See Also
Proof of Trust (PoT) Summary [Cryptocurrency consensus mechanisms]
In a Proof of Trust system, users in a network gain trust as they participate in special activities within the network. If a user tries to defraud the system, the trust is lost and they lose an equivalent amount in value (the cryptocurrency or token employed). In a Proof of Trust system, “trust” is staked […]
Proof of Location (PoL) Summary [Cryptocurrency consensus mechanisms]
In a Proof of Location consensus algorithm, users’ geospatial coordinates are accounted for as proof of value. This kind of algorithm is usually employed in cryptocurrency geomining systems. In a geomining application, users earn rewards for being at a certain place at a certain time. If, for example, a company wished to gather participants for […]
Proof of Elapsed Time (POET) Summary [Cryptocurrency consensus mechanisms]
In this poetically named consensus mechanism, network participants prove that they have slept for a random amount of time before being able to mint a block. POET was released by Intel in 2016 and was originally aimed at trusted computing using Intel CPU’s. A special instruction set called Software Guard Extensions (SGX) allows programs to […]
Is your cryptocurrency at risk of a 51% attack?
Half plus one attacks could theoretically happen to any Proof of Work based cryptocurrency. The amount of risk of such an attack happening depends on several factors, including the number of miners who participate in the network, the distribution of hashrate among the miners, the existence of unknown and exploitable security flaws and other factors. […]