Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
bitcoins-evolution-defi-ordinals-and-l2s
Blog

What Miners Can and Cannot Change: The Unbreakable Rules of Bitcoin's Consensus

A first-principles breakdown of Bitcoin miner power. We separate protocol-level authority from market-based influence, analyzing the real constraints on block size, fees, and the rise of L2s like Stacks and Merlin Chain.

introduction
THE PROTOCOL CONSTRAINTS

The Miner Misconception: They're Not In Charge

Miners and validators execute a deterministic rulebook; they cannot arbitrarily change the state or logic of the chain.

Miners execute, not legislate. Their role is to order transactions and produce blocks according to the network's consensus rules. They cannot alter the protocol's state transition function, which is defined by the client software (e.g., Geth, Erigon).

The economic consensus is sovereign. A miner attempting to enforce a non-standard rule, like changing the ETH issuance schedule, creates a fork rejected by nodes. The canonical chain is defined by full nodes, not hash power alone.

Their power is constrained to ordering. Miners can engage in MEV extraction via transaction ordering (e.g., frontrunning) within a block. They cannot, however, mint coins from nothing or change a user's balance without a valid signed transaction.

Evidence: The 2016 Ethereum DAO fork demonstrated this. Miners voted to implement the hard fork, but the change required coordinated client upgrades from core developers and adoption by node operators. The original chain (ETC) persists, proving miners cannot unilaterally rewrite history.

deep-dive
THE IMMUTABLE CORE

The Iron Cage: What Miners Cannot Change

A miner's power is strictly bounded by protocol rules, creating a predictable economic system.

Miners validate, not create. A Bitcoin or Ethereum miner cannot alter the consensus rules or mint arbitrary tokens. Their role is to order valid transactions, not define validity. This separation is the bedrock of decentralized trust.

The mempool is sovereign. Miners select from a public transaction pool they do not control. Users and wallets like MetaMask or Rabby broadcast intent; miners merely execute. This prevents censorship of compliant transactions.

Block rewards are algorithmic. Issuance follows a pre-programmed schedule like Bitcoin's halving or Ethereum's EIP-1559 burn. No miner can inflate the supply for personal gain, making monetary policy credibly neutral.

Evidence: Bitcoin's 21 million cap has never been breached despite miner collusion attempts, proving the code is law principle. Ethereum's transition to Proof-of-Stake further cemented this, removing miner influence entirely.

PROTOCOL-LEVEL PERMISSIONS

The Miner's Domain: A Matrix of Control

A technical breakdown of what a mining pool or solo miner can and cannot unilaterally modify within a standard Proof-of-Work blockchain like Bitcoin or Ethereum 1.x. This defines the attack surface and governance limits.

Protocol Parameter / ActionSolo Miner (Full Node)Mining Pool (Coordinator)Consensus-Required Change

Select Transactions for Block

Censor Specific Address (e.g., OFAC list)

Modify Block Reward Amount

Change Block Time Target (e.g., 10 min -> 5 min)

Alter Block Size/Gas Limit

Partial (Via Signaling)

Redirect Miner Extractable Value (MEV)

Via Local Strategy

Via Centralized Searcher

Implement a Hard Fork (e.g., New Opcode)

Orphan a Valid Block (51% Attack Vector)

Theoretically Possible

Theoretically Possible

market-context
THE MINER'S DILEMMA

The New Battlefield: Fee Markets and Layer 2s

Layer 2s are redefining transaction ordering and value capture, exposing the fundamental limits of L1 miner power.

Miners control sequencing, not finality. On Ethereum L1, miners (validators) decide transaction order within a block, enabling MEV extraction. This power is absolute but geographically limited to their own block.

Layer 2s are sovereign sequencing markets. Rollups like Arbitrum and Optimism operate their own sequencers, creating a new, independent fee market. L1 miners cannot reorder or censor transactions already batched and proven on L2.

The value shifts to the sequencer. The entity controlling the L2 sequencer captures the bulk of transaction fees and MEV, not the L1 miner. This creates a direct economic conflict, as seen in the rise of shared sequencer projects like Espresso and Astria.

Evidence: Over 90% of user transactions now originate from L2s. The L1 fee market is becoming a wholesale settlement layer, while the retail pricing and ordering battles are fought on Arbitrum, Base, and Starknet.

risk-analysis
MINER MANIPULATION

The Attack Vectors: When Miner Power Becomes a Threat

Proof-of-Work miners control transaction ordering and block creation, creating systemic risks beyond the 51% attack.

01

The Time-Bandit Attack: Rewriting History for Profit

Miners can secretly mine a longer, alternative chain to double-spend or censor transactions after they appear confirmed. This is the canonical 51% attack, but profitability depends on exchange finality policies and the value at stake.

  • Key Risk: Exchanges with shallow confirmations (e.g., 1-3 blocks) for high-value deposits are primary targets.
  • Key Constraint: Attack cost scales with hashrate rental prices and lost block rewards from the public chain.
1-6 Blocks
Vulnerable Depth
$1M+
Typical Attack Cost
02

Miner Extractable Value (MEV): The 'Legal' Front-Running

Miners (and validators) can reorder, insert, or censor transactions within a block to capture arbitrage, liquidations, and sandwich trades. This is a consensus-level exploit of user transactions.

