Proof of History (PoH) – A Guide for Beginners

When the world first learned about cryptocurrencies, we discovered the Proof-of-Work (PoW) protocol. Over time, superior technologies have introduced greater efficiency in this area.

An example of such growth comes from the increased use of the Proof-of-Stake (PoS) protocol. The evolution of this system leads to the birth of more eco-friendly cryptocurrencies with faster transactions.

Those who have dared to explore ways other than PoW have launched a new trend in the sector. Today many blockchains are trying to put their innovative protocol on the market.

Our article will talk about one of the most recent innovations in the sector: the Proof-of-History (PoH) protocol.

Solana’s secret sauce

Readers who have already heard of Proof-of-History (PoH) will undoubtedly be familiar with Solana. Solana is a blockchain created to allow speedy transactions and the development of decentralized apps (Dapps).

This brief description is enough to clarify why Solana is, according to experts, among the “Ethereum killers”. We are talking about a system with low transaction costs and the ability to handle thousands of transactions per second.

Solana has a technical infrastructure that any cryptocurrency expert could describe for hours. Yet, among its peculiarities, the market observes with great attention the invention of the PoH protocol.

Solana’s whitepaper talks about the PoH protocol already in its abstract. Also, from this aspect, it is clear how its creators consider PoH as the authentic “secret sauce” of the project.

The problem that Proof of History attempts to solve

The reason why our smartphones and laptops consistently report the same time certainly does not derive from paranormal phenomena. Our devices connect to a centralized system with a specific frequency that indicates the exact time.

This mechanism applies to any time zone and removes the problem of clock synchronization. So, with a bit of stretch of the imagination, let’s now think about this first blockchain problem.

The question to ask is: how can a decentralized system refer to a centralized one? Unfortunately, different blockchains have given other answers year after year.

Let’s take Ethereum, for example. Vitalik Buterin’s blockchain uses an off-chain program to compute a median timestamp. We can find this value within each block in the chain.

Simplifying the discussion a little, we can consider this step as one of the many reasons behind Ethereum’s slowness. Each trade goes through a program outside of Ethereum that retrieves different timestamps.

Proof of History – A simple approach to a technical headache

Solana’s founders must have thought Ethereum’s timestamp mechanism was a significant waste of time. The system’s innovation keeps each transaction step on the chain.

This trick allows Solana to use significantly smaller time units than Ethereum’s. Each operation corresponds to a timestamp, as in Ethereum, with an extra secret.

Each block in the network indicates the block’s timestamp that precedes it. All this information is encrypted using the popular SHA256 algorithm.

The term “SHA” derives from “Secure Hash Algorithm”, and is one of the main strengths of the blockchain universe. A group of researchers working for the National Security Agency (NSA) conceived this system in 2001.

To give you an idea of what this system does, you can use one of the many online simulators. These sites allow you to write text or upload files, receiving a fixed-length code as output.

Each piece of information has its SHA256 code, and it is unlikely (although possible) to have the same result on different inputs. For example, the timestamp information calculated by Solana goes through this conversion process.

The consequence of encrypting time

The peculiarity of the SHA256 System is that knowing an output, it is not possible to reconstruct the input. In other words, no one can remove the encrypted layer of data transformed with this mechanism.

This is an important aspect, as no hacker can know the exact timestamp of a block on Solana. Simplifying the matter, knowing the timestamp can allow a hacker to alter the blockchain, creating massive damage to the system.

The ” avalanche effect ” is an even more important thing to know about SHA256 is the “avalanche effect”. Those unfamiliar with the system might think that the times “00:00:01” and “00:00:02” have similar hashes.

Once again, we encourage you to generate the hash codes for these two times. The difference of just one second leads to entirely different hash codes. Likewise, a slight change to the input data brings an “avalanche effect” to the output.

This feature makes SHA256 even more secure, generating an additional level of protection against hackers.

Final thoughts

New technologies are leading blockchains to become progressively faster and more secure. The system developed by Solana is undoubtedly fascinating, but we must consider that the sector is still very young.

Solana live price
price change

For this reason, it is possible that as early as 2022, we will see new protocols challenging the innovations of the PoH system. Since the PoH protocol is one of the most futuristic systems on the market, it is crucial to understand how it works.

Stay up to date with our latest articles

More posts

What Is the Blockchain Scalability Trilemma?

