Presect-off-offeak (pos) is the basis of the consensus mechanism ethereum. Ethereum included its mechanism for evidence of care in 2022, because it is more secure, less energy -intensive and more pleasant for new solutions for scaling in comparison with the previous architecture of the work verification.
to better know our address, we recommend that you first read consensus mechanisms. Of-stake is a way to prove that the validators have invested something interesting on the internet that it is possible to destroy, where they act dishonestly. In evidence of ethereum, validators clearly deliver funds to the manner of eth to a smart contract for ethereum. Then the validator is responsible for checking the fact that modern blocks distributed online are valid and sometimes construct and give new blocks. If they try to deceive the network (for example, offering several blocks, when the data can send 1-well or send conflicting certifications), nodes, consensus, and forks some or all their stable eth are destroyed.
Validators
To participate as a validator, the user must introduce 32 eth to the deposit agreement and include three separate hours of software: execution customer, a consensus -buyer and client of the validator. When depositing his eth, the user joins the activation queue, which limits the speed of new validators joining the network. After activation, the validators receive new blocks from peers online ethereum. The transactions delivered in the block are reviewed to check that the proposed clarifications in the ethereum forces are valid, and the signature of the block is checked. Then the validator sends a vote (called certification) in the sense of this block on the network. Evidence of origin, the pace is fixed. The time in ethereum in evidence will be divided into slots (12 moments - and era (32 slots). One validator accidentally selected as a block supply in any slot machine. This validator provides the creation of a new block and its shipment in other nodes on the network. Similarly in all kinds the slot machine is accidentally selected by the validator committee, whose voices are needed to determine the reliability of the proposed block. The division of the validator configured to committees is relevant to support the controlled network load. Committees share the validator set as each active validator has evaluated in every era, but not in every slot the next contains an end-to-end explanation of how the transaction is performed in ethereum pressctor-of-stake.
1. The user creates and signs a transaction with his own closed key. This is usually processed by a wallet or library, such as ether.Js (opens in a new tab), web3js (loaded in this tab), web3py (opens on a new tab), but under the hood the user makes a request to the node using the api ethereum json-rpc. The user determines the amount of gas that he is ready to visit the advice of the validator in order to encourage them to include the transaction in the block. Tips pay to the validator while the database is burned. 2. The transaction seems to be a client of ethereum execution, who checks its reliability. This implies that the sender has enough eth to perform a transaction, and they signed it with the right key. 3. If the transaction is valid, the execution client adds it to his local mempool (list of waiting transactions), and also transfers it to other nodes on the internet. When other nodes hear about the transaction, they also add a package to their own local mempoules. Advanced customers can refrain from broadcasting their transaction and, in addition, send it to the specialized builders of the blocks, it can be a flashbots auction (opens on a new tab). This helps them organize a shipment in the upcoming blocks for the highest profit (mev). 4. One of the online blocks is the offer of the block for the operational slot, a pseudo-explosion was previously selected using randao. This node ensures the creation and broadcast of the next block, which can become added to the ethereum blockchain and updating the global state. The node is formed from 3 parts: a customer of execution, consensus, besides everything and a client of the validator. The execution client lists transactions from local mempoules to “useful tests and performs them locally for the manufacture of changes in the condition. This information is transmitted to the consensus client, where the useful load of the execution is wrapped as a “lighthouse block” section, which similarly contains information about remunerations, fines, threads, certifications, etc. Which allows the network to coordinate the sequence of blocks on the head. Chains.The connection between the execution and consensus clients is described in more detail when connecting consensus and executive customers. 5. Other components receive a new lighthouse block in the consensus network of gossip. They pass it on to their partner of execution, where transactions are revised locally in order to obtain that the proposed change in the condition is valid. Then the validator client certifies that the block is valid and remains a logical next block in its own form (in other words it is created in a chain with the highest weight of certification, as defined in the rules for choosing a fork). The block is added to your local data in each node, which confirms it. 6. The transaction can be attributed to the “completed”, if the medical document has become part of the chain with the “supermajorite connection” between the two checkpoints. Control points are offered at the very beginning of each era, and they exist in order to take into account that moment, and this confirms only the subset of active validators, but all active validators confirm each era. Therefore, only between the eras you can show a “footnote for supercime” (it is in the place where 66% of the collective number of articles online agree with two checkpoints). In details about finality, you can see below. .
