Section IV: Consensus Mechanisms
April 9, 2026
What is Proof of Work? - Converts expensive, verifiable computation into a Sybil‑resistant leader election for block proposals - Produces a publicly checkable ordering of blocks where rewriting requires proportional real‑world cost
In this lesson, we will: - Understand the PoW validity rule and how target/difficulty encode expected work - Model mining as a stochastic race; explain orphans and propagation effects - Analyze core threats: double spends, 51% control, selfish mining, eclipse, timestamp games, pool attacks - Connect security to economics: hash‑rate majority, fees vs subsidy, and security budgets
Recall: A ledger is a history of transactions. A blockchain chains blocks of transactions together.
The block body contains the actual ledger—a set of transactions that transfer value or state. To protect this ledger:
A PoW puzzle is any computation that is:
Common PoW puzzle types:
hash(data || nonce) meets a target (e.g., Bitcoin)For this discussion, we focus on hash-based puzzles. The same principles apply to other puzzle types.
(1/p) ÷ H.Three scenarios showing how the protocol responds to actual block times:
Block 1
Time: 6 min
Target: 1019
Block 2
Time: 5 min
Target: 1019
New Target
1018 (harder)
Block 1
Time: 10 min
Target: 1019
Block 2
Time: 10 min
Target: 1019
Target Stays
1019 (stable)
Block 1
Time: 15 min
Target: 1019
Block 2
Time: 18 min
Target: 1019
New Target
1020 (easier)
The lower the target, the smaller the fraction of hashes that meet it. This makes valid blocks rarer to find but equally cheap to verify.
Once the protocol decides to adjust, how does it happen in practice?
Each share → immediate fixed payout (pool absorbs block luck)
Payouts only at block discovery (green) — amount depends on block luck and recent share contributions
The Trusted Bootstrap Paradox: A fully decentralized protocol still requires a bootstrapping step. DNS seeds and hardcoded peer lists are centralized dependencies—if compromised, an attacker can eclipse your node before consensus rules even matter. This is a critical but often overlooked attack surface.
Attack pattern: a rogue miner participates in a pool, submitting valid shares but withholding full blocks, reducing the pool’s total rewards.
Motivations: sabotage rival pools, manipulate reputation, or create pressure that drives miners to switch affiliations.
Detection challenge: withholding looks statistically similar to bad luck—detectable only over time and with enough data.
Countermeasures: continuous performance monitoring, reputation systems, and contractual or payout designs that align incentives.
Key insight: mining security depends not only on cryptography, but also on the social and economic structures surrounding it.
Question: How does this impact PPS vs. PPLNS pools?
Let’s simulate proof of work by flipping five coins at once to see if we can achieve the target sequence.
Use this mining activity to race others in your pool to solve the puzzle.
/assets/labs/POW_mining_micro/
Then try the second mode where difficulty updates.
Explain the PoW validity rule and why verification is cheap.
State how difficulty targets the average block interval and why retargeting is needed.
Describe why confirmations lower double‑spend risk but never reach zero.
Name two attack classes and one mitigation for each.

Proof of Work & Security: Mechanics, Incentives, and Risks — Army Cyber Institute — April 9, 2026