• 0 Posts
  • 6 Comments
Joined 1 year ago
cake
Cake day: January 8th, 2024

help-circle
  • For just accessing a simple resource, it does not use a whole lot of power because it only gets activated when the resource is under load and it helps to sort traffic based on effort placed to the POW puzzle. You can choose to place zero effort and be put in the back of the line, but people who choose to put in some small effort will be put in front of you, and people who put in a larger effort will be in front of them until the resource is no longer oversubscribed, and then it will drop back down to zero. That’s how the Tor network handles it and it works incredibly well. It has stopped the denial of service attacks in their tracks. In most cases, it’s hardly ever even active. Just because it is there, deters attacking it.




  • To be fair I’m not a huge fan of pure proof of stake because it makes validation more difficult because you have to have code for slashing somebody’s stake if they are malicious or bad and a malicious entity could just buy up a bunch of your tokens and tank them. Admittedly, not a lot of people would do so, but I could totally see a government buying up a bunch of tokens on a network and purposely crashing the network in order to rid themselves of a nuisance and calling it justified. Proof of work makes that much more difficult. Still doable for certain, but much, much more difficult.