Whether you own cryptocurrency or not, the Ethereum Merge is a big deal. In the works since 2014, the long-delayed Merge will see ethereum, the second-biggest blockchain behind bitcoin, become nearly carbon neutral.
That is of huge consequence. Cryptocurrency critics argue that coins like bitcoin and ether are useless and use enormous amounts of electricity. The first point is polarizing and subjective, butthe second is unequivocally true. In an era when more people than ever view climate change mitigation as society's No. 1 priority, the carbon emissions of bitcoin and ethereum are too conspicuous to ignore.
In the Merge, ethereum will adopt a system known as proof of stake, which has been planned since before the blockchain's creation in 2014. Because of its technical complexity, and the increasingly large amount of money at risk, it has been delayed multiple times. The Merge is part of what in the past was called "ether 2.0," a series of upgrades that reshape the blockchain's foundations. Mid-September is the goal deadline.
"We've been working on proof of stake for about seven years now," Ethereum co-creator Vitalik Buterin said at the Eth Shanghai conference in March, "but finally all of that work is coming together."
Here's everything you need to know to make sense of the big day.
To understand the Merge, you first need to understand the role of cryptocurrency miners.
Say you wanted to mine cryptocurrency. You'd set up a powerful computer -- a mining rig -- to run software that attempts to solve complex cryptographic puzzles. Your rig competes with hundreds of thousands of miners around the world trying to solve the same puzzle. If your computer unscrambles the cryptography first, you win the right to "validate" a block that is, add new data to the blockchain. Doing so gives you a reward: Bitcoin miners get 6.25 bitcoin ($129,000) for every block they verify, while ethereum miners get 2 ether ($2,400) plus gas, which are the fees users pay on each transaction (which can be huge).
It takes a powerful computer to have a chance in this race, and people typically set up warehouses full of rigs for this purpose. This system is called "proof of work," and it's how both bitcoin and ethereum blockchains run. The point is that it allows the blockchain to be decentralized and secure at the same time.
"It's what's called the civil resistance mechanism," said Jon Charbonneau, an analyst at Delphi Digital. Every blockchain needs to run on a scarce resource, Charbonneau explained, one that bad actors can't monopolize. For proof-of-work blockchains, that resource is power in the form of the electricity required to run a mining operation.
To overtake ethereum right now, a bad actor would need to control 51% of the network's power. The network is made up of hundreds of thousands of computers around the world, meaning bad guys would need to control 51% of the power in this vast mining pool. Doing so would cost billions of dollars.
The system is secure. Though scams and hacks are common in crypto, neither the bitcoin nor ethereum blockchains themselves have been compromised in the past. The downside, however, is obvious. As cryptographic puzzles become more complicated and more miners compete to solve them, energy expenditure soars.
Lots and lots. Bitcoin is estimated to consume about 150 terawatt hours a year, which is more electricity than 45 million people in Argentina use. Ethereum is closer to Switzerland's 9 million citizens, eating up about 62 million terawatt hours.
Much of that energy comes from renewable sources. About 57% of the energy used to mine bitcoin comes from renewable sources, according to the Bitcoin Mining Council. (BMC relies on self reporting among its members.) This is motivated not by climate conscientiousness but self interest: Renewable energy is cheap, so mining operations are often set up near wind, solar or hydro farms.
Still, the carbon footprint is extensive. Ethereum is estimated to emit carbon dioxide at a similar scale to Denmark.
The Merge will see ethereum completely shed proof of work, the energy-intensive system it currently uses, in favor of proof of stake.
In crypto land, "staking" refers to depositing cryptocurrency to yield interest. For instance, the creators of the terraUSD stablecoin offered customers 19% interest on staked TerraUSD: You could put in $10,000 and take out $11,900 after a year (until it imploded).
When proof of stake comes into effect, miners will no longer have to solve cryptographic puzzles to verify new blocks. Instead, they'll deposit ether tokens into a pool. Imagine each of these tokens is a lottery ticket: If your token number is called, you win the right to verify the next block and earn the rewards that entails.
