1. Technologies Used

Proof of Work (PoW): This system relies on solving complex mathematical problems to secure the network, as seen with Bitcoin. It requires significant computational power.

Proof of Stake (PoS): This system secures the network based on the amount of cryptocurrency held by users, as in Ethereum 2.0. It consumes less energy compared to PoW.

Delegated Proof of Stake (DPoS): This model uses voting to select trusted entities to secure the network, enhancing speed and efficiency.

Proof of Authority (PoA): This relies on a set of trusted validators to secure the network, often used in private blockchains.