How Does a Proof-of-Stake (PoS) System Deter a 51% Attack?

A PoS system deters a 51% attack by making it prohibitively expensive to acquire 51% of the total staked cryptocurrency (the native token). If an attacker successfully gains 51% of the stake and attempts to create a malicious chain, the protocol's "slashing" mechanism will detect the double-signing and automatically destroy (slash) the attacker's staked funds.

This guaranteed, permanent loss of capital makes the attack economically irrational, as the attacker's investment would be immediately and significantly devalued.

What Is “Slashing” and How Does It Deter Malicious Behavior in PoS?
Can a Double-Spend Attack Be Launched on a PoS Network?
How Does the Cost of a Successful Attack Relate to the Total Value Staked?
What Is “Slashing” in a Proof-of-Stake System and How Does It Deter Malicious Behavior?
How Does a ‘Slashing’ Mechanism Deter Malicious PoS Re-Orgs?
What Is the “51% Attack” and How Does It Differ in PoW versus PoS Systems?
How Does a Proof-of-Stake (PoS) Network’s Equivalent of a 51% Attack Differ from PoW?
Why Is Acquiring 51% of Staked Tokens Generally Harder than Renting 51% of Hashrate?

Glossar