The post AEW All Out 2025 Results, Winners And Match Grades On September 20 appeared on BitcoinEthereumNews.com. AEW All Out 2025 results AEW AEW All Out 2025 emanated from Toronto, Ontario Canada in a show book-ended by hometown heroes Cage and Cope and a world title match between Hangman Adam Page and consummate wrestler Kyle Fletcher. The 10-match, marathon show is almost guaranteed to bleed into WWE Wrestlepalooza, the promotion’s debut broadcast on ESPN. AEW All Out was originally scheduled for 4:00 p.m. PST, but Tony Khan moved the PPV to get out of the way of head-to-head competition with the WWE supershow. AEW Dynamite Ratings September 17, 2025 | 667,000 September 10, 2025 | 584,000 September 3, 2025 | 472,000 August 27, 2025 | 585,000 August 20, 2025 | 565,000 AEW All Out 2025 Results, Match Card And Odds Cage and Cope (-1500) def. FTR (+1200) Eddie Kingston def. Big Bill Marc Briscoe def. MJF | Tables ‘n’ Tacks Match Ricochet and the Gates of Agony (-250) def. The Hurt Syndicate (+170) Mercedes Mone (-2000) def. Riho (+700) | AEW TBS Title Kazuchika Okada def. Konosuke Takeshita and Mascara Dorada | AEW Unified Title Jon Moxley (+275) def. Darby Allin (-450) | Coffin Match Kris Statlander (+600) def. Toni Storm (-2000), Jamie Hayter (+1000) and Thekla (+500) | AEW Women’s World Title Brodito vs. the Young Bucks vs. JetSpeed vs. the Don Callis Family | Fatal 4-Way Match for the AEW Tag Team Championships Hangman Adam Page (-5000) vs. Kyle Fletcher (+1200) | AEW World Heavyweight Title AEW All Out 2025 Start Time And Where To Stream AEW All Out 2025 Date: Saturday, September 20, 2025 AEW All Out 2025 Start Time: 12:00 pm PST (3:00 pm EST) Where to Watch/Stream: AEW All Out 2025 is available on multiple streaming platforms, including HBO Max where it can be purchased at a discount of $39.99. AEW All… The post AEW All Out 2025 Results, Winners And Match Grades On September 20 appeared on BitcoinEthereumNews.com. AEW All Out 2025 results AEW AEW All Out 2025 emanated from Toronto, Ontario Canada in a show book-ended by hometown heroes Cage and Cope and a world title match between Hangman Adam Page and consummate wrestler Kyle Fletcher. The 10-match, marathon show is almost guaranteed to bleed into WWE Wrestlepalooza, the promotion’s debut broadcast on ESPN. AEW All Out was originally scheduled for 4:00 p.m. PST, but Tony Khan moved the PPV to get out of the way of head-to-head competition with the WWE supershow. AEW Dynamite Ratings September 17, 2025 | 667,000 September 10, 2025 | 584,000 September 3, 2025 | 472,000 August 27, 2025 | 585,000 August 20, 2025 | 565,000 AEW All Out 2025 Results, Match Card And Odds Cage and Cope (-1500) def. FTR (+1200) Eddie Kingston def. Big Bill Marc Briscoe def. MJF | Tables ‘n’ Tacks Match Ricochet and the Gates of Agony (-250) def. The Hurt Syndicate (+170) Mercedes Mone (-2000) def. Riho (+700) | AEW TBS Title Kazuchika Okada def. Konosuke Takeshita and Mascara Dorada | AEW Unified Title Jon Moxley (+275) def. Darby Allin (-450) | Coffin Match Kris Statlander (+600) def. Toni Storm (-2000), Jamie Hayter (+1000) and Thekla (+500) | AEW Women’s World Title Brodito vs. the Young Bucks vs. JetSpeed vs. the Don Callis Family | Fatal 4-Way Match for the AEW Tag Team Championships Hangman Adam Page (-5000) vs. Kyle Fletcher (+1200) | AEW World Heavyweight Title AEW All Out 2025 Start Time And Where To Stream AEW All Out 2025 Date: Saturday, September 20, 2025 AEW All Out 2025 Start Time: 12:00 pm PST (3:00 pm EST) Where to Watch/Stream: AEW All Out 2025 is available on multiple streaming platforms, including HBO Max where it can be purchased at a discount of $39.99. AEW All…

