Proof-of-Work vs. Proof-of-Stake: Which Is Better? (2024)

Proof-of-work and proof-of-stake are consensus mechanisms, or algorithms, that allow blockchains to operate securely. These consensus mechanisms keep blockchains secure by allowing only genuine users to add new transactions.

They work by making potential participants prove they have dedicated some resource, like money or energy, to the blockchain. This feature helps filter out those who may not be genuine or committed to the network. The main difference between proof-of-work and proof-of-stake is how they choose who can add transactions to the chain.

Quick facts:

  • Proof-of-work and proof-of-stake are algorithms, also known as consensus mechanisms, that help blockchains synchronize data and remain secure.
  • These algorithms determine which node (computer) in the network can add the next block of transactions to the chain.
  • Both mechanisms have proven to be successful at maintaining blockchains, though they each have trade-offs.

What is proof-of-work?

Proof-of-work is a system where computers compete against each other to be the first to solve complex puzzles.

This process is commonly referred to as mining because the energy and resources required to complete the puzzle are often considered the digital equivalent to the real-world process of mining precious metals from the earth.

Nathaniel Popper’s book "Digital Gold" uses an analogy to describe proof-of-work in the Bitcoin system:

“It is relatively easy to multiply 2,903 and 3,571 using a piece of paper and pencil, but much, much harder to figure out what two numbers can be multiplied together to get 10,366,613.”

Using this analogy, we can imagine that a miner in Bitcoin’s network must figure out which two numbers can be multiplied to reach 10,366,613 by guessing combinations of numbers until it hits the correct answer. Once a computer determines that 2,903 can be multiplied with 3,571 to make 10,366,613, the computer presents the solution to the other computers in the network, which can easily verify that 2,903 and 3,571 do, in fact, equal 10,366,613 when multiplied.

When a miner solves this “puzzle” before other miners, they are allowed to create a new block (a grouping of transactions) and broadcast it to the network of nodes, which will then individually perform audits of the existing ledger and the new block. Should everything check out, the new block is "chained" onto the previous block, creating a chronological chain of transactions. The miner is then rewarded with bitcoins for supplying their resources (energy).

Proof-of-work, mining and security

Mining requires a great deal of electricity and secures the network by ensuring that only those that can prove they have expended resources are granted the right to append a new set of transactions to the blockchain.

Because of this feature, it is difficult, time-consuming and expensive to attack a proof-of-work system like Bitcoin’s. Attackers would need to purchase and set up mining equipment and pay for the electricity to run the equipment. They would then compete to solve the puzzle and attempt to add a block of transactions containing counterfeit bitcoins to the chain.

Should the nefarious miner successfully solve the puzzle first, they would try to broadcast a new block of transactions out to the rest of the network. The network’s nodes would then perform an audit to determine the legitimacy of the block and the transactions within it.

As the nodes audit the new block against the previous version of the ledger, they would notice the counterfeit bitcoins. The block would be considered invalid based on consensus rules.

Proof-of-work makes it impossible to counterfeit bitcoin unless a nefarious miner controls more than 50% of the entire network — this means they must control at least 51% of both the cumulative computing power of miners, known as the hashrate, and the nodes in the network. If they did control more than half of the network, the bad actor could broadcast a bad block to the network and have their nodes accept the block to the chain.

Given how large Bitcoin’s network has grown and how much energy miners contribute to the proof-of-work system, such an attack would be nearly impossible today.

If a government, company or other entity were to gather enough resources to successfully make up more than 50% of the network with the intention of attacking it, the network’s genuine participants would likely create a new branch of the chain, also known as a fork, rendering the previous chain and the attack against it useless.

What is proof-of-stake?

In the proof-of-stake system, validators (the proof-of-stake equivalent of miners) are chosen to find a block based on the number of tokens they hold rather than having an arbitrary competition between miners determine which node can add a block.

In this system, the “stake” amount, or quantity of crypto a user holds, replaces the work miners do in proof-of-work. This staking structure secures the network because a potential participant must purchase the cryptocurrency and hold it to be chosen to form a block and earn rewards.

Participants are required to spend money and dedicate financial resources to the network, similar to how miners must expend electricity in a proof-of-work system. Those who have spent money on coins to earn these rewards have a vested interest in the network's continued success.

Proof-of-stake prevents attacks and counterfeit coins with essentially the same mechanism as proof-of-work. Instead of controlling 51% of the mining hashrate and nodes, like with proof-of-work, attackers of a proof-of-stake system would need to hold at least 51% of the coin’s supply and control at least 51% of the network's nodes.

