Canopy Network Docs
  • 👋Welcome to Canopy
    • Overview
    • What is Canopy?
      • Introduction
      • Why Canopy?
        • Blockchain 101
        • Background
        • Industry State
        • Seeding the Future
        • Comparables
          • Ethereum
          • Tendermint
          • Polkadot
          • Avalanche
          • Rollups
      • Core Features
        • Peer-To-Peer Security
        • Progressive Sovereignty
        • Capital Efficient Restaking
        • Composable Architecture
        • One-Way Interoperability
        • Built-In Liquidity
        • Chain Halt Rescue
        • NestBFT
          • PoS Is Trusted
          • PoAge Is Trustless
          • VRF Leader Election
        • Checkpoints as a Service
        • United Governance
      • Tokenomics
        • CNPY
        • Staking
        • DAO Treasury Fund
        • Recursive Rewards
        • Subsidies
      • Who is Canopy for?
        • New Blockchains
        • Existing Ecosystems
        • Token Participants
    • How does Canopy work?
      • Utility
      • Consensus
      • P2P
      • State Machine
      • Storage
      • Specifications
        • CLI
        • RPC
        • Config
        • Governance Params
        • Nested Chain IDs
  • ⚒️Build
    • Build a new L1
      • Introduction
      • Building
        • Application
        • Governance
        • Testing
        • Upgrading
      • Governance
        • Straw Polling
        • Proposals
    • Connect an external chain
      • Introduction
      • Building
        • Connecting
        • Testing
        • Upgrading
      • Governance
        • Straw Polling
  • 👨‍💻Node Runner
    • Setup
    • Install
    • Configure
    • Manage
    • Debug
    • Validate
      • Get CNPY
      • Plugins Config
      • Stake
      • Manage
      • Slashing
    • Govern
  • 💪Participate
    • How To Get CNPY
    • What to do with CNPY
      • Manage
      • Earn
      • Subsidize
      • Govern
Powered by GitBook
On this page
  • The Fundamental Problem with Proof of Stake
  • What's a Long-Range-Attack?
  • How does Ethereum solve this?
  1. Welcome to Canopy
  2. What is Canopy?
  3. Core Features
  4. NestBFT

PoS Is Trusted

PreviousNestBFTNextPoAge Is Trustless

Last updated 1 month ago

The Fundamental Problem with Proof of Stake

In 2014, Vitalik Buterin published a blog post titled: “”.

In a Proof-Of-Stake system a node syncing is unable to be 'subjective' about which fork to choose - without a centralized (weak) intervention.

💡This is because the mechanism that allows a chain to determine the 'correct fork' is defined by the chain itself and not an external subjective measure like 'work'.

This means Proof-of-Stake chains can't trustlessly sync their own blockchain.

⚠️ This is a big deal because:

  • ❌ It threatens finality of transactions — breaking the crypto economy

  • ❌ It can cause a — preventing forward progress

  • ❌ It can partition the network — isolating nodes and dividing the community

  • ❌ It can be leveraged to pull off major attacks — like a Long-Range-Attack

Did you know? Proof-of-Stake chains can't be synced by participants without trust

What's a Long-Range-Attack?

A long-range attack is where an adversary uses old validator keys, that once controlled a super-majority of the validator set, to rewrite the chain’s history from a point far in the past.

This is possible because the economic value that the keys once held has diminished and the attacker is presumably able to acquire them cheaply.

Using these keys, an attacker is able to quickly rewrite the forward history of the blockchain to become the ‘longest chain’ and potentially convince peers to join the fork enabling economic attacks.

How does Ethereum solve this?

In his post, Vitalik proposed the use of “weak subjectivity”, having syncing nodes rely on social consensus by publishing finalized block hashes to centralized sources.

He suggested checkpointing every 12.8 minutes for Ethereum, aligning with the network's epoch system.

This approach is widely regarded as one of the only effective mechanisms to prevent Long-Range-Attacks.

While more energy efficient than PoW — basically all PoS chains rely on some form of centralized checkpointing.

👋
Proof of Stake: How I Learned to Love Weak Subjectivity
Chain Halt