The Summer When “Sushi” And “Hotdog” Burnt The Noobs

The DeFi space is notorious for copycat blockchain projects which don’t really deliver anything useful other than a quick pump and dump. Those who get in first benefit, dumping on those who come much later in the anticipation of ginormous returns. It just is not going to happen, unless you aren’t the “fool” (e.g. Greater Fool Theory). The problem is due to human nature. Many are looking at these DeFi projects as “get rich quick” schemes as they try to get in early and exit early with profits while leaving those who followed nothing.

It all started when developers followed the success of projects like Uniswap and Yearn.Finance. Since the code is open source, and there are plenty of resources available from GitHub among other places, developers can just copy and paste the code and create their own fork of the software. It has worked well in fact that we have Uniswap clones with catchy names like SushiSwap and HotDogSwap. They may sound like the next big thing in the crypto space, but that is not the case.

These copycat projects offer high yield products, that just seem out of this world. You must be in another dimension to expect 1,000,000x (1 million times) returns on a token. This reminds me of scamcoins like Bitconnect, but only more technical and neatly packaged for those who think they are on to quick gains in the crypto space. None of these tokens are sustainable if every holder ahead of you dumps and there is no further liquidity to maintain the liquidity pool. They were illiquid to begin with and have no other purpose other than speculation.

A developer who goes by the name of “Chef Nomi” has become well known for the SushiSwap token. It is another clone of Uniswap that issues its own token for Liquidity Providers to lock their digital assets. Despite its relatively short existence, it suddenly surged after August 30, 2020 with huge gains for those who hold the token. All they did was launch a new liquidity pool provider using “vampire mining” methods to siphon off tokens from Uniswap. At this point some holders were thinking things were going well, until SushiSwap dumped and Chef Nomi exited the project taking $14M (which he would later return). Later Chef Nomi apologized, stating the reason for exiting the project was more due to turning it over to the community. It was just that the way he left was not in a genuine way to assure the community that things will be all right. Actually, what does Chef Nomi care since no one should be in control of the platform. It is a decentralized protocol that no one, not even its developer should be able to control.

SushiSwap was eventually saved by Sam Bankman-Fried, head of startup Alameda Research and trading platform FTX. Perhaps SushiSwap was worth saving. If you look at the code, it was not just a clone of Uniswap. The project also added governance features for the community. At least things ended well with SushiSwap but not for the Yam project. Yam, a clone of YFI or Yearn.Finance token, became one of the hottest “Yield Farming” projects in DeFi in August 2020. Many people fell for the hype and soon many were putting their tokens to gain huge yields. However, the code was never subjected to an audit and it had a serious bug that would affect its operation. The bug has permanently affected the platform with $750,000 worth of Curve tokens locked. Perhaps this should be the DeFi example of who not to follow when launching a new project.

Following the heels of SushiSwap is another project called HotDogSwap. Once again the hype brought in a huge pump in its initial release in September 2. The token was valued at $5,000 at some point before crashing to less than $1.00. The value has since plummeted further below $1.00 as of this posting and it may not recover again, unless it has real liquidity and actual use cases. That cannot be stressed enough. Utility is what makes a token a GPT (General Purpose Technology). One of the failures of HotDogSwap is a lack of community governance that could have prevented large dumps through improvement proposal protocols (e.g. like EIP or Ethereum Improvement Proposal). Otherwise, there is no way to stop “Degenerate Farmers” who pump to push prices up and then cash in when the FOMO begins.

Perhaps the DeFi space needs to keep an eye out for regulators. With all the money being generated in this space, it will begin to catch the attention of regulators like the US SEC and tax authorities like the IRS. Compliance can be circumvented because these platforms are decentralized, but we shall see just how decentralized a platform is. If they use a form of on-ramp with fiat or digital exchanges, it could lead to requirements for users to submit personal KYC data. The use of CeFi (Centralized Finance) exchanges like Binance can provide the compliance requirements to some of these DeFi projects using a CeDeFi bridge.