AEW All Out 2025 Results, Winners And Match Grades On September 20

2025/09/21 07:00

AEW All Out 2025 results

AEW

AEW All Out 2025 emanated from Toronto, Ontario Canada in a show book-ended by hometown heroes Cage and Cope and a world title match between Hangman Adam Page and consummate wrestler Kyle Fletcher.

The 10-match, marathon show is almost guaranteed to bleed into WWE Wrestlepalooza, the promotion’s debut broadcast on ESPN. AEW All Out was originally scheduled for 4:00 p.m. PST, but Tony Khan moved the PPV to get out of the way of head-to-head competition with the WWE supershow.

AEW Dynamite Ratings

  • September 17, 2025 | 667,000
  • September 10, 2025 | 584,000
  • September 3, 2025 | 472,000
  • August 27, 2025 | 585,000
  • August 20, 2025 | 565,000

AEW All Out 2025 Results, Match Card And Odds

  • Cage and Cope (-1500) def. FTR (+1200)
  • Eddie Kingston def. Big Bill
  • Marc Briscoe def. MJF | Tables ‘n’ Tacks Match
  • Ricochet and the Gates of Agony (-250) def. The Hurt Syndicate (+170)
  • Mercedes Mone (-2000) def. Riho (+700) | AEW TBS Title
  • Kazuchika Okada def. Konosuke Takeshita and Mascara Dorada | AEW Unified Title
  • Jon Moxley (+275) def. Darby Allin (-450) | Coffin Match
  • Kris Statlander (+600) def. Toni Storm (-2000), Jamie Hayter (+1000) and Thekla (+500) | AEW Women’s World Title
  • Brodito vs. the Young Bucks vs. JetSpeed vs. the Don Callis Family | Fatal 4-Way Match for the AEW Tag Team Championships
  • Hangman Adam Page (-5000) vs. Kyle Fletcher (+1200) | AEW World Heavyweight Title

AEW All Out 2025 Start Time And Where To Stream

  • AEW All Out 2025 Date: Saturday, September 20, 2025
  • AEW All Out 2025 Start Time: 12:00 pm PST (3:00 pm EST)
  • Where to Watch/Stream: AEW All Out 2025 is available on multiple streaming platforms, including HBO Max where it can be purchased at a discount of $39.99.

AEW All Out 2025 Ticket Sales

  • AEW All Out 2025 Event Venue: Scotiabank Arena (Toronto, ON)
  • AEW All Out 2025 Tickets Distributed: 11,599
  • AEW All Out 2025 Tickets Available: 697

Cage And Cope Def. FTR

  • There was a hilarious opening segment with Cage and Cope arriving to the building. The segment featured cameos from NHL great Wendel Clark
  • The hottest spot in the match came in the first half when Adam Copeland paid homage to John Cena with the John Cena comeback. This inspired the Scotiabank Arena to chant “Cena!” Cope and Christian tried for another WWE homage, this time to the Hardy Boyz, only to be thwarted.
  • Stokely Hathaway got involved, interrupting a nearfall, which brought out Beth Copeland (Phoenix) to a huge reaction. Beth landed a stiff Spear on Stokely and carried him to the back. Cage and Cope hit a 3D for a nearfall.
  • Cope kicked out of a Spike piledriver and a Shatter Machine. After a second Shatter Machine, Cope was out on his feet, but he hit a Spear on Cash out of pure instinct for the win.
  • After the match, FTR handcuffed Copeland and laid out Beth Copeland with a Spike piledriver. Meanwhile, the Matriarchy took out Cage.

