{"id":10329,"date":"2025-03-28T02:49:52","date_gmt":"2025-03-28T01:49:52","guid":{"rendered":"https:\/\/wsj-crypto.com\/?p=10329"},"modified":"2025-03-28T02:49:52","modified_gmt":"2025-03-28T01:49:52","slug":"embracing-weak-subjectivity-my-journey-into-the-world-of-proof-of-stake","status":"publish","type":"post","link":"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/28\/embracing-weak-subjectivity-my-journey-into-the-world-of-proof-of-stake\/","title":{"rendered":"Embracing Weak Subjectivity: My Journey into the World of Proof of Stake"},"content":{"rendered":"<p><\/p>\n<div id=\"\">\n<p class=\"chakra-text css-gi02ar\">Proof of stake remains one of the most debated topics in the cryptocurrency arena. While the concept has several undeniable advantages, including increased efficiency, a broader security margin, and enhanced resistance to hardware centralization issues, proof of stake mechanisms are often significantly more intricate than their proof of work counterparts. There exists considerable doubt regarding the viability of proof of stake, especially concerning the purportedly central &#8220;nothing at stake&#8221; dilemma. Nevertheless, these challenges are addressable, and a solid case can be made that proof of stake, along with its advantages, can be effectively implemented\u2014albeit at a sensible cost. This article aims to clarify what this cost entails and how its effects can be mitigated.<!-- --><\/p>\n<p><!-- --><\/p>\n<h3 class=\"chakra-heading css-145upk7\" id=\"economic-sets-and-nothing-at-stake\">Economic Sets and Nothing at Stake<!-- --><\/h3>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">To begin, let&#8217;s frame the discussion. The intent of a consensus algorithm is essentially to enable secure updates of a state in accordance with specific state transition regulations, where the authority to execute these transitions is shared among an economic set. An economic set is a grouping of participants authorized to collaboratively carry out transitions through a particular algorithm. A vital characteristic that must be maintained by the economic set for consensus to function effectively is its requirement to be <!-- --><em class=\"chakra-text css-0\">securely decentralized<!-- --><\/em>\u2014indicating that no individual or colluding group can dominate the majority of the set, even if they possess a substantial quantity of capital and financial motivation. To date, we are aware of three securely decentralized economic sets, with each corresponding to a consensus algorithm:<!-- --><\/p>\n<p><!-- --><\/p>\n<ul role=\"list\" class=\"css-1onhfjo\">\n<li class=\"css-cvpopp\"><strong>Computational power owners<!-- --><\/strong>: conventional proof of work, or <!-- --><a target=\"_blank\" rel=\"noopener\" class=\"chakra-link css-ug8vf0\" href=\"http:\/\/www.reddit.com\/r\/Bitcoin\/comments\/2m8sh9\/am_i_missing_something_blockchain_without_bitcoin\/cm272vv\">TaPoW<!-- --><\/a>. It is important to note that this exists in specialized hardware, and (ideally) in general-purpose hardware variations.<!-- --><\/li>\n<li class=\"css-cvpopp\"><strong>Stakeholders<!-- --><\/strong>: a multitude of variations of proof of stake<!-- --><\/li>\n<li class=\"css-cvpopp\"><strong>A user&#8217;s social network<!-- --><\/strong>: Consensus akin to Ripple\/Stellar styles<!-- --><\/li>\n<\/ul>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">It\u2019s worth mentioning that there have been recent endeavors to create consensus algorithms grounded in <!-- --><a target=\"_blank\" rel=\"noopener\" class=\"chakra-link css-ug8vf0\" href=\"http:\/\/en.wikipedia.org\/wiki\/Byzantine_fault_tolerance\">traditional Byzantine fault tolerance<!-- --><\/a> theory. However, all these methodologies are founded on an M-of-N security framework, and the notion of &#8220;Byzantine fault tolerance&#8221; alone does not clarify which set the N should be sampled from. In most instances, stakeholders are utilized, so we&#8217;ll regard such neo-BFT frameworks merely as clever subcategories of &#8220;proof of stake&#8221;.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Proof of work has an advantageous attribute that facilitates the design of effective algorithms: involvement in the economic set necessitates the utilization of a resource external to the system. This means that when a miner contributes to the blockchain, they must decide which among various forks to support (or if they should attempt to initiate a new fork), and these choices are mutually exclusive. Double-voting, including cases where a subsequent vote is cast years after the initial one, is unbeneficial as it necessitates splitting one&#8217;s mining power across multiple votes; the optimal strategy is consistently to concentrate your mining power on the fork you believe has the highest likelihood of succeeding.<!-- --><\/p>\n<p><!-- --><br \/>\n<!