Between Yam and HotDogSwap, users have lost plenty of money. These copycat projects are burning those who FOMO into the project with the expectation of high yield returns. The failed DeFi projects can serve as a cautionary tale to those who dare get into this space. These projects are digital ponzi schemes, and even much worse. With ponzi schemes you have a chance to recover your funds. With smart contracts and the blockchain, the problem is the immutability of data means there is no backdoor or master key that can unlock these funds. It is locked in the blockchain forever, thanks to reckless developers.

Keep Your Private Key To Yourself

Never ever, and that means EVER, reveal your private key to anyone. That means it is better you take it with you to the grave or lock it up with a will rather than entrust it with a third party or anyone you know. There are plenty of stories of how careless people can get with their private keys. This has led to unrecoverable funds, digital identity theft and hacked digital wallets. If you were to give your private key to someone and they lose it, your only chance of recovery would be the seed phrase generated during the key creation for your digital wallet. If you lost those seed phrases, good luck because chances are there is no other way to recover your private key.

Why is it so hard? This is probably the reason mainstream finance is turned off by cryptocurrency. Digital wallets are mostly not user friendly and there is no technical support to help users recover their funds or private keys. The apps provided for cryptocurrency are open source, and available to the public but there is no one supporting it directly. It is decentralized, so the best resources to contact are members of the community who are knowledgable about the subject. Unfortunately, not even the top tier engineers and developers of the cryptocurrency can help you recover or generate a new private key unless it is for a new digital wallet.

What many people don’t understand is that private keys were not meant to be recovered. Only one unique private key is created for a digital wallet, and that means there is no master key that can open a backdoor to help anyone recover their funds. That was by design due to the open source and decentralized nature of the blockchain. This sounds like a bank is still the best place to store your wealth because they provide full customer support. Now I am going to explain the difference between a bank and the blockchain, in the context of cryptocurrency and private keys.

Banks are highly centralized and they are pretty much in control of your wealth. No matter how much money you have deposited in a bank, policies still dictate how much you can withdraw, where you can send your money and what you can do with it. If a bank were to go bankrupt, your funds go along with it. Banks won’t voluntarily give you all their money if they are closing. You lose all your wealth in the worst case scenario. In times of financial crisis, banks can also stop withdrawals to prevent bank runs. You are mostly at the mercy of your bank when it comes to money, and they will gladly take what you deposit while giving you permission to withdraw your own money. It doesn’t really make sense, but that has been the mainstream banking system for decades now.

Compare that to cryptocurrency and the blockchain, you have financial independence. You control your own wealth through your private key, which is why it is so important not to lose it or let others access it. A private key is not even a tangible object, it is a digital code consisting of numbers that have been cryptographically generated and stored as a file. From your private key you get a public address which is created from your public key. The public key is derived from the private key to generate the public address. This is like your account number that is allowed to be exposed on the network. Funds deposited or withdrawn are recorded on the blockchain. The private key also authorizes you to send and receive funds using a digital signature. The digital wallet is basically where you store the private key. To keep the private key safe, store the file away from your computer or online drive. The best recommendation from experts is to use a hardware wallet, which is an offline device that secures private keys. That would prevent hackers from accessing it online since the only way to access it is from the device.

The lesson here is that if you want financial independence and control of your own wealth, it requires plenty of responsibility. That includes managing your private key by keeping it in a safe storage location like a hardware wallet. Make a backup, but store it wisely and not somewhere it can be accessed publicly (e.g. file sharing site). You can copy it to a thumb drive to be stored in a vault or a secure enclave in a smartphone if supported. There will be more robust solutions for key recovery systems for digital wallets, but until that time comes, users should always be alert regarding their private key. If anyone asks for your private key so they can send you funds, ignore that request. There is never any reason to reveal your private key to anyone. It is not like a driver’s license number or SS number which you do need to provide sometimes. A private key should only be known by its holder and never shared or revealed to anyone. You have the right to protect your privacy and it is secured through cryptography on a blockchain.

