On the other hand, an unauthorised consensus protocol allows everyone on the network to join dynamically and participate without prior authorization, but instead imposes another form of artificial costs or barriers to access in order to reduce the threat of the Sybil attack. Bitcoin introduced the first unleased consensus protocol, based on evidence of cryptographic work, in which participants compete to solve cryptographic puzzles and earn the right to commit blocks and earn rewards over their invested computing effort. Motivated in part by the high energy cost of this approach, successive unauthorised consensual protocols have proposed or adopted alternative participation rules for the protection of Sybil attacks, such as. B proof of use, proof of place and proof of authority. In value-added consensus protocols such as Multi-Paxos and Raft, the goal is to agree over time not only on a single value, but on a number of values and to form an increasingly growing story. While a value-added consensus can be achieved naively by successively executing several iterations of a consensus value protocol, many optimizations and other considerations, such as support for the reconfiguration of value-added consensus protocols, can make them more effective in practice. The most robust consensus models consistently exclude unanimous decisions and require at least documentation on minority concerns. Some make it clear that unanimity is not a consensus, but a proof of intimidation, a lack of imagination, a lack of courage, a lack of courage, a lack of involvement of all voices or a deliberate exclusion of opposing points of view. The emergence of consensus and direct experiences for democracy has been one of the hallmarks of student coordination committee (NCSC) voter registration projects in the southern United States; Students for a Democratic Society `Ad democratic Society` (in the mid-1960s), a few women`s liberation groups (late 1960s to early 1970s) and anti-nuclear and pacifist groups (late 1970s and early 1980s). For example, the anti-nuclear alliance Clamshell alliance and Movement for a New Society has engaged in consensual decision-making processes.  The origins of the formation of formal consensus go back much further, to the religious society of friends or Quakers who took technology as early as the 17th century.  The Baptists, including some Mennonites, have a history of consensual decision-making and some believe that the Baptists were already practicing consensus at the Martyrs Synod of 1527.  Some Christians attribute consensual decisions to the Bible. The Anabaptist Global Mennonite Encyclopedia refers in particular to Acts 15 as an example of consensus in the New Testament. The absence of a legitimate consensual process in the unanimous condemnation of Jesus by corrupt priests in an illegal Sanhedrin court (which had rules preventing unanimous condemnation in an early trial) influenced the views of pacifist Protestants, including Baptists (Mennonites/Amish), Quakkers and shakers. In particular, it influenced his distrust of the appropriate courtrooms and “to be clear about the trial” and to come together in such a way that “everyone must be heard”.  Some cryptocurrencies, such as Ripple, use a node validation system to validate the ledger.
This system used by Ripple, called Ripple Protocol Consensus Algorithm (RPCA), works in rounds: Step 1: Each server establishes a list of valid transactions; Step 2: Each server brings together all candidates from its single nodes list (UNL) and votes on their accuracy; Step 3: Transactions above the minimum threshold will move on to the next round; Step 4: The last round requires an 80% agreement “There was no agreement between theory and measurement” Leslie Lamport`s De Paxos consensus algorithm and variants like Raft are widely used in widely distributed and cloud computing systems.