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Conversely, with proof of stake, the dynamics change. While entry into the economic set may be burdensome (though, as we shall see, this is not universally the case), voting incurs no cost. Consequently, &#8220;naive proof of stake&#8221; mechanisms, which attempt to replicate proof of work by transforming each coin into a &#8220;simulated mining rig&#8221; with a certain probability per second of making the related account available for block signing, possess a crucial vulnerability: when multiple forks arise, the ideal strategy is to cast votes on all forks simultaneously. This lies at the heart of the &#8220;nothing at stake&#8221; issue.<!-- --><\/p>\n<p><!-- --><img decoding=\"async\" src=\"https:\/\/blog.ethereum.org\/images\/posts\/2014\/11\/possec1.png\" class=\"chakra-image css-hw6q2r\"\/><br \/>\n<!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">There exists an argument suggesting it might be illogical for a user to support only one fork in a proof-of-stake context: &#8220;altruism-prime.&#8221; Altruism-prime is essentially a blend of genuine altruism (by users <!-- --><a class=\"chakra-link css-ug8vf0\" href=\"https:\/\/blog.ethereum.org\/2014\/09\/02\/software-bounded-rationality\">or software architects<!-- --><\/a>), manifested both as a direct concern for the well-being of others and the network, as well as a psychological moral restraint against undertaking actions deemed clearly malevolent (like double-voting), along with the &#8220;fake altruism&#8221; that arises because coin holders wish to prevent the value of their assets from declining.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\"> Unfortunately, altruism-prime cannot be depended upon solely, as the value of coins stemming from protocol integrity is a <!-- --><a target=\"_blank\" rel=\"noopener\" class=\"chakra-link css-ug8vf0\" href=\"https:\/\/en.wikipedia.org\/wiki\/Public_good\">public good<!-- --><\/a> and therefore will be underprovided (for instance, if there are 1000 stakeholders, and each of their actions has merely a 1% chance of being &#8220;pivotal&#8221; in leading to a successful assault that could diminish coin value to zero, then each participant would accept a bribe equivalent to only 1% of their holdings). In a distribution comparable to the Ethereum genesis block, depending on how one assesses the probability of each user being pivotal, the necessary sum of bribes would range between 0.3% to 8.6% of the overall stake (or potentially less if an attack isn&#8217;t fatal to the currency). Nevertheless, altruism-prime remains an essential concept that algorithm developers should consider to maximize its benefits, should it function effectively.<!-- --><\/p>\n<p><!-- --><\/p>\n<h3 class=\"chakra-heading css-145upk7\" id=\"short-and-long-range\">Short and Long Range<!-- --><\/h3>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">When we concentrate specifically on <!-- --><em class=\"chakra-text css-0\">short-range forks<!-- --><\/em>\u2014which last for fewer than a specified number of blocks, perhaps 3000\u2014there actually exists a resolution to the nothing at stake dilemma: security deposits. To qualify for rewards by voting on a block, a user must place a security deposit, and if they are discovered voting on several forks, then proof of that action can be inserted into the primary chain, stripping away the reward. Thus, supporting only one fork once more becomes the preferred strategy.<!-- --><\/p>\n<p><!-- --><img decoding=\"async\" src=\"https:\/\/blog.ethereum.org\/images\/posts\/2014\/11\/slasher1sec1.png\" class=\"chakra-image css-hw6q2r\"\/><br \/>\n<!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Another category of strategies, referred to as &#8220;Slasher 2.0&#8221; (as opposed to <!-- --><a class=\"chakra-link css-ug8vf0\" href=\"https:\/\/blog.ethereum.org\/2014\/01\/15\/slasher-a-punitive-proof-of-stake-algorithm\">Slasher 1.0<!-- --><\/a>, the original security deposit-centric proof of stake mechanism), involves merely penalizing participants who vote on the <!-- --><em class=\"chakra-text css-0\">incorrect<!-- --><\/em> fork, rather than those who double-vote. This rendersanalysis considerably more straightforward, as it eliminates the requirement to pre-identify voters many blocks ahead to thwart probabilistic double-voting tactics, although it does incur the drawback that individuals may hesitate to endorse anything if there are two options for a block at a certain height. If we wish to provide users the ability to sign in such scenarios, a variation of <!-- --><a target=\"_blank\" rel=\"noopener\" class=\"chakra-link css-ug8vf0\" href=\"http:\/\/en.wikipedia.org\/wiki\/Scoring_rule#Logarithmic_scoring_rule\">logarithmic scoring rules<!-- --><\/a> can be applied (refer to <!