DeFi Open Lending Protocols, Bringing Financial Inclusion To Everyone

When it comes to the significance of the blockchain, most would think about its decentralized organization which is not controlled by anyone and it is open to all. When applied to finance you could come up with a “killer app” for DeFi (Decentralized Finance). The implementations of DeFi are providing ways to offer traditional financial services like lending using the techniques from blockchain architectures. It cuts out the intermediary and lets anyone become their own financial service provider.

This is made possible using smart contracts that run on top of the Ethereum public network. This is yet the best implementation of Blockchain 2.0 with the innovations that introduce Blockchain 3.0 features (e.g. staking, digital governance). The blockchain provides a layer of trust between two parties, so that transactions are transparent. There is also no arbiter or middle man who can obscure details from a transaction. Everything is executed by the smart contract, containing the business logic and conditions.

This has led to the Open Lending protocols, providing ways for anyone to make money from interest lent out. It is based on cryptocurrency and other digital assets, which can be collateralized debt to gain credit. There are no background checks or personal information needed, just a form of collateral to secure a loan. This would be considered risky in the traditional finance sense, but an over collateralized debt position can mitigate risk along with conditions that will allow lenders to leverage digital assets to their advantage. Thus, if a lendee defaults on their loan, the lender will become the owner of the collateralized digital asset.

While most lenders need to be registered as a financial service provider due to compliance with regulators, that is not the case with DeFi products. Open Lending provides an API for DApp developers to create an interface that allows them to interact with a smart contract. The smart contract is created by the lender, who enters into the transaction based on a condition that is specified in the business logic’s code. There is no need for credit checks, employer endorsement or references to secure a loan. It is all based on trust in the blockchain, through the smart contract.

Open Lending can help a large sector of the underserved members of the community, particularly the unbanked. It provides everyone a path to capital resources they would otherwise never have a chance to obtain. People who don’t have access to micro-loans because of lack of documentation will have the opportunity for financial inclusion perhaps for the first time in their lives. People with poor credit scores will get a chance to access financial services they otherwise would not be able to enroll in with traditional banks. Since these protocols run over the Internet, anyone from around the world can be a lender for anybody that needs financing through digital assets. The money can be converted into a stablecoin to avoid the volatility of the cryptocurrency market, but most will just convert to fiat through digital exchanges. At times, the smart contract may also be a DeX (Decentralized Exchange) and allow the person to get their loan in their currency of choice.

The ecosystems for DeFi applications using Open Lending protocols can be a problem for first time users. They are not easily available, and requires some understanding of how cryptocurrency works. Developers are working to make the UI/UX easier and more convenient for users by integrating the DApp with smartphones or mobile devices. It will be hard to regulate this since it is not a particular company offering the services and the smart contracts are merely running on top of an open source platform. It would be hard for regulators to shutdown the Ethereum network since it is not a single entity, but rather a set of nodes that encompass the world. As DeFi becomes more mature, so will the applications. Then more users can enter the ecosystem and realize there is an alternative to banks and creditors when it comes to financial services.

The Ethereum ERC-20 Token Specification

The Ethereum Request For Comment ERC are defined technical protocols from an EIP (Ethereum Improvement Proposal) request to the Ethereum development community. Once the EIP has been approved, it becomes an ERC, and can be implemented on the blockchain. The ERC-20 token was a specification that allowed projects to use the Ethereum blockchain as a source for funding. It became very significant when ICOs (Initial Coin Offering) became popular between 2015 and 2017. That was until financial and trading compliance issues affected the continuation of ICOs due to lack of regulatory clarity. Certain projects will be under scrutiny to participating in ICO if they have not passed the statutes of limitation for the issuance of an unregistered “security”. This falls under the SEC (Securities and Exchange Commission) for most jurisdictions and have since discouraged new projects from issuing an ICO.

Since many projects are already using this as a standard on the Ethereum blockchain, the number of ERC-20 token contracts has grown. By mid-2017, there were around 5,500 ERC-20 smart contracts on the Ethereum network. It grew past 40,000 in 2018 and are further increasing. ERC-20 is not just a technical specification for creating tokens, but it also provides a guideline for how to interact with other wallets, smart contracts and digital marketplaces within the Ethereum ecosystem.

