article completely awful and the edit war situation sapping any interest I have in contributing
Tarcieri ( talk) 21:22, 28 February 2021 (UTC)
Agreed. The current article is garbage.
Almost all good proof-of-stake protocols employ some flavor of BFT consensus, but there is absolutely no requirement to do so. There are proof-of-stake designs like Fantomette and Ouroborous Praos that provides only slow longest chain style assurances, like Bitcoin.
It's simply that once you have stronger proof-of-stake anti-Sibel properties then you'd likely add on some BFT consensus protocol, so that your chain can finalize transaction in seconds and communicate with other chains, instead of waiting hours and being isolated behind exchanges, like Bitcoin.
Also blockchain sharding designs de facto require proof-of-stake, but that's a more complex topic.
Another topic is locking and slashing: Industry proof-of-stake designs commonly lock staked coins for weeks and employ punishments for validator miss-behavior, aka slashing, with examples including polkadot, cosmos, etc., because doing so gives stronger security properties and improves performance. Academic designed "professor coins" avoid locks and slashing because slashing does not formalize well, but they pay large costs to do so.
Aside from financial stake, stake could be any measurable reputation notion or even personhood ala https://pop.dedis.ch
I'm also COI limited, so no direct contributions from me either. — Preceding unsigned comment added by 212.25.6.28 ( talk) 20:55, 1 March 2021 (UTC)
Proof-of-Stake methodology is often criticized for making the rich even richer, by rewarding them for merely sitting on a pile of "old money" cryptocoins - while the poor, who arrived later to the scene and have much less coins, become ever poorer as they receive next to no rewards and their few coins are continously diluted by the rich guys' ever-growing crypto wealth. Critics allege this scheme can only lead to a revolution, where the crypto-disenfranchised poor rise up eventually and roll the heads of elites... Yet, this current article doesn't discuss any such societal concerns. 188.143.6.238 ( talk) 20:14, 26 May 2021 (UTC)
Do we have a history of PoS?
The earliest thing I've found proposing PoS is topic=27787.0 on BitcoinTalk from 11 July 2011 (which I can't link here because of a spam filter). But obviously that's my own OR. Is there an RS cite to the origins of PoS? (I note also that that message actually proposes DPOS.) - David Gerard ( talk) 11:33, 29 May 2021 (UTC)
I put this article under permanent extended confirmed protection, under WP:GS/CRYPTO, in 2020. Vahurzpu suggested on my talk page that the protection level could be reduced, as the problem editors at the time haven't been seen in quite a while. How do others feel about the protection level? - David Gerard ( talk) 11:35, 29 May 2021 (UTC)
This edit request by an editor with a conflict of interest has now been answered. |
Pureplanet (
talk) 05:07, 19 July 2021 (UTC)
References
Also Medium is not a reliable source, so I didn't use it. Medium is a blogging site and anyone can post there. Lesliechin1 ( talk) 18:02, 23 July 2021 (UTC)
This
edit request has been answered. Set the |answered= or |ans= parameter to no to reactivate your request. |
There are some wrong POS definitions on this Wikipedia page. I have heard that there are some 'WikiPedia Politics' on this page but please correct the mistakes asap because people might lose money due to the misinformation laid out on this page.
1. Change the sentence from:
"Proof of stake (PoS) protocols are a class of consensus mechanisms for blockchains that work by selecting validators in proportion to their quantity of holdings in the associated cryptocurrency."
to
"Proof of stake (PoS) protocols are a class of Sybil Resistance Mechanisms used to prevent a Sybil Attack in blockchains that work by selecting validators in proportion to their quantity of holdings in the associated cryptocurrency."
