The fork choice rule is the algorithm used by blockchain nodes to select which chain branch is the "true" canonical chain when forks occur — when two or more valid block candidates exist simultaneously. Without a fork choice rule, nodes would disagree on the state of the blockchain, destroying the single shared ledger property that makes blockchains useful. WHY FORKS HAPPEN In Bitcoin's Proof of Work, two miners can find valid blocks simultaneously — creating two competing valid chain tips. The network must agree which to follow. In Ethereum's PoS, network latency can cause some validators to see different block proposals. In both cases, nodes need an objective rule to converge on the same chain without central coordination. BITCOIN'S FORK CHOICE: LONGEST CHAIN (NAKAMOTO CONSENSUS) Bitcoin follows the "heaviest chain" rule — select the chain with the most cumulative proof of work (not simply the most blocks, but the chain with the most work represented). Rationale: The chain with the most work represents the most computational investment — it's overwhelmingly likely that the honest majority built it. An attacker would need to redo all that work to replace it. In practice for nearly equal forks: Nodes follow the chain they received first, but will switch if a longer chain arrives. ETHEREUM'S FORK CHOICE: LMD-GHOST Ethereum's Proof of Stake uses LMD-GHOST (Latest Message Driven Greedy Heaviest Observed SubTree): Latest Message Driven: Only the most recent attestation from each validator counts — preventing old votes from being recycled. Greedy Heaviest Observed SubTree (GHOST): At each fork point, choose the branch with the most validator stake weight supporting it (not just block count). Combined with Casper FFG finalisation, which periodically locks in checkpoints that cannot be reverted, LMD-GHOST provides Ethereum with both fast live-chain progression and eventual cryptoeconomic finality. WHY THE FORK CHOICE RULE MATTERS Security model: The fork choice rule determines what it means to "attack" a blockchain. For Bitcoin, you need 51% hashrate. For Ethereum PoS, you need 33%+ of staked ETH to cause attacks. Long-range attacks: PoS systems have unique attack vectors where an attacker with historical keys could build an alternative long chain from genesis. Ethereum's weak subjectivity checkpoints address this by requiring new nodes to sync from a recent trusted checkpoint.