Cryptocurrencies and Blockchain (Part 2): Distributed Consensus and Decentralization

·

In the previous article, I deliberately avoided deep technical discussions to focus on practical insights for general investors. Cryptocurrencies and blockchain are complex, multidimensional topics often clouded by media hype and conceptual confusion. Since then, I’ve received numerous questions that confirm this very confusion—some readers believe in Bitcoin’s long-term price growth, while others claim blockchain is akin to the early internet with vast application potential. However, these perspectives were not the focus of my original piece.

One common counterargument noted that despite past financial bubbles—like the South Sea Bubble or the dot-com crash—equities, electronics, and the internet weren’t abandoned. That’s true. The internet did evolve, but for most people who lost everything in 2000, the recovery was personal, not financial. Many traumatized investors stayed away from tech stocks for years, missing out on massive gains. Each bubble destroys wealth, wipes out companies (think Lucent or Nortel), and leaves lasting scars—even on survivors.

My warning remains: don’t risk money you can’t afford to lose chasing dreams of quick riches or social mobility. Cryptocurrencies and tokens are simply asset classes with specific risk-return profiles. If, after thorough research, you believe they fit your portfolio, that’s valid. Differing risk tolerances and expectations are what make markets function. But judging from the feedback, most investors lack even basic understanding.

Originally, I intended to cover both technology and applications in this article. But as I wrote, the technical depth demanded more space—so here, we’ll focus solely on core blockchain mechanics and distributed consensus.

Understanding Blockchain in Simple Terms

At its core, a blockchain is a chain of blocks—literally. Each block contains data; in Bitcoin’s case, transaction records. These blocks are cryptographically linked using a hash function H, where the hash of block Bi, denoted H(Bi), is included in the next block Bi+1. Hash functions are one-way: easy to compute forward, nearly impossible to reverse. This creates tamper evidence: altering any block changes its hash, breaking the chain’s integrity downstream.

👉 Discover how blockchain security works in real-world applications today.

This structure resembles a linked list—but instead of memory addresses, blocks are referenced by hashes. The concept isn’t new; it dates back to 1979 as the Merkle Tree (or Merkle List). If you’ve used Git, you’ve interacted with a similar system—Git uses a Directed Acyclic Graph (DAG) based on the same cryptographic principles.

Modern blockchains are distributed: anyone can read or write, and new blocks are broadcast network-wide. But this raises two critical challenges:

  1. Consistency: With multiple actors adding blocks simultaneously, conflicting chains (forks) emerge.
  2. Security: Malicious actors could create long alternative chains to reverse transactions—enabling double-spending.

To resolve consistency, most systems adopt a simple rule: the longest chain wins. Nodes accept the chain with the most accumulated work as canonical. But this leads to the second problem—how to prevent attackers from spamming fake blocks?

The solution? Proof of Work (PoW).

Proof of Work and Mining

PoW introduces computational cost to block creation. Each block includes a nonce—a number miners adjust until the block’s hash meets a specific criterion (e.g., starting with multiple zeros). Due to the one-way nature of hashing, finding such a nonce requires brute-force computation.

This makes it economically unfeasible for attackers to outpace honest miners unless they control a majority of the network’s computing power. When a miner successfully adds a block, they’re rewarded—this process is known as mining.

But PoW comes at a steep cost. In 2017, Bitcoin mining consumed as much electricity as a mid-sized European country—more than 159 of 195 nations globally.

The Myth of Blockchain Security

Despite claims of being “secured by math,” blockchain security isn’t absolute. Bitcoin’s original paper simulated double-spending attacks under various assumptions but offered no formal proof. Worse, it ignored many real-world threats.

FLP Impossibility and Consensus Limits

In distributed systems theory, the FLP Impossibility Result proves that in an asynchronous network with even one faulty node, achieving consensus is impossible. This foundational result means true consensus can’t be guaranteed—only probabilistic agreement over time.

Bitcoin and Ethereum fall into the category of systems that allow temporary false consensus, eventually converging under favorable conditions. There’s no definitive moment when all nodes “know” consensus is reached—only increasing confidence over time.

Other systems, like Google’s Chubby or Apache ZooKeeper, avoid false consensus by halting progress during failures. These work well in controlled environments with few nodes but are impractical for open, global networks.

👉 See how modern platforms balance decentralization and performance.

Can Blockchain Handle Byzantine Failures?

Many claim blockchain tolerates Byzantine failures—malicious nodes with arbitrary behavior. But this is misleading. Blockchain assumes adversaries are computationally bounded, not omnipotent. Real-world threats like social engineering or key theft fall outside this model.

Even the much-cited “51% attack” threshold is oversimplified. In reality, an attacker with just 38% of network hash power could reverse transactions with high probability—requiring users to wait up to 80 confirmations (14 hours) for near-certainty. No one waits that long.

Centralization Trends in Decentralized Systems

Paradoxically, Bitcoin has become increasingly centralized:

Proof of Stake (PoS) was proposed to fix energy waste and centralization—but it exacerbates wealth concentration by rewarding existing holders.

Network Partitioning and Eclipse Attacks

Another overlooked risk is network partitioning—when connectivity splits the network (e.g., due to undersea cable cuts or firewalls). During such events:

Even worse are eclipse attacks, where malicious nodes isolate a target by controlling all its network connections. This allows transaction filtering or delay—similar to DNS or routing-level manipulation.

Is Decentralization Always Better?

Decentralization sounds ideal—no single point of failure, censorship resistance, and symmetry. But nature and society suggest otherwise.

Early nervous systems (like jellyfish) were decentralized. As organisms evolved complexity, centralized brains emerged to process information efficiently. Similarly, human societies developed centralized institutions—governments, corporations—to enable large-scale coordination.

Democracy itself is a mechanism for re-electing central authorities when they fail—not eliminating them.

Blockchain systems struggle with upgrades because protocol changes often result in hard forks, splitting communities and ecosystems. True coordination at scale remains elusive.

The Reality Check

While decentralization is valuable, it’s not free. Current blockchains sacrifice throughput (Bitcoin handles ~7 TPS), security (vulnerable to <51% attacks), and true decentralization (due to mining oligopolies).

Projects promising full decentralization and 100,000 TPS should be met with skepticism:

If something is too good to be true, it is too good to be true.

Most scalability solutions trade decentralization for speed (e.g., sidechains, layer-2 networks). And once decentralization is relaxed, simpler alternatives often outperform blockchain entirely.

FAQ

Q: Is blockchain truly secure?
A: Not in the absolute sense. Its security relies on economic incentives and computational difficulty—not mathematical certainty.

Q: Can a blockchain survive a network split?
A: Only if one side has significantly more hashing power. Otherwise, transactions on the shorter chain may be reversed.

Q: Why do people say blockchain is decentralized when mining is concentrated?
A: The design assumes decentralization, but market forces (economies of scale) have led to centralization—a gap between theory and reality.

Q: Does Proof of Stake solve PoW’s problems?
A: It reduces energy use but introduces new risks like wealth centralization and reduced validator diversity.

Q: Are there real-world examples of blockchain attacks?
A: Yes—GHash.io briefly exceeded 50% hash power in 2014, raising serious concerns about double-spending.

Q: Can blockchain replace traditional financial systems?
A: Not in its current form. Performance, security, and governance limitations make it unsuitable for mass adoption without significant trade-offs.

👉 Explore how next-gen platforms are redefining blockchain efficiency and trust.