Proof of Work vs. Proof of Stake: Why Their Differences Matter (2024)

Editor’s Note:Please see the glossary at the end for all terms highlighted in sea green found in the order that they appear.

The consensus method is arguably the most crucial building block of distributed ledger networks because it defines how individuals reach agreement in a global and permissionless system. A key component of consensus is the Sybil resistance mechanism, as it protects the network against attacks. Proof of Work (PoW) and Proof of Stake (PoS) are the biggest Sybil resistance mechanisms.

While they serve the same purpose, PoW and PoS have significant differences in design that dictate a network’s throughput, security characteristics, level of decentralization and energy consumption. In this report, we break down why a PoW network might be more challenging to attack than a PoS network, but also why PoS offers higher scalability, adequate security, and potentially a more compelling economic model.

Key Takeaways

  • Coordination of distributed ledger network participants and ensuring confidence in network security falls to consensus mechanisms, where majority rules.
  • PoW and PoS are not consensus mechanisms, but they are important components of how a network derives consensus. They play a key role in determining a network’s security, decentralization, and scalability.
  • In our view, PoW can offer more robust security, whereas PoS’ scalability makes it more suitable for powering an asset as a medium of exchange, giving it the potential to provide a superior economic model for users and investors.

Consensus Mechanisms Coordinate Nodes and Ensure Network Security

Distributed ledger networks like Bitcoin, Ethereum, and Cardano are open for anyone to join, and have no overarching authoritative figure. However, these networks still need a system to ensure they are functioning properly and that they remain trustworthy. This system is manifested in consensus mechanisms, which coordinate the thousands of decentralized machines operating on the network to ensure that the shared ledger is secure.

Consensus ensures that all participants share an identical copy of the ledger. This is made possible by establishing rules that govern how a blockchain’s nodes determine the validity of transactions and blocks on the network. Consensus mechanisms are fundamental to a blockchain’s security because they reconcile the differences between honest participants and bad actors.

Proof of Work vs. Proof of Stake: Why Their Differences Matter (1)

Double spending, a risk unique to digital currencies, is the most common issue that illustrates the importance of consensus to a blockchain’s security. As the name implies, double spending occurs when an individual attempts to use a coin or token more than once. This scenario is problematic because it creates inconsistencies between transactional records and account balances on the shared ledger, rendering the token in question valueless.

Consider the example of a user who owns 1 bitcoin (BTC) and attempts to spend it. The transaction goes into a pool of unconfirmed transactions which miners compete to arrange into a block. Once a block is proposed and a majority of the miners in the network agree that its component transactions are valid, the block is posted to the blockchain. Time-stamped and inextricably linked to all previous blocks and transactions, the ledger is updated and cryptographically secured. If the user attempts to spend the same 1 BTC in a second transaction, the miners in the network would immediately identify the transaction as invalid, recognizing that a majority of the network already came to consensus on the validity of first transaction.

PoW and PoS Breakdown: The Leading Sybil Resistance Mechanisms

Consensus mechanisms are composed of numerous features, including information propagation algorithms, chain selection algorithms, and Sybil resistance mechanisms. Proof of Work and Proof of Stake are types of Sybil resistance mechanisms

A Sybil resistance mechanism protects the network against Sybil attacks in which an attacker seeks to gain control over the network by amassing a majority of the network’s voting power. With that power, the attacker would be able to censor transactions and even potentially bring the network to a halt. To prevent Sybil attacks, Sybil resistance mechanisms impose significant logistic and financial hurdles that make attacking a blockchain an extremely expensive and risky endeavor. These hurdles serve as economic incentives that promote compliant behavior and reprimand malicious activity.

Proof of Work vs. Proof of Stake: Why Their Differences Matter (2)

Proof of Work is a mechanism where nodes, called mining rigs, compete to solve a mathematical problem. The solver has the right to propose a block for validation and claim a block reward if the network agrees on the validity of the proposal. For example, the Bitcoin network currently issues 6.25 new BTC per block created, which happens approximately every 10 minutes.1 Mining rewards are proportional to a user’s share of the network’s computational power dedicated to solving new blocks, known as the hash rate. Miners typically use specialized hardware designed to mine as efficiently and profitably as possible. To incentivize good behavior, miners risk forfeiting potential rewards and incurring hardware and electricity costs if they propose blocks with invalid transactions.