It's still an expensive enterprise. Prospective block verifiers who will be known as "validators" instead of miners need to stake a minimum of 32 ether ($38,500) to be eligible. This system sees punters put up raw capital, rather than power, to validate blocks. Whereas a bad actor needs 51% of a network's power to overrun a proof-of-work system, they'd need 51% of the total staked ether to overrun the proof-of-stake system.
Since cryptographic puzzles will no longer be part of the system, electricity expenditure will go down an estimated 99.65%, according to the Ethereum Foundation.
The way in which ethereum will transition from proof of work to proof of stake will be achieved through a merging of two blockchains.
The ethereum blockchain that people use is known as "mainnet," as distinguished from various "testnet" blockchains that are used only by developers. In December 2020, Ethereum developers created a new network called the beacon chain. The beacon chain is essentially the new ethereum.
The beacon chain is a proof-of-stake chain that has been chugging along in isolation since its creation 18 months ago. Validators have been adding blocks to the chain, but these blocks have contained no data or transactions. In essence, it's been put under various stress tests ahead of the big day.
The Merge will see the data held on Ethereum's mainnet transferred to the beacon chain, which will then become the prime blockchain on ethereum's network. In the run-up to the Merge, ethereum developers have been stress testing the new blockchain by running data and transactions through it on various ethereum testnets.
"If you talk to the ethereum developers, and I have, they would tell you that if proof-of-work mining got banned overnight, they could do the Merge right now and it'd be fine," Charbonneau said. Much of the ironing out developers are currently focused on pertains to applications and clients built on top of ethereum, he added, not the proof-of-stake execution itself. "If they did the Merge today, it would be buggy for a few months ... but the protocol itself, there's no worries [among the developers]."
Absolutely. Critics of ethereum typically bitcoin enthusiasts compare the merge to changing the engine of an airplane in the middle of a passenger flight. At stake is not just the airplane, but the $140 billion worth of ether in circulation.
On a technical level, there could be many unforeseen bugs with the new blockchain. Solana, another proof-of-stake blockchain, has suffered several complete outages this year. Solana and ethereum differ in that solana's fees are minuscule, which means it's easier for bots to overwhelm the blockchain, but technical difficulties aren't out of the question.
Critics also wonder whether proof of stake will be as secure as proof of work. Charbonneau reckons it could be safer because of a function called "slashing" in essence, validators can have their staked ether burned, and their network access revoked, if they're found to have acted maliciously.
"Say someone 51% attacks bitcoin today, you can't really do anything," Charbonneau said. "They have all the miners and they could just keep attacking you. With proof of stake, it's really simple. If you attack the network, it's provable and we just slash you, and then your money's gone."
"You get one bullet, and then that's it. Then you can't do it again."
Ether is down nearly 70% since the beginning of the year, and many are hoping that the Merge will revive the cryptocurrency's price. This has been a hotly debated topic within crypto circles in recent months. The answer is that no one knows.
Many argue that the Merge is already priced in; it's been in the works for seven years and many big-time investors, the argument goes, have put money on ethereum with the expectation that the Merge would be successful. More important than how the Merge impacts ether's price in the short term is how it shapes the cryptocurrency's long-term prospects.
Charbonneau said that reducing ethereum's carbon footprint out of environmental concerns is "definitely a meaningful part" of ethereum developers' motivations for the Merge. But beyond that, he notes, it's also about making ethereum adoption easier for big companies to justify.
"The reality is, if you take the environmental caring part away, there are a lot of people who are not going to use it [ethereum] and not want to invest in it just based on ESG reasons," Charbonneau said, referring to environmental, social and corporate governance standards for ethical investing. "There are a lot of tech companies that have openly said, 'we are not going to do anything until after the Merge.'"
The Merge is expected to happen in September. In a recent conference call among ethereum developers, the Ethereum Foundation's Tim Beiko put Sept. 19 as a tentative date.