Pros and cons of proof-of-work and proof-of-stake

Proof-of-Work vs. Proof-of-Stake: Which Is Better? (1)

Proof-of-work pros, explained

Healthy competition and renewable energy

Competition in bitcoin mining is fierce. To lower their costs, mining companies constantly seek out the most efficient ways to mine. This process inherently rewards those who can find the cheapest forms of energy and come up with newer technology to create faster and more efficient chips for mining.

In addition to benefiting cryptocurrency mining, competition amongst chipmakers can result in breakthroughs in computer hardware that may carry over to other industries outside of crypto mining.

Trapped energy

Crypto mining allows some communities to harness their trapped energy and convert it into some form of value, which can then be transferred or used to fund other projects, ultimately generating economic activity in remote areas.

China’s Sichuan and Yunnan provinces are two real-world examples. These provinces have intense wet seasons that can produce enormous amounts of renewable hydroelectric power. Unfortunately, the provinces have no way of transporting and selling this energy to other areas.

The provinces began mining bitcoin to harness surplus energy and converted it to have tradeable value. In September 2019, China was responsible for over 70% of Bitcoin’s hashrate because of these cheap power sources. China later banned crypto mining as it sought to create its fiat digital currency. The move forced the massive exodus of miners to other areas where power is cheap. As a result, Kazakhstan became a mining hotspot alongside Iran and the United States.

Proof-of-Work vs. Proof-of-Stake: Which Is Better? (2)

Security

So far, proof-of-work has been the most proven way to maintain consensus and security within a distributed public network. This is because proof-of-work requires the initial cost of hardware and the ongoing expenditure of resources, rather than a single upfront expense to participate like proof-of-stake.

Bitcoin was launched in 2009 and has had an over 99.98% uptime. As of writing, there have only been two instances of downtime: once in August 2010 and another in March 2013. These two incidents were solved with opt-in software updates to nodes — thanks to the consensus mechanism, network participants all decided these updates were in the best interest of the collective network.

Proof-of-work cons, explained

Energy consumption

Bitcoin and other proof-of-work blockchains, like Ethereum, consume significant amounts of energy to provide their security model to their networks. Bitcoin consumes more power than entire nations, including Ukraine and Norway. Environmentalists have argued that the practice is wasteful.

Rebuttal: While these systems consume massive amounts of energy, many critics fail to evaluate the types of energy used for mining and instead equate its high energy use to a large environmental footprint. However, studies have shown that bitcoin miners use various energy sources in their operations. Some estimates have shown renewable energy to be the dominant form used, ranging between 50% to over 70% of total power used.

It is important to note that many of these studies only report on mining companies and other operations that wish to participate in surveys.

E-Waste

Electronic waste may be the most valid criticism of the bitcoin network’s consumption of resources. Proof-of-work miners generally run at full power 24/7. Sometimes poor conditions like humidity, high temperatures and inadequate ventilation impact mining facilities and shorten equipment lifespan.

On top of that, ASIC chip manufacturers are constantly developing newer, more effective chips. When an innovation occurs, old chips become less effective at winning blocks than newer chips. Eventually, the older chips are phased out and become e-waste.

Rebuttal: Current ASIC mining chips typically last between three to five years. While new chips eventually replace older chips, they are likely to last longer as they become more efficient and resistant to high temperatures and prolonged hashing.

Traceability

Censorship and traceability are other crypto mining concerns, which have already occurred in places like China, where cryptocurrency mining was banned. The immense power draw can be located using electricity readings or even thermal cameras. The ability to trace where crypto mining takes place allows anti-crypto regimes to crack down on the practice.

If a nation were to allow mining only for those who have secured some type of license, it could undermine decentralization by not allowing the network to be completely public.

Rebuttal: Outside of China, nations around the world seem to be pro-crypto in some capacity. Some countries may seek to regulate mining. However, as long as miners can still operate in remote areas, it should help to prevent monopolization and censorship.

Proof-of-stake pros, explained

Efficiency

Proof-of-stake systems are significantly more energy-efficient than proof-of-work operations. The hardware requirements of many proof-of-stake systems are equivalent to average laptops on today’s market. Validator software is also not very demanding across most proof-of-stake systems.

Increased throughput

In proof-of-stake, validators are chosen to find a block based on how many tokens they hold, rather than a competition among miners to solve a puzzle. The time it takes for the proof-of-stake algorithm to choose a validator is significantly quicker than the proof-of-work competition, allowing for increased transaction speeds.

While this is true, all blockchains — whether they are proof-of-stake or not — are slowed by the process of nodes reaching a consensus after a validator broadcasts the newly found block to them.