-- --><a target=\"_blank\" rel=\"noopener\" class=\"chakra-link css-ug8vf0\" href=\"https:\/\/docs.google.com\/a\/buterin.com\/document\/d\/13_FSQ1Koq8uLvqTaSvZdb6OT2SpUZZq53vFiiDQj4qM\/edit#\">here<!-- --><\/a> for a more in-depth examination). For the scope of this discussion, Slasher 1.0 and Slasher 2.0 possess identical characteristics.<!-- --><\/p>\n<p><!-- --><img decoding=\"async\" src=\"https:\/\/blog.ethereum.org\/images\/posts\/2014\/11\/slasher2sec2.png\" class=\"chakra-image css-hw6q2r\"\/><br \/>\n<!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">The rationale for why this only applies to short-range forks is quite clear: the user must eventually have the authority to retrieve the security deposit, and upon withdrawal of the deposit, there is no longer any motivation to refrain from voting on a long-range fork originating far back in time utilizing those assets. One category of strategies that seeks to address this is by making the deposit permanent, yet these methods have their own challenges: unless a coin&#8217;s value consistently appreciates to continuously accommodate new signers, the consensus set risks becoming established as a type of perpetual nobility. Considering that a significant ideological grievance that has propelled cryptocurrency&#8217;s appeal is precisely the tendency for centralization to solidify into nobilities that maintain enduring power, replicating such a feature would likely be seen as intolerable by most participants, at least for blockchains intended to be everlasting. A nobility structure might indeed be the apt approach for specialized temporary blockchains designed to perish quickly (e.g., one might envision such a blockchain existing for a session of a blockchain-based game).<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">One category of solutions to this challenge is to merge the Slasher mechanism outlined above for short-range forks with a backup, transactions-as-proof-of-stake, for long-range forks. TaPoS fundamentally functions by incorporating transaction fees as a component of a block&#8217;s &#8220;score&#8221; (and mandating each transaction to include some bytes from a recent block hash to prevent trivial transferability), with the premise being that a successful attack fork must allocate a substantial amount of fees to catch up. However, this hybrid methodology contains a fundamental weakness: if we posit that the chance of an attack succeeding is nearly negligible, then every signer has an incentive to provide a service of re-signing all of their transactions onto a new blockchain in exchange for a minor fee; thus, a zero probability of attacks succeeding is not game-theoretically robust. Does it sound far-fetched that every user sets up their own node.js web application to accept bribes? If so, there&#8217;s a much simpler alternative: sell old, unused private keys on the black market. Even absent black markets, a proof-of-stake system would perpetually face risks from individuals who initially participated in the pre-sale and held a share of genesis block issuance eventually reuniting to initiate a fork.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">In light of all the aforementioned arguments, we can confidently conclude that the risk of an attacker constructing a fork from arbitrarily long range is, regrettably, a fundamental issue, and in all non-degenerate implementations, the problem is catastrophic for a proof-of-stake algorithm&#8217;s success within the proof-of-work security framework. Nevertheless, we can navigate this inherent obstacle with a minor, yet fundamentally important, revision in the security model.<!-- --><\/p>\n<p><!-- --><\/p>\n<h3 class=\"chakra-heading css-145upk7\" id=\"weak-subjectivity\">Weak Subjectivity<!-- --><\/h3>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">While numerous methods categorize consensus algorithms, the distinction we will emphasize for the remainder of this discussion is as follows. Firstly, we will present the two most prevalent paradigms today:<!-- --><\/p>\n<p><!-- --><\/p>\n<ul role=\"list\" class=\"css-1onhfjo\">\n<li class=\"css-cvpopp\"><strong>Objective<!-- --><\/strong>: a new node joining the network with no prior knowledge except (i) the protocol description and (ii) the array of all blocks and other &#8220;crucial&#8221; messages released can autonomously reach the identical conclusion as the rest of the network regarding the current state.<!-- --><\/li>\n<li class=\"css-cvpopp\"><strong>Subjective<!-- --><\/strong>: the system comprises stable states where various nodes arrive at different conclusions, necessitating a considerable amount of social information (i.e., reputation) to participate.<!