2. Change all references that say Proof of Stake is a consensus protocol as it is a Sybil Resistance Mechanism.
References: I was unable to get any proper sources except this thread by Emin Sirer
The thread: https://twitter.com/el33th4xor/status/1006931658338177024 AryanSnow ( talk) 12:58, 23 July 2021 (UTC)
Hello Vahurzpu The Sybil resistance mention is too limiting; what about other types of attacks? eg https://iohk.io/en/blog/posts/2019/01/29/cardano-is-secure-against-fake-stake-attacks/ Papers you could consider referencing: https://eprint.iacr.org/2016/889.pdf "A natural alternative mechanism relies on the notion of “proof of stake” (PoS). Rather than miners investing computational resources in order to participate in the leader election process, they instead run a process that randomly selects one of them proportionally to the stake that each possesses according to the current blockchain ledger. In effect, this yields a self-referential blockchain discipline: maintaining the blockchain relies on the stakeholders themselves and assigns work to them (as well as rewards) based on the amount of stake that each possesses as reported in the ledger. Aside from this, the protocol should make no further “artificial” computational demands on the stakeholders." The above is from the Ouroboros paper (and I work for IOHK so you may feel there is a COI there). The Ouroboros paper references Bentov et al. ( https://arxiv.org/pdf/1406.5694.pdf): "Cryptocurrency protocols that attempt to avoid wasting physical scarce resources commonly rely on Proof of Stake, i.e., on mechanisms that give the decision-making power regarding the continuation of the ledger history to entities who possess coins within the system. The rationale behind Proof of Stake is that entities who hold stake in the system are well-suited to maintain its security, since their stake will diminish in value when the security of the system erodes. Therefore, in an analogous manner to Bitcoin, an individual stakeholder who possesses p fraction of the total amount of coins in circulation becomes eligible to create the next extension of the ledger with probability ≈ p." IOHKwriter ( talk) 14:47, 27 July 2021 (UTC)
Hi,
The article fails to mention long-range attacks. This is notable. As Vitalik Buterin, a noted proponent, writes ( https://vitalik.ca/general/2019/11/22/progress.html):
> Near the end of 2014, it became clear to the proof of stake community that some form of "weak subjectivity" is unavoidable. ... This was a difficult pill to swallow; many PoW advocates still cling to PoW ... PoS advocates, however, were willing to swallow the pill, seeing the added trust requirements as not being large.
(I am not using this as a reliable source. I am using this to informally establish that it is a notable claim. Note that it's the first thing he writes about proof of stake.)
I would thus like to request that the section Attacks be altered to mention this.
Here is a WP:RS documenting their existence:
https://ieeexplore.ieee.org/abstract/document/8653269
https://doi.org/10.1109/ACCESS.2019.2901858
Quote:
> As discussed, these attacks may not stem from the implementation of a specific protocol, but from its design, making it rather difficult to patch. Moreover, due to the nature of these attacks, the results maybe noticed only when it is too late.
Here is an informal discussion by a WP:NOTABLE proponent ( Vitalik Buterin):
https://blog.ethereum.org/2014/11/25/proof-stake-learned-love-weak-subjectivity/
Quote:
> Because of all the arguments above, we can safely conclude that this threat of an attacker building up a fork from arbitrarily long range is unfortunately fundamental, and in all non-degenerate implementations the issue is fatal to a proof of stake algorithm’s success in the proof of work security model. However, we can get around this fundamental barrier with a slight, but nevertheless fundamental, change in the security model.
The fact that PoS relies on a "different" security model has to be mentioned in the article.
Separately, I would also like to request that the template Template:Unbalanced (or possibly Template:Broaden or Template:Expert needed) be added. The following sections are especially problematic:
However, as others have noted, the article also needs a more detailed overview of criticisms. For an informal overview/list of such criticisms, "On Stake and Consensus" by Andrew Poelstra may be a good starting point:
https://download.wpsoftware.net/bitcoin/pos.pdf
Note: I am not suggesting that that article be used as a source, only as an overview for editors to find topics that may be relevant to try and find mentions of in WP:RS.
As the lacking quality of the article has been noted for a long time now, I believe it is long overdue for a tagging.
Thank you for your consideration. As I am restricted by COI myself, I will make no changes. — Preceding unsigned comment added by 203.210.102.68 ( talk) 12:53, 13 December 2021 (UTC)
The "Energy Consumption" section links to a paper (source #16) comparing Proof of Stake to Proof of Work. The text in the article says it finds a difference of about 3x in the worst case (i.e. when PoS is highly inefficient), but the actual paper states that the difference is 10^3. (My guess is that whoever added the summary misunderstood the chart, which is in log scale; but the paper's text explicitly states 10^3.)
I would just make the edit myself, but I don't have sufficient edits on my account. (I'm not a frequent contributor.)
(I realize that citing the paper directly isn't great anyway, since it's a primary source, but we should at least summarize it correctly if we're going to do so.)
BatmanAoD ( talk) 21:54, 30 January 2022 (UTC)
This
edit request has been answered. Set the |answered= or |ans= parameter to no to reactivate your request. |
Under the "Energy Consumption" heading, please change "...Bitcoin was about three times higher than..." to "...Bitcoin was about 1000 times higher than..."