With Proof of Stake, validators lock up or “stake” assets in a smart contract as an attestation of good intentions when validating transactions and proposing blocks. PoS uses a system where blocks are produced at defined intervals and the right to propose a block is assigned to validators randomly. This means that a validator’s accrual of block rewards is proportional to their share of the network’s total staked tokens. Bad actors risk having their staked tokens slashed or even eliminated, depending on the network’s rules. Because participants’ voting power depends on their share of the network’s total stake, a higher amount of staked tokens by honest actors makes it more expensive for bad actors to accumulate voting power. the result is greater network’s security.

Proof of Work vs. Proof of Stake: Why Their Differences Matter (3)

Security: PoW Tougher to Attack, but PoS Can Be Easier to Recover

We can break down a network’s resilience to attacks into two main factors: what it costs to attack the network and the network’s ability to respond to an attack effectively. For a PoW chain like Bitcoin, an attacker would need to amass 51% of the network’s computing power, which would require aggregating huge amounts of specialized mining hardware and electricity. For a PoS network, an attacker would have to acquire a large amount of the network’s staked tokens. In a rough, back-of-the-envelope calculation, using Bitcoin’s current hash rate and market capitalization, we estimate that the market value of 51% of tokens is roughly 5 times greater than the value of the hardware and electricity generating 51% of the Bitcoin networks hashpower.2

However, attacking a PoW network presents significant logistical challenges that PoS does not, as the attacker would have to find a way to acquire and power a majority of the network’s devices. In Bitcoin’s case, the network currently consumes 0.42% of the world’s annual electricity production; therefore, an attacker would need access an amount of energy comparable to Pakistan’s energy consumption to power the mining hardware.3 It is impossible to say with complete certainty, but it’s logical to assume that the hurdles associated with amassing mining hardware and finding enough electricity would make attacking a PoW network of this scale more challenging despite the higher base cost of attacking a PoS network.

In the unlikely scenario that an attacker was able to amass a majority of the voting power in a PoW system, however, recovering the network would be an incredibly demanding undertaking. Because a successful attack would allow the attacker to censor all transactions, honest miners would no longer accrue block rewards. Without these rewards, miners would be economically disincentivized from using electricity to run their mining rigs. By turning off their now unprofitable miners, the attacker’s share of the networks hashpower would inflate, cementing the attacker’s control. To regain control of more than 50% of the network’s hash power, a new contingent of honest miners would need to come online while potentially operating at a loss. Due to the scale of social coordination, logistical complexity, altruism required and the difficulty to identify the attacking party, recovering the network from a Sybil attack would be a significant challenge.

Conversely, PoS chains derive their security from within the network, meaning the staked tokens used to secure the network are registered to the network and are visible to all participants. This feature makes it comparatively easier to identify an attacker, arrest control of the network from them, and punish them financially for acting maliciously. As an added security measure, it is possible to fork a chain to create a new one, where the attacker wouldn’t hold any tokens and where normality can be restored. While this solution would go against the no-intervention ethos of cryptocurrency, it can be an effective last-resort option in a black swan event.

Proof of Work vs. Proof of Stake: Why Their Differences Matter (4)

Decentralization: There’s No Clear Winner, but PoS Is More Accessible

Decentralization is critical because it imparts blockchains with trustlessness, censorship resistance, and equal access. It refers to how dispersed the decision-making power is in a network, but it is not an exact science, and it can be tricky to quantify. Decentralization is largely a product of the number of nodes a network has and how equal the playing field is to run those nodes.

PoW networks typically have no limit on how many users can participate in mining. Among them, large entities can amass a significant amount of the mining hash rate, which can make the barrier to entry prohibitive. Economies of scale have a significant effect on PoW mining. To run a node profitably, mining rewards must exceed operating costs, and if profitability is great enough, large mining operations become attractive undertakings. This is because enterprise-scale mining operations are able to minimize their average energy cost per miner, partner with suppliers of the most advanced and competitive mining hardware and purchase this hardware at much lower prices than the average hobbyist miner.

Compared to PoW networks, PoS networks impose higher barriers to run validating nodes. PoS networks may enforce a minimum amount of staked collateral, limit the number of validators, or have prohibitively expensive hardware requirements to participate in validation. However, depending on the network, individuals can still accrue staking rewards without running a node by delegating their coins to a validator. Delegating requires little technical knowledge and is accessible to anyone. In exchange for running a node, validators usually charge a small fee of 10% or less on staking rewards. Over time, we expect these costs to decrease as validator services become more competitive.