The ERC-20 became a standard on the Ethereum platform not only for funding, but for the issuance of tokens. Several cryptocurrency projects started out as ICO with tokens (e.g. EOS, Tron, OmiseGo). These projects used the Ethereum blockchain to fund their own coins as issued tokens which can later be exchanged for the native cryptocurrency asset once the main network is running. The ERC-20 tokens were temporarily locked into smart contracts that hold a certain amount of Ether. Once the projects were able to build their blockchain, the ERC-20 tokens from the smart contract could be exchanged for the native asset for that blockchain.

As a standard, ERC-20 provides uniformity of technical and protocol standard. This allows developers to follow a procedure, much like how developers create API for their application to communicate with other applications. This reduces complexity of understanding each type of token implementation. A tremendous benefit it brings to the Ethereum blockchain is enhanced liquidity, since Ether or ETH is required to purchase the tokens. That can affect the price of ETH in terms of market cap.

The structure of an ERC-20 token contains 6 functions, 2 events, and 3 token information functions. These functions are invoked and can be be called within a smart contract. From the ERC-20 specification, the following are the 6 functions:

1. totalSupply(): Total supply of Token.

2. balanceOf(address _owner): The balance in the _owner address.

3. Transfer(address _to, uint256 _value): Sends a token of _value to address_to, triggering the Transfer event.

4. transferFrom(address _from, address _to, uint256 _value): Sends a pass from the address_from _value to address_to, triggering the Transfer event.

5. Approve (address _spender, uint256 _value): Approve _spender to extract a certain amount of money.

6. Allowance(address _owner, address _spender): Returns the amount that _spender extracted from _owner.

Decentralized Apps or DApps also support ERC-20. These apps run on top of the Ethereum blockchain. The DApp can be used to query information or even to execute a smart contract. Developers can use the functions when dealing with digital tokens created on the Ethereum blockchain.

The following are the 2 events that are triggered by the functions:

1. Transfer(address indexed _from, address indexed _to, uint256 _value): Triggered when the token is transferred.

2. Approval(address indexed _owner, addressindexed _spender, uint256 _value): Triggered when the approve method is successfully called.

The token also needs to be set with any of these 3 types of token information:

1. Name: Name of the issued Token.

2. Symbol: The name of the Token issued. For example, EtherCent token or ECT on https://rinkeby.etherscan.io/token/0x8caca3dbb57ecb058a82209effde5bf647459771


3. Decimals: Set how many digits this token can reach after the small digits. Generally, the set value is 18, which means that it can reach 18 digits after the decimal point.

The following is an example ERC-20 token created on the Rinkeby test network.

Since Ether (ETH) was released prior to the ERC-20 standard, it does not actually comply with the specification. As a result, this led to the creation of Wrapped Ether (WETH). This is an ERC-20 token that represents Ether at a 1:1 ratio (1 WETH = 1 ETH) which can be exchanged for other ERC-20 tokens.

Since the popularity of ICOs have waned in 2020, ERC-20 tokens are not as common. They are still in use mainly by projects that have not yet released their own native tokens or by new projects that are testing token development (usually on a test network). By keeping their ERC-20 tokens locked with ETH, they are providing a sort of promise to their holders that they can convert it for more value in the future. The converted tokens can then be used within those blockchain projects as a medium of exchange or store of value.

The Cardano Principles For Scalability, Interoperability and Sustainability

Cardano is a unique cryptocurrency project that is based on sound principles rooted in science and engineering. Its application goes beyond financial systems, but implements a blockchain that covers a wider variety of applications. While it is available as a coin on digital exchanges, it does not yet have an actual use case (as of this posting). It is a development in progress that aims to nail the foundations for a well designed blockchain.

We can consider Cardano a Third Generation Blockchain. The First Generation uses Bitcoin’s Proof-of-Work (PoW) consensus mechanism and the UTXO model. Ethereum forms the basis for the Second Generation, which implements Turing complete Smart Contracts or EDCC (Executable Distributed Code Contracts). The Third Generation, which include other cryptocurrency like EOS and Tron, were based on Ethereum but innovate on consensus mechanisms. Like other Third Gen blockchains, it was also issued using an ICO that raised $62 Million.

