
Sign up to save your podcasts
Or


https://3speak.tv/watch?v=networkstate.mp3/dcrpdray
-----------------------
Decentralized ecosystems promise censorship resistance, transparent governance,
A “51% attack” in the context of many blockchains typically refers to controlling the majority of mining hash power (in proof-of-work) or the majority of total stake (in proof-of-stake). In a delegated proof-of-stake (DPoS) chain, the equivalent is controlling over 51% of the active voting stake, not necessarily 51% of total tokens in existence. A large fraction of tokens may be non voting, dormant or held by long-term investors who choose not to participate in governance, so the threshold to seize decision-making power might be lower (e.g., 30–40% of total tokens) if it translates to half of the actively voted stake.
The goal of gaining 51% of the voting stake in either POW or DPOS governance systems is to control or change the underlying consensus software of the blockchain. The group which controls 51% of the active voting stake has the power to nullify balances, change the rules or carry out any number of wide ranging nefarious actions which may act against the best interests of the wider community. Some of these actions may even be subtle and hard to detect without deep knowledge of the base code.
Attackers sometimes attempt shock acquisitions: buying large stakes through private Over the Counter (OTC) deals with major token holders to avoid moving markets. Even so, a month-long lock or similar delay feature grants the broader community critical time to observe the build-up, approach the new party about their intentions and organize a defence if necessary.
An alternative method is the slow, stealthy approach, gradually buying tokens over a long period so that no sudden price surges draw suspicion. The attacker attempts to outpace inflation and avoid spooking community members. This is often described as a “Red Queen Race or Game,” where the attacker has to keep running, constantly purchasing stake to maintain or grow their position because:
In practice, truly stealthy long-term accumulation on a healthy DPoS network proves extremely difficult. Because continuous buying raises a token’s profile, it can also raise the price, creating a negative feedback loop that the attacker has to outpace.
Well-distributed token ownership is the most fundamental defence against takeover attempts in DPoS. If a small group of large holders controls the majority of tokens, an attacker may simply collude or purchase those stakes. Conversely, if significant token supply rests in the hands of numerous mid-level stakeholders (“dolphins” or “orcas” in some ecosystems), no single OTC deal can guarantee majority control.
For more information on Pre-Mines and ICO’s see Chapter 15. “Censorship and the Morality of Pre-Mines”.
In the event of an attempted 51% attack, a DPoS community often springs into action much like a biological immune system. Dormant stakeholders rally to vote; whales who had previously been indifferent secure the network to protect their own investment. This sudden rise in active voting power can defeat or mitigate the attacker’s advantage. The lower the level of dormant or apathetic voting stake during times of normal operation, the more of a deterrence it is to an attacker.
Even if an attacker somehow takes control of the main chain, forking remains a final check on malicious power.
Forking therefore holds large token holders accountable, compelling them to act benevolently towards the community. If whales push too hard or threaten the ecosystem’s values, the rest of the network can simply leave. This “veto power” ensures that smaller stakeholders, though individually less wealthy, collectively hold enormous influence which far outweighs that of any of the whales (large stakeholders) in the ecosystem.
Centralized startups or traditional corporations may be acquired by buying out a single entity or board of directors. In a community-governed ecosystem, no single gatekeeper can sell the “heart” or values of the community. If an attacker attempts a hostile takeover:
In blockchain architecture, we often hear about Layer 1 (the core protocol, consensus, and data availability) and Layer 2 (applications, smart contracts, Dapps). Missing from many discussions is Layer 0: the community of people who participate, build, and govern.
In proof-of-stake systems which usually lack engaged community members due to the typical nature of the passive earning for staking model in PoS systems, a wealthy minority can capture governance outright with no recourse for remediation for the majority individual members of the community. By contrast, well-distributed DPoS networks rely on their engaged, vigilant user base; the crucial layer zero to monitor, maintain control decentralized, and fight for it digitally when necessary.
