Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Czech police arrest infamous darknet operator in Bitcoin-for-favors scandal

    August 15, 2025

    EOS founder Dan Larimer predicts biblical apocalypse next week

    August 15, 2025

    Web3 esports platform Miomi Game integrates AUSD on Polygon

    August 15, 2025
    Facebook X (Twitter) Instagram
    Ai Crypto TimesAi Crypto Times
    • Altcoins
      • Bitcoin
      • Coinbase
      • Litecoin
    • Blockchain
    • Crypto
    • Ethereum
    • Lithosphere News Releases
    X (Twitter) Instagram YouTube LinkedIn
    Ai Crypto TimesAi Crypto Times
    Home » The History of Casper – Chapter 2

    The History of Casper – Chapter 2

    Michael JohnsonBy Michael JohnsonJuly 23, 2025No Comments9 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    This chapter describes the game theory and economic security modelling we were doing in the Fall of 2014. It recounts how the “bribing attacker model” led our research directly to a radical solution to the long range attack problem.

    Chapter 2: The Bribing Attacker, Economic Security, and the Long Range Attack Problem

    Vitalik and I had each been reasoning about incentives as part of our research before we ever met, so the proposition that “getting the incentives right” was crucial in proof-of-stake was never a matter of debate. We were never willing to take “half of the coins are honest” as a security assumption. (It’s in bold because it’s important.) We knew that we needed some kind of “incentive compatibility” between bonded node incentives and protocol security guarantees.

    It was always our view that the protocol could be viewed as a game that could easily result in “bad outcomes” if the protocol’s incentives encouraged that behaviour. We regarded this as a potential security problem. Security deposits gave us a clear way to punish bad behaviour; slashing conditions, which are basically programs that decide whether to destroy the deposit.

    We had long observed that Bitcoin was more secure when the price of bitcoin was higher, and less secure when it was lower. We also now knew that security deposits provided slasher with more economic efficiency than slasher only on rewards. It was clear to us that economic security existed and we made it a high priority.

    The Bribing Attacker

    I’m not sure how much background Vitalik had in game theory (though it was clear he had more than I did). My own game theory knowledge at the start of the story was even more minimal than it is at the end. But I knew how to recognize and calculate Nash Equilibriums. If you haven’t learned about Nash Equilibriums yet, this next paragraph is for you.

    A Nash Equilibrium is a strategy profile (the players’ strategy choices) with a corresponding payoff (giving ETHortakingETH or taking ETHortakingETH away) where no players individually have an incentive to deviate. “Incentive to deviate” means “they get more $ETH if they somehow change what they’re doing”. If you remember that, and every time you hear “Nash Equilbrium” you thought “no points for individual strategy changes”, you’ll have it.

    Some time in late summer of 2014, I first ran into “the bribing attacker model” when I made an offhand response to an economic security question Vitalik asked me on a Skype call (“I can just bribe them to do it”). I don’t know where I got the idea. Vitalik then asked me again about this maybe a week or two later, putting me on the spot to develop it further.

    By bribing game participants you can modify a game’s payoffs, and through this operation change its Nash Equilibriums. Here’s how this might look:



    The bribe attack changes the Nash Equilibrium of the Prisoner’s Dilemma game from (Up, Left) to (Down,Right). The bribing attacker in this example has a cost of 6 if (Down, Right) is played.

    The bribing attacker was our first useful model of economic security.

    Before the bribing attack, we usually thought about economic attacks as hostile takeovers by foreign, extra-protocol purchasers of tokens or mining power. A pile of external capital would have to come into the system to attack the blockchain. With the bribe attack, the question became “what is the price of bribing the currently existing nodes to get the desired outcome?”.

    We hoped that the bribing attacks of our yet-to-be-defined proof-of-stake protocol would have to spend a lot of money to compensate for lost deposits.

    Debate about “reasonableness” aside, this was our first step in learning to reason about economic security. It was fun and simple to use a bribing attacker. You just see how much you have to pay the players to do what the attacker wants. And we were already confident that we would be able to make sure that an attacker has to pay security-deposit-sized bribes to revert the chain in an attempted double-spend. We knew we could recognize “double-signing”. So we were pretty sure that this would give proof-of-stake a quantifiable economic security advantage over a proof-of-work protocol facing a bribing attacker.

    The Bribing Economics of the Long Range Attack

    Vitalik and I applied the bribing attacker to our proof-of-stake research. We found that PoS protocols without security deposits could be trivially defeated with small bribes. You simply pay coin holders to move their coins to new addresses and give you the key to their now empty addresses. (I’m not sure who originally thought of this idea.) Our insistence on using the briber model easily ruled out all of the proof-of-stake protocols we knew about. I liked that. (At the time we had not yet heard of Jae Kwon’s Tendermint, of Dominic William’s now-defunct Pebble, or of Nick Williamson’s Credits.)

    This bribe attack also posed a challenge to security-deposit based proof-of-stake: The moment after a security deposit was returned to its original owner, the bribing adversary could buy the keys to their bonded stakeholder address at minimal cost.

    This attack is identical to the long range attack. It is acquiring old keys to take control of the blockchain. It meant that the attacker can create “false histories” at will. But only if they start at a height from which all deposits are expired.

    Before working on setting the incentives for our proof-of-stake protocol, therefore, we needed to address the long-range attack problem. If we didn’t address the long range attack problem, then it would be impossible for clients to reliably learn who really had the security deposits.

    We did know that developer checkpoints could be used to deal with the long-range attack problem. We thought this was clearly way too centralized.

    In the weeks following my conversion to proof-of-stake, while I was staying at Stephan Tual’s house outside of London, I discovered that there was a natural rule for client reasoning about security deposits. Signed commitments are only meaningful if the sender currently has a deposit. That is to say, after the deposit is withdrawn, the signatures from these nodes are no longer meaningful. Why would I trust you after you withdraw your deposit?

    The bribing attack model demanded it. It would cost the bribing attacker almost nothing to break the commitments after the deposit is withdrawn.

    This meant that a client would hold a list of bonded nodes, and stop blocks at the door if they were not signed by one of these nodes. Ignoring consensus messages from nodes who don’t currently have security deposits solves circumvents the long-range attack problem.  Instead of authenticating the current state based on the history starting from the genesis block, we authenticate it based on a list of who currently has deposits.

    This is radically different from proof-of-work.

    In PoW, a block is valid if it is chained to the genesis block, and if the block hash meets the difficulty requirement for its chain. In this security deposit-based model, a block is valid if it was created by a stakeholder with a currently existing deposit. This meant that you would need to have current information in order to authenticate the blockchain. This subjectivity has caused a lot of people a lot of concern, but it is necessary for security-deposit based proof-of-stake to be secure against the bribing attacker.

    This realization made it very clear to me that the proof-of-work security model and the proof-of-stake security model are fundamentally not compatible. I therefore abandoned any serious use of “hybrid” PoW/PoS solutions. Trying to authenticate a proof-of-stake blockchain from genesis now seemed very obviously wrong.

    Beyond changing the authentication model, however, we did need to provide a way to manage these lists of security deposits. We had to use signatures from bonded nodes to manage changes to the list of bonded nodes, and we had to do it after the bonded nodes come to consensus on these changes. Otherwise, clients would have different lists of bonded validators, and they would therefore be unable to agree on the state of Ethereum. 

    Bond time needed to be made long, so that clients have time to learn about the new, incoming set of bonded stakeholders. As long as clients were online enough, they could keep up to date. I thought we would use twitter to share the bonded node list, or at least a hash, so that new and hibernating clients could get synchronized after their user enters a hash into the UI.

    If you have the wrong validator list you can get man-in-the-middled. But it’s really not that bad. The argument was (and still is!) that you only need to be able to trust an external source for this information once. After that once, you will be able to update your list yourself – at least, if you are able to be online regularly enough to avoid the “long range” of withdrawn deposits.

    I know that it might take some getting used to. But we can only rely on fresh security deposits. Vitalik was a bit uncomfortable with this argument at first, trying to hold onto the ability to authenticate from genesis, but eventually was convinced by the necessity of this kind of subjectivity in proof of stake protocols. Vitalik independently came up with his weak subjectivity scoring rule, which seemed to me like a perfectly reasonable alternative to my idea at the time, which was basically “have all the deposits sign every Nth block to update the bonded node list”.

    With the nails in the nothing-at-stake and long-range attack coffins completely hammered in, we were ready to start choosing our slashing conditions.

    The next chapter will document what we learned from our first struggles to define a consensus protocol by specifying slashing conditions. I’ll also tell you about what we learned from talking with fine people from our space about our research. The game theory and economic modelling story presented here will continue developing in Chapter 4.


