What Is the Theoretical Attack Vector Remaining in PoA?

The theoretical attack vector remaining in PoA involves a coordinated effort between a majority of the PoW miners and a majority of the PoS stakers. While the PoW cost deters casual attacks, a well-funded, coordinated entity could potentially mine a malicious block template and then ensure it is signed and validated by a majority of the stakers.

This requires significant collusion and economic resources, making it highly improbable but not impossible.

What Is the Trade-off in Decentralization between PoA and Pure PoW?
How Does a 2/3 Majority PoS Signature Threshold Affect PoA Finality?
How Does the Staker Selection Process in PoA Enhance Security?
What Is the Primary Difference between a PoW and a Proof-of-Stake (PoS) 51% Attack?
How Does Proof-of-Work Contribute to the Initial Block Creation in PoA?
Does the PoA Selection Mechanism Suffer from the “Rich Get Richer” Criticism of PoS?
How Does the Block Reward Incentivize Miners?
How Does ‘Delegated Proof-of-Stake’ (DPoS) Differ from Pure PoS?

Glossar