By Network State Audio Bookhttps://3speak.tv/watch?v=networkstate.mp3/dcrpdray
-----------------------
Decentralized ecosystems promise censorship resistance, transparent governance,
A “51% attack” in the context of many blockchains typically refers to controlling the majority of mining hash power (in proof-of-work) or the majority of total stake (in proof-of-stake). In a delegated proof-of-stake (DPoS) chain, the equivalent is controlling over 51% of the active voting stake, not necessarily 51% of total tokens in existence. A large fraction of tokens may be non voting, dormant or held by long-term investors who choose not to participate in governance, so the threshold to seize decision-making power might be lower (e.g., 30–40% of total tokens) if it translates to half of the actively voted stake.
The goal of gaining 51% of the voting stake in either POW or DPOS governance systems is to control or change the underlying consensus software of the blockchain. The group which controls 51% of the active voting stake has the power to nullify balances, change the rules or carry out any number of wide ranging nefarious actions which may act against the best interests of the wider community. Some of these actions may even be subtle and hard to detect without deep knowledge of the base code.
Attackers sometimes attempt shock acquisitions: buying large stakes through private Over the Counter (OTC) deals with major token holders to avoid moving markets. Even so, a month-long lock or similar delay feature grants the broader community critical time to observe the build-up, approach the new party about their intentions and organize a defence if necessary.
An alternative method is the slow, stealthy approach, gradually buying tokens over a long period so that no sudden price surges draw suspicion. The attacker attempts to outpace inflation and avoid spooking community members. This is often described as a “Red Queen Race or Game,” where the attacker has to keep running, constantly purchasing stake to maintain or grow their position because:
In practice, truly stealthy long-term accumulation on a healthy DPoS network proves extremely difficult. Because continuous buying raises a token’s profile, it can also raise the price, creating a negative feedback loop that the attacker has to outpace.
Well-distributed token ownership is the most fundamental defence against takeover attempts in DPoS. If a small group of large holders controls the majority of tokens, an attacker may simply collude or purchase those stakes. Conversely, if significant token supply rests in the hands of numerous mid-level stakeholders (“dolphins” or “orcas” in some ecosystems), no single OTC deal can guarantee majority control.
For more information on Pre-Mines and ICO’s see Chapter 15. “Censorship and the Morality of Pre-Mines”.
In the event of an attempted 51% attack, a DPoS community often springs into action much like a biological immune system. Dormant stakeholders rally to vote; whales who had previously been indifferent secure the network to protect their own investment. This sudden rise in active voting power can defeat or mitigate the attacker’s advantage. The lower the level of dormant or apathetic voting stake during times of normal operation, the more of a deterrence it is to an attacker.
Even if an attacker somehow takes control of the main chain, forking remains a final check on malicious power.
Forking therefore holds large token holders accountable, compelling them to act benevolently towards the community. If whales push too hard or threaten the ecosystem’s values, the rest of the network can simply leave. This “veto power” ensures that smaller stakeholders, though individually less wealthy, collectively hold enormous influence which far outweighs that of any of the whales (large stakeholders) in the ecosystem.
Centralized startups or traditional corporations may be acquired by buying out a single entity or board of directors. In a community-governed ecosystem, no single gatekeeper can sell the “heart” or values of the community. If an attacker attempts a hostile takeover:
In blockchain architecture, we often hear about Layer 1 (the core protocol, consensus, and data availability) and Layer 2 (applications, smart contracts, Dapps). Missing from many discussions is Layer 0: the community of people who participate, build, and govern.
In proof-of-stake systems which usually lack engaged community members due to the typical nature of the passive earning for staking model in PoS systems, a wealthy minority can capture governance outright with no recourse for remediation for the majority individual members of the community. By contrast, well-distributed DPoS networks rely on their engaged, vigilant user base; the crucial layer zero to monitor, maintain control decentralized, and fight for it digitally when necessary.