Steem DPoS Coup Can’t Happen in Ethereum PoS Says Vitalik Buterin

栏目: IT技术 · 发布时间: 4年前

内容简介:The Steem community is up in arms after three exchanges voted in 20 ‘delegates’, or ‘witnesses’ as they call them, who have decision making powers.There are allegations Poloniex, Huobi and Binance, all three owned by Chinese citizens close to Justin Sun, w

The Steem community is up in arms after three exchanges voted in 20 ‘delegates’, or ‘witnesses’ as they call them, who have decision making powers.

There are allegations Poloniex, Huobi and Binance, all three owned by Chinese citizens close to Justin Sun, were paid to engage in this takeover of Steem.

Damage is done, what is also proven by payments from Steemit Inc: https://t.co/NjyqHq1OEK https://t.co/hpyEeZ5cmN https://t.co/0MXIr9Mwdp

— Krzysztof Szumny (@noisypl) March 3, 2020

Steemers made a controversial decision to freeze the account of Steemit Inc, the entity that kind of maintains Steem.

That was “to ensure that the security and decentralization of the Steem blockchain remains intact,” with Steemit holding some 25 million tokens out of a supply of 360 million.

Steem DPoS Coup Can’t Happen in Ethereum PoS Says Vitalik Buterin
Steem coup, March 2020, Image from Steemers.

You can see far more steem holders have voted for representatives who are not in decision making positions, but more steem tokens have voted for the exchanges representatives and so they get to be the ones that decide.

Justin Sun, who acquired Steemit, says the decision to freeze the account was a “hack” and so he justifies taking over the top 20 decision making positions by stating it was to prevent the hack.

Steemit itself says “Soft Fork 22.2 was maliciously structured, intending to freeze a handful of very targeted accounts and taking away their rights and possession to their owned asset, and may be deemed illegal and criminal.”

(5/9) We will commit to withdrawing the votes ASAP once we're sure malicious hackers can’t sabotage #STEEM anymore & will give the voting rights back to the community. All exchanges’ votes will be withdrawn soon. Shoutout to all the exchanges & parties who helped us save STEEM!

— Justin Sun (@justinsuntron) March 3, 2020

Lol . Steem as you might know is kind of a decentralized social blogging network of sorts by Dan Larimer, the guy who then went off to create the same dPoS system in EOS.

In dPoS the three entities in this case, Poloniex, Binance and Huobi, can just change any rule, they can delete blog posts for example, or in this case the ownership of steem tokens itself.

In Proof of Stake (PoS), at least as designed in ethereum, the situation is very different with no one voted in and with stakers only validating transactions. They have no say over the code rules themself.

Coin voting != PoS. In PoS validator's just verify blocks, they are not voting on decisions. Using PoW to vote on decisions would be even more of a disaster than using coin voting.

— vitalik.eth (@VitalikButerin) March 2, 2020

In bitcoin Proof of Work (PoW) miners decide only the order of transactions, as in when ownership moved. They can’t change the rules themself, like blacklisting some account.

That would be a fork requiring nodes to run new code and so devs, businesses, miners and hodlers would have to agree to it and if there is disagreement they can just create two parallel networks with people then deciding what version they prefer.

In eth it’s the same, but instead of ‘identity’ being established by hardware so that it can’t be faked to get the coins for validating, it is established by locking 32 eth.

Meaning this coup can’t easily happen in eth as people would have to actively opt into running new code rules, rather than 3 people deciding what the rules are.

Copyrights Trustnodes.com


以上就是本文的全部内容,希望对大家的学习有所帮助,也希望大家多多支持 码农网

查看所有标签

猜你喜欢:

本站部分资源来源于网络,本站转载出于传递更多信息之目的,版权归原作者或者来源机构所有,如转载稿涉及版权问题,请联系我们

Web前端黑客技术揭秘

Web前端黑客技术揭秘

钟晨鸣、徐少培 / 电子工业出版社 / 2013-1 / 59.00元

Web前端的黑客攻防技术是一门非常新颖且有趣的黑客技术,主要包含Web前端安全的跨站脚本(XSS)、跨站请求伪造(CSRF)、界面操作劫持这三大类,涉及的知识点涵盖信任与信任关系、Cookie安全、Flash安全、DOM渲染、字符集、跨域、原生态攻击、高级钓鱼、蠕虫思想等,这些都是研究前端安全的人必备的知识点。本书作者深入剖析了许多经典的攻防技巧,并给出了许多独到的安全见解。 本书适合前端工......一起来看看 《Web前端黑客技术揭秘》 这本书的介绍吧!

JSON 在线解析
JSON 在线解析

在线 JSON 格式化工具

RGB转16进制工具
RGB转16进制工具

RGB HEX 互转工具

HSV CMYK 转换工具
HSV CMYK 转换工具

HSV CMYK互换工具