Is Proof of Authority Centralized?

Proof of Authority is centralized by design — not as a flaw, but as a deliberate tradeoff. Here's what that actually means, where the risk lives, and why the Ronin hack is the clearest case study.
Lewis Jackson
CEO and Founder

The short answer is yes — but "centralized" covers a lot of ground, and Proof of Authority uses it deliberately rather than reluctantly. The more useful question is: centralized in what way, with what consequences, and for whom does that make sense?

Most people asking this question are either evaluating a specific PoA network (Ronin, VeChain, BNB Chain), or they're trying to understand why enterprise blockchains default to this model while public chains mostly don't. The mechanism is worth understanding on its own terms before deciding whether the centralization is a problem.

How Proof of Authority Works

In Proof of Work, validators compete anonymously using computational power. In Proof of Stake, validators are selected by token weight. In Proof of Authority, validators are explicitly named and pre-approved — they're known entities who've been granted the right to produce blocks.

The identity requirement is the point. Validators in a PoA system are accountable organizations or individuals. They put their reputation (and in some implementations, a legal agreement) on the line. The idea is that accountability replaces economic incentives as the deterrent against bad behavior. You don't slash a validator's stake — you expose their identity and kick them out of the set.

Block production in PoA is typically round-robin: each validator takes a turn, in a fixed or rotating order. There's no competition, no energy expenditure, no race. Finality is fast because the validator set is small and agreement is straightforward. Throughput is high for the same reason. If you're running a supply chain database for a consortium of automotive manufacturers and you care about speed and auditability, PoA makes a lot of sense.

Where the Centralization Lives — Specifically

The validator set controls the chain. That's not spin; it's the mechanism.

In Bitcoin, attacking the network requires 51% of global hash power — an enormously expensive and publicly visible effort. In Ethereum, attacking requires 33% or 67% of all staked ETH depending on the type of attack — again, a massive economic hurdle with built-in detection. In a PoA chain with nine validators, an attacker needs to compromise five private keys.

This isn't theoretical. The Ronin Network hack in March 2022 is the canonical example. Ronin used nine validators and required five-of-nine signatures to authorize transactions. Attackers — later attributed to North Korea's Lazarus Group — compromised five validator private keys. With five signatures, they submitted fraudulent withdrawal transactions. $625 million in ETH and USDC was drained before anyone noticed. Technically, nothing went wrong. The consensus worked exactly as designed. The design was the problem.

The critical detail: the Ronin network showed no anomalies during the attack. Blocks were produced. Transactions were confirmed. From the chain's perspective, the authorizations were legitimate. The breach was discovered days later when a user tried to withdraw and couldn't. The exploit wasn't a smart contract bug or a cryptographic break. It was five private keys.

That's what PoA centralization means in practice. The security surface isn't the protocol — it's the validator key management.

The Trust Model Is Legal, Not Cryptographic

Public blockchain security relies on making attacks economically irrational. Destroying your own hash rate investment or losing your staked ETH are costly enough that defection isn't worth it for any rational actor. The math enforces behavior.

PoA replaces that with institutional trust. Validators behave because of reputation, legal agreements, and the expectation that misbehavior will be discovered and attributed to them. You could argue this is how most of the existing financial system works — banks, clearinghouses, and payment processors are trusted because of regulation and accountability, not cryptographic guarantees.

That's a coherent model. It just means PoA security is fundamentally different in kind from public blockchain security. It's closer to a permissioned database with a shared audit log than to a trustless system.

The practical implication: PoA chains can be coerced. Identified validators can be served legal orders. In a blockchain with anonymous validators scattered across jurisdictions, effective censorship is hard. On a PoA chain where validators are known corporations, a government order can silence the chain. Whether that's a bug or a feature depends on what the chain is for.

Where PoA Actually Makes Sense

Enterprise and consortium deployments are the natural home. Hyperledger Besu, R3 Corda, Quorum — these are commonly used with PoA variants because the users are known entities anyway. A supply chain network between Toyota, Volkswagen, and BMW doesn't need to be trustless — they already have contracts and legal relationships. What they need is fast, auditable, shared state.

Ethereum's testnets (Goerli, Rinkeby, Ropsten) used PoA consensus (specifically the Clique algorithm) for years. The logic: testnets don't need real economic security, and PoA made them easy to maintain. The major Ethereum testnets have since moved to PoS to better mirror mainnet behavior.