Cage and Cope vs. FTR Grade: B+

Eddie Kingston Def. Big Bill

  • Eddie Kingston stormed out to the ring with a purpose to a big pop. For purposes of storyline continuity, Kingston donned a t-shirt that said “Claudio Sucks Eggs,” a nod to the fact that Claudio Castagnoli was the one who took him out in the first place.
  • Kingston opened with several chops before being laid out by a boot. Bill screamed expletives at Kingston while beating him down, and he actually upstaged Kingston as a performer early on.
  • Big Bill took his time with Kingston, and Bryan called him out for not taking this match as seriously, especially after a lackadaisical pinfall from Big Bill. Kingston made his comeback, but after a spinning backfist, Big Bill kicked out at one. Kingston hit a second backfist for an abrupt win. The announcers seemed shocked. A very underwhelming comeback match.
  • After the match, Hook hit the ring to a miniscule reaction. Hook locked in the Tazmission on Bryan Keith, who then walked into a spinning backfist from Kingston. Hook embraced with Kingston.

Eddie Kingston vs. Big Bill Match Grade: C

Marc Briscoe Def. MJF

  • MJF was showered in pyro during his entrance. He wore white gloves, white jeans and a white t-shirt that read “White Collar Wins.” There will be blood, for sure. Deplorable referee Bryce Remsburg donned a pair of goggles as thumbtacks would be involved.
  • Briscoe, who was also wearing a white tanktop, immediately spilled thumbtacks in the center of the ring. MJF escaped an early Jay Driller attempt, but walked into the ring and onto the thumbtacks. Mans was terrified.
  • After several teases of who would bump on the thumbtacks first, MJF scored with a body slam into the tacks after a cheap poke to the eyes. MJF then rubbed Briscoe’s face in the thumbtacks. “You sick f—k!” MJF doubled down and shoved tacks into a bloodly Briscoe’s mouth.
  • MJF fought back and MJF got his real first tase of the thumbtacks by taking a back body drop. Briscoe followed up with a somersault through a table on a now shirtless MJF.
  • Fans went dead silent for a stretch of this match until Briscoe power bombed MJF onto the tacks. MJF hit a tombstone on a steel chair. Of course, Briscoe kicked out.
  • After two Froggy-Bows, Briscoe finally hit the Jay Driller on the thumbtacks for the bloody victory.

MJF vs. Marc Briscoe Match Grade: B+

The Demand Def. The Hurt Syndicate

  • MVP elected to start the match with Bishop Kaun, but MVP demanded Ricochet. After a quick exchange, Shelton Benjamin tagged in and it quickly turned into a meat match. The underrated Kaun and Benjamin smashed into each other like two bulls.
  • Ricochet tagged in and was matched up with Bobby Lashley. It went exactly as you think it did, with career midcarder Ricochet punching Lashley in the abs and Lashley not selling a damn thing. Lashley ragdolled Ricochet around the ring and tagged in MVP. MVP hit his patented Ballin’ Elbow Drop for a nearfall.
  • Shelton hit an incredible double suplex on Ricochet and Bishop Kaun. Ricochet bumped like crazy throughout this match. As Lashley Speared everything in sight, Ricochet hit a 450 splash to break up a pinfall.
  • The Demand cornered MVP and lined him up for the Spirit Gun for the win. There was less heat than the standard Hurt Syndicate match, and to me, was all Ricochet’s fault.

The Hurt Syndicate vs. The Demand Match Grade: B-

Mercedes Mone Def. Riho

  • There were dueling chants of “Let’s go Riho” and “CEO!” as the two began the match with chain wrestling.
  • Riho exploded on Mercedes with a flurry of offense that Mercedes sold brilliantly for. Back came Mercedes Mone, who hit an impressive Meteora off the table.
  • Mone locked in a Romero Special, but Riho creatively countered into a single-leg crab. Riho leaned all the way back, but Mercedes pulled her hair, forcing her to let go. Riho slapped on another single-leg crab as a counter to a Meteora. Riho about bent Mercedes in half.
  • Mone battled back and hit a Lungblower followed by the MoneMaker for the win.