Cardano, like Ethereum, uses a smart contract based system. The token or digital asset used on the network is called Ada. Ada provides balances to users with the Daedalus digital wallet. Cardano is also a platform for technological innovation and development. It will provide an operating system layer for DApp (Decentralized Applications) that run on the Cardano network. These DApp provide an interface to smart contracts that execute code to transfer value (e.g. payments, transfers, change of ownership, etc.). Cardano will facilitate these transactions and record it on its own blockchain for immutability and transparency purposes.

Cardano has 3 main features in its blockchain.

  1. Scalability – The network must be able to scale to meet the demands for high volume transaction processing. The developers address the issue of scaling by adopting a different consensus protocol mechanism that is based on Proof-of-Stake (PoS). Scalable systems are faster and more efficient, which is what a blockchain needs in order to handle production level processing of transactions. The network architecture for Cardano proposes using RINA (Recursive Internetwork Architecture).
  2. Interoperability – Many blockchains cannot directly interoperate with one another. There are solutions now that allow for “atomic swaps”, which essentially provides a way for two blockchains to transfer value between each other. Prior to that, digital exchanges were the only way to go. That creates an intermediary which is something a blockchain using direct P2P transfers can remove. With a third party, the cost of transactions increases and it can be tampered, censored or rejected.
  3. Sustainability – Many critics have called Bitcoin inefficient and unsustainable in the long run due to the way it consumes resources. A sustainable system is always more ideal in terms of efficiency and reliability. Sustainable systems have a way to last thus ensuring some degree of surviving into the future. Many blockchain projects lack this feature and have to end for a variety of reasons.

PHILOSOPHY

The following are Cardano’s philosophical principles taken from their website.

  • Separation of accounting and computation into different layers
  • Implementation of core components in highly modular functional code
  • Small groups of academics and developers competing with peer-reviewed research
  • Heavy use of interdisciplinary teams including early use of InfoSec experts
  • Fast iteration between white papers, implementation and new research required to correct issues discovered during review
  • Building in the ability to upgrade post-deployed systems without destroying the network
  • Development of a decentralized funding mechanism for future work
  • A long-term view on improving the design of cryptocurrencies so they can work on mobile devices with a reasonable and secure user experience
  • Bringing stakeholders closer to the operations and maintenance of their cryptocurrency
  • Acknowledging the need to account for multiple assets in the same ledger
  • Abstracting transactions to include optional metadata in order to better conform to the needs of legacy systems
  • Learning from the nearly 1,000 altcoins by embracing features that make sense
  • Adopt a standards-driven process inspired by the Internet Engineering Task Force using a dedicated foundation to lock down the final protocol design
  • Explore the social elements of commerce
  • Find a healthy middle ground for regulators to interact with commerce without compromising some core principles inherited from Bitcoin

OUROBOROS

Cardano’s consensus algorithm uses PoS and is called Ouroboros. This determines how participating computers called nodes come to a consensus on the network. Instead of miners like in PoW consensus algorithms (used by Bitcoin), PoS requires staking funds to qualify or participate as a validator node. These “stakeholders” must contribute to secure and process blocks of transactions on the network and in return they will be incentivized in Ada. If a “stakeholder” is dishonest or attempts to attack the network, they can lose the funds they staked so there is a consequence. This aims to make “stakeholders” good faith actors rather than become bad actors. Once “stakeholders” validate a block it is added to the main network’s blockchain.

What makes Cardano different from other PoS-based networks is according to their own website:

“For a blockchain to be secure, the means of selecting a stakeholder to make a block must be truly random. An innovation of Ouroboros to produce the randomness for the leader election process is to do this by way of a secure, multiparty implementation of a coin-flipping protocol.”

DEVELOPMENT COMMUNITY

Cardano also fosters a development community since it is an open source project. There are no barriers to entry for those who want to contribute, but is mostly on a voluntary basis. Developers are rewarded in Ada for their efforts. Cardano’s code is available for others to use in order to develop applications for the platform.