VeChain uses PoA with 101 Authority Masternodes — nodes that must meet economic and identity requirements, with governance over the validator set. It's a hybrid with some economic staking and some accountability requirements, but it's still a small, permissioned set.

BNB Chain uses Proof of Staked Authority (PoSA), which mixes token-weighted selection with a capped validator set (currently 21 validators). It gets better throughput than Ethereum at the cost of meaningful decentralization. Critics note it has occasionally processed over a million transactions per day while running on 21 validators, most operated by entities with ties to Binance. Whether that's acceptable depends on what you're using it for.

What's Changing

Hybrid approaches are the main development. The honest problem PoSA is trying to solve is real: pure PoW and PoS mechanisms involve tradeoffs around speed, finality time, and hardware requirements. PoA gets around all of them but sacrifices the trustless property entirely. Systems like PoSA are attempting to borrow efficiency from PoA while adding some economic friction.

It's worth watching whether any of these hybrids produce meaningfully better security properties than pure PoA, or whether they're mostly rebranding. The validator count is the honest test: a "hybrid" chain with 21 validators is closer to PoA than to PoS.

What Would Break This Model

The trust model breaks predictably. When validators are compromised (Ronin), when they collude to censor transactions, when they're coerced by regulators, or when the governance of the validator set itself becomes contested. These aren't edge cases — they're the actual risk surface.

Confirmation that a PoA system is working as intended looks like: validator uptime, no reorgs, transparent governance of the validator set, and functioning key management practices. It doesn't look like cryptographic proofs of anything. That's fine if you understand what you're getting.


This post explains the mechanism and the trust model. It doesn't assess whether any specific PoA chain is a good system for a given purpose — that depends on what properties the use case actually requires. For applications that genuinely need trustless, censorship-resistant consensus, PoA is the wrong architecture. For permissioned environments where speed and auditability matter more than trustlessness, it's a defensible choice.

The Ronin hack doesn't make PoA bad. It makes it clear.

Related Posts

See All
Crypto Research
New XRP-Focused Research Defining the “Velocity Threshold” for Global Settlement and Liquidity
A lot of people looking at my recent research have asked the same question: “Surely Ripple already understands all of this. So what does that mean for XRP?” That question is completely valid — and it turns out it’s the right question to ask. This research breaks down why XRP is unlikely to be the internal settlement asset of CBDC shared ledgers or unified bank platforms, and why that doesn’t mean XRP is irrelevant. Instead, it explains where XRP realistically fits in the system banks are actually building: at the seams, where different rulebooks, platforms, and networks still need to connect. Using liquidity math, system design, and real-world settlement mechanics, this piece explains: why most value settles inside venues, not through bridges why XRP’s role is narrower but more precise than most narratives suggest how velocity (refresh interval) determines whether XRP creates scarcity or just throughput and why Ripple’s strategy makes more sense once you stop assuming XRP must be “the core of everything” This isn’t a bullish or bearish take — it’s a structural one. If you want to understand XRP beyond hype and price targets, this is the question you need to grapple with.
Read Now
Crypto Research
The Jackson Liquidity Framework - Announcement
Lewis Jackson Ventures announces the release of the Jackson Liquidity Framework — the first quantitative, regulator-aligned model for liquidity sizing in AMM-based settlement systems, CBDC corridors, and tokenised financial infrastructures. Developed using advanced stochastic simulations and grounded in Basel III and PFMI principles, the framework provides a missing methodology for determining how much liquidity prefunded AMM pools actually require under real-world flow conditions.
Read Now
Crypto Research
Banks, Stablecoins, and Tokenized Assets
In Episode 011 of The Macro, crypto analyst Lewis Jackson unpacks a pivotal week in global finance — one marked by record growth in tokenized assets, expanding stablecoin adoption across emerging markets, and major institutions deepening their blockchain commitments. This research brief summarises Jackson’s key findings, from tokenized deposits to institutional RWA chains and AI-driven compliance, and explains how these developments signal a maturing, multi-rail settlement architecture spanning Ethereum, XRPL, stablecoin networks, and new interoperability layers.Taken together, this episode marks a structural shift toward programmable finance, instant settlement, and tokenized real-world assets at global scale.
Read Now

Related Posts

See All
No items found.
Lewsletter

Weekly notes on what I’m seeing

A personal letter I send straight to your inbox —reflections on crypto, wealth, time and life.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.