As noted by BatmanAoD above, the current content of the Wikipedia article is very different from the referenced article.
Houeland ( talk) 21:15, 17 April 2022 (UTC)
Done PianoDan ( talk) 20:44, 20 April 2022 (UTC)
This
edit request has been answered. Set the |answered= or |ans= parameter to no to reactivate your request. |
Add a "Nominated Proof of Stake" category under "Variants"
Delegated Proof of Stake networks weigh validators by stake, oftentimes allowing the highest-stake validators to take disproportionate control of the network’s consensus protocol. Delegated PoS networks also require users to specify the amount they want to stake with a given validator. In Delegated Proof of Stake networks, delegators are not subject to loss of stake based on the behavior of the validator.
For Example,with Polkadot’s Nominated Proof of Stake, nominators select up to 16 validators they trust, and the network will automatically distribute the stake among validators in an even manner. Polkadot uses tools ranging from election theory to game theory to discrete optimization, to develop an efficient validator selection process that offers fair representation and security, thus avoiding uneven power and influence among validators. Another key difference in Polkadot's Nominated Proof-of-Stake in that nominators are subject to loss of stake if they nominate a bad validator.
source: https://polkadot.network/launch-npos/ and link to web3 foundation https://research.web3.foundation/en/latest/polkadot/NPoS/index.html Neidhardt1987 ( talk) 10:09, 9 February 2022 (UTC)
This
edit request has been answered. Set the |answered= or |ans= parameter to no to reactivate your request. |
Add Cosmos SDK (Tendermint) under the implementation section with the likes of Cardano etc.
The Cosmos SDK which was first pioneered with the ATOM coin and Cosmos HUB is a POS implementation which is used by nearly 40+ active cryptocurrencies, 3 of which are in the top 10 (CRO, BNB, LUNA). The cumulative market cap of all Cosmos based POS blockchains is only second to Ethereum and for such reasons should be listed. It leverages BFT (Byzantine fault-tolerant consensus) with Proof of Stake. JamesTheWright ( talk) 23:12, 18 February 2022 (UTC)
This
edit request has been answered. Set the |answered= or |ans= parameter to no to reactivate your request. |
Request to add a link back to /info/en/?search=Peercoin in the section that notes that Peercoin was the original PoS coin. Mwoliver ( talk) 18:06, 7 April 2022 (UTC)
Add a sentence in the abstract, to follow where it says that it is chosen due to its energy efficiency:
Although it is generally considered to be more centralized and less secure, some argue that with the latest advances, PoS has become more safe and more decentralized than PoW, while also offering greater scalability. Source: https://www.blocknative.com/blog/ethereum-merge-proof-of-stake Touftoufikas ( talk) 02:06, 27 February 2023 (UTC)
In the end of the description section, add the following text:
The first design, known as Byzantine Fault Tolerance (BFT), is based on fault tolerance mechanisms that allow the network to withstand up to a certain number of malicious actors or nodes. This design is typically used in permissioned blockchains, where the network is controlled by a limited number of participants who are known to each other. Source: https://www.researchgate.net/publication/226020071_Byzantine_Fault_Tolerance_from_Theory_to_Reality
The second design, known as Chain-based approaches, is based on the idea of using proof-of-work or proof-of-stake consensus algorithms to secure the network. In proof-of-work, miners compete to solve cryptographic puzzles and add new blocks to the chain. In proof-of-stake, validators are chosen to add new blocks to the chain based on the amount of cryptocurrency they hold and are willing to “stake” as collateral. Source: https://tselab.stanford.edu/downloads/PoS_LC_SBC2020.pdf&sa=U&ved=2ahUKEwib0fD4xbT9AhUobPEDHQ91CCAQFnoECAEQAg&usg=AOvVaw32QBJfxT2QKnzwOsrtqBZd
Both BFT-based and Chain-based approaches have their own advantages and disadvantages, and each design has been implemented in various blockchain projects. While BFT-based approaches provide a high degree of security and are well-suited for permissioned blockchains, they can be more complex to implement and require a high degree of coordination among network participants. Chain-based approaches, on the other hand, are more simple to implement and provide a high degree of security for permissionless blockchains, but may require a significant amount of computational power or stake to participate in the consensus process. Source: https://arxiv.org/pdf/2103.04234&sa=U&ved=2ahUKEwiq6971w7T9AhXiRPEDHUXYB9wQFnoECAgQAg&usg=AOvVaw130BaT5cc-77_uXASvxdkY