At the moment, Cardano is being managed by the IOHK (Input Output Hong Kong). They will be a part of the project until 2020 according to their contract.

FUNCTIONAL PROGRAMMING

The main programming language used in Cardano is Haskell which is functional, strong and static typed. One of the reasons it was used is due to its reliability in mission critical systems. They provide a solid and secure foundation for back end systems that handle massive workloads. This means the code and logic is stable enough to be able to scale and provide reliability with little room for failures.

In functional programming if there is a function f(x) that we want to use to calculate a function g(x) to get the results of yet another function h(x). Rather than solving in sequence, it can be simplified to a single function:

h(g(f(x)))

This provides a mathematically simpler way of computing. These form the foundations for Cardano Smart Contracts. It aids in Formal Verification to prove how a program acts and what its results will be. This gives Cardano a “High Assurance Code” property.

THE PROJECT ROAD MAP

Cardano follows a road map for its development. It is divided into 5 phases called eras: Byron, Shelley, Goguen, Basho and Voltaire. It is now in the Voltaire era in 2020, which will decide the digital governance used on the network.

For more on the road map, click here.

THOUGHTS

Like any cryptocurrency project, I don’t suggest buying their token just because the project looks good on paper. This is how Cardano is like. While it is based on a sound foundation, it has not yet been applied to solving real world problems. It offers a theoretical solution that is yet to be proven. If it does deliver on its goals, Cardano’s prices may not really go up either, since it depends on the asset’s liquidity and volume. The project looks promising and that can spur certain expectations.

Note: This is not financial advice. DYOR always to verify facts.

Proof-of-Stake Consensus Mechanism

The power of cryptocurrency is not just security and decentralization. It is also due to what is called the consensus mechanism, which allows participants called nodes in a decentralized system to come to an agreement to validate the truth on a blockchain. The most popular is the consensus used in Bitcoin, called PoW (Proof-of-Work) which requires mining to create coins on the network. Although it has been tried, tested and proven true, it has issues with scalability and sustainability. Although mining is reliable, it can be energy intensive to participant nodes because it requires plenty of computing resources (hash rate) to solve cryptographic puzzles to add a block to the blockchain. That translates to larger electric bills and thus will not be ideal for payment systems that require mass volume transactions that need to be processed daily 24/7/365. It is also slow because in a blockchain, the data is sent to all nodes rather than just one server processing the transactions. It had its limitations called out by developers, thus leading to other consensus mechanisms that used more efficient algorithms that also increase the transaction velocity on the network.

This is why a new type of consensus mechanism was developed called PoS (Proof-of-Stake).

What is PoS?

This is not the same as Point-of-Sale, that is a totally different system for payments. Proof-of-Stake is a consensus mechanism algorithm that requires no mining to validate transactions and create blocks. Instead it requires to stake a certain amount of funds to become validators on the network. These funds are a % of the total coins that exist on the network.

Let f = fund staked as %, Ts = total supply of coins, Ta = total amount staked

f = (Ta / Ts) x 100

PoS and variations of it are being used in cryptocurrency like EOS, Tron, Tezos and soon it will be implemented on the Ethereum network.

When you are mining for blocks using PoW, like in Bitcoin, you must compete with other nodes called miners in order to validate blocks. This is done by trying to solve what is called the nonce which is a value (based on a difficulty target) that contains a hash of numbers. The value is either less than or equal to the nonce, and must be discovered by miners within an average time of 10 minutes. The miner who is able to compute the nonce first becomes the block validator who creates the blocks and in return receives Bitcoins as a reward.

On PoS, there is no need to compete with other nodes to solve a cryptographic puzzle. Instead, there are a set number of nodes called stakers who will help validate transactions. In some systems, like in a delegated PoS network, token holders can vote for block validators (called producers in EOS) who have staked a large investment into capital resources (e.g. data center, servers, etc.). The code than provides a time when block validators will create blocks and in return they will receive their reward in the cryptocurrency’s tokens.