Censorship resistance

Unlike proof-of-work, which requires lots of energy and a significant physical presence, proof-of-stake validators can be running on small laptops. This means that a single validator controlling a third of a globally distributed monetary network could operate in the corner of a coffee shop rather than a warehouse filled with thousands of humming computers.

Lower barrier to entry

Proof-of-stake validators only need to spend money once to participate — they must buy tokens to win blocks in the proof-of-stake model. In contrast, a miner in a proof-of-work system must purchase mining equipment and keep it running indefinitely, incurring energy costs that can fluctuate. This allows more individuals to participate who otherwise wouldn't be able to.

Proof-of-stake cons, explained

Unproven at large scale

A proof-of-stake system has yet to scale to the size of Bitcoin or Ethereum. For this reason, proof-of-stake systems are not yet as decentralized or secure as leading proof-of-work systems.

Rebuttal: While proof-of-stake systems have not yet become the size of networks like Bitcoin’s, there is no reason they cannot with time. Proof-of-stake systems may have the potential to scale beyond what proof-of-work systems are capable of, given that there is a lower barrier to entry and specialized hardware is not required to run them.

Coin consolidation

Consolidation of coins among only a few validators is the most common argument against proof-of-stake systems. The nature of proof-of-stake incentivizes the accumulation of coins to increase the chance of winning a block and receiving a reward.

Token markets can be cornered by an entity with deep pockets, allowing them to amass a majority of tokens. Most proof-of-stake systems let single entities create any number of validators, and because there is little upfront financial cost to create validators, someone who controls the majority of tokens could control the majority of the network.

This makes the initial distribution of proof-of-stake coins extremely important. Some newer proof-of-stake coins sell tokens to investors before they’re publicly available. In some cases, these token sales have made up 40% or more of max token supplies giving venture capital firms and other early investors a considerable advantage over others in earning network rewards.

Rebuttal: It’s true that proof-of-stake chooses block creators mainly by the size of their stake, but some blockchains are already beginning to implement methods to reduce this risk of centralization. Some are including a degree of randomization and factors such as “coin age,” or how long the stake has been held, to the selection algorithm. This ensures that stake size isn’t the only factor in determining block formation and that smaller validators have a chance of winning.

Some blockchains have structured their systems so that validators who surpass a certain threshold of coins begin receiving fewer rewards. This incentivizes stakers to delegate their stake to smaller validators, helping spread tokens across more validators, increasing decentralization and security.

Less robust security

As mentioned above, having a lower barrier to entry for network participants can help increase validator count and, by extension, decentralization, but making it easier to become part of the network can also decrease its security.

Should a bad actor seek to attack a proof-of-work network, they would need to buy enough hardware to represent the majority of the network, and then they would need to pay to run it all. The two-fold security system of the initial cost of equipment and the ongoing energy costs makes attacking the network less realistic. Proof-of-stake systems only have initial upfront costs to participate, leaving them more open to attack.

Bitcoin’s current hashrate is nearly 200 million terahashes per second. Bitmain’s top-of-the-line ASIC miner, the S19J, can do 88 terahashes per second. By that measure, it would take roughly 1.2 million of these chips to make up just half of Bitcoin’s network. The current price of this ASIC is $10,390 per unit, meaning it would cost roughly $12.5 billion to purchase enough miners to make up half of Bitcoin’s network, only to then pay enormous fees to run the machines.

In contrast, if a nefarious actor wished to attack a proof-of-stake chain, take Avalanche for example, they would need to buy over half the tokens (roughly $19 billion at current prices) and set up enough validators to make up over half the network (630 validators at Avalanche’s current validator count). Because proof-of-stake validators don’t necessarily require expensive hardware or tons of energy to run, attackers only incur the upfront cost of purchasing tokens rather than ongoing energy costs.

Rebuttal: The initial upfront cost to attack a proof-of-stake network of sufficient size is becoming large enough that the issue of not having ongoing costs is slowly becoming irrelevant. For example, becoming the majority stake in Avalanche already requires nearly $20 billion at today’s prices. The more popular these blockchains become and the more holders of a proof-of-stake network’s coin there are, the harder it is to attack it.

Frequently asked questions

What is proof-of-work?

Proof-of-work is a tool that secures a blockchain and helps it maintain accurate information (transactions). Computers (nodes) in the system race to see who can solve a complex puzzle first. Winners of this race are then allowed to add a new block of transactions to the chain. This puzzle takes large amounts of costly energy to solve, ensuring participants are more likely to be genuine. Those who win are rewarded with bitcoin.

