#Merc What exactly is computing power? Computing power (also known as hash rate) is a unit of measurement for the Bitcoin network's processing capability. It refers to the speed at which a computer (CPU) computes the output of a hash function. The Bitcoin network must perform intensive mathematical and cryptographic operations for security purposes. For example, when the network reaches a hash rate of 10Th/s, it means it can perform 10 trillion calculations per second.
In the process of obtaining Bitcoin through "mining," we need to find its corresponding solution m, and for any sixty-four-bit hash value, there is no fixed algorithm to find its solution m, which can only rely on the computer's random hash collisions. The number of hash collisions a mining machine can perform per second represents its "computing power," expressed in hash/s. This is known as the Proof of Work (PoW) mechanism.
Security threats are the most significant issue that blockchain has faced so far. Among them, blockchains based on the PoW consensus process primarily face the 51% attack problem, where nodes that control more than 51% of the network's computing power have the ability to successfully tamper with and forge blockchain data. Taking Bitcoin as an example, statistics show that the computing power of large mining pools in China accounts for more than 60% of the total network computing power. Theoretically, these mining pools can collaborate to implement a 51% attack, thereby achieving double spending of Bitcoin.
Although the actual cost required to control 51% of the network's computing power far exceeds the benefits of successfully carrying out an attack, the security threat of a 51% attack always exists. The PoS consensus process partially addresses the 51% attack issue, but it also introduces the N@S (Nothing at stake) attack problem during block forks.
Researchers have proposed partially solving the 51% attack problem by constructing PoW consensus algorithms that simultaneously rely on high computing power and high memory, but more secure and effective consensus mechanisms await further in-depth research and design.