Could anyone explain to me how proof of stake works (as opposed to proof of work), and how it is better? Has proof of stake been proven to be as robust as proof of work?
EDIT: The wikipedia article is easy to find[1]. However it is really short, looks incomplete, and has a lot of “citation needed” after each point. So I would rather ask on HN.
I'll give it a try, but I'm by no means an expert in cryptography.
Proof-of-work works (very broadly) by computers solving harder and harder math problems to create value. Eventually, these get so hard that solving one requires either joining a pool or a huge investment in electricity and mining rigs - which is where we're at now. This isn't good for the environment.
Proof-of-stake works by individuals "staking" some of their own coins to be more likely to be randomly chosen to "validate" a transaction (which earns them a reward, similar to hashing). Validating a transaction is trivial and uses very little electricity, but the rest of the network also checking the transaction keeps the validator honest.
While proof-of-work and proof-of-stake are both a kind of "the rich get richer" game, to get more coins in proof-of-stake all that's required is a greater investment into the network, as opposed to the mining rigs and large amounts of electricity that are required by proof-of-work.
I found this video to be helpful in visualizing the networking parts of proof-of-stake.
Kind of funny the goal of crypto was a total new, decentralized, democratic system, and what we end up (to solve the scale issue), is yet another class system where you can vote only in proportion to your wealth.
This is a massive and common misunderstanding. Publishing a block is NOT voting on its validity. Every node, regardless of stake accrued 'votes' (the correct word is 'chooses') independently of the validity of blocks just like in Bitcoin.
Blockchains that allow protocol changes via votes are an option, and how you quantify votes is a parameter, but PoS is not tied to being a government token, and 'votes' on forks (its really not a vote as both protocols exist after a fork) are made by large and small holders alike. It has nothing to do with amount of currency owned.
Nope, it's still distributed consensus rather than centralized. If one banker stops being nice, he'll loose all his funds. The current system either ignores people not-being-nice or ejects them, but they'll never lose what they made.
Compared to PoS where the biggest incentive is to be nice.
Assuming a simple PoS system of more stake=more blocks validated achieving a 51% attack is as capital intensive as it would be on a PoW system of the same size. So as far as the most basic notion of security is concerned there's no difference.
No, it has in fact been proven many times over in many research white papers to be fatally flawed and that's why no serious cryptocurrency would implement proof of stake.
Still asking out of desire to learn: How has it been shown to be flawed? With what kind of experiments? Which are the flaws? How to they manifest them self (e.g. how could you exploit them with PoS but not with PoW)?
One problem: You fire up your blockchain software and it reaches out over the internet to find other servers and ask them if they have a copy of the blockchain.
But how does in know which copy is the real one and not one cooked up by someone like me showing I own half the coins?
With proof of work you can choose the one with the most work in it and that's hard to fake as the real bitcoin blockchain has billions of dollars worth of computer work in.
With proof of stake it's hard. If there is no real cost, fakers can make thousands or millions of fake chains and how do you know which is the 'real' one?
There are potential solutions but it's tricky. Like if you have www.stake-coin.com point to the real one, what if someone manages to take over the domain?
You bootstrap the pos chain onto the pow one, so you have your trivially checkable first part. After that it.s not exactly trivial to fake the whole chain without holding validators private keys (remember, they had stake in pow chain).
Im kinda at a loss about what other vectors of attack possible, hard to find any digestible info, and pos protocol designs are really complex.
I am not searching down all the whitepapers for you, if you truly want to learn then you will need to dig into the myriad mathematician's white papers against Proof of Stake.
EDIT: The wikipedia article is easy to find[1]. However it is really short, looks incomplete, and has a lot of “citation needed” after each point. So I would rather ask on HN.
1: https://en.wikipedia.org/wiki/Proof_of_stake