-- --><\/li>\n<\/ul>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Systems utilizing social networks as their consensus set (e.g., Ripple) are intrinsically subjective; a new node with no knowledge beyond the protocol and the data can be persuaded by an adversary that their 100000 nodes are reliable, and in the absence of reputation, there is no mechanism to counteract that assault. Proof of work, by contrast, is objective: the current state is always the one that embodies the highest anticipated amount of proof of work.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Now, for proof of stake, we will introduce a third paradigm:<!-- --><\/p>\n<p><!-- --><\/p>\n<ul role=\"list\" class=\"css-1onhfjo\">\n<li class=\"css-cvpopp\"><strong>Weakly subjective<!-- --><\/strong>: a new node entering the network with no knowledge beyond (i) the protocol definition, (ii) the collection of all blocks and other &#8220;critical&#8221; messages published, and (iii) a state from less than N blocks ago that is confirmed to be valid can independently attain the same conclusion as the rest of the network regarding the current state, unless there exists an attacker that consistently holds more than X percent control over the consensus set.<!-- --><\/li>\n<\/ul>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Within this framework, we can clearly observe how proof of stake functions effectively: we simply prohibit nodes from reverting more than N blocks, setting N to the security deposit duration. In other words, if state S has been verified and has become an ancestor of at least N valid states, then thereafter no state S&#8217; that isn\u2019t a descendant of S can be deemed valid. Long-range attacks are no longer of concern, for the simple reason that we have explicitly declared that long-range forks are invalid as part of the protocol framework. This rule is evidently weakly subjective, with the additional benefit that X = 100% (i.e., no attack can induce permanent disruption unless it persists beyond N blocks).<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Another weakly subjective scoring approach is <!-- --><em class=\"chakra-text css-0\">exponential subjective scoring<!-- --><\/em>, defined as follows:<!-- --><\/p>\n<p><!-- --><\/p>\n<ol role=\"list\" class=\"css-13a5a39\">\n<li class=\"css-cvpopp\">Each state S carries a &#8220;score&#8221; and a &#8220;gravity&#8221;<!-- --><\/li>\n<li class=\"css-cvpopp\"><span class=\"chakra-text css-ons8vw\">score(genesis) = 0<\/span>, <!-- --><span class=\"chakra-text css-ons8vw\">gravity(genesis) = 1<\/span><\/li>\n<li class=\"css-cvpopp\"><span class=\"chakra-text css-ons8vw\">score(block) = score(block.parent) + weight(block) * gravity(block.parent)<\/span>, wherein <!-- --><span class=\"chakra-text css-ons8vw\">weight(block)<\/span> is typically 1, although more sophisticated weight functions may also be deployed (e.g., in Bitcoin, <!-- --><span class=\"chakra-text css-ons8vw\">weight(block) = block.difficulty<\/span> can be quite effective)<!-- --><\/li>\n<li class=\"css-cvpopp\">If a node encounters a new block <!-- --><span class=\"chakra-text css-ons8vw\">B&#8217;<\/span> with <!-- --><span class=\"chakra-text css-ons8vw\">B<\/span> as progenitor, then if <!-- --><span class=\"chakra-text css-ons8vw\">n<\/span> is the size of the longest lineage of descendants originating from <!-- --><span class=\"chakra-text css-ons8vw\">B<\/span> at that moment, <!-- --><span class=\"chakra-text css-ons8vw\">gravity(B&#8217;) = gravity(B) * 0.99 ^ n<\/span> (note that values other than 0.99 are also applicable).<!-- --><\/li>\n<\/ol>\n<p><!-- --><img decoding=\"async\" src=\"https:\/\/blog.ethereum.org\/images\/posts\/2014\/10\/ess1.png\" class=\"chakra-image css-hw6q2r\"\/><br \/>\n<!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">In essence, we explicitly sanction forks that emerge later. ESS possesses the characteristic that, in contrast to simpler methods based on subjectivity, it largely prevents enduring network divides; if the duration between the initial node in the network learning about block B and the final node in the network learning about block B spans an interval of <!-- --><span class=\"chakra-text css-ons8vw\">k<\/span> blocks, then a fork becomes untenable unless the lengths of the two forks remain perpetually within approximately <!-- --><span class=\"chakra-text css-ons8vw\">k<\/span> percent of one another (in such a case, the differing gravities of the forks will assure that half of the network will consistently view one fork as superior while the other half will back the alternative fork). Thus, ESS is weakly subjective with <!-- --><span class=\"chakra-text css-ons8vw\">X<\/span> roughly indicative of how near to a 50\/50 network division the attacker can engineer (for example, if the assailant can fabricate a 70\/30 split, then <!-- --><span class=\"chakra-text css-ons8vw\">X = 0.29<\/span>).<!-- --><\/p>\n<p><!-- --><img decoding=\"async\" src=\"https:\/\/blog.ethereum.org\/images\/posts\/2014\/10\/ess2.png\" class=\"chakra-image css-hw6q2r\"\/><br \/>\n<!