The transaction has "finality" in distributed networks when it has become an element of a block that cannot be changed without a good amount of eth burning. On ethereum, confirming the audit, this is controlled using the “control point” blocks. The first block in each era is a control point. Validators vote for pairs of control points, they consider valid. If a pair of checkpoints attracts votes representing at least 2-thirds from a joint number of articles, checkpoints are updated. Further two (target) becomes “justified”. Previously, they are already justified, from the fact that it was “a goal in the previous era. Now it is modernized until the end. ”
And to return the final block, the attacker would have taken over the loss of at least a third of the total supply of stostaid eth. The exact reason for this is explained in this site ethereum foundation (opens on a new tab). Since the finality requires a majority of two of three, the attacker can prevent the networks from achieving finally, voting with one third of the entire share. There is a mechanism for protection against this: a leak of inaction (opens on a new tab). This activates every time the chain does not want to complete for more than four eras. The inactivity of the leak expires through the fault of the static eth from the validators, voting against the majority, allowing the majority to restore the majority in two of three and go through the chain. >
The launch of the validator is an obligation. It is expected that the validator will maintain sufficient equipment and join the decision and offer of the blocks. Of course, the validator is paid in eth (their ancient balance is increasing). On the other hand, participation as a validator also opens the latest opportunities for you to attack the network for personal benefits or sabotage. In order to prevent this, validators miss the eth rewards, if they do not participate when they are called up, and their existing share is possible if they act dishonestly. Two large behavior can be considered dishonest: to offer several blocks in a single slot (equvation) and the presentation of conflicting certifications. At the same time. This is known as a “correlation penalty” (opens on a new tab), and the risk can be insignificant (~ 1% of the shares for a certain validator, stabbed independently or has the opportunity to lead to assurances that a 100% share of the validator will be destroyed (mass event to reduce the reduction ). He is imposed in the early stages to the forced period of exit, which will begin with an immediate fine (up to one eth) for one day, a fine of correlation for the 18th day and finally, the release from the world wide web on the 36th day. They they receive minor penalties for certification every day because they are present on the internet, however, they do not send votes. This all means that a coordinated attack would become very expensive for an attacker. Blok headed the chains, and all the validators confirm this. Still. Validators can include different information about the chain head due to the delay of online expanses or because the offer of the block in the exams. Using this, the consensus requires the algorithm to decide which of them gives preference. The algorithm used in ethereum is called lmd-gost (opens on a new tab), which works, identifying a fork that has the greatest weight of certification in its history.> proof of the company, and harmlessness for
The threat of attack 51% (opens on a new tab) still exists on evidence that this stems on evidence of the work, however, the building is even risky for attackers. The attacker will need 51% of steked eth. Then they are able to use their own certificates to provide that their preferred fork was the only one with very accumulated certificates. The “weight” of accumulated certifications is exactly that, the consensus is used for so long to establish the correct chain, so this attacker will be able to make his canonical fork. However, the force of verification of the injection in comparison with the proof of the work is hidden that the community has flexibility in establishing a counterattack. For example, honest validators can Blockchain History decide to continue to rely on the network of minorities and ignore the attacker fork, encouraging applications, exchanges and pools, in order to arrange everything. They are still able to decide on the forcibly removal of the attacker from the network and destroy their stadium eth. This is a strong economic protection against an invasion of 51%. Bad actors are able to take distant attacks (although the gadget from the end neutralizes this attack vector), short -term “reorgia” (although the terms of increase and certification are declared), mitigating its mitigation), bouncing and balanced attacks (also softened by amplifiers and such attacks, as it were no, it was demonstrated only in idealized conditions of the network or an attack of an avalanche (neutralized by the rule of algorithms for choosing a fork only taking into account the last message).
Which, however, the proof of the coverage, as implemented on ethereum, was shown, that the player is more economically safe than the proof of work.
Comparison with the proof of the work
Ethereum was far from a network of evidence. When ethereum began, he used evidence of work . The transition with evidence of the functioning of the tests occurred in september 2022.