Pitfalls of proof of stake consensus part 2
All types of computer systems are vulnerable in one way or another. For example, the proof of stake algorithm was introduced to solve a specific challenge in the proof of work algorithm. But there are specific attacks unique to PoS. These are long-range attack and stake grinding attack.