  • The Problem: Creates toxic order flow, degrading execution for regular users and centralizing block building.
  • The Constraint: Cannot steal already-confirmed funds from a wallet, only manipulate pending txns. Solutions like Flashbots SUAVE, CowSwap, and MEV-Boost aim to democratize access.
$1B+
Annual Extraction
>90%
Eth Blocks w/ MEV
03

Censorship: The Political Attack Vector

Mining pools can exclude transactions from specific addresses (e.g., sanctioned Tornado Cash users) from blocks. This violates neutrality and can be enforced by regulatory pressure.

  • The Problem: Turns miners into regulatory gatekeepers, undermining permissionless access.
  • The Constraint: Cannot alter blockchain state or prevent other miners from including the txns. Proposer-Builder Separation (PBS) and crLists are architectural responses to pool-level censorship.
OFAC List
Primary Driver
Pool-Level
Enforcement Point
04

The Unchangeable Core: Immutable Consensus Rules

Miners have zero power to change the protocol's fundamental rules: token supply, block reward schedule, or the validity of past blocks. This is enforced by full nodes which reject invalid chains.

  • Key Limit: A miner can only propose a new block; network consensus is required for adoption.
  • Key Defense: User-Activated Soft Forks (UASF) like Bitcoin's SegWit demonstrate node sovereignty over miner opposition.
Full Nodes
Final Arbiters
0%
Rule Change Power
future-outlook
THE MINER'S DILEMMA

Conclusion: Governance Through Inaction

Miners and validators enforce protocol rules but cannot change them, creating a governance paradox where their most powerful action is inaction.

Miners are rule-enforcers, not rule-makers. Their power is purely mechanical: they validate transactions and order blocks according to the Ethereum consensus rules. Any deviation from these rules, like altering gas limits or block times, results in a hard fork and chain split.

Governance through inaction is their ultimate veto. The real power lies in rejecting protocol upgrades. The Ethereum Classic fork demonstrated this: miners who rejected the DAO bailout continued the original chain by simply not implementing the new code.

This creates a passive-aggressive power dynamic. Core developers propose changes via EIPs, but miners control adoption. The London hard fork (EIP-1559) rollout required explicit miner coordination; their initial resistance highlighted this latent veto power.

Evidence: The Bitcoin Cash fork in 2017 saw miners choose between SegWit and larger blocks. The resulting chain split, driven by miner hashrate allocation, proved that hash power is a binary governance tool.

takeaways
MINER POWER & CONSTRAINTS

TL;DR for Protocol Architects

Understanding the precise levers miners/validators control is critical for designing robust, incentive-aligned protocols.

01

The Problem: Inelastic Block Space

Miners cannot fundamentally alter the block size or block time defined by the protocol's consensus rules. This creates a fixed-supply market for transaction inclusion, leading to volatile fee auctions during congestion.\n- Constrained Resource: Block space is the ultimate scarce commodity.\n- Fee Market Dynamics: Miners are pure profit-maximizers for ordering within this constraint.

Fixed
Block Size
Auction
Fee Model
02

The Solution: Transaction Ordering & MEV

A miner's primary power is transaction ordering within a block. This grants them exclusive rights to Maximal Extractable Value (MEV), from simple fee prioritization to complex arbitrage and liquidations.\n- Revenue Stream: MEV can exceed >100% of standard block rewards.\n- Protocol Risk: Naive designs leak value; systems like CowSwap and UniswapX use intents to mitigate.

100%+
Revenue Boost
Control
Tx Order
03

The Problem: Censorship & OFAC Compliance

Miners can censor transactions by excluding them from blocks. While economically irrational in a competitive market, regulatory pressure (e.g., OFAC sanctions) can force centralized mining pools to comply, threatening credible neutrality.\n- Network Risk: Centralized mining/staking pools create single points of failure.\n- Solution Space: Requires proposer-builder separation (PBS) or encrypted mempools.

High
Centralization Risk
PBS
Mitigation
04

The Solution: Soft Forks & Social Consensus

Miners cannot change protocol rules unilaterally; they can only signal readiness for soft forks. Ultimate upgrade power resides with full nodes and the social layer. This prevents miner capture but introduces coordination overhead.\n- Governance Check: A 51% attack can reorganize chains but cannot force new rules.\n- Key Insight: Protocol design must secure both cryptographic and social consensus.

Node Power
Final Authority
Social
Consensus Layer
05

The Problem: Time-Bandit Attacks

Miners can attempt chain reorganizations to revert blocks and steal MEV—a time-bandit attack. While costly, it's a rational strategy if the stolen value exceeds the orphaned block reward, undermining settlement finality.\n- Finality Risk: Especially acute in Proof-of-Work chains with probabilistic finality.\n- Protocol Defense: Requires economic penalties or finality gadgets.

Probabilistic
Finality
Reorg Risk
MEV Theft
06

Enshrined PBS & MEV-Boost

Proposer-Builder Separation (PBS), as pioneered by Ethereum's roadmap and implemented via MEV-Boost, formalizes the miner/validator's role. The proposer simply chooses the highest-paying block header, outsourcing complex ordering to competitive builders.\n- Efficiency: Unlocks >90% of MEV for validators via open markets.\n- Censorship Resistance: Enables crLists to force inclusion of sanctioned transactions.

>90%
MEV Capture
Market
Block Building
ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected direct pipeline
Bitcoin Miners: Power, Limits, and the Future of Governance | ChainScore Blog