Gasper is a proof-of-stake consensus algorithm that was launched on the Ethereum network in September 2022. It is designed to combine the safety of BFT-based consensus algorithms with the dynamic availability of chain-based approaches. Source: https://arxiv.org/abs/2003.03052&sa=U&ved=2ahUKEwiJ4IvNxLT9AhU1SPEDHSPbB7YQFnoECAEQAg&usg=AOvVaw3Dzf63mccx8YbtWLDIIGBj Touftoufikas ( talk) 02:06, 27 February 2023 (UTC)
Thanx for correcting. I am new to Wikipedia and its strict guidelines about references, but I understand that this is the recipe for its high quality content, so I am willing to follow it. By the way I appreciate your work of content management, just as like I appreciate debugging in programming, and I know that it is much more difficult than the creative work of adding content. I will update the sources. But I want to clarify that the contents which not carefully citated are beyond doubt. For example the descriptions of BFT or longest chain variants cryptos, is something everyone agrees. It is just informative and the sources here have also informative character. I think that the paper for BFT should go on referencing what this concept is and I will add something informative about BFT chains. Indeed the second link is broken. I usually let the auto-generating Wikipedia engine to set the attribs, but I will do it manually here. You write that "looking for sources to support my prior knowledge is sets a bad precedent". I think that this is the ONLY way the human brain works, since we don't have a referencing engine implemented. We usually forget where we read something and we have to search again. And sometimes we find another source which is higher in search results, which means more interlinking, so more reliable... At least this is what I thought. As for the primary and secondary sources, there is a secondary source (A Survey on Long-Range Attacks for Proof of Stake Protocols) which was already referenced in the article, that contains the most of the information I provided for which there could be disagreements. By reading carefully Wikipedia instructions, for these claims, I concluded that I should put this reference as a secondary source, and I will provide primary sources as informative (which I personally prefer to build my own view). Additionally the guidelines writen that the context matters. If I write, some say this some say the opposite, and I provide sources for it nobody can disagree. I informed that there is a disagreement and I proved it. If I write that this is a fact and this fact creates disagreements and I citate with an unreliable source, then the criticism is valid. Anyway, thanx for your feedback. I will try again taking into account your advice! Touftoufikas ( talk) 13:43, 27 February 2023 (UTC)
In the end of the long range attacks section, remove the incomplete duplicate about bribery attacks, and add the following text:
One possible solution to mitigate long-range attacks in proof-of-stake systems is through the use of checkpointing. Checkpointing involves periodically creating a block that includes a hash of the blockchain up to a certain point, called the checkpoint. This allows users to verify the state of the blockchain at specific checkpoints and reject any chains that do not match the checkpoint. This checkpoint serves as a reference point for other nodes on the network and ensures that they are all working from the same blockchain history. Consequently long-range attacks are particularly powerful against two types of users: newcomers and disconnected users. Newcomers to the network may not have access to the full blockchain history and may not be able to distinguish between a valid chain and another chain. Similarly, disconnected users who have not been online for an extended period may not have the full blockchain history and may be vulnerable to long-range attacks. Source: https://ieeexplore.ieee.org/document/8653269/footnotes#footnotes-mobile-fn2
However, checkpointing introduces the notion of subjectivity into the system. Different nodes may have different opinions about which chain is valid based on their different blockchain histories. This is known as a subjective view. Additionally, checkpointing can introduce centralization and security trade-offs, as it requires users to trust the checkpointing authority. Weak subjectivity refers to the idea that there is no objective way to determine the true state of the blockchain, and users must rely on social consensus and subjective judgment to determine which chain to follow. Over time, social consensus tends to converge on a single chain, reducing the risk of conflicting views. For example, Ethereum blockchain relies on weak subjectivity for long term consensus while the algorithm is responsible for short term consensus. In specific, validators cannot withdraw their funds for 4 months and thus a long range attack is not feasible for this period. This ensures objectivity for nodes permanently connected or disconnected for less than 4 months, while the nodes disconnected for more than 4 months and newcomers chose the blockchain fork with the most value on it. Source: https://blog.ethereum.org/2014/11/25/proof-stake-learned-love-weak-subjectivity