What is a bitcoin miner?

A bitcoin miner is a computer that participates in the competition to solve puzzles in proof-of-work blockchains. They use large amounts of energy in this process and are rewarded with bitcoin when they beat everyone else in solving the puzzle. It is called mining because the energy and resources required are often considered the digital equivalent to the real-world process of mining precious metals from the earth.

Check out our explainer for more info on the profitability and economics of bitcoin mining.

What is proof-of-stake?

Proof-of-stake is a tool to secure a blockchain and help it maintain accurate information. It uses an algorithm that chooses who can add the next block of transactions to the chain based on how many tokens are held.

What is a validator in proof-of-stake?

A validator is the proof-of-stake equivalent of a miner in proof-of-work. Validators are nodes in a blockchain network that “stake” or pledge their tokens to the network. Validators are chosen to create new blocks of transactions based on how many tokens they hold. Other token holders who are not validators can delegate their holdings to a validator to get a share of rewards a validator earns when they are chosen to create a new block of transactions.

Tags
  • Bitcoin
  • blockchain
  • Consensus mechanism
  • Crypto
  • cryptocurrency
  • Ethereum
  • Proof of stake
  • Proof of work
Proof-of-Work vs. Proof-of-Stake: Which Is Better? (2024)

FAQs

Proof-of-Work vs. Proof-of-Stake: Which Is Better? ›

Proof of work and proof of stake are the two main ways cryptocurrency transactions are verified. Proof of stake requires participants to put cryptocurrency as collateral for the opportunity to successfully approve transactions. Proof of work is more secure than proof of stake, but it's slower and consumes more energy.

What is better, proof of work or proof of stake? ›

So far, proof-of-work has been the most proven way to maintain consensus and security within a distributed public network. This is because proof-of-work requires the initial cost of hardware and the ongoing expenditure of resources, rather than a single upfront expense to participate like proof-of-stake.

What are the disadvantages of proof of stake? ›

What Are the Disadvantages of Proof-of-Stake? Under Proof of Stake (POS) consensus, users must generally own a cryptocurrency before they can participate in consensus and earn more crypto. To host a full validator node on Ethereum, a user needs to stake 32 ETH, which is very expensive.

Is proof of stake energy efficient than proof of work? ›

In Proof of Stake (PoS), the creation of a new block is based on the stake or wealth of a user in the cryptocurrency, rather than on solving a mathematical puzzle as in PoW. This process requires less computational power, making PoS more energy-efficient.

Is PoS less secure than PoW? ›

With no objective POW base, POS networks have no work done to discern which is the correct block in each round. POW stamps in each block require so much work to create that it is very difficult for attackers to imitate them, thus to corrupt the system.

Is Cardano proof of stake? ›

Cardano (ADA) is a decentralized Proof-of-Stake (PoS) blockchain designed to be more efficient than blockchains that rely on Proof-of-Work (PoW).

Is ETH proof-of-work yes or no? ›

In 2022, Ethereum underwent one of its biggest transformations: the transition from a Proof-of-Work (PoW) to a Proof-of-Stake (PoS) consensus mechanism.

Is PoA better than PoS? ›

PoA, with its limited number of trusted validators, can handle a higher transaction throughput compared to PoS. However, PoS has the potential for higher scalability as it doesn't require a central authority to validate transactions.

What is an advantage of proof-of-work? ›

Advantages and disadvantages of proof of work
ProsCons
High level of security.Inefficient with slow transaction speeds and expensive fees.
Provides a decentralized method of verifying transactions.High energy usage.
Allows miners to earn crypto rewards.Mining often requires expensive equipment.

Is proof of stake fair? ›

Abstract—Blockchain applications that rely on the Proof-of-Work (PoW) have increasingly become energy inefficient with a staggering carbon footprint. In contrast, energy efficient alternative consensus protocols such as Proof-of-Stake (PoS) may cause centralization and unfairness in the blockchain system.

Is proof of stake better for the environment? ›

It has been reported that using the proof of stake consensus mechanism uses 99% less energy than the proof of work mechanism.

How effective is proof of stake? ›

Proof of stake is faster, sidesteps the energy burn, and requires no special computing equipment. For these reasons and others, it's the validation protocol for newer waves of cryptocurrencies and altcoins. For example, Ethereum 1.0 uses proof of work, but Ethereum 2.0 uses proof of stake.

How much less energy does proof of stake use? ›

Ethereum's co-founder, Vitalik Buterin, claimed the PoS transition would reduce global electricity usage by 0.2% and cut crypto carbon emissions by 99.992%. However, it is unclear whether Ethereum's PoS really is a sustainable alternative to PoW and whether Buterin's predictions hold true.