Contributing to a PoS network’s security and benefiting from its rewards is widely accessible, and generally allows more people to participate profitably. It is important to note, however, that accessibility does not guarantee decentralization, at it will depend on each individual network’s architecture. For example, after Ethereum transitions to PoS it will have the most nodes with more than 422,000.4 Conversely, a chain like Solana has under 2,000 validators.5 While these chains both rely on PoS, Ethereum is much more decentralized than Solana.

Perhaps PoS’ greatest concern about decentralization is the following theoretical scenario. Over a long enough time horizon, large players could compound their staking rewards to amass a large percentage of a network. This could give them an overwhelming influence over the network, or even the ability to take over the network.

Proof of Work vs. Proof of Stake: Why Their Differences Matter (5)

Scalability: PoS More Efficient in Block Selection and Energy

Block selection in PoS blockchains typically happens at predetermined time intervals, whereas PoW is more random and relies on difficulty adjustment algorithms. The increased predictability in PoS networks means that they can chose validators faster, which can increase throughput. Additionally, PoS blockchains are more suited for scaling solutions such as shard chains without sacrificing on security standards.

Energy-wise, PoS is exponentially more scalable than PoW. PoW deters attackers by imposing significant hardware and energy costs. Conversely, PoS’ deterrence stems from the network’s value, meaning PoS can secure a network with a fraction of the energy that PoW uses. The reason energy is such an important factor in scalability traces back to blockchain security. The cost to attack a distributed ledger network must outweigh the potential benefit of gaining control over the network. To maintain this property in a PoW network, mining power must increase proportionately to the value within the network which means that, the network’s energy consumption must increase proportionately as well.

For a PoS chain, the value of staked assets on a PoS chain has the potential to increase proportionately to the value within the network. In other words, as the value of the PoS chain’s native token increases, so does the economic security of the network. This property gives PoS a scalability advantage over PoW.

Lower energy requirements also mean that PoS has the potential to offer a superior economic model for the regular investor. Due to PoW miners’ continuous expenditures on electricity and advanced hardware, it is significantly cheaper to compensate PoS validators for their services than PoW miners. Miners must sell their coins to offset their high energy costs, resulting in sell pressure. PoS validators do not have to sell their staked assets, as their operating costs are significantly lower. Additionally, investors can offset PoS assets’ inflation rates by participating in staking.

After Ethereum transitions to PoS, its issuance rate is predicted to drop by 90%, significantly reducing ETH’s inflation rate.6 The reduction in energy consumption will be even more drastic. The Ethereum Foundation, a non-profit that supports the development of Ethereum, estimates Ethereum’s migration to PoS will reduce its energy consumption 2000-fold.7 For perspective, Ethereum is expected to use 80% of the energy Visa uses per transaction following its transition to PoS.8 In contrast, Bitcoin uses a million times more energy per transaction than Visa.9 The high energy costs associated with PoW spurred regulators worldwide to crack down on certain mining operations, sometimes outright banning their activity, as China did in June 2021.

It is important to note that the PoW’s bad-for-the-environment stigma might not be justified. Energy consumption can be measured easily by the hash rate and broad estimates of the energy required to run the hardware. But to determine carbon emissions associated with consumption requires knowing the exact energy mix, which is much difficult to determine given the lack of transparent data. Over the long term, we expect PoW mining’s energy flexibility to be viewed as a key advantage that can help mining achieve carbon neutrality. Renewables and nonrival energy are the natural preferred choice for miners, as they are the cheapest sources of energy when available.10 Added demand for and attention given to renewables from the crypto world might help accelerate the global energy transition, and the renewables industry could benefit from its economies of scale.

Another key energy plus for PoW is that miners can also be highly mobile. This attribute gives miners the ability to utilize energy that would otherwise be wasted. For example, in the U.S., ExxonMobil and Crusoe Energy piloted a program that runs data centers for miners on excess natural gas that would otherwise be released into the atmosphere. Reportedly, diverting this gas to mining “reduces carbon dioxide-equivalent emissions by as much as 63%.”11 In addition, the possibility exists where during periods of high energy demand, miners would be able to sell theirs to the grid, helping to address potential energy shortfalls.12 Increasing total energy production capacity, and selling energy in periods of high demand can add robustness to an energy grid.

Proof of Work vs. Proof of Stake: Why Their Differences Matter (6)

Conclusion: Pros and Cons to Both, but PoS’ Scalability Is an Edge

Proof of Stake offers great scaling potential while possibly being more prone to Sybil attacks due to the absence of logistical hurdles. If under attack, it’s easier to recover a PoS network. Certain PoS networks are more decentralized than PoW networks and vice versa. PoW mining has no entry requirements to run nodes other than hardware and energy costs, whereas PoS protocols can have prohibitive validator requirements. Participating in a PoW network’s security may not be as accessible due to economies of scale, whereas anyone can delegate a PoS asset and participate in consensus. In the end, PoW and PoS have tradeoffs, but PoS’s edge is scalability.