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Overall, the &#8220;max revert N blocks&#8221; guideline is preferable and less complicated, yet ESS might demonstrate more viability in circumstances where users are comfortable with significant levels of subjectivity (i.e., N being minimal) in exchange for a swift progression to exceptionally high security levels (i.e., resistant to a 99% attack after N blocks).<!-- --><\/p>\n<p><!-- --><\/p>\n<h3 class=\"chakra-heading css-145upk7\" id=\"consequences\">Consequences<!-- --><\/h3>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">What might a world driven by weakly subjective consensus resemble? Primarily, nodes that are consistently online will be secure; in such scenarios, weak subjectivity is, by definition, equivalent to objectivity. Nodes that occasionally go online, or at least once every N blocks, will also be secure, as they will be able to continuously obtain an updated status of the network. However, new nodes entering the network, and nodes that reappear online after a protracted absence, might not have the consensus mechanism reliably safeguarding them. Fortunately, the remedy is straightforward: the first time they register, and each time they remain offline for an exceedingly long period, they only need to acquire a recent block hash from a friend, a blockchain explorer, or merely their software provider, and input it into their blockchain client as a &#8220;checkpoint.&#8221; They will then be capable of securely updating their perception of the present status from that point onward.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">This security premise, the concept of &#8220;acquiring a block hash from a friend,&#8221; may appear tenuous to many; Bitcoin developers frequently argue that if the solution to long-range attacks hinges on some alternative deciding mechanism X, then the security of the blockchain ultimately rests upon X, and thus the algorithm is essentially no more secure than using X directly &#8211; suggesting that most X, including our social-consensus-driven method, are insecure.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">However, this reasoning overlooks why consensus algorithms exist in the first place. Consensus is inherently a social process, and humans are quite adept at reaching consensus independently without any assistance from algorithms; perhaps the most poignant example is the <!-- --><a target=\"_blank\" rel=\"noopener\" class=\"chakra-link css-ug8vf0\" href=\"http:\/\/en.wikipedia.org\/wiki\/Rai_stones\">Rai stones<!-- --><\/a>, where a tribe in Yap effectively maintained a blockchain documenting changes to the ownership of stones (utilized as a Bitcoin-like <!-- --><a target=\"_blank\" rel=\"noopener\" class=\"chakra-link css-ug8vf0\" href=\"http:\/\/bitcoinmagazine.com\/8640\/an-exploration-of-intrinsic-value-what-it-is-why-bitcoin-doesnt-have-it-and-why-bitcoin-does-have-it\/\">zero-intrinsic-value<!-- --><\/a> asset) as part of its collective memory. The reason why consensus <!-- --><em class=\"chakra-text css-0\">algorithms<!-- --><\/em> are necessary is, quite simply, due to the fact that humans <!-- --><a class=\"chakra-link css-ug8vf0\" href=\"https:\/\/blog.ethereum.org\/2014\/09\/02\/software-bounded-rationality\">lack infinite computational capacity<!-- --><\/a>, and tend to rely on software agents to uphold consensus for us. Software agents are exceptionally intelligent, as they can uphold consensus over extremely large states with exceedingly intricate rulesets with flawless accuracy, but they are also quite oblivious, in that they possess very limited social information; the challenge for consensus algorithms is to develop a mechanism that demands as minimal social information input as possible.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Weak subjectivity is precisely the optimal solution. It addresses the long-range issues associated with proof of stake by drawing upon human-driven social insights, yet it entrusts a consensus algorithm with the function of accelerating consensus from multiple weeks to twelve seconds and permitting the implementation of highly intricate rulesets across a vast state. The responsibility of human-driven consensus is relegated to maintaining agreement on block hashes over extended periods, a task at which people excel. A hypothetical oppressive regime that possesses sufficient power to create uncertainty regarding the authentic value of a block hash from a year prior would also have enough strength to override any proof of work algorithm or instigate confusion regarding the blockchain protocol&#8217;s regulations.