If we have two staking nodes called f1 and f2:

If f1 = (Ta / Ts) x 100 > f2 = (Ta / Ts) x 100

This means f1 will be the block validator based on what was staked or weight of their % of coins.

Here is one example of PoS. According to Ethereum founder Vitalik Buterin from his blog:

The simplest formula for this (PoS) is:

SHA256(prevhash + address + timestamp) <= 2^256 * balance / diff

prevhash is the hash of the previous block
address is the address of the stake-miner
timestamp is the current Unix time in seconds
balance is the account balance of the stack-miner 
diff is an adjustable global difficulty parameter

“If a given account satisfies this equation at any particular second, it may produce a valid block, giving that account some block reward.”

The idea behind PoS is to encourage honest participation among trustless participants using game theory. You cannot know for sure who is acting on good faith or who is the bad actor. Thus, the idea of putting your own funds as a stake to being a validator is what shows your willingness to help in the network. Otherwise, that participant will lose their staked funds if they become dishonest or try to attack the network. The consensus among all nodes can deny the participant’s block if they attempt to cheat. They either lose their stake or get rejected from the network and even blacklisted. It all comes down to the protocols of the digital governance on the network, something that is a feature of PoS systems.

Another thing to note is that PoS is also based on the weight or amount a node has put at stake. Therefore, the more funds you stake the better your chances are for becoming a block validator. The validators can be chosen by random selection or voted by the token holders as mentioned earlier. This process is much faster to resolve than the 10 minute block propagation time in Bitcoin’s PoW because it requires no mining to solve for the nonce. It can actually be more instantaneous since the selected block validator can process the transactions and create the block which then updates all nodes on the blockchain. Much faster than having all nodes try to validate the block at the same time by discovering a nonce. This allows for faster transactions speeds that are more suitable for micropayments and retail transactions i.e. buying a cup of coffee with cryptocurrency.

This consensus mechanism is also more energy efficient. Producing a block on the network doesn’t require expending a lot of electricity like in Bitcoin. This saves not just costs, but also time. This has been the main argument for PoS among its proponents.

Despite its more refined algorithm, there are also issues with PoS. The following will discuss some of the well known issues.

Stake Inequality

If you are to look at the algorithm, it favors wealth. Critics argue that in a PoS system, those with more at stake or resources available will surely always come out as the validators. This is not exactly fair, and can lead to a sort of network oligarchy which can control the blockchain. If this is the case, what have PoS developers done about such issue?

To make sure that things are fair, code was written to randomize block validator selection that is still based on the amount at stake. This means that anyone who is staking is likely to get selected based on how much they have staked. When the load of transactions is even greater to process, a node that has staked more will likely become the validator because their stake can prove that they have the resources available to create the block. Now the argument against this is that it still shows that it will be favorable only to those with higher incomes. They can even collude to become block validators based on their stakes and collect all the fees from transactions. This creates a barrier to entry that limits decentralization. This then can lead to centralization, which is what blockchains are not supposed to be.

Centralized Validators

Centralization is indeed counter to the ideology of a blockchain. In order to prevent only a few validators from ever gaining control of the network, different methods have been developed.

Here are some of those methods:

