πŸ”’Security

Most Proof of Work(PoW) blockchains are overrun by ASICs and have issues, with over half of the attacks in the early stages of a blockchain. Proof of Authority doesn’t have this issue.

The PoA network is more impervious to attacks than the PoS or PoW consensus mechanism. If a user manages to create 51% of the processing power, they still can't compromise a PoA network, but on a PoS network, if a user acquires 51% of the total stake, they can attack or even shut down the entire network. In order to depress actions that could jeopardize the network, many PoS networks take portions from a validator's stake in what they call a 'slashing technique'. This technique can introduce an additional problem in that slashing can occur even if the validator inadvertently does anything that's perceived as negative.

Proof of Apes chose Proof of Authority mainly due to the PoS security vulnerabilities and PoW energy consumption, but it is worth noting that the Proof of Apes blockchain can adjust to Proof of Stake(PoS) in the future if deemed necessary.

Last updated