What is safer proof-of-work or proof of stake? ›

Proof-of-work has shown to be the most reliable method of maintaining consensus and security in a distributed public network so far. This is because, unlike proof-of-stake, proof-of-work necessitates both an initial hardware investment and continuing resource expenditure.

What is the greatest benefit of PoS compared to PoW? ›

Pros and cons of PoS

The main benefit of proof-of-stake blockchains is that they are significantly more energy efficient than PoW protocols. Because PoS validators are nominated to validate blocks rather than compete using costly equipment, they use less energy.

Will Bitcoin move to proof of stake? ›

Bitcoin's code is immutable and has demonstrated its resilience to attempts to change its underlying mechanisms. While Ethereum, a prominent cryptocurrency, successfully underwent a transition from Proof-of-Work to Proof-of-Stake in 2022, it is unlikely that Bitcoin will follow suit.

How much more efficient is proof of stake? ›

Because significant computer power is not required for the proof of stake mechanism to function properly, a greater number of transactions can be validated while also using less power as compared to the proof of work mechanism.

Is ethereum proof of stake better? ›

Security. Ethereum researchers consider proof-of-stake more secure than proof-of-work. However, it has only recently been implemented for the real Ethereum Mainnet and is less time-proven than proof-of-work.

Top Articles
Bitcoin at $100,000? Insiders say the cryptocurrency could test new highs this year
Cheap flights from Ghana to Canada | TAP Air Portugal
Riverrun Rv Park Middletown Photos
The Largest Banks - ​​How to Transfer Money With Only Card Number and CVV (2024)
Bj 사슴이 분수
O'reilly's Auto Parts Closest To My Location
Obor Guide Osrs
Ixl Elmoreco.com
Mcoc Immunity Chart July 2022
South Carolina defeats Caitlin Clark and Iowa to win national championship and complete perfect season
Anki Fsrs
Infinite Campus Parent Portal Hall County
Uvalde Topic
Nalley Tartar Sauce
Buff Cookie Only Fans
VMware’s Partner Connect Program: an evolution of opportunities
Unlv Mid Semester Classes
Craftology East Peoria Il
Costco Gas Foster City
Jayah And Kimora Phone Number
FDA Approves Arcutis’ ZORYVE® (roflumilast) Topical Foam, 0.3% for the Treatment of Seborrheic Dermatitis in Individuals Aged 9 Years and Older - Arcutis Biotherapeutics
Eine Band wie ein Baum
Stoney's Pizza & Gaming Parlor Danville Menu
Evil Dead Rise Showtimes Near Pelican Cinemas
Greenville Sc Greyhound
12 Facts About John J. McCloy: The 20th Century’s Most Powerful American?
Craigslist Ludington Michigan
Coindraw App
Summoners War Update Notes
Frank Vascellaro
Www.1Tamilmv.con
Tripcheck Oregon Map
The Bold and the Beautiful
Wega Kit Filtros Fiat Cronos Argo 1.8 E-torq + Aceite 5w30 5l
Jr Miss Naturist Pageant
拿到绿卡后一亩三分地
Stafford Rotoworld
Infinite Campus Parent Portal Hall County
9 oplossingen voor het laptoptouchpad dat niet werkt in Windows - TWCB (NL)
Cl Bellingham
Blackwolf Run Pro Shop
'The Night Agent' Star Luciane Buchanan's Dating Life Is a Mystery
18 Seriously Good Camping Meals (healthy, easy, minimal prep! )
Sml Wikia
Samantha Lyne Wikipedia
March 2023 Wincalendar
Lsreg Att
Bumgarner Funeral Home Troy Nc Obituaries
Skybird_06
Fishing Hook Memorial Tattoo
Obituaries in Westchester, NY | The Journal News
Latest Posts
Article information

Author: Otha Schamberger

Last Updated:

Views: 6598

Rating: 4.4 / 5 (55 voted)

Reviews: 94% of readers found this page helpful

Author information

Name: Otha Schamberger

Birthday: 1999-08-15

Address: Suite 490 606 Hammes Ferry, Carterhaven, IL 62290

Phone: +8557035444877

Job: Forward IT Agent

Hobby: Fishing, Flying, Jewelry making, Digital arts, Sand art, Parkour, tabletop games

Introduction: My name is Otha Schamberger, I am a vast, good, healthy, cheerful, energetic, gorgeous, magnificent person who loves writing and wants to share my knowledge and understanding with you.