In our view, PoS’ scalability makes it a better choice to power a medium of exchange. To onboard a growing number of users, blockchains require sufficient throughput to meet transactional demand and energy consumption that doesn’t bottleneck growth. PoS can also offer a more favorable economic model and it’s more accessible to participate in network security. For investors, it’s important to remember that the performance of a blockchain’s native asset will depend on several factors beyond their Sybil resistance mechanism. For additional information about what to consider when investing in digital assets please see The Case for Digital Assets in a Portfolio, and An Investor’s Guide to Smart Contract Blockchains.

Related ETFs

BKCH:TheGlobal X Blockchain ETFseeks to invest in companies positioned to benefit from the increased adoption of blockchain technology, including companies in digital asset mining, blockchain & digital asset transactions, blockchain applications, blockchain & digital asset hardware, and blockchain & digital asset integration.

Click the fund name above to view the fund’s current holdings. Holdings are subject to change. Current and future holdings are subject to risk.

Proof of Work vs. Proof of Stake: Why Their Differences Matter (2024)

FAQs

Proof of Work vs. Proof of Stake: Why Their Differences Matter? ›

Proof of work operates on competition, which means miners must consistently improve their equipment to have a chance to update the ledger. With proof of stake, however, one only needs to buy and hold the coins to have a chance. Critics believe these lower barriers can make proof of stake systems easier to manipulate.

Why is proof-of-work better than proof-of-stake? ›

Proof of work and proof of stake are the two main ways cryptocurrency transactions are verified. Proof of stake requires participants to put cryptocurrency as collateral for the opportunity to successfully approve transactions. Proof of work is more secure than proof of stake, but it's slower and consumes more energy.

Why is PoS better than PoW? ›

The main benefit of proof-of-stake blockchains is that they are significantly more energy efficient than PoW protocols. Because PoS validators are nominated to validate blocks rather than compete using costly equipment, they use less energy. The main downside of PoS consensus mechanisms is stake centralization issues.

What are the differences between proof-of-work and proof-of-stake consensus mechanisms answer? ›

In proof of work, the penalty for miners submitting invalid information, or blocks, is the sunk cost of computing power, energy, and time. In proof of stake, the validators' staked crypto funds serve as an economic incentive to act in the network's best interests.

Why does Ethereum want to change from proof-of-work to proof-of-stake? ›

What Is Ethereum Proof-of-Stake? — Ethereum officially switched to a Proof of Stake (PoS) consensus mechanism in 2022 as a more secure and energy-efficient way to validate transactions and add new blocks to the blockchain.

What is the main disadvantage of proof of stake? ›

Proof of Stake Drawbacks

Susceptibility to attacks decreases the overall security of the blockchain. Validators who hold large amounts of a blockchain's token or cryptocurrency may have an outsized amount of influence on a proof of stake system.

Which is safer proof of work or proof of stake? ›

Proof-of-work has shown to be the most reliable method of maintaining consensus and security in a distributed public network so far. This is because, unlike proof-of-stake, proof-of-work necessitates both an initial hardware investment and continuing resource expenditure.

What is the problem with proof-of-stake? ›

What Are the Disadvantages of Proof-of-Stake? Under Proof of Stake (POS) consensus, users must generally own a cryptocurrency before they can participate in consensus and earn more crypto. To host a full validator node on Ethereum, a user needs to stake 32 ETH, which is very expensive.

Why is proof of work more secure? ›

Proof of work allows for secure peer-to-peer transaction processing without needing a trusted third party. Proof of work at scale requires vast amounts of energy, which only increases as more miners join the network.

What is the difference between proof-of-stake and proof of work for dummies? ›

The main difference between proof of work and proof of stake is that proof of stake relies on crypto staking, while proof of work relies on crypto mining. These methods add new "blocks" of transactions to the historical record, and both provide a way for users to earn additional crypto.

Why doesn't Bitcoin use proof-of-stake? ›

Bitcoin's Code Is Immutable And Can Withstand Attempts To Make It Proof Of Stake. Attacks to make Bitcoin change its issuance mechanism to proof of stake are futile. History has shown that this type of attack will not work. Attacks to make Bitcoin change its issuance mechanism to proof of stake are futile.

