IT Brief Asia logo
Technology news for Asia's largest enterprises
Story image

Blockchain: Why I prefer Proof of Stake (And why Ethereum does too)

By Contributor
Fri 22 Jul 2022

Article by CENNZnet CEO Nicole Upchurch.

Consensus mechanisms are tough to get right. Without a good one, the whole concept of decentralisation falls apart quickly: your efficient, fair, real-time, functional, reliable, and secure public ledger simply doesn’t exist.

Fortunately, some very elegant mechanisms have emerged. Two key mechanisms are Proof of Work, favoured by Bitcoin, and the more recent plucky little brother, Proof of Stake, which sorts out the issues created by its older sibling.

CENNZnet, New Zealand’s largest public blockchain, uses Proof of Stake. And you may have heard about The Merge? This is the name given to Ethereum’s upcoming move to using the Proof of Stake consensus mechanism. This enables Ethereum to use around 99% less energy and allows the network to scale.

Why is Proof of Stake preferred by both Ethereum and CENNZnet? Read on to find out more.
 
What are blockchain consensus mechanisms?

A blockchain is only ever as good as its consensus mechanism. They require finding a workable way to get the whole (or at least the clear majority) of your decentralised community to commit to one agreed-upon version of the ledger: one that is accurate and free from malicious or false transactions. However, there’s the issue of scalability. If everyone hosts a version of the ledger, that’s A LOT of computing power that’s only going to increase as the community grows.

A mix of both social and technical engineering is required to achieve agreement (or consensus) on single data values or parts of the network among the decentralised system. As a result of consensus being reached, new blocks are created and added to the chain.

These mechanisms are crucial for a self-regulating, decentralised community as there is no single authority to decree what does and doesn’t go in the ledger. A robust consensus mechanism ensures a secure blockchain ecosystem that is both fair and accurate.

Proof of Stake

Proof of Stake (PoS) was developed in 2012 as a way of maintaining the benefits of a robust consensus mechanism without the huge energy demands of PoW. It’s been adopted by several forward-thinking blockchain networks – CENNZnet included - and work is being done to establish it on Ethereum 2.0 (This is ‘The Merge’, my friends). 

How does Proof of Stake work?

Instead of miners competing to broadcast a block, PoS uses a system of Validators who are pseudo-randomly selected to forge the next block. Validators can be chosen based on a combination of factors that could include the Validator’s wealth, staking age or randomisation. Network members who want to participate in the forging of new blocks do so by staking. Staking is the process of holding funds in a specific cryptocurrency wallet which act as collateral for network security.

Most staking systems require all their node operators (Validators) to hold or stake their tokens in a wallet. They do this to add validity to their ‘promise’ to perform their forging responsibilities correctly. This includes forging blocks when required and verifying the work of other Validators. If they perform their duties correctly and all the other node operators can verify this, then the stake is returned, and a reward is given. However, if the node operator fails to perform their duties, their stake will be slashed – a portion taken away. This way, all node operators are incentivised to do the right thing for the blockchain.

The more tokens that are staked in the system, the more network users are invested in correctly following the blockchain protocols, which makes the whole ecosystem more secure.

What are the benefits of Proof of Stake?

The overwhelming benefit of PoS, and the reason it was created, is that it uses significantly less energy than PoW. Staking is not an energy-intensive process, and as a result, a blockchain network can comfortably expand without worrying about the colossal environmental impact. There are also some other key benefits to the Proof of Stake system:

PoS is more decentralised

Minimum stake thresholds are fairly low and accessible to most token holders.

PoS offers more security for the same cost

Check out Vitalik Buterin’s cost analysis of stake and Proof of Work side by side.

Attacks are much easier to recover from in PoS

PoS’s slashing mechanism protects the network against multiple attacks by the same malicious parties. Each attack requires a fresh set of tokens, making it continually expensive to attack the network. In PoW, successful first attacks can lead to much more dangerous ‘spawn camping’ attacks where continuing to attack the network becomes very cheap. This causes normal miners to drop out as they lose their ability to receive rewards while the attack is going on.

Why does CENNZnet use Proof of Stake?