Weak subjectivity also applies to Proof of Work (PoW) chains. In the case of PoW, nodes normally choose to follow the chain with the most accumulated work, which is usually the longest chain. However, there are situations where the longest chain is not the one that is considered valid by the network. For example, in the case of the Bitcoin Cash hard fork, the chain split into two, and nodes had to choose which chain to follow. Similarly, in the case of the Ethereum hard fork after the DAO attack, when the network was still based on PoW consensus, the community decided to fork the chain to revert the theft, while others chose to continue on the original chain. Sources: https://www.investopedia.com/tech/history-bitcoin-hard-forks/ https://medium.com/swlh/the-story-of-the-dao-its-history-and-consequences-71e6a8a551ee
A proposed mechanism to achieve long term objectivity on PoS chains is Cardano’s key evolving scheme in Ouroboros Genesis. By using the key-evolving scheme, Cardano ensures that even if an attacker manages to gain control of a signing key, they will not be able to use it to sign blocks outside of the current epoch. This makes long-range attacks much more difficult to execute, as the attacker would need to continuously control a majority of the stake throughout multiple epochs to carry out an attack. Source: https://eprint.iacr.org/2018/378.pdf&sa=U&ved=2ahUKEwiB2_uAwrT9AhXlR_EDHc9ADPoQFnoECAYQAg&usg=AOvVaw1eIWQIFXmr9wY84gW2a3Vf Touftoufikas ( talk) 02:08, 27 February 2023 (UTC)
As before, of course I will take this into account and I will find better sources, but I want to clarify: 1. In this context, Butterin's blog was the most well written and informative source about this subject. I think I should keep it as an auxiliary source and I will add something more reliable. The link on investopedia is about a fact, the forks, which are public and everyone knows, it was just informative. Anyway, I will omit this, there are numerous sources saying the exact same thing. I will provide updated content for all the improvements, with more citations and feel free to delete, the auxiliary references if you think so. Touftoufikas ( talk) 13:55, 27 February 2023 (UTC)
In the end of the Bribery attacks section add the following text:
Bribery attacks are a type of attack that relies on bribing validators or miners to work on specific blocks or forks, with the goal of presenting arbitrary transactions as valid. Bribery attacks are feasible in both Proof-of-Work (PoW) and Proof-of-Stake (PoS) systems, but they can be more effective in PoS due to the lower resource requirements and the possibility of expanding the attack to the “nothing at stake” problem. In PoS, bribery attacks can be mitigated by enforcing a slashing condition, where validators are penalized for behaving maliciously, or by releasing violators from their position. For example, Ethereum, one of the largest PoS blockchain networks, implements a slashing condition where validators can lose a portion of their stake for various types of misbehavior, including signing conflicting blocks or voting on conflicting checkpoints. Source: https://ieeexplore.ieee.org/document/8653269/footnotes#footnotes-mobile-fn2
However, bribery attacks can still be successful in PoS systems that do not have financial penalties or that use a longest chain variant, where validators are incentivized to work on the chain with the highest accumulated stake rather than the longest one. In these cases, an attacker can pay enough to validators to mint blocks on a malicious branch and try to accumulate enough stake to make it the longest one. If the attack is successful, the attacker can present arbitrary transactions as valid and potentially double-spend coins. Source: https://eprint.iacr.org/2016/889.pdf&sa=U&ved=2ahUKEwjP2768y7T9AhW7QvEDHVRUCngQFnoECAgQAg&usg=AOvVaw2L75Weioj_KTrjEjUEpYTR
To prevent bribery attacks, PoS systems need to ensure that validators are incentivized to act honestly and that misbehavior is punished sufficiently. Additionally, PoS networks can use a variety of other security measures, such as network partitioning, randomization, and delegation, to make it harder for attackers to compromise the network. Source: https://ieeexplore.ieee.org/document/8653269/footnotes#footnotes-mobile-fn2
To prevent bribery attacks, PoS systems need to ensure that validators are incentivized to act honestly and that misbehavior is punished sufficiently. Additionally, PoS networks can use a variety of other security measures, such as network partitioning, randomization, and delegation, to make it harder for attackers to compromise the network.
