πŸ™Š
Proof of Apes (PoA)
  • πŸ’Proof Of Apes
  • Overview
    • πŸ™‰What is PoA?
    • 🍌Our Features
    • πŸͺ™Tokenomics
    • πŸ”’Security
  • PoA Blockchain
    • πŸ› οΈGetting set up
      • πŸ“RPC Mainnet
      • 🌐Explorer
  • More Information
    • πŸ–₯️For Developers
    • πŸ”—PoA Links
Powered by GitBook
On this page
  1. Overview

Security

Most Proof of Work(PoW) blockchains are overrun by ASICs and have issues, with over half of the attacks in the early stages of a blockchain. Proof of Authority doesn’t have this issue.

The PoA network is more impervious to attacks than the PoS or PoW consensus mechanism. If a user manages to create 51% of the processing power, they still can't compromise a PoA network, but on a PoS network, if a user acquires 51% of the total stake, they can attack or even shut down the entire network. In order to depress actions that could jeopardize the network, many PoS networks take portions from a validator's stake in what they call a 'slashing technique'. This technique can introduce an additional problem in that slashing can occur even if the validator inadvertently does anything that's perceived as negative.

Proof of Apes chose Proof of Authority mainly due to the PoS security vulnerabilities and PoW energy consumption, but it is worth noting that the Proof of Apes blockchain can adjust to Proof of Stake(PoS) in the future if deemed necessary.

PreviousTokenomicsNextGetting set up

Last updated 2 years ago

πŸ”’