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Note that we do not need to set N; theoretically, we could devise an algorithm that enables users to keep their deposits secured for durations exceeding N blocks, allowing users to leverage those deposits for a much more nuanced evaluation of their security level. For instance, if a user has not logged in since T blocks ago, and 23% of deposits have a term length greater than T, the user can formulate their subjective scoring criterion that disregards signatures with more recent deposits, thereby fortifying their security against assaults involving up to 11.5% of the total stake. An ascending interest rate curve may be utilized to motivate longer-term deposits over shorter ones, or for simplicity, we may just depend on altruism-prime.<!-- --><\/p>\n<p><!-- --><\/p>\n<h3 class=\"chakra-heading css-145upk7\" id=\"marginal-cost-the-other-objection\">Marginal Cost: The Other Objection<!-- --><\/h3>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">One criticism of long-term deposits is that they encourage users to keep their funds immobilized, which is inefficient, presenting the identical issue as proof of work. Nonetheless, there are four rebuttals to this.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Firstly, marginal cost does not equate to total cost, and the ratio of total cost divided by marginal cost is substantially lower for proof of stake compared to proof of work. A user will likely experience nearly no discomfort from securing 50% of their capital for several months, a minimal amount of distress from securing 70%, but would find securing over 85% unbearable without a significant incentive. Moreover, distinct users have varying preferences for how willing they are to immobilize capital. Together, these two factors suggest that regardless of what the equilibrium interest rate ultimately is, the overwhelming majority of capital will be locked at levels significantly beneath marginal cost.<!-- --><\/p>\n<p><!-- --><img decoding=\"async\" src=\"https:\/\/blog.ethereum.org\/images\/posts\/2014\/07\/liquidity.png\" class=\"chakra-image css-hw6q2r\"\/><br \/>\n<!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Secondly, immobilizing funds constitutes a private expense, yet also serves as a public benefit. The occurrence of immobilized funds signifies that there is a diminished money supply accessible for transactional activities, consequently driving up the value of the currency, thereby reallocating resources to others and generating a societal advantage. Thirdly, security deposits represent an extremely reliable store of value, hence (i) they replace the function of cash as a personal crisis safeguarding mechanism, and (ii) numerous users can secure loans in the same currency backed by the security deposit. Ultimately, since proof of stake can indeed revoke deposits for misconduct, rather than merely dispensing rewards, it can achieve a level of security considerably exceeding that of rewards, whereas in the case of proof of work, the level of security can merely match the level of rewards. There exists no means for a proof of work protocol to <!-- --><i>annihilate<!-- --><\/i> the ASICs of errant miners.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Fortunately, there exists a methodology to verify those theories: initiate a proof of stake currency with a staking reward of 1%, 2%, 3%, etc per annum, and observe the proportion of coins that convert to deposits in each scenario. Participants will not act contrary to their interests, thus we can merely gauge the amount of funds expended on consensus as an indicator of the inefficiency introduced by the consensus algorithm; if proof of stake maintains a reasonable security level at a substantially lower reward level than proof of work, then we can ascertain that proof of stake is a more efficient consensus mechanism, using the participation levels at varying reward rates to accurately gauge the relationship between total expense and marginal cost. Ultimately, it may require several years to precisely comprehend the magnitude of the costs associated with capital lockup.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">In summary, we now confidently recognize that (i) proof of stake algorithms can be secured effectively, and weak subjectivity is both essential and adequate as a crucial revision in the security framework to navigate around nothing-at-stake apprehensions to achieve this aim, and (ii) there are significant economic grounds to assert that proof of stake is considerably more economically efficient than proof of work. Proof of stake is not a mystery; the recent six months of formal development and research have clarified the precise strengths and vulnerabilities, at least to the same degree as in proof of work, where uncertainties regarding mining centralization may persist indefinitely. Now, it is simply a matter of standardizing the algorithms and providing blockchain developers the liberty to choose.<!