Source:
https://ieeexplore.ieee.org/document/8653269/footnotes#footnotes-mobile-fn2
Touftoufikas (
talk) 02:12, 27 February 2023 (UTC)
1. Indeed the first section (a) says pretty much the same, but I think it clarifies better the issue. As for (b) the source says this: ‘’D. Bribery Attack Bribery attack [30], also referred to as Short-Range attack relies on bribing validators or miners to work on specific blocks or forks. By doing that, the attacker can present arbitrary transactions as valid and having dishonest nodes paid to verify them. By paying them an amount equal to or more than the block rewards (in case the block is reverted by the network), it provides an incentive high enough for miners to work on the attacker’s blocks or chain. This case of bribery attacks also known as P+epsilon attack2 states that it is possible to bribe users without having to pay them, as the system will award the bribe to the dishonest nodes by making that branch the main chain. For these cases, the attacker faces a more significant problem as in case the malicious branch is reverted for some reason (attacker cannot continue the bribe, dishonest nodes stop working on that branch) the attacker would have to pay an enormous amount of bribes as the bribes will accumulate for every maliciously minted block. In PoS systems, these kind of attacks are feasible and can be expanded to the nothing at stake problem. In both cases, PoS tackles this issue by either enforcing a slashing condition [2] or by releasing violators from their position [15].’’ The example of Eth is related with this conclusion about slashing conditions, providing additional information about it. 2. Indeed I didn’t know how to add sources since I used the automated tool until now. I am sorry about that. I won’t defend the source either. The purpose of this paragraph is to clarify where the attack is still successful. It does not provide new information, but I think it helps the reader to understand where the attack can be applied. I will search for better sources.
3. Indeed it is not referenced in this source, it is prior knowledge. You are right. I have to do better work on providing sources.
Network partitioning helps to control which party is responsible for which sector. It is not important and it could be omitted. Also it is not a mitigation. It is referenced as informative about the strategies used in this direction.
By the way, randomization is very important for all types of attacks, including this, because if the choice is not random, it is easier for blocks to be proposed by the same party, resulting in more feasible bribery attacks. Delegation is indeed an implementation choice which adds centralization. This choice can help mitigate this type of attack due to economical incentives. It is not a strictly technical mitigation, and I think it could be also omitted.
Touftoufikas ( talk) 10:09, 28 February 2023 (UTC)
The aforementioned additional information is important to keep the article unbiased. Now it presents the attacks without their proposed defences presenting PoS as an experimental insecure technology, while many scientists in the field consider some PoS implementations more secure than PoW. This bias may contribute to the climate change as well, if you take into account the impact of Wikipedia!
If the proposed changes find their way into the article, I will come back to describe more possible attacks on PoS, and why not, describing also the attacks on PoW algorithms (in the relevant article) which are also important, like double spend attacks and selfish mining. Touftoufikas ( talk) 02:13, 27 February 2023 (UTC)
Indeed. It is harder work than I thought to have both well documented sources and good explainability in so technical stuff. I admit that my proposals have not the intended quality to be in the article without further edit abd review. Partially this is because I was expecting to see the reactions and feedback before doing this work. By the feedback I understand that there is a potential if I improve the proposals, and now I am working on it. As for the bias, I don't state it is intentional. The information provided is true. But if you reference on attacks on a scheme, without referencing their mitigations, someone who has no relevant knowledge can think that the whole PoS scheme is something insecure. It is all about the impression. And there is a big debate about PoS vs PoW in terms on security. Non technical audience could be affected by unbalanced impressions created by the most reliable knowledge base on earth. And you know the consequences, a single article could affect the adoption of PoW rather than PoS and this adoption contributes in increased energy consumption. Anyway, I don't blame anyone about this, and I understand that the best way to correct this is by doing better work! Thank everyone for your feedback! I also want to clarify that my criticism does not mean that I don't appreciate the work done here. I intend to improve things. I didn't propose to delete something just to extend it! Touftoufikas ( talk) 14:41, 28 February 2023 (UTC)
I worked on providing suitable sources, I truncated all parts of the text I couldn’t find good sources for, and I added some explanatory for clarification and better understanding for the readers. Please check the final proposal once again.
