top | item 27500535

(no title)

casi | 4 years ago

That isn’t how it works.

There isn’t a cap on validators so you can’t buy up a fixed percentage of the network. More people can always join. You will be diluted over time unless you choose to reinvest(same as mining).

As we reduce the hardware costs and energy usage costs it becomes easier to participate in the network (especially via pools, same as mining but much much cheaper).

Being able to run a validator on a solar powered raspberry pi is a great improvement to making participation in the network accessible. We should see the exact opposite of what you suggest, anyone who wants to participate not having energy or hardware restrictions should make it less Matthew-effect-like.

PoS increases both the cost of a direct attack on the network as reorganised/51s are more expensive to perform with slashing mechanisms in place, and also removes the threats of supply line disruption by either nation states or cartels forming to control the flow of the hardware.

PoS is great.

discuss

order

keymone|4 years ago

> There isn’t a cap on validators so you can’t buy up a fixed percentage of the network

you can during a pre-sale or pre-mine event

> More people can always join

joininng as validator means convincing another validator to reduce their stake (sell it to you), which is a form of permission.

> You will be diluted over time unless you choose to reinvest

you can't be diluted if you don't sell you stake and continue staking. that's just by definition how PoS works.

> PoS increases both the cost of a direct attack on the network as reorganised/51s are more expensive to perform with slashing mechanisms in place, and also removes the threats of supply line disruption by either nation states or cartels forming to control the flow of the hardware.

nope, literally none of it is true.

slashing mechanisms only obfuscate the attack, they don't make it more expensive. in fact they reduce security by virtue of piling more and more rules that require more and more code, which inevitably contains bugs.

threats of supply chain attacks are much less scary than threats of long range attacks from hacked / overtaken private keys of early / current validators.

producing more hardware to counter an attack might be expensive and early iterations of hardware can be inefficient, but at least nobody can stop you from producing it. as i've already explained - if somebody gets a stake in pos system, there is nothing you can do to reduce it.

pos simply doesn't work. it's been known a decade before pow and was just never considered seriously because it's not trustless and permissionless.