SYS-CON MEDIA Authors: Elizabeth White, Pat Romanski, Liz McMillan, Yeshim Deniz, Courtney Abud

Blog Feed Post

Ethereum’s Big Switch Explained: Why the Blockchain is Ditching Proof of Work and Adopting Proof of Stake Instead

Recently, we posted a brief overview of the Ethereum ICO craze. Before that, we had reviewed how blockchains work in general.

Today, we’ll delve deeper into the process of mining.

In this article, we’ll introduce briefly the concepts of Proof of Work (PoW) and Proof of Stake (PoS). We’ll talk about why Ethereum, the second largest blockchain, is planning to switch the former for the later and share some forecasts as to the outcomes this decision might lead to.

Let’s get to it.

Byzantine Generals’ Problem

Among his many breakthrough accomplishments, Satoshi, the mysterious founder of Bitcoin, is praised for coming up with a solution to what’s known as Byzantine Generals’ Problem.

The issue is basically this.

Suppose there’s a war. There’s an army that has a city encircled, but due to exhaustion of resources, the army’s generals are undecided whether it’s smarter to attack or to retreat. Suppose, also, that it’s the 15th century and the commanders, who are all in camps far apart, have no way of communicating effectively save for sending messengers.

How could these generals (let’s say there are 20 of them) reach a consensus?

Obviously, they’ll have to vote. If the majority (at least 51%) decides to move forward with a strategy (of attacking, or of retreating), the whole army will have to get behind their choice. That’s only fair and logical.

But then they’ll face another problem: how to ensure that no general involved in making a decision votes the wrong way on purpose, just to confuse things?

Well, in the world of blockchains, the generals are miners. And choosing a war strategy for them is agreeing on a set of rules, a certain view of the history of digital events that are posted on the network.

The way that Bitcoin enables reaching a distributed consensus and punishes, or rather discourages, bad actors for acting dishonestly is by using the Proof of Work (PoW) algorithm.

What is Proof of Work (PoW)?

What is Proof of Work (PoW)?

Initially, PoW was proposed as means to protect network connections and systems from the denial of service (DoS) attacks. One of its first implementations was hashcash – the technology that is still being used to secure the mining process on Bitcoin and was engineered by Adam Back, one of Bitcoin co-developers.

Essentially, PoW is just a piece data that’s both hard to produce, computing wise, and easy to verify on the receiving end.

The PoW principle was first used to deter spam emails. A person had to solve a puzzle of some kind, i.e put effort, before sending an email, and then they had to attach a solution they’d come up with to the letter’s header so that the recipient could recognize it.

The main gist of the idea was making it difficult and time-consuming for a spammer to send bulk, trashy ads. All the emails without a proof of work were easily identifiable as spam, and, therefore, recipients never opened them.

On Bitcoin, Proof of Work is a miner’s responsibility. Whenever a new block with transactions appears on the network, validators start to compete in solving a mathematical problem (generating Proof of Work) attached to it. The winner, a miner who manages to figure out the cryptographic nonce first, gets to write to the blockchain’s history and is then rewarded by the network with a certain amount of crypto coins.

The blockchain adjusts the difficulty of these mathematical problems so that it takes a miner roughly 10 minutes to find a solution. Hence, we get the universal 10 minute block time on the Bitcoin blockchain.

What are the drawbacks of using Proof of Work?

The fairly high level of security provided by PoW comes with a cost. Some, including Ethereum’s founder Vitalik Buterin, consider the algorithm to be too wasteful and costly.

Here are some of the most typical concerns people have about Proof of Work:

  1. Millions of hashes that are generated by miners around the world do not really solve anything. The immense work and resources put into securing blockchains are not, in any way, useful to society. And after a computational problem is solved, miners proceed to solve the next one, throwing their previous efforts on the floor. From the environmental standpoint, server farms with powerful mining equipment that utilize vast amounts of electricity to do basically nothing, are not beneficial to our world.
  2. The process of resolving computational problems is complex and competitive and those with the most advanced mining hardware have an edge over those who don’t. This creates an arms race among miners, and makes the validators’ community more exclusive (there’s isn’t a whole lot of people willing to buy up equipment and manage substantial amounts of computing power). And exclusivity goes against the idea of decentralization – the key principle behind the blockchain technology.
  3. This leads to the most talked about PoW related concern that is the possibility of a 51% attack. While a mining pool that has a centralized control over the network can still play it fair, nothing would stop it from attacking a blockchain, invalidating legitimate transactions and double spending crypto coins.

