In every four-year Bitcoin cycle—especially in the six months leading up to a halving—the debate around the sustainability of its security model resurfaces. This discussion centers on two opposing viewpoints: one argues that Bitcoin’s security model is inherently sound and sufficient for long-term stability, while the other contends that its deflationary monetary policy and long-term reliance on rising transaction fees are unsustainable, potentially weakening network security over time.
While many in the Bitcoin community consider this issue settled or negligible, the reality is far more nuanced. The debate involves deep technical, economic, and game-theoretical considerations. This article presents a balanced analysis of both perspectives, explores the mechanics of Proof-of-Work (PoW), and introduces an alternative approach exemplified by CKB (Common Knowledge Base), the base layer of the Nervos Network.
Understanding Proof-of-Work (PoW)
Bitcoin operates as a decentralized public ledger maintained by a global network of computers called nodes. To achieve consensus on the state of the blockchain, nodes rely on a protocol known as Proof-of-Work (PoW).
Within this system, a special type of node—miners—is responsible for validating transactions and creating new blocks. On average, every ten minutes, miners compete to solve a cryptographic puzzle involving the SHA-256 hash function. The first miner to find a valid hash—defined as one below a network-set "target"—wins the right to add a new block to the chain.
Each block is cryptographically linked to its predecessor, forming an immutable sequence. Altering any past block would require re-mining all subsequent blocks—a computationally infeasible task due to the immense energy cost.
The more confirmations (i.e., subsequent blocks) a transaction has, the more secure it becomes. This mechanism ensures finality and deters malicious behavior.
👉 Discover how blockchain security evolves with economic incentives
SHA-256 is a deterministic, one-way function: it produces a fixed 256-bit output for any input, and even a minor change in input results in a completely different hash. For example:
- "I Love Nervos" →
4cdf9079fe156321c82e026e263032d2e826a9abca07d0cca44f773ff0f66285 - "I Love Nervos 1" →
955146eb7dfa0d263b0fc8d943f642e26524435ae63a894a6f1879a259db0487
Miners adjust a value called the nonce to generate different hash outputs until one meets the difficulty target. The network adjusts this target every 2,016 blocks (~two weeks) to maintain a consistent 10-minute block time.
Modern miners use ASICs (Application-Specific Integrated Circuits) capable of trillions of hash attempts per second. This massive computational effort is what gives PoW its name—security is derived from verifiable work.
Bitcoin’s Security Budget
Miners are incentivized through block rewards, which consist of newly minted bitcoins (block subsidy) and transaction fees. These rewards compensate for capital and operational costs—hardware, electricity, maintenance—and motivate miners to protect the network.
The total revenue miners earn constitutes Bitcoin’s security budget—the economic cost of launching a 51% attack. To execute such an attack, an adversary must control over half the network’s hash power, making the cost directly proportional to miner revenue.
A common misconception is that high hash rate equals high security. However, security is determined by cost, not hash rate. As mining hardware improves (per Moore’s Law), achieving the same hash rate becomes cheaper. Thus, nominal hash power alone is an inadequate security metric.
Currently, Bitcoin’s daily security budget is approximately $25.6 million**, with **97% coming from block subsidies** (144 blocks/day × 6.25 BTC × $27,500/BTC) and only 3% from transaction fees**.
However, the block subsidy halves every 210,000 blocks (~four years), reaching zero by 2140. Without intervention, this reduction threatens long-term security unless:
- Bitcoin’s price doubles every four years (mathematically unsustainable), or
- Transaction fees rise sufficiently to replace lost subsidy income.
Neither option is guaranteed. If Bitcoin’s price stagnates, the security budget could drop to $25,000 per day, rendering the network vulnerable.
Measuring Security: The Role of Security Ratio
Security cannot be assessed in absolute terms—it must be relative to network value. A $1 million attack cost may be sufficient for a $10 billion network but trivial for a $1 trillion one.
Thus, the security ratio—attack cost divided by market cap—is a more meaningful metric. Currently at ~0.22%, this ratio reflects strong protection. But if market cap grows while security costs stagnate, the ratio declines, increasing systemic risk.
For Bitcoin to remain secure, it must maintain a healthy security ratio through rising transaction fees or other mechanisms.
Can Transaction Fees Sustain Bitcoin?
The core debate hinges on whether transaction fees alone can sustain Bitcoin’s security.
The Optimistic View
Proponents argue that as Bitcoin becomes a global settlement layer, demand for block space will surge. High-value transactions—such as institutional settlements or inter-Layer 2 batch closures—will drive fees higher. Projects like BitVM and Rollkit could expand Bitcoin’s utility beyond simple transfers, justifying premium fees for enhanced functionality.
In this vision, most retail transactions occur off-chain via Layer 2 solutions like Lightning Network, while Bitcoin secures high-stakes finality.
