Consensus Mechanisms Race to Fix PoW and PoS Flaws Before 2032 Security Crunch - adtechsolutions

Physical Address

304 North Cardinal St.
Dorchester Center, MA 02124

Consensus Mechanisms Race to Fix PoW and PoS Flaws Before 2032 Security Crunch



As developed by 2025, consensus mechanisms based on subsoil-powered bitcoins and ethereum-work on work (Pow) and evidence (POS) -ee under fire on hackers and half, which are governed by budget concerns. Opponents like Stellar’s Trust based on Poa and Quai’s turbo-napa poem, claim to repair cracks.

A closer look at Pow and Pos

Ryan Berckmans, a researcher of a crypto ecosystem and a long -time member of the Ethereum community, said Cryptonews that Pow is the original consensual mechanism invented by Satoshi Nakamoto.

Berckmans explained that POW solves the problem of the public network of computers agrees with the common shared situation. POW also allows bitcoin mining.

“Pow is a very important invention because it has solved this problem” Byzantine generals “and launched the world on the way to much better economic systems to increase global freedom and prosperity,” Berckmans said.

Berckmans added that Pos offers improved security for blockchains Layers-1 (L1) that want to provide different assets.

“With POS, a native token with a $ 1 trillion market ceiling can provide an application layer with a risk of $ 100 trillion. Pow can’t do that,” he said.

Berckmans pointed out that the power of Pow consists of its ability to easily reduce the risk of controlling trust and reliability.

“The mining process is very simple (looking for a needle in a haystack) and does not require any means locked to be locked that could be stolen if the miner was endangered,” he said.

On the other hand, he noted that POS valinators have endangered means that can be stolen or even blackmail if the Validator’s private key is disrupted.

Challenges with Pow and Pos Blockchains

Many challenges remain in both Consensus Pow and POS mechanisms. For example, POS Blockchains rely on economic incentives where validators play tokens and are rewarded for honorary behavior or financially punished for bad behavior. POS can therefore be used in ways that undermine its safety.

In 2023, the attackers spent a small amount of their share to become a producer of Ethereum block. Then they started exploiting against Mev-Boost Relay Network This resulted in accessing about $ 25 million worth of stablecoins.

Berckmans further pointed out that the main challenge for POS is to reduce complexity while maintaining safety.

“Ethereum has four production clients for its Validator POS node – which makes ETH the only L1 with the practical diversity of clients, which significantly supports decentralization,” he said. “But the disadvantage of four clients is that it adds the complexity of the real world, including the dreaded risk of” chain distribution “.

If four clients disagree with each other in the state of the actual string, the risk of distribution of the string may occur. It led Vitalik and Ethereum Foundation Identify the Protocol as one of the strategic goals for Ethereum In the coming years.

As far as Pow is concerned, Berckmans pointed out that Bitcoin had to deal with the crisis of its security budget crises.

“Every half every 4 years reduces bitcoins budget by reducing mining to half.

Berckmans believe that bitcoin can be very vulnerable to the catastrophic 51% of attacks Until 2032. He also stated that the only practical way to solve the budget safety crisis is to add a permanent tail inflation to the BTC delivery. However, this would cause the total number of BTC to exceed the limit of 21 m “hard cap” by the mid -20th century.

Stellar’s “proof of shave”

Due to the challenges associated with the blockchains Pow and POS, some networks have implemented their own consensual mechanisms.

For example, Stellar uses a “Consensus mechanism“ evidence of compliance ”(POA). Garand Tyson, Senior Software Engineer in Stellar Development Foundation, said Cryptonews that POA is a consensual protocol that differs fundamentally from Pow and POS.

“POA is not based on computing power or ownership of tokens, but rather is based on social trust and mutual agreement,” he said.

Tyson explained that to become a validator, someone who is already a netidator of the network must trust this person. “Every person in the network can invite any person to become a validator, but trust is earning,” he said.

Trusted validators on Stellar then form a “set of quorum”, where each participant is aware of the other. This provides transparency and allows easily accessible information about validators, which is particularly valuable for regulatory and audit purposes.

Tyson added that random entities that could be harmful could not connect to the net simply by inserting a large amount of tokens, as seen on the POS blockchains. This prevents a number of attacks such as Attack an increase of $ 25 million on Ethereum.

In terms of security, Tyson explained that the final agreement or “state’s finality” depends on a wide range of trusted institutions, including global organizations.

