How Does ‘Staking’ in PoS Secure the Network against a 51% Attack?

In a Proof-of-Stake system, a 51% attack would require an attacker to control 51% of the total staked cryptocurrency. Acquiring this much capital is prohibitively expensive and difficult to coordinate.

Furthermore, if an attacker successfully corrupted the network, the value of their own large stake would plummet, providing a massive financial disincentive. The protocol also includes 'slashing' to penalize malicious behavior.

How Does the Cost of Acquiring the Necessary Hash Power Relate to the Potential Profit from a Double-Spend?
What Is the Primary Difference between a PoW and a Proof-of-Stake (PoS) 51% Attack?
How Does the ‘Opportunity Cost’ of Staking Impact the Overall Security of a PoS Network?
What Is the “Nothing-at-Stake” Problem and How Do PoS Protocols Address It?
How Does the Cost of a Successful Attack Relate to the Total Value Staked?
How Does the Exchange’s Risk Engine Manage the Combined Risk of Both Systems?
Can a PoS Attacker Easily Acquire 51% of the Staked Tokens on a Large Network?
Compare the Capital Cost of a PoS Attack to the Energy Cost of a PoW Attack

Glossar