Hacker News new | past | comments | ask | show | jobs | submit login

> the three things the author argues cannot occur in a proof of stake system.

The author appears to be saying that "any decentralized consensus via proof of stake system is vulnerable to timing attacks"

The counter-argument that "This here proof of stake system has not been successfully attacked ... that we know of ... yet" does not seem to be watertight.




Consider applying for YC's W25 batch! Applications are open till Nov 12.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: