By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Educational Byte: Byzantine Generals Problem in Crypto —or There’s a Traitor Among Us | HackerNoon
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Educational Byte: Byzantine Generals Problem in Crypto —or There’s a Traitor Among Us | HackerNoon
Computing

Educational Byte: Byzantine Generals Problem in Crypto —or There’s a Traitor Among Us | HackerNoon

News Room
Last updated: 2025/05/13 at 9:55 PM
News Room Published 13 May 2025
Share
SHARE

Have you ever played Among Us? Or at least heard of it? It’s this game in which several astronauts are in the same spaceship, but a traitor is sabotaging and killing them, and they need to discover who it is and eject them from the ship. The Byzantine Generals Problem is something similar in distributed systems.

Imagine you’re playing Among Us with a bunch of friends. You’re all crewmates (and maybe some impostors) on a spaceship, and you need to decide together whether to press the emergency button to eject a suspicious player. You can only send messages to each other — no voice chat, just in-game chat. If too many players lie or get confused, the whole group might never agree on what to do — or worse, eject the wrong person.

This is basically the Byzantine Generals Problem: imagine a bunch of generals (or players) trying to agree on a battle plan (or eject vote), but some of them might be traitors (impostors) sending false messages. The good generals want to coordinate and win the battle, but they don’t know who they can trust, and they can’t all talk directly to each other. If they don’t come to the same decision, they might lose the war — or, in Among Us, lose the game.

In the world of distributed systems, the same problem happens when computers (nodes) try to agree on the same list of transactions. If some computers lie or malfunction (just like impostors), we need a system that helps all the honest nodes agree, even if a few are acting suspiciously. This is also known as Byzantine Fault, and thus, distributed systems like crypto networks must have Byzantine Fault Tolerance (BFT) to properly work.

BFT in Crypto Networks

BFT is a key concept that helps crypto networks stay reliable, even when some computers in the network act dishonestly or fail. There’s no single authority making decisions in decentralized systems, so the network has to find ways to agree on the correct version of the transaction history — even if a few participants lie, cheat, or crash. BFT is the ability of a system to still reach that shared agreement despite those issues, ensuring that everyone ends up trusting the same result.

Without BFT, bad things can happen. One of the most famous problems is called double-spending — when someone tries to use the same digital coin more than once. For example, imagine sending the same token to two different people at the same time. If the network can’t agree on which payment came first, the system becomes broken. This isn’t just a small glitch — it’s a fundamental weakness that would make digital currencies easy to exploit.

In fact, the double-spending problem is a major reason why decentralized money didn’t take off earlier. Satoshi Nakamoto directly called it out in the original Bitcoin whitepaper, highlighting it as a challenge that Bitcoin’s consensus system was designed to overcome without needing a central authority.

Consensus Mechanisms

In crypto networks, consensus mechanisms are the tools that allow a group of nodes to agree on what really happened — like who sent money to whom and when — even when some nodes might fail, act slowly, or try to cheat. These mechanisms are the heart of blockchain and DAG systems because they make sure everyone sees the same version of the ledger. They also play a crucial role in helping networks stay resilient against dishonest behavior — which is where Byzantine Fault Tolerance (BFT) comes in. A good consensus system lets honest nodes agree, no matter what a few bad actors try to do.

For example, Bitcoin uses Proof of Work (PoW). This method asks computers to solve complex puzzles to add new blocks to the chain, and powerful computers compete to be the first to solve it. The more blocks are added on top of a transaction, the less likely it is that someone could rewrite history — because of the large resources required to re-solve the puzzles — but there’s never 100% certainty. This is called probabilistic finality, which can feel a bit uncomfortable for people who expect quick and definite confirmation, especially for large payments.

In contrast, Obyte, which is built on a DAG (Directed Acyclic Graph), uses a different method. Every user approves their own transactions just by sending them, and the ordering to avoid potential double-spending relies on transactions posted by Order Providers. They’re trusted and public nodes whose transactions act as anchors that bring order to the tangle of other transactions.

Their actions lead to deterministic finality —once a transaction is stable in the DAG, it’s final and can’t be undone. There are no miners or “validators” controlling access or coming to an agreement amongst themselves. This approach, which dispenses with all kinds of voting or power competition, lends much better decentralization and censorship resistance. Thanks to this design, Obyte achieves consensus without needing energy-hungry mining or central intermediaries.


Featured Vector Image by Freepik

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Microsoft laying off 6,000 employees
Next Article Android 16 Getting Live Updates, Similar to iPhone’s Live Activity
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Fortinet Patches CVE-2025-32756 Zero-Day RCE Flaw Exploited in FortiVoice Systems
Computing
May Patch Tuesday brings five exploited zero-days to fix | Computer Weekly
News
The Best CPUs for 2025
News
Sony’s profits rises on robust performance for music, movies and games
News

You Might also Like

Computing

Fortinet Patches CVE-2025-32756 Zero-Day RCE Flaw Exploited in FortiVoice Systems

3 Min Read
Computing

Oracle Solaris 11.4.81 CBE Released After Three Year Hiatus

2 Min Read
Computing

Apple to restore TikTok on US App Store after Attorney General letter · TechNode

1 Min Read
Computing

Red Hat Enterprise Linux 10 Reaches GA

1 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?