Mercedes Mone vs. Riho Match Grade: B-

Kazuchika Okada Def. Takeshita And Mascara Dorada

  • The match opened with high-flying lucha libre offense from Mascara Dorada to the applause of the Scotiabank Arena. Fans quickly exploded to “F Don Callis,” as Callis was on commentary.
  • Don Callis spent much of the match insisting that Konosuke Takeshita and Kazuchika Okada would coexist. Shortly after, Takeshita accidentally booted Okada in the jaw. Takeshita followed up with an intentional boot to the face, just to be sure. Delusional Don Callis called it “Friendly taunting.”
  • Mascara Dorada was sensational in this match. His best spot came when he hit a hurricanrana off the top rope on both Takeshita and Okada. Dorada was the star of this match as Okada and Takeshita’s tension took a backseat to his excellence.
  • There were so many tombstones on this show, especially during this match. The alternate name for this PPV should be AEW “Oh, you got me, brother!”
  • Fans came alive as Dorada rose on the top rope when it seemed Dorada was closing in on the win. Takeshita crotched him and followed up with a pair of suplexes, including a Raging Fire. Okada hit the ring, dropkicked Takeshita out of the ring and hit the Rainmaker on Dorada. Game, Okada.

AEW Unified Title Triple Threat Match Grade: A-

Darby Allin Def. Jon Moxley

  • Darby Allin jumped Jon Moxley shortly after his entrance. Darby hit a Coffin Drop from the All Out sign, eliciting chants of “Holy s—t!”
  • Jon Moxley started bleeding from the ear after Darby started biting at it. Darby Speared Moxley into the coffin as both were locked inside briefly. Claudio Castagnoli and the rest of the Death Riders joined the fray just as Marin Shafir was unbuckling the bottom turnbuckle. There was a table that read “Nothing’s over till you’re underground.”
  • Bryan Danielson gave his word that he wouldn’t get involved in Darby’s match, and Taz reminded Bryan on commentary. Mox sent the troops to the back. Darby punctured Darby’s head with a fork after gauging his ear. Blood poured out of Moxley’s head like any family friendly Moxley match.
  • As revenge for a spot earlier, Darby Allin smashed Mox’s fingers in the casket, followed by a Scorpion Death Drop. Mox fought back. Mox was not able to make a fist, so he kicked Darby during his comeback. Darby shrugged off the hapless comeback and mutilated Moxley further with a fork. Another “You sick f—k” chant on this family friendly PPV.
  • Bryan handed Darby Allin an AEW tote bag. There was a plastig bag in the tote bag, which Darby used to suffocate Mox. Danielson gaslit Taz by saying he didn’t get involved because he “didn’t stand up once.” After kicking Mox’s head in, Darby stuffed him in a coffin. Fanas chanted “This is murder!”
  • Pac hit the ring and hit a White Noise running power bomb over the rope onto the lid of the coffin. Pac stuffed Darby inside the coffin, sealing the victory for Jon Moxley. Too much violence for the sake of being violent. So weird considering how hard Tony Khan was promoting AEW as a family friendly company this week. This match sucked.

Darby Allin vs. Jon Moxley Grade: D

Kris Statlander Def. Jamie Hayter, Thekla and Toni Storm

  • Wheeler Yuta gave Kris Statlander words of encouragement before the match. Thekla dominated early with core strength, belt shots and a Spider Suplex. As Thekla did a spider crawl, Toni Khan stomped her in the yam bags.
  • the offense was nonstop as Jamie Hayter took over. Jamie hit a double suplex on Statlander and Storm. The rest of the field exchanged moves in a sequence that ended with a falling clothesline from Hayter. Fans chanted “AEW!” as all four women laid out.
  • Jamie Hayter and Toni Storm worked together to dispose of Statlander before turning their attention to each other. Thekla hit a two-for-one Tarantula hold on Storm and Hayter.
  • Kris Statlander rolled up Toni Storm when she wasn’t expecting it and got the win. It was easily the most shocking moment of the night.