"This merge timeline isn't final, but it's extremely exciting to see it coming together," another developer tweeted. "Please regard this as a planning timeline."
Continued here:
Ethereum Merge: How Crypto's Carbon Footprint Is About to Shrink - CNET
- To Foil NSA Spies, Encrypt Everything [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- What is cryptography? - A Word Definition From the ... [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- cryptography: Definition from Answers.com [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Cryptography - Wikipedia, the free encyclopedia [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Cryptography - CISSP Domain 07 - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Cryptography Advanced Encryption Standard AES Tutorial,fips 197 - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Faraday Project for Network Security and Cryptography - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- An Overview of Cryptography - Gary C. Kessler [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- An Open Letter from US Researchers in Cryptography and ... [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Gambling with Secrets Part 4 8 Private Key Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Gambling with Secrets Part 1 8 What is Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Public Key Cryptography RSA Encryption Algorithm - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Public Key Cryptography Diffie Hellman Key Exchange - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Intro to Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Caesar Cipher Ancient Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- 50 top US cyber security experts write open letter calling for end to NSA 'snoop-ops' [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- Prominent cryptography and security researchers deplore NSA's surveillance activities [Last Updated On: January 27th, 2014] [Originally Added On: January 27th, 2014]
- Obama Stays Silent on Reform of NSA's Crypto Subversion [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Cryptography experts sign open letter against NSA surveillance [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- US crypto researchers to NSA: If you must track, track responsibly [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Java Cryptography Architecture (JCA) Overview - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Cryptography - Part 1 - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Cryptography - Part 2 - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- International Journal on Cryptography and Information Security ( IJCIS) - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Bitcoin Lowdown: Block Chain Cryptography Trumps Human Trust, Deal With It - Video [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- Bitcoin Lowdown: Block Chain Cryptography Trumps Human Trust - Video [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- NSA and GCHQ spoofed LinkedIn to hack Belgian cryptography professor [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Lecture 17: Elliptic Curve Cryptography (ECC) - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Cryptography event - Pravega 2014 - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- Lecture 1: Introduction to Cryptography - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- US and UK spy agencies accused of swoop on Belgian cryptography expert [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Conceal: Facebook's new Java APIs for cryptography on Android [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Cryptography Apps: How To Keep Your Personal Info Private [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Cryptography Breakthrough Could Make Software Unhackable [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Oi, Android devs! Facebook wants your apps to be more secure [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Lecture 19: Elgamal Digital Signature - Video [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Lecture 18: Digital Signatures and Security Services - Video [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Cryptography 1. List some of the attacks on the Diffie ... [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Cryptography Breakthrough Could Make Software Unhackable ... [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Cryptography: Secret Coding, Spying, and E-Commerce - Video [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Cryptography - Video [Last Updated On: February 9th, 2014] [Originally Added On: February 9th, 2014]