“The attacker would have to persuade many of them to accept the same false version of the book to complete a malicious act. If one refuses, the attack will fail. Poa offers an immediate, deterministic finalization,” he said.

POA also includes built -in fork protection, which prevents validators in the qua -set fork from the net.

“Validators will not continue building blocks until the fork is resolved, unlike most other consensus models that will build” invalid forks “in case of error,” he said.

“Proof of entropy-minima” Quai Network

L1 Blockchain Quai Network also uses its own consensual mechanism called “Entropie-Minima” (poem).

Alan Orwick, co -founder of Quai Network, said Cryptonews that the poem was inspired by the Bitcoin prisoner. The poem uses computational hash of miners to measure entropy or randomness removed by each proposed block. This ensures that the nodes immediately agreed on the next block.

“This provides lightning finality, permanent consensus and the ability to coordinate endless shards of implementation and achieve more than 50,000 transactions per second with fees below $ 0.01,” Orwick said. “Unlike traditional Pow, a poem offers a deterministic, objective consensus with increased efficiency and scalability.”

Orwick has developed that the Quai network decided to implement a poem rather than Pow or PO for many reasons. In order to prevent centralization and large download requirements that can be supplied with POS, the work framework is the poet in accordance with the vision of Quai about a fair, available and globally scalable monetary system.

“It also seizes miners and users while maintaining energy efficiency through merged mining and workshares,” he said.

Delegated evidence of the strength of the pwr chain

The PWR string is a blockchain layer-0 that uses a consensual mechanism called “delegated evidence-power” (DPOP). It is based on the Consensus Protocol Tendermint protocol, yet introduces specific improvements for quantum security and faster blocks.

Eda Haddad, Chief Technology Director of PWR Chain, said Cryptonews that DPOP uses Falcon Signatury-Post-Quantum cryptographic scheme for verification voices on blocks.

He added that DPOP gives all selected validators the same chances of making blocks. This is important because the Whitepper PWR string explains that in conventional Posters, validators receive opportunities to create blocks in proportion to their share.

According to Whitepper, this approach has accepted many blockchains, but it can lead to centralization. “When the chances of creating blocks are associated with the size of the bet, large validators naturally produce most blocks. This results in a stable return on investment (ROI) for their delegators, which in turn attracts even more delegators.

Haddad added that immediate finality is the main feature of the PWR chain. This allows developers to build without worrying about returning the network. DPOP will achieve this by requiring 2/3 validators to approve each block and grant immediate and irreversible finalities after the block creation.

“Pow and reinforcement allow open participation without permission, but suffer from slow times of blocks, delayed finality and high costs (especially in Pow),” said Haddad. DPOP, on the other hand, is designed to support the PWR-string goals and instant finality, which is ideal for performance-sensitive applications.

Challenges to be considered

While Alternative consensus mechanisms are innovativeThese models are far from perfect.

For example, Tyson noted that one of the most common questions raised with POA is around trust. “Since the network relies on a group of trusted validators, Szo gets trusted? The question then happens “could the network too centralize?” ”

Tyson pointed out that Stellar dealt with these problems by opening the net and decentralized according to the design.

“Anyone can run a validator, but the influence is not provided by wealth or computing power; it is obtained through mutual trust. Validators are also renowned organizations – banks, company companies, older institutions that have a protection reputation.

However, the concentration of effect may be another risk with POA. If too few validators are trustworthy, the network could drift to centralization. To face this challenge, Tyson explained that Stellar promotes diversity in the Kites of Quoro.

“The validators are expected to build confidence with multiple independent organizations. These cross verification limits the ability of one actor or group to control influence,” he said.

Lack of direct financial rewards with POA can be considered a call for participation. Tyson said Stellar historically has fewer validators, because mining pools and infrastructure companies cannot only benefit directly from verification.

“However, it is a double -playing sword; validators are not paid for transaction approval, they participate because they want the word in how the network is evolving. This is probably more attractive to institutions that take care of the management of public affairs, not just profits,” Tyson said.

As for the poem, Orwick noted that this approach could be too complex for newcomers. “By creating multiple consumer applications and network access methods, we can have abstract technical details from users,” he said.

Contribution Consensual mechanisms are racing for repairing Pow and POS flaws before 2032 Security Crunch He appeared for the first time Cryptonews.





Source link

Leave a Reply

Your email address will not be published. Required fields are marked *