-
Add a sentence in the abstract, to follow where it says that it is chosen due to its energy efficiency:
Although it is generally considered to be more centralized and less secure, some argue that with the latest advances, PoS has become more safe and more decentralized than PoW, while also offering greater scalability. [1]
-
In the end of the description section, or in the variants section, add the following text:
Byzantine Fault Tolerant (BFT) blockchains require a certain number of nodes, typically more than 2/3 of the total nodes in the network, to agree on a particular block before it is added to the blockchain. This ensures that the network can tolerate a certain number of malicious actors, up to 1/3 of the total nodes in the network, without compromising the network’s security. [2] [3]
The reason for requiring 2/3 or more nodes to agree on a particular block in the BFT consensus mechanism is to ensure that there can only be one block at a given height in the chain. When more than 2/3 of the nodes agree on a particular block, it becomes mathematically impossible for another block at the same height to be signed by another 2/3 or more nodes, unless more than 1/3 of the nodes in the network are faulty and can cooperate with the 1/3 that did not sign the first block to create a second 2/3 block. Thus, BFT chains can reach consensus on the validity of transactions and add them to the blockchain without the risk of forks or double-spending attacks, as long as less than 1/3 of the nodes are faulty. [2]
BFT chains have the advantage of achieving consensus quickly, often in just a few seconds or less, compared to other consensus mechanisms such as longest chain protocols, based on PoW or PoS, which can take minutes or even hours. [1] This fast consensus time allows BFT chains to process transactions more quickly, making them suitable for applications that require low latency. [1] BFT chains are commonly used in permissioned blockchain networks, where participants are known and trusted, but can also be implemented in permissionless blockchain networks. [4]
One of the main challenges with Byzantine Fault Tolerant (BFT) blockchains is ensuring availability, or the ability to continuously make progress and add new blocks to the blockchain. [2] Since BFT consensus requires a certain number of nodes to agree on a particular block before it can be added to the chain, it is possible for the network to become deadlocked if not enough nodes are able to participate in the consensus process. This can occur due to a variety of factors, such as network connectivity issues, node failure, or malicious behavior. [2] [5]
Chain-based approaches for consensus are also used in blockchain systems, relying on proof-of-work or proof-of-stake consensus algorithms to secure the network. [1] In proof-of-work, miners solve cryptographic puzzles to add new blocks to the chain, while in proof-of-stake, validators are chosen based on the amount of cryptocurrency they hold and stake as collateral. These consensus algorithms rely on the concept that the longest chain in the blockchain is the valid chain. [1] Validators compete to create the longest chain, and the longest chain is considered the valid one, while shorter chains are discarded. [1] To incentivize honest behavior, validators must invest their own cryptocurrency as collateral, which they may lose if they are found to be acting maliciously. [4]
Both BFT-based and Chain-based approaches have their own advantages and disadvantages, and each design has been implemented in various blockchain projects. . [1] While BFT-based approaches provide a high degree of security and are well-suited for permissioned blockchains, they can be more complex to implement in permissionless blockchains and require a high degree of coordination among network participants. [2] [3] [5]
Chain-based approaches, on the other hand, are more simple to implement to provide guaranteed liveness for permissionless blockchains, but may not provide the maximum safety. [2] [4] [5]
-
In the end of the long range attacks section, remove the incomplete duplicate about bribery attacks, and add the following text:
One possible solution to mitigate long-range attacks in proof-of-stake systems is through the use of checkpoints. [6] Checkpoints are periodically created as blocks that include a hash of the blockchain up to a certain point. This allows users to verify the state of the blockchain at specific checkpoints and reject any chains that do not match the checkpoint. This checkpoint serves as a reference point for other nodes on the network and ensures that they are all working from the same blockchain history. Consequently long-range attacks are particularly powerful against two types of users: newcomers and disconnected users. Newcomers to the network may not have access to the full blockchain history and may not be able to distinguish between a valid chain and another chain. Similarly, disconnected users who have not been online for an extended period may not have the full blockchain history and may be vulnerable to long-range attacks. [6]
-
However, checkpoints introduce the notion of subjectivity into the system. Different nodes may have different opinions about which chain is valid based on their different blockchain histories. This is known as a subjective view. Additionally, checkpoints can introduce centralization and security trade-offs, as it requires users to trust the checkpoint authority. [6]
In contrast, in the case of PoW, nodes normally choose to follow the chain with the most accumulated work, which is usually the longest chain. However, there are situations where the longest chain is not the one that is considered valid by the network. For example, in the case of the Bitcoin Cash hard fork, the chain split into two, and nodes had to choose which chain to follow.
8 Similarly, in the case of the Ethereum hard fork after the DAO attack, when the network was still based on PoW consensus, the community decided to fork the chain to revert the theft, while others chose to continue on the original chain.
