- Proof of stake is a consensus mechanism, which makes sure that only legitimate transactions get added to blocks.
- It works by having validators lock up their cryptocurrency to secure the network.
Mining cryptocurrency is an energy-intensive business. But it doesn’t have to be.
Thecommunity has been working to change how the currency is created in order to radically reduce the blockchain’s carbon footprint. The method it’s working toward is called proof of stake (PoS).
Proof of stake is an alternative to proof of work (PoW), whichand Ethereum currently use.
Both PoS and PoW are examples of consensus mechanisms.
Public, at their most basic level, are just databases.
Most databases set permissions for who can access and edit them. This centralized control is convenient but makes them vulnerable to hacks. By contrast, blockchains make everyone running the software—from exchanges to traders in their basement—responsible for updating them.
That sounds like it would be messy, which is why blockchains use “consensus mechanisms” or “consensus algorithms.” Consensus mechanisms keep the network humming, making sure that only legitimate transactions get added to blocks. It’s all the nodes—or computers running the blockchain software—checking together to say, “Yes, this is true.”
In doing so, they guard against 51% attacks, which is when someone gets more than half of the computing power in a distributed network and can then control it.
Proof of Work
To prevent attacks, which make it possible to spend funds twice, Bitcoin uses the proof-of-work consensus algorithm. That system asks people to use hardware and electricity to help the network process transactions. In proof of work, miners (or, their computers, to be precise) try to solve fiendishly difficult puzzles in order to be the first to complete a block of transactions. Their work helps to verify the transactions are legitimate. As compensation, they’re rewarded with cryptocurrency such as Bitcoin.
Proof of work was built into the design of Bitcoin, and replicated by other cryptocurrencies, including Ethereum. However, one of the by-products of this system is it requires a lot of electricity and machines working on a problem in order to solve it.
Did you know?
The Bitcoin network alone is currently consuming more electricity per year than Argentina.
Proof of Stake
Ethereum developers are building a separate set of upgrades,that will run on proof of stake and will eventually merge with the Ethereum mainnet.
Proof of stake on Ethereum 2.0 aims to achieve the same outcome as proof of work: to securely verify transactions on the blockchain.
But whereas PoW miners dedicate hardware resources (large, expensive computers) to secure the network, PoS “validators” dedicate their cryptocurrency. With PoS, to get a chance to verify transactions in a block—and get the associated fees—validators must lock up, or stake, at least 32 ETH that they can’t spend. The blockchain uses that locked-up crypto to secure the network.
According to the Ethereum Foundation, proof of stake has several advantages over proof of work.
- 🖥️ Since earning rewards isn’t based on having the most computing power, you don’t need super-fancy hardware.
- 👨💻 That opens up the possibility for more people to participate in running an Ethereum node, which will allow for further decentralization and more resistance to 51% attacks.
- 🔌 Because of the lower hardware requirements, proof of stake uses far less energy than proof of work.
How Does the Network Choose?
Validators are chosen at random by the network to propose new blocks.
They are also randomly grouped into committees of 128 nodes, which change daily. Every time a new block of transactions is created and added to the blockchain database, the PoS consensus mechanism selects multiple committees to “attest” that the block that’s been proposed is correct.
Validators receive rewards for both making blocks and attesting to seeing other blocks being made. If validators are offline or not making correct attestations, they receive a penalty. If they try to attack the network, they can lose up to their entire stake.
The algorithm is designed to make an attack on the network statistically improbable. According to ConsenSys (which funds an editorially independent Decrypt), “There is less than a 1 in a trillion chance that an attacker controlling 1/3 of the validators on the network would control ⅔ of the validators in a committee to successfully execute an attack.”
Ethereum isn’t the first cryptocurrency to use proof of stake.
, , , , , and have all implemented a version of proof of stake.
The Ethereum network is currently in Phase 0 of its upgrade to Ethereum 2.0. While people have staked ETH to the network, it’s not yet ready to be built upon.