logo
đź”–

Why sharding is great: demystifying the technical properties

Created time
Aug 7, 2022 12:06 AM
Author
vitalik.ca
URL
Status
Genre
Book Name
Why sharding is great: demystifying the technical properties
Modified
Last updated December 26, 2023
Summary
Why Sharding is Great: Demystifying the Technical Properties from Vitalik provides insights into sharding – a decentralised management system utilizing distributed ledger technologies – and explains how it can be applied in the world of blockchain-based systems. Key Learnings: - Why sharding is an important tool for scaling blockchain-based systems - How it addresses issues of speed, scalability, and cost efficiency - Overview of the different approaches in use today - Understand why sharding is more secure than non-sharded systems As a UX designer, this book offers value in understanding the mechanism behind how blockchain-based systems work, making it a useful tool for having a better understanding of the inner workings of such systems and the unique issues they bring. Other books that could be interesting in the same topic could be Blockchain Basics by Andreas M. Antonopoulos, Ethereum & Solidity: Essential Components by Michael Bennett or Blockchains for Dummies by Tiana Laurence.

🎀 Highlights

transactions, but they cannot insert invalid transactions. And even if they do revert or censor transactions, users running regular nodes could easily detect that behavior, so if the community wishes to coordinate to resolve the attack with a fork that takes away the attacker’s power they could do so quickly. The lack of this extra security is a key weakness of the more centralized high-​TPS chains. Such chains do not, and cannot, have a culture of regular users running nodes, and so the major nodes and ecosystem players can much more easily get together and impose
transactions, but they cannot insert invalid transactions. And even if they do revert or censor transactions, users running regular nodes could easily detect that behavior, so if the community wishes to coordinate to resolve the attack with a fork that takes away the attacker’s power they could do so quickly. The lack of this extra security is a key weakness of the more centralized high-​TPS chains. Such chains do not, and cannot, have a culture of regular users running nodes, and so the major nodes and ecosystem players can much more easily get together and impose
transactions, but they cannot insert invalid transactions. And even if they do revert or censor transactions, users running regular nodes could easily detect that behavior, so if the community wishes to coordinate to resolve the attack with a fork that takes away the attacker’s power they could do so quickly. The lack of this extra security is a key weakness of the more centralized high-​TPS chains. Such chains do not, and cannot, have a culture of regular users running nodes, and so the major nodes and ecosystem players can much more easily get together and impose