AEW Women’s World Title Fatal 4-Way Match Grade: B-

Brodito Def. JetSpeed, The Young Bucks And The Callis Family

  • This match began at 3:30 PST. The main event will certainly go head-to-head with WWE Wrestlepalooza’s opening match between John Cena and Brock Lesnar. Brodito and the Young Bucks wore matching gear. Jetspeed didn’t.
  • There was a sloppy German suplex spot where Brody King yeeted three men. Fans were polite in their response.
  • JetSpeed tried to climb the ladder, but Brody King singlehandedly dragged them both down. The crowd was getting exhausted at this point.
  • The Young Bucks got the better of a chicken fight, but failed to capture the tag team titles on the ladder. The crowd started to wake up with faint chants of “This is awesome.”
  • Mike Bailey was trapped in a surfboard submission hold on a ladder by Hechicero. The barefoot Speedball got out of the hold and followed up with a backflip, knee-first, on Hechicero.
  • Body after body fell through ladders and tables capped off by Brody King hitting a modified tombstone on Speedball through a ladder. Fans were now fully into this match.
  • Kevin Knight went falling through a double table. This was followed by Bandito driving onto his opps with a ladder, and Brody King clearing the path with a dive to the outside. Bandito grabbed both titles for the win. A very good semi-main event.

Tag Team Fatal 4-Way Ladder Match Grade: B

Source: https://www.forbes.com/sites/alfredkonuwa/2025/09/20/aew-all-out-2025-results-winners-and-match-grades-on-september-20/