Will Bitcoin move away from proof-of-work? ›

As long as bitcoin miners can profit from proof of work, Weaver says, they will choose proof of work: “The only way to reduce Bitcoin's criminal energy consumption is for the value itself to be destroyed. If Bitcoin becomes worthless, then bitcoin mining stops.” Bitcoin may not want to change.

Is proof-of-stake better for the environment? ›

The Proof of Stake consensus mechanism has emerged recently as a more secure and environmentally-friendly alternative to the proof of work validation mechanism described above.

What are the advantages of proof-of-work? ›

Proof of work allows for secure peer-to-peer transaction processing without needing a trusted third party. Proof of work at scale requires vast amounts of energy, which only increases as more miners join the network.

Is proof of stake energy efficient than proof-of-work? ›

Proof of Stake (PoS): Key Differences. PoW is secure but energy-intensive, yet confronts scalability challenges. PoS delivers scalability and energy efficiency at the expense of possible centralization issues.

What are some of the advantages of a PoS model for cryptocurrencies? ›

PoS pros
  • Energy efficiency. PoS uses less energy because it doesn't need the same level of computational power as PoW systems.
  • Scalability. PoS establishes a consensus before blocks are constructed, making the block creation process faster and more predictable. ...
  • Lower costs. ...
  • Decentralization. ...
  • Security.
Jul 3, 2024

How does proof-of-work prevent double spending? ›

Nakamoto's consensus mechanism solved the double-spend problem. By incentivizing miners to verify the integrity of new crypto transactions before adding them to the distributed ledger that is blockchain, proof of work helps prevent double spending.

Top Articles
A Guide to Postcard Sizes and Printing
7 GTA cities rank in the top 10 for highest rents across Canada – even studio apartments aren't getting off easy - NOW Toronto
Bubble Guppies Who's Gonna Play The Big Bad Wolf Dailymotion
55Th And Kedzie Elite Staffing
Devon Lannigan Obituary
Farepay Login
Driving Directions To Fedex
Google Jobs Denver
15 Types of Pancake Recipes from Across the Globe | EUROSPAR NI
Craigslist - Pets for Sale or Adoption in Zeeland, MI
Day Octopus | Hawaii Marine Life
Clairememory Scam
Shariraye Update
W303 Tarkov
Patrick Bateman Notebook
Kürtçe Doğum Günü Sözleri
Daylight Matt And Kim Lyrics
10 Fun Things to Do in Elk Grove, CA | Explore Elk Grove
EASYfelt Plafondeiland
Gina Wilson All Things Algebra Unit 2 Homework 8
The Tower and Major Arcana Tarot Combinations: What They Mean - Eclectic Witchcraft
Zillow Group Stock Price | ZG Stock Quote, News, and History | Markets Insider
The Listings Project New York
Walgreens 8 Mile Dequindre
Rapv Springfield Ma
Cardaras Funeral Homes
Mta Bus Forums
Bj타리
Our Leadership
R/Mp5
Advance Auto Parts Stock Price | AAP Stock Quote, News, and History | Markets Insider
Six Flags Employee Pay Stubs
Xemu Vs Cxbx
Montrose Colorado Sheriff's Department
Why Holly Gibney Is One of TV's Best Protagonists
Deshuesadero El Pulpo
Gary Lezak Annual Salary
T&Cs | Hollywood Bowl
Ferguson Showroom West Chester Pa
Setx Sports
Citroen | Skąd pobrać program do lexia diagbox?
2Nd Corinthians 5 Nlt
Uc Davis Tech Management Minor
Collision Masters Fairbanks
20 Mr. Miyagi Inspirational Quotes For Wisdom
The Bold and the Beautiful
El Patron Menu Bardstown Ky
St Als Elm Clinic
A Snowy Day In Oakland Showtimes Near Maya Pittsburg Cinemas
O'reilly's Eastman Georgia
Taterz Salad
Itsleaa
Latest Posts
Article information

Author: Golda Nolan II

Last Updated:

Views: 6773

Rating: 4.8 / 5 (58 voted)

Reviews: 81% of readers found this page helpful

Author information

Name: Golda Nolan II

Birthday: 1998-05-14

Address: Suite 369 9754 Roberts Pines, West Benitaburgh, NM 69180-7958

Phone: +522993866487

Job: Sales Executive

Hobby: Worldbuilding, Shopping, Quilting, Cooking, Homebrewing, Leather crafting, Pet

Introduction: My name is Golda Nolan II, I am a thoughtful, clever, cute, jolly, brave, powerful, splendid person who loves writing and wants to share my knowledge and understanding with you.