9
Weak subjectivity refers to the idea that there is no objective way to determine the true state of the blockchain in the long term, and users must rely on social consensus and subjective judgment to determine which chain to follow. Over time, social consensus tends to converge on a single chain, reducing the risk of conflicting views. [7] [6]
A proposed mechanism to achieve long term objectivity on PoS chains is Cardano’s key evolving scheme in Ouroboros Genesis. By using the key-evolving scheme, Cardano ensures that even if an attacker manages to gain control of a signing key, they will not be able to use it to sign blocks outside of the current epoch. This makes long-range attacks much more difficult to execute, as the attacker would need to continuously control a majority of the stake throughout multiple epochs to carry out an attack. [3] [6] [8]
-
In the end of the Bribery attacks section add the following text:
Bribery attacks are a type of attack that relies on bribing validators or miners to work on specific blocks or forks, with the goal of presenting arbitrary transactions as valid. Bribery attacks are feasible in both Proof-of-Work (PoW) and Proof-of-Stake (PoS) systems, but they can be more effective in PoS due to the lower resource requirements and the possibility of expanding the attack to the “nothing at stake” problem. [6]
In PoS, bribery attacks can be mitigated by enforcing a slashing condition, where validators are penalized for behaving maliciously, or by releasing violators from their position. [6]
References
:3
was invoked but never defined (see the
help page).— Preceding unsigned comment added by Touftoufikas ( talk • contribs) 04:08, 2 March 2023 (UTC)
Yes of course I understand, after reading WP:SYNTH. Consequently this paragraph should be removed, since only Ethereum-related blogs and sites discuss about weak subjectivity in a generalized context. A tried to reproduce this explanation relying on sources considered reliable, as guardian, but after reading WP:SYNTH I understood that this is not compatible with Wikipedia rules. How about the rest of the text? Both problems you referenced were about a single paragraph. If the text from "In contrast..." to "...original chain [9]" is removed, along with these 2 references (8, 9), do you see any problem elsewhere? Touftoufikas ( talk) 15:46, 3 March 2023 (UTC)
Thanx for reviewing and editing. I provided more references now to the long paragraphs and I deleted some informative sentences that are not directly supported by the sources. Some references were wrong, I assume by my mistake. I corrected them. Touftoufikas ( talk) 16:19, 4 March 2023 (UTC)
I want to explain some things also. 1. Liveness and availability are synonymous terms. I substituted the word in my text with the term provided by the source, to make the connection with the source clear, after reading your comcerns. 2. You ask where in the source checkpointing is referenced. Search for the following text in the source: B. Moving Checkpoints Moving checkpoints or simply checkpoints is a mitigation technique used by almost all PoS protocols. Its simplicity and ease in implementation made it one of the first mitigation techniques to be enforced in PoS powered blockchains, after of course the longest-chain rule.
Touftoufikas ( talk) 16:23, 4 March 2023 (UTC)
We are talking about blockchain consensus here. It is different in the sense that when a blockchain is busy (for example when it reaches the maximum transaction capacity), this does not affect its consensus algorithm iteration. So we often read one of these two terms in blockchain-related literature, and they almost refer to the same thing: the ability of a consensus algorithm to continue producing blocks, or that there are available validators to continue producing and validating blocks. It is the same thing from another perspective. Indeed, by the way, mathematically they are different concepts. I am talking in the context of blockchain and about the cap theorem availability vs finality or in other terms liveness vs safety. Touftoufikas ( talk) 21:40, 4 March 2023 (UTC)
1. I substituted the term checkpointing with the term checpoint(s), which is used in the sources. 2. The only source which is WP:OR is the paper of Ouroboros which is auxiliary. The rest of the papers are reviewing papers. 3. About sources quality. The most "controversial" topics are covered by 2 papers: 6 and 1. 6 was chosen as a source in the original article also. 1 is signed by IEEE members. I think this is more reliable than anything. And it is not primary work, it is an evaluation of others' work. Anyway, thank you for your attention, I don't know if I can improve to meet your quality criteria. I quit the effort here for this article because I have the sense that I created more issues than those I tried to solve. I hope someone more experienced than me to continue this work and finally complete the article. Touftoufikas ( talk) 08:59, 5 March 2023 (UTC)
This
edit request has been answered. Set the |answered= or |ans= parameter to no to reactivate your request. |
Examples of Proof of Stake crypto currencies are Tezos, Cardano, Solana, and Algorand and Ethereum 2.0
References: - https://www.mckinsey.com/featured-insights/mckinsey-explainers/what-is-proof-of-stake - https://www.forbes.com/advisor/investing/cryptocurrency/proof-of-stake/ - https://www.fool.com/terms/p/proof-of-stake/ Hiraditya ( talk) 14:05, 15 September 2023 (UTC)