Proof of Stake is the clear winner for CENNZnet. It is the dominant alternative to PoW and provides a far more environmentally sustainable way to secure the network. Ethereum and many other promising projects are adopting PoS. With Proof of Stake, we are benefiting from the innovation and brains of some of the best people in the blockchain space.

Related stories
Top stories
Story image
Tech job moves
Tech job moves - Cohesity, Equinix, IDC, Proofpoint & Xero
We round up all job appointments from July 29 - August 5, 2022, in one place to keep you updated with the latest from across the tech industries.
Story image
Firewall
Fortinet unveils compact firewall for hyperscale data centres, 5G networks
"Fortinet’s dedication to pushing the boundaries of what is possible in security performance has yielded the most powerful compact firewall yet."
Story image
Enterprise
Fortinet reports second quarter 2022 financial results
“We delivered strong revenue and billings growth in the second quarter driven by an increase in the number of transactions larger than one million dollars."
Story image
Mergers and Acquisitions
Netskope acquires Infiot, delivers integrated SASE platform
Converged SASE platform provides AI-driven zero trust security and simplified, optimised connectivity to any network location or device, including IoT.
Story image
SaaS
Why is MACH architecture a new big thing in the tech world?
More and more global enterprises are considering replacing the monolithic tech stack with the best-of-breed composable stack that enables greater business agility.
Story image
Cloud
TBC Bank decreases time to market for new offerings by 40%
TBC Bank has reduced time to market for new and enhanced products and services by 40% since implementing Kong Enterprise, the cloud native API platform. 
Story image
Data
NOVATION releases cloud-based solution to maximise value of data
NOVATION has announced the release of DataVio, its cloud-based solution for helping businesses automate the processing and extraction of data.
Story image
SAP
OutSystems joins SAP PartnerEdge program, integrates solutions
OutSystems has become an official member of the SAP PartnerEdge program. This will make it easier for other businesses within the SAP ecosystem to discover and connect with OutSystems.
AWS Marketplace
Watch this webinar to gain building blocks for data mesh, and how AWS customers today are successfully enabling domain driven data.
Link image
Story image
Hybrid Cloud
The essential guide to digital transformation by SolarWinds
Digital transformation is a buzzword thrown around all the time by companies, but what does it actually mean and why is it important? SolarWinds breaks it down.
Story image
Cybersecurity
FirstWave responds to SMB demand for better cybersecurity
FirstWave developed the CyberCision Open Security Management Platform to respond to SMBs 'urgent' need for comprehensive cyber protection.
Story image
Radware
Good or bad - answer these questions to check application visibility
With the adoption of the hybrid cloud, applications now run in multiple private and public cloud environments managed by different teams and tools.
Story image
Ransomware
Majority of execs in SEA anticipate ransomware attacks
Kaspersky's study uncovers that more than half believe a ransomware attack against their business is too small to worry about.
Story image
Data
Hazelcast launches beta release of new serverless offering
Hazelcast Viridian Serverless speeds up app development, simplifies provisioning, and enables integration of real-time data into applications.
Story image
CRM
Forrester names Pega a Leader in CRM Solutions 2022 report
Forrester Research has named Pega a Leader among 11 competitors in The Forrester Wave: Core CRM Solutions, Q3 2022 report.
Story image
Appointments
Tech job moves - Checkmarx, Kinly, Syniti, Trellix & WalkMe
We round up all job appointments from July 22-28, 2022, in one place to keep you updated with the latest from across the tech industries.
Story image
Ransomware
Ivanti and SentinelOne partner on patch management solution
Ivanti and SentinelOne will integrate their technologies Ivanti Neurons for Patch Management and SentinelOne's Singularity XDR platform.
Story image
Cybersecurity
More than a fifth of cybersecurity teams ban the use of public WiFi
Verizon’s fifth annual Mobile Security Index report has revealed a continued rise in significant cyberattacks in the last year involving a mobile/IoT device.
Story image
SaaS
Viavi updates Observer platform to simplify cloud monitoring
Version 18.8 simplifies cloud monitoring with data centre-like visibility, bringing two key capabilities to cloud-based applications and deployments.
Story image
Internet of Things
AI-Link chooses Keysight offering to validate 5G performance
AI-Link has chosen Keysight Technologies' 5G test tools for end-to-end performance validation of cloud-native 5G radio access network (RAN) equipment.
Story image
SaaS
