How Consensus Algorithms Shape Web3 Infrastructure.

Private and public blockchains enable vastly different forms of financial engineering. Consensus algorithms lie at the core of this distinction.

ZERO PRIVACY

CENSORSHIP

MALICIOUS ATTACKS

  1. Proof of Authority (PoA): The right of a node to participate is determined by proving its identity.
  2. Proof of Elapsed Time: A randomly determined window of time is set. The first node to complete a task within that time wins the new block.
  3. Proof of Importance: Nodes with a higher “score” have better odds of winning a new block. Basically, a rigged blockchain.
  4. Practical Byzantine Fault Tolerance: This assumes that at least 2/3 of amount of the overall nodes in the system cannot simultaneously be malicious. One node is chosen as the leader, and others are designated as backups.

--

--

Wandering the blockchain and talking to myself online. Current arc - character development.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
web3bandit

Wandering the blockchain and talking to myself online. Current arc - character development.