{"id":7137,"date":"2016-05-12T20:50:02","date_gmt":"2016-05-12T17:50:02","guid":{"rendered":"https:\/\/forklog.media\/?p=7137"},"modified":"2019-12-30T13:46:04","modified_gmt":"2019-12-30T11:46:04","slug":"what-are-proof-of-work-and-proof-of-stake","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/what-are-proof-of-work-and-proof-of-stake\/","title":{"rendered":"What are Proof-of-Work and Proof-of-Stake?"},"content":{"rendered":"<div id=\"cards_wrapper\">\n<div class=\"single_card\">\n<p id=\"card_counter_1\" class=\"card_counter\"><span class=\"card_counter_span\">1<\/span><\/p>\n<p><strong>What is Proof-of-Work? <\/strong><\/p>\n<div class=\"card_description\">\n<p>Proof-of-Work (PoW) is an algorithm that protects distributed systems from misuse (DoS attacks, spam, etc.). There are two key points:<\/p>\n<ul>\n<li>The need to perform a reasonably complicated and time-consuming task.<\/li>\n<li>The ability to check the result easily and quickly.<\/li>\n<\/ul>\n<p>PoW tasks aren\u2019t meant for humans. These can always be solved by a computer in a finite time, but require substantial computing power. Meanwhile, it requires minimal time and resources to check if the result is correct.<\/p>\n<p>PoW is a mechanism of reaching consensus (a common opinion on the valid version of the blockchain). Bitcoin creator Satoshi Nakamoto took the Hashcash\u2019s idea as the basis and added a mechanism of adaptive complexity, where N (the required number of zeros) depends on the cumulative hashing power of the network participants. In Bitcoin the hash function is SHA-256. Simply put, PoW allows a node to check if a miner (node adding a block to the chain) did the calculations. The process includes finding a hash of the header (the part of a block that contains information about the included transactions and a link to the previous block) that satisfies the current complexity requirements.<\/p>\n<\/div>\n<\/div>\n<div class=\"single_card\">\n<p id=\"card_counter_2\" class=\"card_counter\"><span class=\"card_counter_span\">2<\/span><\/p>\n<p><strong>What are the downsides of Proof-of-Work?<\/strong><\/p>\n<div class=\"card_description\">\n<p>Bitcoin\u2019s Proof-of-Work gave rise to an entire cryptocurrency mining industry. It also formed a commercial incentive for companies to develop specialized mining equipment, which led to an increase in total computing power. Power consumption became a significant concern.<\/p>\n<p>By now there are several alternatives to PoW. The most widespread of those is Proof-of-Stake.<\/p>\n<\/div>\n<\/div>\n<div class=\"single_card\">\n<p id=\"card_counter_3\" class=\"card_counter\"><span class=\"card_counter_span\">3<\/span><\/p>\n<p><strong>What is Proof-of-Stake?<\/strong><\/p>\n<div class=\"card_description\">\n<p>Proof-of-Stake (PoS) is an alternative consensus algorithm first seen in 2012 in PPCoin, know known as PeerCoin. The idea of PoS is to use stakes as a resource that determines which node gets the right to add a block.<\/p>\n<p>Similarly to PoW, nodes in PoS are computing hashes to satisfy the requirements, but in this case, the complexity is individual for the node and depends on the amount of tokens on its balance. The node with a bigger balance is more likely to generate the next block.<\/p>\n<p>This approach requires less physical resources such as electricity and leaves out the ethical question of wasted computation capacity. To attack a PoS network an adversary would need to acquire a large amount of tokens, which makes the attack economically unreasonable.<\/p>\n<\/div>\n<\/div>\n<div class=\"single_card\">\n<p id=\"card_counter_4\" class=\"card_counter\"><span class=\"card_counter_span\">4<\/span><\/p>\n<p><strong>What are the downsides of Proof-of-Stake?<\/strong><\/p>\n<div class=\"card_description\">PoS incentivizes participants to amass funds, which may lead to centralization of power in the network. A small group with sufficient funds may be able to dictate rules to other participants. There is also the Nothing-at-Stake problem, that makes PoS systems appear unreliable to many cryptoenthusiasts. An adversary can try to create a longer chain with non-existent resources. Other participants may support this chain since it won\u2019t cost them any real resource. With this alternative chain, an adversary can block certain transactions and execute the double-spending attack.<\/div>\n<\/div>\n<div class=\"single_card\">\n<p id=\"card_counter_5\" class=\"card_counter\"><span class=\"card_counter_span\">5<\/span><\/p>\n<p><strong>What\u2019s better: PoW or PoS?<\/strong><\/p>\n<div class=\"card_description\">\n<p>Currently, projects are experimenting with hybrid systems that take features from both PoS and PoW. Many cryptocurrencies use PoW while the coins are created through classical mining and then shift to the PoS stage after the emission is over.<\/p>\n<p>Yet, while PoS-systems are easier to implement and just as reliable, major cryptocurrencies are unlikely to shift from PoW anytime soon.<\/p>\n<\/div>\n<\/div>\n<div class=\"single_card\">\n<p id=\"card_counter_6\" class=\"card_counter\"><span class=\"card_counter_span\">6<\/span><\/p>\n<p><strong>What other consensus algorithms there are?<\/strong><\/p>\n<div class=\"card_description\">\n<p>Proof-of-Work and Proof-of-Stake are the most popular consensus algorithm, but they aren\u2019t the only. Here are some of the well-known alternatives:<\/p>\n<ul>\n<li>Proof of Activity \u2014 a standard hybrid model combining PoW and PoS.<\/li>\n<li>Delegated Proof of Stake \u2014 an algorithm similar to PoS, where participants can delegate their tokens to validators in exchange for a share in the block reward. DPoS is used by BitShares, EOS, and Tezos;<\/li>\n<li>Proof of Burn \u2014 an algorithm that involves sending tokens to an address from which they can\u2019t be spent. By burning tokens in such a way the user gets a lifetime right to mine. Blocks are added by randomly assigned lifetime miners.<\/li>\n<li>Proof of Capacity \u2014 an implementation of \u201cmegabytes as resources\u201d idea. Mining implies sharing one\u2019s disc storage space.<\/li>\n<li>Proof of Storage \u2014 a similar algorithm, where the shared acts as a cloud storage for the network participants.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>1 What is Proof-of-Work? Proof-of-Work (PoW) is an algorithm that protects distributed systems from misuse (DoS attacks, spam, etc.). There are two key points: The need to perform a reasonably complicated and time-consuming task. The ability to check the result easily and quickly. PoW tasks aren\u2019t meant for humans. These can always be solved by [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":7110,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"","cryptorium_level":"","_short_excerpt_text":"","creation_source":"human_written","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[1003],"tags":[],"class_list":["post-7137","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guides"],"aioseo_notices":[],"amp_enabled":true,"views":"145","promo_type":"1","layout_type":"","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/7137","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=7137"}],"version-history":[{"count":4,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/7137\/revisions"}],"predecessor-version":[{"id":7190,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/7137\/revisions\/7190"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/7110"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=7137"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=7137"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=7137"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}