The Pessimistic View
Critics highlight that users pay fees only when necessary—and will always seek cheaper alternatives. Transaction demand is price-elastic: over time, competition from other blockchains and payment systems pressures fees downward.
Moreover, fee income is volatile. Unlike predictable block subsidies, transaction fees fluctuate with market cycles. This instability could incentivize MEV-style attacks, where miners reorganize chains to capture high-fee blocks—undermining trust and finality.
Worse still, a fee-only model risks a death spiral: lower fees → reduced security → diminished user confidence → fewer transactions → even lower fees.
Unlike today’s hybrid model—where block subsidies anchor miner revenue—a pure fee system lacks a stabilizing floor.
👉 Explore how next-gen blockchains are redefining economic security
51% Attacks and Defense Mechanisms
A 51% attack allows an adversary to double-spend coins, censor transactions, or disrupt consensus. While costly, such attacks become feasible if the security budget shrinks.
Some suggest users can mitigate risk by waiting for more confirmations (e.g., 60 instead of 6). But if an attacker controls the entire security budget, they can rewrite arbitrarily long chains—rendering confirmations meaningless.
Furthermore, rational actor assumptions may not hold. Nation-states or ideologically motivated actors might attack Bitcoin regardless of economic loss. While countermeasures exist—like algorithm changes or checkpoints—they require coordination and trust in governance.
Ultimately, prevention is better than cure: maintaining a high security budget deters attacks before they begin.
CKB’s Alternative: Sustainable Security Through State-Based Incentives
Unlike Bitcoin, CKB (Common Knowledge Base)—the foundational layer of Nervos Network—is designed for long-term security without relying on volatile transaction fees.
CKB employs a dual-token issuance model:
- Primary issuance: Fixed supply with periodic halvings (similar to Bitcoin).
- Secondary issuance: Fixed annual inflation of 13.44 billion CKB, distributed based on on-chain activity.
Crucially, secondary issuance rewards miners proportionally to network usage—specifically, the amount of state (data) stored on-chain. Users must lock CKB tokens to store data; one CKB equals one byte of storage capacity.
This design achieves two goals:
- Sustainable Security: Miners receive predictable income tied to data storage demand—not transaction volume. Long-term holders who deposit CKB into Nervos DAO are shielded from inflation, making CKB deflationary for them.
- Solving Tragedy of the Commons: By privatizing state space, CKB discourages bloat. Users optimize storage to minimize opportunity costs—ensuring efficient resource use.
As more value is stored on CKB, demand for state space rises → secondary issuance increases → miner rewards grow → network security strengthens → more users are attracted. This creates a positive feedback loop between value storage and security.
Unlike Bitcoin, where security depends on speculative fee growth, CKB aligns incentives with its core function: being a secure, decentralized store of value.
Frequently Asked Questions
What is Bitcoin’s main security challenge post-halving?
Bitcoin’s primary challenge is maintaining sufficient miner revenue after block subsidies diminish. Without rising transaction fees or price appreciation, the security budget could shrink dramatically—increasing vulnerability to 51% attacks.
Why can’t Bitcoin rely solely on transaction fees?
Transaction fees are inherently volatile and subject to price elasticity. Users resist high fees, especially when alternatives exist. Relying solely on fees risks destabilizing miner incentives and triggering a death spiral of declining security and usage.
How does CKB prevent state bloat?
CKB requires users to lock CKB tokens to store data on-chain. Since holding CKB has opportunity cost (e.g., staking rewards), users are incentivized to minimize storage—naturally preventing bloating.
What is the “security ratio” and why does it matter?
The security ratio is the ratio of attack cost to market capitalization. A higher ratio means greater protection against attacks. As Bitcoin’s market cap grows, maintaining this ratio requires proportional increases in miner revenue.
How does CKB reward miners without high fees?
CKB uses secondary issuance—a fixed annual inflation distributed based on on-chain state usage. Miners earn stable income tied to data storage demand rather than transaction volume.
Can Bitcoin adopt a model like CKB?
Not easily. Bitcoin prioritizes simplicity and monetary policy purity. Introducing state-based incentives or perpetual issuance would require significant protocol changes—facing strong community resistance due to philosophical differences.
👉 Learn how innovative consensus models are shaping crypto’s future
Conclusion
Bitcoin and CKB represent two distinct philosophies in blockchain design. Bitcoin bets on rising transaction fees and Layer 2 scaling to preserve security—a path fraught with economic uncertainty. CKB takes a proactive approach: aligning long-term security with value storage through predictable, usage-based incentives.
While Bitcoin remains dominant as digital gold, questions about its post-subsidy future persist. CKB offers a compelling alternative—one where security is not left to market whims but engineered into the protocol itself.
As the crypto ecosystem evolves, sustainable security models will become increasingly critical—not just for survival, but for trustless permanence.
Core Keywords: Bitcoin security model, CKB blockchain, Proof-of-Work (PoW), transaction fees sustainability, 51% attack prevention, blockchain security budget, Nervos Network