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.
Share Insights

You May Also Like

Bitcoin White Paper: A Peer-to-Peer Cash System

Bitcoin White Paper: A Peer-to-Peer Cash System

PANews Editor's Note: On October 31, 2008, Satoshi Nakamoto published the Bitcoin white paper, and today marks its 17th anniversary. The following is a translation of the white paper by Li Xiaolai, for everyone to revisit this classic work. Summary: A purely peer-to-peer version of electronic cash would allow online payments to be sent directly from one party to another without going through a financial institution. While digital signatures offer a partial solution, the main advantage of electronic payments is negated if a trusted third party is still required to prevent double-spending. We propose a scheme using a peer-to-peer network to address the double-spending problem. The peer-to-peer network timestamps each transaction by recording the transaction's hash data onto a continuously expanding, hash-based proof-of-work chain, forming a record that cannot be altered unless completely rewritten. The longest chain serves two purposes: proving witnessed events and their order, and simultaneously proving it originated from the largest pool of CPU power. As long as the vast majority of CPU power is controlled by benign nodes—that is, nodes that do not cooperate with those attempting to attack the network—benign nodes will generate the longest chain and outpace attackers. The network itself requires a minimal structure. Information will propagate on a best-effort basis, and nodes are free to come and go; however, upon joining, they must always accept the longest proof-of-work chain as proof of everything that happened during their absence. 1. Introduction Internet commerce relies almost entirely on financial institutions as trusted third parties to process electronic payments. While this system works reasonably well for most transactions, it is still hampered by the inherent flaws of its trust-based model. Completely irreversible transactions are practically impossible because financial institutions cannot avoid arbitrating disputes. Arbitration costs increase transaction costs, which in turn limit the minimum possible transaction size and effectively prevent many small payments. Beyond this, there are even greater costs: the system cannot provide irreversible payments for irreversible services. The possibility of reversibility creates an omnipresent need for trust. Merchants must be wary of their customers, requiring them to provide additional information that would otherwise be unnecessary (if trusted). A certain percentage of fraud is considered unavoidable. These costs and payment uncertainties, while avoidable when paying with physical currency directly between people, lack any mechanism that allows payments to be made through communication channels when one party is not trusted. What we truly need is an electronic payment system based on cryptographic proofs rather than trust, allowing any two parties to transact directly without needing to trust a third party. Irreversible transactions guaranteed by computational power help sellers avoid fraud, while everyday guarantee mechanisms to protect buyers are easily implemented. In this paper, we propose a solution to double-spending by using peer-to-peer, distributed timestamping servers to generate computational power-based proofs, recording each transaction chronologically. This system is secure as long as honest nodes collectively possess more CPU power than colluding attackers. 2. Transactions We define an electronic coin as a digital signature chain. When an owner transfers a coin to another person, they append the following digital signature to the end of this chain: the hash of the previous transaction and the new owner's public key. The recipient can verify ownership of the digital signature chain by verifying the signature. The problem with this approach is that the recipient cannot verify that none of the previous owners have double-spended the currency. A common solution is to introduce a trusted centralized authority, or "mint," to check every transaction for double-spending. After each transaction, the coin must return to the mint, which then issues a new coin. Thus, only coins directly issued by the mint are considered trustworthy and free from double-spending. The problem with this solution is that the fate of the entire monetary system is tied to the company operating the mint (much like a bank), and every transaction must go through it. We need a way for the recipient to confirm that the previous owner did not sign any previous transactions. For our purposes, only the earliest transaction counts, so we are not concerned with subsequent double-spending attempts. The only way to confirm the non-existence of a transaction is to know all transactions. In the mint model, the mint already knows all transactions and can confirm their order. To accomplish this without the involvement of a "trusted party," the transaction record must be publicly announced, thus requiring a system that allows participants to agree on the same unique transaction history they receive. The recipient needs to prove that at the time each transaction occurs, a majority of nodes agree that it was the first one received. 3. Timestamp Server This solution begins with a timestamp server. A timestamp server works by timestamping the hash of a block of items and then broadcasting the hash, much like a newspaper does or a post in a Usenet newsgroup [2-5]. Clearly, the timestamp proves that the data existed before that point in time; otherwise, the hash couldn't be generated. Each timestamp contains previous timestamps in its hash, thus forming a chain; each new timestamp is added after the previous ones. 4. Proof of Work To implement a peer-to-peer distributed timestamp server, we need a proof-of-work system similar to Adam Burke's HashCash, rather than something like a newspaper or newsgroup post. Proof-of-work involves finding a value that meets the following condition: after hashing it—for example, using SHA-256—the hash must begin with a certain number of zeros. Each additional zero increases the workload exponentially, while verifying this workload only requires calculating a single hash. In our timestamp network, we implement proof-of-work as follows: A random number is continuously added to each block until a value that meets a condition is found: the block's hash begins with a specified number of