PIVX logo

How to Attack Proof of Stake Chains

Learn, Security

uses Proof of Work () to secure its and prevent double spending. PoW protocols deliberately “waste” electricity to make it economically and physically impossible to the chain.

Newer coins such as use Proof of Stake () to secure their chains – this is good because it does not “waste” electricity but it allows costless attacks. Therefore the only is the efficiency of the code. This is a concern when state actors with huge computing power and massive human resources could decide to attack a chain.

Evangelos Deirmentzogloue gives a good introduction to attacks on PoS in this Medium post.


James Bayley

Ex-physicist, professional project manager and cryptocurrency enthusiast.

Related Articles

Leave a comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.


This site provides educational material only and nothing herein constitutes investment advice. You must conduct your own due diligence before buying any cryptocurrency related product and should consider taking professional advice.

Privacy Policy


Cryptocurrency investment is very risky and you may loose all your money. Risks include but are not limited to, theft, fraud, exchange failures, and technical errors leading to partial or total loss of funds. Never invest money you cannot afford to lose.

Terms and Conditions

(C) 2017 Cryptocurrency.guru

Back to Top