-- --><\/p>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/blog.ethereum.org\/en\/2014\/11\/25\/proof-stake-learned-love-weak-subjectivity\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Proof of stake remains one of the most debated topics in the cryptocurrency arena. While the concept has several undeniable advantages, including increased efficiency, a broader security margin, and enhanced resistance to hardware centralization issues, proof of stake mechanisms are often significantly more intricate than their proof of work counterparts. There exists considerable doubt regarding<\/p>\n","protected":false},"author":3,"featured_media":8282,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23],"tags":[1879],"class_list":{"0":"post-10329","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-ethereum","8":"tag-return-a-list-of-comma-separated-tags-from-this-title-proof-of-stake-how-i-learned-to-love-weak-subjectivity"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Embracing Weak Subjectivity: My Journey into the World of Proof of Stake - WSJ-Crypto<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/28\/embracing-weak-subjectivity-my-journey-into-the-world-of-proof-of-stake\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Embracing Weak Subjectivity: My Journey into the World of Proof of Stake - WSJ-Crypto\" \/>\n<meta property=\"og:description\" content=\"Proof of stake remains one of the most debated topics in the cryptocurrency arena. While the concept has several undeniable advantages, including increased efficiency, a broader security margin, and enhanced resistance to hardware centralization issues, proof of stake mechanisms are often significantly more intricate than their proof of work counterparts. There exists considerable doubt regarding\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/28\/embracing-weak-subjectivity-my-journey-into-the-world-of-proof-of-stake\/\" \/>\n<meta property=\"og:site_name\" content=\"WSJ-Crypto\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-28T01:49:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/wsj-crypto.com\/wp-content\/uploads\/2025\/02\/eth-org.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2100\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"wsjcrypto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"wsjcrypto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"17 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/28\/embracing-weak-subjectivity-my-journey-into-the-world-of-proof-of-stake\/\",\"url\":\"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/28\/embracing-weak-subjectivity-my-journey-into-the-world-of-proof-of-stake\/\",\"name\":\"Embracing Weak Subjectivity: My Journey into the World of Proof of Stake - WSJ-Crypto\",\"isPartOf\":{\"@id\":\"https:\/\/wsj-crypto.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/28\/embracing-weak-subjectivity-my-journey-into-the-world-of-proof-of-stake\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/28\/embracing-weak-subjectivity-my-journey-into-the-world-of-proof-of-stake\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/wsj-crypto.com\/wp-content\/uploads\/2025\/02\/eth-org.jpeg\",\"datePublished\":\"2025-03-28T01:49:52+00:00\",\"author\":{\"@id\":\"https:\/\/wsj-crypto.com\/#\/schema\/person\/88a93723b30416db1a352d5a0096c4a7\"},\"breadcrumb\":{\"@id\":\"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/28\/embracing-weak-subjectivity-my-journey-into-the-world-of-proof-of-stake\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/28\/embracing-weak-subjectivity-my-journey-into-the-world-of-proof-of-stake\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/28\/embracing-weak-subjectivity-my-journey-into-the-world-of-proof-of-stake\/#primaryimage\",\"url\":\"https:\/\/wsj-crypto.com\/wp-content\/uploads\/2025\/02\/eth-org.jpeg\",\"contentUrl\":\"https:\/\/wsj-crypto.com\/wp-content\/uploads\/2025\/02\/eth-org.jpeg\",\"width\":2100,\"height\":900},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/28\/embracing-weak-subjectivity-my-journey-into-the-world-of-proof-of-stake\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/wsj-crypto.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Embracing Weak Subjectivity: My Journey into the World of Proof of Stake\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/wsj-crypto.com\/#website\",\"url\":\"https:\/\/wsj-crypto.com\/\",\"name\":\"WSJ-Crypto\",\"description\":\"Just Another Crypto News Website\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/wsj-crypto.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/wsj-crypto.com\/#\/schema\/person\/88a93723b30416db1a352d5a0096c4a7\",\"name\":\"wsjcrypto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/wsj-crypto.