    NOTE: The views expressed here are solely my own personal views and do not represent those of the Ethereum Foundation. I am solely responsible for what I’ve written and am not am not acting as a spokesperson for the Foundation.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Michael Johnson

    Related Posts

    Join Us: EF Protocol Reddit AMA – August 29th, 2025

    August 15, 2025

    SIGN price soars 11% as Sign Foundation completes $12M token buyback

    August 13, 2025

    Fear & Greed Index hits 63 as Bitcoin, ETH, and SOL rebound

    August 7, 2025
    Leave A Reply Cancel Reply

    Don't Miss

    Czech police arrest infamous darknet operator in Bitcoin-for-favors scandal

    Crypto August 15, 2025

    The man behind Sheep Marketplace, a defunct darknet hub, now faces fresh charges after allegedly…

    EOS founder Dan Larimer predicts biblical apocalypse next week

    August 15, 2025

    Web3 esports platform Miomi Game integrates AUSD on Polygon

    August 15, 2025

    VCs secretly cashed out rewards on ‘locked’ EIGEN tokens

    August 15, 2025
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Our Picks

    AGII Develops Adaptive Intelligence Layers to Improve Web3 Workflow Precision

    August 15, 2025

    Imagen Network Enhances Content Discovery and Interaction with Grok AI Integration

    August 15, 2025

    Imagen Network Integrates Grok AI to Deliver More Personalized and Engaging Social Experiences

    August 14, 2025

    Imagen Network (IMAGE) Boosts User Engagement Using XRP for Instant Social Transactions

    August 13, 2025

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    Demo
    • Popular
    • Recent
    • Top Reviews

    Polyhedra’s ZKJ token collapses following ‘abnormal on-chain activity’

    June 17, 2025

    Polyhedra’s ZKJ token collapses following ‘abnormal on-chain activity’

    June 17, 2025

    Colle AI Releases Design-Focused NFT Tools for Real-Time Creator Prototyping

    June 17, 2025

    Czech police arrest infamous darknet operator in Bitcoin-for-favors scandal

    August 15, 2025

    EOS founder Dan Larimer predicts biblical apocalypse next week

    August 15, 2025

    Web3 esports platform Miomi Game integrates AUSD on Polygon

    August 15, 2025
    Latest Galleries
    [latest_gallery cat="all" number="5" type="slider"]
    Latest Reviews
    Demo
    Top Posts

    AGII Develops Adaptive Intelligence Layers to Improve Web3 Workflow Precision

    August 15, 20250 Views

    Imagen Network Enhances Content Discovery and Interaction with Grok AI Integration

    August 15, 20250 Views

    Imagen Network Integrates Grok AI to Deliver More Personalized and Engaging Social Experiences

    August 14, 20250 Views

    Imagen Network (IMAGE) Boosts User Engagement Using XRP for Instant Social Transactions

    August 13, 20250 Views
    Don't Miss

    Czech police arrest infamous darknet operator in Bitcoin-for-favors scandal

    Crypto August 15, 2025

    The man behind Sheep Marketplace, a defunct darknet hub, now faces fresh charges after allegedly…

    EOS founder Dan Larimer predicts biblical apocalypse next week

    August 15, 2025

    Web3 esports platform Miomi Game integrates AUSD on Polygon

    August 15, 2025

    VCs secretly cashed out rewards on ‘locked’ EIGEN tokens

    August 15, 2025
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    Demo
    Top Posts

    Bitcoin.com Wallet Earns WalletConnect Certified Badge! | by Bitcoin.com | Jul, 2025

    July 18, 202565 Views

    Justin Sun sues Bloomberg after report claims he owns 60% of TRON tokens

    August 14, 202538 Views

    SIGN price soars 11% as Sign Foundation completes $12M token buyback

    August 13, 202514 Views

    ProfitFarmers Review – Is it Legit? July 2025

    July 7, 20251 Views
    Don't Miss

    Czech police arrest infamous darknet operator in Bitcoin-for-favors scandal

    Crypto August 15, 2025

    The man behind Sheep Marketplace, a defunct darknet hub, now faces fresh charges after allegedly…

    EOS founder Dan Larimer predicts biblical apocalypse next week

    August 15, 2025

    Web3 esports platform Miomi Game integrates AUSD on Polygon

    August 15, 2025

    VCs secretly cashed out rewards on ‘locked’ EIGEN tokens

    August 15, 2025
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    X (Twitter) Instagram YouTube LinkedIn
    Our Picks

    Czech police arrest infamous darknet operator in Bitcoin-for-favors scandal

    August 15, 2025

    EOS founder Dan Larimer predicts biblical apocalypse next week

    August 15, 2025

    Web3 esports platform Miomi Game integrates AUSD on Polygon

    August 15, 2025
    Recent Posts
    • Czech police arrest infamous darknet operator in Bitcoin-for-favors scandal
    • EOS founder Dan Larimer predicts biblical apocalypse next week
    • Web3 esports platform Miomi Game integrates AUSD on Polygon
    • VCs secretly cashed out rewards on ‘locked’ EIGEN tokens
    • Federal Reserve drops program that increased banks scrutiny of crypto
    © 2025 - 2026

    Type above and press Enter to search. Press Esc to cancel.