Zilliqa is using both. The PoW mechanisms is used to elect the PBFT validators. While cool it inherits the security vulnerabilities of both systems. One being we know who the PBFT leaders are and can DDoS them.
You could also rate limit inbound traffic by both IP & Protocol to help mitigate DDoS. Private network would need to be out of band maybe over 4G backup. Well funded adversaries, with access to zero days, targeting validators would still be problematic.
-
-
If you have any great links arguing for PBFT over Nakamoto consensus, based on overall security of the system, please send them my way. Thank you.
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.