To avoid facing these potential issues ever, the creators of Ethereum – the second largest blockchain in the world – are planning to switch from PoW to Proof of Stake (PoS).

What is Proof of Stake?

Proof of Stake takes labor work out of the mining process. Instead of time and electricity – the external resources validators are used to putting into generating PoW – the algorithm enables miners with most coins (internal resources) to write to a blockchain’s history. The underlying principle behind PoS is that the more invested a validator is in the network (the bigger stake they possess), the less likely they are to attack it, and, therefore, the more validating rights they should be given.

The only cryptographic calculations involved in PoS are those establishing if a miner owns a needed amount of cryptocurrency. On Ethereum, according to its developers, a person who has 5% of all ether will be able to mine 5% of all the transactions happening on the blockchain.

The system will decide whose turn it is to commit a block pseudo-randomly, weighing the selection toward miners with the most coins. And it will allow more people to participate in the validating process: there would no longer be a need to purchase expensive hardware to mine.

What benefits can PoS bring to Ethereum?

What is Proof of Work (PoW)?


Essentially, where PoW falls short, PoS is expected to thrive.
Click To Tweet


  • The issue of unnecessary energy wasting will be forgotten about, as no mining, in its traditional form, will take place.
  • No competition in solving computational puzzles will mean no demand for advanced mining hardware. Hence, more people will be encouraged to participate in the validation process.
  • Despite reducing energy costs, by a lot, PoS will make attacks on the blockchain even more expensive. If anyone decides to buy up 51% of ether to try to alter transaction blocks, they’ll have to pay millions of dollars to get the coins (due to limited supply and increased demand ether price will be increased drastically) and then risk losing their money by destabilizing the very blockchain they’ve put their funds in. It’s hard to imagine a sane person doing that.

In conclusion

Besides assuming that a miner won’t risk their money to hack the blockchain, PoS offers a scenario of how malicious activities can be diffused, if they do occur. If a chain takeover happens, Ethereum community can simply hard fork the network and destroy the deposits of the attacking miners’, no matter how much coins, i.e. mining power, they might possess.

It would take some healing, a few days probably before the blockchain gets on tracks again. But, in the long run, no one except the offenders will suffer substantial losses. Conversely, the honest validators will end up richer as the crunch in supply of ether caused by the fork, will make the coins’ cost rise even more.

Want to learn more about Ethereum, Bitcoin and the Blockchain technology in general? Contact our expert for a free consultation.

The post Ethereum’s Big Switch Explained: Why the Blockchain is Ditching Proof of Work and Adopting Proof of Stake Instead appeared first on Perfectial.

Read the original blog entry...

More Stories By Rostyslav Demush

Ross Demush is a digital marketing specialist at custom software development company Perfectial, a leading provider of web & mobile development services, specializing in FinTech, Real Estate, Media & Entertainment & eLearning.