In the context of decentralization, security, and scalability, the Blockchain Trilemma refers to the generally held notion that decentralized networks can only deliver two of the three benefits at any given moment. In this article, we more closely into the matter, assessing all the most relevant aspects of the blockchain scalability trilemma. The Trilemma Vitalik Buterin invented the term "blockchain trilemma," which refers to a conundrum that blockchain engineers face while balancing three competing demands at once: decentralization, security, and…

Do Smart Contracts Represent Legal Contracts?

When industry players use the term "smart contracts," they may mean different things. Words matter, as any contract lawyer will be able to explain. Is the word “contract” a technical overstatement, or does it trigger actual legal bindings? The industry needs to agree on the consistency of its terminology. What exactly is a smart contract? Does it have any legal implications? When attorneys and technologists use this terminology, do they understand each other? Our article will provide a short analysis,…

How Do Crypto Anti-Dumping Policies Work?

Scammers utilize social media platforms to impersonate celebrities or acquaintances to persuade victims to make fake investments. The rise of cryptocurrencies and the lack of regulations gave new tools to these criminals. We'll look at how the market is attempting to safeguard investors today. Crypto commentators frequently emphasize anti-dumping regulations as a deterrent to online fraudsters. What Are Pump and Dump Operations? Before dwelling on the concept of anti-dumping policies, we need to understand what is a “pump and dump”…

Understanding Layer 3 Blockchains

Scalability has become an even more pressing issue as the crypto sector experiences increased customer demand. Many of us have come across terms like “layer one” and “layer two” protocols in the blockchain world. Blockchains must be very secure due to the lack of a centralized authority. They must also be incredibly scalable to cope with growing users and transactions. Today we will learn more about layer three solutions, a technology aiming to provide scalability while maintaining top-notch security. A…

Venezuela – How Does the Petro Crypto Work?

Venezuelan President Nicolas Maduro suggested the creation of a national cryptocurrency in 2017. Officials claim that the country's oil, gas, and mineral riches back its value. However, as of today, Petro seems to fail fulfilling its purpose of rescuing the national economy. Some foreign observers believe the Petro digital currency is a trick to circumvent international restrictions. These sanctions prevent Venezuela from borrowing cash on global markets. This article will provide an analysis of the creation of this national cryptocurrency.…

Understanding Advanced Smart Contracts

The clever use of smart contracts has contributed significantly to the exploding popularity of blockchain technology. Initially proposed by computer scientist Nick Szabo, a smart contract is a collection of instructions executing automatically. This technology aims to make the contract execution as automated as possible. Many know how basic smart contracts work, but it is rare to find a guide on their advanced versions. After a basic overview, we will analyze two typical cases of advanced smart contracts. The article…

Layer 2 Blockchain Projects – A Guide for Beginners

One of the critical difficulties confronting the blockchain community is the matter of scalability. While the technology has proven its high potential over the years, several aspects limit its applicability to a large scale. The scalability problem has been on our minds since humankind came up with the first technological inventions. We'll expand on that in this post, looking at the particular case of Layer 2 blockchains. Layer 2 (L2) blockchain definition The "Layer 2 blockchain technology" concept is gaining…

A Beginners’ Guide to Permissioned Blockchains

It has been a few years since the topic of blockchain technology invaded the market for the first time. Today, people are gradually learning to see a blockchain and a cryptocurrency as two distinct concepts. The technological and financial culture is growing, and, as a result, the industry is attracting more developers and users. Among the many consequences of this trend, we find the appearance of new tools. Today we will talk about one of the many new applications of…

Hyperledger Fabric – What Is It and How Does It Work?

The cryptocurrency world continues to see new developer ideas enter the market. Today, we will simplify a technical aspect: the Hyperledger Fabric technology. Any reader interested in learning about the most complex aspects of the topic can refer to the official documentation. This article will analyze the main elements of this system, also highlighting important criticisms in the sector. Understanding Hyperledger Fabric Let's start, first of all, by understanding the origin of the instrument name: Hyperledger is an open-source distributed…

How does a Replay Cyber Attack Work?

The replay technique is among the many attacks that have made hackers rich over the years. The phenomenon was born before the invention of cryptocurrencies and has grown in recent years. This article will deal with various aspects related to the topic. First of all, it will be helpful to understand how a typical replay cyber attack works. Secondly, we will focus on how a criminal can use this technique in the crypto world. There are several user protection techniques,…