Skip to main content

What Is the Theoretical Attack Vector Remaining in PoA?

The theoretical attack vector remaining in PoA involves a coordinated effort between a majority of the PoW miners and a majority of the PoS stakers. While the PoW cost deters casual attacks, a well-funded, coordinated entity could potentially mine a malicious block template and then ensure it is signed and validated by a majority of the stakers.

This requires significant collusion and economic resources, making it highly improbable but not impossible.

What Is the Difference between a 51% Attack on a PoW versus a PoS Blockchain?
How Do Hybrid Models like PoA Differ from Pure PoS in Terms of Network Security?
What Is the Main Security Vulnerability Associated with a Small Set of PoA Validators?
What Is the Trade-off in Decentralization between PoA and Pure PoW?