
What leads to proof-of-stake security assumptions modifies long-term expectations — and what should observers pay attention to next?

What leads to proof-of-stake security assumptions modifies long-term expectations — and what should observers pay attention to next?