  • Randomized Selection – This will ensure that validators who have validated before will not be the only validators. Instead the algorithm will randomly select a new validator each time. A validator who has validated before will get their chance again in the future. Some networks will actually allow for x number of validators only, while others can allow for unlimited numbers of potential validators.
  • Elections – Other cryptocurrency use digital elections or delegated PoS (e.g. EOS and Tron) to determine who the block validators will be. In EOS they are called Block Producers, while in Tron they are Super Representatives. The network allows all token holders with voting rights to ‘freeze’ funds for candidates to become validators. In EOS 21 are elected while in Tron it is 27. This appears to be a smaller number of nodes, but the logic behind this is that although it is less decentralized, it helps to scale up processing for faster transaction processing. The network can then call for a new round of elections to select new validators to make sure that it is not too centralized.
  • Time Allotment – In this scheme, anyone who has staked joins a queue to become a block validator. It will be a fixed amount, and so the system is not based on who has staked the most. The node will then wait for their turn to become a block validator. The problem with this type of scheme is if anyone can validate, how can we be sure they have the resources to do so? What if they are using only a low end PC or just their smartphone? Will that be enough compute power to create blocks? In this case, such a system can work for nanopayments or even non-compute intensive micropayments that use smaller block sizes. All the node needs to do is add the block after the consensus has determined it is valid. In return the node receives their fees.
  • Validation By Delegation – In Tezos this is the PoS scheme, called Liquid PoS. In this system, a validator can delegate their validation rights to other validators on the network. This is done using a process called baking. The node called a baker has block producing rights based on their stake. This model is more or less a way of sharing the rewards. This is because by process of validation by delegation, the baker can delegate production to another baker without transferring their ownership of stake. Instead they keep the stake and get rewards which they then share with the delegated baker. This works well if the baker has a good reputation and integrity on the network.

Network Attacks

The problem with centralization is that a rogue node can accumulate a majority of the cryptocurrency’s tokens. If they were to gain 51% of the coins and stake them on the network, that can lead to attacks. Now the question is, does that even make sense? It definitely requires a lot of investing into the cryptocurrency to have a majority hold on its coins. This is also called the 51% Attack and it can also be possible of PoW systems.

f = (Ta / Ts) x 100 = 51

In a post made on the Qtum blog:

“In PoS, after a rollback, the attacker address can be blacklisted and those coins simply ‘deleted’. This would make the remaining coins in the system go up in value and the attacker would have to repurchase the coins in an effort to relaunch the attack. This is especially risky for them if they were shorting the coins, as they no longer have access to them and have to pay back the lender.”

In this case it would make things more expensive to attack the network so it discourages bad actors. As of this writing (September 2019), there has never been a successful attack on a PoS blockchain that demonstrates this example.

Nothing At Stake

The Nothing At Stake theory is a problem that arises on the blockchain due to its distributed nature. This type of attack can delay and complicate transactions on the network. Staking is a process that adds value to the network. What is being staked is actually the % of coins that a user has of the total supply. It is thus in their best interest to make sure that the network is secured, otherwise they will lose their value. This incentivizes the node that stakes to behave honestly or else risk devaluing their network.

This problem can occur when there is a fork or series of forks on the network. A fork is another chain that forms from the main network during a contentious moment in which the network becomes split. One network supports one block while the other half refuses to go along with it. This also occurs when there are simultaneously two block validators trying to produce a block for the network. During a fork, a node can put their stake on both chains because they have nothing to lose from it. This type of behavior is not exactly approved by consensus.

The node can get away with it though. This is because the node will get their reward no matter which chain wins. This can lead to what is called a double spend. The node that has put a stake on both chains loses nothing because they will get their reward from the chain that wins. Now imagine if all nodes followed this lead. It makes two chains exist at once, which means there is really no main network. The node has nothing at stake because they don’t incur any costs to doing this.

This makes the network less secure and prone to more discrepancies. One of the chains can overtake the other, and any bad transaction on one chain is considered good on the other chain. Thus, a node has nothing to lose since the eventual chain that wins will reverse any bad transactions they had on the failed chain. The node collects fees no matter which chain they are on, and this can lead to many inconsistencies on the blockchain.

To address this issue, developers have come up with mechanisms that prevent or discourage this. To explain in simple terms, when the network detects a node attempting a nothing at stake attack, they will be reprimanded. The consequence is that the node will lose their stake, which is something to lose. This encourages honesty among the nodes because of the penalty of malicious intent to the network.

Critical Factors

A great feature of PoS is to allow more participation among token holders and involve the community when it comes to consensus. However a cryptocurrency chooses to implement their PoS protocols, the thing to remember is that this is an alternative option to PoW. The benefits are clear, but there are also issues that need to be addressed. Some have tried to implement a hybrid PoS and PoW system to reap the benefits of both consensus mechanisms. Overall, these systems will eventually mature and develop over time, so there is plenty to observe once they have been in production.