A puzzle that is designed to take time to complete. In order to impede spammers, a proof-of-work (PoW) algorithm has been suggested for email. For example, if every message had to wait just 15 seconds before being sent, a compromised computer could never be used to unleash thousands of messages.
Bitcoin, Ethereum and other cryptos use the proof-of-work (PoW) algorithm. However, proof-of-work uses massive amounts of electricity and is a very controversial subject. See Bitcoin
and Bitcoin mining
How PoW Works
A challenge string is presented that has to be hashed together with an unknown number to derive a result that matches some criterion such as the first 20 bits must be zero. When that is reached, it proves that a certain amount of computer processing was undertaken. It takes an enormous number of calculations to find a number that proves the challenge, and miner hardware is rated in "hashes per second" (see hash rate
, miner hardware
and cryptographic hash function
Proof-of-Stake (PoS) Algorithm
In contrast, the proof-of-stake (PoS) method differs entirely. PoS miners compete to confirm transactions based on how much crypto they have locked up and held ("staked") for this purpose. From a mathematical standpoint, proof-of-stake is much less complicated than proof-of-work, and proof-of-stake uses considerably less electricity.
For example, next to Bitcoin, Ethereum is an extremely popular blockchain that has used proof-of-work since its launch in 2015. However, Ethereum 2.0 is a proof-of-stake method that is being tested to replace the PoW algorithm (see Ethereum 2.0
). Why change? Because as proof-of-work (PoW) miners become more monopolistic, any single miner with 51% or more of the network's computing power could invalidate good transactions and double spend the coins. With proof-of-stake (PoS), any miner with that much "at stake" would not want to destabilize the system. See Ethereum