<<  >> (p.4)
    Author Topic: The Deathblow to Proof of Stake  (Read 7961 times)
    masterOfDisaster
    Sr. Member
    ****
    Offline Offline

    Activity: 321
    Merit: 250


    View Profile
    July 15, 2014, 09:59:07 AM
     #61

    In either case - PoW or PoS - the security of the network is based on a limited resource that can't be created at will. If an attacker gains control of an amount of that limited resource that is enough to undermine the security of the network it will get nasty.
    In PoS the limited resource is derived from the currency units in the network itself.
    In PoW the limited resource is computational power.
    PoS's security suffers from big holders of currency units which have malicious intents.
    PoW' security suffers from big holders of computational power which have malicious intents (imagine someone is abusing a PoW pool's computational power; even if that power is below 50% all that is needed, is to DDoS another big pool...).
    Same shit, different color.

    The big difference lies in the economical aspects of attacks on PoS and PoW.
    For PoW attacks you need computational power. If you have killed a specific PoW network with that power, you can still use it for other PoW networks.
    For PoS attacks you need currency units of the network you intend to attack. If you succeed, you diminish the value of the owned currency units - estimatively by vast amounts; there's no reuse for different networks.
Page 3
Viewing Page: 4