📖
JECO Staking Docs
  • Welcome!
  • 🖥️Staking
    • What is Proof-of-Work and Proof-of-Stake and why are they important?
    • What is Delegated Proof-of-Stake
    • Proof-of-stake and coin staking: advantages and disadvantages
    • Why do blockchains need staking?
    • How does staking affect decentralization?
  • 🔐Security
    • How is staking within my wallet safe and secure?
    • Who has access to my funds when I stake them?
    • What security measures are in place in the staking process
  • ❔FAQ
    • What tokens can I stake with JECO Staking?
    • Why should I stake my tokens with JECO Staking?
    • Do I need to transfer the tokens?
    • How can staking be profitable?
    • What risks are there when staking?
    • What are the fees?
  • Persistence (XPRT)
    • What is Persistence delegation?
    • What are Persistence validators?
    • How profitable is delegating on Persistence?
    • How to find a good Persistence validator?
    • Why delegate Persistence to JECO Staking?
    • Persistences' (XPRT) Warm-up & Rewards Distribution Frequency
    • How to stake and delegate Persistence with JECO Staking?
    • Persistence un-delegation period
  • Glossary
Powered by GitBook
On this page
  1. Staking

Proof-of-stake and coin staking: advantages and disadvantages

More and more blockchains prefer to adopt the PoS mechanism and this is because of its many advantages. The most important are as following:

  • You can multiply your holding simply from hodling (passive income)

  • It is more sustainable that PoW

  • The risk of a 51% attack is minimized, as it is highly expensive and non-profitable

  • It's simple and easy to understand, you just need to accumulate an amount of tokens and then delegate them to a validator

  • This mechanism is highly preferred by many investors during a bear market

Like all mechanisms, PoS presents some disadvantages as well:

  • Once delegated your coins are frozen, as many protocols have a lock up period, and can not be sold

  • Validators can be slashed (penalized) for conducting malicious acts that harm the network and their funds are taken away. Hence, it is vital for you to conduct the necessary research and choose a creditable validator.

PreviousWhat is Delegated Proof-of-StakeNextWhy do blockchains need staking?

Last updated 3 years ago

🖥️