zeros. Once the CPU's computational power yields a result that satisfies the proof-of-work, the block can no longer be modified unless all previous work is redone. As new blocks are continuously added, modifying the current block means redoing the work for all subsequent blocks. Proof-of-Work (PoL) also solves the problem of determining who represents the majority in making decisions. If the so-called "majority" is determined by a "one IP address, one vote" system, then anyone who can control a large number of IP addresses could be considered part of the "majority." PoL, in essence, is "one CPU, one vote." The so-called "majority decision" is represented by the longest chain, because it's the chain with the most work invested. If the majority of CPU power is controlled by honest nodes, then the honest chain grows the fastest, far outpacing other competing chains. To change an already generated block, an attacker would have to re-complete the proof-of-work for that block and all subsequent blocks, and then catch up with and surpass the work done by the honest nodes. The following section explains why the probability of a delayed attacker catching up decreases exponentially with the number of blocks. To cope with the continuous increase in overall hardware computing power and the potential changes in the number of participating nodes over time, the proof-of-work difficulty is determined by a moving average based on the average number of blocks generated per hour. If blocks are generated too quickly, the difficulty will increase. 5. Network The steps to run a network are as follows: All new transactions are broadcast to all nodes; Each node packages new transactions into a block; Each node begins by finding a challenging proof-of-work for this block; When a block finds its proof of work, it must broadcast this block to all nodes; Many other nodes will accept a block if and only if all of the following conditions are met: all transactions in the block are valid and have not been double-spended; The way numerous nodes indicate to the network that they accept a block is to use the hash of the accepted block as the hash of the previous block when creating the next block. Nodes consistently recognize the longest chain as correct and continuously add new data to it. If two nodes simultaneously broadcast two different versions of the "next block," some nodes will receive one first, while others will receive the other. In this case, nodes will continue working on the block they received first, but will also save the other branch in case the latter becomes the longest chain. When the next proof-of-work is found, and one of the branches becomes the longer chain, this temporary divergence is resolved, and the nodes working on the other branch will switch to the longer chain. New transactions don't necessarily need to be broadcast to all nodes. Once they reach enough nodes, they will soon be packaged into a block. Block broadcasting also allows some messages to be dropped. If a node doesn't receive a block, it will realize it missed the previous block when it receives the next block, and will therefore issue a request to resubmit the missing block. 6. Incentive As agreed, the first transaction of each block is a special transaction that generates a new coin, owned by the block's creator. This rewards nodes that support the network and provides a way to issue coins into circulation—in this system, there's no centralized authority issuing those coins. This steady increase in the number of new coins entering circulation is analogous to gold miners continuously consuming their resources to add gold to the system. In our system, the resources consumed are CPU time and the electricity they use. Rewards can also come from transaction fees. If the output value of a transaction is less than its input value, the difference is the transaction fee; this fee is used to reward nodes for including the transaction in the block. Once a predetermined number of coins are in circulation, the rewards will be entirely distributed through transaction fees, and there will be absolutely no inflation. The reward mechanism may also incentivize nodes to remain honest. If a greedy attacker manages to acquire more CPU power than all honest nodes combined, he must choose: use that power to cheat others by stealing back the money he's spent, or use it to generate new coins? He should be able to see that following the rules is more advantageous; the current rules allow him to acquire more coins than all the others combined, which is clearly more profitable than secretly destroying the system and losing his wealth. 7. Reclaiming Disk Space If a coin's most recent transaction occurred a sufficient number of blocks ago, then all previous transactions involving that coin can be discarded—this is to save disk space. To achieve this without corrupting the block's hash, the transaction hashes are incorporated into a Merkle tree [7, 2, 5], with only the root of the tree included in the block's hash. By pruning the branches, older blocks can be compressed. The internal hashes do not need to be preserved. A block header without any transactions is approximately 80 bytes. Assuming a block is generated every ten minutes, 80 bytes multiplied by 6, 24, and 365 equals 4.2 MB per year. As of 2008, most computers on the market had 2GB of RAM, and according to Moore's Law, this would increase by 1.2 GB per year, so even if block headers had to be stored in memory, it wouldn't be a problem. 8. Simplified Payment Verification Payment confirmation is possible even without running a full network node. A user only needs a copy of the block header from the longest chain with proof-of-work—which they can verify by checking online nodes to confirm it comes from the longest chain—and then obtains the branch node of the Merkle tree, connecting to the transaction at the time the block was timestamped. The user cannot check the transaction themselves, but by connecting to somewhere on the chain, they can see that a network node has accepted the transaction, and subsequent blocks further confirm that the network has accepted it. As long as honest nodes retain control of the network, verification remains reliable. However, verification becomes less reliable if the network is controlled by an attacker. Although network nodes can verify transaction records themselves, simplified verification methods can be fooled by forged transaction records if an attacker maintains control of the network. One countermeasure is for client software to receive alerts from network nodes. When a network node discovers an invalid block, it issues an alert, displays a notification on the user's software, instructs the user to download the complete block, and warns the user to confirm transaction consistency. Merchants with high-frequency transactions should still prefer to run their own full nodes to ensure greater independent security and faster transaction confirmation. 