Updated: Jul 13
On December 1, 2020, the Ethereum foundation opened its network's ability to move from mining to staking. Eth2 is one solution to the issue of scaling while at the same time becoming more decentralized. Understanding the limitations of BTC's blockchain, Eth2 seeks to secure the network and limit the need to specialty hardware such as ASICs and GPUs. Early on in the development of ETH, ASIC resistance was built into the coding to lower the mining barrier.
It's important to understand that ETH (eth1) and Eth2 are not two separate entities. On the contrary, they are layers of the same thing! Let's consider ETH as a brick-and-mortar business; eth1 is the customer service or the user interface. Eth2 are the persons coordinating in the back. Both eth1 and eth2 are expected to run concurrently until eth1 eventually docks into the software of eth2 in the year 2022. All decentralized applications will continue working as the gears of the mechanism are changed.
ETH secures hundreds of billions of value in the form of currency and user activity. While being a decentralized organization, ETH has the element of conservatism and shrewdness needed for business operations.
Yes, we are still talking about cryptocurrency.
This was the vision of trust being encoded and institutions becoming for the public good rather than the restricted domain of private interests.
When trust is given to crypto projects, it can be broken easily, as seen with many exit scams. Therefore to avoid a split in the network community, consensus is being sought on eth2 in real-time. If you have technical know-how in coding, game theory, and other related topics, any input you provide will be used in improving the overall ETH network.
Because of the open nature of the network, global demand will always outstrip supply. The move to staking is aimed at helping keep up the supply. But we're seeing worldwide adoption before the one breakthrough user product in addition to the intrinsic store of value.
Moving into the support network, staking changes the discussion as both the hardware supplier and the energy sectors are impacted. Unlike BTC, ETH has now become more efficient as a protocol. The price discovery can no longer be considered in terms of hashes. More importantly, network security is no longer measured by voluntary machine work. Instead, pools with the most ETH available balances become the transaction gatekeepers.
The beacon node
Just as the internet relies on three layers to give us connectivity, eth2 has a primary backbone on which the second layer is built. The beacon node has the following responsibilities to the chain:
⦁ It connects with the genesis block; then it runs and maintains the random beacon chain.
⦁ Peer-to-peer nodes are then synced with this beacon chain.
⦁ Validation of the latest version of the chain via block attestations.
⦁ There is a difference between the beacon node and the validator client. The beacon chain helps to enforce slashing rules for validator clients.
The equivalent of the miner found in eth1 is the validator clients for eth2. The move to staking separated roles means that the validators feed into a static beacon node. The role of the validators are:
⦁ Proposing new blocks on assigned shards.
⦁ Attesting to other blocks validated by other validator clients.
⦁ Attestations can be either singular or aggregated. Validator clients aggregate attestations and broadcast this information to the beacon chains.