Latest Stories
Using serverless computing has a number of obvious benefits over traditional application infrastructure - you pay only for what you use, scale up or down immediately to match supply with demand, and avoid operating any server infrastructure at all. However, implementing maintainable and scalable applications using serverless computing services like AWS Lambda poses a number of challenges. The absence of long-lived, user-managed servers means that states cannot be maintained by the service. Lo...
With the new Kubernetes offering, ClearDATA solves one of the largest challenges in healthcare IT around time-to-deployment. Using ClearDATA's Automated Safeguards for Kubernetes, healthcare organizations have access to the container orchestration to dynamically deploy new containers on demand, monitor the health of each container for threats and seamlessly roll back faulty application updates to a previous version, avoid system-wide downtime and ensure secure continuous access to patient data.
As Apache Kafka has become increasingly ubiquitous in enterprise environments, it has become the defacto backbone of real-time data infrastructures. But as streaming clusters grow, integrating with various internal and external data sources has become increasingly challenging. Inspection, routing, aggregation, data capture, and management have all become time-consuming, expensive, poorly performing, or all of the above. Elements erases this burden by allowing customers to easily deploy fully man...
Applications with high availability requirements must be deployed to multiple clusters to ensure reliability. Historically, this has been done by pulling nodes from other availability zones into the same cluster. However, if the cluster failed, the application would still become unavailable. Rancher’s support for multi-cluster applications is a significant step forward, solving this problem by allowing users to select the application and the target clusters, providing cluster specific data. Ranc...
StackRox helps enterprises secure their containerized and Kubernetes environments at scale. The StackRox Container Security Platform enables security and DevOps teams to enforce their compliance and security policies across the entire container life cycle, from build to deploy to runtime. StackRox integrates with existing DevOps and security tools, enabling teams to quickly operationalize container and Kubernetes security. StackRox customers span cloud-native startups, Global 2000 enterprises, a...
With the rise of Docker, Kubernetes, and other container technologies, the growth of microservices has skyrocketed among dev teams looking to innovate on a faster release cycle. This has enabled teams to finally realize their DevOps goals to ship and iterate quickly in a continuous delivery model. Why containers are growing in popularity is no surprise — they’re extremely easy to spin up or down, but come with an unforeseen issue. However, without the right foresight, DevOps and IT teams may lo...
JFrog, the DevOps technology leader known for enabling liquid software via continuous update flows, was honored today with two prestigious awards as part of DevOps.com's annual DevOps Dozen. The awards recognized both JFrog Artifactory as the "Best DevOps Commercial Solution" and JFrog Co-Founder and CEO, Shlomi Ben Haim, as the "Best DevOps Solution Provider Executive". DevOps.com holds the DevOps Dozen awards annually to recognize the best of the best in the global DevOps marketplace.
Docker and Kubernetes are key elements of modern cloud native deployment automations. After building your microservices, common practice is to create docker images and create YAML files to automate the deployment with Docker and Kubernetes. Writing these YAMLs, Dockerfile descriptors are really painful and error prone.Ballerina is a new cloud-native programing language which understands the architecture around it - the compiler is environment aware of microservices directly deployable into infra...
DevOps is under attack because developers don’t want to mess with infrastructure. They will happily own their code into production, but want to use platforms instead of raw automation. That’s changing the landscape that we understand as DevOps with both architecture concepts (CloudNative) and process redefinition (SRE). Rob Hirschfeld’s recent work in Kubernetes operations has led to the conclusion that containers and related platforms have changed the way we should be thinking about DevOps and...
Signs of a shift in the usage of public clouds are everywhere Previously, as organizations outgrew old IT methods, the natural answer was to try the public cloud approach; however, the public platform alone is not a complete solutionThe move to hybrid, custom, and multi-cloud will become more and more prevalent At the heart of this technology trend exists a custom solution to meet the needs and concerns of these organizations, including compliance, security, and cost issues Blending Ser...
When a company wants to develop an application, it must worry about many aspects: selecting the infrastructure, building the technical stack, defining the storage strategy, configuring networks, setting up monitoring and logging, and on top of that, the company needs to worry about high availability, flexibility, scalability, data processing, machine learning, etc. Going to the cloud infrastructure can help you solving these problems to a level, but what if we have a better way to do things. ...
Cloud-Native thinking and Serverless Computing are now the norm in financial services, manufacturing, telco, healthcare, transportation, energy, media, entertainment, retail and other consumer industries, as well as the public sector. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long development cycles that pro...
Docker is sweeping across startups and enterprises alike, changing the way we build and ship applications. It's the most prominent and widely known software container platform, and it's particularly useful for eliminating common challenges when collaborating on code (like the "it works on my machine" phenomenon that most devs know all too well). With Docker, you can run and manage apps side-by-side - in isolated containers - resulting in better compute density. It's something that many developer...
The KCSP program is a pre-qualified tier of vetted service providers that offer Kubernetes support, consulting, professional services and training for organizations embarking on their Kubernetes journey. The KCSP program ensures that enterprises get the support they're looking for to roll out new applications more quickly and more efficiently than before, while feeling secure that there's a trusted and vetted partner that's available to support their production and operational needs.
In a recent survey, Sumo Logic surveyed 1,500 customers who employ cloud services such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). According to the survey, a quarter of the respondents have already deployed Docker containers and nearly as many (23 percent) are employing the AWS Lambda serverless computing framework. It's clear: serverless is here to stay. The adoption does come with some needed changes, within both application development and operations. Th...