9. Combining and Splitting Value While processing coins one by one is possible, keeping a separate record for each penny is cumbersome. To allow for the division and merging of value, transaction records contain multiple inputs and outputs. Typically, there is either a single input from a relatively large previous transaction, or a combination of many inputs from smaller amounts; meanwhile, there are at most two outputs: one is the payment (to the recipient), and if necessary, the other is the change (to the sender). It's worth noting that "fan-out" isn't the issue here—"fan-out" refers to a transaction that depends on several transactions, which in turn depend on even more transactions. There's never any need to extract a complete, independent historical copy of any single transaction. 10. Privacy Traditional banking models achieve a degree of privacy by restricting access to information about transacting parties and trusted third parties. This approach is rejected due to the need to make all transaction records public. However, maintaining privacy can be achieved by cutting off the flow of information elsewhere—public-key anonymity. The public can see that someone transferred a certain amount to someone else, but no information points to a specific individual. This level of information disclosure is somewhat like stock market transactions, where only the time and the amounts of each transaction are published, but no one knows who the transacting parties are. 11. Calculations Imagine an attacker attempting to generate an alternative chain that is faster than the honest chain. Even if he succeeds, it won't leave the current system in an ambiguous situation; he cannot create value out of thin air, nor can he acquire money that never belonged to him. Network nodes will not accept an invalid transaction as a payment, and honest nodes will never accept a block containing such a payment. At most, the attacker can only modify his own transactions, attempting to retrieve money he has already spent. The competition between the honest chain and the attacker can be described using a binomial random walk. A successful event is when a new block is added to the honest chain, increasing its advantage by 1; while a failed event is when a new block is added to the attacker's chain, decreasing the honest chain's advantage by 1. The probability that an attacker can catch up from a disadvantaged position is similar to the gambler's bankruptcy problem. Suppose a gambler with unlimited chips starts from a deficit and is allowed to gamble an unlimited number of times with the goal of making up the existing deficit. We can calculate the probability that he can eventually make up the deficit, which is the probability that the attacker can catch up with the honesty chain[8], as follows: Since we have already assumed that the number of blocks an attacker needs to catch up with is increasing, their probability of success decreases exponentially. When the odds are against them, if the attacker doesn't manage to make a lucky forward move at the beginning, their chances of winning will be wiped out as they fall further behind. Now consider how long a recipient of a new transaction needs to wait to be fully certain that the sender cannot alter the transaction. Let's assume the sender is an attacker attempting to mislead the recipient into believing they have paid the due, then transfer the money back to themselves. In this scenario, the recipient would naturally receive a warning, but the sender would prefer that by then the damage is done. The recipient generates a new public-private key pair and then informs the sender of the public key shortly before signing. This prevents a scenario where the sender prepares a block on a chain in advance through continuous computation and, with enough luck, gets ahead of the time until the transaction is executed. Once the funds have been sent, the dishonest sender secretly begins working on another parachain, attempting to insert a reverse version of the transaction. The recipient waits until the transaction is packaged into a block, and then another block is subsequently added. He doesn't know the attacker's progress, but can assume the average time for an honest block to be generated in each block generation process; the attacker's potential progress follows a Poisson distribution with an expected value of: To calculate the probability that the attacker can still catch up, we multiply the Passon density of each attacker's existing progress by the probability that he can catch up from that point: To avoid rearranging the data after summing the infinite series of the density distribution… Convert to C language program... From the partial results, we can see that the probability decreases exponentially as Z increases: If P is less than 0.1%... 12. Conclusion We propose an electronic transaction system that does not rely on trust. Starting with a simple coin framework using digital signatures, while providing robust ownership control, it cannot prevent double-spending. To address this, we propose a peer-to-peer network using a proof-of-work mechanism to record a public transaction history. As long as honest nodes control the majority of CPU power, attackers cannot successfully tamper with the system solely from a computational power perspective. The robustness of this network lies in its unstructured simplicity. Nodes can work simultaneously instantaneously with minimal coordination. They don't even need to be identified, as message paths do not depend on a specific destination; messages only need to be propagated with best-effort intent. Nodes are free to join and leave, and upon rejoining, they simply accept the proof-of-work chain as proof of everything that happened while they were offline. They vote with their CPU power, continuously adding new valid blocks to the chain and rejecting invalid ones, indicating their acceptance of valid transactions. Any necessary rules and rewards can be enforced through this consensus mechanism.
Share
PANews2025/10/31 17:05