- Public Key Cryptography: RSA Encryption Algorithm - Video [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- Is Bitcoin Anonymous? Arvind Narayanan | Princeton University | Real World Cryptography Workshop - Video [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- A Competitive Study of Cryptography Techniques over Block Cipher - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- How Quantum Computing Will Change Cryptography [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- REALITY LOST - EXCERPT SIX (QUANTUM CRYPTOGRAPHY) - Video [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- Introduction to Cryptography of Bitcoin, Explained! - Video [Last Updated On: February 18th, 2014] [Originally Added On: February 18th, 2014]
- [FOSDEM 2014] USE OTR or how we learned to start worrying and love cryptography - Video [Last Updated On: February 18th, 2014] [Originally Added On: February 18th, 2014]
- Reshif's Cryptography Challenge Solution/Walkthrough - Video [Last Updated On: February 20th, 2014] [Originally Added On: February 20th, 2014]
- [DEFCON 19] Steganography and Cryptography 101 - Video [Last Updated On: February 22nd, 2014] [Originally Added On: February 22nd, 2014]
- A Brief Rundown Of The Spying Questions Intel's CEO Won't Answer [Last Updated On: February 25th, 2014] [Originally Added On: February 25th, 2014]
- DEF CON 8 - Jon Erickson - Number Theory Complexity, Theory, Cryptography, and Quantum Computing. - Video [Last Updated On: February 26th, 2014] [Originally Added On: February 26th, 2014]
- Was YOUR iPhone at risk of being hacked? Bug in Apple update left mobiles open to identity theft for up to 18 months ... [Last Updated On: February 27th, 2014] [Originally Added On: February 27th, 2014]
- Security researchers urge tech companies to explain their cryptographic choices [Last Updated On: February 27th, 2014] [Originally Added On: February 27th, 2014]
- Apple reveals algorithm behind 'encrypted' iMessages [Last Updated On: February 28th, 2014] [Originally Added On: February 28th, 2014]
- Wiliest Ways to Keep the NSA at Bay [Last Updated On: March 1st, 2014] [Originally Added On: March 1st, 2014]
- How to Pronounce Cryptography - Video [Last Updated On: March 1st, 2014] [Originally Added On: March 1st, 2014]
- cryptography in DNS - Video [Last Updated On: March 3rd, 2014] [Originally Added On: March 3rd, 2014]
- Who is the reclusive billionaire creator of Bitcoin? [Last Updated On: March 4th, 2014] [Originally Added On: March 4th, 2014]
- How to say cryptography in Italian - Video [Last Updated On: March 4th, 2014] [Originally Added On: March 4th, 2014]
- Massive Linux security flaw dwarfs Appleās cryptography problems of just last week [Last Updated On: March 5th, 2014] [Originally Added On: March 5th, 2014]
- Security lessons from RSA [Last Updated On: March 5th, 2014] [Originally Added On: March 5th, 2014]
- Visual Cryptography - Video [Last Updated On: March 5th, 2014] [Originally Added On: March 5th, 2014]
- Classical Computing Embraces Quantum Ideas [Last Updated On: March 6th, 2014] [Originally Added On: March 6th, 2014]
- Quantum Cryptography Conquers Noise Problem [Last Updated On: March 6th, 2014] [Originally Added On: March 6th, 2014]
- REALITY LOST Bonus scene 4. Quantum cryptography Founding Fathers. - Video [Last Updated On: March 7th, 2014] [Originally Added On: March 7th, 2014]
- Quantum Cryptography: From Theory to Practice - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- Forcing Trust: Nonlocal Games and Untrusted-device Cryptography - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- TrustyCon 2014 - New Frontiers in Cryptography - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- REALITY LOST Bonus scene 3. Christian Kurtsiefer on hacking quantum cryptography. - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- Nerlens Noel Tweets Date for Potential NBA Debut [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- CISSP SG Cryptography - Video [Last Updated On: March 10th, 2014] [Originally Added On: March 10th, 2014]
- More secure communications thanks to quantum physics [Last Updated On: March 13th, 2014] [Originally Added On: March 13th, 2014]
- New Cryptography Scheme Secured By Quantum Physics [Last Updated On: March 13th, 2014] [Originally Added On: March 13th, 2014]
- History Of Cryptography - Video [Last Updated On: March 14th, 2014] [Originally Added On: March 14th, 2014]
- avc 19 Cryptography x264 - Video [Last Updated On: March 15th, 2014] [Originally Added On: March 15th, 2014]
- Edward Snowden Speaks at SXSW [Last Updated On: April 10th, 2017] [Originally Added On: March 15th, 2014]
- Tor is building an anonymous instant messenger [Last Updated On: April 10th, 2017] [Originally Added On: March 15th, 2014]
- learn cryptography learn the following pkcs refrences - Video [Last Updated On: March 16th, 2014] [Originally Added On: March 16th, 2014]
- [Lec-2][Part-2] Shift Cipher - Symmetric ciphers - Video [Last Updated On: March 16th, 2014] [Originally Added On: March 16th, 2014]