Security of the network¶
Shared security, sometimes referred in documentation as pooled security, is one of the unique value propositions for chains considering to become a parachain and join the Polkadot network. On a high level, shared security means that all parachains which have connected to the Polkadot relay chain by leasing a parachain slot will benefit from the economic security provided by the relay chain validators.
The notion of shared security is different from interchain protocols that build on an architecture of bridges. For bridge protocols, each chain is considered sovereign and must maintain its own validator set and economic security. One concern in these protocols is on the point of scalability of security. For example, one suggestion to scale blockchains is that of scale by altcoins which suggests that transaction volumes will filter down to lower market cap altcoins as the bigger ones fill their blocks. A major flaw in this idea is that the lower market cap coins will have less economic security attached, and be easier to attack. We see a real life example of a 51% in the case of Ethereum Classic attack on January 10 in which an unknown attacker double spent 219,500 ETC (~1.1M USD).
Polkadot overcomes security scalability concerns since it gravitates all the economic incentives to the relay chain and allows the parachains to tap into the stronger guarantees at genesis. Sovereign chains must exhaust much more effort to grow the value of their coin so that it is not easily able to be attacked by well-funded attackers.
Let's compare the standard sovereign security model that exists on current proof-of-work (PoW) chains to that of the shared security of Polkadot. Chains that are secured by their own security model like Bitcoin, Zcash, Ethereum, and their derivatives all must bootstrap their own independent network of miners and maintain a competitive portion of honest hashing power. Since mining is becoming a larger industry which increasingly centralizes on key players, it is becoming more real that a single actor may control enough hash power to attack a chain. This means that smaller chains which cannot maintain a secure amount of hash power on their networks could potentially be attacked by a large mining cartel at the simple whim of redirecting its hash power away from Bitcoin and toward a new and less secure chain. 51% attacks are viable today with attacks having been reported on Ethereum Classic, Verge, Bitcoin Gold, and other cryptocurrencies.
On Polkadot, this disparity between chain security will not be present. When a parachain connects to Polkadot, the relay chain validator set become the securers of that parachain's state transitions. The parachain will only have the overhead of needing to run a few collator nodes to keep the validators informed with the latest state transitions and proofs/witness. Validators will then check these for the parachains for which they are assigned. In this way, new parachains instantly benefit from the overall security of Polkadot even if they have just been launched.
Is security correlated to the number of validators? What about to the number of parachains?¶
Security is independent of the number of parachains which are connected to the Polkadot relay chain. The correlation of security and the number of validators exists as the higher number of validators will give the network stronger decentralization properties and make it harder to try to take down. However, the biggest indicator of the security of the network is the economic signal of the number of DOTs which are bonded and staked. The greater number of DOTs which are staked by honest validators and nominators raises the minimum amount of DOTs an attacker would need to acquire a validator slot.
Will parachains ever need their own security? In what scenarios do parachains need their own security?¶
Most parachains will not need to worry about their own security, since it will be secured by the Polkadot relay chain validator set. However, in some cases (which are considered more experimental), parachains may require their own security. In general, these cases will revolve around lack of data available to relay chain validators. One example is if the STF is some succinct or zero-knowledge proof, the parachain would be responsible for keeping its data available as the relay chain won't have it. Additionally, chains with their own consensus, like the one which enables fast payments on Blink Network, there would probably need to be a Byzantine agreement between stakers before a parachain block is valid. The agreement would be needed because the data associated with the fast consensus would be unknown to relay chain validators.