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/86fe8af82ea089646d6639ca2f87e0243d8688d957bd8e3ec22ec3c457cc16d4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/86fe8af82ea089646d6639ca2f87e0243d8688d957bd8e3ec22ec3c457cc16d4?s=96&d=mm&r=g\",\"caption\":\"wsjcrypto\"},\"url\":\"https:\/\/wsj-crypto.com\/index.php\/author\/wsjcrypto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Embracing Weak Subjectivity: My Journey into the World of Proof of Stake - WSJ-Crypto","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/28\/embracing-weak-subjectivity-my-journey-into-the-world-of-proof-of-stake\/","og_locale":"it_IT","og_type":"article","og_title":"Embracing Weak Subjectivity: My Journey into the World of Proof of Stake - WSJ-Crypto","og_description":"Proof of stake remains one of the most debated topics in the cryptocurrency arena. While the concept has several undeniable advantages, including increased efficiency, a broader security margin, and enhanced resistance to hardware centralization issues, proof of stake mechanisms are often significantly more intricate than their proof of work counterparts. There exists considerable doubt regarding","og_url":"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/28\/embracing-weak-subjectivity-my-journey-into-the-world-of-proof-of-stake\/","og_site_name":"WSJ-Crypto","article_published_time":"2025-03-28T01:49:52+00:00","og_image":[{"width":2100,"height":900,"url":"https:\/\/wsj-crypto.com\/wp-content\/uploads\/2025\/02\/eth-org.jpeg","type":"image\/jpeg"}],"author":"wsjcrypto","twitter_card":"summary_large_image","twitter_misc":{"Scritto da":"wsjcrypto","Tempo di lettura stimato":"17 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/28\/embracing-weak-subjectivity-my-journey-into-the-world-of-proof-of-stake\/","url":"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/28\/embracing-weak-subjectivity-my-journey-into-the-world-of-proof-of-stake\/","name":"Embracing Weak Subjectivity: My Journey into the World of Proof of Stake - WSJ-Crypto","isPartOf":{"@id":"https:\/\/wsj-crypto.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/28\/embracing-weak-subjectivity-my-journey-into-the-world-of-proof-of-stake\/#primaryimage"},"image":{"@id":"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/28\/embracing-weak-subjectivity-my-journey-into-the-world-of-proof-of-stake\/#primaryimage"},"thumbnailUrl":"https:\/\/wsj-crypto.com\/wp-content\/uploads\/2025\/02\/eth-org.jpeg","datePublished":"2025-03-28T01:49:52+00:00","author":{"@id":"https:\/\/wsj-crypto.com\/#\/schema\/person\/88a93723b30416db1a352d5a0096c4a7"},"breadcrumb":{"@id":"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/28\/embracing-weak-subjectivity-my-journey-into-the-world-of-proof-of-stake\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wsj-crypto.com\/index.php\/2025\/03\/28\/embracing-weak-subjectivity-my-journey-into-the-world-of-proof-of-stake\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/28\/embracing-weak-subjectivity-my-journey-into-the-world-of-proof-of-stake\/#primaryimage","url":"https:\/\/wsj-crypto.com\/wp-content\/uploads\/2025\/02\/eth-org.jpeg","contentUrl":"https:\/\/wsj-crypto.com\/wp-content\/uploads\/2025\/02\/eth-org.jpeg","width":2100,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/28\/embracing-weak-subjectivity-my-journey-into-the-world-of-proof-of-stake\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wsj-crypto.com\/"},{"@type":"ListItem","position":2,"name":"Embracing Weak Subjectivity: My Journey into the World of Proof of Stake"}]},{"@type":"WebSite","@id":"https:\/\/wsj-crypto.com\/#website","url":"https:\/\/wsj-crypto.com\/","name":"WSJ-Crypto","description":"Just Another Crypto News Website","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wsj-crypto.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Person","@id":"https:\/\/wsj-crypto.com\/#\/schema\/person\/88a93723b30416db1a352d5a0096c4a7","name":"wsjcrypto","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/wsj-crypto.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/86fe8af82ea089646d6639ca2f87e0243d8688d957bd8e3ec22ec3c457cc16d4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/86fe8af82ea089646d6639ca2f87e0243d8688d957bd8e3ec22ec3c457cc16d4?s=96&d=mm&r=g","caption":"wsjcrypto"},"url":"https:\/\/wsj-crypto.com\/index.php\/author\/wsjcrypto\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/posts\/10329","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/comments?post=10329"}],"version-history":[{"count":2,"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/posts\/10329\/revisions"}],"predecessor-version":[{"id":10331,"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/posts\/10329\/revisions\/10331"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/media\/8282"}],"wp:attachment":[{"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/media?parent=10329"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/categories?post=10329"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/tags?post=10329"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}