OpenText launches new solutions on Salesforce AppExchange
Included in this latest launch is OpenText Core Content, a Content Services platform that customers can leverage to effectively manage their content.
Story image
SAP
Microsoft unveils two new security products to help reduce attack surfaces
The products are set to give companies deeper insights into threat actor activity and help them successfully navigate the changing threat landscape.
Story image
Partnership
NCS, FPT Software launch Strategic Delivery Centre in Vietnam
The new partnership is designed to support increasing demand for high quality digital services across the region.
Story image
Apps
Freshworks integrates with Google's Business Messages
"The integration with Freshworks makes it fast and easy for businesses to have conversations with their customers within the Google apps."
Story image
Product Management
TeamViewer and Siemens to innovate product lifecycle space with AR
TeamViewer's new partnership with Siemens Digital Industries Software to bring the power of TeamViewer's AR platform, Frontline, to Siemen Teamcenter software.
Story image
API
Security gaps in APIs plague organisations - study
Together, the findings highlight that existing solutions and API security tactics focused on shift-left strategies are failing to adequately protect APIs.
Story image
SaaS
ManageEngine unveils SaaS availability of Analytics Plus
ManageEngine's Analytics Plus is now available as a software as a service (SaaS) offering, enabling users to set up a completely functional and integrated analytics platform anywhere in under a minute.
Story image
Remote Working
Four-day week: Perceptions across Asia Pacific and Japan
Workers across APJ want to be empowered to do their best work, wherever and whenever they want.
Story image
Infrastructure
New developments for cable set to connect South America to APAC and Oceania
Further proposals have been issued to begin construction of the almost 15,000 km subsea Humboldt Cable cable, which connects South America to APAC and Oceania.
Story image
Cybersecurity
Qualys develops EASM capabilities for Cloud Platform
"Qualys unique approach to EASM is integrating the internal and external asset data from CyberSecurity Attack Management with its VMDR solution into a single view."
Story image
Healthcare
Why the Metaverse could be the key to enhancing the healthcare sector
The experts at Accenture understand that the programmable world is about building the next version of the physical world in healthcare, understanding complex layers in order to fully utilise technology to its maximum effect.
Story image
Data Centre Maintenance / Management
Vertiv releases update to Smart InfraSight platform
Vertiv has unveiled an update to its Smart InfraSight data centre management platform, featuring improved intelligence and the ability to manage multiple IT devices.
AWS Marketplace
See how managed security services (MSS) have evolved to Managed Detection and Response (MDR) and Extended Detection and Response (XDR). Learn how these new holistic solutions can simplify security management and improve your threat detection and response.
Link image
Story image
Compliance
Why security needs to shape your journey to the cloud
It's estimated that 80% of workloads could be in the cloud in the next few years. How can you make all that data secure?
Story image
Robotic Process Automation / RPA
Gartner anticipates RPA software revenue of US$2.9 billion
Gartner predicts global robotic process automation (RPA) software revenue to reach US$2.9 billion in 2022, an increase of 19.5% from 2021.
Story image
Data Protection
CyberRes partners with Google Cloud in lead up to BigQuery release
CyberRes, a Micro Focus line of business, has announced a partnership with Google Cloud to support the upcoming release of BigQuery remote functions.
Story image
10 Minute IT Jams
Video: 10 Minute IT Jams - An update from Incode Technologies
Jonathan Andresen joins us today to discuss the identification and authentication solutions offered by Incode.
Story image
Digital Transformation
Government needs content services aligned for better customer experience
Organisations across all industries in the private sector have made significant progress in digital transformation. The public sector, however, has not always kept up with the pace.
AWS Marketplace
Learn how security orchestration, automation, and response (SOAR) enhances your security strategy.
Link image
Story image
Indusface
Why enhancing bot protection for web and API endpoints matters
The trouble with bots is that they aren’t all bad. Unfortunately, this can make it challenging to detect malicious bots that find their way into your system and threaten your business.
Story image
Healthcare
SOTI research explores professional's thoughts on digitisation in the healthcare sector
Interconnectivity, automation and data management were the three key trends highlighted in the report as integral parts of successful medical technology implementation.